Firewall Issues - ssh_dispatch_run_fatal errors during SSH

Just upgraded to Sequoia and noticed a lot of issues with the firewall while using ssh.


After ssh'ing into a local server on my network, after a few minutes I get this error:


Bad packet length 2489765067.

ssh_dispatch_run_fatal: Connection to 192.168.30.2 port 22: Connection corrupted


I can trigger it by ssh'ing into pretty much any server or computer on my network and then executing a command like:


ping google.com


within 10 - 30 seconds, the connection drops.


Happens with IPv4 and IPv6. Happens with Terminal and iTerm apps.


Disabling the firewall fixes the issue. In this case, my Mac is running statically in my local network and safely behind an upstream firewall. So, it's annoying to have to disable the firewall every time I have to ssh in anywhere, but not the end of the world. Obviously, that isn't a long term fix, however.


Anyone else seeing similar?

Mac Studio

Posted on Sep 17, 2024 6:35 PM

Reply
Question marked as Top-ranking reply

Posted on Oct 6, 2024 6:28 PM

Whilst this is true that Apple cannot fix the problem caused by others, however, this issue should not be ignored. MacOS 15.0.x borks TCP connections. See Little Snitch blog about Sequoia on TCP, Firewall issues https://obdev.at/blog/should-i-upgrade-to-macos-sequoia-now/


Disabling all third-party Network Filters will alleviate the issue temporarily (until, hopefully a fix on 15.1). macOS Firewall set to **block** all incoming connections (with the exception of some internal processes) works for me as well (you can set this to allow all and fine-tune the setting per third-party application).


As for VPN, well, I use Firefox connected to VPN via Windscribe and it works, so far so good. I have yet to run a VPN for all network connections, perhaps I will do this soon to test.


MacOS 15.0 is new, let's give Apple time to fix it -- also hoping that beta testers report this bug. As for us, let's continue filing bug reports, the more, the better, so Apple gets to prioritize it.


For the meantime, if you are from corporate IT, it is your responsibility to evaluate and certify new software before your users are allowed to download and install it. And if a user installs Sequoia, knowing that there is this bug AND if it is mission critical, then get them to revert back to macOS 14. :)


78 replies

Sep 19, 2024 1:48 PM in response to etresoft

So with respect, security is a layered architecture. The default MacOS firewall, while less than optimal for many reasons and uses; still DOES block by default most inbound connections at a minimum. I too personally use Little Snitch as I want way more security than the default provides; however having this as a base doesn't hurt.


That being said, there's another issue here. Many companies REQUIRE that filter to be enabled as part of security profile; or other things are disallowed. So in those cases you're ****** if you do and ****** if you don't ;) I am probably gonna have to revert to a previous backup tonight to get back to functionality.

Sep 19, 2024 1:53 PM in response to sandinak

So with respect, security is a layered architecture. The default MacOS firewall, while less than optimal for many reasons and uses; still DOES block by default most inbound connections at a minimum. I too personally use Little Snitch as I want way more security than the default provides; however having this as a base doesn't hurt.


That being said, there's another issue here. Many companies REQUIRE the Firewall to be enabled as part of security profile; or other things are disallowed. So in those cases you're ****** if you do and ****** if you don't ;) I am probably gonna have to revert to a previous backup tonight to get back to functionality.

Sep 19, 2024 2:22 PM in response to sandinak

sandinak wrote:

The default MacOS firewall, while less than optimal for many reasons and uses; still DOES block by default most inbound connections at a minimum.

The default firewall configuration allows any built-in app, and any 3rd party signed app, to accept incoming connections. It doesn't block anything. In some versions, if you manually change settings to block software, it will just change it back to allow. But assuming you have a version that works, then it is only going to block local connections, like from your printer or other computers in your house. For the vast majority of users, no outside connection is going to make it past their modem in the first place.

That being said, there's another issue here. Many companies REQUIRE that filter to be enabled as part of security profile; or other things are disallowed. So in those cases you're ****** if you do and ****** if you don't ;) I am probably gonna have to revert to a previous backup tonight to get back to functionality.

This is a user-to-user support forum for consumer users. Companies typically have all kinds of specialized configurations and software that we don't have and can't support.

Sep 20, 2024 5:14 AM in response to lolaunderthegate

lolaunderthegate wrote:

For those of you bypassing by disabling the firewall -- that's not a practical solution for enterprise users who either should not or cannot disable firewall.

Just for clarification. I understand if you have some corporate policy that requires the firewall. You probably also have some corporate policy to install antivirus and key loggers. Corporate IT is hilariously incompetent.


But we don't work for your company. We can't fix those policies. All we can fix are your Mac problems.

Sep 30, 2024 4:08 AM in response to mikeloiterman

I came on to post a different question, but thought this post was potentially relevant.


I factory reset to Sonoma and upgraded to Sequoia yesterday. I before started adding anything, I was updating the settings, layouts, folders etc to make sure things are how I like it to be.


For some reason a few folders and items have been added to my shared folder - which I've never seen before. I don't think I've had anything in my shared folder before. (it might've always been there and that I wasn't observant/forgot)


So the new folder/items that have been put there are:


'/Users/Shared/Relocated Items/Configuration/private/etc/ssh.system_default'


Inside the ssh.system_default folder there is:


  • crypto.conf symlink
  • crypto/
    • apple.conf
    • fips.conf
  • ssh_config.d/
    • 100-macos.conf
  • sshd_config.d
    • 100-macos.conf
  • moduli
  • ssh_config
  • sshd_config


Again, this could be absolutely fine/normal, but I was coming on here to ask if it was and saw this thread about ssh issues, so decided to message here first to see if maybe this is what's causing an issue for you?




Oct 20, 2024 12:24 PM in response to SamWantsYouToChill

My issue may be somewhat different from this original issue posted here. I had a web page that would only open about 1/2 of the time (happened several times a day). After trying all settings I found another link from another user indicating it may be related to having both ethernet and WiFi on at the same time (service order has ethernet first). But after turning off WiFI no more web page loading issues for the last two days so I'm keeping my fingers crossed. Never had this issue prior to Sequoia 15.0.1

Oct 29, 2024 7:36 AM in response to mikeloiterman

So, I upgraded to 15.1 today in the morning, and got the issue again a few hours later. Told you... don't celebrate way too early:


$ ping 192.168.1.1
64 bytes from 192.168.1.1: icmp_seq=0 ttl=64 time=430.883 ms
Request timeout for icmp_seq 1
64 bytes from 192.168.1.1: icmp_seq=1 ttl=64 time=1191.281 ms
64 bytes from 192.168.1.1: icmp_seq=2 ttl=64 time=218.189 ms
64 bytes from 192.168.1.1: icmp_seq=3 ttl=64 time=0.737 ms
64 bytes from 192.168.1.1: icmp_seq=4 ttl=64 time=0.756 ms
64 bytes from 192.168.1.1: icmp_seq=5 ttl=64 time=0.681 ms
64 bytes from 192.168.1.1: icmp_seq=6 ttl=64 time=0.896 ms
64 bytes from 192.168.1.1: icmp_seq=7 ttl=64 time=0.834 ms
64 bytes from 192.168.1.1: icmp_seq=8 ttl=64 time=987.689 ms
64 bytes from 192.168.1.1: icmp_seq=9 ttl=64 time=0.573 ms
64 bytes from 192.168.1.1: icmp_seq=10 ttl=64 time=924.024 ms
64 bytes from 192.168.1.1: icmp_seq=11 ttl=64 time=43.525 ms
64 bytes from 192.168.1.1: icmp_seq=12 ttl=64 time=0.605 ms
64 bytes from 192.168.1.1: icmp_seq=13 ttl=64 time=0.518 ms
64 bytes from 192.168.1.1: icmp_seq=14 ttl=64 time=0.711 ms
64 bytes from 192.168.1.1: icmp_seq=15 ttl=64 time=0.736 ms
64 bytes from 192.168.1.1: icmp_seq=16 ttl=64 time=0.686 ms
64 bytes from 192.168.1.1: icmp_seq=17 ttl=64 time=0.666 ms
64 bytes from 192.168.1.1: icmp_seq=18 ttl=64 time=0.711 ms
64 bytes from 192.168.1.1: icmp_seq=19 ttl=64 time=663.760 ms
64 bytes from 192.168.1.1: icmp_seq=20 ttl=64 time=0.743 ms
64 bytes from 192.168.1.1: icmp_seq=21 ttl=64 time=0.752 ms
Request timeout for icmp_seq 23
64 bytes from 192.168.1.1: icmp_seq=22 ttl=64 time=2362.481 ms
64 bytes from 192.168.1.1: icmp_seq=23 ttl=64 time=1357.555 ms
64 bytes from 192.168.1.1: icmp_seq=24 ttl=64 time=350.827 ms
64 bytes from 192.168.1.1: icmp_seq=25 ttl=64 time=0.721 ms
64 bytes from 192.168.1.1: icmp_seq=26 ttl=64 time=0.798 ms
64 bytes from 192.168.1.1: icmp_seq=27 ttl=64 time=0.676 ms
64 bytes from 192.168.1.1: icmp_seq=28 ttl=64 time=0.782 ms


Turning off the firewall helped... but didn't completely fix the problem. We're still where we are. You may or may not get the issue based on the things I explained in my first post here.


I wasn't too hopeful because the release notes didn't contain any networking fixes. Square one again.

Oct 29, 2024 8:28 AM in response to tgarons

tgarons wrote:

The issue in this thread is ssh_dispatch_run_fatal errors during SSH. 15.1 fixes that.

No, it doesn't. You not facing it within a few hours doesn't mean it doesn't happen. Please stick to sound logic principles, and give it a few weeks at least. There's no way you could rule out the issue in one day. It doesn't help. Again, the internet is flooded with complaints about timeouts and connectivity, and everyone thinks it's fixed, until they get the issue again. The least we can do is be patient.

Oct 29, 2024 1:46 PM in response to mikeloiterman

Quick update, I am member of an large company internal mailing list where we've been discussing this extensively. The new 15.1 does seem to improve the performance relative to this problem; but does NOT fix it. People are seeing issues over time that seem to mimic the existing behavior that's been problematic. I have more or less decided NOT to upgrade to 15 unless/until forced by my company; and for personal and stage use ( I work on traveling shows ) we will definitely NOT be upgrading until this issue is dealt with.


Love you Apple.. you know I do given how much buyin I have; but this is the line. We really REALLY need to hear this will be addressed long term. If I can't trust the system to have consistent networking on a closed network on stage moving low-mid level traffic .. I will have to move to other solutions. Thanks in advance

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Firewall Issues - ssh_dispatch_run_fatal errors during SSH

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.