search for: ip_lin

Displaying 5 results from an estimated 5 matches for "ip_lin".

Did you mean: ip_line
2010 Dec 09
0
[PATCH] mention ssh-keyscan in remote host fingerprint warning
...at", key_msg); error("DNS SPOOFING is happening or the IP address for the host"); error("and its host key have changed at the same time."); - if (ip_status != HOST_NEW) + if (ip_status != HOST_NEW) { error("Offending key for IP in %s:%d", ip_file, ip_line); + error(" remove with: ssh-keygen -f \"%s\" -R %d", ip_file, ip_line); + } } /* The host key has changed. */ warn_changed_key(host_key); error("Add correct host key in %.100s to get rid of this message.", user_hostfile); error("Offen...
2010 Dec 09
7
[Bug 1843] New: ssh should mention ssh-keyscan in remote host fingerprint warning
https://bugzilla.mindrot.org/show_bug.cgi?id=1843 Summary: ssh should mention ssh-keyscan in remote host fingerprint warning Product: Portable OpenSSH Version: 5.6p1 Platform: All OS/Version: All Status: NEW Severity: minor Priority: P2 Component: ssh AssignedTo: unassigned-bugs
2003 Mar 04
0
hashing known_hosts
...n.h> +#ifdef HASH_KNOWN_HOSTS +#include <openssl/sha.h> +#include "uuencode.h" +#endif + #include "ssh.h" #include "xmalloc.h" #include "rsa.h" @@ -505,6 +510,11 @@ check_host_key(char *host, struct sockad char msg[1024]; int len, host_line, ip_line; const char *host_file = NULL, *ip_file = NULL; +#ifdef HASH_KNOWN_HOSTS + unsigned char md[SHA_DIGEST_LENGTH]; + char uu[SHA_DIGEST_LENGTH*2]; +#endif + /* * Force accepting of the host key for loopback/localhost. The @@ -579,6 +589,26 @@ check_host_key(char *host, struct s...
2006 Feb 04
2
[PATCH] allow user to update changed key in known_hosts
...ed '%.200s' (%s) to the " - "list of known hosts.", hostp, type); break; case HOST_CHANGED: if (options.check_host_ip && host_ip_differ) { @@ -760,21 +701,30 @@ if (ip_status != HOST_NEW) error("Offending key for IP in %s:%d", ip_file, ip_line); } + /* The host key has changed. */ warn_changed_key(host_key); error("Add correct host key in %.100s to get rid of this message.", user_hostfile); error("Offending key in %s:%d", host_file, host_line); - - /* - * If strict host key checking is in u...
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi, I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with FIPS 140-2 OpenSSL. These are based on previously reported patches by Steve Marquess <marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>, for ver. OpenSSH 3.8. Note that these patches are NOT OFFICIAL, and MAY be used freely by anyone. Issues [partially] handled: SSL FIPS Self test. RC4,