<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSH connection drops randomly in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssh-connection-drops-randomly/m-p/262191#M74303</link>
    <description>&lt;P&gt;An SSH connection to a particular server drops randomly (usually 20-60 seconds after login). Between the client and the server is a Palo Alto firewall with SSH decryption disabled.&lt;/P&gt;&lt;P&gt;What I tried so far&lt;/P&gt;&lt;P&gt;&amp;nbsp;- regenerated ssh keys on the server&lt;BR /&gt;&amp;nbsp;- added to server config:&lt;BR /&gt;&amp;nbsp;ClientAliveInterval 30&lt;BR /&gt;&amp;nbsp;ClientAliveCountMax 5&lt;BR /&gt;&amp;nbsp;- added `ServerAliveInterval=10` to ssh command&lt;BR /&gt;&amp;nbsp;- added `ServerKeepAlive=true` to ssh command&lt;BR /&gt;&amp;nbsp;- tried various ssh clients&lt;/P&gt;&lt;P&gt;Nothing worked so far. Notice the debug3: send packet: type 80 and debug3: send packet: type 1 messages just at the moment before/ after the connection is dropped. The firewall logs the SSH session and the termination reason is "tcp-rst-from-client".&lt;/P&gt;&lt;P&gt;Here's a log of a representative SSH session, terminated ~15 seconds after login:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; user@nb ~/.ssh&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; $ ssh -vvvvv -o ServerAliveInterval=10 root@10.1.1.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; OpenSSH_7.9p1, OpenSSL 1.0.2r&amp;nbsp; 26 Feb 2019&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: resolve_canonicalize: hostname 10.1.1.2 is address&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: ssh_connect_direct&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Connecting to 10.1.1.2 [10.1.1.2] port 22.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Connection established.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_rsa type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_rsa-cert type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_dsa type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_dsa-cert type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_ecdsa type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_ecdsa-cert type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_ed25519 type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_ed25519-cert type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_xmss type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_xmss-cert type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Local version string SSH-2.0-OpenSSH_7.9&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Remote protocol version 2.0, remote software version OpenSSH_7.4p1 Debian-10+deb9u6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: match: OpenSSH_7.4p1 Debian-10+deb9u6 pat OpenSSH_7.0*,OpenSSH_7.1*,OpenSSH_7.2*,OpenSSH_7.3*,OpenSSH_7.4*,OpenSSH_7.5*,OpenSSH_7.6*,OpenSSH_7.7* compat 0x04000002&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Authenticating to 10.1.1.2:22 as 'root'&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: hostkeys_foreach: reading file "/home/user/.ssh/known_hosts"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: record_hostkey: found key type ECDSA in file /home/user/.ssh/known_hosts:53&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: load_hostkeys: loaded 1 keys from 10.1.1.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 20&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 20&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: local client KEXINIT proposal&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: compression ctos: none,zlib@openssh.com,zlib&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: compression stoc: none,zlib@openssh.com,zlib&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: languages ctos:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: languages stoc:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: first_kex_follows 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: reserved 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: peer server KEXINIT proposal&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: compression ctos: none,zlib@openssh.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: compression stoc: none,zlib@openssh.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: languages ctos:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: languages stoc:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: first_kex_follows 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: reserved 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: kex: algorithm: curve25519-sha256&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: kex: host key algorithm: ecdsa-sha2-nistp256&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: kex: server-&amp;gt;client cipher: chacha20-poly1305@openssh.com MAC: &amp;lt;implicit&amp;gt; compression: none&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: kex: client-&amp;gt;server cipher: chacha20-poly1305@openssh.com MAC: &amp;lt;implicit&amp;gt; compression: none&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 30&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: expecting SSH2_MSG_KEX_ECDH_REPLY&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 31&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Server host key: ecdsa-sha2-nistp256 SHA256:xm9dqhSATd266dL4vmr1yMrdvJ7HFlMXx8tZSn4I7Pc&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: hostkeys_foreach: reading file "/home/user/.ssh/known_hosts"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: record_hostkey: found key type ECDSA in file /home/user/.ssh/known_hosts:53&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: load_hostkeys: loaded 1 keys from 10.1.1.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Host '10.1.1.2' is known and matches the ECDSA host key.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Found key in /home/user/.ssh/known_hosts:53&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 21&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: set_newkeys: mode 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: rekey after 134217728 blocks&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 21&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: set_newkeys: mode 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: rekey after 134217728 blocks&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Will attempt key: /home/user/.ssh/id_rsa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Will attempt key: /home/user/.ssh/id_dsa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Will attempt key: /home/user/.ssh/id_ecdsa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Will attempt key: /home/user/.ssh/id_ed25519&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Will attempt key: /home/user/.ssh/id_xmss&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: pubkey_prepare: done&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 5&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 7&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: SSH2_MSG_EXT_INFO received&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: kex_input_ext_info: server-sig-algs=&amp;lt;ssh-ed25519,ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: service_accept: ssh-userauth&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 50&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 51&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Authentications that can continue: publickey,password&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: start over, passed a different list publickey,password&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: preferred publickey,keyboard-interactive,password&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: authmethod_lookup publickey&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: authmethod_is_enabled publickey&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Next authentication method: publickey&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Trying private key: /home/user/.ssh/id_rsa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: no such identity: /home/user/.ssh/id_rsa: No such file or directory&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Trying private key: /home/user/.ssh/id_dsa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: no such identity: /home/user/.ssh/id_dsa: No such file or directory&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Trying private key: /home/user/.ssh/id_ecdsa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: no such identity: /home/user/.ssh/id_ecdsa: No such file or directory&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Trying private key: /home/user/.ssh/id_ed25519&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: no such identity: /home/user/.ssh/id_ed25519: No such file or directory&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Trying private key: /home/user/.ssh/id_xmss&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: no such identity: /home/user/.ssh/id_xmss: No such file or directory&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: we did not send a packet, disable method&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: authmethod_lookup password&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: remaining preferred: ,password&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: authmethod_is_enabled password&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Next authentication method: password&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; root@10.1.1.2's password:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 50&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: we sent a password packet, wait for reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 52&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Authentication succeeded (password).&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authenticated to 10.1.1.2 ([10.1.1.2]:22).&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: channel 0: new [client-session]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: ssh_session2_open: channel_new: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel 0: send open&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 90&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Requesting no-more-sessions@openssh.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Entering interactive session.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: pledge: network&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 91&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel_input_open_confirmation: channel 0: callback start&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: fd 3 setting TCP_NODELAY&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: ssh_packet_set_tos: set IP_TOS 0x48&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: client_session2_setup: id 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel 0: request pty-req confirm 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 98&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel 0: request shell confirm 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 98&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel_input_open_confirmation: channel 0: callback done&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel 0: open confirm rwindow 0 rmax 32768&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 99&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel_input_status_confirm: type 99 id 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: PTY allocation request accepted on channel 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel 0: rcvd adjust 2097152&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 99&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel_input_status_confirm: type 99 id 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: shell request accepted on channel 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Linux kali 4.9.0-9-amd64 #1 SMP Debian 4.9.168-1 (2019-04-12) x86_64&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; The programs included with the Debian GNU/Linux system are free software;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; the exact distribution terms for each program are described in the&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; individual files in /usr/share/doc/*/copyright.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permitted by applicable law.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Last login: Fri May 24 15:54:27 2019 from 10.128.108.39&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;[...random commands...]&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;debug3: send packet: type 80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Connection reset by 10.1.1.2 port 22&lt;/P&gt;</description>
    <pubDate>Fri, 24 May 2019 14:26:08 GMT</pubDate>
    <dc:creator>an.schall</dc:creator>
    <dc:date>2019-05-24T14:26:08Z</dc:date>
    <item>
      <title>SSH connection drops randomly</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh-connection-drops-randomly/m-p/262191#M74303</link>
      <description>&lt;P&gt;An SSH connection to a particular server drops randomly (usually 20-60 seconds after login). Between the client and the server is a Palo Alto firewall with SSH decryption disabled.&lt;/P&gt;&lt;P&gt;What I tried so far&lt;/P&gt;&lt;P&gt;&amp;nbsp;- regenerated ssh keys on the server&lt;BR /&gt;&amp;nbsp;- added to server config:&lt;BR /&gt;&amp;nbsp;ClientAliveInterval 30&lt;BR /&gt;&amp;nbsp;ClientAliveCountMax 5&lt;BR /&gt;&amp;nbsp;- added `ServerAliveInterval=10` to ssh command&lt;BR /&gt;&amp;nbsp;- added `ServerKeepAlive=true` to ssh command&lt;BR /&gt;&amp;nbsp;- tried various ssh clients&lt;/P&gt;&lt;P&gt;Nothing worked so far. Notice the debug3: send packet: type 80 and debug3: send packet: type 1 messages just at the moment before/ after the connection is dropped. The firewall logs the SSH session and the termination reason is "tcp-rst-from-client".&lt;/P&gt;&lt;P&gt;Here's a log of a representative SSH session, terminated ~15 seconds after login:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; user@nb ~/.ssh&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; $ ssh -vvvvv -o ServerAliveInterval=10 root@10.1.1.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; OpenSSH_7.9p1, OpenSSL 1.0.2r&amp;nbsp; 26 Feb 2019&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: resolve_canonicalize: hostname 10.1.1.2 is address&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: ssh_connect_direct&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Connecting to 10.1.1.2 [10.1.1.2] port 22.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Connection established.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_rsa type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_rsa-cert type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_dsa type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_dsa-cert type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_ecdsa type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_ecdsa-cert type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_ed25519 type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_ed25519-cert type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_xmss type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: identity file /home/user/.ssh/id_xmss-cert type -1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Local version string SSH-2.0-OpenSSH_7.9&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Remote protocol version 2.0, remote software version OpenSSH_7.4p1 Debian-10+deb9u6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: match: OpenSSH_7.4p1 Debian-10+deb9u6 pat OpenSSH_7.0*,OpenSSH_7.1*,OpenSSH_7.2*,OpenSSH_7.3*,OpenSSH_7.4*,OpenSSH_7.5*,OpenSSH_7.6*,OpenSSH_7.7* compat 0x04000002&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: fd 3 setting O_NONBLOCK&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Authenticating to 10.1.1.2:22 as 'root'&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: hostkeys_foreach: reading file "/home/user/.ssh/known_hosts"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: record_hostkey: found key type ECDSA in file /home/user/.ssh/known_hosts:53&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: load_hostkeys: loaded 1 keys from 10.1.1.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: order_hostkeyalgs: prefer hostkeyalgs: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 20&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: SSH2_MSG_KEXINIT sent&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 20&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: SSH2_MSG_KEXINIT received&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: local client KEXINIT proposal&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1,ext-info-c&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: host key algorithms: ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-ed25519-cert-v01@openssh.com,rsa-sha2-512-cert-v01@openssh.com,rsa-sha2-256-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,rsa-sha2-512,rsa-sha2-256,ssh-rsa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: compression ctos: none,zlib@openssh.com,zlib&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: compression stoc: none,zlib@openssh.com,zlib&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: languages ctos:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: languages stoc:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: first_kex_follows 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: reserved 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: peer server KEXINIT proposal&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: KEX algorithms: curve25519-sha256,curve25519-sha256@libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,diffie-hellman-group14-sha1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: host key algorithms: ssh-rsa,rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: ciphers ctos: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: ciphers stoc: chacha20-poly1305@openssh.com,aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: MACs ctos: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: MACs stoc: umac-64-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-sha2-512-etm@openssh.com,hmac-sha1-etm@openssh.com,umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: compression ctos: none,zlib@openssh.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: compression stoc: none,zlib@openssh.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: languages ctos:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: languages stoc:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: first_kex_follows 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: reserved 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: kex: algorithm: curve25519-sha256&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: kex: host key algorithm: ecdsa-sha2-nistp256&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: kex: server-&amp;gt;client cipher: chacha20-poly1305@openssh.com MAC: &amp;lt;implicit&amp;gt; compression: none&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: kex: client-&amp;gt;server cipher: chacha20-poly1305@openssh.com MAC: &amp;lt;implicit&amp;gt; compression: none&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 30&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: expecting SSH2_MSG_KEX_ECDH_REPLY&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 31&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Server host key: ecdsa-sha2-nistp256 SHA256:xm9dqhSATd266dL4vmr1yMrdvJ7HFlMXx8tZSn4I7Pc&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: hostkeys_foreach: reading file "/home/user/.ssh/known_hosts"&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: record_hostkey: found key type ECDSA in file /home/user/.ssh/known_hosts:53&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: load_hostkeys: loaded 1 keys from 10.1.1.2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Host '10.1.1.2' is known and matches the ECDSA host key.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Found key in /home/user/.ssh/known_hosts:53&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 21&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: set_newkeys: mode 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: rekey after 134217728 blocks&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: SSH2_MSG_NEWKEYS sent&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: expecting SSH2_MSG_NEWKEYS&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 21&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: SSH2_MSG_NEWKEYS received&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: set_newkeys: mode 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: rekey after 134217728 blocks&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Will attempt key: /home/user/.ssh/id_rsa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Will attempt key: /home/user/.ssh/id_dsa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Will attempt key: /home/user/.ssh/id_ecdsa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Will attempt key: /home/user/.ssh/id_ed25519&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Will attempt key: /home/user/.ssh/id_xmss&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: pubkey_prepare: done&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 5&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 7&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: SSH2_MSG_EXT_INFO received&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: kex_input_ext_info: server-sig-algs=&amp;lt;ssh-ed25519,ssh-rsa,ssh-dss,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521&amp;gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: service_accept: ssh-userauth&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: SSH2_MSG_SERVICE_ACCEPT received&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 50&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 51&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Authentications that can continue: publickey,password&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: start over, passed a different list publickey,password&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: preferred publickey,keyboard-interactive,password&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: authmethod_lookup publickey&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: remaining preferred: keyboard-interactive,password&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: authmethod_is_enabled publickey&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Next authentication method: publickey&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Trying private key: /home/user/.ssh/id_rsa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: no such identity: /home/user/.ssh/id_rsa: No such file or directory&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Trying private key: /home/user/.ssh/id_dsa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: no such identity: /home/user/.ssh/id_dsa: No such file or directory&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Trying private key: /home/user/.ssh/id_ecdsa&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: no such identity: /home/user/.ssh/id_ecdsa: No such file or directory&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Trying private key: /home/user/.ssh/id_ed25519&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: no such identity: /home/user/.ssh/id_ed25519: No such file or directory&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Trying private key: /home/user/.ssh/id_xmss&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: no such identity: /home/user/.ssh/id_xmss: No such file or directory&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: we did not send a packet, disable method&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: authmethod_lookup password&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: remaining preferred: ,password&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: authmethod_is_enabled password&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Next authentication method: password&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; root@10.1.1.2's password:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 50&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: we sent a password packet, wait for reply&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 52&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Authentication succeeded (password).&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Authenticated to 10.1.1.2 ([10.1.1.2]:22).&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: channel 0: new [client-session]&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: ssh_session2_open: channel_new: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel 0: send open&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 90&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Requesting no-more-sessions@openssh.com&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: Entering interactive session.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: pledge: network&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug1: client_input_global_request: rtype hostkeys-00@openssh.com want_reply 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 91&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel_input_open_confirmation: channel 0: callback start&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: fd 3 setting TCP_NODELAY&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: ssh_packet_set_tos: set IP_TOS 0x48&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: client_session2_setup: id 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel 0: request pty-req confirm 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 98&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel 0: request shell confirm 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 98&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel_input_open_confirmation: channel 0: callback done&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel 0: open confirm rwindow 0 rmax 32768&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 99&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel_input_status_confirm: type 99 id 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: PTY allocation request accepted on channel 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel 0: rcvd adjust 2097152&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: receive packet: type 99&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: channel_input_status_confirm: type 99 id 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug2: shell request accepted on channel 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Linux kali 4.9.0-9-amd64 #1 SMP Debian 4.9.168-1 (2019-04-12) x86_64&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; The programs included with the Debian GNU/Linux system are free software;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; the exact distribution terms for each program are described in the&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; individual files in /usr/share/doc/*/copyright.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; permitted by applicable law.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Last login: Fri May 24 15:54:27 2019 from 10.128.108.39&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;[...random commands...]&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;debug3: send packet: type 80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; debug3: send packet: type 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Connection reset by 10.1.1.2 port 22&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2019 14:26:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh-connection-drops-randomly/m-p/262191#M74303</guid>
      <dc:creator>an.schall</dc:creator>
      <dc:date>2019-05-24T14:26:08Z</dc:date>
    </item>
    <item>
      <title>Re: SSH connection drops randomly</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssh-connection-drops-randomly/m-p/262198#M74304</link>
      <description>&lt;P&gt;One more information: I did a packet capture on the firewall to get more detailled information. I created all 4 packets capture stages (receive, transmit, drop and firewall). During an SSH session which gets disconnected as described above, the firewall also logs packets that are being dropped. Opening the pcap file that include the dropped packages, it becomes obvious that the capture includes only HSRPv2 type packets with Info: "Hello (state Active)" or "Hello (state Standby)". Could this be a layer 2 problem?&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2019 15:09:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssh-connection-drops-randomly/m-p/262198#M74304</guid>
      <dc:creator>an.schall</dc:creator>
      <dc:date>2019-05-24T15:09:08Z</dc:date>
    </item>
  </channel>
</rss>

