Ajit Yashwant Vaishampayan, Noida
2002-Dec-20 12:58 UTC
Bad packet length problem with "aes128-cbc" and openssh3.1p1
Hi, I am trying to run openssh 3.1p1. But it is giving "Bad packet length" error when I run sshd with default config file. On further investigation I found that the error is coming only for the cipher algorithm "aes128-cbc". Also the error comes only when I don't specify any protocol file (/usr/local/etc/ssh_host_[rd]sa_key) or specify only "protocol 2" files. I tried all other cipher algorithms with the "-c" option and it works fine with them. I also changed the sshd config file (/usr/local/etc/sshd_config in my case), and it again worked fine when "aes128-cbc" was not included and failed when it was included in the cipher list. Kindly tell me whether the problem with "aes128-cbc" is known one or there is problem with my compilation of openssh and related packages. Regards Ajit
Markus Friedl
2002-Dec-20 13:24 UTC
Bad packet length problem with "aes128-cbc" and openssh3.1p1
when does this happen? what plattform? what versions of openssh? are other implementations of ssh involved? does this happen on the client or server? does this happen with newer releases? please provide more details. thx, -m
Ajit Yashwant Vaishampayan, Noida
2002-Dec-26 10:50 UTC
Bad packet length problem with "aes128-cbc" and openssh3.1p1
Hi, Here is some information about the problem.> when does this happen? what plattform?When I try to connect to a 64-bit bigendian machine from a 32-bit little endian machine or even from a 64 bit big endian machine using ssh. Server (sshd) is running on SUPER-UX running on SX-6 and client (ssh) is running on P - II with Red Hat 7.1 or vice versa.> what versions of openssh?openssh-3.1p1 on both client and server, compiled and installed locally.> are other implementations of ssh involved?I am having the same ssh, ssl, zlib installed on both client and server. ssl: openssl-0.9.6b zlib: zlib-1.1.4> does this happen on the client or server?When running in debug mode, the bad packet is recognized at the server side first and then the message is sent to client. The debug output is appended below. Server side: - ---------------------------------------------------------------------- # uname -a SUPER-UX unix 12.2 SX-6 # ./sshd -d -p 12020 -f /usr/local/etc/sshd_config debug1: sshd version OpenSSH_3.1p1 debug1: private host key: #0 type 0 RSA1 debug1: read PEM private key done: type RSA debug1: private host key: #1 type 1 RSA debug1: read PEM private key done: type DSA debug1: private host key: #2 type 2 DSA debug1: Bind to port 12020 on 0.0.0.0. Server listening on 0.0.0.0 port 12020. Generating 768 bit RSA key. RSA key generation complete. debug1: Server will not fork when running in debugging mode. Connection from a.b.c.d port 3814 debug1: Client protocol version 2.0; client software version OpenSSH_3.1p1 debug1: match: OpenSSH_3.1p1 pat OpenSSH* Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-1.99-OpenSSH_3.1p1 debug1: list_hostkey_types: ssh-rsa,ssh-dss debug1: send2: outgoing packet before cipher_crypt: 0000 01e4 0914 e2a0 5798 041b 6d8a 8a4a 73d1 a66e 9da1 0000 003d 6469 6666 6965 ... debug1: send2: outgoing packet after cipher_crypt: 0000 01e4 0914 e2a0 5798 041b 6d8a 8a4a 73d1 a66e 9da1 0000 003d 6469 6666 6965 ... debug1: SSH2_MSG_KEXINIT sent debug1: poll2: incoming packet before cipher_crypt: 0000 0000 0000 0000 debug1: poll2: incoming packet after cipher_crypt: 0000 01dc 0b14 1296 debug1: SSH2_MSG_KEXINIT received debug1: kex: client->server aes128-cbc hmac-md5 none debug1: kex: server->client aes128-cbc hmac-md5 none debug1: poll2: incoming packet before cipher_crypt: 0000 01dc 0b14 1296 debug1: poll2: incoming packet after cipher_crypt: 0000 0014 0622 0000 debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent debug1: send2: outgoing packet before cipher_crypt: 0000 01a4 0a1f 0000 018f 669b a3ed 661f 226a 090b e564 4a2b b420 9371 b78f c3e6 ... debug1: send2: outgoing packet after cipher_crypt: 0000 01a4 0a1f 0000 018f 669b a3ed 661f 226a 090b e564 4a2b b420 9371 b78f c3e6 ... debug1: dh_gen_key: priv key bits set: 135/256 debug1: bits set: 1563/3191 debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT debug1: poll2: incoming packet before cipher_crypt: 0000 0014 0622 0000 debug1: poll2: incoming packet after cipher_crypt: 0000 019c 0720 0000 debug1: bits set: 1602/3191 debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent debug1: send2: outgoing packet before cipher_crypt: 0000 02cc 0b21 0000 0095 0000 0007 7373 682d 7273 6100 0000 0123 0000 0081 00ba ... debug1: send2: outgoing packet after cipher_crypt: 0000 02cc 0b21 0000 0095 0000 0007 7373 682d 7273 6100 0000 0123 0000 0081 00ba ... debug1: kex_derive_keys debug1: send2: outgoing packet before cipher_crypt: 0000 000c 0a15 0000 0000 0000 0000 0000 debug1: send2: outgoing packet after cipher_crypt: 0000 000c 0a15 0000 0000 0000 0000 0000 debug1: newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: waiting for SSH2_MSG_NEWKEYS debug1: poll2: incoming packet before cipher_crypt: 0000 019c 0720 0000 debug1: poll2: incoming packet after cipher_crypt: 0000 000c 0a15 0000 debug1: newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: KEX done debug1: dispatch_run debug1: poll2: incoming packet before cipher_crypt: 0000 000c 0a15 0000 0000 0000 0000 0000 debug1: poll2: incoming packet after cipher_crypt: a95d 0c23 e308 4167 8849 9458 684e e068 a95d 0c23 e308 4167 8849 9458 684e e068 debug1: send2: outgoing packet before cipher_crypt: 0000 003c 0d01 0000 0002 0000 0021 706f 6c6c 3220 4261 6420 7061 636b 6574 206c 656e 6774 6820 6139 3564 3063 3233 2e00 0000 0028 9ff6 483e 1c57 d8d7 2379 4cb9 debug1: send2: outgoing packet after cipher_crypt: 0000 003c 0d01 0000 0002 0000 0021 706f 6c6c 3220 4261 6420 7061 636b 6574 206c 656e 6774 6820 6139 3564 3063 3233 2e00 0000 0028 9ff6 483e 1c57 d8d7 2379 4cb9 Disconnecting: poll2 Bad packet length a95d0c23. debug1: Calling cleanup 0x4000b3e98(0x0) ----------------------------------------------------------------- Client side: - ---------------------------------------------------------------------- $ uname -a SUPER-UX unix 12.2 SX-6 $ ./ssh -p 12020 -v -v -v -l ajith sx6i OpenSSH_3.1p1, SSH protocols 1.5/2.0, OpenSSL 0x0090602f debug1: Reading configuration data /usr/local/etc/ssh_config debug3: Seeing PRNG from /usr/local/libexec/ssh-rand-helper debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: restore_uid debug1: ssh_connect: getuid 106 geteuid 106 anon 1 debug1: Connecting to sx6i [a.b.c.d] port 12020. debug1: temporarily_use_uid: 106/102 (e=106) debug1: restore_uid debug1: temporarily_use_uid: 106/102 (e=106) debug1: restore_uid debug1: Connection established. debug1: identity file /home/ajith/.ssh/identity type -1 debug1: identity file /home/ajith/.ssh/id_rsa type -1 debug1: identity file /home/ajith/.ssh/id_dsa type -1 debug1: Remote protocol version 1.99, remote software version OpenSSH_3.1p1 debug1: match: OpenSSH_3.1p1 pat OpenSSH* Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_3.1p1 debug1: send2: outgoing packet before cipher_crypt: 0000 01dc 0b14 1296 3983 bf61 f319 7740 bd01 e53e d51a 0000 003d 6469 6666 6965 ... debug1: send2: outgoing packet after cipher_crypt: 0000 01dc 0b14 1296 3983 bf61 f319 7740 bd01 e53e d51a 0000 003d 6469 6666 6965 ... debug1: SSH2_MSG_KEXINIT sent debug1: poll2: incoming packet before cipher_crypt: 0000 0000 0000 0000 debug1: poll2: incoming packet after cipher_crypt: 0000 01e4 0914 e2a0 debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hm ac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hm ac-md5-96 debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hm ac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hm ac-md5-96 debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_init: found hmac-md5 debug1: kex: server->client aes128-cbc hmac-md5 none debug2: mac_init: found hmac-md5 debug1: kex: client->server aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent debug1: send2: outgoing packet before cipher_crypt: 0000 0014 0622 0000 0400 0000 0800 0000 2000 0000 0000 0000 debug1: send2: outgoing packet after cipher_crypt: 0000 0014 0622 0000 0400 0000 0800 0000 2000 0000 0000 0000 debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug1: poll2: incoming packet before cipher_crypt: 0000 01e4 0914 e2a0 debug1: poll2: incoming packet after cipher_crypt: 0000 01a4 0a1f 0000 debug1: dh_gen_key: priv key bits set: 118/256 debug1: bits set: 1602/3191 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: send2: outgoing packet before cipher_crypt: 0000 019c 0720 0000 018f 5a03 7ac0 e60e c2e0 2186 8ab9 522b c61f 5876 c887 db28 ... debug1: send2: outgoing packet after cipher_crypt: 0000 019c 0720 0000 018f 5a03 7ac0 e60e c2e0 2186 8ab9 522b c61f 5876 c887 db28 ... debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug1: poll2: incoming packet before cipher_crypt: 0000 01a4 0a1f 0000 debug1: poll2: incoming packet after cipher_crypt: 0000 02cc 0b21 0000 debug3: check_host_in_hostfile: filename /home/ajith/.ssh/known_hosts debug3: check_host_in_hostfile: match line 2 debug3: check_host_in_hostfile: filename /home/ajith/.ssh/known_hosts debug3: check_host_in_hostfile: match line 2 debug1: Host 'sx6i' is known and matches the RSA host key. debug1: Found key in /home/ajith/.ssh/known_hosts:2 debug1: bits set: 1563/3191 debug1: ssh_rsa_verify: signature correct debug1: kex_derive_keys debug1: send2: outgoing packet before cipher_crypt: 0000 000c 0a15 0000 0000 0000 0000 0000 debug1: send2: outgoing packet after cipher_crypt: 0000 000c 0a15 0000 0000 0000 0000 0000 debug1: newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: waiting for SSH2_MSG_NEWKEYS debug1: poll2: incoming packet before cipher_crypt: 0000 02cc 0b21 0000 debug1: poll2: incoming packet after cipher_crypt: 0000 000c 0a15 0000 debug1: newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: done: ssh_kex2. debug1: send SSH2_MSG_SERVICE_REQUEST debug1: send2: outgoing packet before cipher_crypt: 0000 001c 0a05 0000 000c 7373 682d 7573 6572 6175 7468 af31 35ee ef1a 8e54 496a debug1: send2: outgoing packet after cipher_crypt: 0000 001c 0a05 0000 000c 7373 682d 7573 6572 6175 7468 af31 35ee ef1a 8e54 496a debug1: poll2: incoming packet before cipher_crypt: 0000 000c 0a15 0000 0000 0000 0000 0000 debug1: poll2: incoming packet after cipher_crypt: 0000 003c 0d01 0000 0002 0000 0021 706f Received disconnect from a.b.c.d: 2: poll2 Bad packet length a95d0c23. debug1: Calling cleanup 0x40009a198(0x0) -------------------------------------------------------------> does this happen with newer releases?I have not tried with any other versions.> please provide more details. > > thx, -m >Thanks & Regards Ajit
Ajit Yashwant Vaishampayan, Noida
2003-Jan-02 12:29 UTC
Bad packet length problem with "aes128-cbc" and openssh3.1p1
The problem is still there in OpenSSH 3.5p1 version too. We tried it with 3.5p1 on both client and sever. Also we tried it with client as 3.1p1 and sever (SUPER-UX) as 3.5p1. But didn't work. Please help. Thanks, Ajit -----Original Message----- From: Ajit Yashwant Vaishampayan, Noida Sent: Thursday, December 26, 2002 4:23 PM To: openssh-unix-dev at mindrot.org Cc: 'Markus Friedl' Subject: RE: Bad packet length problem with "aes128-cbc" and openssh3.1p1 Hi, Here is some information about the problem.> when does this happen? what plattform?When I try to connect to a 64-bit bigendian machine from a 32-bit little endian machine or even from a 64 bit big endian machine using ssh. Server (sshd) is running on SUPER-UX running on SX-6 and client (ssh) is running on P - II with Red Hat 7.1 or vice versa.> what versions of openssh?openssh-3.1p1 on both client and server, compiled and installed locally.> are other implementations of ssh involved?I am having the same ssh, ssl, zlib installed on both client and server. ssl: openssl-0.9.6b zlib: zlib-1.1.4> does this happen on the client or server?When running in debug mode, the bad packet is recognized at the server side first and then the message is sent to client. The debug output is appended below. Server side: - ---------------------------------------------------------------------- # uname -a SUPER-UX unix 12.2 SX-6 # ./sshd -d -p 12020 -f /usr/local/etc/sshd_config debug1: sshd version OpenSSH_3.1p1 debug1: private host key: #0 type 0 RSA1 debug1: read PEM private key done: type RSA debug1: private host key: #1 type 1 RSA debug1: read PEM private key done: type DSA debug1: private host key: #2 type 2 DSA debug1: Bind to port 12020 on 0.0.0.0. Server listening on 0.0.0.0 port 12020. Generating 768 bit RSA key. RSA key generation complete. debug1: Server will not fork when running in debugging mode. Connection from a.b.c.d port 3814 debug1: Client protocol version 2.0; client software version OpenSSH_3.1p1 debug1: match: OpenSSH_3.1p1 pat OpenSSH* Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-1.99-OpenSSH_3.1p1 debug1: list_hostkey_types: ssh-rsa,ssh-dss debug1: send2: outgoing packet before cipher_crypt: 0000 01e4 0914 e2a0 5798 041b 6d8a 8a4a 73d1 a66e 9da1 0000 003d 6469 6666 6965 ... debug1: send2: outgoing packet after cipher_crypt: 0000 01e4 0914 e2a0 5798 041b 6d8a 8a4a 73d1 a66e 9da1 0000 003d 6469 6666 6965 ... debug1: SSH2_MSG_KEXINIT sent debug1: poll2: incoming packet before cipher_crypt: 0000 0000 0000 0000 debug1: poll2: incoming packet after cipher_crypt: 0000 01dc 0b14 1296 debug1: SSH2_MSG_KEXINIT received debug1: kex: client->server aes128-cbc hmac-md5 none debug1: kex: server->client aes128-cbc hmac-md5 none debug1: poll2: incoming packet before cipher_crypt: 0000 01dc 0b14 1296 debug1: poll2: incoming packet after cipher_crypt: 0000 0014 0622 0000 debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent debug1: send2: outgoing packet before cipher_crypt: 0000 01a4 0a1f 0000 018f 669b a3ed 661f 226a 090b e564 4a2b b420 9371 b78f c3e6 ... debug1: send2: outgoing packet after cipher_crypt: 0000 01a4 0a1f 0000 018f 669b a3ed 661f 226a 090b e564 4a2b b420 9371 b78f c3e6 ... debug1: dh_gen_key: priv key bits set: 135/256 debug1: bits set: 1563/3191 debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT debug1: poll2: incoming packet before cipher_crypt: 0000 0014 0622 0000 debug1: poll2: incoming packet after cipher_crypt: 0000 019c 0720 0000 debug1: bits set: 1602/3191 debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent debug1: send2: outgoing packet before cipher_crypt: 0000 02cc 0b21 0000 0095 0000 0007 7373 682d 7273 6100 0000 0123 0000 0081 00ba ... debug1: send2: outgoing packet after cipher_crypt: 0000 02cc 0b21 0000 0095 0000 0007 7373 682d 7273 6100 0000 0123 0000 0081 00ba ... debug1: kex_derive_keys debug1: send2: outgoing packet before cipher_crypt: 0000 000c 0a15 0000 0000 0000 0000 0000 debug1: send2: outgoing packet after cipher_crypt: 0000 000c 0a15 0000 0000 0000 0000 0000 debug1: newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: waiting for SSH2_MSG_NEWKEYS debug1: poll2: incoming packet before cipher_crypt: 0000 019c 0720 0000 debug1: poll2: incoming packet after cipher_crypt: 0000 000c 0a15 0000 debug1: newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: KEX done debug1: dispatch_run debug1: poll2: incoming packet before cipher_crypt: 0000 000c 0a15 0000 0000 0000 0000 0000 debug1: poll2: incoming packet after cipher_crypt: a95d 0c23 e308 4167 8849 9458 684e e068 a95d 0c23 e308 4167 8849 9458 684e e068 debug1: send2: outgoing packet before cipher_crypt: 0000 003c 0d01 0000 0002 0000 0021 706f 6c6c 3220 4261 6420 7061 636b 6574 206c 656e 6774 6820 6139 3564 3063 3233 2e00 0000 0028 9ff6 483e 1c57 d8d7 2379 4cb9 debug1: send2: outgoing packet after cipher_crypt: 0000 003c 0d01 0000 0002 0000 0021 706f 6c6c 3220 4261 6420 7061 636b 6574 206c 656e 6774 6820 6139 3564 3063 3233 2e00 0000 0028 9ff6 483e 1c57 d8d7 2379 4cb9 Disconnecting: poll2 Bad packet length a95d0c23. debug1: Calling cleanup 0x4000b3e98(0x0) ----------------------------------------------------------------- Client side: - ---------------------------------------------------------------------- $ uname -a SUPER-UX unix 12.2 SX-6 $ ./ssh -p 12020 -v -v -v -l ajith sx6i OpenSSH_3.1p1, SSH protocols 1.5/2.0, OpenSSL 0x0090602f debug1: Reading configuration data /usr/local/etc/ssh_config debug3: Seeing PRNG from /usr/local/libexec/ssh-rand-helper debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: restore_uid debug1: ssh_connect: getuid 106 geteuid 106 anon 1 debug1: Connecting to sx6i [a.b.c.d] port 12020. debug1: temporarily_use_uid: 106/102 (e=106) debug1: restore_uid debug1: temporarily_use_uid: 106/102 (e=106) debug1: restore_uid debug1: Connection established. debug1: identity file /home/ajith/.ssh/identity type -1 debug1: identity file /home/ajith/.ssh/id_rsa type -1 debug1: identity file /home/ajith/.ssh/id_dsa type -1 debug1: Remote protocol version 1.99, remote software version OpenSSH_3.1p1 debug1: match: OpenSSH_3.1p1 pat OpenSSH* Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_3.1p1 debug1: send2: outgoing packet before cipher_crypt: 0000 01dc 0b14 1296 3983 bf61 f319 7740 bd01 e53e d51a 0000 003d 6469 6666 6965 ... debug1: send2: outgoing packet after cipher_crypt: 0000 01dc 0b14 1296 3983 bf61 f319 7740 bd01 e53e d51a 0000 003d 6469 6666 6965 ... debug1: SSH2_MSG_KEXINIT sent debug1: poll2: incoming packet before cipher_crypt: 0000 0000 0000 0000 debug1: poll2: incoming packet after cipher_crypt: 0000 01e4 0914 e2a0 debug1: SSH2_MSG_KEXINIT received debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hm ac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hm ac-md5-96 debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: none debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug2: kex_parse_kexinit: ssh-rsa,ssh-dss debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hm ac-md5-96 debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hm ac-md5-96 debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: none,zlib debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: debug2: kex_parse_kexinit: first_kex_follows 0 debug2: kex_parse_kexinit: reserved 0 debug2: mac_init: found hmac-md5 debug1: kex: server->client aes128-cbc hmac-md5 none debug2: mac_init: found hmac-md5 debug1: kex: client->server aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent debug1: send2: outgoing packet before cipher_crypt: 0000 0014 0622 0000 0400 0000 0800 0000 2000 0000 0000 0000 debug1: send2: outgoing packet after cipher_crypt: 0000 0014 0622 0000 0400 0000 0800 0000 2000 0000 0000 0000 debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug1: poll2: incoming packet before cipher_crypt: 0000 01e4 0914 e2a0 debug1: poll2: incoming packet after cipher_crypt: 0000 01a4 0a1f 0000 debug1: dh_gen_key: priv key bits set: 118/256 debug1: bits set: 1602/3191 debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: send2: outgoing packet before cipher_crypt: 0000 019c 0720 0000 018f 5a03 7ac0 e60e c2e0 2186 8ab9 522b c61f 5876 c887 db28 ... debug1: send2: outgoing packet after cipher_crypt: 0000 019c 0720 0000 018f 5a03 7ac0 e60e c2e0 2186 8ab9 522b c61f 5876 c887 db28 ... debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug1: poll2: incoming packet before cipher_crypt: 0000 01a4 0a1f 0000 debug1: poll2: incoming packet after cipher_crypt: 0000 02cc 0b21 0000 debug3: check_host_in_hostfile: filename /home/ajith/.ssh/known_hosts debug3: check_host_in_hostfile: match line 2 debug3: check_host_in_hostfile: filename /home/ajith/.ssh/known_hosts debug3: check_host_in_hostfile: match line 2 debug1: Host 'sx6i' is known and matches the RSA host key. debug1: Found key in /home/ajith/.ssh/known_hosts:2 debug1: bits set: 1563/3191 debug1: ssh_rsa_verify: signature correct debug1: kex_derive_keys debug1: send2: outgoing packet before cipher_crypt: 0000 000c 0a15 0000 0000 0000 0000 0000 debug1: send2: outgoing packet after cipher_crypt: 0000 000c 0a15 0000 0000 0000 0000 0000 debug1: newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: waiting for SSH2_MSG_NEWKEYS debug1: poll2: incoming packet before cipher_crypt: 0000 02cc 0b21 0000 debug1: poll2: incoming packet after cipher_crypt: 0000 000c 0a15 0000 debug1: newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: done: ssh_kex2. debug1: send SSH2_MSG_SERVICE_REQUEST debug1: send2: outgoing packet before cipher_crypt: 0000 001c 0a05 0000 000c 7373 682d 7573 6572 6175 7468 af31 35ee ef1a 8e54 496a debug1: send2: outgoing packet after cipher_crypt: 0000 001c 0a05 0000 000c 7373 682d 7573 6572 6175 7468 af31 35ee ef1a 8e54 496a debug1: poll2: incoming packet before cipher_crypt: 0000 000c 0a15 0000 0000 0000 0000 0000 debug1: poll2: incoming packet after cipher_crypt: 0000 003c 0d01 0000 0002 0000 0021 706f Received disconnect from a.b.c.d: 2: poll2 Bad packet length a95d0c23. debug1: Calling cleanup 0x40009a198(0x0) -------------------------------------------------------------> does this happen with newer releases?I have not tried with any other versions.> please provide more details. > > thx, -m >Thanks & Regards Ajit