sshd:cipher_encrypt: bad plaintext length 337 [Failed}: ( second time post)

William Hooper whooperhsd3 at earthlink.net
Tue May 31 13:12:20 UTC 2005


Ankush Grover wrote:
[snip]
> write(2, "debug1: sshd version OpenSSH_3.9"..., 36debug1: sshd version
> OpenSSH_3 .9p1
> ) = 36
> open("/etc/ssh/ssh_host_key", O_RDONLY|O_LARGEFILE) = 3 fstat64(3,
> {st_mode=S_IFREG|0600, st_size=516, ...}) = 0
> getuid32()                              = 0 fstat64(3,
> {st_mode=S_IFREG|0600, st_size=516, ...}) = 0
> read(3, "SSH PRIVATE KEY FILE FORMAT 1.1\n"..., 516) = 516 _llseek(3, 0,
> [0], SEEK_SET)            = 0
> fstat64(3, {st_mode=S_IFREG|0600, st_size=516, ...}) = 0 read(3, "SSH
> PRIVATE KEY FILE FORMAT 1.1\n"..., 516) = 516
> write(2, "cipher_encrypt: bad plaintext le"..., 42cipher_encrypt: bad
> plaintext length 337 ) = 42
> exit_group(255)                         = ?

It looks like it is having trouble reading the ssh_host_key files.  Try
moving all the /etc/ssh/ssh_host* files out of the way and let the server
recreate them.

Note that this will cause your clients to tell you that the host's key has
changed.

-- 
William Hooper




More information about the fedora-list mailing list