On 04/12/2010 08:26 AM, Γιώργος Πάλλας wrote: > vikram wrote: >> Hi, >> >> This is the output of scp -vv >> >> $ scp -vv files.tar.gz r...@192.168.1.11:/root/Desktop >> Executing: program /usr/bin/ssh host 192.168.1.11, user root, command >> scp -v -t /root/Desktop >> OpenSSH_5.1p1 Debian-5, OpenSSL 0.9.8g 19 Oct 2007 >> debug1: Reading configuration data /etc/ssh/ssh_config >> debug1: Applying options for * >> debug2: ssh_connect: needpriv 0 >> debug1: Connecting to 192.168.1.11 [192.168.1.11] port 22. >> debug1: Connection established. >> debug1: identity file /home/user/.ssh/identity type -1 >> debug1: identity file /home/user/.ssh/id_rsa type -1 >> debug1: identity file /home/user/.ssh/id_dsa type -1 >> debug1: Remote protocol version 2.0, remote software version >> OpenSSH_5.1p1 Debian-5 >> debug1: match: OpenSSH_5.1p1 Debian-5 pat OpenSSH* >> debug1: Enabling compatibility mode for protocol 2.0 >> debug1: Local version string SSH-2.0-OpenSSH_5.1p1 Debian-5 >> debug2: fd 3 setting O_NONBLOCK >> debug1: SSH2_MSG_KEXINIT sent >> Read from socket failed: Connection reset by peer >> lost connection >> >> I get this not matter which file i try to copy. >> > > Hmmm, this could be an active RST denial of service. Could you possibly > get a tcpdump of the session and check if you receive an RST packet just > before the connection reset by peer?
Unlikely. On an internal server (but still possible). I had a similar problem on a dying system. (The XEN-Server died but the SSH-Socket on the guest was still up and any connection was "reset by peer"). Greetings, - Darsha -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/4bc3346c.5020...@syn-net.org