[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: ssh corrupt packets with aes encryption



On Mon, 13 May 2013 13:05:41 -0600
Joe Pfeiffer <pfeiffer@cs.nmsu.edu> wrote:

> recoverym4n@gmail.com writes:
> >
> > Can you provide a result of
> > tcpdump -nn -s0 -i lo tcp port 22
> > ?
> 
> I don't have any experience with tcpdump, so I'm just blindly following
> instructions here -- let me know if you need more!
> 

Ok, good. I need three more things:

1) File /tmp/1.cap from: 
tcpdump -nn -s0 -i lo tcp port 22 -w /tmp/1.cap

Interrupt tcpdump with Ctrl+C once done with `ssh localhost` (I assume you've enabled aes back).

2) /var/log/kern.log, which should include info from last boot.
Any other kern.log.X will do, of course.

3) Output of /sbin/ifconfig -a


Reply to: