On Mon, May 15, 2017 at 7:24 AM, Алексей Болдырев < devel-net-ne-vlezay80@xxxxxxxxx> wrote: > root@ne-vlezay80:~# tcpdump -i tap0 -n > You will likely need to supply some more information before anyone can even offer any suggestions. This includes: - what version of OpenSSH are the client and server? - what platforms are they running on? which addresses in the dump correspond to which? - how big the packet was before it was tunnelled? was it fragmented? - what does the debug logging "ssh -vvv and sshd -ddd" say when this occurs? -- Darren Tucker (dtucker at zip.com.au) GPG key 11EAA6FA / A86E 3E07 5B19 5880 E860 37F4 9357 ECEF 11EA A6FA (new) Good judgement comes with experience. Unfortunately, the experience usually comes from bad judgement. _______________________________________________ openssh-unix-dev mailing list openssh-unix-dev@xxxxxxxxxxx https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev