search for: kex_default_pk_alg

Displaying 12 results from an estimated 12 matches for "kex_default_pk_alg".

2023 Apr 06
2
[Bug 3559] New: Mini memory leak and needless(?) const/static qualifier.
...Hardware: Other OS: All Status: NEW Severity: enhancement Priority: P5 Component: ssh Assignee: unassigned-bugs at mindrot.org Reporter: m.schmidt at emtec.com in sshconnect2.c in function ssh_kex2() the function kex_default_pk_alg() is called. This function is from readconf.c and has the following prototype: const char *kex_default_pk_alg(void); The function looks like this: const char * kex_default_pk_alg(void) { static char *pkalgs; if (pkalgs == NULL) { char *all_key; all_key = sshkey_alg_list...
2020 Feb 06
3
Call for testing: OpenSSH 8.2
On 2020-02-05 at 20:39 -0500, Phil Pennock wrote: > On 2020-02-06 at 10:29 +1100, Damien Miller wrote: > > OpenSSH 8.2p1 is almost ready for release, so we would appreciate testing > > on as many platforms and systems as possible. This is a feature release. > > > * The RFC8332 RSA SHA-2 signature algorithms rsa-sha2-256/512. These > This actually affects me:
2015 Dec 14
5
[Bug 2518] New: docs: remove redundant lists of algorithms
https://bugzilla.mindrot.org/show_bug.cgi?id=2518 Bug ID: 2518 Summary: docs: remove redundant lists of algorithms Product: Portable OpenSSH Version: 7.1p1 Hardware: All OS: All Status: NEW Severity: enhancement Priority: P5 Component: Documentation Assignee: unassigned-bugs
2001 Mar 07
1
patch to select pkalg
Suppose an SSH server has both RSA and DSA host keys for protocol 2, but I only have the DSA key, and I want to use that. I'm stuck; the OpenSSH client is hard-wired to offer both algorithms in the key exchange, and will select ssh-rsa if it's available (see myproposal.h, KEX_DEFAULT_PK_ALG). Below is a patch adding the client configuration option "PKAlgorithms" for this purpose. It doesn't validate the supplied list; I'm not sure if that's really necessary or desirable. This situation raises a couple of questions. The first is about the protocol, which force...
2016 Jan 19
2
[Bug 2527] New: default algorithms mismatch between man pages and myproposal.h
...m, -hmac-sha1-etm at openssh.com, hmac-ripemd160-etm at openssh.com, hmac-sha1-96-etm at openssh.com, hmac-md5-96-etm at openssh.com, hmac-md5, -hmac-sha1, hmac-ripemd160, -hmac-ripemd160 at openssh.com, hmac-sha1-96, hmac-md5-96, P.S.: KEX_SERVER_KEX, KEX_CLIENT_KEX, KEX_DEFAULT_PK_ALG, KEX_SERVER_ENCRYPT are correct. -- You are receiving this mail because: You are watching the assignee of the bug.
2017 Jun 16
2
[PATCH] allow relative path in streamlocal forwarding
..._clear_or_none(dst->fwd_opts.streamlocal_bind_root_directory)) { + free(dst->fwd_opts.streamlocal_bind_root_directory); + dst->fwd_opts.streamlocal_bind_root_directory = NULL; + } } #undef M_CP_INTOPT @@ -2300,6 +2320,7 @@ dump_config(ServerOptions *o) o->hostkeyalgorithms : KEX_DEFAULT_PK_ALG); dump_cfg_string(sPubkeyAcceptedKeyTypes, o->pubkey_key_types ? o->pubkey_key_types : KEX_DEFAULT_PK_ALG); + dump_cfg_string(sStreamLocalBindRootDirectory, o->fwd_opts.streamlocal_bind_root_directory); /* string arguments requiring a lookup */ dump_cfg_string(sLogLevel, log_...
2012 Dec 27
3
[PATCH] hostfile: list known names (if any) for new hostkeys
...]); + load_hostkeys(hostkeys, hostname, NULL, options.user_hostfiles[i]); for (i = 0; i < options.num_system_hostfiles; i++) - load_hostkeys(hostkeys, hostname, options.system_hostfiles[i]); + load_hostkeys(hostkeys, hostname, NULL, options.system_hostfiles[i]); oavail = avail = xstrdup(KEX_DEFAULT_PK_ALG); maxlen = strlen(avail) + 1; -- 1.8.0.2
2024 May 06
1
Feature request/EOI: Match interactive config?
...0) bad_options++; } free(line); diff --git a/readconf.h b/readconf.h index 9447d5d6e..3da495e38 100644 --- a/readconf.h +++ b/readconf.h @@ -231,6 +231,8 @@ typedef struct { #define SSH_KEYSTROKE_CHAFF_MIN_MS 1024 #define SSH_KEYSTROKE_CHAFF_RNG_MS 2048 +struct sshbuf; + const char *kex_default_pk_alg(void); char *ssh_connection_hash(const char *thishost, const char *host, const char *portstr, const char *user, const char *jump_host); @@ -239,9 +241,9 @@ int fill_default_options(Options *); void fill_default_options_for_canonicalization(Options *); void free_options(Options *o);...
2024 May 06
1
Feature request/EOI: Match interactive config?
... and I guess your next question will be about compilation environment, so: ``` $ gcc --version gcc (Gentoo 13.2.1_p20240210 p14) 13.2.1 20240210 Copyright (C) 2023 Free Software Foundation, Inc. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. ``` I'm running on gentoo. I tested that the
2024 May 06
1
Feature request/EOI: Match interactive config?
...0) bad_options++; } free(line); diff --git a/readconf.h b/readconf.h index 9447d5d6e..3da495e38 100644 --- a/readconf.h +++ b/readconf.h @@ -231,6 +231,8 @@ typedef struct { #define SSH_KEYSTROKE_CHAFF_MIN_MS 1024 #define SSH_KEYSTROKE_CHAFF_RNG_MS 2048 +struct sshbuf; + const char *kex_default_pk_alg(void); char *ssh_connection_hash(const char *thishost, const char *host, const char *portstr, const char *user, const char *jump_host); @@ -239,9 +241,9 @@ int fill_default_options(Options *); void fill_default_options_for_canonicalization(Options *); void free_options(Options *o);...
2024 May 04
3
Feature request/EOI: Match interactive config?
Hey there, I often want different behavior in my ssh client depending on whether I'm logging into an interactive session or running a remote non-interactive command. We can see at, say, https://unix.stackexchange.com/a/499562/305714 that this isn't a unique wish, and existing solutions are kind of baroque. Typical reasons to do this are to immediately go into a screen or tmux session; for
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
...SH_RAND_HELPER)" ; then \ $(INSTALL) -m 0755 $(STRIP_OPT) ssh-rand-helper $(DESTDIR)$(libexecdir)/ssh-rand-helper ; \ fi diff -u -r1.1 -r1.3 --- openssh-4.7p1/myproposal.h Mon Dec 17 21:07:18 2007 +++ openssh-4.7p1/myproposal.h Mon Dec 17 21:09:50 2007 @@ -41,6 +41,7 @@ #endif #define KEX_DEFAULT_PK_ALG "ssh-rsa,ssh-dss" +#ifndef OPENSSL_FIPS #define KEX_DEFAULT_ENCRYPT \ "aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc," \ "arcfour128,arcfour256,arcfour," \ @@ -50,6 +51,16 @@ "hmac-md5,hmac-sha1,umac-64 at openssh.com,hmac-ripemd160," \ "hmac-rip...