Bug 61476 - new openssh can not connect by SSH1 protocol on RH 6.2
Summary: new openssh can not connect by SSH1 protocol on RH 6.2
Keywords:
Status: CLOSED DUPLICATE of bug 61164
Alias: None
Product: Red Hat Linux
Classification: Retired
Component: openssh
Version: 7.2
Hardware: i386
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Tomas Mraz
QA Contact: Brian Brock
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2002-03-20 09:35 UTC by Andy Shevchenko
Modified: 2007-04-18 16:41 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2005-02-04 15:54:10 UTC
Embargoed:


Attachments (Terms of Use)

Description Andy Shevchenko 2002-03-20 09:35:14 UTC
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.8) Gecko/20020207

Description of problem:


Version-Release number of selected component (if applicable):


How reproducible:
Always

Steps to Reproduce:
1. recompile openssh-3.1 under openssl-0.9.5a (or 0.9.6b) under RH linux version 6.2
(compiler egcs-1.1.2-30)

Something was changed in spec-file:
# Do we want to disable building of x11-askpass? (1=yes 0=no)
%define no_x11_askpass 1

# Do we want to disable building of gnome-askpass? (1=yes 0=no)
%define no_gnome_askpass 1

# Is this build for RHL 6.x?
%define build6x 1


2. ssh -C -v this.host.from.remote.host 

(the options -C and -v not affected for reproduction of the bug)



Actual Results:  see the following error:

debug1: Remote protocol version 1.5, remote software version OpenSSH_3.1p1
debug1: match: OpenSSH_3.1p1 pat OpenSSH*
debug1: Local version string SSH-1.5-OpenSSH_3.1p1
debug1: Waiting for server public key.
debug1: Received server public key (768 bits) and host key (1024 bits).
debug1: Host 'serv.smile.org.ua' is known and matches the RSA1 host key.
debug1: Found key in /home/andy/.ssh/known_hosts:12
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug1: cipher_init: set keylen (16 -> 32)
debug1: cipher_init: set keylen (16 -> 32)
debug1: Installing crc compensation attack detector.
Disconnecting: Corrupted check bytes on input.
debug1: Calling cleanup 0x8063550(0x0)


Expected Results:  Would be the password promt instead of error.

Additional info:

Comment 1 Miloslav Trmac 2003-10-07 21:53:59 UTC
This is a word-for-word duplicate of bug 61164.

Comment 2 Tomas Mraz 2005-02-04 15:54:10 UTC

*** This bug has been marked as a duplicate of 61164 ***


Note You need to log in before you can comment on or make changes to this bug.