Hello

The security man answered :

> This is the IDS embeded in a fire check point

So, no cisco. But what would be different if it were a CISCO, JUNIPER,
or ACME ? The fact that a third party is analysing and wrongly -- or
perhaps too much strictly, (or even rightly)-- identifying a packet from
a openssh>=5.7  client to a  openssh<5.7 server as an ssh protocol
violation and is resetting the connection seems enough to me. The
inconvenient of third parties is that you don't control them. I mean, It
seems there's not much that can be done, except, perhaps packaging an
"openssh-client-old".

Schplurtz

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/708493

Title:
  cannot login anymore: Read from socket failed: Connection reset by
  peer

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to