Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 220835 - Can't connect to remote software version mpSSH_0.0.1
Can't connect to remote software version mpSSH_0.0.1
Product: Fedora
Classification: Fedora
Component: openssh (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Tomas Mraz
Brian Brock
Depends On:
  Show dependency treegraph
Reported: 2006-12-27 13:39 EST by Robert Scheck
Modified: 2007-11-30 17:11 EST (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2006-12-28 14:15:22 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Robert Scheck 2006-12-27 13:39:30 EST
Description of problem:
Well...SSH connects to HP ILO Management Chips (http://h18004.www1.hp.com/
products/servers/management/ilo/) don't work any longer (and this problem could 
affect RHEL5 eventually, too):

robert@tux:~ > ssh -v Administrator@ilo
OpenSSH_4.5p1, OpenSSL 0.9.8b 04 May 2006
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Connecting to ilo [] port 22.
debug1: Connection established.
debug1: identity file /home/robert/.ssh/identity type -1
debug1: identity file /home/robert/.ssh/id_rsa type 1
debug1: identity file /home/robert/.ssh/id_dsa type 2
debug1: Remote protocol version 2.0, remote software version mpSSH_0.0.1
debug1: no match: mpSSH_0.0.1
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_4.5
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 none
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: sending SSH2_MSG_KEXDH_INIT
debug1: expecting SSH2_MSG_KEXDH_REPLY
debug1: Host 'ilo' is known and matches the RSA host key.
debug1: Found key in /home/robert/.ssh/known_hosts:46
debug1: ssh_rsa_verify: signature correct
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: password,publickey
debug1: Next authentication method: publickey
debug1: Trying private key: /home/robert/.ssh/identity
debug1: Offering public key: /home/robert/.ssh/id_rsa
debug1: Authentications that can continue: password,publickey
debug1: Offering public key: /home/robert/.ssh/id_dsa
debug1: Authentications that can continue: password,publickey
debug1: Next authentication method: password
Administrator@ilo's password:
debug1: Authentication succeeded (password).
debug1: channel 0: new [client-session]
debug1: Entering interactive session.
debug1: Sending environment.
debug1: Sending env LANG = de_DE@euro
dispatch_protocol_error: type 100 seq 9
buffer_get_ret: trying to get more bytes 4 than in buffer 0
buffer_get_int: buffer error
robert@tux:~ >

IMHO the problem came up between openssh-4.3p2-14 and openssh-4.5p1-1, when the 
SendEnv stuff got enabled, similar or even equivalent to a recent Debian mailing 
list thread: http://lists.debian.org/debian-ssh/2005/12/msg00025.html

Version-Release number of selected component (if applicable):

How reproducible & Steps to Reproduce:
Everytime, see above.

Actual results:
Non-working SSH connects.

Expected results:
Working SSH connects like in the past :)

Additional info:
If this bug is "notabug" for Red Hat, then HP should be contacted to get this 
problem solved very soon - finally before RHEL5 is shipping openssh-4.5p1-1 or 
Comment 1 Robert Scheck 2006-12-28 14:15:22 EST

Document ID: c00680182, Version: 1

Advisory: Using OpenSSH v4.1 to Connect to Integrated Lights-Out (iLO) May 
Display Message "dispatch_protocol_error: type 100"


Read more: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?

Note You need to log in before you can comment on or make changes to this bug.