Displaying 11 results from an estimated 11 matches for "typep".
Did you mean:
type
2023 Apr 09
2
"Bad packet length 1231976033"
...There are lots of error messages
which start with this which are sent with error() or fatal() or
fprint(stderr, ...), but two which stand out as being a bit different:
# kex.c
?invalid:
??????????????? send_error(ssh, "Invalid SSH identification string.");
# packet.c
??????? if (*typep < SSH2_MSG_MIN || *typep >= SSH2_MSG_LOCAL_MIN) {
??????????????? if ((r = sshpkt_disconnect(ssh,
??????????????????? "Invalid ssh2 packet type: %d", *typep)) != 0 ||
If it happens to be either of these, then the tcpdump showing the
exchange prior to this point would be enlighte...
2023 Apr 09
1
"Bad packet length 1231976033"
I have a cron script that polls various machines for their configs and archives any changes.
When it connects to an OpenWrt router running "OpenSSH_9.1p1, OpenSSL 1.1.1s 1 Nov 2022", it sometimes gets this error:
Bad packet length 1231976033.
ssh_dispatch_run_fatal: Connection to 192.168.8.1 port 22: message authentication code incorrect
What's odd is that the length is *always*
2023 Apr 23
1
"Bad packet length 1231976033"
...tart with this which are sent with error() or fatal() or fprint(stderr, ...), but two which stand out as being a bit different:
>
> # kex.c
>
> invalid:
> send_error(ssh, "Invalid SSH identification string.");
>
> # packet.c
>
> if (*typep < SSH2_MSG_MIN || *typep >= SSH2_MSG_LOCAL_MIN) {
> if ((r = sshpkt_disconnect(ssh,
> "Invalid ssh2 packet type: %d", *typep)) != 0 ||
>
> If it happens to be either of these, then the tcpdump showing the exchange prior to this point...
2015 Jan 27
0
[Bug 1213] ssh-keyscan exits in mid-way
...Connection closed" error. As the error is non-specific, here's
the backtrace:
#0 0x00007ffff6802d50 in _exit () from /lib64/libc.so.6
#1 0x00007ffff7fc2048 in cleanup_exit (i=255) at ../cleanup.c:31
#2 0x00007ffff7f9fa99 in ssh_packet_read_seqnr
(ssh=0x7ffff86f4520,
typep=0x7fffffffde0f "", seqnr_p=0x7fffffffde10) at
../packet.c:1330
#3 0x00007ffff7fa69f5 in ssh_dispatch_run (ssh=0x7ffff86f4520,
mode=0,
done=0x7ffff8207178, ctxt=0x7ffff86f4520) at ../dispatch.c:101
#4 0x00007ffff7f85aef in keygrab_ssh2 (c=0x7ffff8207160)
at ../ssh...
2015 Jan 30
0
[Bug 1213] ssh-keyscan exits in mid-way
...minutes. And it's wedged pretty tight, too---nothing happens
even after letting it sit for several minutes more.
Here's the backtrace:
#0 0x00007ffff6836353 in __select_nocancel () from
/lib64/libc.so.6
#1 0x00007ffff7f9f4d6 in ssh_packet_read_seqnr
(ssh=0x7ffffb6e9cb0,
typep=0x7fffffffde0f "", seqnr_p=0x7fffffffde10) at
../packet.c:1313
#2 0x00007ffff7fa669b in ssh_dispatch_run (ssh=0x7ffffb6e9cb0,
mode=0,
done=0x7ffff8207d78, ctxt=0x7ffffb6e9cb0) at ../dispatch.c:101
#3 0x00007ffff7f84cef in keygrab_ssh2 (c=0x7ffff8207d60)
at ../ss...
2023 Feb 24
1
[PATCH 1/1] Add support for ZSTD compression
...state->outgoing_packet,
+ state->compression_buffer)) != 0)
+ goto out;
+ }
sshbuf_reset(state->outgoing_packet);
if ((r = sshbuf_put(state->outgoing_packet,
"\0\0\0\0\0", 5)) != 0 ||
@@ -1657,9 +1859,15 @@ ssh_packet_read_poll2(struct ssh *ssh, u_char *typep, u_int32_t *seqnr_p)
sshbuf_len(state->incoming_packet)));
if (comp && comp->enabled) {
sshbuf_reset(state->compression_buffer);
- if ((r = uncompress_buffer(ssh, state->incoming_packet,
- state->compression_buffer)) != 0)
- goto out;
+ if (comp->enable...
2023 Feb 24
1
[PATCH 0/1] ZSTD compression support for OpenSSH
I added ZSTD support to OpenSSH roughly three years ago and I've been
playing with it ever since.
The nice part is that ZSTD achieves reasonable compression (like zlib)
but consumes little CPU so it is unlikely that compression becomes the
bottle neck of a transfer. The compression overhead (CPU) is negligible
even when uncompressed data is tunneled over the SSH connection (SOCKS
proxy, port
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string
client_version_string.
These are used just in a few functions and can easily be passed as
parameters.
Also, there is a strange construct, where their memory is allocated to
the global pointers, then copies of these pointers are assigned to the
kex structure. The kex_free finally frees them via cleanup of the kex
2020 Mar 24
4
ZSTD compression support for OpenSSH
I hacked zstd support into OpenSSH a while ago and just started to clean
it up in the recent days. The cleanup includes configuration support
among other things that I did not have.
During testing I noticed the following differences compared to zlib:
- highly interactive shell output (as in refreshed at a _very_ high
rate) may result in higher bandwidth compared to zlib. Since zstd is
quicker
2020 Sep 05
8
[PATCH 0/5] ZSTD compression support for OpenSSH
I added ZSTD support to OpenSSH roughly over a year and I've been
playing with it ever since.
The nice part is that ZSTD achieves reasonable compression (like zlib)
but consumes little CPU so it is unlikely that compression becomes the
bottle neck of a transfer. The compression overhead (CPU) is negligible
even when uncompressed data is tunneled over the SSH connection (SOCKS
proxy, port
2017 Mar 02
61
[Bug 2687] New: Coverity scan fixes
https://bugzilla.mindrot.org/show_bug.cgi?id=2687
Bug ID: 2687
Summary: Coverity scan fixes
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee: unassigned-bugs at mindrot.org