Differences between version 9 and predecessor to the previous major change of SSHErrors.
Other diffs: Previous Revision, Previous Author, or view the Annotated Edit History
Newer page: | version 9 | Last edited on Friday, August 20, 2004 5:43:55 am | by AristotlePagaltzis | Revert |
Older page: | version 8 | Last edited on Thursday, August 19, 2004 10:17:50 pm | by StefanKuklik | Revert |
@@ -7,9 +7,9 @@
If you are getting an error message along the lines of <tt>ssh_exchange_identification: Connection closed by remote host</tt> it normally means the ssh connection was established, but closed before anything could happen. This probably means [TCP] Wrappers was configured at the server end to drop connections for some reason - perhaps paranoid lookups. You can fix it by either getting your IP to resolve - both forward and reverse - correctly, removing the PARANOID line in <tt>/etc/hosts.deny</tt>, or adding <tt>sshd sshd1 sshd2 : ALL : ALLOW</tt> to <tt>/etc/hosts.allow</tt>.
!!! Commands complain about corruption when piping data via [SSH] / [SCP] errors
-[SSH] always launches a login shell on the remote end. Such a shell always source your <tt>.profile</tt> (and/or <tt>.bash_profile</tt>, <tt>.bashrc</tt> etc). Anything printed in the course of its execution (invoking fortune(6) is a common offense) will end up in your data stream and end up throwing a monkey wrench in, say, tar(1)'s or even scp(1)'s gears. You can work around this by checking whether <tt>$TERM</tt> is set to <tt>dumb</tt>. Putting something along these lines at the top of the script(s) will :
+[SSH] always launches a login shell on the remote end. Such a shell always source your <tt>.profile</tt> (and/or <tt>.bash_profile</tt>, <tt>.bashrc</tt> etc). Anything printed in the course of its execution (invoking fortune(6) is a common offense) will end up in your data stream and end up throwing a monkey wrench in, say, tar(1)'s or even scp(1)'s gears. You can work around this by checking whether <tt>$TERM</tt> is set to <tt>dumb</tt>. Putting something along these lines at the top of the script(s) will:
<verbatim>
[ "$TERM" = 'dumb' ] && return
</verbatim>
@@ -45,18 +45,10 @@
!!! <tt>Disconnecting: bad packet length 1349676916.</tt>
There was a protocol error, normally due to conflicting versions of ssh on the two machines. You might get this on a machine running [Slackware] version 7 (where OpenSSH-1.2 only supports [SSH] protocol 1.5) when trying to [SSH] to a machine running [Slackware] 8 (with OpenSSH-3.4 and only using [SSH] protocol 2).
-To
solve this problem, you may
either install
a ssh client which supports
[SSH] protocol 2 on the source machine, or change
the configuration of the ssh
server on the destination machine.
+You can
solve this problem by
either installing
a [SSH] client which supports
protocol version
2 on the source machine (strongly recommended)
, or by changing
the configuration of the [SSH]
server on the destination machine. Note that protocol versions 1.x are deprecated because they're vulnerable. You should really upgrade the client instead
.
-To
do the the latter, look
for a file named sshd_config
, usually in /etc/ssh
. Change
the line:
-
-
Protocol 2
-
-
to
-
-
Protocol 2,1
-
-After restarting
the ssh-
server you may logon using clients with [SSH] protocol 1 as well
.
+If you cannot
do that
for whatever reason
, you have to permit clients to use a 1
.x protocol in sessions with
the server by changing the directive <tt>
Protocol 2</tt>
to <tt>
Protocol 2,1</tt> in
the server's <tt>/etc/ssh/sshd_config</tt>. Don't forget to restart the daemon
.
----
Part of CategorySecurity and CategoryNetworking