<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to connect to server via SSH in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/unable-to-connect-to-server-via-ssh/m-p/4428376#M82111</link>
    <description>Hi,&lt;BR /&gt;I will suspect a bug "segfault"&lt;BR /&gt;Googleise it. &lt;BR /&gt;&lt;A href="https://bugzilla.redhat.com/show_bug.cgi?id=190003" target="_blank"&gt;https://bugzilla.redhat.com/show_bug.cgi?id=190003&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://osdir.com/ml/debian.devel.ssh/2005-10/msg00028.html" target="_blank"&gt;http://osdir.com/ml/debian.devel.ssh/2005-10/msg00028.html&lt;/A&gt;&lt;BR /&gt;You could try to update some lib and openssh itself.&lt;BR /&gt;Hope it helps</description>
    <pubDate>Thu, 28 May 2009 09:31:19 GMT</pubDate>
    <dc:creator>smatador</dc:creator>
    <dc:date>2009-05-28T09:31:19Z</dc:date>
    <item>
      <title>Unable to connect to server via SSH</title>
      <link>https://community.hpe.com/t5/operating-system-linux/unable-to-connect-to-server-via-ssh/m-p/4428373#M82108</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Can anyone interpret what does the error below means?&lt;BR /&gt;This is because we were not able to connect via ssh.&lt;BR /&gt;But can via ftp.&lt;BR /&gt;&lt;BR /&gt;May 28 05:55:19 RCI01 auditd[2790]: Audit daemon rotating log files&lt;BR /&gt;&lt;BR /&gt;May 28 10:56:25 RCI01 kernel: sshd[1778]: segfault at ffffffff9b163a80 rip 00000036e5c76337 rsp 00007fff9b163a78 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 10:56:46 RCI01 kernel: sshd[1792]: segfault at 0000000039ad7040 rip 00000036e5c76337 rsp 00007fff39ad7038 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 10:57:11 RCI01 kernel: sshd[1894]: segfault at 0000000036904220 rip 00000036e5c76337 rsp 00007fff36904218 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 11:01:37 RCI01 kernel: sshd[2241]: segfault at ffffffffe4633f50 rip 00000036e5c76337 rsp 00007fffe4633f48 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 11:03:28 RCI01 kernel: sshd[2419]: segfault at ffffffffb7566e80 rip 00000036e5c76337 rsp 00007fffb7566e78 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 11:24:58 RCI01 kernel: sshd[3941]: segfault at 0000000024b42460 rip 00000036e5c76337 rsp 00007fff24b42458 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 11:55:44 RCI01 kernel: sshd[6288]: segfault at 00000000276b0fc0 rip 00000036e5c76337 rsp 00007fff276b0fb8 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 11:56:08 RCI01 kernel: sshd[6308]: segfault at 000000000960ef20 rip 00000036e5c76337 rsp 00007fff0960ef18 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 11:57:14 RCI01 kernel: sshd[6438]: segfault at 000000006f81e130 rip 00000036e5c76337 rsp 00007fff6f81e128 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 12:04:53 RCI01 kernel: sshd[6999]: segfault at ffffffffa3ec47e0 rip 00000036e5c76337 rsp 00007fffa3ec47d8 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 12:09:46 RCI01 kernel: sshd[7321]: segfault at 000000004569afb0 rip 00000036e5c76337 rsp 00007fff4569afa8 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 12:10:24 RCI01 kernel: sshd[7384]: segfault at ffffffff9c3f2d10 rip 00000036e5c76337 rsp 00007fff9c3f2d08 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 12:11:04 RCI01 kernel: sshd[7412]: segfault at ffffffffb97c80e0 rip 00000036e5c76337 rsp 00007fffb97c80d8 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 12:12:26 RCI01 kernel: sshd[7558]: segfault at ffffffffa2d20630 rip 00000036e5c76337 rsp 00007fffa2d20628 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 12:18:43 RCI01 kernel: sshd[8106]: segfault at 00000000408fd210 rip 00000036e5c76337 rsp 00007fff408fd208 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 12:19:12 RCI01 kernel: sshd[8123]: segfault at 0000000056dda6f0 rip 00000036e5c76337 rsp 00007fff56dda6e8 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 12:19:46 RCI01 kernel: sshd[8155]: segfault at ffffffff95edbd70 rip 00000036e5c76337 rsp 00007fff95edbd68 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 12:19:58 RCI01 kernel: sshd[8167]: segfault at 000000001d45cd70 rip 00000036e5c76337 rsp 00007fff1d45cd68 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 12:20:02 RCI01 kernel: sshd[8172]: segfault at ffffffff8e5c5c30 rip 00000036e5c76337 rsp 00007fff8e5c5c28 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 12:23:25 RCI01 kernel: sshd[8451]: segfault at 0000000051869600 rip 00000036e5c76337 rsp 00007fff518695f8 error 4&lt;BR /&gt;&lt;BR /&gt;May 28 12:23:28 RCI01 kernel: sshd[8459]: segfault at 000000004be76c10 rip 00000036e5c76337 rsp 00007fff4be76c08 error 4&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 28 May 2009 07:06:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/unable-to-connect-to-server-via-ssh/m-p/4428373#M82108</guid>
      <dc:creator>Jojo Castro</dc:creator>
      <dc:date>2009-05-28T07:06:41Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to connect to server via SSH</title>
      <link>https://community.hpe.com/t5/operating-system-linux/unable-to-connect-to-server-via-ssh/m-p/4428374#M82109</link>
      <description>When connecting to server, via ssh, here is the exact errors&lt;BR /&gt;&lt;BR /&gt;[root@RCI02 ~]# ssh -v -l carl 10.137.31.201&lt;BR /&gt;&lt;BR /&gt;OpenSSH_4.3P2 Debian-9, OpenSSL 0.9.8b 04 May 2006&lt;BR /&gt;&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;&lt;BR /&gt;debug1: Applying options for *&lt;BR /&gt;&lt;BR /&gt;debug1: Connecting to 10.137.31.201 [10.137.31.201] port 22.&lt;BR /&gt;&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;&lt;BR /&gt;debug1: permanently_set_uid: 0/0&lt;BR /&gt;&lt;BR /&gt;debug1: identity file /root/.ssh/identity type -1&lt;BR /&gt;&lt;BR /&gt;debug1: identity file /root/.ssh/id_rsa type -1&lt;BR /&gt;&lt;BR /&gt;debug1: identity file /root/.ssh/id_dsa type -1&lt;BR /&gt;&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_4.3&lt;BR /&gt;&lt;BR /&gt;debug1: match: OpenSSH_4.3 pat OpenSSH*&lt;BR /&gt;&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_4.3&lt;BR /&gt;&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;&lt;BR /&gt;debug1: Host '10.137.31.201' is known and matches the RSA host key.&lt;BR /&gt;&lt;BR /&gt;debug1: Found key in /root/.ssh/known_hosts:1&lt;BR /&gt;&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;&lt;BR /&gt;Connection closed by 10.137.31.201&lt;BR /&gt;</description>
      <pubDate>Thu, 28 May 2009 07:16:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/unable-to-connect-to-server-via-ssh/m-p/4428374#M82109</guid>
      <dc:creator>Jojo Castro</dc:creator>
      <dc:date>2009-05-28T07:16:01Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to connect to server via SSH</title>
      <link>https://community.hpe.com/t5/operating-system-linux/unable-to-connect-to-server-via-ssh/m-p/4428375#M82110</link>
      <description>Additional info.&lt;BR /&gt;&lt;BR /&gt;ssh -vvv -l carl 10.137.31.201&lt;BR /&gt;OpenSSH_3.9p1, OpenSSL 0.9.7a Feb 19 2003&lt;BR /&gt;debug1: Reading configuration data /etc/ssh/ssh_config&lt;BR /&gt;debug1: Applying options for *&lt;BR /&gt;debug2: ssh_connect: needpriv 0&lt;BR /&gt;debug1: Connecting to 10.137.31.201 [10.137.31.201] port 22.&lt;BR /&gt;debug1: Connection established.&lt;BR /&gt;debug1: permanently_set_uid: 0/0&lt;BR /&gt;debug1: identity file /root/.ssh/identity type -1&lt;BR /&gt;debug1: identity file /root/.ssh/id_rsa type -1&lt;BR /&gt;debug1: identity file /root/.ssh/id_dsa type -1&lt;BR /&gt;debug1: Remote protocol version 2.0, remote software version OpenSSH_4.3&lt;BR /&gt;debug1: match: OpenSSH_4.3 pat OpenSSH*&lt;BR /&gt;debug1: Enabling compatibility mode for protocol 2.0&lt;BR /&gt;debug1: Local version string SSH-2.0-OpenSSH_3.9p1&lt;BR /&gt;debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: kex_parse_kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1&lt;BR /&gt;debug2: kex_parse_kexinit: ssh-rsa,ssh-dss&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour128,arcfour256,arcfour,aes192-cbc,aes256-cbc,rijndael-cbc@lysator.liu.se,aes128-ctr,aes192-ctr,aes256-ctr&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: hmac-md5,hmac-sha1,hmac-ripemd160,hmac-ripemd160@openssh.com,hmac-sha1-96,hmac-md5-96&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;BR /&gt;debug2: kex_parse_kexinit: none,zlib@openssh.com&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit:&lt;BR /&gt;debug2: kex_parse_kexinit: first_kex_follows 0&lt;BR /&gt;debug2: kex_parse_kexinit: reserved 0&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: server-&amp;gt;client aes128-cbc hmac-md5 none&lt;BR /&gt;debug2: mac_init: found hmac-md5&lt;BR /&gt;debug1: kex: client-&amp;gt;server aes128-cbc hmac-md5 none&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024&amp;lt;1024&amp;lt;8192) sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP&lt;BR /&gt;debug2: dh_gen_key: priv key bits set: 128/256&lt;BR /&gt;debug2: bits set: 537/1024&lt;BR /&gt;debug1: SSH2_MSG_KEX_DH_GEX_INIT sent&lt;BR /&gt;debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY&lt;BR /&gt;debug3: check_host_in_hostfile: filename /root/.ssh/known_hosts&lt;BR /&gt;debug3: check_host_in_hostfile: match line 4&lt;BR /&gt;debug1: Host '10.137.31.201' is known and matches the RSA host key.&lt;BR /&gt;debug1: Found key in /root/.ssh/known_hosts:4&lt;BR /&gt;debug2: bits set: 515/1024&lt;BR /&gt;debug1: ssh_rsa_verify: signature correct&lt;BR /&gt;debug2: kex_derive_keys&lt;BR /&gt;debug2: set_newkeys: mode 1&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;debug2: set_newkeys: mode 0&lt;BR /&gt;debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_REQUEST sent&lt;BR /&gt;debug2: service_accept: ssh-userauth&lt;BR /&gt;debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;debug2: key: /root/.ssh/identity ((nil))&lt;BR /&gt;debug2: key: /root/.ssh/id_rsa ((nil))&lt;BR /&gt;debug2: key: /root/.ssh/id_dsa ((nil))&lt;BR /&gt;Connection closed by 10.137.31.201&lt;BR /&gt;</description>
      <pubDate>Thu, 28 May 2009 09:13:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/unable-to-connect-to-server-via-ssh/m-p/4428375#M82110</guid>
      <dc:creator>Jojo Castro</dc:creator>
      <dc:date>2009-05-28T09:13:27Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to connect to server via SSH</title>
      <link>https://community.hpe.com/t5/operating-system-linux/unable-to-connect-to-server-via-ssh/m-p/4428376#M82111</link>
      <description>Hi,&lt;BR /&gt;I will suspect a bug "segfault"&lt;BR /&gt;Googleise it. &lt;BR /&gt;&lt;A href="https://bugzilla.redhat.com/show_bug.cgi?id=190003" target="_blank"&gt;https://bugzilla.redhat.com/show_bug.cgi?id=190003&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://osdir.com/ml/debian.devel.ssh/2005-10/msg00028.html" target="_blank"&gt;http://osdir.com/ml/debian.devel.ssh/2005-10/msg00028.html&lt;/A&gt;&lt;BR /&gt;You could try to update some lib and openssh itself.&lt;BR /&gt;Hope it helps</description>
      <pubDate>Thu, 28 May 2009 09:31:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/unable-to-connect-to-server-via-ssh/m-p/4428376#M82111</guid>
      <dc:creator>smatador</dc:creator>
      <dc:date>2009-05-28T09:31:19Z</dc:date>
    </item>
  </channel>
</rss>

