Bug 1204905

Summary: bug backupninja duplicity due to python3-cryptography-3.3.2-150400.16.3.1.x86_64 and solution
Product: [openSUSE] openSUSE Distribution Reporter: Philippe JAOUEN <pjaouen>
Component: OtherAssignee: Steve Kowalik <steven.kowalik>
Status: RESOLVED DUPLICATE QA Contact: E-mail List <qa-bugs>
Severity: Normal    
Priority: P5 - None CC: pjaouen
Version: Leap 15.4   
Target Milestone: ---   
Hardware: Other   
OS: Other   
Whiteboard:
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Philippe JAOUEN 2022-10-31 18:51:24 UTC
Warning: Duplicity cleanup failed.
Warning: Duplicity remove-older-than failed.
Error: BackendException: ssh connection to XXXXX@sftp.xxx:22 failed: ('Invalid private key', [_OpenSSLErrorWithText(code=67764350, lib=4, func=160, reason=126, reason_text=b'error:040A007E:rsa routines:RSA_check_key_ex:iqmp not inverse of q')])
Fatal: Duplicity failed.
 
old known bug : https://github.com/paramiko/paramiko/issues/1738

solution : comment 359-361 in 
/usr/lib64/python3.6/site-packages/cryptography/hazmat/backends/openssl/rsa.py

359 #       if res != 1:
360 #            errors = backend._consume_errors_with_text()
361 #            raise ValueError("Invalid private key", errors)
Comment 1 Matej Cepl 2022-11-25 15:13:16 UTC
I don’t understand: if it is an upstream bug, why didn’t you file it there? Or should I?
Comment 2 Philippe JAOUEN 2022-11-25 20:21:44 UTC
I found this : https://github.com/paramiko/paramiko/issues/1738
it concerns an old 2020 bug in paramiko list but they are about 3.0 or 3.1 versions
opensuse leap 15.4 is python3-paramiko 2.4.2 !
Comment 3 Steve Kowalik 2022-12-09 03:44:52 UTC
Based on the patch you've linked to, this is actually fixed by an in-flight bug fix for paramiko, which I'm marking this bug as a duplicate of. Thanks for your report!

*** This bug has been marked as a duplicate of bug 1205132 ***