[Bug 1011509] [NEW] can't login via ssh

yehudi inoffice.yehudi at gayalab.it
Mon Jun 11 09:21:16 UTC 2012


Public bug reported:

I installed a fresh ubuntu 12.04 desktop with raid0 disks (so I installed postfix - I've read this could be a problem).
If I try to login via ssh to this new machine, I always receive this error:
Read from socket failed: Connection reset by peer


output ssh -vvv yehudi at 192.168.1.5:
OpenSSH_5.9p1 Debian-5ubuntu1, OpenSSL 1.0.1 14 Mar 2012
debug1: Reading configuration data /home/yehudi/.ssh/config
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 19: Applying options for *
debug2: ssh_connect: needpriv 0
debug1: Connecting to 192.168.1.5 [192.168.1.5] port 22.
debug1: Connection established.
debug3: Incorrect RSA1 identifier
debug3: Could not load "/home/yehudi/.ssh/id_rsa" as a RSA1 public key
debug1: identity file /home/yehudi/.ssh/id_rsa type 1
debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-2048
debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048
debug1: identity file /home/yehudi/.ssh/id_rsa-cert type -1
debug1: identity file /home/yehudi/.ssh/id_dsa type -1
debug1: identity file /home/yehudi/.ssh/id_dsa-cert type -1
debug1: identity file /home/yehudi/.ssh/id_ecdsa type -1
debug1: identity file /home/yehudi/.ssh/id_ecdsa-cert type -1
debug1: Remote protocol version 2.0, remote software version OpenSSH_5.9p1 Debian-5ubuntu1
debug1: match: OpenSSH_5.9p1 Debian-5ubuntu1 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1
debug2: fd 3 setting O_NONBLOCK
debug3: load_hostkeys: loading entries for host "192.168.1.5" from file "/home/yehudi/.ssh/known_hosts"
debug3: load_hostkeys: loaded 0 keys
debug1: SSH2_MSG_KEXINIT sent
Read from socket failed: Connection reset by peer

this is my sshd_config file:
IgnoreRhosts yes
IgnoreUserKnownHosts no
PrintMotd yes
StrictModes yes
PubkeyAuthentication yes
RSAAuthentication yes
PermitRootLogin no
PermitEmptyPasswords no
PasswordAuthentication yes

this is the ssh_config file:
# This is the ssh client system-wide configuration file.  See
# ssh_config(5) for more information.  This file provides defaults for
# users, and the values can be changed in per-user configuration files
# or on the command line.

# Configuration data is parsed as follows:
#  1. command line options
#  2. user-specific file
#  3. system-wide file
# Any configuration value is only changed the first time it is set.
# Thus, host-specific definitions should be at the beginning of the
# configuration file, and defaults at the end.

# Site-wide defaults for some commonly used options.  For a comprehensive
# list of available options, their meanings and defaults, please see the
# ssh_config(5) man page.

Host *
#   ForwardAgent no
#   ForwardX11 no
#   ForwardX11Trusted yes
#   RhostsRSAAuthentication no
#   RSAAuthentication yes
#   PasswordAuthentication yes
#   HostbasedAuthentication no
#   GSSAPIAuthentication no
#   GSSAPIDelegateCredentials no
#   GSSAPIKeyExchange no
#   GSSAPITrustDNS no
#   BatchMode no
#   CheckHostIP yes
#   AddressFamily any
#   ConnectTimeout 0
#   StrictHostKeyChecking ask
#   IdentityFile ~/.ssh/identity
#   IdentityFile ~/.ssh/id_rsa
#   IdentityFile ~/.ssh/id_dsa
#   Port 22
#   Protocol 2,1
#    Cipher 3des
#    Ciphers aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc
#   MACs hmac-md5,hmac-sha1,umac-64 at openssh.com,hmac-ripemd160
#   EscapeChar ~
#   Tunnel no
#   TunnelDevice any:any
#   PermitLocalCommand no
#   VisualHostKey no
#   ProxyCommand ssh -q -W %h:%p gateway.example.com
    Cipher 3des
    Ciphers aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc
    SendEnv LANG LC_*
    HashKnownHosts yes
    GSSAPIAuthentication yes
    GSSAPIDelegateCredentials no

** Affects: openssh (Ubuntu)
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to openssh in Ubuntu.
https://bugs.launchpad.net/bugs/1011509

Title:
  can't login via ssh

Status in “openssh” package in Ubuntu:
  New

Bug description:
  I installed a fresh ubuntu 12.04 desktop with raid0 disks (so I installed postfix - I've read this could be a problem).
  If I try to login via ssh to this new machine, I always receive this error:
  Read from socket failed: Connection reset by peer

  
  output ssh -vvv yehudi at 192.168.1.5:
  OpenSSH_5.9p1 Debian-5ubuntu1, OpenSSL 1.0.1 14 Mar 2012
  debug1: Reading configuration data /home/yehudi/.ssh/config
  debug1: Reading configuration data /etc/ssh/ssh_config
  debug1: /etc/ssh/ssh_config line 19: Applying options for *
  debug2: ssh_connect: needpriv 0
  debug1: Connecting to 192.168.1.5 [192.168.1.5] port 22.
  debug1: Connection established.
  debug3: Incorrect RSA1 identifier
  debug3: Could not load "/home/yehudi/.ssh/id_rsa" as a RSA1 public key
  debug1: identity file /home/yehudi/.ssh/id_rsa type 1
  debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-2048
  debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048
  debug1: identity file /home/yehudi/.ssh/id_rsa-cert type -1
  debug1: identity file /home/yehudi/.ssh/id_dsa type -1
  debug1: identity file /home/yehudi/.ssh/id_dsa-cert type -1
  debug1: identity file /home/yehudi/.ssh/id_ecdsa type -1
  debug1: identity file /home/yehudi/.ssh/id_ecdsa-cert type -1
  debug1: Remote protocol version 2.0, remote software version OpenSSH_5.9p1 Debian-5ubuntu1
  debug1: match: OpenSSH_5.9p1 Debian-5ubuntu1 pat OpenSSH*
  debug1: Enabling compatibility mode for protocol 2.0
  debug1: Local version string SSH-2.0-OpenSSH_5.9p1 Debian-5ubuntu1
  debug2: fd 3 setting O_NONBLOCK
  debug3: load_hostkeys: loading entries for host "192.168.1.5" from file "/home/yehudi/.ssh/known_hosts"
  debug3: load_hostkeys: loaded 0 keys
  debug1: SSH2_MSG_KEXINIT sent
  Read from socket failed: Connection reset by peer

  this is my sshd_config file:
  IgnoreRhosts yes
  IgnoreUserKnownHosts no
  PrintMotd yes
  StrictModes yes
  PubkeyAuthentication yes
  RSAAuthentication yes
  PermitRootLogin no
  PermitEmptyPasswords no
  PasswordAuthentication yes

  this is the ssh_config file:
  # This is the ssh client system-wide configuration file.  See
  # ssh_config(5) for more information.  This file provides defaults for
  # users, and the values can be changed in per-user configuration files
  # or on the command line.

  # Configuration data is parsed as follows:
  #  1. command line options
  #  2. user-specific file
  #  3. system-wide file
  # Any configuration value is only changed the first time it is set.
  # Thus, host-specific definitions should be at the beginning of the
  # configuration file, and defaults at the end.

  # Site-wide defaults for some commonly used options.  For a comprehensive
  # list of available options, their meanings and defaults, please see the
  # ssh_config(5) man page.

  Host *
  #   ForwardAgent no
  #   ForwardX11 no
  #   ForwardX11Trusted yes
  #   RhostsRSAAuthentication no
  #   RSAAuthentication yes
  #   PasswordAuthentication yes
  #   HostbasedAuthentication no
  #   GSSAPIAuthentication no
  #   GSSAPIDelegateCredentials no
  #   GSSAPIKeyExchange no
  #   GSSAPITrustDNS no
  #   BatchMode no
  #   CheckHostIP yes
  #   AddressFamily any
  #   ConnectTimeout 0
  #   StrictHostKeyChecking ask
  #   IdentityFile ~/.ssh/identity
  #   IdentityFile ~/.ssh/id_rsa
  #   IdentityFile ~/.ssh/id_dsa
  #   Port 22
  #   Protocol 2,1
  #    Cipher 3des
  #    Ciphers aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc
  #   MACs hmac-md5,hmac-sha1,umac-64 at openssh.com,hmac-ripemd160
  #   EscapeChar ~
  #   Tunnel no
  #   TunnelDevice any:any
  #   PermitLocalCommand no
  #   VisualHostKey no
  #   ProxyCommand ssh -q -W %h:%p gateway.example.com
      Cipher 3des
      Ciphers aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-cbc,3des-cbc
      SendEnv LANG LC_*
      HashKnownHosts yes
      GSSAPIAuthentication yes
      GSSAPIDelegateCredentials no

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1011509/+subscriptions




More information about the foundations-bugs mailing list