Bugzilla – Attachment 2292 Details for
Bug 2115
Support for DSA p=2048 q=256/224 bit keys
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
sshd debug mode-connection failure with bad sig size error while using 2048 bit DSA keys
file_2115.txt (text/plain), 1.10 KB, created by
Cipher
on 2013-06-03 17:49:32 AEST
(
hide
)
Description:
sshd debug mode-connection failure with bad sig size error while using 2048 bit DSA keys
Filename:
MIME Type:
Creator:
Cipher
Created:
2013-06-03 17:49:32 AEST
Size:
1.10 KB
patch
obsolete
>SSHD Debug mode > >Server listening on 0.0.0.0 port 22. >debug1: Bind to port 22 on ::. >Server listening on :: port 22. >debug1: Server will not fork when running in debugging mode. >debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8 >debug1: inetd sockets after dupping: 3, 3 >Connection from 198.14.64.100 port 54130 >debug1: Client protocol version 2.0; client software version OpenSSH_5.5p1 Debian-6+squeeze1 >debug1: match: OpenSSH_5.5p1 Debian-6+squeeze1 pat OpenSSH_5* >debug1: Enabling compatibility mode for protocol 2.0 >debug1: Local version string SSH-2.0-OpenSSH_6.1 >debug1: permanently_set_uid: 101/65534 [preauth] >debug1: list_hostkey_types: ssh-dss [preauth] >debug1: SSH2_MSG_KEXINIT sent [preauth] >debug1: SSH2_MSG_KEXINIT received [preauth] >debug1: kex: client->server aes128-ctr hmac-md5 none [preauth] >debug1: kex: server->client aes128-ctr hmac-md5 none [preauth] >debug1: SSH2_MSG_KEX_DH_GEX_REQUEST received [preauth] >debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent [preauth] >debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT [preauth] >bad sig size 32 32 >mm_answer_sign: key_sign failed >debug1: do_cleanup
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 2115
: 2292