similar to: "Bad packet length 1231976033"

Displaying 20 results from an estimated 200 matches similar to: ""Bad packet length 1231976033""

2023 Apr 09
2
"Bad packet length 1231976033"
On 09/04/2023 02:20, Philip Prindeville wrote: > What's odd is that the length is*always* 1231976033 (which is 0x496E7661 or "Inva" in ASCII). Could you get a tcpdump when this happens? Then maybe more of the error can be captured. I grepped for Inva in the source code. There are lots of error messages which start with this which are sent with error() or fatal() or
2023 Apr 23
1
"Bad packet length 1231976033"
Sorry about taking so long to get back to you. The problem is sporadic and I've had other fires to put out first... Here's a PCAP of authentication failures: https://www.redfish-solutions.com/misc/kvm1.pcap > On Apr 9, 2023, at 1:21 AM, Brian Candler <b.candler at pobox.com> wrote: > > On 09/04/2023 02:20, Philip Prindeville wrote: >> What's odd is that the
2023 Apr 10
2
"Bad packet length 1231976033"
On Mon, 10 Apr 2023 at 07:07, Peter Stuge <peter at stuge.se> wrote: > > Brian Candler wrote: > > > What's odd is that the length is *always* 1231976033 (which is > > > 0x496E7661 or "Inva" in ASCII). One thing that can cause this is if the libc writes to stderr (ie fd 2) on some classes of error. This is something libc should probably not do, since
2023 Apr 09
1
"Bad packet length 1231976033"
Brian Candler wrote: > > What's odd is that the length is *always* 1231976033 (which is > > 0x496E7661 or "Inva" in ASCII). > > Could you get a tcpdump when this happens? Or debug output from at least the client (run ssh with -vvv) or preferably the server (run sshd with -ddd). //Peter
2023 Apr 24
1
"Bad packet length 1231976033"
> On Apr 10, 2023, at 7:24 AM, Darren Tucker <dtucker at dtucker.net> wrote: > > On Mon, 10 Apr 2023 at 07:07, Peter Stuge <peter at stuge.se> wrote: >> >> Brian Candler wrote: >>>> What's odd is that the length is *always* 1231976033 (which is >>>> 0x496E7661 or "Inva" in ASCII). > > One thing that can cause this is
2023 Apr 24
1
"Bad packet length 1231976033"
> On Apr 10, 2023, at 7:24 AM, Darren Tucker <dtucker at dtucker.net> wrote: > > On Mon, 10 Apr 2023 at 07:07, Peter Stuge <peter at stuge.se> wrote: >> >> Brian Candler wrote: >>>> What's odd is that the length is *always* 1231976033 (which is >>>> 0x496E7661 or "Inva" in ASCII). > > One thing that can cause this is
2005 Oct 18
1
Error while using sdt interrupt-complete.
Has anyone seen the following error before? "error on enabled probe ID 2 (ID 473: sdt:unix:av_dispatch_autovect:interrupt-complete): invalid address (0x198) in action #3 at DIF offset 20" I''m trying to capture interrupt times as inlined in the below script. The script gives me some output after the errors, and I''m trying to understand if the errors are affecting
2005 Feb 28
3
Digium Card Problems
Hi all i need urgent help our entire switchboard is down only 5 days after it came up. this is the second time this has happened and i am thinking that asterisk is not worth the trouble it gives. mostly it runs without hassle. but around 2 weeks ago during the test phase we rebooted the machine and did the normal modprobes and this error popped up. coming back to work after the weekend the
2008 Feb 09
1
Problems connecting with SSH2
Hello, I've been using OpenSSH 3.6.1p2 for quite some time at work. We have a firewall, and I had no problems connecting to external machines. Today my machine was updated to version 4.1p1 and it has a problem. When I try to make an SSH2 connection to an external machine, everything seems to work right up to the very end: debug1: Authentication succeeded (publickey) debug1: channel
2020 Mar 24
4
ZSTD compression support for OpenSSH
I hacked zstd support into OpenSSH a while ago and just started to clean it up in the recent days. The cleanup includes configuration support among other things that I did not have. During testing I noticed the following differences compared to zlib: - highly interactive shell output (as in refreshed at a _very_ high rate) may result in higher bandwidth compared to zlib. Since zstd is quicker
2013 Sep 12
0
SIP over WSS connection : mask error
Hi, I use chrome and sipml5 to connect to asterisk webrtc interface using TLS. The wss connection seems ok and the SIP REGISTER sent from chrome to asterisk and the SIP response received. In the response, I get a "failed: A server must not mask any frames that it sends to the client" error msg and chrome terminates the ws connection. I've checked the asterisk debug logs, and the
2023 Jan 17
6
[Bug 3523] New: standard output file descriptor was set with: O_NONBLOCK, but restore with flag: 0
https://bugzilla.mindrot.org/show_bug.cgi?id=3523 Bug ID: 3523 Summary: standard output file descriptor was set with: O_NONBLOCK, but restore with flag: 0 Product: Portable OpenSSH Version: 9.1p1 Hardware: Other OS: Linux Status: NEW Severity: normal Priority: P5
2020 Sep 05
8
[PATCH 0/5] ZSTD compression support for OpenSSH
I added ZSTD support to OpenSSH roughly over a year and I've been playing with it ever since. The nice part is that ZSTD achieves reasonable compression (like zlib) but consumes little CPU so it is unlikely that compression becomes the bottle neck of a transfer. The compression overhead (CPU) is negligible even when uncompressed data is tunneled over the SSH connection (SOCKS proxy, port
2023 Apr 25
1
"Bad packet length 1231976033"
On Tue, 25 Apr 2023 at 03:36, Philip Prindeville <philipp_subx at redfish-solutions.com> wrote: > > On Apr 10, 2023, at 7:24 AM, Darren Tucker <dtucker at dtucker.net> wrote: [...] > > Since you're using 9.1, the message could be an "Invalid free", since > > there was a double-free bug in that release :-( > > Forgot to ask: does this bug manifest
2023 Jan 23
7
[Bug 3527] New: ssh-copy-id broken for dropbear
https://bugzilla.mindrot.org/show_bug.cgi?id=3527 Bug ID: 3527 Summary: ssh-copy-id broken for dropbear Product: Portable OpenSSH Version: 9.1p1 Hardware: Other OS: Linux Status: NEW Severity: major Priority: P5 Component: ssh-copy-id Assignee: unassigned-bugs at mindrot.org
2024 Sep 06
8
[Bug 3729] New: the new sshd does not work under the supervision of inetd
https://bugzilla.mindrot.org/show_bug.cgi?id=3729 Bug ID: 3729 Summary: the new sshd does not work under the supervision of inetd Product: Portable OpenSSH Version: 9.8p1 Hardware: ARM OS: Linux Status: NEW Severity: major Priority: P5 Component: sshd
2023 Feb 24
1
[PATCH 0/1] ZSTD compression support for OpenSSH
I added ZSTD support to OpenSSH roughly three years ago and I've been playing with it ever since. The nice part is that ZSTD achieves reasonable compression (like zlib) but consumes little CPU so it is unlikely that compression becomes the bottle neck of a transfer. The compression overhead (CPU) is negligible even when uncompressed data is tunneled over the SSH connection (SOCKS proxy, port
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string client_version_string. These are used just in a few functions and can easily be passed as parameters. Also, there is a strange construct, where their memory is allocated to the global pointers, then copies of these pointers are assigned to the kex structure. The kex_free finally frees them via cleanup of the kex
2023 Feb 24
1
[PATCH 1/1] Add support for ZSTD compression
From: Sebastian Andrzej Siewior <sebastian at breakpoint.cc> The "zstd at breakpoint.cc" compression algorithm enables ZSTD based compression as defined in RFC8478. The compression is delayed until the server sends the SSH_MSG_USERAUTH_SUCCESS which is the same time as with the "zlib at openssh.com" method. Signed-off-by: Sebastian Andrzej Siewior <sebastian at
2015 Jan 27
0
[Bug 1213] ssh-keyscan exits in mid-way
https://bugzilla.mindrot.org/show_bug.cgi?id=1213 --- Comment #50 from Daniel Richard G. <skunk at iSKUNK.ORG> --- Okay, tried again with your patch. Here's what I see: [...] # A.B.C.46 SSH-1.99-OpenSSH_4.2 # A.B.C.47 SSH-1.99-OpenSSH_4.2 # A.B.C.47 SSH-1.99-OpenSSH_4.2 # A.B.C.47 SSH-1.99-OpenSSH_4.2 # A.B.C.48 SSH-1.99-OpenSSH_4.2 # A.B.C.48