Bug 11388 - Сломалась авторизация по ключу при заходе на сервер OpenSSH_3.6.1p2
Summary: Сломалась авторизация по ключу при заходе на сервер OpenSSH_3.6.1p2
Status: CLOSED NOTABUG
Alias: None
Product: Sisyphus
Classification: Development
Component: openssh-clients (show other bugs)
Version: unstable
Hardware: all Linux
: P2 normal
Assignee: Gleb F-Malinovskiy
QA Contact: qa-sisyphus
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2007-04-06 16:42 MSD by Anton V. Boyarshinov
Modified: 2007-04-09 13:33 MSD (History)
5 users (show)

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Anton V. Boyarshinov 2007-04-06 16:42:02 MSD
После сегодняшнего обновления у меня не работает авторизация по ключу на машину,
на которой установлен более/менее compact 3.0
Steps to Reproduce:
ssh -v home
Actual Results:  
OpenSSH_4.6p1, OpenSSL 0.9.8d 28 Sep 2006
debug1: Reading configuration data /home/avb/.ssh/config
debug1: Applying options for home
debug1: Reading configuration data /etc/openssh/ssh_config
debug1: Applying options for *
debug1: Connecting to host.example.com [xx.xx.xx.xx] port 22.
debug1: Connection established.
debug1: identity file /home/avb/.ssh/id_rsa type 1
debug1: identity file /home/avb/.ssh/id_dsa type 2
debug1: Remote protocol version 1.99, remote software version OpenSSH_3.6.1p2
debug1: match: OpenSSH_3.6.1p2 pat OpenSSH_3.*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_4.6
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client blowfish-cbc hmac-md5 zlib
debug1: kex: client->server blowfish-cbc hmac-md5 zlib
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host 'h97.n104.oskar.ru' is known and matches the RSA host key.
debug1: Found key in /home/avb/.ssh/known_hosts:6
debug1: ssh_rsa_verify: signature correct
debug1: Enabling compression at level 6.
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey,password
debug1: Next authentication method: publickey
debug1: Offering public key: /home/avb/.ssh/id_rsa
debug1: Authentications that can continue: publickey,password
debug1: Offering public key: /home/avb/.ssh/id_dsa
debug1: Authentications that can continue: publickey,password
debug1: Next authentication method: password
avb@host.example.com's password:

Expected Results:  
OpenSSH_3.6.1p2, SSH protocols 1.5/2.0, OpenSSL 0x0090804f
debug1: Reading configuration data /home/avb/.ssh/config
debug1: Applying options for home
debug1: Reading configuration data /etc/openssh/ssh_config
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: Connecting to host.example.com [xx.xx.xx.xx] port 22.
debug1: Connection established.
debug1: identity file /home/avb/.ssh/identity type 1
debug1: identity file /home/avb/.ssh/id_rsa type 1
debug1: identity file /home/avb/.ssh/id_dsa type 2
debug1: Remote protocol version 1.99, remote software version OpenSSH_3.6.1p2
debug1: match: OpenSSH_3.6.1p2 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.6.1p2
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client blowfish-cbc hmac-md5 zlib
debug1: kex: client->server blowfish-cbc hmac-md5 zlib
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host 'host.example.com' is known and matches the RSA host key.
debug1: Found key in /home/avb/.ssh/known_hosts:6
debug1: ssh_rsa_verify: signature correct
debug1: Enabling compression at level 6.
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey,password
debug1: Next authentication method: publickey
debug1: Offering public key: /home/avb/.ssh/identity
debug1: Server accepts key: pkalg ssh-rsa blen 277 lastkey 0x808d890 hint 0
debug1: read PEM private key done: type RSA
debug1: Authentication succeeded (publickey).
debug1: fd 5 setting O_NONBLOCK
debug1: channel 0: new [client-session]
debug1: Entering interactive session.
..............................
Comment 1 Anton Farygin 2007-04-06 17:10:55 MSD
У меня не воспроизвелось, всё заходит без проблем.
Comment 2 Anton V. Boyarshinov 2007-04-06 17:16:38 MSD
Я не исключаю возможности что это local missconfiguration, но ещё вчера оно
работало. Поменялась только версия openssh
Comment 3 Dmitry V. Levin 2007-04-07 01:51:11 MSD
Конечно, у меня ничего похожего не воспроизводится, иначе бы я пакет публиковать
не стал.

Мне нужен логи на стороне сервере, желательно от обоих вариантов.
Конфиги на клиентской и серверной стороне тоже могут пригодиться.
Можно всё это отправить в личную почту.
Comment 4 Anton V. Boyarshinov 2007-04-09 10:48:34 MSD
Ушло в личную почту
Comment 5 Anton V. Boyarshinov 2007-04-09 10:54:52 MSD
Мне кажется что проблема вот в чём:
новый ssh предлагает ключ из id_rsa и id_dsa, а старый -- из identity

Таким образом, становится очевидно как починить аутентификацию в данном
конкретном случае, но насколько такое поведение ssh правильно я не знаю.
Comment 6 Dmitry V. Levin 2007-04-09 13:33:17 MSD
В клиенте и сервере теперь по умолчанию включён только Protocol 2.