From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: ** X-Spam-Status: No, score=2.4 required=5.0 tests=DATE_IN_FUTURE_03_06, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.4 Received: (qmail 27991 invoked from network); 21 Jun 2022 03:01:15 -0000 Received: from 9front.inri.net (168.235.81.73) by inbox.vuxu.org with ESMTPUTF8; 21 Jun 2022 03:01:15 -0000 Received: from mx.sdf.org ([205.166.94.24]) by 9front; Mon Jun 20 22:59:22 -0400 2022 Received: from cirno.Home ([140.190.57.67]) (authenticated (0 bits)) by mx.sdf.org (8.15.2/8.14.5) with ESMTPSA id 25L2xIKk020351 (using TLSv1.2 with cipher ECDHE-RSA-CHACHA20-POLY1305 (256 bits) verified NO) for <9front@9front.org>; Tue, 21 Jun 2022 02:59:19 GMT Message-ID: To: 9front@9front.org From: aeggenberger@sdf.org Date: Tue, 21 Jun 2022 03:05:42 -0500 MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: anonymous progressive firewall-oriented locator Subject: Re: [9front] ssh: read1: eof when trying to connect to servers Reply-To: 9front@9front.org Precedence: bulk That first `g' didn't turn up the expected line, so I followed the rest of the steps and it's working now. Thanks for your help. Was sysupdate refusing to update ssh.c because it was detecting some local change? Quoth ori@eigenstate.org: > Quoth aeggenberger@sdf.org: > > Yes. I did sysupdate first. The output of that command is > > > > 7ca997bf7efdca16416b22488ebc7b70c419fd44 > > and as a final sanity check: > > % g rsa-sha2 /sys/src/cmd/ssh.c > /sys/src/cmd/ssh.c:401: static char rsasha256[] = "rsa-sha2-256"; > > if you don't see rsa-sha2-256: > > bind -ac /dist/plan9front / && git/revert ssh.c > > then, to be 100% sure you're running the right one: > > % cd /sys/src/cmd && rm 6.ssh ssh.6 > % mk ssh.install > > are there any servers that you can log into, or are they > all broken? > > >