Replies: 2 comments
-
I performed these steps:
If you'd like, you can start How many characters long is your passphrase for the private key? Can you send the log1 either as an attachment through Github Web (Github doesn't allow email attachments, unfortunately), or if you don't feal comfortable sending private data on a public issue tracker, as an e-mail to support@cyberduck.io with reference to this ticket (13673)? Footnotes |
Beta Was this translation helpful? Give feedback.
-
I generated the key on the Windows machine locally and put the public one into authorized_keys file, like I normally would, but initially this still refused login both ssh and sftp. I found out later that the RSA keys were being thrown out for some reason so I had to add:
To the sshd_config in order to allow login with my RSA key at all. This works fine for ssh, but with sftp I struggle as described above. If I remove all caches from Cyberduck and restart with Keychain enabled I can login once and use sftp just fine, but when I reconnect to the same server I get the same error of Pad block corrupted. On the server I get no further logs as to why auth broke besides mention of preauth and then disconnect. The passphrase 21 characters. Checking the credentials manager there is no credential saved for that server. I plan to generate a new key in a different format that is supported by sshd without the need to add the "old" key algo to it. I sent the log file to the specified email. |
Beta Was this translation helpful? Give feedback.
-
Use of keychain with RSA keys causes login failure with "Pad block corrupted" error. Unchecking keychain use in Preferences resolves the problem.
Steps to reproduce the behavior:
Using Ubuntu 22LTS add an RSA public key to a user and attempt and sftp connection to that with keychain enabled.
Disable keychain, restart Cyberduck, try again, now asks for passphrase and logs in.
This started happening with newer ssh servers that deprecated the RSA keys, but using the keychain ssh connections themselves work just fine through putty, so should Cyberduck sftp connections once the ssh server is configured to accept RSA keys again.
I don't have this issue with any older machines running older ssh servers.
Before you tell me to update to Snapshots, setting that in the update policy and checking for updates returns up to date for that version so there is no snapshot build available as of writing this.
Beta Was this translation helpful? Give feedback.
All reactions