search for: dh_need

Displaying 12 results from an estimated 12 matches for "dh_need".

2020 Jan 13
4
ssh failure from CentOS7 to Centos6
...e-sha256 debug1: kex: host key algorithm: ssh-rsa debug1: kex: server->client cipher: aes128-ctr MAC: umac-64 at openssh.com compression: none debug1: kex: client->server cipher: aes128-ctr MAC: umac-64 at openssh.com compression: none debug1: kex: diffie-hellman-group-exchange-sha256 need=16 dh_need=16 debug1: kex: diffie-hellman-group-exchange-sha256 need=16 dh_need=16 debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<3072<8192) sent Connection closed by 194.254.66.8 port 22 I'm stuck.... Patrick
2020 Jan 13
0
ssh failure from CentOS7 to Centos6
...ent > debug1: SSH2_MSG_KEXINIT received It got items and says it is going to use the user tec21 to login > debug2: local client KEXINIT proposal > debug1: kex: client->server cipher: aes128-ctr MAC: umac-64 at openssh.com > debug1: kex: diffie-hellman-group-exchange-sha256 need=16 dh_need=16 > debug1: kex: diffie-hellman-group-exchange-sha256 need=16 dh_need=16 > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<3072<8192) sent > Connection closed by 194.254.66.8 port 22 > The server then stops the connection. I would then go through the following on the host: 1. Is fail2b...
2020 Jan 13
1
ssh failure from CentOS7 to Centos6
...eceived > > It got items and says it is going to use the user tec21 to login > > > debug2: local client KEXINIT proposal > > > debug1: kex: client->server cipher: aes128-ctr MAC: umac-64 at openssh.com > > debug1: kex: diffie-hellman-group-exchange-sha256 need=16 dh_need=16 > > debug1: kex: diffie-hellman-group-exchange-sha256 need=16 dh_need=16 > > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<3072<8192) sent > > Connection closed by 194.254.66.8 port 22 > > > > The server then stops the connection. I would then go through the >...
2016 Oct 20
2
Custom PAM module not working correctly
...reserved 0 [preauth] debug1: kex: client->server chacha20-poly1305 at openssh.com <implicit> zlib at openssh.com [preauth] debug1: kex: server->client chacha20-poly1305 at openssh.com <implicit> zlib at openssh.com [preauth] debug1: kex: curve25519-sha256 at libssh.org need=64 dh_need=64 [preauth] debug1: kex: curve25519-sha256 at libssh.org need=64 dh_need=64 [preauth] debug1: expecting SSH2_MSG_KEX_ECDH_INIT [preauth] debug2: monitor_read: 6 used once, disabling now debug2: kex_derive_keys [preauth] debug2: set_newkeys: mode 1 [preauth] debug1: SSH2_MSG_NEWKEYS sent [preauth]...
2018 Mar 06
2
Failed connections 7.6 to 5.2
...ffie-hellman-group-exchange-sha256 debug1: kex: host key algorithm: ssh-rsa debug1: kex: server->client cipher: aes256-ctr MAC: hmac-sha1 compression: none debug1: kex: client->server cipher: aes256-ctr MAC: hmac-sha1 compression: none debug1: kex: diffie-hellman-group-exchange-sha256 need=32 dh_need=32 debug1: kex: diffie-hellman-group-exchange-sha256 need=32 dh_need=32 debug3: send packet: type 34 debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(2048<8192<8192) sent debug3: receive packet: type 31 debug1: got SSH2_MSG_KEX_DH_GEX_GROUP debug2: bits set: 4082/8192 debug3: send packet: type 32 debug1:...
2017 Nov 01
2
Winbind, Kerberos, SSH and Single Sign On
...ecdsa-sha2-nistp256 debug1: kex: server->client cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none debug1: kex: client->server cipher: chacha20-poly1305 at openssh.com MAC: <implicit> compression: none debug1: kex: curve25519-sha256 at libssh.org need=64 dh_need=64 debug1: kex: curve25519-sha256 at libssh.org need=64 dh_need=64 debug3: send packet: type 30 debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug3: receive packet: type 31 debug1: Server host key: ecdsa-sha2-nistp256 SHA256:7/AZTZcLAybma0tYTXNTStak01rfYk/r17XmQO1djso debug3: hostkeys_foreach: readin...
2017 Nov 01
0
Winbind, Kerberos, SSH and Single Sign On
...: server->client cipher: > chacha20-poly1305 at openssh.com MAC: > <implicit> compression: none > debug1: kex: client->server cipher: > chacha20-poly1305 at openssh.com MAC: > <implicit> compression: none > debug1: kex: curve25519-sha256 at libssh.org need=64 dh_need=64 > debug1: kex: curve25519-sha256 at libssh.org need=64 dh_need=64 > debug3: send packet: type 30 > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY > debug3: receive packet: type 31 > debug1: Server host key: ecdsa-sha2-nistp256 > SHA256:7/AZTZcLAybma0tYTXNTStak01rfYk/r17XmQO1djso &g...
2017 Nov 02
2
Winbind, Kerberos, SSH and Single Sign On
...cipher: >> chacha20-poly1305 at openssh.com MAC: >> <implicit> compression: none >> debug1: kex: client->server cipher: >> chacha20-poly1305 at openssh.com MAC: >> <implicit> compression: none >> debug1: kex: curve25519-sha256 at libssh.org need=64 dh_need=64 >> debug1: kex: curve25519-sha256 at libssh.org need=64 dh_need=64 >> debug3: send packet: type 30 >> debug1: expecting SSH2_MSG_KEX_ECDH_REPLY >> debug3: receive packet: type 31 >> debug1: Server host key: ecdsa-sha2-nistp256 >> SHA256:7/AZTZcLAybma0tYTXNTSta...
2016 Apr 19
4
Client-side public key causing mess
...etup: setup hmac-md5-etm at openssh.com debug1: kex: server->client aes128-ctr hmac-md5-etm at openssh.com none debug2: mac_setup: setup hmac-md5-etm at openssh.com debug1: kex: client->server aes128-ctr hmac-md5-etm at openssh.com none debug1: kex: curve25519-sha256 at libssh.org need=16 dh_need=16 debug1: kex: curve25519-sha256 at libssh.org need=16 dh_need=16 debug1: sending SSH2_MSG_KEX_ECDH_INIT debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: Server host key: ECDSA <fingerprint> debug3: load_hostkeys: loading entries for host "<server-ip>" from file "/...
2023 Jun 30
1
Subsystem sftp invoked even though forced command created
On 30/06/2023 09:56, Damien Miller wrote: > It's very hard to figure out what is happening here without a debug log. > > You can get one by stopping the listening sshd and running it manually > in debug mode, e.g. "/usr/sbin/sshd -ddd" Or starting one in debug mode on a different port, e.g. "-p99 -ddd"
2014 Mar 07
12
[Bug 2209] New: Problem logging into Cisco devices under 6.5p1 (kexgexc.c)
...5 diff -u -p -r1.15 kexgexc.c --- kexgexc.c 12 Jan 2014 08:13:13 -0000 1.15 +++ kexgexc.c 25 Jan 2014 10:04:23 -0000 @@ -55,7 +55,7 @@ kexgex_client(Kex *kex) int min, max, nbits; DH *dh; - nbits = dh_estimate(kex->we_need * 8); + nbits = dh_estimate(kex->dh_need * 8); if (datafellows & SSH_OLD_DHGEX) { /* Old GEX request */ -- You are receiving this mail because: You are watching the assignee of the bug.
2019 Mar 27
26
Call for testing: OpenSSH 8.0
Hi, OpenSSH 8.0p1 is almost ready for release, so we would appreciate testing on as many platforms and systems as possible. Snapshot releases for portable OpenSSH are available from http://www.mindrot.org/openssh_snap/ The OpenBSD version is available in CVS HEAD: http://www.openbsd.org/anoncvs.html Portable OpenSSH is also available via git using the instructions at