[freifunk-public] Ffsaar-fitnessforum-mettlach wieder mal kein Durchsatz

Jan Philippi jan.philippi1994 at googlemail.com
Di Jan 17 09:28:34 CET 2017


Hey Jochen,

hab das Gleiche auf meinem Router auch festgestellt (hab diesen nach dem
letzten Update neu "geflashed").

Nachdem ich tcp_mtu_probing auf dem Client aktiviert hatte, ging es wieder.

Scheint mit dem Bug zusammen zu hängen:
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/1254085

# echo 1 > /proc/sys/net/ipv4/tcp_mtu_probing

-- 

Jan (0xE4E22A3C)
Jabber: jan at himbeere.pw

On 16.01.2017 22:08, Jochen Bauer wrote:
> Noch ein Nachtrag:
>
> wenn ich mich von hier zuhause versuche, per SSH auf den Router zu
> connecten, hängt der Verbindungsaufbau. Kann da jemand was hilfreiches
> aus diesem Log lesen?b
>
>
> ssh -i /home/jochen/.ssh/ffsaar-fitnessforummettlach -vvvv
> root at 2a03:2260:3009:100:32b5:c2ff:fe80:fa46
>                               :)
> OpenSSH_6.7p1 Debian-5+deb8u3, OpenSSL 1.0.1t  3 May 2016
> debug1: Reading configuration data /etc/ssh/ssh_config
> debug1: /etc/ssh/ssh_config line 19: Applying options for *
> debug2: ssh_connect: needpriv 0
> debug1: Connecting to 2a03:2260:3009:100:32b5:c2ff:fe80:fa46
> [2a03:2260:3009:100:32b5:c2ff:fe80:fa46] port 22.
> debug1: Connection established.
> debug1: identity file /home/jochen/.ssh/ffsaar-fitnessforummettlach type 1
> debug1: key_load_public: No such file or directory
> debug1: identity file /home/jochen/.ssh/ffsaar-fitnessforummettlach-cert
> type -1
> debug1: Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_6.7p1 Debian-5+deb8u3
> debug1: Remote protocol version 2.0, remote software version
> dropbear_2016.74
> debug1: no match: dropbear_2016.74
> debug2: fd 3 setting O_NONBLOCK
> debug3: load_hostkeys: loading entries for host
> "2a03:2260:3009:100:32b5:c2ff:fe80:fa46" from file
> "/home/jochen/.ssh/known_hosts"
> debug3: load_hostkeys: found key type RSA in file
> /home/jochen/.ssh/known_hosts:122
> debug3: load_hostkeys: loaded 1 keys
> debug3: order_hostkeyalgs: prefer hostkeyalgs:
> ssh-rsa-cert-v01 at openssh.com,ssh-rsa-cert-v00 at openssh.com,ssh-rsa
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug2: kex_parse_kexinit:
> curve25519-sha256 at libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> debug2: kex_parse_kexinit:
> ssh-rsa-cert-v01 at openssh.com,ssh-rsa-cert-v00 at openssh.com,ssh-rsa,ecdsa-sha2-nistp256-cert-v01 at openssh.com,ecdsa-sha2-nistp384-cert-v01 at openssh.com,ecdsa-sha2-nistp521-cert-v01 at openssh.com,ssh-ed25519-cert-v01 at openssh.com,ssh-dss-cert-v01 at openssh.com,ssh-dss-cert-v00 at openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519,ssh-dss
> debug2: kex_parse_kexinit:
> aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm at openssh.com,aes256-gcm at openssh.com,chacha20-poly1305 at openssh.com,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se
> debug2: kex_parse_kexinit:
> aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm at openssh.com,aes256-gcm at openssh.com,chacha20-poly1305 at openssh.com,arcfour256,arcfour128,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc at lysator.liu.se
> debug2: kex_parse_kexinit:
> umac-64-etm at openssh.com,umac-128-etm at openssh.com,hmac-sha2-256-etm at openssh.com,hmac-sha2-512-etm at openssh.com,hmac-sha1-etm at openssh.com,umac-64 at openssh.com,umac-128 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm at openssh.com,hmac-ripemd160-etm at openssh.com,hmac-sha1-96-etm at openssh.com,hmac-md5-96-etm at openssh.com,hmac-md5,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit:
> umac-64-etm at openssh.com,umac-128-etm at openssh.com,hmac-sha2-256-etm at openssh.com,hmac-sha2-512-etm at openssh.com,hmac-sha1-etm at openssh.com,umac-64 at openssh.com,umac-128 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1,hmac-md5-etm at openssh.com,hmac-ripemd160-etm at openssh.com,hmac-sha1-96-etm at openssh.com,hmac-md5-96-etm at openssh.com,hmac-md5,hmac-ripemd160,hmac-ripemd160 at openssh.com,hmac-sha1-96,hmac-md5-96
> debug2: kex_parse_kexinit: none,zlib at openssh.com,zlib
> debug2: kex_parse_kexinit: none,zlib at openssh.com,zlib
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: kex_parse_kexinit:
> curve25519-sha256 at libssh.org,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,kexguess2 at matt.ucc.asn.au
> debug2: kex_parse_kexinit: ssh-rsa
> debug2: kex_parse_kexinit: aes128-ctr,aes256-ctr
> debug2: kex_parse_kexinit: aes128-ctr,aes256-ctr
> debug2: kex_parse_kexinit: hmac-sha1,hmac-md5
> debug2: kex_parse_kexinit: hmac-sha1,hmac-md5
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit: none
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit:
> debug2: kex_parse_kexinit: first_kex_follows 0
> debug2: kex_parse_kexinit: reserved 0
> debug2: mac_setup: setup hmac-sha1
> debug1: kex: server->client aes128-ctr hmac-sha1 none
> debug2: mac_setup: setup hmac-sha1
> debug1: kex: client->server aes128-ctr hmac-sha1 none
> debug1: sending SSH2_MSG_KEX_ECDH_INIT
> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
>
>
> Gruß
>
> Jochen


-------------- nächster Teil --------------
Ein Dateianhang mit Binärdaten wurde abgetrennt...
Dateiname   : signature.asc
Dateityp    : application/pgp-signature
Dateigröße  : 819 bytes
Beschreibung: OpenPGP digital signature
URL         : <http://lists.hacksaar.de/pipermail/freifunk-public/attachments/20170117/68404f78/attachment.sig>


Mehr Informationen über die Mailingliste freifunk-public