Re: Disconnecting: Bad packet length

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Jeff,

I have had also faced the same problem, but it was resolved when my
team cross examined the new server certificate file for compatibility,
there was a change in certificate/ key size. I think you can take up
this problem as a bug.

Also I have found on mutiple  OpenVPN forum that people have found
work around for this compatibility issue by creating a script asking
the server to ignore the Bad Packet Length error.

Ref: https://launchpad.net/ubuntu/gutsy/+source/logcheck/1.2.55
       http://lists.mindrot.org/pipermail/openssh-unix-dev/2007-September.txt

I hope it helps

On Thu, Jan 8, 2009 at 11:37 AM, Jeff Blaine <jblaine@xxxxxxxxxxxx> wrote:
> Server: OpenSSH 5.1p1
> Client: OpenSSH 4.3p2
>
> Works fine when server is OpenSSH 4.4p1 instead (our old
> instance we're trying to upgrade to 5.1p1)
>
> Any ideas?  Adding '-2' to the ssh command line buys me
> nothing.
>
> % /usr/local/bin/ssh -v -v -v -p 6000 sshserver
> OpenSSH_4.3p2, OpenSSL 0.9.8d 28 Sep 2006
> debug1: Reading configuration data /usr/local/etc/ssh_config
> debug2: ssh_connect: needpriv 0
> debug1: Connecting to sshserver [XX.YY.10.1] port 6000.
> debug1: Connection established.
> debug1: identity file /home/jblaine/.ssh/identity type -1
> debug1: identity file /home/jblaine/.ssh/id_rsa type -1
> debug1: identity file /home/jblaine/.ssh/id_dsa type -1
> debug1: Remote protocol version 2.0, remote software version OpenSSH_5.1
> debug1: match: OpenSSH_5.1 pat OpenSSH*
> debug1: Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_4.3
> debug2: fd 4 setting O_NONBLOCK
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug2: kex_parse_kexinit:
> diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit:
> aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@xxxxxxxxxxxxxx,aes128-ctr,aes192-ctr,aes256-ctr
> debug2: kex_parse_kexinit:
> aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@xxxxxxxxxxxxxx,aes128-ctr,aes192-ctr,aes256-ctr
> debug2: kex_parse_kexinit:
> hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit:
> hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx,zlib
> debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx,zlib
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: kex_parse_kexinit:
> diffie-hellman-group-exchange-sha256,diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit: ssh-rsa,ssh-dss
> debug2: kex_parse_kexinit:
> aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@xxxxxxxxxxxxxx,aes128-ctr,aes192-ctr,aes256-ctr
> debug2: kex_parse_kexinit:
> aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@xxxxxxxxxxxxxx,aes128-ctr,aes192-ctr,aes256-ctr
> debug2: kex_parse_kexinit:
> hmac-md5,hmac-sha1,umac-64@xxxxxxxxxxx,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit:
> hmac-md5,hmac-sha1,umac-64@xxxxxxxxxxx,hmac-ripemd160,hmac-ripemd160@xxxxxxxxxxx,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx
> debug2: kex_parse_kexinit: none,zlib@xxxxxxxxxxx
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: mac_init: found hmac-md5
> debug1: kex: server->client aes128-cbc hmac-md5 none
> debug2: mac_init: found hmac-md5
> debug1: kex: client->server aes128-cbc hmac-md5 none
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
> debug2: dh_gen_key: priv key bits set: 113/256
> debug2: bits set: 525/1024
> debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
> debug3: check_host_in_hostfile: filename /home/jblaine/.ssh/known_hosts
> debug3: check_host_in_hostfile: filename /usr/local/etc/ssh_known_hosts
> debug3: check_host_in_hostfile: filename /home/jblaine/.ssh/known_hosts
> debug3: check_host_in_hostfile: filename /usr/local/etc/ssh_known_hosts
> debug3: check_host_in_hostfile: filename /home/jblaine/.ssh/known_hosts
> debug3: check_host_in_hostfile: filename /usr/local/etc/ssh_known_hosts
> debug2: no key of type 0 for host sshserver
> debug3: check_host_in_hostfile: filename /home/jblaine/.ssh/known_hosts2
> debug3: check_host_in_hostfile: filename /usr/local/etc/ssh_known_hosts2
> debug3: check_host_in_hostfile: filename /home/jblaine/.ssh/known_hosts
> debug3: check_host_in_hostfile: filename /usr/local/etc/ssh_known_hosts
> debug2: no key of type 2 for host sshserver
> The authenticity of host 'sshserver (XX.YY.10.1)' can't be established.
> RSA key fingerprint is 88:b0:14:81:c9:86:4f:a5:a8:96:87:f3:24:df:0c:8b.
> Are you sure you want to continue connecting (yes/no)? yes
> Warning: Permanently added 'sshserver,XX.YY.10.1' (RSA) to the list of
> known hosts.
> debug2: bits set: 519/1024
> debug1: ssh_rsa_verify: signature correct
> debug2: kex_derive_keys
> debug2: set_newkeys: mode 1
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: expecting SSH2_MSG_NEWKEYS
> debug2: set_newkeys: mode 0
> debug1: SSH2_MSG_NEWKEYS received
> debug1: SSH2_MSG_SERVICE_REQUEST sent
> Disconnecting: Bad packet length 3346013531.
>
> bash-2.05# /custom/openssh-5.1p1/sbin/sshd -p 6000 -d
> debug1: sshd version OpenSSH_5.1p1
> debug1: read PEM private key done: type RSA
> debug1: private host key: #0 type 1 RSA
> debug1: read PEM private key done: type DSA
> debug1: private host key: #1 type 2 DSA
> debug1: rexec_argv[0]='/linus/openssh-5.1p1/sbin/sshd'
> debug1: rexec_argv[1]='-p'
> debug1: rexec_argv[2]='6000'
> debug1: rexec_argv[3]='-d'
> debug1: Bind to port 6000 on ::.
> Server listening on :: port 6000.
> debug1: Bind to port 6000 on 0.0.0.0.
> Server listening on 0.0.0.0 port 6000.
> debug1: fd 6 clearing O_NONBLOCK
> debug1: Server will not fork when running in debugging mode.
> debug1: rexec start in 6 out 6 newsock 6 pipe -1 sock 11
> debug1: inetd sockets after dupping: 4, 4
> Connection from XX.YY.10.14 port 51518
> debug1: Client protocol version 2.0; client software version OpenSSH_4.3
> debug1: match: OpenSSH_4.3 pat OpenSSH*
> debug1: Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_5.1
> debug1: permanently_set_uid: 27/65000
> debug1: list_hostkey_types: ssh-rsa,ssh-dss
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug1: kex: client->server aes128-cbc hmac-md5 none
> debug1: kex: server->client aes128-cbc hmac-md5 none
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received
> debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
> debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
> debug1: SSH2_MSG_NEWKEYS sent
> debug1: expecting SSH2_MSG_NEWKEYS
> debug1: SSH2_MSG_NEWKEYS received
> debug1: KEX done
> Disconnecting: Bad packet length 2596886957.
> debug1: do_cleanup
> debug1: do_cleanup
> bash-2.05#
>
>



-- 
Regards

Vivek P Nair
VP Technology
Appin Software Security Private Limited

 | vivekp@xxxxxxxxxxxxxxx | vivek.p@xxxxxxxxxxxxx | 09999668010  |
d3adbra1n.wordpress.com |

Three ways to gain Success

1. know more than others
2. work more than others
3. expect less than others

[Index of Archives]     [Open SSH Unix Development]     [Fedora Users]     [Fedora Desktop]     [Yosemite Backpacking]     [KDE Users]     [Gnome Users]

  Powered by Linux