You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@httpd.apache.org by Jim Jagielski <ji...@jaguNET.com> on 1998/09/26 15:51:37 UTC

Urg... CVS/ssh update on taz breaks RSAREF :/

**Updating: apache-1.3 **
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@       WARNING: HOST IDENTIFICATION HAS CHANGED!         @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right now (man-in-the-middle attack)!
It is also possible that the host key has just been changed.
Please contact your system administrator.
Add correct host key in /staff/jim/.ssh/known_hosts to get rid of this message.
Agent forwarding is disabled to avoid attacks by corrupted servers.
X11 forwarding is disabled to avoid attacks by corrupted servers.
Are you sure you want to continue connecting (yes/no)? yes
RSA key has too many bits for RSAREF to handle (max 1024).
cvs [update aborted]: end of file from server (consult above messages if any)


-- 
===========================================================================
   Jim Jagielski   |||   jim@jaguNET.com   |||   http://www.jaguNET.com/
            "That's no ordinary rabbit... that's the most foul,
            cruel and bad-tempered rodent you ever laid eyes on"

Re: Urg... CVS/ssh update on taz breaks RSAREF :/

Posted by Rodent of Unusual Size <Ke...@Golux.Com>.
Jim Jagielski wrote:
> 
> **Updating: apache-1.3 **
	:
> RSA key has too many bits for RSAREF to handle (max 1024).

Hmm, that's a new one.

Yup, it looks like Taz' SSH was updated at about 01h00 this morning
(PDT).  And there isn't a copy of the public side of the host key
around.  Either Brian was working late, or..

#ken	P-O}

Ken Coar                    <http://Web.Golux.Com/coar/>
Apache Group member         <http://www.apache.org/>
"Apache Server for Dummies" <http://Web.Golux.Com/coar/ASFD/>