Displaying 20 results from an estimated 753 matches for "3des".
2002 Dec 04
4
3DES key-length
Hi,
I would like to know the key-length used for 3DES data encryption in openssh.
I thought that it should be 192 (3 * 64) bits, but the sshd man page states 128 bit key used for 3DES.
Also, I would like to know the 3des key negotiation - who generates the key (the client or the server).
I am interested in the export regulations concerning openssh in...
2014 Mar 06
1
Is cipher "3des-ctr" supported by openssh?
Hi,
Is cipher "3des-ctr" supported by openssh?
It is not mentioned in the list of supported ciphers in the man page of
ssh_config:
Thanks, Sunil
Ciphers
Specifies the ciphers allowed for protocol version 2 in order of
preference. Multiple ciphers must be comma-separated. The supported ciphers
are ''3d...
2001 Jan 08
2
openSSH: configure ciphers.
I see that:
SSH uses the following ciphers for encryption:
Cipher SSH1 SSH2
DES yes no
3DES yes yes
IDEA yes no
Blowfish yes yes
Twofish no yes
Arcfour no yes
Cast128-cbc no yes
Two ques re: sshd:
1) Using openssh, how do I configure which
set of ciphers to use from above s...
2002 May 18
1
OpenSSH 3.2.2p1 sshd: fatal: xfree: NULL pointer given as argument
...when using telnet to sshd (e.g. the above error must be later in
the protocol sequence than raw telnet would engage).
Debug output (-ddd -e):
=============================================================================
debug3: cipher ok: aes256-cbc [aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc]
debug3: cipher ok: aes192-cbc [aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc]
debug3: cipher ok: aes128-cbc [aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc]
debug3: cipher ok: blowfish-cbc [aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc]
debug3: cipher ok: 3des-cbc [ae...
2014 Feb 13
0
openssh-6.5p1 on Solaris 10 - segmentation fault
...ybody from the 'root' account,
I get a segmentation fault.
Debug output as 'root':
kraken:/opt/local/src/security/openssh-6.5p1# ./ssh -vvv mimir
OpenSSH_6.5, OpenSSL 1.0.1f 6 Jan 2014
debug1: Reading configuration data /etc/ssh/ssh_config
debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc]
debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc]
debug3: cipher ok: aes192-cbc [aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc]
debug3: cipher ok: aes256-cbc [aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc]
debug3: ciphers ok: [aes128-cbc,3des-cbc,aes192-cbc,...
2005 Mar 02
0
Ssh / sft /scp password problems, agent runs fine
...##########
WITHOUT KEY
fbeckman at zvadm6:/home/fbeckman $ ssh -vvv devil3 uname -a OpenSSH_3.9p1, OpenSSL 0.9.7e 25 Oct 2004
debug1: Reading configuration data /home/fbeckman/.ssh/config
debug1: Reading configuration data /etc/ssh_config
debug3: cipher ok: blowfish-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: aes128-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: 3des-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc]
debug3: cipher ok: cast128-cbc [blowfish...
2014 Jan 21
1
3des cipher and DH group size
Hello everybody,
An issue was reported in RH bugzilla [1] about the size of the used DH
group when combined with the 3des-cbc cipher. OpenSSH uses the
actual key length for the size estimation. This is probably fine as far
as the cipher has the same number of bits of security as the key
length. But this is not true for 3TDEA where the key size is 168 resp
192 but it's security is only 112.
Given that the key size...
2008 Aug 27
1
5.1p1 doesn't work, 5.0p1 works fine
...hat might have changed?
Here is a -vvv log from 5.1p1 and 5.0p1 connecting to my router:
ssh -vvv -p 1024 admin at router
5.1p1:
OpenSSH_5.1p1, OpenSSL 0.9.8h 28 May 2008
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug3: cipher ok: aes256-cbc [aes256-cbc,3des-cbc]
debug3: cipher ok: 3des-cbc [aes256-cbc,3des-cbc]
debug3: ciphers ok: [aes256-cbc,3des-cbc]
debug2: mac_setup: found hmac-sha1
debug3: mac ok: hmac-sha1 [hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96]
debug2: mac_setup: found hmac-md5
debug3: mac ok: hmac-md5 [hmac-sha1,hmac-md5,h...
2010 Jul 22
3
[Bug 1801] New: cipher_spec section of ssh man page needs update
...Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: Documentation
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy: matthewm at boedicker.org
The "-c cipher_sec" section says that 3des is still the default cipher.
Also newer ciphers like aes and arcfour are not listed.
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
2001 Feb 19
1
FreeBSD 4.2 OpenSSH2.3.0 client vs Red Hat 6.2 OpenSSH2.5.1p1 sshd
...match: OpenSSH_2.5.1p1
Enabling compatibility mode for protocol 2.0
debug: Local version string SSH-2.0-OpenSSH_2.3.0
debug: send KEXINIT
debug: done
debug: wait KEXINIT
debug: got kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
debug: got kexinit: ssh-dss
debug: got kexinit: 3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc at lysator.liu.se
debug: got kexinit: 3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndae...
2001 Sep 27
3
sftp error on LynxOs
I am trying to initiate an sftp session from a Linux (Redhat) to a LynxOs
machine (where i have ported opnessh-2.9p1) and configured without PAM
support (as I was not able to find PAM version for LynxOS operating system)
I get the following error:
$ sftp -P /home/telica -l telica -v ben
select: Bad file descriptor
read: Input/output error
sftp>
Can somebody help me asap on this?
2005 Jul 24
2
ssl_cipher_list
...=SHA1 export
EXP-KRB5-RC2-CBC-SHA SSLv3 Kx=KRB5 Au=KRB5 Enc=RC2(40) Mac=SHA1 export
EXP-KRB5-DES-CBC-SHA SSLv3 Kx=KRB5 Au=KRB5 Enc=DES(40) Mac=SHA1 export
KRB5-RC4-MD5 SSLv3 Kx=KRB5 Au=KRB5 Enc=RC4(128) Mac=MD5
KRB5-DES-CBC3-MD5 SSLv3 Kx=KRB5 Au=KRB5 Enc=3DES(168) Mac=MD5
KRB5-RC4-SHA SSLv3 Kx=KRB5 Au=KRB5 Enc=RC4(128) Mac=SHA1
KRB5-DES-CBC3-SHA SSLv3 Kx=KRB5 Au=KRB5 Enc=3DES(168) Mac=SHA1
EDH-RSA-DES-CBC3-SHA SSLv3 Kx=DH Au=RSA Enc=3DES(168) Mac=SHA1
EXP-EDH-RSA-DES-CBC-SHA SSLv3 Kx=DH(512) Au=RSA Enc=DES(40) Ma...
2007 Mar 05
1
File exists?
...t overly helpful, so I was hoping that someone could explain
the issue.
Here''s the file, with line 33 highlighted.
Help appreciated.
Mike
# Flush the SAD and SPD
flush;
spdflush;
# Add SA for 10.33.15.145 to 10.31.8.96 in tunnel mode
add 10.33.15.145 10.31.8.96 esp 0x201 -m tunnel -E 3des-cbc
0xB1A03D22D78D6357084B13E930A27F72ECAFB61B5D398A22
-A hmac-md5 0x2F9FCE98685ED329C2E9A5C6CC7C5E20;
# Add SA for 10.31.8.96 to 10.33.15.145 in tunnel mode
add 10.31.8.96 10.33.15.145 esp 0x301 -m tunnel -E 3des-cbc
0x80C16F148B2C11A0E65939D9D945C5630BE09B7F2EC75186
-A hmac-md5 0x...
2007 Jul 12
0
No subject
...4.20 box =
and
I want to get the value of the MEMBERINTERFACE variable to know =
about
which queue member received the call. I set 'setinterfacevar=3D' to =
'yes' in
queues.conf but I can’t get this value. From a php AGI how I can =
read
this value? <span lang=3DES-AR>Some example? <o:p></o:p></span></p>
<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
lang=3DES-AR
style=3D'font-size:12.0pt'><o:p> </o:p></span></font></p>
<p class=3DM...
2002 Feb 06
15
[Bug 105] scp protocol 2 over a hippi interface takes 6 times longer
...|Added
----------------------------------------------------------------------------
Status|NEW |ASSIGNED
------- Additional Comments From markus at openbsd.org 2002-02-07 06:54 -------
could you please try this without scp? e.g.
cat file | ssh -1 -c 3des 'cat > f'
cat file | ssh -2 -c 3des-cbc 'cat > f2'
thanks.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2007 Jul 12
0
No subject
...isk 1.4. 20 box =
and =A0I
want to get the value of the MEMBERINTERFACE variable to know about =
which queue
member received the call. I set 'setinterfacevar=3D' to 'yes' in =
queues.conf but
I can’t get this value. From a php AGI how I can read this value? =
<span
lang=3DES-AR>Some example? Thanks! <o:p></o:p></span></p>
<p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><b><font
size=3D3 color=3Dnavy face=3D"Times New Roman"><span lang=3DES-AR =
style=3D'font-size:...
2002 Jun 20
0
[Bug 281] New: unable to authorize with local shadow password
...b=/usr/local/lib32/libz.a --with-rand-helper --with-md5-passwords
# kdestroy; ssh -v -v -v -1 -l komanek bbs
Tickets destroyed.
OpenSSH_3.0.2p1, SSH protocols 1.5/2.0, OpenSSL 0x0090603f
debug1: Reading configuration data /usr/local/etc/ssh_config
debug1: Applying options for *
debug3: cipher ok: 3des-cbc [3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc]
debug3: cipher ok: blowfish-cbc
[3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc]
debug3: cipher ok: cast128-cbc
[3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc]
debug3: cipher ok: arcfour [3des-cbc,blowfish-cbc,cast128-cbc,arcfo...
2000 Dec 05
1
SSH_BUG_SIGBLOB?
...rcial) pat ^2\.
Enabling compatibility mode for protocol 2.0
debug: Local version string SSH-2.0-OpenSSH_2.3.0p1
debug: Seeding random number generator
debug: send KEXINIT
debug: done
debug: wait KEXINIT
debug: got kexinit: diffie-hellman-group1-sha1
debug: got kexinit: ssh-dss
debug: got kexinit: 3des-cbc,blowfish-cbc,twofish-cbc,arcfour,none
debug: got kexinit: 3des-cbc,blowfish-cbc,twofish-cbc,arcfour,none
debug: got kexinit: hmac-md5,md5-8,none
debug: got kexinit: hmac-md5,md5-8,none
debug: got kexinit: none,zlib
debug: got kexinit: none,zlib
debug: got kexinit:
debug: got kexinit:
debug: f...
2013 Nov 12
0
OpenSSH 6.4 connection to Cisco 6506 routers/switches fails
...sha2-nistp521-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-dss
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se
debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-...
2006 Oct 31
0
6296920 IPsec 3DES can''t be used in two-key mode
Author: markfen
Repository: /hg/zfs-crypto/gate
Revision: ca1aafe8876ceace0d6a4a46d7b4db9181de14e8
Log message:
6296920 IPsec 3DES can''t be used in two-key mode
Files:
update: usr/src/common/crypto/des/des_impl.c