Hello The security man answered :
> This is the IDS embeded in a fire check point So, no cisco. But what would be different if it were a CISCO, JUNIPER, or ACME ? The fact that a third party is analysing and wrongly -- or perhaps too much strictly, (or even rightly)-- identifying a packet from a openssh>=5.7 client to a openssh<5.7 server as an ssh protocol violation and is resetting the connection seems enough to me. The inconvenient of third parties is that you don't control them. I mean, It seems there's not much that can be done, except, perhaps packaging an "openssh-client-old". Schplurtz -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/708493 Title: cannot login anymore: Read from socket failed: Connection reset by peer -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
