Есть устройство, на нем такая же прошивка которая работает нормально на таких же n-устройств, при попытке подключится по dropbear к usb0 получаю ошибку:
Incoming packet was garbled on description
08:14:11.584557 IP (tos 0x0, ttl 128, id 1155, offset 0, flags [none], proto: UDP (17), length: 242) 10.10.10.11.netbios-dgm > 10.255.255.255.netbios-dgm: UDP, length 214
08:16:44.718896 arp who-has 10.10.10.10 tell 10.10.10.11
08:16:44.719035 arp reply 10.10.10.10 is-at de:5a:fd:5e:b7:e5 (oui Unknown)
08:16:44.719843 IP (tos 0x0, ttl 128, id 1156, offset 0, flags [DF], proto: TCP (6), length: 52) 10.10.10.11.1553 > 10.10.10.10.ssh: S, cksum 0x8b46 (correct), 107253526:107253526(0) win 8192 <mss 1460,nop,wscale 8,nop,nop,sackOK>
08:16:44.720095 IP (tos 0x10, ttl 64, id 0, offset 0, flags [DF], proto: TCP (6), length: 52) 10.10.10.10.ssh > 10.10.10.11.1553: S, cksum 0xadb3 (correct), 2672183154:2672183154(0) ack 107253527 win 5840 <mss 1460,nop,nop,sackOK,nop,wscale 1>
08:16:44.720815 IP (tos 0x0, ttl 128, id 1157, offset 0, flags [DF], proto: TCP (6), length: 40) 10.10.10.11.1553 > 10.10.10.10.ssh: ., cksum 0x050c (correct), 1:1(0) ack 1 win 68
08:16:44.752349 IP (tos 0x10, ttl 64, id 54431, offset 0, flags [DF], proto: TCP (6), length: 1500) 10.10.10.10.ssh > 10.10.10.11.1553: . 1:1461(1460) ack 1 win 2920
08:16:44.754847 IP (tos 0x0, ttl 128, id 1158, offset 0, flags [DF], proto: TCP (6), length: 68) 10.10.10.11.1553 > 10.10.10.10.ssh: P 1:29(28) ack 1461 win 68
08:16:44.755032 IP (tos 0x10, ttl 64, id 54432, offset 0, flags [DF], proto: TCP (6), length: 40) 10.10.10.10.ssh > 10.10.10.11.1553: ., cksum 0xf417 (correct), 1461:1461(0) ack 29 win 2920
08:16:44.755812 IP (tos 0x0, ttl 128, id 1159, offset 0, flags [DF], proto: TCP (6), length: 552) 10.10.10.11.1553 > 10.10.10.10.ssh: P 29:541(512) ack 1461 win 68
08:16:44.755942 IP (tos 0x10, ttl 64, id 54433, offset 0, flags [DF], proto: TCP (6), length: 40) 10.10.10.10.ssh > 10.10.10.11.1553: ., cksum 0xefff (correct), 1461:1461(0) ack 541 win 3456
08:16:44.756043 IP (tos 0x0, ttl 128, id 1160, offset 0, flags [DF], proto: TCP (6), length: 144) 10.10.10.11.1553 > 10.10.10.10.ssh: P 541:645(104) ack 1461 win 68
08:16:44.756151 IP (tos 0x10, ttl 64, id 54434, offset 0, flags [DF], proto: TCP (6), length: 40) 10.10.10.10.ssh > 10.10.10.11.1553: ., cksum 0xef97 (correct), 1461:1461(0) ack 645 win 3456
08:16:44.756315 IP (tos 0x0, ttl 128, id 1161, offset 0, flags [DF], proto: TCP (6), length: 40) 10.10.10.11.1553 > 10.10.10.10.ssh: F, cksum 0xfcd2 (correct), 645:645(0) ack 1461 win 68
08:16:44.770833 IP (tos 0x10, ttl 64, id 54435, offset 0, flags [DF], proto: TCP (6), length: 1500) 10.10.10.10.ssh > 10.10.10.11.1553: . 1461:2921(1460) ack 646 win 3456
08:16:44.772826 IP (tos 0x0, ttl 128, id 1162, offset 0, flags [DF], proto: TCP (6), length: 40) 10.10.10.11.1553 > 10.10.10.10.ssh: R, cksum 0xf75e (correct), 646:646(0) ack 2921 win 0
08:16:44.786901 IP (tos 0x10, ttl 64, id 54436, offset 0, flags [DF], proto: TCP (6), length: 40) 10.10.10.10.ssh > 10.10.10.11.1553: R, cksum 0xe9de (correct), 2921:2921(0) ack 646 win 3456
device usb0 entered promiscuous mode
device usb0 left promiscuous mode
device usb0 entered promiscuous mode
device usb0 left promiscuous mode
ttyS0: 1 input overrun(s)
ttyS0: 4 input overrun(s)
device usb0 entered promiscuous mode
device usb0 left promiscuous mode