Displaying 20 results from an estimated 200 matches similar to: ""Bad packet length 1231976033""
2023 Apr 09
2
"Bad packet length 1231976033"
On 09/04/2023 02:20, Philip Prindeville wrote:
> What's odd is that the length is*always* 1231976033 (which is 0x496E7661 or "Inva" in ASCII).
Could you get a tcpdump when this happens? Then maybe more of the error
can be captured.
I grepped for Inva in the source code. There are lots of error messages
which start with this which are sent with error() or fatal() or
2023 Apr 23
1
"Bad packet length 1231976033"
Sorry about taking so long to get back to you. The problem is sporadic and I've had other fires to put out first...
Here's a PCAP of authentication failures:
https://www.redfish-solutions.com/misc/kvm1.pcap
> On Apr 9, 2023, at 1:21 AM, Brian Candler <b.candler at pobox.com> wrote:
>
> On 09/04/2023 02:20, Philip Prindeville wrote:
>> What's odd is that the
2023 Apr 10
2
"Bad packet length 1231976033"
On Mon, 10 Apr 2023 at 07:07, Peter Stuge <peter at stuge.se> wrote:
>
> Brian Candler wrote:
> > > What's odd is that the length is *always* 1231976033 (which is
> > > 0x496E7661 or "Inva" in ASCII).
One thing that can cause this is if the libc writes to stderr (ie fd
2) on some classes of error. This is something libc should probably
not do, since
2023 Apr 09
1
"Bad packet length 1231976033"
Brian Candler wrote:
> > What's odd is that the length is *always* 1231976033 (which is
> > 0x496E7661 or "Inva" in ASCII).
>
> Could you get a tcpdump when this happens?
Or debug output from at least the client (run ssh with -vvv) or
preferably the server (run sshd with -ddd).
//Peter
2023 Apr 24
1
"Bad packet length 1231976033"
> On Apr 10, 2023, at 7:24 AM, Darren Tucker <dtucker at dtucker.net> wrote:
>
> On Mon, 10 Apr 2023 at 07:07, Peter Stuge <peter at stuge.se> wrote:
>>
>> Brian Candler wrote:
>>>> What's odd is that the length is *always* 1231976033 (which is
>>>> 0x496E7661 or "Inva" in ASCII).
>
> One thing that can cause this is
2023 Apr 24
1
"Bad packet length 1231976033"
> On Apr 10, 2023, at 7:24 AM, Darren Tucker <dtucker at dtucker.net> wrote:
>
> On Mon, 10 Apr 2023 at 07:07, Peter Stuge <peter at stuge.se> wrote:
>>
>> Brian Candler wrote:
>>>> What's odd is that the length is *always* 1231976033 (which is
>>>> 0x496E7661 or "Inva" in ASCII).
>
> One thing that can cause this is
2005 Oct 18
1
Error while using sdt interrupt-complete.
Has anyone seen the following error before?
"error on enabled probe ID 2 (ID 473:
sdt:unix:av_dispatch_autovect:interrupt-complete): invalid address
(0x198) in action #3 at DIF offset 20"
I''m trying to capture interrupt times as inlined in the below script.
The script gives me some output after the errors, and I''m trying to
understand if the errors are affecting
2005 Feb 28
3
Digium Card Problems
Hi all
i need urgent help our entire switchboard is down only 5 days after it came
up.
this is the second time this has happened and i am thinking that asterisk is
not worth the trouble it gives.
mostly it runs without hassle. but around 2 weeks ago during the test phase
we rebooted the machine and
did the normal modprobes and this error popped up.
coming back to work after the weekend the
2008 Feb 09
1
Problems connecting with SSH2
Hello,
I've been using OpenSSH 3.6.1p2 for quite some time at work. We have a
firewall, and I had no problems connecting to external machines.
Today my machine was updated to version 4.1p1 and it has a problem.
When I try to make an SSH2 connection to an external machine,
everything seems to work right up to the very end:
debug1: Authentication succeeded (publickey)
debug1: channel
2020 Mar 24
4
ZSTD compression support for OpenSSH
I hacked zstd support into OpenSSH a while ago and just started to clean
it up in the recent days. The cleanup includes configuration support
among other things that I did not have.
During testing I noticed the following differences compared to zlib:
- highly interactive shell output (as in refreshed at a _very_ high
rate) may result in higher bandwidth compared to zlib. Since zstd is
quicker
2013 Sep 12
0
SIP over WSS connection : mask error
Hi,
I use chrome and sipml5 to connect to asterisk webrtc interface using TLS.
The wss connection seems ok and the SIP REGISTER sent from chrome to
asterisk and the SIP response received.
In the response, I get a "failed: A server must not mask any frames that it
sends to the client" error msg and chrome terminates the ws connection.
I've checked the asterisk debug logs, and the
2023 Jan 17
6
[Bug 3523] New: standard output file descriptor was set with: O_NONBLOCK, but restore with flag: 0
https://bugzilla.mindrot.org/show_bug.cgi?id=3523
Bug ID: 3523
Summary: standard output file descriptor was set with:
O_NONBLOCK, but restore with flag: 0
Product: Portable OpenSSH
Version: 9.1p1
Hardware: Other
OS: Linux
Status: NEW
Severity: normal
Priority: P5
2020 Sep 05
8
[PATCH 0/5] ZSTD compression support for OpenSSH
I added ZSTD support to OpenSSH roughly over a year and I've been
playing with it ever since.
The nice part is that ZSTD achieves reasonable compression (like zlib)
but consumes little CPU so it is unlikely that compression becomes the
bottle neck of a transfer. The compression overhead (CPU) is negligible
even when uncompressed data is tunneled over the SSH connection (SOCKS
proxy, port
2023 Apr 25
1
"Bad packet length 1231976033"
On Tue, 25 Apr 2023 at 03:36, Philip Prindeville
<philipp_subx at redfish-solutions.com> wrote:
> > On Apr 10, 2023, at 7:24 AM, Darren Tucker <dtucker at dtucker.net> wrote:
[...]
> > Since you're using 9.1, the message could be an "Invalid free", since
> > there was a double-free bug in that release :-(
>
> Forgot to ask: does this bug manifest
2023 Jan 23
7
[Bug 3527] New: ssh-copy-id broken for dropbear
https://bugzilla.mindrot.org/show_bug.cgi?id=3527
Bug ID: 3527
Summary: ssh-copy-id broken for dropbear
Product: Portable OpenSSH
Version: 9.1p1
Hardware: Other
OS: Linux
Status: NEW
Severity: major
Priority: P5
Component: ssh-copy-id
Assignee: unassigned-bugs at mindrot.org
2024 Sep 06
8
[Bug 3729] New: the new sshd does not work under the supervision of inetd
https://bugzilla.mindrot.org/show_bug.cgi?id=3729
Bug ID: 3729
Summary: the new sshd does not work under the supervision of
inetd
Product: Portable OpenSSH
Version: 9.8p1
Hardware: ARM
OS: Linux
Status: NEW
Severity: major
Priority: P5
Component: sshd
2023 Feb 24
1
[PATCH 0/1] ZSTD compression support for OpenSSH
I added ZSTD support to OpenSSH roughly three years ago and I've been
playing with it ever since.
The nice part is that ZSTD achieves reasonable compression (like zlib)
but consumes little CPU so it is unlikely that compression becomes the
bottle neck of a transfer. The compression overhead (CPU) is negligible
even when uncompressed data is tunneled over the SSH connection (SOCKS
proxy, port
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string
client_version_string.
These are used just in a few functions and can easily be passed as
parameters.
Also, there is a strange construct, where their memory is allocated to
the global pointers, then copies of these pointers are assigned to the
kex structure. The kex_free finally frees them via cleanup of the kex
2023 Feb 24
1
[PATCH 1/1] Add support for ZSTD compression
From: Sebastian Andrzej Siewior <sebastian at breakpoint.cc>
The "zstd at breakpoint.cc" compression algorithm enables ZSTD based
compression as defined in RFC8478. The compression is delayed until the
server sends the SSH_MSG_USERAUTH_SUCCESS which is the same time as with
the "zlib at openssh.com" method.
Signed-off-by: Sebastian Andrzej Siewior <sebastian at
2015 Jan 27
0
[Bug 1213] ssh-keyscan exits in mid-way
https://bugzilla.mindrot.org/show_bug.cgi?id=1213
--- Comment #50 from Daniel Richard G. <skunk at iSKUNK.ORG> ---
Okay, tried again with your patch. Here's what I see:
[...]
# A.B.C.46 SSH-1.99-OpenSSH_4.2
# A.B.C.47 SSH-1.99-OpenSSH_4.2
# A.B.C.47 SSH-1.99-OpenSSH_4.2
# A.B.C.47 SSH-1.99-OpenSSH_4.2
# A.B.C.48 SSH-1.99-OpenSSH_4.2
# A.B.C.48