Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Sftp - Couldn't read packet: Connection reset by peer Post 302907414 by CarloM on Friday 27th of June 2014 03:54:44 PM
Old 06-27-2014
Host disallowed, maybe? Look in /etc/hosts.allow and /etc/hosts.deny on the target machine.
 

10 More Discussions You Might Find Interesting

1. IP Networking

connection reset by peer

:confused: HI, We have 2 servers ( win 2003 + sun 5.8 ) and we run a rsh from the NT to the UNIX. The program runs a shell script on the UNIX and waits for the answer in the EOF. How ever, after period of appx 2 min there is a reply "Recv failed:Connection reset by peer". while the... (5 Replies)
Discussion started by: eyalush
5 Replies

2. Shell Programming and Scripting

ssh - connection reset by peer

I use ssh to work on the server (OS X 10.4.x) remotely from home (Debian / OS X 10.5.3). If I leave my machine idle, I get disconnected after a couple of minutes. I get the following error message: Read from remote host "server name": Connection reset by peer Connection to "server name" closed.... (2 Replies)
Discussion started by: osxhawk
2 Replies

3. Shell Programming and Scripting

Connection reset by peer

hi i am connecting to a remote server using sftp protocol. i am using the command like "sftp USER01@122.10.12.45" then i got the error "Couldn't read packet: Connection reset by peer" please help its very urgent (5 Replies)
Discussion started by: Satyak
5 Replies

4. IP Networking

connection reset by peer on freebsd

hi all. am running postgresql in a vm on debian server. i have some client programs connecting to the db. when i check the logs of postgresql i see "connection reset by peer" can someone help me with this issue... thanks. (1 Reply)
Discussion started by: coolatt
1 Replies

5. UNIX for Advanced & Expert Users

Connection reset by peer..closing connection

Hello I'm facing the above problem while doing a performance run. I've a script which I'm launching from my windows desktop using mozilla. The script will invoke backend action on a Solaris host which in turn feeds the records to a driver located on a linux box(Cent OS). What's happening is... (1 Reply)
Discussion started by: subramanyab
1 Replies

6. UNIX for Dummies Questions & Answers

fatal: Read from socket failed: Connection reset by peer

I get this error when I log in through console: "fatal: Read from socket failed: Connection reset by peer". Can you tell me what this is and why it happens, and how to stop it? Thank you. (1 Reply)
Discussion started by: iamnew2solaris
1 Replies

7. UNIX for Dummies Questions & Answers

cat: write error: Connection reset by peer

I have created a script to cat the contents of a log file and pipe it to head and tail so I can get specific lines. When I do this I sometimes randomly get the error "cat: write error: Connection reset by peer". It is completely sporatic and sometimes it doesnt happen and sometimes it does... (4 Replies)
Discussion started by: atelford
4 Replies

8. UNIX for Advanced & Expert Users

Fatal: Read from socket failed: Connection reset by peer [preauth]

Hello, I have recently updated my AIX machine from version 6.1.7.5 to 6.1.9.1 and i noticed that the errpt of the server is full of ssh messages like the one below: sshdprocess_id>]: fatal: Read from socket failed: Connection reset by peer Does anyone knows if this a known bug of the ssh... (15 Replies)
Discussion started by: omonoiatis9
15 Replies

9. Red Hat

Can't SSH - Connection reset by Peer

Hi Guys, I can't SSH to a remote system - connection reset by peer..any ideas ? -The Source is Linux, the Remote is Windows -The remote has OpenSSH running on Port 22 - Telnet confirms port is open -User1 has a RSA2 Key (2048) key, which is capture in the 1010101-pub.key specified by the... (1 Reply)
Discussion started by: stevie_velvet
1 Replies

10. Shell Programming and Scripting

Couldn't read packet: Connection reset by peer send: spawn id exp4 not open while executing

Hi All, I am having an issue with my script which I am using to get files from a remote server. In my script I am going to server:- REMOTESERVER and directory:- /Interface/Upload, and then getting files from there to my local server directory:- /ftp/jail_nextview_LMS/home/nextview_LMS/outbox. ... (1 Reply)
Discussion started by: Hero6438
1 Replies
ifaccess.conf(4)					     Kernel Interfaces Manual						  ifaccess.conf(4)

NAME
ifaccess.conf - Interface access filter configuration file DESCRIPTION
The /etc/ifaccess.conf file is an optional system file that specifies access filter entries for network interfaces. Interface access fil- tering provides a mechanism for detecting and preventing IP spoofing attacks. (See CERT Advisory CA-95:01). The source addresses of IP input packets are checked against interface access filter entries; packets receive the action associated with the first matching entry. The /etc/ifaccess.conf file is read by the /usr/sbin/ifconfig command when called with the filter option. The /etc/ifaccess.conf file is defined as a Context-Dependent Symbolic Link (CDSL), and must be maintained as such. See the System Admin- istration manual for more information. Lines in /etc/ifaccess.conf may be comment lines beginning with a number sign (#), blank lines, or access filter entries with the following format: interface_id address mask action In the preceding format: Specifies the network interface for which this entry applies. Is specified as a hostname, network name, or an Internet address in the standard dotted-decimal notation. Specifies which bits of the address are significant. The mask can be specified as a single hexadecimal number beginning with 0x, in the standard Internet dotted-decimal notation, or beginning with a name. The mask con- tains 1s (ones) for the bit positions in address that are significant. Specifies an entry to match packets against. The following actions are allowed: permit, deny, or denylog. Packets matching an entry with a permit action are passed to higher levels; packets matching an entry with a deny action are dropped; packets matching an entry with a denylog action are dropped, with a descriptive message sent to the system error logging facility. To prevent host spoofing, you must determine which networks are not secure and which interfaces are connected to those networks. For exam- ple, if a host is connected to a secure, trusted network on one interface and to non-trusted (non-secure) network on a second interface, you need to add an entry for the non-trusted network interface in the host's ifaccess.conf file. Interfaces connected to trusted networks do not require an entry in the ifaccess.conf file. Use the netstat(1) command to display the current access filters for the interface. NOTES
Some machines send IP broadcast messages to the alternate all-zeros address instead of the all-ones address. This generates the following error: ipintr: IP addr 0.0.0.0 on interface: access denied You should consider this error equivalent to the following error: ipintr: IP addr 255.255.255.255 on interface: access denied Use the tcpdump command to capture and examine the IP packets in order to find out about the machine sending them. RESTRICTIONS
An interface access filter entry mask must have at least as many significant bits set as the address. Interface access filters have an implicit default permit all entry at the end. Interface access filter entries are assigned in the order in which they appear in /etc/ifaccess.conf, with packets receiving the action of the first entry that matches. At most IFAF_MAXENTRIES access filter entries may be assigned for each network interface. (See the /usr/sys/include/net/if.h file.) A default deny all entry may be configured by adding an entry similar to the following as the last entry for interface xyz0 in /etc/ifac- cess.conf file: xyz0 0.0.0.0 0.0.0.0 deny Only address family inet is supported. EXAMPLES
The following example shows the ifaccess.conf files for two hosts, Host A and Host B, on a network; trusted is the trusted network. Host A connects to the trusted network via the fza0 interface and connects to an untrusted network, insecure1, via the ln0 interface. Host A's ifaccess.conf file includes the following entry: ln0 trusted 255.255.255.0 deny # deny all packets from hosts that # claim they originated from the # secure network. Host B connects to the trusted network via the fza0 interface; connects to an untrusted network, insecure1, via the ln0 interface; and connects to another untrusted network, insecure2, via the ln1 interface. Host B's ifaccess.conf file includes the following entries: ln0 trusted 255.255.255.0 deny # deny all packets from hosts that # claim they originated from the # secure network. ln1 trusted 255.255.255.0 deny # deny all packets from hosts that # claim they originated from the # secure network. Note that there is no entry in the ifaccess.conf file for the trusted network device, fza0. Only the untrusted network interfaces are configured with ifaccess.conf. FILES
Specifies the path name for the file. Network interface structures header file. Internet address and version structures header file. RELATED INFORMATION
Commands: netstat(1), ifconfig(8), syslogd(8), tcpdump(8). delim off ifaccess.conf(4)
All times are GMT -4. The time now is 08:59 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy