I am running a fresh install of Red Hat 6.0 and ssh-2.0.13 (kernel
2.2.5-15).


The compile (egcs-2.91.66) works fine.  Running ssh2 in stand alone
works fine, but if you call it out of inetd:

ssh    stream  tcp     nowait  root    /usr/local/sbin/sshd  /usr/local/sbin/sshd -i

This works fine however (1.2.27)
ssh    stream  tcp     nowait  root    /usr/local/sbin/sshd1  /usr/local/sbin/sshd1 -i



Doing an ssh2 into the box fails with a "packet too long error":

ssh2 -v fett.noc.dti.net
[...]
rfrancis's password: 
debug: Ssh2Common/sshcommon.c:155/ssh_common_special: special packet
received from connection protocol: 6
debug: Ssh2/ssh2.c:304/client_authenticated: client_authenticated
debug: Ssh2Common/sshcommon.c:466/ssh_common_new_channel: num_channels
now 1
debug: Requesting X11 forwarding with authentication spoofing.
debug: Failed to get local xauth data.
debug: Ssh2Common/sshcommon.c:122/ssh_common_disconnect: DISCONNECT
received: Protocol error: packet too long: -1085391354.
debug: client_disconnect: Protocol error: packet too long:
-1085391354.
Disconnected; protocol error (Protocol error: packet too long:
-1085391354.).
debug: Ssh2Common/sshcommon.c:447/ssh_common_destroy_channel:
num_channels now 0
debug: session_close
debug: destroying client struct...
debug: uninitializing event loop


It works fine running in stand alone mode, only fails from inetd.  I
see no other reports of this anywhere, but it seems like something
many people would experience.  I build a 6.0 machine from scratch just
to be sure it wasn't something funky.  

Any thoughts appreciated,


-rob
[EMAIL PROTECTED]




Reply via email to