search for: compat_datafellow

Displaying 14 results from an estimated 14 matches for "compat_datafellow".

Did you mean: compat_datafellows
2015 Jul 20
2
WinSCP 5.7.5 will support the RFC 4419 revision to Diffie-Hellman group exchange
Hello, I'd like to inform you that the next release of WinSCP SFTP client (version 5.7.5) will support Diffie-Hellman group exchange as specified by RFC 4419. http://winscp.net/tracker/show_bug.cgi?id=1345 So I'd like to ask you to kindly update the check in compat_datafellows() to WinSCP_release_4* WinSCP_release_5.0* WinSCP_release_5.1* WinSCP_release_5.2* WinSCP_release_5.5* WinSCP_release_5.6* WinSCP_release_5.7 WinSCP_release_5.7.1 WinSCP_release_5.7.2 WinSCP_release_5.7.3 WinSCP_release_5.7.4 If you want to test this, please use: http://winscp.net/public/winscp2...
2002 Jan 22
2
ssh-keyscan: xmalloc out of memory error
hi all, I got "xmalloc: out of memory" when i used ssh-keyscan to a remote host that is using SSH protocol 2 and only protocol 2 (no fallback to SSH protocol 1). Looks to me more like ssh-keyscan doesn't talk SSH protocol 2 to the server. Please help. Here is the exact error: # /usr/local/bin/ssh-keyscan -v miad_1 # miad_1 SSH-2.0-OpenSSH_3.0.2p1 xmalloc: out of memory
2014 Apr 20
2
bad bignum encoding for curve25519-sha256@libssh.org
...: compat.c =================================================================== RCS file: /var/cvs/openssh/compat.c,v retrieving revision 1.82 retrieving revision 1.85 diff -u -p -r1.82 -r1.85 --- compat.c 31 Dec 2013 01:25:41 -0000 1.82 +++ compat.c 20 Apr 2014 03:33:59 -0000 1.85 @@ -95,6 +95,9 @@ compat_datafellows(const char *version) { "Sun_SSH_1.0*", SSH_BUG_NOREKEY|SSH_BUG_EXTEOF}, { "OpenSSH_4*", 0 }, { "OpenSSH_5*", SSH_NEW_OPENSSH|SSH_BUG_DYNAMIC_RPORT}, + { "OpenSSH_6.6.1*", SSH_NEW_OPENSSH}, + { "OpenSSH_6.5*," + "OpenSSH_6.6*&qu...
2000 Dec 23
1
OpenSSH-2.3.0p1 patch for yet another F-secure version
....xx.xx.xx... : Connected to sd099001. : Escape character is '^]'. : SSH-2.0-2.1.0.pl2 SSH Secure Shell (non-commercial) : % ssh <mymachine> : .. : autodetect SSH_BUG_SIGBLOB : .. : len 20 datafellows -2 : : Received packet with bad string length ...... : ...DIES.... Actual problem: compat_datafellows() in compat.c does not recognize 2.1.0.pl2 version of SSH as 2.1.0, so it sets the variable "datafellows" to the wrong value. This causes death. one Working patch to the problem: --------------------------------- *** compat.c Sat Nov 4 21:42:36 2000 --- compat.c.new Fri Dec 22 1...
2005 Jun 09
0
Disconnects from Cisco router ssh sessions.
...ompat.c =================================================================== RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/compat.c,v retrieving revision 1.71 diff -u -p -r1.71 compat.c --- compat.c 1 Mar 2005 10:24:33 -0000 1.71 +++ compat.c 9 Jun 2005 07:54:45 -0000 @@ -151,6 +151,8 @@ compat_datafellows(const char *version) "OSU_1.5alpha3*", SSH_BUG_PASSWORDPAD }, { "*SSH_Version_Mapper*", SSH_BUG_SCANNER }, + { "Cisco-1.25", + SSH_BUG_BIGV1PACKET|SSH_BUG_IGNOREMSG }, { "Probe-*", SSH_BUG_PROBE }, { NULL, 0 } Index: compat.h...
2018 Feb 12
2
User manipulation of tty mode opcodes / IUTF8 incompatibilities
On Sun, Feb 11, 2018 at 11:27 PM, Darren Tucker <dtucker at dtucker.net> wrote: > Sigh. If you could provide the server's identity string (eg from "ssh > -v yourthing") we could add a bug bit to stop it from being sent. $ ssh -v nathan at 10.0.0.1 OpenSSH_7.4p1, LibreSSL 2.5.0 [snip] debug1: Local version string SSH-2.0-OpenSSH_7.4 debug1: Remote protocol version
2018 Apr 15
3
OpenSSH 7.7p1 interop failure with Twisted Conch 8.0.0-17.9.0
On Sun, Apr 15, 2018 at 06:38:37PM +1000, Damien Miller wrote: > On Sat, 14 Apr 2018, Colin Watson wrote: > > This isn't an OpenSSH bug, but just in case anyone else is ambitious > > enough to automatically run interoperability tests against other SSH > > implementations, here's a heads-up: > > > > https://twistedmatrix.com/trac/ticket/9422 > >
2004 Jun 04
2
Patch for FIPS 140 mode - take 3
Greetings. (Third try at sending this, the first two seemed to disappear without a trace. Perhaps use of MS Outlook was the problem, even though in plain text...? Or attachment too big (22Kb)? Would like to know...) The final source code and documentation package for a FIPS 140 validated mode of OpenSSL was recently submitted. Once the final certification is awarded by NIST, in a month or
2015 Jul 28
4
Cisco vs. 6.9
> Turns out the problem is the new protocol extension for sending host keys to > the client after user authentication (section 2.5 of the PROTOCOLS > document). Commenting out the notify_hostkeys() call in sshd.c fixes the > issues with Cisco scp. Maybe a new bug compatibility flag in on order to > add to the "Cisco-1.*" client string that was added in 6.9? There's
2017 Jul 24
8
[Bug 2748] New: Bug compatibility masks incorrectly match WinSCP 5.10.x
...Product: Portable OpenSSH Version: 7.5p1 Hardware: Other OS: Other Status: NEW Severity: normal Priority: P5 Component: sshd Assignee: unassigned-bugs at mindrot.org Reporter: martin at winscp.net The compat_datafellows function in compat.c includes this rule: { "WinSCP_release_4*," "WinSCP_release_5.0*," "WinSCP_release_5.1*," "WinSCP_release_5.5*," "WinSCP_release_5.6*,"...
2001 Sep 04
3
2.9p2 behaves different from 2.5.2p2 on tunneling issue
Hi, I have a problem with a Linux box which I updated from 2.5.2p2 to 2.9p2 recently. It's running a tunnel started via inittab using a script which starts ssh -2 -N -o 'ConnectionAttempts 3600' -L <tunnel> $host This has run reliable with 2.5.2 over the last months. Now, after I have upgraded to 2.9p2, the tunnel is closed right after each attempt of an application to use
2013 May 15
2
Support for "ssh-rsa-sha256" and "ssh-dss-sha256" ?‏
Functionality request for supporting Digital Signatures for RSA and DSS Public Key Algorithms in alignment with NIST SP800-131A. I assume this has been asked before, but I could not find in the archives. Support of "ssh-rsa-sha256" and "ssh-dss-sha256" public key algorithms for OpenSSH? I know Suite B Algorithms and x509 SSH Extension Algorithms are supported, but not a
2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
...snprintf(buf, sizeof buf, "SSH-1.5-OpenSSH-keyscan\r\n"); + if (c->c_keytype != KT_RSA1) { + int remote_major, remote_minor; + char remote_version[sizeof buf]; + + if (sscanf(buf, "SSH-%d.%d-%[^\n]\n", + &remote_major, &remote_minor, remote_version) == 3) + compat_datafellows(remote_version); + else + datafellows = 0; + if (!ssh2_capable(remote_major, remote_minor)) { + debug("%s doesn't support ssh2", c->c_name); + confree(s); + return; + } + } + n = snprintf(buf, sizeof buf, "SSH-%d.%d-OpenSSH-keyscan\r\n", + c->c_keytype...
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string client_version_string. These are used just in a few functions and can easily be passed as parameters. Also, there is a strange construct, where their memory is allocated to the global pointers, then copies of these pointers are assigned to the kex structure. The kex_free finally frees them via cleanup of the kex