Corrupted MAC on input
Ryan Robertson
r3r2 at yahoo.com
Sat May 8 03:27:10 EST 2004
It goes worth mentioning that I have AIX servers that
have both 3.7 and 3.8 running on a seperate NAT'd
subnet with no issues. They run through a completely
different set of routers and probably firewall rules.
The other subnet where I'm having issues are running
older cisco switches/routers. At this point that is
the only difference. Below is debug output from the
my linux client. Yes I know I need to upgrade it.
Most likely by the time you read this, it will be.
Also, what kind of content would you like posted for
Bug 860?
Thanks again,
Ryan
====================================
themac at localhost noise]$ ssh -vl root 165.136.23.89
OpenSSH_3.6.1p2, SSH protocols 1.5/2.0, OpenSSL
0x0090703f
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Rhosts Authentication disabled, originating
port will not be trusted.
debug1: Connecting to 165.136.23.89 [165.136.23.89]
port 22.
debug1: Connection established.
debug1: identity file /home/themac/.ssh/identity type
-1
debug1: identity file /home/themac/.ssh/id_rsa type 1
debug1: identity file /home/themac/.ssh/id_dsa type -1
debug1: Remote protocol version 1.99, remote software
version OpenSSH_3.8p1
debug1: match: OpenSSH_3.8p1 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.6.1p2
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host '165.136.23.89' is known and matches the
RSA host key.
debug1: Found key in /home/themac/.ssh/known_hosts:2
debug1: ssh_rsa_verify: signature correct
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue:
publickey,password,keyboard-interactive
debug1: Next authentication method: publickey
debug1: Trying private key: /home/themac/.ssh/identity
debug1: Offering public key: /home/themac/.ssh/id_rsa
debug1: Authentications that can continue:
publickey,password,keyboard-interactive
debug1: Trying private key: /home/themac/.ssh/id_dsa
debug1: Next authentication method:
keyboard-interactive
debug1: Authentications that can continue:
publickey,password,keyboard-interactive
debug1: Next authentication method: password
root at 165.136.23.89's password:
debug1: Authentication succeeded (password).
debug1: channel 0: new [client-session]
debug1: Entering interactive session.
debug1: channel 0: request pty-req
debug1: Requesting X11 forwarding with authentication
spoofing.
debug1: channel 0: request x11-req
debug1: channel 0: request shell
debug1: channel 0: open confirm rwindow 0 rmax 32768
Last unsuccessful login: Wed May 5 15:15:01 2004 on
ssh from 155.17.136.61
Last login: Fri May 7 14:25:17 2004 on ssh from
155.17.98.85
*******************************************************************************
*
*
*
*
* Welcome to AIX Version 5.2!
*
*
*
*
*
* Please see the README file in /usr/lpp/bos for
information pertinent to *
* this release of the AIX Operating System.
*
*
*
* UNAUTHORIZED ACCESS PROHIBITED
*
*******************************************************************************
prdnim:/ # wsm &
[1] 417942
prdnim:/ # debug1: client_input_channel_open: ctype
x11 rchan 2 win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1
34788
debug1: fd 7 setting O_NONBLOCK
debug1: channel 1: new [x11]
debug1: confirm x11
debug1: client_input_channel_open: ctype x11 rchan 3
win 65536 max 16384
debug1: client_request_x11: request from 127.0.0.1
34789
debug1: fd 8 setting O_NONBLOCK
debug1: channel 2: new [x11]
debug1: confirm x11
debug1: channel 2: rcvd eof
debug1: channel 2: output open -> drain
debug1: channel 2: obuf empty
debug1: channel 2: close_write
debug1: channel 2: output drain -> closed
debug1: channel 2: FORCE input drain
debug1: channel 2: ibuf empty
debug1: channel 2: send eof
debug1: channel 2: input drain -> closed
debug1: channel 2: send close
debug1: channel 2: rcvd close
debug1: channel 2: is dead
debug1: channel 2: garbage collecting
debug1: channel_free: channel 2: x11, nchannels 3
Disconnecting: Corrupted MAC on input.
debug1: Calling cleanup 0x8051b10(0x0)
debug1: Calling cleanup 0x805aa30(0x0)
debug1: channel_free: channel 0: client-session,
nchannels 2
debug1: channel_free: channel 1: x11, nchannels 1
debug1: Calling cleanup 0x80628b0(0x0)
==================================
__________________________________
Do you Yahoo!?
Win a $20,000 Career Makeover at Yahoo! HotJobs
http://hotjobs.sweepstakes.yahoo.com/careermakeover
More information about the openssh-unix-dev
mailing list