search for: key_blobtyp

Displaying 5 results from an estimated 5 matches for "key_blobtyp".

Did you mean: key_blobtype
2002 Jun 25
0
[Bug 290] New: auth_method set incorrectly in mm_answer_keyverify()
...ssh2 even though it was using publickey authentication (and tracing via the client verifies that the publickey was used). Hostbased authentication is disabled in my config file. Figuring this was a logging bug, I went hunting in the code. In mm_answer_keyverify() is the line: auth_method = key_blobtype == MM_USERKEY ? "publickey" : "hostbased"; But this line occurs *after* the call to monitor_reset_key_state(), which sets key_blobtype to MM_NOKEY. Moving the auth_method assignment before the call to monitor_reset_key_state() fixed the problem. I don't think anything e...
2006 May 15
0
[PATCH 4/12] bug fix: openssh-4.3p2 memory leak
...1 files changed, 4 insertions(+) diff -uprN openssh-4.3p2/monitor.c openssh-4.3p2-kylie/monitor.c --- openssh-4.3p2/monitor.c 2005-11-04 22:07:05.000000000 -0600 +++ openssh-4.3p2-kylie/monitor.c 2006-05-08 17:18:15.697809744 -0500 @@ -1010,6 +1010,10 @@ mm_answer_keyallowed(int sock, Buffer *m key_blobtype = type; hostbased_cuser = cuser; hostbased_chost = chost; + } else { + xfree(blob); + xfree(chost); + xfree(cuser); } debug3("%s: key %p is %s",
2006 Feb 12
1
sshd double-logging
..._rsa_authentication && auth_rhosts_rsa_key_allowed(authctxt->pw, cuser, chost, key); + auth_method = "rsa"; break; default: fatal("%s: unknown key type %d", __func__, type); @@ -1010,6 +1014,9 @@ mm_answer_keyallowed(int sock, Buffer *m key_blobtype = type; hostbased_cuser = cuser; hostbased_chost = chost; + } else { + /* Log failed attempt */ + auth_log(authctxt, 0, auth_method, compat20 ? " ssh2" : ""); } debug3("%s: key %p is %s", @@ -1374,6 +1381,7 @@ mm_answer_rsa_keyallowed(int sock, Buffe...
2003 Oct 08
4
OS/390 openssh
...91,7 +1391,7 @@ if (!authctxt->valid) fatal("%s: authctxt not valid", __func__); - blob = buffer_get_string(m, &blen); + blob = buffer_get_binary(m, &blen); if (!monitor_allowed_key(blob, blen)) fatal("%s: bad key, not previously allowed", __func__); if (key_blobtype != MM_RSAUSERKEY && key_blobtype != MM_RSAHOSTKEY) @@ -1431,14 +1431,14 @@ if (ssh1_challenge == NULL) fatal("%s: no ssh1_challenge", __func__); - blob = buffer_get_string(m, &blen); + blob = buffer_get_binary(m, &blen); if (!monitor_allowed_key(blob, blen)) f...
2006 Nov 15
11
OpenSSH Certkey (PKI)
...,7 +911,7 @@ fail++; } else { p = buffer_get_string(&b, NULL); - if (strcmp("publickey", p) != 0) + if (strcmp(name, p) != 0) fail++; xfree(p); if (!buffer_get_char(&b)) @@ -992,8 +1003,11 @@ fatal("%s: bad public key blob", __func__); switch (key_blobtype) { + case MM_CERTKEY: + valid_data = monitor_valid_userblob(data, datalen, "certkey"); + break; case MM_USERKEY: - valid_data = monitor_valid_userblob(data, datalen); + valid_data = monitor_valid_userblob(data, datalen, "publickey"); break; case MM_HOSTKEY: valid_...