[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#613649: marked as done (openssh-client: After upgrading to 1:5.8p1-2 ssh fails to connect to some servers)



Your message dated Tue, 4 Oct 2022 17:17:57 -0700
with message-id <b7a2354e-750a-cac0-89a4-357d1f83b5e5@lackof.org>
and subject line RE: Connecting to older ssh version has cipher negotiation problem
has caused the Debian Bug report #612607,
regarding openssh-client: After upgrading to 1:5.8p1-2 ssh fails to connect to some servers
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
612607: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=612607
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: openssh-client
Version: 1:5.8p1-2
Severity: grave
Tags: sid
Justification: renders package unusable


After upgrade to 1:5.8p1-2 ssh fails to connect to some servers.
Last messages shown in -vvvv mode :
debug3: order_hostkeyalgs: prefer hostkeyalgs: ssh-rsa-cert-v01@openssh.com,ssh-rsa-cert-v00@openssh.com,ssh-rsa
debug1: SSH2_MSG_KEXINIT sent
Read from socket failed: Connection reset by peer

Unfortunately I have no root access to the remote server and cannot see the remote logs

Downgrading to 1:5.5p1-6 resolves the problem.


-- System Information:
Debian Release: wheezy/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages openssh-client depends on:
ii  adduser              3.112+nmu2          add and remove users and groups
ii  debconf [debconf-2.0 1.5.38              Debian configuration management sy
ii  dpkg                 1.15.8.10           Debian package management system
ii  libc6                2.11.2-11           Embedded GNU C Library: Shared lib
ii  libedit2             2.11-20080614-2     BSD editline and history libraries
ii  libgssapi-krb5-2     1.8.3+dfsg-4        MIT Kerberos runtime libraries - k
ii  libselinux1          2.0.96-1            SELinux runtime shared libraries
ii  libssl0.9.8          0.9.8o-5            SSL shared libraries
ii  passwd               1:4.1.4.2+svn3283-3 change and administer password and
ii  zlib1g               1:1.2.3.4.dfsg-3    compression library - runtime

Versions of packages openssh-client recommends:
ii  openssh-blacklist             0.4.1      list of default blacklisted OpenSS
pn  openssh-blacklist-extra       <none>     (no description available)
ii  xauth                         1:1.0.5-1  X authentication utility

Versions of packages openssh-client suggests:
pn  keychain                      <none>     (no description available)
pn  libpam-ssh                    <none>     (no description available)
pn  ssh-askpass                   <none>     (no description available)

-- debconf-show failed



--- End Message ---
--- Begin Message --- This bug report is 11 years old now and for a very old version of openssh. Also the original reporter appears to be connecting to a remote server with version string "OpenSSH_4.3p2-hpn" which appears to be some HP-UX version. Other reports don't provide enough info to be sure they are related and the linked Ubuntu bug is totally crazy with unrelated stuff.

Closing this, if you are reading this because some internet search for a problem you are having brought you here, feel free to file a new bug if A) you are using Debian, B) you have tested with a current version, and C) you provide plenty of details. :)

--
Matt Taggart
matt@lackof.org

--- End Message ---

Reply to: