I am running a fresh install of Red Hat 6.0 and ssh-2.0.13 (kernel 2.2.5-15). The compile (egcs-2.91.66) works fine. Running ssh2 in stand alone works fine, but if you call it out of inetd: ssh stream tcp nowait root /usr/local/sbin/sshd /usr/local/sbin/sshd -i This works fine however (1.2.27) ssh stream tcp nowait root /usr/local/sbin/sshd1 /usr/local/sbin/sshd1 -i Doing an ssh2 into the box fails with a "packet too long error": ssh2 -v fett.noc.dti.net [...] rfrancis's password: debug: Ssh2Common/sshcommon.c:155/ssh_common_special: special packet received from connection protocol: 6 debug: Ssh2/ssh2.c:304/client_authenticated: client_authenticated debug: Ssh2Common/sshcommon.c:466/ssh_common_new_channel: num_channels now 1 debug: Requesting X11 forwarding with authentication spoofing. debug: Failed to get local xauth data. debug: Ssh2Common/sshcommon.c:122/ssh_common_disconnect: DISCONNECT received: Protocol error: packet too long: -1085391354. debug: client_disconnect: Protocol error: packet too long: -1085391354. Disconnected; protocol error (Protocol error: packet too long: -1085391354.). debug: Ssh2Common/sshcommon.c:447/ssh_common_destroy_channel: num_channels now 0 debug: session_close debug: destroying client struct... debug: uninitializing event loop It works fine running in stand alone mode, only fails from inetd. I see no other reports of this anywhere, but it seems like something many people would experience. I build a 6.0 machine from scratch just to be sure it wasn't something funky. Any thoughts appreciated, -rob [EMAIL PROTECTED]
