Subject: Re: what happened to openssh?
To: None <netbsd-help@netbsd.org>
From: dan radom <dan@radom.org>
List: netbsd-help
Date: 02/18/2002 21:27:47
* Randy Arabie (rrarabie@arabie.org) wrote:
> On Mon, 18 Feb 2002, dan radom wrote:
>
> I'm no ssh expert, and I'm sure I'll be corrected if I'm wrong...
> but here is my shot at this:
>
> > debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
> > debug1: Host 'pluto' is known and matches the RSA host key.
> > debug1: Found key in /home/graffix/.ssh/known_hosts:7
> > debug1: bits set: 1620/3191
>
> That [above] says your sshd has a record of a connection from 'pluto'; there is
> an older public key from pluto in /home/graffix/.ssh/known_hosts
pluto is the sshd machine, and i have recreated all srever ssh hostkeys. in fact i deleted them and let the sshd init script create them as well as generating them by hand using ssh-keygen.
>
> > ssh_rsa_verify: RSA_verify failed: error:04077068:rsa routines:RSA_verify:bad signature
> > debug1: ssh_rsa_verify: signature incorrect
> > key_verify failed for server_host_key
>
> However, for whatever reason, the authentication didn't work. The 'signature'
> passed during handshake didn't "unlock" the public key?
>
> Perhaps 'pluto' is using a new set of keys now. If you 'trust' pluto, you could just delete the record in known_hosts. When you reconnect the client will tell you that 'pluto' is unknown, do you want to trust pluto.
the pluto entry has been removed from the clients known_hosts file.
on another note sshv1 still works, but sshv2 will not using either password or hostkey authentication.
>
> --
> Cheers!
>
> Randy
>
> ================================================================
> Randy Arabie
> GnuPG Key Info --
>
> Fingerprint: 7E25 DFA2 EF72 9551 9C6C 8AA6 6E8C A0F5 7E33 D981
> Key ID: 7C603AEF
> http://www.arabie.org/keys/rrarabie.gnupg
> ================================================================