Displaying 8 results from an estimated 8 matches for "ssh_protoflag_screen_numb".
Did you mean:
ssh_protoflag_screen_number
2001 Feb 19
7
Packet integrity error. (34)
Hi,
I am using Van Dyke SecureCRT 3.2.1 to access an AIX server running
OpenSSH-2.5.0p1. Using ssh1 with X11 forwarding enabled, the server
reports the following error (in the client session):
Packet integrity error. (34)
This problem was not evident in 2.3.0p1. Running sshd in debug gives the
output:
debug1: sshd version OpenSSH_2.5.1p1
debug1: load_private_key_autodetect: type 0 RSA1
2001 Mar 30
4
linux tcsetattr failed
does anyone else see this on linux:
localhost sshd[14418]: Accepted password for stevesk from 15.126.45.158 port 49594
localhost sshd[14418]: Setting tty modes failed: Invalid argument
redhat with kernel 2.2.17.
ttymodes.c:
/* Set the new modes for the terminal. */
if (tcsetattr(fd, TCSANOW, &tio) < 0)
log("Setting tty modes failed: %.100s", strerror(errno));
return;
2001 Mar 07
2
F-secure v1 client has trouble connecting to openssh-2.5.1p1
I'm observing that mac clients using F-Secure ssh v1 client log into the
ssh server, and then the client just hangs with nothing on the screen.
In the SYSLOG file, I see this:
Accepted password for user from host port whatever
Packet integrity error (62 != 58) at session.c:350
Disconnecting: Packet integrity error. (34)
This is sshd running on IRIX 6.5.3f
2001 Jun 18
1
OpenSSH + Solaris + AFS ???
...t
debug1: session_new: session 0
debug1: Allocating pty.
debug2: tty_parse_modes: ospeed 9600
debug2: tty_parse_modes: ispeed 9600
debug2: tty_parse_modes: 1 3
[...]
debug2: tty_parse_modes: 2 28
debug2: tty_parse_modes: 93 0
debug1: Received request for X11 forwarding with auth spoofing.
debug2: SSH_PROTOFLAG_SCREEN_NUMBER: 1
debug1: bind port 6010: Address already in use
debug1: bind port 6011: Address already in use
debug1: fd 11 setting O_NONBLOCK
debug1: fd 11 IS O_NONBLOCK
debug1: channel 0: new [X11 inet listener]
debug1: temporarily_use_uid: 10416/1052 (e=0)
debug1: restore_uid
debug1: PAM setting tty to &qu...
2001 Aug 03
1
Disconnecting: protocol error: rcvd type 98
...parse_modes: 72 1
debug2: tty_parse_modes: 73 0
debug2: tty_parse_modes: 74 0
debug2: tty_parse_modes: 75 0
debug2: tty_parse_modes: 90 1
debug2: tty_parse_modes: 91 1
debug2: tty_parse_modes: 92 0
debug2: tty_parse_modes: 93 0
debug1: Received request for X11 forwarding with auth spoofing.
debug2: SSH_PROTOFLAG_SCREEN_NUMBER: 1
debug1: fd 10 setting O_NONBLOCK
debug1: fd 10 IS O_NONBLOCK
debug1: channel 0: new [X11 inet listener]
debug1: temporarily_use_uid: 32540/2400 (e=0)
debug1: restore_uid
debug1: Received authentication agent forwarding request.
debug1: temporarily_use_uid: 32540/2400 (e=0)
debug1: restore_uid...
2010 Nov 28
2
[PATCH] Use canonical hostname for DNS SSHFP lookup
...host key (%d bits).",
BN_num_bits(server_key->rsa->n), BN_num_bits(host_key->rsa->n));
- if (verify_host_key(host, hostaddr, host_key) == -1)
+ if (verify_host_key(host, hostaddr, host_key, NULL) == -1)
fatal("Host key verification failed.");
client_flags = SSH_PROTOFLAG_SCREEN_NUMBER | SSH_PROTOFLAG_HOST_IN_FWD_OPEN;
diff -ur openssh/sshconnect2.c openssh-sshfp/sshconnect2.c
--- openssh/sshconnect2.c 2010-09-24 14:11:14.000000000 +0200
+++ openssh-sshfp/sshconnect2.c 2010-11-27 23:38:36.154046251 +0100
@@ -90,24 +90,26 @@
char *xxx_host;
struct sockaddr *xxx_hostaddr;
+co...
2001 Apr 11
1
openssh 2.5.2p2/Solaris 5.8 problems
...h RSA host authentication accepted for root, root on tsunami.ecn.purdue.edu.
Accepted rhosts-rsa for ROOT from 128.46.154.96 port 51943 ruser root
debug1: session_new: init
debug1: session_new: session 0
debug1: Allocating pty.
debug1: Received request for X11 forwarding with auth spoofing.
debug2: SSH_PROTOFLAG_SCREEN_NUMBER: 1
debug1: bind port 6011: Address already in use
debug1: fd 10 setting O_NONBLOCK
debug1: fd 10 IS O_NONBLOCK
debug1: channel 0: new [X11 inet listener]
debug1: Received authentication agent forwarding request.
debug1: fd 11 setting O_NONBLOCK
debug1: fd 11 IS O_NONBLOCK
debug1: channel 1: new [...
2000 Jan 19
3
AIX openssh patches
...error: X11 display already set.");
{
int proto_len, data_len;
! proto = packet_get_string(&proto_len);
! data = packet_get_string(&data_len);
packet_integrity_check(plen, 4 + proto_len + 4 + data_len + 4, type);
}
if (packet_get_protocol_flags() & SSH_PROTOFLAG_SCREEN_NUMBER)
--- 1681,1688 ----
packet_disconnect("Protocol error: X11 display already set.");
{
int proto_len, data_len;
! proto = packet_get_string((unsigned int *)&proto_len);
! data = packet_get_string((unsigned int *)&data_len);
packet_integrity_check(ple...