Date: Sat, 11 Mar 2000 17:10:07 -0800 (PST) From: Kris Kennaway <kris@hub.freebsd.org> To: Mathew Kanner <mat@cs.mcgill.ca> Cc: freebsd-current@freebsd.org Subject: Re: RC3: problems with SSH Message-ID: <Pine.BSF.4.21.0003111707060.30315-100000@hub.freebsd.org> In-Reply-To: <20000311200459.A21231@cs.mcgill.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 11 Mar 2000, Mathew Kanner wrote: > debug: Received server public key (1152 bits) and host key (1024 bits). > rsa_public_encrypt() failed Are you using rsaref? rsaref can't handle keys longer than 1024 bits and we're not allowed to fix it so it can by the terms of the rsaref license. Since you're in Canada, you don't need rsaref and should be using the international version of openssl. See chapter 6.5 in the handbook for a longer description of the state of play. > debug: Received server public key (768 bits) and host key (1023 bits). Since this one succeeded, it strongly suggests thats the problem. I consider this a bug in openssh that it doesn't realise that it's using rsaref and give a helpful error message when it gets a key that is too long. Kris ---- In God we Trust -- all others must submit an X.509 certificate. -- Charles Forsythe <forsythe@alum.mit.edu> To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-current" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0003111707060.30315-100000>