Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 11 Mar 2000 17:10:07 -0800 (PST)
From:      Kris Kennaway <kris@hub.freebsd.org>
To:        Mathew Kanner <mat@cs.mcgill.ca>
Cc:        freebsd-current@freebsd.org
Subject:   Re: RC3: problems with SSH
Message-ID:  <Pine.BSF.4.21.0003111707060.30315-100000@hub.freebsd.org>
In-Reply-To: <20000311200459.A21231@cs.mcgill.ca>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 11 Mar 2000, Mathew Kanner wrote:

> debug: Received server public key (1152 bits) and host key (1024 bits).

> rsa_public_encrypt() failed

Are you using rsaref? rsaref can't handle keys longer than 1024 bits and
we're not allowed to fix it so it can by the terms of the rsaref license.
Since you're in Canada, you don't need rsaref and should be using the
international version of openssl. See chapter 6.5 in the handbook for a
longer description of the state of play.

> debug: Received server public key (768 bits) and host key (1023 bits).

Since this one succeeded, it strongly suggests thats the problem.

I consider this a bug in openssh that it doesn't realise that it's using
rsaref and give a helpful error message when it gets a key that is too
long.

Kris

----
In God we Trust -- all others must submit an X.509 certificate.
    -- Charles Forsythe <forsythe@alum.mit.edu>



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-current" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0003111707060.30315-100000>