Comment 12 for bug 15359

Revision history for this message
Debian Bug Importer (debzilla) wrote :

Message-ID: <email address hidden>
Date: Sat, 26 Oct 2002 19:32:11 +0100
From: Colin Watson <email address hidden>
To: Jonathan Amery <email address hidden>
Cc: Martin Pool <email address hidden>, <email address hidden>,
 <email address hidden>
Subject: Re: "bad plaintext length" (was Re: Bug#151743: Can't verify this :( [was: ssh: 3.4p1-2
 fails to install saying "cipher_encrypt: bad plaintext length 337"])

severity 151743 important
thanks

On Tue, Jul 16, 2002 at 02:08:14AM +0100, Jonathan Amery wrote:
> Hmm, I tried this on a stable machine here, and got the same error:
>
> allison.empire.pick.ucam.org:~/ # [02/07/16.02:06:12] $
> : pts/6 bash[4621] ; ssh-keygen -p -N '' -f key1
> cipher_decrypt: bad ciphertext length 337
> allison.empire.pick.ucam.org:~/ # [02/07/16.02:06:16] $
> : pts/6 bash[4622] ; dpkg --list ssh
> Desired=Unknown/Install/Remove/Purge/Hold
> | Status=Not/Installed/Config-files/Unpacked/Failed-config/Half-installed
> |/ Err?=(none)/Hold/Reinst-required/X=both-problems (Status,Err: uppercase=bad)
> ||/ Name Version Description
> +++-==============-==============-============================================
> ii ssh 1.2.3-9.4 Secure rlogin/rsh/rcp replacement (OpenSSH)
>
> Do you have an extant backup of the host key from before the upgrade?
> I fear that it might have got corrupted somewhere.

While this is obviously a nasty bug, it doesn't seem to be having
widespread effect, so I'm downgrading it.

Perhaps one thing that would help would be if ssh's postinst backed up
host keys before attempting to edit them?

Regards,

--
Colin Watson [<email address hidden>]