https://bugzilla.mindrot.org/show_bug.cgi?id=3777

--- Comment #3 from Darren Tucker <dtuc...@dtucker.net> ---
(In reply to Vishwanath Jadhav from comment #2)
> Hi Darren Tucker,
> Thank you for the quick reply.
> The IP 10.203.0.4 is belongs to our firewall

Then I suspect either something behind it is conducting a port scan, or
perhaps there's a problem such as a Path MTU bug causing a legitimate
client behind it fail to complete a connection and ultimately send a
TCP RST.  You would need to break out tcpdump or similar and
investigate.

Either way absent evidence to the contrary it seems like this is
behaving as intended.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
_______________________________________________
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs

Reply via email to