Hi everybody,
thank you very much for your quick reply.
Let me first address Damien's comment. Following some other people's
"trial and errors" around the internet, I have already started to look for
ways to limit the "cipher string", but did not have any success. So far, I
tried using a config file in ~/.ssh/ which specified just a few Ciphers
and MACs. My debug showed that it did not change the packet length, still
1460. Next I took a look at /etc/ssh/sshd_config and noticed that it did
not explicitly specify any Ciphers or MACs, but ssh_config did. I then
copied the few Ciphers and MACs from ssh_config to sshd_config and
restarted sshd. Again, my debug showed that it did not change the packet
length, still 1460. Most likely, I am doing something wrong here, but in
any case I would greatly appreciate it if you could provide me with
instructions how to shorten the "cipher string" length by modifying the
config files.
If I understand Darren correctly, he is concerned that the packet
fragmentation causes fragments to get dropped. From my debug, I can see
that the 1460 byte packet get split into two packets exactly as expected
from the MTU limit. And both packets get sent to the client. The client
then resets the communication. This happens regardless of the type of
client software used, Cygwin, putty, openssh any version, etc. Therefore,
I wonder if Flavien's comment is correct, or, if somehow all ssh clients
expect to reveice the "cipher string" in a single packet. I admit that
this is a wild speculation from someone who hasn't examined the source
code. I just find it remarkable, that all ssh clients I tried show the
same behavior in this case. I hope you know the answer.
-Ernst