[Bug 2913] Reading PEM keys might fail if they decrypt to garbage with zero-length passprahse with new OpenSSL 1.1.0i

bugzilla-daemon at bugzilla.mindrot.org bugzilla-daemon at bugzilla.mindrot.org
Wed Oct 3 21:09:36 AEST 2018


https://bugzilla.mindrot.org/show_bug.cgi?id=2913

Jakub Jelen <jjelen at redhat.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
   Attachment #3183|0                           |1
        is obsolete|                            |

--- Comment #1 from Jakub Jelen <jjelen at redhat.com> ---
Created attachment 3184
  --> https://bugzilla.mindrot.org/attachment.cgi?id=3184&action=edit
patch v2

Ok, the solution is a bit more complicated. We need to shield also the
zero-lenght passphrases and otherwise pass the passprase from userdata.
With the attached patch I am able to decrypt existing keys as well as
these broken ones without any issues.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.


More information about the openssh-bugs mailing list