[Bug 3814] New: incorrect signature when ssh'ing to an AIX server (Big Endian) from amd64 (Little endian)
bugzilla-daemon at mindrot.org
bugzilla-daemon at mindrot.org
Fri Apr 18 09:36:21 AEST 2025
https://bugzilla.mindrot.org/show_bug.cgi?id=3814
Bug ID: 3814
Summary: incorrect signature when ssh'ing to an AIX server (Big
Endian) from amd64 (Little endian)
Product: Portable OpenSSH
Version: 10.0p1
Hardware: PPC64
OS: AIX
Status: NEW
Severity: major
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
Reporter: jfp at clearfield.com
The client is Debian sid, using the manually compiled upstream
openssh-10.0p1 against an AIX server running OpenSSH_9.9
Got the following error:
ssh_dispatch_run_fatal: Connection to XX.XX.XX.XX port 22: incorrect
signature
If I delete the entry in the known_hosts I get the additional:
debug2: ssh_ed25519_verify: crypto_sign_ed25519_open failed: -1
Full logs:
debug1: OpenSSH_10.0p2, OpenSSL 3.5.0 8 Apr 2025
debug3: Running on Linux 6.12.17-amd64 #1 SMP PREEMPT_DYNAMIC Debian
6.12.17-1 (2025-03-01) x86_64
debug3: Started with: ./ssh -vvvvvv HOSTNAME
debug1: Reading configuration data /home/jfp/.ssh/config
debug1: /home/jfp/.ssh/config line 247: Applying options for *.trl
debug1: /home/jfp/.ssh/config line 360: Applying options for *
debug1: /home/jfp/.ssh/config line 367: Deprecated option "useroaming"
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts' ->
'/home/jfp/.ssh/known_hosts'
debug3: expanded UserKnownHostsFile '~/.ssh/known_hosts2' ->
'/home/jfp/.ssh/known_hosts2'
debug2: resolving "HOSTNAME" port 22
debug3: resolve_host: lookup HOSTNAME:22
debug3: channel_clear_timeouts: clearing
debug3: ssh_connect_direct: entering
debug1: Connecting to HOSTNAME [10.160.21.22] port 22.
debug3: set_sock_tos: set socket 3 IP_TOS 0x48
debug1: Connection established.
debug1: identity file /home/jfp/.ssh/id_rsa type 0
debug1: identity file /home/jfp/.ssh/id_rsa-cert type -1
debug1: identity file /home/jfp/.ssh/id_ecdsa type -1
debug1: identity file /home/jfp/.ssh/id_ecdsa-cert type -1
debug1: identity file /home/jfp/.ssh/id_ecdsa_sk type -1
debug1: identity file /home/jfp/.ssh/id_ecdsa_sk-cert type -1
debug1: identity file /home/jfp/.ssh/id_ed25519 type 3
debug1: identity file /home/jfp/.ssh/id_ed25519-cert type -1
debug1: identity file /home/jfp/.ssh/id_ed25519_sk type -1
debug1: identity file /home/jfp/.ssh/id_ed25519_sk-cert type -1
debug1: identity file /home/jfp/.ssh/id_xmss type -1
debug1: identity file /home/jfp/.ssh/id_xmss-cert type -1
debug1: Local version string SSH-2.0-OpenSSH_10.0
debug1: Remote protocol version 2.0, remote software version
OpenSSH_9.9
debug1: compat_banner: match: OpenSSH_9.9 pat OpenSSH* compat
0x04000000
debug2: fd 3 setting O_NONBLOCK
debug1: Authenticating to HOSTNAME:22 as 'jpi4319'
debug3: record_hostkey: found key type ECDSA in file
/home/jfp/.ssh/known_hosts:194
debug3: record_hostkey: found key type RSA in file
/home/jfp/.ssh/known_hosts:531
debug3: load_hostkeys_file: loaded 2 keys from HOSTNAME
debug1: load_hostkeys: fopen /home/jfp/.ssh/known_hosts2: No such file
or directory
debug1: load_hostkeys: fopen /usr/local/etc/ssh_known_hosts: No such
file or directory
debug1: load_hostkeys: fopen /usr/local/etc/ssh_known_hosts2: No such
file or directory
debug3: order_hostkeyalgs: prefer hostkeyalgs:
ecdsa-sha2-nistp256-cert-v01 at openssh.com,rsa-sha2-512-cert-v01 at openssh.com,rsa-sha2-256-cert-v01 at openssh.com,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa
debug3: send packet: type 20
debug1: SSH2_MSG_KEXINIT sent
debug3: receive packet: type 20
debug1: SSH2_MSG_KEXINIT received
debug2: local client KEXINIT proposal
debug2: KEX algorithms:
mlkem768x25519-sha256,sntrup761x25519-sha512,sntrup761x25519-sha512 at openssh.com,curve25519-sha256,curve25519-sha256 at libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-c,kex-strict-c-v00 at openssh.com
debug2: host key algorithms:
ecdsa-sha2-nistp256-cert-v01 at openssh.com,rsa-sha2-512-cert-v01 at openssh.com,rsa-sha2-256-cert-v01 at openssh.com,ecdsa-sha2-nistp256,rsa-sha2-512,rsa-sha2-256,ssh-rsa,ssh-ed25519-cert-v01 at openssh.com,ecdsa-sha2-nistp384-cert-v01 at openssh.com,ecdsa-sha2-nistp521-cert-v01 at openssh.com,sk-ssh-ed25519-cert-v01 at openssh.com,sk-ecdsa-sha2-nistp256-cert-v01 at openssh.com,ssh-ed25519,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,sk-ssh-ed25519 at openssh.com,sk-ecdsa-sha2-nistp256 at openssh.com
debug2: ciphers ctos:
chacha20-poly1305 at openssh.com,aes128-gcm at openssh.com,aes256-gcm at openssh.com,aes128-ctr,aes192-ctr,aes256-ctr
debug2: ciphers stoc:
chacha20-poly1305 at openssh.com,aes128-gcm at openssh.com,aes256-gcm at openssh.com,aes128-ctr,aes192-ctr,aes256-ctr
debug2: MACs ctos:
umac-64-etm at openssh.com,umac-128-etm at openssh.com,hmac-sha2-256-etm at openssh.com,hmac-sha2-512-etm at openssh.com,hmac-sha1-etm at openssh.com,umac-64 at openssh.com,umac-128 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc:
umac-64-etm at openssh.com,umac-128-etm at openssh.com,hmac-sha2-256-etm at openssh.com,hmac-sha2-512-etm at openssh.com,hmac-sha1-etm at openssh.com,umac-64 at openssh.com,umac-128 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib at openssh.com
debug2: compression stoc: none,zlib at openssh.com
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug2: peer server KEXINIT proposal
debug2: KEX algorithms:
sntrup761x25519-sha512,sntrup761x25519-sha512 at openssh.com,mlkem768x25519-sha256,curve25519-sha256,curve25519-sha256 at libssh.org,ecdh-sha2-nistp256,ecdh-sha2-nistp384,ecdh-sha2-nistp521,diffie-hellman-group-exchange-sha256,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-hellman-group14-sha256,ext-info-s,kex-strict-s-v00 at openssh.com
debug2: host key algorithms:
rsa-sha2-512,rsa-sha2-256,ecdsa-sha2-nistp256,ssh-ed25519
debug2: ciphers ctos:
aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305 at openssh.com,aes128-gcm at openssh.com,aes256-gcm at openssh.com
debug2: ciphers stoc:
aes128-ctr,aes192-ctr,aes256-ctr,chacha20-poly1305 at openssh.com,aes128-gcm at openssh.com,aes256-gcm at openssh.com
debug2: MACs ctos:
umac-64-etm at openssh.com,umac-128-etm at openssh.com,hmac-sha2-256-etm at openssh.com,hmac-sha2-512-etm at openssh.com,hmac-sha1-etm at openssh.com,umac-64 at openssh.com,umac-128 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: MACs stoc:
umac-64-etm at openssh.com,umac-128-etm at openssh.com,hmac-sha2-256-etm at openssh.com,hmac-sha2-512-etm at openssh.com,hmac-sha1-etm at openssh.com,umac-64 at openssh.com,umac-128 at openssh.com,hmac-sha2-256,hmac-sha2-512,hmac-sha1
debug2: compression ctos: none,zlib at openssh.com
debug2: compression stoc: none,zlib at openssh.com
debug2: languages ctos:
debug2: languages stoc:
debug2: first_kex_follows 0
debug2: reserved 0
debug3: kex_choose_conf: will use strict KEX ordering
debug1: kex: algorithm: mlkem768x25519-sha256
debug1: kex: host key algorithm: ecdsa-sha2-nistp256
debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC:
<implicit> compression: none
debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC:
<implicit> compression: none
debug3: send packet: type 30
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug3: receive packet: type 31
debug1: SSH2_MSG_KEX_ECDH_REPLY received
debug1: Server host key: ecdsa-sha2-nistp256
SHA256:v3CpWA7KYkA/0T/Zz2ogEoDFcng+0zhA7o52ASgQgiQ
debug3: record_hostkey: found key type ECDSA in file
/home/jfp/.ssh/known_hosts:194
debug3: record_hostkey: found key type RSA in file
/home/jfp/.ssh/known_hosts:531
debug3: load_hostkeys_file: loaded 2 keys from HOSTNAME
debug1: load_hostkeys: fopen /home/jfp/.ssh/known_hosts2: No such file
or directory
debug1: load_hostkeys: fopen /usr/local/etc/ssh_known_hosts: No such
file or directory
debug1: load_hostkeys: fopen /usr/local/etc/ssh_known_hosts2: No such
file or directory
debug1: Host 'HOSTNAME' is known and matches the ECDSA host key.
debug1: Found key in /home/jfp/.ssh/known_hosts:194
ssh_dispatch_run_fatal: Connection to XX.XX.XX.XX port 22: incorrect
signature
--
You are receiving this mail because:
You are watching the assignee of the bug.
More information about the openssh-bugs
mailing list