<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: sshd[27382]: fatal: Read from socket failed: Connection reset by peer () in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/sshd-27382-fatal-read-from-socket-failed-connection-reset-by/m-p/4439688#M37035</link>
    <description>is it safe to supress it? currently there is no impact on the server.</description>
    <pubDate>Tue, 16 Jun 2009 01:16:36 GMT</pubDate>
    <dc:creator>Mohd Rasidi Che Mat</dc:creator>
    <dc:date>2009-06-16T01:16:36Z</dc:date>
    <item>
      <title>sshd[27382]: fatal: Read from socket failed: Connection reset by peer ()</title>
      <link>https://community.hpe.com/t5/operating-system-linux/sshd-27382-fatal-read-from-socket-failed-connection-reset-by/m-p/4439685#M37032</link>
      <description>anybody can help with the error above?&lt;BR /&gt;the server is redhat 4</description>
      <pubDate>Mon, 15 Jun 2009 13:15:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/sshd-27382-fatal-read-from-socket-failed-connection-reset-by/m-p/4439685#M37032</guid>
      <dc:creator>Mohd Rasidi Che Mat</dc:creator>
      <dc:date>2009-06-15T13:15:44Z</dc:date>
    </item>
    <item>
      <title>Re: sshd[27382]: fatal: Read from socket failed: Connection reset by peer ()</title>
      <link>https://community.hpe.com/t5/operating-system-linux/sshd-27382-fatal-read-from-socket-failed-connection-reset-by/m-p/4439686#M37033</link>
      <description>Yout might post the output of ssh -vvv host. And you might also look at the logs on the host. That error is pretty generic.</description>
      <pubDate>Mon, 15 Jun 2009 16:01:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/sshd-27382-fatal-read-from-socket-failed-connection-reset-by/m-p/4439686#M37033</guid>
      <dc:creator>Court Campbell</dc:creator>
      <dc:date>2009-06-15T16:01:48Z</dc:date>
    </item>
    <item>
      <title>Re: sshd[27382]: fatal: Read from socket failed: Connection reset by peer ()</title>
      <link>https://community.hpe.com/t5/operating-system-linux/sshd-27382-fatal-read-from-socket-failed-connection-reset-by/m-p/4439687#M37034</link>
      <description>-bash-3.1$ ssh -vvv es-prod01&lt;BR /&gt;OpenSSH_4.3p2, OpenSSL 0.9.8b 04 May 2006&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: Applying options for *&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to es-prod01 [x.x.x.x] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: identity file /root/home/hpfmchem/.ssh/identity type -1&lt;BR /&gt;debug1: identity file /root/home/hpfmchem/.ssh/id_rsa type -1&lt;BR /&gt;debug1: identity file /root/home/hpfmchem/.ssh/id_dsa type -1&lt;BR /&gt;debug1: Remote protocol version 1.99, remote software version OpenSSH_3.9p1&lt;BR /&gt;debug1: match: OpenSSH_3.9p1 pat OpenSSH_3.*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_4.3&lt;BR /&gt;debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0 &lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0 &lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: &lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0 &lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0 &lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 139/256&lt;BR /&gt;debug2: bits set: 500/1024&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug3: check_host_in_hostfile: filename /root/home/hpfmchem/.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 1&lt;BR /&gt;debug3: check_host_in_hostfile: filename /root/home/hpfmchem/.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 1&lt;BR /&gt;debug1: Host 'es-prod01' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /root/home/hpfmchem/.ssh/known_hosts:1&lt;BR /&gt;debug2: bits set: 494/1024&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug2: key: /root/home/hpfmchem/.ssh/identity ((nil))&lt;BR /&gt;debug2: key: /root/home/hpfmchem/.ssh/id_rsa ((nil))&lt;BR /&gt;debug2: key: /root/home/hpfmchem/.ssh/id_dsa ((nil))&lt;BR /&gt;debug1: Authentications that can continue: publickey,gssapi-with-mic,password&lt;BR /&gt;debug3: start over, passed a different list publickey,gssapi-with-mic,password&lt;BR /&gt;debug3: preferred gssapi-with-mic,publickey,keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_lookup gssapi-with-mic&lt;BR /&gt;debug3: remaining preferred: publickey,keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled gssapi-with-mic&lt;BR /&gt;debug1: Next authentication method: gssapi-with-mic&lt;BR /&gt;debug3: Trying to reverse map address x.x.x.x.&lt;BR /&gt;debug1: Unspecified GSS failure.  Minor code may provide more information&lt;BR /&gt;Unknown code krb5 195&lt;BR /&gt;&lt;BR /&gt;debug1: Unspecified GSS failure.  Minor code may provide more information&lt;BR /&gt;Unknown code krb5 195&lt;BR /&gt;&lt;BR /&gt;debug1: Unspecified GSS failure.  Minor code may provide more information&lt;BR /&gt;Unknown code krb5 195&lt;BR /&gt;&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug3: authmethod_lookup publickey&lt;BR /&gt;debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;debug3: authmethod_is_enabled publickey&lt;BR /&gt;debug1: Next authentication method: publickey&lt;BR /&gt;debug1: Trying private key: /root/home/hpfmchem/.ssh/identity&lt;BR /&gt;debug3: no such identity: /root/home/hpfmchem/.ssh/identity&lt;BR /&gt;debug1: Trying private key: /root/home/hpfmchem/.ssh/id_rsa&lt;BR /&gt;debug3: no such identity: /root/home/hpfmchem/.ssh/id_rsa&lt;BR /&gt;debug1: Trying private key: /root/home/hpfmchem/.ssh/id_dsa&lt;BR /&gt;debug3: no such identity: /root/home/hpfmchem/.ssh/id_dsa&lt;BR /&gt;debug2: we did not send a packet, disable method&lt;BR /&gt;debug3: authmethod_lookup password&lt;BR /&gt;debug3: remaining preferred: ,password&lt;BR /&gt;debug3: authmethod_is_enabled password&lt;BR /&gt;debug1: Next authentication method: password&lt;BR /&gt;hpfmchem@es-prod01's password: &lt;BR /&gt;debug3: packet_send2: adding 48 (len 61 padlen 19 extra_pad 64)&lt;BR /&gt;debug2: we sent a password packet, wait for reply&lt;BR /&gt;debug1: Authentication succeeded (password).&lt;BR /&gt;debug1: channel 0: new [client-session]&lt;BR /&gt;debug3: ssh_session2_open: channel_new: 0&lt;BR /&gt;debug2: channel 0: send open&lt;BR /&gt;debug1: Entering interactive session.&lt;BR /&gt;debug2: callback start&lt;BR /&gt;debug2: client_session2_setup: id 0&lt;BR /&gt;debug2: channel 0: request pty-req confirm 0&lt;BR /&gt;debug3: tty_make_modes: ospeed 38400&lt;BR /&gt;debug3: tty_make_modes: ispeed 38400&lt;BR /&gt;debug3: tty_make_modes: 1 3&lt;BR /&gt;debug3: tty_make_modes: 2 28&lt;BR /&gt;debug3: tty_make_modes: 3 127&lt;BR /&gt;debug3: tty_make_modes: 4 21&lt;BR /&gt;debug3: tty_make_modes: 5 4&lt;BR /&gt;debug3: tty_make_modes: 6 0&lt;BR /&gt;debug3: tty_make_modes: 7 0&lt;BR /&gt;debug3: tty_make_modes: 8 17&lt;BR /&gt;debug3: tty_make_modes: 9 19&lt;BR /&gt;debug3: tty_make_modes: 10 26&lt;BR /&gt;debug3: tty_make_modes: 12 18&lt;BR /&gt;debug3: tty_make_modes: 13 23&lt;BR /&gt;debug3: tty_make_modes: 14 22&lt;BR /&gt;debug3: tty_make_modes: 18 15&lt;BR /&gt;debug3: tty_make_modes: 30 0&lt;BR /&gt;debug3: tty_make_modes: 31 0&lt;BR /&gt;debug3: tty_make_modes: 32 0&lt;BR /&gt;debug3: tty_make_modes: 33 0&lt;BR /&gt;debug3: tty_make_modes: 34 0&lt;BR /&gt;debug3: tty_make_modes: 35 0&lt;BR /&gt;debug3: tty_make_modes: 36 1&lt;BR /&gt;debug3: tty_make_modes: 37 0&lt;BR /&gt;debug3: tty_make_modes: 38 1&lt;BR /&gt;debug3: tty_make_modes: 39 0&lt;BR /&gt;debug3: tty_make_modes: 40 0&lt;BR /&gt;debug3: tty_make_modes: 41 0&lt;BR /&gt;debug3: tty_make_modes: 50 1&lt;BR /&gt;debug3: tty_make_modes: 51 1&lt;BR /&gt;debug3: tty_make_modes: 52 0&lt;BR /&gt;debug3: tty_make_modes: 53 1&lt;BR /&gt;debug3: tty_make_modes: 54 1&lt;BR /&gt;debug3: tty_make_modes: 55 1&lt;BR /&gt;debug3: tty_make_modes: 56 0&lt;BR /&gt;debug3: tty_make_modes: 57 0&lt;BR /&gt;debug3: tty_make_modes: 58 0&lt;BR /&gt;debug3: tty_make_modes: 59 1&lt;BR /&gt;debug3: tty_make_modes: 60 1&lt;BR /&gt;debug3: tty_make_modes: 61 1&lt;BR /&gt;debug3: tty_make_modes: 62 0&lt;BR /&gt;debug3: tty_make_modes: 70 1&lt;BR /&gt;debug3: tty_make_modes: 71 0&lt;BR /&gt;debug3: tty_make_modes: 72 1&lt;BR /&gt;debug3: tty_make_modes: 73 0&lt;BR /&gt;debug3: tty_make_modes: 74 0&lt;BR /&gt;debug3: tty_make_modes: 75 0&lt;BR /&gt;debug3: tty_make_modes: 90 1&lt;BR /&gt;debug3: tty_make_modes: 91 1&lt;BR /&gt;debug3: tty_make_modes: 92 0&lt;BR /&gt;debug3: tty_make_modes: 93 0&lt;BR /&gt;debug1: Sending environment.&lt;BR /&gt;debug3: Ignored env HOSTNAME&lt;BR /&gt;debug3: Ignored env TERM&lt;BR /&gt;debug3: Ignored env SHELL&lt;BR /&gt;debug3: Ignored env HISTSIZE&lt;BR /&gt;debug3: Ignored env NLS_LANG&lt;BR /&gt;debug3: Ignored env SSH_CLIENT&lt;BR /&gt;debug3: Ignored env SSH_TTY&lt;BR /&gt;debug3: Ignored env USER&lt;BR /&gt;debug3: Ignored env LS_COLORS&lt;BR /&gt;debug3: Ignored env SSH_AUTH_SOCK&lt;BR /&gt;debug3: Ignored env MAIL&lt;BR /&gt;debug3: Ignored env PATH&lt;BR /&gt;debug3: Ignored env INPUTRC&lt;BR /&gt;debug3: Ignored env PWD&lt;BR /&gt;debug1: Sending env LANG = en_US.UTF-8&lt;BR /&gt;debug2: channel 0: request env confirm 0&lt;BR /&gt;debug3: Ignored env SHLVL&lt;BR /&gt;debug3: Ignored env HOME&lt;BR /&gt;debug3: Ignored env LOGNAME&lt;BR /&gt;debug3: Ignored env CVS_RSH&lt;BR /&gt;debug3: Ignored env SSH_CONNECTION&lt;BR /&gt;debug3: Ignored env LESSOPEN&lt;BR /&gt;debug3: Ignored env G_BROKEN_FILENAMES&lt;BR /&gt;debug3: Ignored env _&lt;BR /&gt;debug2: channel 0: request shell confirm 0&lt;BR /&gt;debug2: fd 3 setting TCP_NODELAY&lt;BR /&gt;debug2: callback done&lt;BR /&gt;debug2: channel 0: open confirm rwindow 0 rmax 32768&lt;BR /&gt;debug2: channel 0: rcvd adjust 131072&lt;BR /&gt;Last login: Tue Jun 16 11:00:28 2009 from es-prod04.x.x.x&lt;BR /&gt;-bash-3.00$ debug2: client_check_window_change: changed&lt;BR /&gt;debug2: channel 0: request window-change confirm 0&lt;BR /&gt;-bash-3.00$</description>
      <pubDate>Tue, 16 Jun 2009 00:10:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/sshd-27382-fatal-read-from-socket-failed-connection-reset-by/m-p/4439687#M37034</guid>
      <dc:creator>Mohd Rasidi Che Mat</dc:creator>
      <dc:date>2009-06-16T00:10:08Z</dc:date>
    </item>
    <item>
      <title>Re: sshd[27382]: fatal: Read from socket failed: Connection reset by peer ()</title>
      <link>https://community.hpe.com/t5/operating-system-linux/sshd-27382-fatal-read-from-socket-failed-connection-reset-by/m-p/4439688#M37035</link>
      <description>is it safe to supress it? currently there is no impact on the server.</description>
      <pubDate>Tue, 16 Jun 2009 01:16:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/sshd-27382-fatal-read-from-socket-failed-connection-reset-by/m-p/4439688#M37035</guid>
      <dc:creator>Mohd Rasidi Che Mat</dc:creator>
      <dc:date>2009-06-16T01:16:36Z</dc:date>
    </item>
    <item>
      <title>Re: sshd[27382]: fatal: Read from socket failed: Connection reset by peer ()</title>
      <link>https://community.hpe.com/t5/operating-system-linux/sshd-27382-fatal-read-from-socket-failed-connection-reset-by/m-p/4439689#M37036</link>
      <description>If it is not causing an issue, I might disregard it. You might look at /var/log/messages and /var/log/secure on es-prod01 for clues.</description>
      <pubDate>Tue, 16 Jun 2009 13:21:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/sshd-27382-fatal-read-from-socket-failed-connection-reset-by/m-p/4439689#M37036</guid>
      <dc:creator>Court Campbell</dc:creator>
      <dc:date>2009-06-16T13:21:14Z</dc:date>
    </item>
  </channel>
</rss>

