RSA_verify question on OpenSSH Client w/ OpenSSL0.9.6a

foo foo foomail123 at yahoo.com
Thu Apr 25 09:12:46 EST 2002


Using OpenSSH 2.3.1 client and OpenSSL 0.9.6a

When trying to ssh to OpenSSH server of
higher versions SSH-1.99-OpenSSH_2.5.2p2 or such,

I see error in RSA key exchange:
RSA_verify(..)routine.

I see:

error at:int RSA_verify(int dtype, unsigned char *m,
unsigned int m_len,
         unsigned char *sigbuf, unsigned int siglen,
RSA *rsa)
    {
    int i,ret=0,sigtype;
    unsigned char *p,*s;
    X509_SIG *sig=NULL;

    if (siglen != (unsigned int)RSA_size(rsa))
        {
       
RSAerr(RSA_F_RSA_VERIFY,RSA_R_WRONG_SIGNATURE_LENGTH);
        return(0);
        }


debugger output:

Breakpoint 1, RSA_verify (dtype=64,
    m=0x199d380 "mBá\tPð»ð\tÊWz\227\226ë\a0ÿ[ÓUU",
m_len=20,
    sigbuf=0x1990300
"\0205:\t\026\217ɼÒÝ\206b#¹ÏnGê\177¤ì\002U*P^9\0213Á]úÀf\225¬:ìm\005\215\225³ìn¥ßïë\205¡\205Ó'Â\220óå,e#½\2150\025K\emã\022Wn\177[@â\fQ÷4w3gÍyXÚäÕ\024\b\2222Ëý?èF[p¬­nêÈré(Îå\017õ\214\177\220;qIÄZ,.Bv\026$Rû",
    siglen=128, rsa=0x198b700) at
bsd/tools/openssl/crypto/rsa/rsa_sign.c:147
147             if (siglen != (unsigned
int)RSA_size(rsa))
(gdb) x/40x
0x198b7a0:      0x00000041      0x00000000     
0x00008000      0x00000000
0x198b7b0:      0x00000000      0x00000000     
0x00000000      0x00008000
0x198b7c0:      0xe5b83d65      0x00000001     
0x5555686d      0x61632d6d
0x198b7d0:      0x64352d39      0x36005555     
0x00000000      0x00000000
0x198b7e0:      0x00000000      0x00000000     
0x00000000      0x00000000
0x198b7f0:      0x00000000      0x00000000     
0xfeefdead      0x0198b778
0x198b800:      0x0186ed14      0x00000000     
0x0199d2a0      0x0199d280
0x198b810:      0x00000000      0x0199d360     
0x0199d380      0x00000001
0x198b820:      0x0198b780      0x00000000     
0x00000000      0x00000000
0x198b830:      0x00000000      0x00000000     
0x00000000      0x00000000
(gdb) p *rsa
$3 = {pad = 0, version = 0, meth = 0x195bb1c, n =
0x199d480, e = 0x199d3c0,
  d = 0x0, p = 0x0, q = 0x0, dmp1 = 0x0, dmq1 = 0x0,
iqmp = 0x0, ex_data = {
    sk = 0x0, dummy = 1848469362}, references = 1,
flags = 6,
  _method_mod_n = 0x0, _method_mod_p = 0x0,
_method_mod_q = 0x0,
  bignum_data = 0x0, blinding = 0x0}
(gdb) x/40x 0x199d480
0x199d480:      0x0199d4a0      0x00000001     
0x00000001      0x00000000
0x199d490:      0x00000001      0x55550000     
0xef025555      0x00000008
0x199d4a0:      0x00000023      0xffffffff     
0x555535d2      0x55550000
0x199d4b0:      0x55550000      0x00000000     
0xfeefdead      0x0199d3d8
0x199d4c0:      0x0186ed14      0x8bcb35d2     
0x00000000      0x00000000
0x199d4d0:      0x55550000      0x00000000     
0xfeefdead      0x0199d4f8
0x199d4e0:      0x00000000      0x00000000     
0x00000000      0x00000000
0x199d4f0:      0x00000000      0x00000000     
0xfeefdead      0x0199d518
0x199d500:      0x00000000      0x00000000     
0x00000000      0x00000000
0x199d510:      0x00000000      0x00000000     
0xfeefdead      0x0199d538
(gdb)


Does anyone know issues with OpenSSL or OpenSSH
above versions ? Is there any compatiblity issue ?

Can someone share their knowledge ?

Thank you,






__________________________________________________
Do You Yahoo!?
Yahoo! Games - play chess, backgammon, pool and more
http://games.yahoo.com/



More information about the openssh-unix-dev mailing list