Displaying 20 results from an estimated 62 matches for "gex".
Did you mean:
get
2015 Jun 02
1
[Bug 2302] with DH-GEX, ssh (and sshd) should not fall back to unconfigured DH groups or at least document this behaviour and use a stronger group
...//bugzilla.mindrot.org/show_bug.cgi?id=2302
--- Comment #13 from Darren Tucker <dtucker at zip.com.au> ---
(In reply to Christoph Anton Mitterer from comment #10)
[...]
> Even though an attacker cannot (AFAIU??) for a connection to
> downgrade to the weaker groups,
The server's DH-GEX exchange hash includes the DH group sizes it
received from the client. If these are modified in transit the
exchange hash will not match.
> it still doesn't give the server
> admin a good way to "block out" weak clients.
Do any such clients actually exist? RFC4419 says DH-GE...
2014 Oct 28
1
[Bug 2303] New: ssh (and perhaps even sshd) should allow to specify the minimum DH group sizes for DH GEX
https://bugzilla.mindrot.org/show_bug.cgi?id=2303
Bug ID: 2303
Summary: ssh (and perhaps even sshd) should allow to specify
the minimum DH group sizes for DH GEX
Product: Portable OpenSSH
Version: 6.7p1
Hardware: All
OS: All
Status: NEW
Severity: security
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
Reporter: calestyo at scien...
2008 Jun 19
2
Create Matrix from Loop of Vectors, Sort It and Pick Top-K
.... But I am stuck at the step (b).
Can anybody suggest what's the best way to achieve
my aim above?
This is the sample code I have so far (not working).
__BEGIN__
#data <- read.table("testdata.txt")
# Is this a right way to initialize?
all.arr = NULL
for (gi in 1:nofrow) {
gex <- as.vector(data.matrix(data[gi,],rownames.force=FALSE))
#compute variance
gexvar <- var(gex)
# join variance with its original vector
nvec <- c(gexvar,gex)
# I'm stuck here.....This doesn't seem to work
all.arr <- data.frame(nvec)
}
print(all.arr)
__END__...
2015 May 26
1
[Bug 2302] with DH-GEX, ssh (and sshd) should not fall back to unconfigured DH groups or at least document this behaviour and use a stronger group
https://bugzilla.mindrot.org/show_bug.cgi?id=2302
--- Comment #4 from Damien Miller <djm at mindrot.org> ---
Comment on attachment 2630
--> https://bugzilla.mindrot.org/attachment.cgi?id=2630
Make the DH-GEX fallback group 4k bit.
Where did this group come from? IMO it would be best to use one of the
standard groups if we're picking another fixed one - logjam attacks
aren't remotely plausible at this length, and doing so avoids any
questions over the group's provenance.
You could use the...
2015 Jun 12
2
[Bug 2302] with DH-GEX, ssh (and sshd) should not fall back to unconfigured DH groups or at least document this behaviour and use a stronger group
On Fri 2015-06-12 01:52:54 -0400, Mark D. Baushke wrote:
> I have communicated with Allen Roginsky on this topic and I have been given permission to post his response.
>
> In this message below, the 'vendor' was Darren Tucker's generated prime
> that used a generator value of 5.
>
> -- Mark
>
> From: "Roginsky, Allen" <allen.roginsky at
2014 Oct 28
22
[Bug 2302] New: ssh (and sshd) should not fall back to deselected KEX algos
...onent: ssh
Assignee: unassigned-bugs at mindrot.org
Reporter: calestyo at scientia.net
Hi.
In a recent discussion[0], Christian Weisgerber pointed me to the fact
that ssh/sshd fall back to diffie-hellman-group14-sha1 if client and
server couldn't agree on parameters for DH GEX,... even when client
and/or server intentionally removed diffie-hellman-group14-sha1 from
their KEX preference list (which is like explicitly/intentionally
disabling it).
It seems that this is not exactly correct - I made some tests and it
seems that this fallback only happens if /etc/ssh/moduli i...
2014 Oct 28
22
[Bug 2302] New: ssh (and sshd) should not fall back to deselected KEX algos
...onent: ssh
Assignee: unassigned-bugs at mindrot.org
Reporter: calestyo at scientia.net
Hi.
In a recent discussion[0], Christian Weisgerber pointed me to the fact
that ssh/sshd fall back to diffie-hellman-group14-sha1 if client and
server couldn't agree on parameters for DH GEX,... even when client
and/or server intentionally removed diffie-hellman-group14-sha1 from
their KEX preference list (which is like explicitly/intentionally
disabling it).
It seems that this is not exactly correct - I made some tests and it
seems that this fallback only happens if /etc/ssh/moduli i...
2003 Dec 04
8
[Bug 769] dh-group-exchange should be configurable off in client and server
...ith the default group is still presumably several miles
more secure than SSH-1.
The OpenSSH client and server should both allow dh-group-exchange to be turned
off (and in general, allow configuration of kex method preferences).
Supporting data:
On slow machines (e.g., 486-class, old SPARCs), dh-gex takes an unreasonably
long time (e.g., 14 seconds for gex followed by kex on a SS20 server).
Disabling gex (at the client end - there's a config option in PuTTY) gives a
much more sensible delay (2 seconds).
Also, from draft-ietf-secsh-architecture-15.txt:
The following policy issues SH...
2015 Jul 24
2
DH_GRP_MIN is currently 1024, should it be bumped to 2048?
Greetings,
Given the weakness with Diffie-Hellman modp groups less than 2048, is it
time to bump the suggested 1024 bit minimum value from the RFC 4419 to a
more current 2048 value for OpenSSH 7.0?
If so, should this be just a compile-time change, or should there be a
new client and server runtime option?
Thanks,
-- Mark
2014 Jan 24
3
[Bug 2198] New: GSSAPIKeyExchange gssapi-keyex bug in kex.c choose_kex()
...bugzilla.mindrot.org/attachment.cgi?id=2400&action=edit
Possible fix for kex.c GSSAPIKeyExchange strcmp problem
Reported problem: Attempted connections from new 6.4p1 client to old
6.0p1 server fails when using "GSSAPIKeyExchange yes".
Client error message:
unsupported kex alg gss-gex-sha1-toWM5Slw5Ew8Mqkay+al2g==
Server error message: (nothing much useful, even with -ddd)
Cause:
In kex.c :: choose_kex() prior to 6.3p1 the search for Kex k->name was
performed using a mix of strcmp() and strncmp(). The strncmp() name
comparisons on just the leading part of the name were nece...
2015 May 27
4
[Bug 2302] with DH-GEX, ssh (and sshd) should not fall back to unconfigured DH groups or at least document this behaviour and use a stronger group
On Wed, May 27, 2015 at 05:08:25PM -0400, Daniel Kahn Gillmor wrote:
> On Tue 2015-05-26 15:39:49 -0400, Mark D. Baushke wrote:
> > Hi Folks,
> >
> > The generator value of 5 does not lead to a q-ordered subgroup which
> > is needed to pass tests in
> >
> > http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf
>
> I
2002 Apr 11
2
SSH2_MSG_KEX_DH_GEX_REQUEST_OLD
Hi All,
I am trying to decode the message received from openssh client 3.1.0
Following is the third message which I received.
length = 0000 008c
padding length = 06
messagetype = 1e (SSH2_MSG_KEX_DH_GEX_REQUEST_OLD)
padding = b8 218e c680
and the next four byte should have the n which is 0000 0080 which is less
than 1024.
0000 008c 061e 0000 0080 2a19 a9e4 05fb
aee2 b107 4fa9 f0c1 83d3 3bf0 15a2 8dc8
a74b 7be1 6cab 817f cffc b835 04f2 0958
850c b2ec dc0a 81de 0929 2d4c 9a6c 17a8
5a81 95bc 657b 0...
2016 Mar 16
6
[Bug 2553] New: 7.2p2 on server breaks GSSAPI with older clients
https://bugzilla.mindrot.org/show_bug.cgi?id=2553
Bug ID: 2553
Summary: 7.2p2 on server breaks GSSAPI with older clients
Product: Portable OpenSSH
Version: 7.2p1
Hardware: amd64
OS: Solaris
Status: NEW
Severity: normal
Priority: P5
Component: Kerberos support
Assignee:
2014 Mar 07
12
[Bug 2209] New: Problem logging into Cisco devices under 6.5p1 (kexgexc.c)
https://bugzilla.mindrot.org/show_bug.cgi?id=2209
Bug ID: 2209
Summary: Problem logging into Cisco devices under 6.5p1
(kexgexc.c)
Product: Portable OpenSSH
Version: 6.5p1
Hardware: amd64
OS: FreeBSD
Status: NEW
Severity: normal
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
Reporter: openssh a...
2024 Jan 25
1
enable strong KexAlgorithms, Ciphers and MACs in /etc/ssh/sshd_config file on RHEL 8.x Linux OS
Hi Kaushal,
I maintain a set of SSH hardening guides for various platforms,
including RHEL 8. You can find them here:
https://ssh-audit.com/hardening_guides.html
- Joe
--
Joseph S. Testa II
Founder & Principal Security Consultant
Positron Security
On Thu, 2024-01-25 at 18:39 +0530, Kaushal Shriyan wrote:
> Hi,
>
> I am running the below servers on Red Hat Enterprise
2015 Jul 05
9
[Bug 2424] New: Compatibility for iSSH and Ubuntu/Mint Putty
...: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
Reporter: jrouman at gmail.com
Please consider adding "PuTTY_Local*" to the PuTTY versions allowed to
use SSH_OLD_DHGEX in compat.c. This is the ID for iSSH and the PuTTY
distributed with Ubuntu and Mint Linux. Sadly, iSSH is no longer being
maintained so a fix on that end is unlikely.
--
You are receiving this mail because:
You are watching the assignee of the bug.
2015 Jul 01
0
Announce: OpenSSH 6.9 released
...keygen(1): support "ssh-keygen -lF hostname" to search
known_hosts and print key hashes rather than full keys.
* ssh-agent(1): add -D flag to leave ssh-agent in foreground without
enabling debug mode; bz#2381
Bugfixes
--------
* ssh(1), sshd(8): deprecate legacy SSH2_MSG_KEX_DH_GEX_REQUEST_OLD
message and do not try to use it against some 3rd-party SSH
implementations that use it (older PuTTY, WinSCP).
* Many fixes for problems caused by compile-time deactivation of
SSH1 support (including bz#2369)
* ssh(1), sshd(8): cap DH-GEX group size at 4Kbits for Cisco
i...
2017 Sep 25
4
DH Group Exchange Fallback
On 25 September 2017 at 02:32, Mark D. Baushke <mdb at juniper.net> wrote:
> [+CC Loganaden Velvindron <logan at hackers.mu>] primary author of
> the RFC 4419 refresh draft.
https://datatracker.ietf.org/doc/draft-lvelvindron-curdle-dh-group-exchange/ ?
Tangent: has any consideration been given to increasing the maximum
allowed beyond 8192 bits (which is below the current NIST
2007 Sep 27
4
GSSAPI Key Exchange Patch for OpenSSH 4.7p1
...the use of a single security architecture.
This patch adds support for the RFC4462 GSSAPI key exchange
mechanisms to OpenSSH, along with adding some additional features to
the GSSAPI code that is already in the tree.
The patch implements:
*) gss-group1-sha1-*, gss-group14-sha1-* and gss-gex-sha1-* key
exchange mechanisms. (#1242)
*) Support for the null host key type (#1242)
*) Support for CCAPI credentials caches on Mac OS X (#1245)
*) Support for better error handling when an authentication
exchange fails due to server misconfiguration (#1244)
*) Support for GSSAPI c...
2014 Nov 08
7
[Bug 2310] New: functionality to start process before ssh and/or to "wrap" such command around ssh
https://bugzilla.mindrot.org/show_bug.cgi?id=2310
Bug ID: 2310
Summary: functionality to start process before ssh and/or to
"wrap" such command around ssh
Product: Portable OpenSSH
Version: 6.7p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5