sshd:cipher_encrypt: bad plaintext length 337 [Failed}: ( second time post)
William Hooper
whooperhsd3 at earthlink.net
Tue May 31 13:12:20 UTC 2005
Ankush Grover wrote:
[snip]
> write(2, "debug1: sshd version OpenSSH_3.9"..., 36debug1: sshd version
> OpenSSH_3 .9p1
> ) = 36
> open("/etc/ssh/ssh_host_key", O_RDONLY|O_LARGEFILE) = 3 fstat64(3,
> {st_mode=S_IFREG|0600, st_size=516, ...}) = 0
> getuid32() = 0 fstat64(3,
> {st_mode=S_IFREG|0600, st_size=516, ...}) = 0
> read(3, "SSH PRIVATE KEY FILE FORMAT 1.1\n"..., 516) = 516 _llseek(3, 0,
> [0], SEEK_SET) = 0
> fstat64(3, {st_mode=S_IFREG|0600, st_size=516, ...}) = 0 read(3, "SSH
> PRIVATE KEY FILE FORMAT 1.1\n"..., 516) = 516
> write(2, "cipher_encrypt: bad plaintext le"..., 42cipher_encrypt: bad
> plaintext length 337 ) = 42
> exit_group(255) = ?
It looks like it is having trouble reading the ssh_host_key files. Try
moving all the /etc/ssh/ssh_host* files out of the way and let the server
recreate them.
Note that this will cause your clients to tell you that the host's key has
changed.
--
William Hooper
More information about the fedora-list
mailing list