VPN MTU limit breaks ssh connection to openssh 6.2p2 server

Ernst Kratschmer ernstk at us.ibm.com
Fri Nov 8 02:48:59 EST 2013


Dear openssh developer, 

I want to use a Win7 client with putty to access a Linux host running an 
openssh 6.2p2 through a VPN connection. These connection worked relatively 
flawless with  all versions of openssh up until openssh 6.1p1. Since the 
openssh 6.2p2 upgrade the ssh connection fail consistently with a message: 
Network error, connection reset by peer. After inspecting the tcp 
transmission between the putty client and openssh server it appears that 
the maximum MTU limit of 1362 of the VPN connection, causes the server to 
break the 1460 byte cipher string into two packets. At that point the ssh 
client, putty or openssh, resets the connection. 

This was not a problem with openssh 6.1p1 since the cipher string was only 
1106 bytes and therefore transmitted in one packet. Since I am stuck with 
the VPN MTU limit of 1362, I am hoping that you could help in some form to 
get the ssh connection working again by, e.g., limit the cipher string to 
less than 1322 bytes?


Thanks in advance for any help you can provide to fix this problem,

Ernst Kratschmer



More information about the openssh-unix-dev mailing list