From Bugzilla Helper: User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:0.9.8) Gecko/20020207 Description of problem: Version-Release number of selected component (if applicable): How reproducible: Always Steps to Reproduce: 1. recompile openssh-3.1 under openssl-0.9.5a (or 0.9.6b) under RH linux version 6.2 (compiler egcs-1.1.2-30) Something was changed in spec-file: # Do we want to disable building of x11-askpass? (1=yes 0=no) %define no_x11_askpass 1 # Do we want to disable building of gnome-askpass? (1=yes 0=no) %define no_gnome_askpass 1 # Is this build for RHL 6.x? %define build6x 1 2. ssh -C -v this.host.from.remote.host (the options -C and -v not affected for reproduction of the bug) Actual Results: see the following error: debug1: Remote protocol version 1.5, remote software version OpenSSH_3.1p1 debug1: match: OpenSSH_3.1p1 pat OpenSSH* debug1: Local version string SSH-1.5-OpenSSH_3.1p1 debug1: Waiting for server public key. debug1: Received server public key (768 bits) and host key (1024 bits). debug1: Host 'serv.smile.org.ua' is known and matches the RSA1 host key. debug1: Found key in /home/andy/.ssh/known_hosts:12 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug1: cipher_init: set keylen (16 -> 32) debug1: cipher_init: set keylen (16 -> 32) debug1: Installing crc compensation attack detector. Disconnecting: Corrupted check bytes on input. debug1: Calling cleanup 0x8063550(0x0) Expected Results: Would be the password promt instead of error. Additional info:
This is a word-for-word duplicate of bug 61164.
*** This bug has been marked as a duplicate of 61164 ***