Description of problem: If FIPS 140-2 compliance is enabled on the server, the connection will fail when using publickey authentication with the latest openssh under 5.6. The connection will succeed if FIPS is disabled or if running the previous version of openssh. The connection will simply die with a message of: Connection closed by xxx.xxx.xxx.xxx No error is logged and no further error information is given by enabling verbosity on the client or server. Version-Release number of selected component (if applicable): openssh-4.3p2-72.el5 How reproducible: Always Steps to Reproduce: 1. Enable FIPS compliance as described in https://access.redhat.com/kb/docs/DOC-39230 2. Make sure the server is running openssh-4.3p2-41.el5_5.1. All other packages may be up to date. 3. Authenticate using publickey. Verify successful connection. 4. Update to openssh-4.3p2-72.el5. Connection now fails using publickey. Other authentication methods will continue to work. Actual results: Connection fails Expected results: Connection succeeds Additional info:
This and bug 674747 are duplicates.
*** This bug has been marked as a duplicate of bug 674747 ***