search for: 3des

Displaying 20 results from an estimated 753 matches for "3des".

2002 Dec 04
4
3DES key-length
Hi, I would like to know the key-length used for 3DES data encryption in openssh. I thought that it should be 192 (3 * 64) bits, but the sshd man page states 128 bit key used for 3DES. Also, I would like to know the 3des key negotiation - who generates the key (the client or the server). I am interested in the export regulations concerning openssh in...
2014 Mar 06
1
Is cipher "3des-ctr" supported by openssh?
Hi, Is cipher "3des-ctr" supported by openssh? It is not mentioned in the list of supported ciphers in the man page of ssh_config: Thanks, Sunil Ciphers Specifies the ciphers allowed for protocol version 2 in order of preference. Multiple ciphers must be comma-separated. The supported ciphers are ''3d...
2001 Jan 08
2
openSSH: configure ciphers.
I see that: SSH uses the following ciphers for encryption: Cipher SSH1 SSH2 DES yes no 3DES yes yes IDEA yes no Blowfish yes yes Twofish no yes Arcfour no yes Cast128-cbc no yes Two ques re: sshd: 1) Using openssh, how do I configure which set of ciphers to use from above s...
2002 May 18
1
OpenSSH 3.2.2p1 sshd: fatal: xfree: NULL pointer given as argument
...when using telnet to sshd (e.g. the above error must be later in the protocol sequence than raw telnet would engage). Debug output (-ddd -e): ============================================================================= debug3: cipher ok: aes256-cbc [aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc] debug3: cipher ok: aes192-cbc [aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc] debug3: cipher ok: aes128-cbc [aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc] debug3: cipher ok: blowfish-cbc [aes256-cbc,aes192-cbc,aes128-cbc,blowfish-cbc,3des-cbc] debug3: cipher ok: 3des-cbc [ae...
2014 Feb 13
0
openssh-6.5p1 on Solaris 10 - segmentation fault
...ybody from the 'root' account, I get a segmentation fault. Debug output as 'root': kraken:/opt/local/src/security/openssh-6.5p1# ./ssh -vvv mimir OpenSSH_6.5, OpenSSL 1.0.1f 6 Jan 2014 debug1: Reading configuration data /etc/ssh/ssh_config debug3: cipher ok: aes128-cbc [aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc] debug3: cipher ok: 3des-cbc [aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc] debug3: cipher ok: aes192-cbc [aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc] debug3: cipher ok: aes256-cbc [aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc] debug3: ciphers ok: [aes128-cbc,3des-cbc,aes192-cbc,...
2005 Mar 02
0
Ssh / sft /scp password problems, agent runs fine
...########## WITHOUT KEY fbeckman at zvadm6:/home/fbeckman $ ssh -vvv devil3 uname -a OpenSSH_3.9p1, OpenSSL 0.9.7e 25 Oct 2004 debug1: Reading configuration data /home/fbeckman/.ssh/config debug1: Reading configuration data /etc/ssh_config debug3: cipher ok: blowfish-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc] debug3: cipher ok: aes128-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc] debug3: cipher ok: 3des-cbc [blowfish-cbc,aes128-cbc,3des-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc] debug3: cipher ok: cast128-cbc [blowfish...
2014 Jan 21
1
3des cipher and DH group size
Hello everybody, An issue was reported in RH bugzilla [1] about the size of the used DH group when combined with the 3des-cbc cipher. OpenSSH uses the actual key length for the size estimation. This is probably fine as far as the cipher has the same number of bits of security as the key length. But this is not true for 3TDEA where the key size is 168 resp 192 but it's security is only 112. Given that the key size...
2008 Aug 27
1
5.1p1 doesn't work, 5.0p1 works fine
...hat might have changed? Here is a -vvv log from 5.1p1 and 5.0p1 connecting to my router: ssh -vvv -p 1024 admin at router 5.1p1: OpenSSH_5.1p1, OpenSSL 0.9.8h 28 May 2008 debug1: Reading configuration data /etc/ssh/ssh_config debug1: Applying options for * debug3: cipher ok: aes256-cbc [aes256-cbc,3des-cbc] debug3: cipher ok: 3des-cbc [aes256-cbc,3des-cbc] debug3: ciphers ok: [aes256-cbc,3des-cbc] debug2: mac_setup: found hmac-sha1 debug3: mac ok: hmac-sha1 [hmac-sha1,hmac-md5,hmac-ripemd160,hmac-sha1-96,hmac-md5-96] debug2: mac_setup: found hmac-md5 debug3: mac ok: hmac-md5 [hmac-sha1,hmac-md5,h...
2010 Jul 22
3
[Bug 1801] New: cipher_spec section of ssh man page needs update
...Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: Documentation AssignedTo: unassigned-bugs at mindrot.org ReportedBy: matthewm at boedicker.org The "-c cipher_sec" section says that 3des is still the default cipher. Also newer ciphers like aes and arcfour are not listed. -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug.
2001 Feb 19
1
FreeBSD 4.2 OpenSSH2.3.0 client vs Red Hat 6.2 OpenSSH2.5.1p1 sshd
...match: OpenSSH_2.5.1p1 Enabling compatibility mode for protocol 2.0 debug: Local version string SSH-2.0-OpenSSH_2.3.0 debug: send KEXINIT debug: done debug: wait KEXINIT debug: got kexinit: diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 debug: got kexinit: ssh-dss debug: got kexinit: 3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndael-cbc at lysator.liu.se debug: got kexinit: 3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc,aes192-cbc,aes256-cbc,rijndael128-cbc,rijndael192-cbc,rijndael256-cbc,rijndae...
2001 Sep 27
3
sftp error on LynxOs
I am trying to initiate an sftp session from a Linux (Redhat) to a LynxOs machine (where i have ported opnessh-2.9p1) and configured without PAM support (as I was not able to find PAM version for LynxOS operating system) I get the following error: $ sftp -P /home/telica -l telica -v ben select: Bad file descriptor read: Input/output error sftp> Can somebody help me asap on this?
2005 Jul 24
2
ssl_cipher_list
...=SHA1 export EXP-KRB5-RC2-CBC-SHA SSLv3 Kx=KRB5 Au=KRB5 Enc=RC2(40) Mac=SHA1 export EXP-KRB5-DES-CBC-SHA SSLv3 Kx=KRB5 Au=KRB5 Enc=DES(40) Mac=SHA1 export KRB5-RC4-MD5 SSLv3 Kx=KRB5 Au=KRB5 Enc=RC4(128) Mac=MD5 KRB5-DES-CBC3-MD5 SSLv3 Kx=KRB5 Au=KRB5 Enc=3DES(168) Mac=MD5 KRB5-RC4-SHA SSLv3 Kx=KRB5 Au=KRB5 Enc=RC4(128) Mac=SHA1 KRB5-DES-CBC3-SHA SSLv3 Kx=KRB5 Au=KRB5 Enc=3DES(168) Mac=SHA1 EDH-RSA-DES-CBC3-SHA SSLv3 Kx=DH Au=RSA Enc=3DES(168) Mac=SHA1 EXP-EDH-RSA-DES-CBC-SHA SSLv3 Kx=DH(512) Au=RSA Enc=DES(40) Ma...
2007 Mar 05
1
File exists?
...t overly helpful, so I was hoping that someone could explain the issue. Here''s the file, with line 33 highlighted. Help appreciated. Mike # Flush the SAD and SPD flush; spdflush; # Add SA for 10.33.15.145 to 10.31.8.96 in tunnel mode add 10.33.15.145 10.31.8.96 esp 0x201 -m tunnel -E 3des-cbc 0xB1A03D22D78D6357084B13E930A27F72ECAFB61B5D398A22 -A hmac-md5 0x2F9FCE98685ED329C2E9A5C6CC7C5E20; # Add SA for 10.31.8.96 to 10.33.15.145 in tunnel mode add 10.31.8.96 10.33.15.145 esp 0x301 -m tunnel -E 3des-cbc 0x80C16F148B2C11A0E65939D9D945C5630BE09B7F2EC75186 -A hmac-md5 0x...
2007 Jul 12
0
No subject
...4.20 box = and &nbsp;I want to get the value of the MEMBERINTERFACE variable to know = about which queue member received the call. I set 'setinterfacevar=3D' to = 'yes' in queues.conf but I can&#8217;t get this value. From a php AGI how I can = read this value? <span lang=3DES-AR>Some example? <o:p></o:p></span></p> <p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span = lang=3DES-AR style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></font></p> <p class=3DM...
2002 Feb 06
15
[Bug 105] scp protocol 2 over a hippi interface takes 6 times longer
...|Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- Additional Comments From markus at openbsd.org 2002-02-07 06:54 ------- could you please try this without scp? e.g. cat file | ssh -1 -c 3des 'cat > f' cat file | ssh -2 -c 3des-cbc 'cat > f2' thanks. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2007 Jul 12
0
No subject
...isk 1.4. 20 box = and =A0I want to get the value of the MEMBERINTERFACE variable to know about = which queue member received the call. I set 'setinterfacevar=3D' to 'yes' in = queues.conf but I can&#8217;t get this value. From a php AGI how I can read this value? = <span lang=3DES-AR>Some example? Thanks! <o:p></o:p></span></p> <p class=3DMsoNormal = style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><b><font size=3D3 color=3Dnavy face=3D"Times New Roman"><span lang=3DES-AR = style=3D'font-size:...
2002 Jun 20
0
[Bug 281] New: unable to authorize with local shadow password
...b=/usr/local/lib32/libz.a --with-rand-helper --with-md5-passwords # kdestroy; ssh -v -v -v -1 -l komanek bbs Tickets destroyed. OpenSSH_3.0.2p1, SSH protocols 1.5/2.0, OpenSSL 0x0090603f debug1: Reading configuration data /usr/local/etc/ssh_config debug1: Applying options for * debug3: cipher ok: 3des-cbc [3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc] debug3: cipher ok: blowfish-cbc [3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc] debug3: cipher ok: cast128-cbc [3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes128-cbc] debug3: cipher ok: arcfour [3des-cbc,blowfish-cbc,cast128-cbc,arcfo...
2000 Dec 05
1
SSH_BUG_SIGBLOB?
...rcial) pat ^2\. Enabling compatibility mode for protocol 2.0 debug: Local version string SSH-2.0-OpenSSH_2.3.0p1 debug: Seeding random number generator debug: send KEXINIT debug: done debug: wait KEXINIT debug: got kexinit: diffie-hellman-group1-sha1 debug: got kexinit: ssh-dss debug: got kexinit: 3des-cbc,blowfish-cbc,twofish-cbc,arcfour,none debug: got kexinit: 3des-cbc,blowfish-cbc,twofish-cbc,arcfour,none debug: got kexinit: hmac-md5,md5-8,none debug: got kexinit: hmac-md5,md5-8,none debug: got kexinit: none,zlib debug: got kexinit: none,zlib debug: got kexinit: debug: got kexinit: debug: f...
2013 Nov 12
0
OpenSSH 6.4 connection to Cisco 6506 routers/switches fails
...sha2-nistp521-cert-v01@openssh.com,ssh-dss-cert-v01@openssh.com,ssh-dss-cert-v00@openssh.com,ecdsa-sha2-nistp256,ecdsa-sha2-nistp384,ecdsa-sha2-nistp521,ssh-dss debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-cbc@lysator.liu.se debug2: kex_parse_kexinit: aes128-ctr,aes192-ctr,aes256-ctr,arcfour256,arcfour128,aes128-gcm@openssh.com,aes256-gcm@openssh.com,aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,aes192-cbc,aes256-cbc,arcfour,rijndael-...
2006 Oct 31
0
6296920 IPsec 3DES can''t be used in two-key mode
Author: markfen Repository: /hg/zfs-crypto/gate Revision: ca1aafe8876ceace0d6a4a46d7b4db9181de14e8 Log message: 6296920 IPsec 3DES can''t be used in two-key mode Files: update: usr/src/common/crypto/des/des_impl.c