Displaying 20 results from an estimated 32 matches for "bn_num_bits".
2002 Aug 30
1
LIBCRYPTO?
...9: undefined reference to `RSA_free'
/.../ssh/sshd.c:401: undefined reference to `RSA_free'
/.../ssh/sshd.c:403: undefined reference to `RSA_free'
sshd.elf2flt: In function `main':
/.../ssh/sshd.c:559: undefined reference to `RSA_new'
/.../ssh/sshd.c:599: undefined reference to `BN_num_bits'
/opt/uClinux-dist/user/ssh/sshd.c:599: undefined reference to `BN_num_bits'
/.../ssh/sshd.c:603: undefined reference to `BN_num_bits'
/.../ssh/sshd.c:664: undefined reference to `RSA_new'
/.../ssh/sshd.c:665: undefined reference to `RSA_new'
sshd.elf2flt: In function `do_ssh1_k...
2001 Feb 19
1
Dubious use of BN_num_bits in sshconnect1.c
...Warning: This may be due to an old implementation of ssh.
respond_to_rsa_challenge: public_key 1151 < host_key 1024 +
SSH_KEY_BITS_RESERVED 128
..and a resulting refusal to continue.
I've done a bit of digging in the source, and have found the source of the
problem to be the use of BN_num_bits to determine the length of the keys
received in sshconnect1.c. The problem is that BN_num_bits does not return
the number of significant bits of a given bignum, but rather the position of
the most significant 1 bit, which is not necessarily the same thing.
It is perfectly possible (and as demo...
2001 Feb 19
2
Dubious use of BN_num_bits in sshconnect1.c (resend)
------- Forwarded Message
Subject: Re: Dubious use of BN_num_bits in sshconnect1.c
From: Niels Provos <provos at citi.umich.edu>
In-Reply-To: alex at foogod.com, Sun, 18 Feb 2001 19:38:56 PST
To: alex at foogod.com
Cc: openssh-unix-dev at mindrot.org
Date: Mon, 19 Feb 2001 10:07:24 -0500
Sender: provos at citi.umich.edu
Hi Alex,
there is no problem in Op...
2017 Sep 22
2
Call for testing: OpenSSH 7.6
..., "%s bits %d\n", __func__, bits);
return SSH_ERR_KEY_LENGTH;
+ }
*ecdsap = NULL;
if ((private = EC_KEY_new_by_curve_name(*nid)) == NULL) {
ret = SSH_ERR_ALLOC_FAIL;
@@ -1881,6 +1888,8 @@ sshkey_from_blob_internal(struct sshbuf *b, struct sshkey **keyp,
goto out;
}
if (BN_num_bits(key->rsa->n) < SSH_RSA_MINIMUM_MODULUS_SIZE) {
+ fprintf(stderr, "%s num_bits %d min %d\n", __func__,
+ BN_num_bits(key->rsa->n), SSH_RSA_MINIMUM_MODULUS_SIZE);
ret = SSH_ERR_KEY_LENGTH;
goto out;
}
@@ -2664,6 +2673,8 @@ sshkey_private_deserialize(struct...
2001 Jul 05
1
Patch to workaround host key size mismatch bug in old SSH sshd
...5 10:49:28 2001
@@ -37,6 +37,7 @@
#include "packet.h"
#include "mpaux.h"
#include "uidswap.h"
+#include "compat.h"
#include "log.h"
#include "readconf.h"
#include "key.h"
@@ -960,7 +961,8 @@
sum_len += clen;
rbits = BN_num_bits(host_key->n);
- if (bits != rbits) {
+ if (bits != rbits &&
+ !((datafellows & SSH_BUG_SERVERLIESSIZE) && (rbits + 1 == bits))) {
log("Warning: Server lies about size of server host key: "
"actual size is %d bits vs. announced %d.", rbits, bi...
2001 Feb 08
1
ssh1 keyexchange problem ?
Hi,
Has anybody produced diffs for openssh-2.3.0p1 for the rsa keyexchange
problem that Core-SDI described ? ( I noticed that fix is already
in openbsd tree ).
-Jarno
--
Jarno Huuskonen - System Administrator | Jarno.Huuskonen at uku.fi
University of Kuopio - Computer Center | Work: +358 17 162822
PO BOX 1627, 70211 Kuopio, Finland | Mobile: +358 40 5388169
2017 Feb 03
2
compilation errors on master
...ec/ssh-pkcs11-helper\" -D_PATH_SSH_PIDDIR=\"/var/run\" -D_PATH_PRIVSEP_CHROOT_DIR=\"/var/empty\" -DHAVE_CONFIG_H -c sshkey.c -o sshkey.o
sshkey.c: In function ?sshkey_size?:
sshkey.c:274:28: error: dereferencing pointer to incomplete type ?RSA {aka struct rsa_st}?
return BN_num_bits(k->rsa->n);
^~
sshkey.c:277:28: error: dereferencing pointer to incomplete type ?DSA {aka struct dsa_st}?
return BN_num_bits(k->dsa->p);
^~
sshkey.c: In function ?sshkey_new?:
sshkey.c:478:11: error: dereferencing pointer to inc...
2017 Sep 21
19
Call for testing: OpenSSH 7.6
Hi,
OpenSSH 7.6p1 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This is a bugfix release.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is also available via git using the
instructions at
2003 Sep 30
0
3.7.1p2 on OpenBSD 2.8/sparc
...Running ssh-keygen through gdb, I get:
(gdb) run -t rsa1 -f ssh_host_key -N ""
Starting program: /usr/local/src/openssh-3.7.1p2/./ssh-keygen -t rsa1
-f ssh_host_key -N ""
Generating public/private rsa1 key pair.
Program received signal SIGSEGV, Segmentation fault.
0x1c338 in BN_num_bits ()
(gdb) bt
#0 0x1c338 in BN_num_bits ()
#1 0x5d9c in key_save_private_rsa1 (key=0xd0600, filename=0xcaec8
"ssh_host_key", passphrase=0xd0670 "",
comment=0xf7fff2f8 "root at oldyeek.mercea.net") at authfile.c:124
#2 0x617c in key_save_private (key=0xd0600, file...
2003 Nov 04
0
ServerLiesWarning
.../sshconnect1.c openssh-3.7.1p2-serverlieswarning/sshconnect1.c
--- openssh-3.7.1p2/sshconnect1.c 2003-09-02 08:51:17.000000000 -0400
+++ openssh-3.7.1p2-serverlieswarning/sshconnect1.c 2003-11-04 02:29:50.000000000 -0500
@@ -494,7 +494,8 @@
packet_get_bignum(server_key->rsa->n);
rbits = BN_num_bits(server_key->rsa->n);
- if (bits != rbits) {
+ if (bits == rbits + 1 && ! options.server_lies_warning) {
+ } else if (bits != rbits) {
logit("Warning: Server lies about size of server public key: "
"actual size is %d bits vs. announced %d.", rbits, bits);...
2013 May 15
2
Support for "ssh-rsa-sha256" and "ssh-dss-sha256" ?
Functionality request for supporting Digital Signatures for RSA and DSS
Public Key Algorithms in alignment with NIST SP800-131A.
I
assume this has been asked before, but I could not find in the
archives. Support of "ssh-rsa-sha256" and "ssh-dss-sha256" public key
algorithms for OpenSSH? I know Suite B Algorithms and x509 SSH
Extension Algorithms are supported, but not a
2003 Feb 09
1
Logging of comments on keys
...thorized keys. */
file = authorized_keys_file(pw);
debug("trying public RSA key file %s", file);
***************
*** 249,254 ****
--- 255,263 ----
log("Warning: %s, line %lu: keysize mismatch: "
"actual %d vs. announced %d.",
file, linenum, BN_num_bits(key->rsa->n), bits);
+
+ /* log comment */
+ verbose("Comment on found key: %s", cp);
/* We have found the desired key. */
/*
2001 Nov 02
7
Entropy and DSA keys
I remember a discussion to the effect that using DSA keys in sshd
increases the requirement for random bits available on the system... and
that this requirement (was it a 128 bit random number per connection?)
presents security problems on systems that don't have a decent source of
entropy? Am I misinterpreting those discussions?
We are having a problem deploying sshd (no prngd) where sshd
2015 Mar 24
5
[Bug 2371] New: make check fails when using --without-openssl on AIX
...uzz.o
regress/unittests/sshbuf/test_sshbuf_getput_fuzz.o
regress/unittests/sshbuf/test_sshbuf_fixed.o
regress/unittests/test_helper/libtest_helper.a -lssh -lopenbsd-compat
-lssh -lopenbsd-compat -lz -lcrypt
ld: 0711-317 ERROR: Undefined symbol: .BN_hex2bn
ld: 0711-317 ERROR: Undefined symbol: .BN_num_bits
ld: 0711-317 ERROR: Undefined symbol: .BN_bn2bin
ld: 0711-317 ERROR: Undefined symbol: .BN_bin2bn
ld: 0711-317 ERROR: Undefined symbol: .BN_free
ld: 0711-317 ERROR: Undefined symbol: .BN_new
ld: 0711-317 ERROR: Undefined symbol: .BN_clear_free
ld: 0711-317 ERROR: Undefined symbol: .BN_cmp
ld: 0711-...
2015 Mar 24
5
[Bug 2371] New: make check fails when using --without-openssl on AIX
...uzz.o
regress/unittests/sshbuf/test_sshbuf_getput_fuzz.o
regress/unittests/sshbuf/test_sshbuf_fixed.o
regress/unittests/test_helper/libtest_helper.a -lssh -lopenbsd-compat
-lssh -lopenbsd-compat -lz -lcrypt
ld: 0711-317 ERROR: Undefined symbol: .BN_hex2bn
ld: 0711-317 ERROR: Undefined symbol: .BN_num_bits
ld: 0711-317 ERROR: Undefined symbol: .BN_bn2bin
ld: 0711-317 ERROR: Undefined symbol: .BN_bin2bn
ld: 0711-317 ERROR: Undefined symbol: .BN_free
ld: 0711-317 ERROR: Undefined symbol: .BN_new
ld: 0711-317 ERROR: Undefined symbol: .BN_clear_free
ld: 0711-317 ERROR: Undefined symbol: .BN_cmp
ld: 0711-...
2010 Nov 28
2
[PATCH] Use canonical hostname for DNS SSHFP lookup
...{
diff -ur openssh/sshconnect1.c openssh-sshfp/sshconnect1.c
--- openssh/sshconnect1.c 2006-11-07 13:14:42.000000000 +0100
+++ openssh-sshfp/sshconnect1.c 2010-11-27 23:57:11.267747490 +0100
@@ -535,7 +535,7 @@
debug("Received server public key (%d bits) and host key (%d bits).",
BN_num_bits(server_key->rsa->n), BN_num_bits(host_key->rsa->n));
- if (verify_host_key(host, hostaddr, host_key) == -1)
+ if (verify_host_key(host, hostaddr, host_key, NULL) == -1)
fatal("Host key verification failed.");
client_flags = SSH_PROTOFLAG_SCREEN_NUMBER | SSH_PROTOFLAG_...
2015 Jun 25
3
Call for testing: OpenSSH 6.9
On Thu, 25 Jun 2015, Michael Felt wrote:
> Just running a standard make, and then a make install to a packaging
> directory. It seems to be complaining about missing keys - not sure yet if
> this is a show stopper
For packaging you want the install-nokeys rule not install.
--
Tim Rice Multitalents
tim at multitalents.net
2005 Feb 24
3
Suggestion: SSHD pseudo/fake mode. Source available.
Hi,
SSH brute force attacks seem to enjoy increasing popularity. Call me an
optimist or a misrouted kind of contributer to the community, but on our
company server I actually go through the logs and report extreme cases
to the providers of the originating IP's. With the increasing number of
these attacks, however, I have now decided that it's better to move the
SSHd to a different
2013 May 31
0
DH group selection for SHA2-512 bit HMAC.
...I.e. minimum and preferred group size is 1024-bit,
- OpenSSH server in kexgexs.c:kexgex_server processes this message and
selects 1024-bit group, sending it back to client.
- however, later, when it goes to shared secret generation, in
dh.c:dh_gen_key code checks group size to be
2 * need >= BN_num_bits(dh->p), where need is set to 512 bit (by the
size of HMAC, i assume ), producing the error fatal("dh_gen_key: group
too small: %d (2*need %d)".
So, I think it would be more logical to check 'need' parameter somewhere
during group selection.
Or am I missing something?
Thanks...
2015 Jul 26
2
[PATCH] ssh-agent: Add support to load additional certificates
...2(msg, tab->nentries)) != 0)
fatal("%s: buffer error: %s", __func__, ssh_err(r));
TAILQ_FOREACH(id, &tab->idlist, next) {
- if (id->key->type == KEY_RSA1) {
+ if (id->idkey->key->type == KEY_RSA1) {
#ifdef WITH_SSH1
if ((r = sshbuf_put_u32(msg,
- BN_num_bits(id->key->rsa->n))) != 0 ||
+ BN_num_bits(id->idkey->key->rsa->n))) != 0 ||
(r = sshbuf_put_bignum1(msg,
- id->key->rsa->e)) != 0 ||
+ id->idkey->key->rsa->e)) != 0 ||
(r = sshbuf_put_bignum1(msg,
- id->key->rsa-...