Displaying 20 results from an estimated 46 matches for "cipher_init".
2013 Jul 30
1
fatal: cipher_init: EVP_CipherInit: set key failed for aes128-cbc [preauth]
Am I the only person to be seeing this log message from sshd:
fatal: cipher_init: EVP_CipherInit: set key failed for aes128-cbc [preauth]
?
(security/openssh-portable, with HPN patches and MIT Kerberos,
although Kerberos is not actually configured on this server.) A
work-around is to disable aes128-cbc in sshd_config, but it would be
nice not to have my logs spammed with thi...
2018 Dec 07
4
[Bug 2942] New: minor memory leak in ssh_set_newkeys()
...tartup ssh_set_newkeys() is called twice, once with MODE_OUT
and once with MODE_IN.
Accordingly the ccp pointer points to state->send_context and
state->receive_context
At this time state->newkeys[mode] is stil NULL, so the if-clause
("rekeying") does not apply.
Further down cipher_init(ccp, ) is called.
First thing that cipher_init() does is setting *ccp= NULL; which is be
equivalent to "state->send_context= NULL" (or "state->send_context=
NULL").
These point to memory blocks already.
The pointers are lost, the memory leaks.
Proposal: move...
2004 Aug 24
1
Possible problem with hostbased protocol 1 rhosts authentication
..._host_in_hostfile: filename /u/XXXXXX/mr/.ssh/known_hosts
debug3: check_host_in_hostfile: match line 73
debug1: Host 'AAAA' is known and matches the RSA1 host key.
debug1: Found key in /u/XXXXXX/mr/.ssh/known_hosts:73
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug2: cipher_init: set keylen (16 -> 32)
debug2: cipher_init: set keylen (16 -> 32)
debug1: Installing crc compensation attack detector.
debug1: Received encrypted confirmation.
debug1: Doing password authentication.
mr at tcm30's password:
"
# This is ssh server systemwide configuration file.
"...
2002 Mar 07
20
[Bug 138] Incorrect OpenSSL version requirment?
http://bugzilla.mindrot.org/show_bug.cgi?id=138
mouring at eviladmin.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |vjo at dulug.duke.edu
------- Additional Comments From mouring at eviladmin.org 2002-03-08 04:49 -------
*** Bug 139 has been
2002 Mar 16
4
[Bug 165] Problem with SSH1 Keys on RedHat7.2
http://bugzilla.mindrot.org/show_bug.cgi?id=165
------- Additional Comments From markus at openbsd.org 2002-03-17 04:31 -------
never seen this. what does sshd -ddd say?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Jul 08
0
"Help with EVP_CipherInit"
...1 with the view of testing the effectiveness
of my code detecting the recently reported vunerability,but my code fails
on with an error report of a use of memcpy with overlapping source and
destination regions. I have being able to narrow it down to a call to
EVP_CipherInit in cipher.c:224(function cipher_init).
I checked but couldn't find any man page of EVP_CipherInit.
I will appreciate if u can give me any info on the implementation of
EVP_CipherInit such as to explain this scenario.
Below are some information i hope will be useful.
Thanks
tunji
Debugging using ddd shows this error comes
up th...
2008 Jun 12
2
FIPS mode OpenSSH suggestion
...official patch for FIPS Capable OpenSSH. I try it and it seems working for some cases.
(BTW, I also find that aes128-ctr, aes192-ctr and aes256-ctr ciphers can't work in FIPS mode properly.
The fips mode sshd debug info is as following.
***************************
debug2: set_newkeys: mode 1
cipher_init: EVP_CipherInit: set key failed for aes128-ctr
debug1: do_cleanup
??
debug3: PAM: sshpam_thread_cleanup entering
debug1: audit event euid 0 user (unknown user) event 12 (CONNECTION_ABANDON)
***************************
I don't know why. Are these three ciphers FIPS forbidden?)
??
As you...
2002 Mar 08
1
Problems with Solaris 8 and OpenSSH 3.1p1
...bin/ssh\"
-D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/libexec/ssh-askpass\"
-D_PATH_SFTP_SERVER=\"/usr/libexec/sftp-server\"
-D_PATH_SSH_PIDDIR=\"/var/run\"
-DSSH_RAND_HELPER=\"/usr/libexec/ssh-rand-helper\" -DHAVE_CONFIG_H -c
cipher.c
cipher.c: In function `cipher_init':
cipher.c:200: void value not ignored as it ought to be
cipher.c:206: warning: implicit declaration of function
`EVP_CIPHER_CTX_set_key_length'
cipher.c:210: void value not ignored as it ought to be
cipher.c: In function `cipher_crypt':
cipher.c:220: void value not ignored as it ought...
2002 Mar 12
1
Disconnecting: Corrupted check bytes on input.
...debug1: Encryption type: blowfish
debug1: Sent encrypted session key.
debug1: Installing crc compensation attack detector.
Disconnecting: Corrupted check bytes on input.
debug1: Calling cleanup 0x20009598(0x0)
Client/3des:
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug1: cipher_init: set keylen (16 -> 32)
debug1: cipher_init: set keylen (16 -> 32)
debug1: Installing crc compensation attack detector.
debug1: Received encrypted confirmation.
debug1: Trying rhosts or /etc/hosts.equiv with RSA host authentication.
debug1: Remote: Accepted for hilb0.medat.de [172.30.1.8] by /...
2002 Jul 08
0
[Bug 342] New: RhostsRSAAuthentication does not work with 3.4p1
...ug1: Waiting for server public key.
debug1: Received server public key (768 bits) and host key (1024 bits).
debug1: Host 'chinon' is known and matches the RSA1 host key.
debug1: Found key in /etc/ssh/ssh_known_hosts:3
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug1: cipher_init: set keylen (16 -> 32)
debug1: cipher_init: set keylen (16 -> 32)
debug1: Installing crc compensation attack detector.
debug1: Received encrypted confirmation.
Permission denied.
debug1: Calling cleanup 0x80651d0(0x0)
------- You are receiving this mail because: -------
You are the assigne...
2002 Sep 10
8
[Bug 369] Inconsistant exiit status from scp
...for server public key.
debug1: Received server public key (768 bits) and host key (1024 bits).
debug1: Host 'mod-tsd.pitux.com' is known and matches the RSA1 host key.
debug1: Found key in /home/fg/.ssh/known_hosts:17
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug1: cipher_init: set keylen (16 -> 32)
debug1: cipher_init: set keylen (16 -> 32)
debug1: Installing crc compensation attack detector.
debug1: Received encrypted confirmation.
debug1: Trying RSA authentication via agent with 'fgaliegue at ovh.tbs-internet.com'
debug1: Received RSA challenge from serv...
2024 Aug 13
1
[PATCH] Reorder calloc arguments
...rtable on a Linux system.
Okay?
Index: cipher.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/cipher.c,v
diff -u -p -u -p -r1.121 cipher.c
--- cipher.c 17 May 2024 02:39:11 -0000 1.121
+++ cipher.c 13 Aug 2024 16:46:00 -0000
@@ -249,7 +249,7 @@ cipher_init(struct sshcipher_ctx **ccp,
#endif
*ccp = NULL;
- if ((cc = calloc(sizeof(*cc), 1)) == NULL)
+ if ((cc = calloc(1, sizeof(*cc))) == NULL)
return SSH_ERR_ALLOC_FAIL;
cc->plaintext = (cipher->flags & CFLAG_NONE) != 0;
Index: sshbuf.c
===============================================...
2005 May 18
0
Problems with RhostRSAAuthecntication and UsePrivilegeSeparation (RH9, 2.4.20-42.9.legacybigmem)
...Waiting for server public key.
debug1: Received server public key (768 bits) and host key (1024 bits).
debug1: Host 'lpsdm05' is known and matches the RSA1 host key.
debug1: Found key in /etc/ssh/ssh_known_hosts:4450
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug1: cipher_init: set keylen (16 -> 32)
debug1: cipher_init: set keylen (16 -> 32)
debug1: Installing crc compensation attack detector.
debug1: Received encrypted confirmation.
debug1: Trying rhosts or /etc/hosts.equiv with RSA host authentication.
debug1: Remote: Accepted for lpsdm21.muc [160.48.88.10] by
/e...
2002 Jun 25
10
Last call.
Outside the pre-auth patch by Markus to fix Cygwin and a few other
platforms.
SEND ME (privately) ANY required patch against the lastest snapshot.
I'm doing the final commits this evening.
Patches that have been temporary rejected for this release.
- Owl's full patch for SysV Shm if mmap fails
- mmap() on /dev/zero
- mmap() on sparse file
.. Not looked at the BSD/OS 5.0 patch
2002 Mar 07
12
[Bug 141] openssh-3.1p1-1.src.rpm will not build on RedHat Linux 6.1
http://bugzilla.mindrot.org/show_bug.cgi?id=141
markus at openbsd.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Summary| openssh-3.1p1-1.src.rpm |openssh-3.1p1-1.src.rpm will
|will not build on RedHat |not build on RedHat Linux
|Linux 6.1
2002 Jul 17
1
[Bug 357] New: SSH does not handle "Protocol" option in ~/.ssh/options properly
...ver public key.
debug1: Received server public key (768 bits) and host key (1024 bits).
debug1: Host 'shevy.roaringpenguin.com' is known and matches the RSA1 host key.
debug1: Found key in /home/dfs/.ssh/known_hosts:7
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug1: cipher_init: set keylen (16 -> 32)
debug1: cipher_init: set keylen (16 -> 32)
debug1: Installing crc compensation attack detector.
debug1: Received encrypted confirmation.
debug1: Trying RSA authentication via agent with 'dfs at shishi.skoll.ca'
debug1: Received RSA challenge from server.
debug1:...
2002 Mar 14
0
OpenSSH 3.1 and OpenBSD 2.8 problem
...for server public key.
debug1: Received server public key (768 bits) and host key (1024 bits).
debug1: Host 'scooby.local' is known and matches the RSA1 host key.
debug1: Found key in /home/kwhite/.ssh/known_hosts:12
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug1: cipher_init: set keylen (16 -> 32)
debug1: cipher_init: set keylen (16 -> 32)
debug1: Installing crc compensation attack detector.
Disconnecting: Corrupted check bytes on input.
debug1: Calling cleanup 0x1a504(0x0)
I tried a couple different ciphers, and got the same thing.
Any ideas? I got these war...
2007 Mar 07
1
Announce: OpenSSH 4.6 released
OpenSSH 4.6 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches,
2002 Mar 20
0
[Bug 176] New: OpenSSH_3.1p1 gives X_ShmAttach error on forwarded X11 channel
...g for server public key.
debug1: Received server public key (768 bits) and host key (1024 bits).
debug1: Host 'mott' is known and matches the RSA1 host key.
debug1: Found key in /home/camp/ohnielse/.ssh/known_hosts:28
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug1: cipher_init: set keylen (16 -> 32)
debug1: cipher_init: set keylen (16 -> 32)
debug1: Installing crc compensation attack detector.
debug1: Received encrypted confirmation.
debug1: Trying rhosts authentication.
debug1: Remote: Accepted for tycho.fysik.dtu.dk [130.225.86.17] by /etc/hosts.equiv.
debug1: Re...
2003 Mar 21
5
[Bug 516] RhostsAuthentication failing under AIX 4.3.3
...; client software version OpenSSH_3.5p1
debug1: match: OpenSSH_3.5p1 pat OpenSSH*
debug1: Local version string SSH-1.99-OpenSSH_3.5p1
debug1: permanently_set_uid: 7/204
debug1: Sent 768 bit server key and 1024 bit host key.
debug2: Network child is on pid 16256
debug1: Encryption type: 3des
debug1: cipher_init: set keylen (16 -> 32)
debug1: cipher_init: set keylen (16 -> 32)
debug1: Received session key; encryption turned on.
debug2: monitor_read: 28 used once, disabling now
debug2: monitor_read: 30 used once, disabling nowdebug1: Installing crc
compensation attack detector.
debug1: Attempting au...