Re: sshd:cipher_encrypt: bad plaintext length 337 [Failed}: ( second time post)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Ankush Grover wrote:
[snip]
> write(2, "debug1: sshd version OpenSSH_3.9"..., 36debug1: sshd version
> OpenSSH_3 .9p1
> ) = 36
> open("/etc/ssh/ssh_host_key", O_RDONLY|O_LARGEFILE) = 3 fstat64(3,
> {st_mode=S_IFREG|0600, st_size=516, ...}) = 0
> getuid32()                              = 0 fstat64(3,
> {st_mode=S_IFREG|0600, st_size=516, ...}) = 0
> read(3, "SSH PRIVATE KEY FILE FORMAT 1.1\n"..., 516) = 516 _llseek(3, 0,
> [0], SEEK_SET)            = 0
> fstat64(3, {st_mode=S_IFREG|0600, st_size=516, ...}) = 0 read(3, "SSH
> PRIVATE KEY FILE FORMAT 1.1\n"..., 516) = 516
> write(2, "cipher_encrypt: bad plaintext le"..., 42cipher_encrypt: bad
> plaintext length 337 ) = 42
> exit_group(255)                         = ?

It looks like it is having trouble reading the ssh_host_key files.  Try
moving all the /etc/ssh/ssh_host* files out of the way and let the server
recreate them.

Note that this will cause your clients to tell you that the host's key has
changed.

-- 
William Hooper


[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux