From owner-freebsd-stable@FreeBSD.ORG Thu Mar 26 14:16:47 2015 Return-Path: Delivered-To: stable@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 566F456B for ; Thu, 26 Mar 2015 14:16:47 +0000 (UTC) Received: from smarthost1.sentex.ca (smarthost1.sentex.ca [IPv6:2607:f3e0:0:1::12]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "smarthost.sentex.ca", Issuer "smarthost.sentex.ca" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 1F943E76 for ; Thu, 26 Mar 2015 14:16:46 +0000 (UTC) Received: from [IPv6:2607:f3e0:0:4:f025:8813:7603:7e4a] (saphire3.sentex.ca [IPv6:2607:f3e0:0:4:f025:8813:7603:7e4a]) by smarthost1.sentex.ca (8.14.9/8.14.9) with ESMTP id t2QEGaCe025894; Thu, 26 Mar 2015 10:16:36 -0400 (EDT) (envelope-from mike@sentex.net) Message-ID: <551414C3.6020704@sentex.net> Date: Thu, 26 Mar 2015 10:16:35 -0400 From: Mike Tancsa Organization: Sentex Communications User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.5.0 MIME-Version: 1.0 To: Wu ShuKun , stable@freebsd.org Subject: Re: SSH hung with an OpenSSH_6.6.1p1 --> OpenSSH_5.8p2_hpn13v11 References: <5513AAD8.9060505@gddsn.org.cn> In-Reply-To: <5513AAD8.9060505@gddsn.org.cn> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.75 X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 26 Mar 2015 14:16:47 -0000 On 3/26/2015 2:44 AM, Wu ShuKun wrote: > greeting! > ssh connection failed by using a new version SSH to and old one. > Below is the symptoms which on a same network. > Connection is Okay with old version SSH > %ssh -V > OpenSSH_5.4p1 FreeBSD-20100308, OpenSSL 0.9.8q 2 Dec 2010 > OpenSSH_6.6.1p1, OpenSSL 1.0.1l-freebsd 15 Jan 2015 > % ssh -v 10.41.172.19 > OpenSSH_6.6.1p1, OpenSSL 1.0.1l-freebsd 15 Jan 2015 Is it possible this user somehow got a package or port, or binary upgrade somehow built with OpenSSL when it was briefly broken between r280266 and r280274 ? (Trimming the other lists from this thread) ---Mike -- ------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike@sentex.net Providing Internet services since 1994 www.sentex.net Cambridge, Ontario Canada http://www.tancsa.com/