[Bug 2913] Reading PEM keys might fail if they decrypt to garbage with zero-length passprahse with new OpenSSL 1.1.0i
bugzilla-daemon at bugzilla.mindrot.org
bugzilla-daemon at bugzilla.mindrot.org
Wed Oct 3 21:09:36 AEST 2018
https://bugzilla.mindrot.org/show_bug.cgi?id=2913
Jakub Jelen <jjelen at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #3183|0 |1
is obsolete| |
--- Comment #1 from Jakub Jelen <jjelen at redhat.com> ---
Created attachment 3184
--> https://bugzilla.mindrot.org/attachment.cgi?id=3184&action=edit
patch v2
Ok, the solution is a bit more complicated. We need to shield also the
zero-lenght passphrases and otherwise pass the passprase from userdata.
With the attached patch I am able to decrypt existing keys as well as
these broken ones without any issues.
--
You are receiving this mail because:
You are watching the assignee of the bug.
More information about the openssh-bugs
mailing list