connection reset by peer

Discussion in 'ISPConfig 3 Priority Support' started by conductive, Dec 17, 2025 at 12:57 AM.

  1. conductive

    conductive Member HowtoForge Supporter

    Attempting Debian 12 NGINX auto install and keep getting Connection reset by peer. Fresh install setup hosts, hostname and configured network/interfaces for 5 IP addresses.

    wget -O - https://get.ispconfig.org | sh -s -- --use-nginx --use-ftp-ports=40110-40210 --unattended-upgrades
    .
    .
    .
    [INFO] Installed packages dovecot-imapd, dovecot-pop3d, dovecot-mysql, dovecot-sieve, dovecot-managesieved, dovecot-lmtpd
    [INFO] Generating MySQL password.
    [INFO] Writing MySQL config files.
    [INFO] Configuring postfix.
    [INFO] Restarting postfix
    [INFO] Configuring rkhunter.
    [INFO] Installing packages software-properties-common, update-inetd, dnsutils, resolvconf, clamav, clamav-daemon, zip, unzip, bzip2, xz-utils, lzip, borgbackup, arj, nomarch, lzop, cabextract, apt-listchanges, libnet-ldap-perl, libauthen-sasl-perl, daemon, libio-string-perl, libio-socket-ssl-perl, libnet-ident-perl, libnet-dns-perl, libdbd-mysql-perl, bind9, rspamd, redis-server, postgrey, p7zip, p7zip-full, unrar-free, lrzip
    Read from remote host 204.12.225.98: Connection reset by peer
    Connection to 204.12.225.98 closed.
    client_loop: send disconnect: Broken pipe
     
  2. till

    till Super Moderator Staff Member ISPConfig Developer

    Here a few hints on that from ChatGPT:

     
    remkoh likes this.
  3. conductive

    conductive Member HowtoForge Supporter

    Lots of logs. Not sure exactly what is relevant.
    -----------------------------------------------------------------------------------------
    root@mr1:/# journalctl -u ssh --since "30 min ago" --no-pager
    Dec 17 09:45:51 mr1 systemd[1]: Starting ssh.service - OpenBSD Secure Shell server...
    Dec 17 09:45:51 mr1 sshd[576]: Server listening on 0.0.0.0 port 22.
    Dec 17 09:45:51 mr1 sshd[576]: Server listening on :: port 22.
    Dec 17 09:45:51 mr1 systemd[1]: Started ssh.service - OpenBSD Secure Shell server.
    Dec 17 09:46:03 mr1 sshd[1091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.80.103 user=root
    Dec 17 09:46:05 mr1 sshd[1091]: Failed password for root from 68.183.80.103 port 48630 ssh2
    Dec 17 09:46:06 mr1 sshd[1091]: Connection closed by authenticating user root 68.183.80.103 port 48630 [preauth]
    Dec 17 09:46:31 mr1 sshd[1107]: Invalid user solv from 157.245.210.9 port 55106
    Dec 17 09:46:31 mr1 sshd[1107]: pam_unix(sshd:auth): check pass; user unknown
    Dec 17 09:46:31 mr1 sshd[1107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.210.9
    Dec 17 09:46:33 mr1 sshd[1107]: Failed password for invalid user solv from 157.245.210.9 port 55106 ssh2
    Dec 17 09:46:34 mr1 sshd[1107]: Connection closed by invalid user solv 157.245.210.9 port 55106 [preauth]
    Dec 17 09:46:52 mr1 sshd[1109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.20 user=root
    Dec 17 09:46:55 mr1 sshd[1109]: Failed password for root from 193.46.255.20 port 61934 ssh2
    Dec 17 09:46:58 mr1 sshd[1109]: Failed password for root from 193.46.255.20 port 61934 ssh2
    Dec 17 09:47:01 mr1 sshd[1109]: Failed password for root from 193.46.255.20 port 61934 ssh2
    Dec 17 09:47:01 mr1 sshd[1109]: Received disconnect from 193.46.255.20 port 61934:11: [preauth]
    Dec 17 09:47:01 mr1 sshd[1109]: Disconnected from authenticating user root 193.46.255.20 port 61934 [preauth]
    Dec 17 09:47:01 mr1 sshd[1109]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.20 user=root
    Dec 17 09:47:02 mr1 sshd[1111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.20 user=root
    Dec 17 09:47:04 mr1 sshd[1111]: Failed password for root from 193.46.255.20 port 15404 ssh2
    Dec 17 09:47:08 mr1 sshd[1111]: Failed password for root from 193.46.255.20 port 15404 ssh2
    Dec 17 09:47:12 mr1 sshd[1111]: Failed password for root from 193.46.255.20 port 15404 ssh2
    Dec 17 09:47:13 mr1 sshd[1111]: Received disconnect from 193.46.255.20 port 15404:11: [preauth]
    Dec 17 09:47:13 mr1 sshd[1111]: Disconnected from authenticating user root 193.46.255.20 port 15404 [preauth]
    Dec 17 09:47:13 mr1 sshd[1111]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.20 user=root
    Dec 17 09:47:14 mr1 sshd[1113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.20 user=root
    Dec 17 09:47:16 mr1 sshd[1113]: Failed password for root from 193.46.255.20 port 47762 ssh2
    Dec 17 09:47:20 mr1 sshd[1113]: Failed password for root from 193.46.255.20 port 47762 ssh2
    Dec 17 09:47:24 mr1 sshd[1113]: Failed password for root from 193.46.255.20 port 47762 ssh2
    Dec 17 09:47:25 mr1 sshd[1113]: Received disconnect from 193.46.255.20 port 47762:11: [preauth]
    Dec 17 09:47:25 mr1 sshd[1113]: Disconnected from authenticating user root 193.46.255.20 port 47762 [preauth]
    Dec 17 09:47:25 mr1 sshd[1113]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.20 user=root
    Dec 17 09:48:05 mr1 sshd[1115]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.128.112.74 user=root
    Dec 17 09:48:06 mr1 sshd[1115]: Failed password for root from 78.128.112.74 port 50204 ssh2
    Dec 17 09:48:09 mr1 sshd[1115]: Connection closed by authenticating user root 78.128.112.74 port 50204 [preauth]
    Dec 17 09:48:33 mr1 sshd[1117]: Invalid user solv from 157.245.210.9 port 55462
    Dec 17 09:48:33 mr1 sshd[1117]: pam_unix(sshd:auth): check pass; user unknown
    Dec 17 09:48:33 mr1 sshd[1117]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.210.9
    Dec 17 09:48:36 mr1 sshd[1117]: Failed password for invalid user solv from 157.245.210.9 port 55462 ssh2
    Dec 17 09:48:36 mr1 sshd[1117]: Connection closed by invalid user solv 157.245.210.9 port 55462 [preauth]
    Dec 17 09:49:20 mr1 sshd[1119]: Invalid user admin from 139.19.117.197 port 57868
    Dec 17 09:49:20 mr1 sshd[1119]: userauth_pubkey: signature algorithm ssh-rsa not in PubkeyAcceptedAlgorithms [preauth]
    Dec 17 09:49:24 mr1 sshd[1121]: Invalid user from 64.62.156.223 port 48947
    Dec 17 09:49:28 mr1 sshd[1121]: Connection closed by invalid user 64.62.156.223 port 48947 [preauth]
    Dec 17 09:49:30 mr1 sshd[1119]: Connection closed by invalid user admin 139.19.117.197 port 57868 [preauth]
    Dec 17 09:49:52 mr1 sshd[1123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.140.17.124 user=root
    Dec 17 09:49:53 mr1 sshd[1123]: Failed password for root from 45.140.17.124 port 45760 ssh2
    Dec 17 09:49:55 mr1 sshd[1123]: Connection reset by authenticating user root 45.140.17.124 port 45760 [preauth]
    Dec 17 09:50:34 mr1 sshd[1125]: Invalid user solv from 157.245.210.9 port 51168
    Dec 17 09:50:34 mr1 sshd[1125]: pam_unix(sshd:auth): check pass; user unknown
    Dec 17 09:50:34 mr1 sshd[1125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.210.9
    Dec 17 09:50:36 mr1 sshd[1125]: Failed password for invalid user solv from 157.245.210.9 port 51168 ssh2
    Dec 17 09:50:37 mr1 sshd[1125]: Connection closed by invalid user solv 157.245.210.9 port 51168 [preauth]
    Dec 17 09:51:58 mr1 sshd[1128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.33 user=root
    Dec 17 09:52:00 mr1 sshd[1128]: Failed password for root from 193.46.255.33 port 40568 ssh2
    Dec 17 09:52:03 mr1 sshd[1128]: Failed password for root from 193.46.255.33 port 40568 ssh2
    Dec 17 09:52:06 mr1 sshd[1128]: Failed password for root from 193.46.255.33 port 40568 ssh2
    Dec 17 09:52:08 mr1 sshd[1128]: Received disconnect from 193.46.255.33 port 40568:11: [preauth]
    Dec 17 09:52:08 mr1 sshd[1128]: Disconnected from authenticating user root 193.46.255.33 port 40568 [preauth]
    Dec 17 09:52:08 mr1 sshd[1128]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.33 user=root
    Dec 17 09:52:09 mr1 sshd[1130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.33 user=root
    Dec 17 09:52:11 mr1 sshd[1130]: Failed password for root from 193.46.255.33 port 42250 ssh2
    Dec 17 09:52:13 mr1 sshd[1132]: error: kex_exchange_identification: read: Connection reset by peer
    Dec 17 09:52:13 mr1 sshd[1132]: Connection reset by 192.227.134.84 port 44318
    Dec 17 09:52:15 mr1 sshd[1130]: Failed password for root from 193.46.255.33 port 42250 ssh2
    Dec 17 09:52:18 mr1 sshd[1130]: Failed password for root from 193.46.255.33 port 42250 ssh2
    Dec 17 09:52:18 mr1 sshd[1130]: Received disconnect from 193.46.255.33 port 42250:11: [preauth]
    Dec 17 09:52:18 mr1 sshd[1130]: Disconnected from authenticating user root 193.46.255.33 port 42250 [preauth]
    Dec 17 09:52:18 mr1 sshd[1130]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.33 user=root
    Dec 17 09:52:19 mr1 sshd[1133]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.33 user=root
    Dec 17 09:52:21 mr1 sshd[1133]: Failed password for root from 193.46.255.33 port 29134 ssh2
    Dec 17 09:52:23 mr1 sshd[1133]: Failed password for root from 193.46.255.33 port 29134 ssh2
    Dec 17 09:52:27 mr1 sshd[1133]: Failed password for root from 193.46.255.33 port 29134 ssh2
    Dec 17 09:52:29 mr1 sshd[1133]: Received disconnect from 193.46.255.33 port 29134:11: [preauth]
    Dec 17 09:52:29 mr1 sshd[1133]: Disconnected from authenticating user root 193.46.255.33 port 29134 [preauth]
    Dec 17 09:52:29 mr1 sshd[1133]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.46.255.33 user=root
    Dec 17 09:52:32 mr1 sshd[1135]: Invalid user solv from 157.245.210.9 port 50054
    Dec 17 09:52:32 mr1 sshd[1135]: pam_unix(sshd:auth): check pass; user unknown
    Dec 17 09:52:32 mr1 sshd[1135]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.210.9
     
  4. till

    till Super Moderator Staff Member ISPConfig Developer

    How much RAM does your server have? How much free hard disk space? If you have an unstable internet connection, you can use Linux programs like 'screen' to run your Linux session so that it does not get interrupted by network disconnects.
     
  5. conductive

    conductive Member HowtoForge Supporter

    Processor 2x Quad-Core Opteron 2373 EE
    Ram 32 GiB
    Operating System Debian 12 Bookworm
    Disk 256 GB 2 TB 0 MB

    I used tmux last time
     
  6. conductive

    conductive Member HowtoForge Supporter

    Original interfaces file:
    # This file describes the network interfaces available on your system
    # and how to activate them. For more information, see interfaces(5).
    source /etc/network/interfaces.d/*
    # The loopback network interface
    auto lo
    iface lo inet loopback

    # The primary network interface
    allow-hotplug enp2s0
    iface enp2s0 inet static
    address XXX.12.225.98/29
    gateway XXX.12.225.97

    # dns-* options are implemented by the resolvconf package, if installed
    dns-nameservers 8.8.8.8
    dns-search nocix.net


    Changed network interfaces to this for multiple IP addresses
    to something like this:

    # This file describes the network interfaces available on your system
    # and how to activate them. For more information, see interfaces(5).

    source /etc/network/interfaces.d/*

    # The loopback network interface
    auto lo
    iface lo inet loopback

    # The primary network interface
    allow-hotplug enp2s0
    iface enp2s0 inet static
    address XXX.12.225.98
    netmask 255.255.255.248
    network XXX.12.225.96
    broadcast XXX.12.225.103
    gateway 204.12.225.97

    # dns-* options are implemented by the resolvconf package, if installed
    #dns-nameservers 8.8.8.8
    # dns-search nocix.net

    # The second network interface
    iface enp2s0:1 inet static
    address XXX.12.225.99
    netmask 255.255.255.248
    network XXX.12.225.96
    broadcast XXX.12.225.103
     
  7. conductive

    conductive Member HowtoForge Supporter

    [INFO] (Re)starting Bind.
    [INFO] Disabling spamassassin daemon.
    [ERROR] Exception occurred: ISPConfigOSException -> Command resolvconf -u 2>&1 failed. (/ispconfig.ai.php:15)
     
  8. till

    till Super Moderator Staff Member ISPConfig Developer

    Which error do you get when you run the command?

    resolvconf -u
     

Share This Page