search for: cipher_init

Displaying 20 results from an estimated 45 matches for "cipher_init".

2013 Jul 30
1
fatal: cipher_init: EVP_CipherInit: set key failed for aes128-cbc [preauth]
Am I the only person to be seeing this log message from sshd: fatal: cipher_init: EVP_CipherInit: set key failed for aes128-cbc [preauth] ? (security/openssh-portable, with HPN patches and MIT Kerberos, although Kerberos is not actually configured on this server.) A work-around is to disable aes128-cbc in sshd_config, but it would be nice not to have my logs spammed with thi...
2018 Dec 07
4
[Bug 2942] New: minor memory leak in ssh_set_newkeys()
...tartup ssh_set_newkeys() is called twice, once with MODE_OUT and once with MODE_IN. Accordingly the ccp pointer points to state->send_context and state->receive_context At this time state->newkeys[mode] is stil NULL, so the if-clause ("rekeying") does not apply. Further down cipher_init(ccp, ) is called. First thing that cipher_init() does is setting *ccp= NULL; which is be equivalent to "state->send_context= NULL" (or "state->send_context= NULL"). These point to memory blocks already. The pointers are lost, the memory leaks. Proposal: move...
2004 Aug 24
1
Possible problem with hostbased protocol 1 rhosts authentication
..._host_in_hostfile: filename /u/XXXXXX/mr/.ssh/known_hosts debug3: check_host_in_hostfile: match line 73 debug1: Host 'AAAA' is known and matches the RSA1 host key. debug1: Found key in /u/XXXXXX/mr/.ssh/known_hosts:73 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug2: cipher_init: set keylen (16 -> 32) debug2: cipher_init: set keylen (16 -> 32) debug1: Installing crc compensation attack detector. debug1: Received encrypted confirmation. debug1: Doing password authentication. mr at tcm30's password: " # This is ssh server systemwide configuration file. "...
2002 Mar 07
20
[Bug 138] Incorrect OpenSSL version requirment?
http://bugzilla.mindrot.org/show_bug.cgi?id=138 mouring at eviladmin.org changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |vjo at dulug.duke.edu ------- Additional Comments From mouring at eviladmin.org 2002-03-08 04:49 ------- *** Bug 139 has been
2002 Mar 16
4
[Bug 165] Problem with SSH1 Keys on RedHat7.2
http://bugzilla.mindrot.org/show_bug.cgi?id=165 ------- Additional Comments From markus at openbsd.org 2002-03-17 04:31 ------- never seen this. what does sshd -ddd say? ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2002 Jul 08
0
"Help with EVP_CipherInit"
...1 with the view of testing the effectiveness of my code detecting the recently reported vunerability,but my code fails on with an error report of a use of memcpy with overlapping source and destination regions. I have being able to narrow it down to a call to EVP_CipherInit in cipher.c:224(function cipher_init). I checked but couldn't find any man page of EVP_CipherInit. I will appreciate if u can give me any info on the implementation of EVP_CipherInit such as to explain this scenario. Below are some information i hope will be useful. Thanks tunji Debugging using ddd shows this error comes up th...
2008 Jun 12
2
FIPS mode OpenSSH suggestion
...official patch for FIPS Capable OpenSSH. I try it and it seems working for some cases. (BTW, I also find that aes128-ctr, aes192-ctr and aes256-ctr ciphers can't work in FIPS mode properly. The fips mode sshd debug info is as following. *************************** debug2: set_newkeys: mode 1 cipher_init: EVP_CipherInit: set key failed for aes128-ctr debug1: do_cleanup ?? debug3: PAM: sshpam_thread_cleanup entering debug1: audit event euid 0 user (unknown user) event 12 (CONNECTION_ABANDON) *************************** I don't know why. Are these three ciphers FIPS forbidden?) ?? As you...
2002 Mar 08
1
Problems with Solaris 8 and OpenSSH 3.1p1
...bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/usr/libexec/sftp-server\" -D_PATH_SSH_PIDDIR=\"/var/run\" -DSSH_RAND_HELPER=\"/usr/libexec/ssh-rand-helper\" -DHAVE_CONFIG_H -c cipher.c cipher.c: In function `cipher_init': cipher.c:200: void value not ignored as it ought to be cipher.c:206: warning: implicit declaration of function `EVP_CIPHER_CTX_set_key_length' cipher.c:210: void value not ignored as it ought to be cipher.c: In function `cipher_crypt': cipher.c:220: void value not ignored as it ought...
2002 Mar 12
1
Disconnecting: Corrupted check bytes on input.
...debug1: Encryption type: blowfish debug1: Sent encrypted session key. debug1: Installing crc compensation attack detector. Disconnecting: Corrupted check bytes on input. debug1: Calling cleanup 0x20009598(0x0) Client/3des: debug1: Encryption type: 3des debug1: Sent encrypted session key. debug1: cipher_init: set keylen (16 -> 32) debug1: cipher_init: set keylen (16 -> 32) debug1: Installing crc compensation attack detector. debug1: Received encrypted confirmation. debug1: Trying rhosts or /etc/hosts.equiv with RSA host authentication. debug1: Remote: Accepted for hilb0.medat.de [172.30.1.8] by /...
2002 Jul 08
0
[Bug 342] New: RhostsRSAAuthentication does not work with 3.4p1
...ug1: Waiting for server public key. debug1: Received server public key (768 bits) and host key (1024 bits). debug1: Host 'chinon' is known and matches the RSA1 host key. debug1: Found key in /etc/ssh/ssh_known_hosts:3 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug1: cipher_init: set keylen (16 -> 32) debug1: cipher_init: set keylen (16 -> 32) debug1: Installing crc compensation attack detector. debug1: Received encrypted confirmation. Permission denied. debug1: Calling cleanup 0x80651d0(0x0) ------- You are receiving this mail because: ------- You are the assigne...
2002 Sep 10
8
[Bug 369] Inconsistant exiit status from scp
...for server public key. debug1: Received server public key (768 bits) and host key (1024 bits). debug1: Host 'mod-tsd.pitux.com' is known and matches the RSA1 host key. debug1: Found key in /home/fg/.ssh/known_hosts:17 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug1: cipher_init: set keylen (16 -> 32) debug1: cipher_init: set keylen (16 -> 32) debug1: Installing crc compensation attack detector. debug1: Received encrypted confirmation. debug1: Trying RSA authentication via agent with 'fgaliegue at ovh.tbs-internet.com' debug1: Received RSA challenge from serv...
2005 May 18
0
Problems with RhostRSAAuthecntication and UsePrivilegeSeparation (RH9, 2.4.20-42.9.legacybigmem)
...Waiting for server public key. debug1: Received server public key (768 bits) and host key (1024 bits). debug1: Host 'lpsdm05' is known and matches the RSA1 host key. debug1: Found key in /etc/ssh/ssh_known_hosts:4450 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug1: cipher_init: set keylen (16 -> 32) debug1: cipher_init: set keylen (16 -> 32) debug1: Installing crc compensation attack detector. debug1: Received encrypted confirmation. debug1: Trying rhosts or /etc/hosts.equiv with RSA host authentication. debug1: Remote: Accepted for lpsdm21.muc [160.48.88.10] by /e...
2002 Jun 25
10
Last call.
Outside the pre-auth patch by Markus to fix Cygwin and a few other platforms. SEND ME (privately) ANY required patch against the lastest snapshot. I'm doing the final commits this evening. Patches that have been temporary rejected for this release. - Owl's full patch for SysV Shm if mmap fails - mmap() on /dev/zero - mmap() on sparse file .. Not looked at the BSD/OS 5.0 patch
2002 Mar 07
12
[Bug 141] openssh-3.1p1-1.src.rpm will not build on RedHat Linux 6.1
http://bugzilla.mindrot.org/show_bug.cgi?id=141 markus at openbsd.org changed: What |Removed |Added ---------------------------------------------------------------------------- Summary| openssh-3.1p1-1.src.rpm |openssh-3.1p1-1.src.rpm will |will not build on RedHat |not build on RedHat Linux |Linux 6.1
2002 Jul 17
1
[Bug 357] New: SSH does not handle "Protocol" option in ~/.ssh/options properly
...ver public key. debug1: Received server public key (768 bits) and host key (1024 bits). debug1: Host 'shevy.roaringpenguin.com' is known and matches the RSA1 host key. debug1: Found key in /home/dfs/.ssh/known_hosts:7 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug1: cipher_init: set keylen (16 -> 32) debug1: cipher_init: set keylen (16 -> 32) debug1: Installing crc compensation attack detector. debug1: Received encrypted confirmation. debug1: Trying RSA authentication via agent with 'dfs at shishi.skoll.ca' debug1: Received RSA challenge from server. debug1:...
2002 Mar 14
0
OpenSSH 3.1 and OpenBSD 2.8 problem
...for server public key. debug1: Received server public key (768 bits) and host key (1024 bits). debug1: Host 'scooby.local' is known and matches the RSA1 host key. debug1: Found key in /home/kwhite/.ssh/known_hosts:12 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug1: cipher_init: set keylen (16 -> 32) debug1: cipher_init: set keylen (16 -> 32) debug1: Installing crc compensation attack detector. Disconnecting: Corrupted check bytes on input. debug1: Calling cleanup 0x1a504(0x0) I tried a couple different ciphers, and got the same thing. Any ideas? I got these war...
2007 Mar 07
1
Announce: OpenSSH 4.6 released
OpenSSH 4.6 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches,
2002 Mar 20
0
[Bug 176] New: OpenSSH_3.1p1 gives X_ShmAttach error on forwarded X11 channel
...g for server public key. debug1: Received server public key (768 bits) and host key (1024 bits). debug1: Host 'mott' is known and matches the RSA1 host key. debug1: Found key in /home/camp/ohnielse/.ssh/known_hosts:28 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug1: cipher_init: set keylen (16 -> 32) debug1: cipher_init: set keylen (16 -> 32) debug1: Installing crc compensation attack detector. debug1: Received encrypted confirmation. debug1: Trying rhosts authentication. debug1: Remote: Accepted for tycho.fysik.dtu.dk [130.225.86.17] by /etc/hosts.equiv. debug1: Re...
2003 Mar 21
5
[Bug 516] RhostsAuthentication failing under AIX 4.3.3
...; client software version OpenSSH_3.5p1 debug1: match: OpenSSH_3.5p1 pat OpenSSH* debug1: Local version string SSH-1.99-OpenSSH_3.5p1 debug1: permanently_set_uid: 7/204 debug1: Sent 768 bit server key and 1024 bit host key. debug2: Network child is on pid 16256 debug1: Encryption type: 3des debug1: cipher_init: set keylen (16 -> 32) debug1: cipher_init: set keylen (16 -> 32) debug1: Received session key; encryption turned on. debug2: monitor_read: 28 used once, disabling now debug2: monitor_read: 30 used once, disabling nowdebug1: Installing crc compensation attack detector. debug1: Attempting au...
2002 Aug 19
0
kerberosIV authentication is broken in openssh-3.4p1
...SA1 key fingerprint is b7:04:c0:bc:24:53:75:d1:75:23:61:d4:6b:f8:61:df. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added 'nmrindy,195.113.59.111' (RSA1) to the list of known hosts. debug1: Encryption type: 3des debug1: Sent encrypted session key. debug1: cipher_init: set keylen (16 -> 32) debug1: cipher_init: set keylen (16 -> 32) debug1: Installing crc compensation attack detector. debug1: Received encrypted confirmation. debug1: Trying Kerberos v4 authentication. debug1: Kerberos v4 authentication accepted. debug1: Kerberos v4 challenge successful. deb...