Subject: Re: ssh and key_verify failed for server_host_key
To: Sean Doran <smd@ebone.net>
From: gabriel rosenkoetter <gr@eclipsed.net>
List: current-users
Date: 05/05/2001 07:08:18
On Thu, May 03, 2001 at 05:47:35PM +0200, Sean Doran wrote:
> debug1: Remote protocol version 1.99, remote software version OpenSSH_2.5.4 NetBSD_Secure_Shell-20010410
> debug1: match: OpenSSH_2.5.4 NetBSD_Secure_Shell-20010410 pat ^OpenSSH
> Enabling compatibility mode for protocol 2.0
> debug1: Local version string SSH-2.0-OpenSSH_2.5.4 NetBSD_Secure_Shell-20010410
> debug1: SSH2_MSG_KEXINIT sent
> debug1: SSH2_MSG_KEXINIT received
> debug1: kex: server->client aes128-cbc hmac-md5 zlib
> debug1: kex: client->server aes128-cbc hmac-md5 zlib
> debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
> debug1: dh_gen_key: priv key bits set: 130/256
> debug1: bits set: 491/1024
> debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
> debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
> debug1: Host 'XXXXXXXXXXXXX' is known and matches the DSA host key.
> debug1: Found key in /u/smd/.ssh/known_hosts2:3
> debug1: bits set: 549/1024
> debug1: len 55 datafellows 0
> debug1: ssh_dss_verify: signature incorrect
> key_verify failed for server_host_key
> debug1: Calling cleanup 0x805bfdc(0x0)

What is "Cipher" set to in the client's ssh.conf?

What is "Ciphers" set to in the server's {sshd.conf,sshd_config}?

(I've had trouble getting the default cipher, aes128-cbc, to work
from OpenSSH >= 2.5.2 to any OpenSSH < 2.5.2... which is a switch
from the old situation, in which OpenSSH < 2.5.2 had a vaguely
similar interoperation problem with SSH.com's ssh2. Forcing
everybody to use (or at least default to) blowfish-cbc seemed to
make things happy for me. But this was with a Solaris pre-2.5.2
server and a Linux 2.5.2p2 client, so your mileage may vary.)

       ~ g r @ eclipsed.net