Here's another little detail to look at.  The sshd linux man page states that 
"host keys must have an empty passphrase". If you set a passphrase on the key 
that you gen'd for your server host, try regenerating that key with 
ssh-keygen -q -b <bits> -t <type> -f /etc/ssh/ssh_host_key -N (consult your 
host configuration for details as configurations may vary with source build 
installations).

On Wednesday 15 January 2003 19:54, you wrote:
> Super-dumb-question: Are you sure the key generation routines in the code
> are using the same character sets (ie ASCII)  during the compare? A EBCDIC
> input passphrase and a ASCII input passphrase won't produce the same key
> outputs...
>
> -- db
>
> ----- Original Message -----
> From: "paultz" <[EMAIL PROTECTED]>
> To: <[EMAIL PROTECTED]>
> Sent: Wednesday, January 15, 2003 7:09 PM
> Subject: Re: ssh_dss_verify: signature incorrect
>
> > Hi Tzafrir,
> >
> > Maybe this is what Mark was alluding to:
> >
> > When I do the diff, it reports the files are not the same.
> >
> > I did an 'ssh-keygen ' for the ssh_host_key, ssh_host_dsa_key, and
> > ssh_host_rsa_key files.  As you point out, it also creates a public
> > '.pub' version of each one.
> >
> > I just noticed, though, that when I /usr/sbin/sshd, it complains:
> > could not load host key: /etc/ssh/ssh_host_key
> > could not load host key: /etc/ssh/ssh_host_rsa_key
> > could not load host key: /etc/ssh/ssh_host_dsa_key
> > Disabling protocol version 1: could not load host key
> > Disabling protocol version 2: could not load host key
> > sshd:  no host keys available -- exiting
> >
> > I have permissions set to 600 for the private keys, and 644 for the
> > public ones.
> >
> > What the heck did I do to myself?
> >
> > Thanks,
> > Paul
> >
> >
> > ================================================================
> >
> > From:         Tzafrir Cohen
> > Subject:      Re: ssh_dss_verify:  signature incorrect
> > In-Reply-To:  <[EMAIL PROTECTED]>
> >
> > On Wed, 15 Jan 2003, paultz wrote:
> > > Finally got the binaries working for z/OS 1.2 USS .... sorta.
> > >
> > > I can go into OMVS shell under TSO, do an ssh into the same system, and
> > > get logged right in, no problems.
> > >
> > > If I try to ssh  (from the same OMVS shell) to my RH7.2 Linux system, I
>
> get:
> > > ssh_dss_verify: signature incorrect
> > > key_verify failed for server_host_key
> > > .....
> > > then it terminates the session.  What does it mean, 'signature
>
> incorrect'?
>
> > Each ssh host has a host key (actually, rsa1 host key, rsa2 host key and
> > dsa host key). Each key is, as usual with ssh (and public keys in
> > general) made of two parts:
> >
> > 1. the public key, which is not secret, and is declared by the server
> > 2. The secret key
> >
> > The idea is that after you connect to the host for the first time you
> > remember the host's (public) key. Whenever you try to connect to a server
> > with an unknown key, the ssh client should warn you. Whenever you try to
> > connect to a serve to which you connected before but whose key has
> > change, the ssh client should give you an even nastier warning, because
> > this can be a sign of somebody pretending to be that server.
> >
> > The public key is something everyone in the world can know, but the
> > private key remains a secret, it never goes on the wire (not even
> > encrypted). Its only use is to validate the public key: you can encrypt a
> > message with the public key and have the server decrypt it, as part of
> > the authentication protocol.
> >
> > Now back to the technical details:
> >
> > Have a look at the server's sshd_config . This is typically
> > /etc/ssh/sshd_config . THere should be there something like:
> >
> > # HostKey for protocol version 1
> > HostKey /etc/ssh/ssh_host_key
> > # HostKeys for protocol version 2
> > HostKey /etc/ssh/ssh_host_rsa_key
> > HostKey /etc/ssh/ssh_host_dsa_key
> >
> > Those files are the private keys. The public keys are *.pub , e.g:
> > /etc/ssh/ssh_host_dsa_key.pub for the dsa key. You can verify that they
> > indeed match using:
> >
> >   echo "`ssh-keygen -y -f /etc/ssh/ssh_host_dsa_key` " |
>
> diff -/etc/ssh/ssh_host_dsa_key.pub
>
> > I thought that:
> >
> >   ssh-keygen -y  -f /etc/ssh/ssh_host_dsa_key | diff -
>
> /etc/ssh/ssh_host_dsa_key.pub
>
> > would do, but it appears that in my host key there was an extra space in
> > the end.
> >
> > --
> > Tzafrir Cohen

Reply via email to