Displaying 5 results from an estimated 5 matches for "ip_line".
Did you mean:
id_line
2010 Dec 09
0
[PATCH] mention ssh-keyscan in remote host fingerprint warning
...at", key_msg);
error("DNS SPOOFING is happening or the IP address for the host");
error("and its host key have changed at the same time.");
- if (ip_status != HOST_NEW)
+ if (ip_status != HOST_NEW) {
error("Offending key for IP in %s:%d", ip_file, ip_line);
+ error(" remove with: ssh-keygen -f \"%s\" -R %d", ip_file, ip_line);
+ }
}
/* The host key has changed. */
warn_changed_key(host_key);
error("Add correct host key in %.100s to get rid of this message.",
user_hostfile);
error("Offend...
2010 Dec 09
7
[Bug 1843] New: ssh should mention ssh-keyscan in remote host fingerprint warning
https://bugzilla.mindrot.org/show_bug.cgi?id=1843
Summary: ssh should mention ssh-keyscan in remote host
fingerprint warning
Product: Portable OpenSSH
Version: 5.6p1
Platform: All
OS/Version: All
Status: NEW
Severity: minor
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs
2003 Mar 04
0
hashing known_hosts
...n.h>
+#ifdef HASH_KNOWN_HOSTS
+#include <openssl/sha.h>
+#include "uuencode.h"
+#endif
+
#include "ssh.h"
#include "xmalloc.h"
#include "rsa.h"
@@ -505,6 +510,11 @@ check_host_key(char *host, struct sockad
char msg[1024];
int len, host_line, ip_line;
const char *host_file = NULL, *ip_file = NULL;
+#ifdef HASH_KNOWN_HOSTS
+ unsigned char md[SHA_DIGEST_LENGTH];
+ char uu[SHA_DIGEST_LENGTH*2];
+#endif
+
/*
* Force accepting of the host key for loopback/localhost. The
@@ -579,6 +589,26 @@ check_host_key(char *host, struct so...
2006 Feb 04
2
[PATCH] allow user to update changed key in known_hosts
...ed '%.200s' (%s) to the "
- "list of known hosts.", hostp, type);
break;
case HOST_CHANGED:
if (options.check_host_ip && host_ip_differ) {
@@ -760,21 +701,30 @@
if (ip_status != HOST_NEW)
error("Offending key for IP in %s:%d", ip_file, ip_line);
}
+
/* The host key has changed. */
warn_changed_key(host_key);
error("Add correct host key in %.100s to get rid of this message.",
user_hostfile);
error("Offending key in %s:%d", host_file, host_line);
-
- /*
- * If strict host key checking is in us...
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi,
I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with
FIPS 140-2 OpenSSL.
These are based on previously reported patches by Steve Marquess
<marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>,
for ver. OpenSSH 3.8.
Note that these patches are NOT OFFICIAL, and MAY be used freely by
anyone.
Issues [partially] handled:
SSL FIPS Self test.
RC4,