[Bug 966335] New: openssh fails with ssh_exchange_identification: read: Connection reset by peer
http://bugzilla.suse.com/show_bug.cgi?id=966335 Bug ID: 966335 Summary: openssh fails with ssh_exchange_identification: read: Connection reset by peer Classification: openSUSE Product: openSUSE Tumbleweed Version: 2015* Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Other Assignee: pcerny@suse.com Reporter: tchvatal@suse.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- Quite often the connection fails. Retrying the connections usually succeeds. Both machines are running tumbleweed. scarabeus@arcarius: ~ $ ssh -v bugaboo OpenSSH_6.6.1, OpenSSL 1.0.2e-fips 3 Dec 2015 debug1: Reading configuration data /home/scarabeus/.ssh/config debug1: Reading configuration data /etc/ssh/ssh_config debug1: /etc/ssh/ssh_config line 20: Applying options for * debug1: Connecting to bugaboo [10.100.12.39] port 22. debug1: Connection established. debug1: identity file /home/scarabeus/.ssh/id_rsa type 1 debug1: identity file /home/scarabeus/.ssh/id_rsa-cert type -1 debug1: identity file /home/scarabeus/.ssh/id_dsa type 2 debug1: identity file /home/scarabeus/.ssh/id_dsa-cert type -1 debug1: identity file /home/scarabeus/.ssh/id_ecdsa type 3 debug1: identity file /home/scarabeus/.ssh/id_ecdsa-cert type -1 debug1: identity file /home/scarabeus/.ssh/id_ed25519 type -1 debug1: identity file /home/scarabeus/.ssh/id_ed25519-cert type -1 debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_6.6.1 ssh_exchange_identification: read: Connection reset by peer scarabeus@arcarius: ~ $ ssh -v bugaboo OpenSSH_6.6.1, OpenSSL 1.0.2e-fips 3 Dec 2015 debug1: Reading configuration data /home/scarabeus/.ssh/config debug1: Reading configuration data /etc/ssh/ssh_config debug1: /etc/ssh/ssh_config line 20: Applying options for * debug1: Connecting to bugaboo [10.100.12.39] port 22. debug1: Connection established. debug1: identity file /home/scarabeus/.ssh/id_rsa type 1 debug1: identity file /home/scarabeus/.ssh/id_rsa-cert type -1 debug1: identity file /home/scarabeus/.ssh/id_dsa type 2 debug1: identity file /home/scarabeus/.ssh/id_dsa-cert type -1 debug1: identity file /home/scarabeus/.ssh/id_ecdsa type 3 debug1: identity file /home/scarabeus/.ssh/id_ecdsa-cert type -1 debug1: identity file /home/scarabeus/.ssh/id_ed25519 type -1 debug1: identity file /home/scarabeus/.ssh/id_ed25519-cert type -1 debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_6.6.1 debug1: Remote protocol version 2.0, remote software version OpenSSH_6.6.1 debug1: match: OpenSSH_6.6.1 pat OpenSSH_6.6.1* compat 0x04000000 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: server->client aes128-ctr hmac-md5-etm@openssh.com none debug1: kex: client->server aes128-ctr hmac-md5-etm@openssh.com none debug1: sending SSH2_MSG_KEX_ECDH_INIT debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: Server host key: ECDSA dd:28:0a:3c:1e:ea:7e:24:ce:62:77:30:d6:44:85:13 [MD5] debug1: Host 'bugaboo' is known and matches the ECDSA host key. debug1: Found key in /home/scarabeus/.ssh/known_hosts:34 debug1: ssh_ecdsa_verify: signature correct debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: SSH2_MSG_SERVICE_REQUEST sent debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey,keyboard-interactive debug1: Next authentication method: publickey debug1: Offering RSA public key: /home/scarabeus/.ssh/id_rsa debug1: Server accepts key: pkalg ssh-rsa blen 277 debug1: Authentication succeeded (publickey). Authenticated to bugaboo ([10.100.12.39]:22). debug1: channel 0: new [client-session] debug1: Requesting no-more-sessions@openssh.com debug1: Entering interactive session. debug1: Sending environment. debug1: Sending env LANG = cs_CZ.UTF-8 debug1: Sending env LC_CTYPE = cs_CZ.UTF-8 Last login: Thu Feb 11 19:23:35 2016 from tchvatal.openvpn.suse.cz Have a lot of fun... -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=966335
Martin Pluskal
http://bugzilla.suse.com/show_bug.cgi?id=966335
http://bugzilla.suse.com/show_bug.cgi?id=966335#c1
Tomáš Chvátal
http://bugzilla.suse.com/show_bug.cgi?id=966335
http://bugzilla.suse.com/show_bug.cgi?id=966335#c2
Barrett Strausser
http://bugzilla.suse.com/show_bug.cgi?id=966335
http://bugzilla.suse.com/show_bug.cgi?id=966335#c3
Tomáš Chvátal
Is it known in what commit the 4.5 fix was made?
The issue is some run-in with vpn and cutting packets. I forgot the solution since i jumped to 4.5 already. But I remember michal talked about it. Michal do you remember something about this issue? -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.suse.com/show_bug.cgi?id=966335
http://bugzilla.suse.com/show_bug.cgi?id=966335#c4
Michal Kubeček
participants (1)
-
bugzilla_noreply@novell.com