one host only: ssh_dispatch_run_fatal

Darren Tucker dtucker at zip.com.au
Tue Nov 8 15:51:16 AEDT 2016


On Tue, Nov 8, 2016 at 3:30 PM, Harry Putnam <reader at newsguy.com> wrote:
[...]
> After having 7.3p1 & 6.8p1 fail with same wording... I tried 6.7p1 and
> find it fails with what looks like the same problem but has slightly
> different wording.

I set up the same versions (server:OpenSSH_6.6p1, OpenSSL 1.0.1s  1
Mar 2016, client: OpenSSH_7.3p1, OpenSSL 1.0.1s  1 Mar 2016) on Linux
to try to reproduce it but failed.

./ssh -p 2022 -vvv -o ciphers=chacha20-poly1305 at openssh.com -o
kexalgorithms=diffie-hellman-group-exchange-sha256 localhost
[...]
debug1: kex: algorithm: diffie-hellman-group-exchange-sha256
debug1: kex: host key algorithm: ssh-ed25519
debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC:
<implicit> compression: none
debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC:
<implicit> compression: none

Can you tell me more about the server?  You said it's Solaris, but is
it SPARC or x86?  What OpenSSL version is it?

-- 
Darren Tucker (dtucker at zip.com.au)
GPG key 11EAA6FA / A86E 3E07 5B19 5880 E860  37F4 9357 ECEF 11EA A6FA (new)
    Good judgement comes with experience. Unfortunately, the experience
usually comes from bad judgement.


More information about the openssh-unix-dev mailing list