Displaying 5 results from an estimated 5 matches for "dbider".
2002 Mar 22
0
[Bug 179] New: sshd sends channel data after sending EOF
...ipher_init: set keylen (16 -> 32)
debug1: Enabling compression at level 6.
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: cipher_init: set keylen (16 -> 32)
debug1: SSH2_MSG_NEWKEYS received
debug1: KEX done
debug1: userauth-request for user dbider service ssh-connection method password
debug1: attempt 0 failures 0
debug2: input_userauth_request: setting up authctxt for dbider
debug2: input_userauth_request: try method password
Accepted password for dbider from 10.1.1.2 port 2283 ssh2
debug1: Entering interactive session for SSH2.
debug1: fd...
2011 Sep 06
2
Announce: OpenSSH 5.9 released
...separated child process is currently
experimental but should become the default in a future release.
Native sandboxes for other platforms are welcome (e.g. Capsicum,
Linux pid/net namespaces, etc.)
* Add new SHA256-based HMAC transport integrity modes from
http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt
These modes are hmac-sha2-256, hmac-sha2-256-96, hmac-sha2-512,
and hmac-sha2-512-96, and are available by default in ssh(1) and
sshd(8)
* The pre-authentication sshd(8) privilege separation slave process
now logs via a socket shared with the master process, av...
2011 Sep 06
2
Announce: OpenSSH 5.9 released
...separated child process is currently
experimental but should become the default in a future release.
Native sandboxes for other platforms are welcome (e.g. Capsicum,
Linux pid/net namespaces, etc.)
* Add new SHA256-based HMAC transport integrity modes from
http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt
These modes are hmac-sha2-256, hmac-sha2-256-96, hmac-sha2-512,
and hmac-sha2-512-96, and are available by default in ssh(1) and
sshd(8)
* The pre-authentication sshd(8) privilege separation slave process
now logs via a socket shared with the master process, av...
2011 Aug 14
10
Call for testing: OpenSSH-5.9
...pening new network connections.
Sandboxing of the privilege separated child process will become the
default in a future release. We'd also like to include native
sandboxes for other platforms.
* Add new SHA256-based HMAC transport integrity modes from
http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt
These modes are hmac-sha2-256, hmac-sha2-256-96, hmac-sha2-512,
and hmac-sha2-512-96, and are available by default in ssh(1) and
sshd(8)
* The pre-authentication sshd(8) privilege separation slave process
now logs via a socket shared with the master process, av...
2011 Aug 17
1
openssh-unix-dev Digest, Vol 100, Issue 3
...s.
>
> Sandboxing of the privilege separated child process will become the
> default in a future release. We'd also like to include native
> sandboxes for other platforms.
>
> * Add new SHA256-based HMAC transport integrity modes from
> http://www.ietf.org/id/draft-dbider-sha2-mac-for-ssh-02.txt
> These modes are hmac-sha2-256, hmac-sha2-256-96, hmac-sha2-512,
> and hmac-sha2-512-96, and are available by default in ssh(1) and
> sshd(8)
>
> * The pre-authentication sshd(8) privilege separation slave process
> now logs via a socket shared wi...