https://bugzilla.mindrot.org/show_bug.cgi?id=3777
--- Comment #3 from Darren Tucker <dtuc...@dtucker.net> --- (In reply to Vishwanath Jadhav from comment #2) > Hi Darren Tucker, > Thank you for the quick reply. > The IP 10.203.0.4 is belongs to our firewall Then I suspect either something behind it is conducting a port scan, or perhaps there's a problem such as a Path MTU bug causing a legitimate client behind it fail to complete a connection and ultimately send a TCP RST. You would need to break out tcpdump or similar and investigate. Either way absent evidence to the contrary it seems like this is behaving as intended. -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug. _______________________________________________ openssh-bugs mailing list openssh-bugs@mindrot.org https://lists.mindrot.org/mailman/listinfo/openssh-bugs