Displaying 20 results from an estimated 47 matches for "key_from_blob".
2014 Apr 17
1
OpenSSH 6.4, "ssh-add -l", output to non-tty
...d. OpenSSH6.4p1 on a FreeBSD 7 box (I know it's
old; it's being replaced this month). I can't spot anything changed in
OpenSSH commit logs or git blame of the current file.
I ssh into the box from a system with OpenSSH6.6p1 and three keys
loaded, RSA, ECDSA and ED25519.
As expected, key_from_blob and key_fingerprint complain about the
ED25519 key in the agent, because they can't handle it. Not a problem.
However, in this scenario, "ssh-add -l" will only produce output to
stdout if stdout is a tty.
"ssh-add -L" reliably produces output to stdout.
"ssh-add -l&...
2020 Jan 11
2
interoperability issue with agent and ecdsa-sk keys
...eed access to a remote gitlab server to fetch files
with git, using an ED25519 key in my ssh-agent.
Once connected to the intermediate host, ssh-add -l doesn't see the
ED25519 key anymore. It says
ssh-add -l
2048 a0:80:0a:59:fe:5a:d9:f3:b1:e7:6c:57:32:8c:5c:e5 /home/matthieu/.ssh/id_rsa (RSA)
key_from_blob: invalid format
And my ED25519 key I use to authenticate against the gitlab server is
missing. Thus tring to connect to it fails.
If I remove the ECDSA-SK key from the agent before connecting to the
debian host, things work again.
Is this an oversight when the ECDSA-SK key type was added, or is...
2012 Nov 13
1
problem with AuthorizedKeysCommand on OpenBSD
...st
trying to make the blasted thing work right now.)
The keys don't seem to be making it to the SSH server, however. Run
with debugging, I get:
...
debug3: mm_request_receive entering
debug3: monitor_read: checking request 20
debug3: mm_answer_keyallowed entering
debug3: mm_answer_keyallowed: key_from_blob: 0x81973440
debug1: temporarily_use_uid: 32767/32767 (e=0/0)
debug3: Running AuthorizedKeysCommand: "/usr/local/libexec/ssh-ldap-wrapper" as "nobody"
debug1: restore_uid: 0/0
debug1: temporarily_use_uid: 32767/32767 (e=0/0)
debug2: key not found
user_key_command_allowed2: dup2:...
2003 Feb 28
1
Hostbased Authentication Question
...to get this error from sshd -d -d -d
debug1: userauth_hostbased: cuser root chost mckinley. pkalg ssh-dss slen
55
debug3: mm_key_allowed entering
debug3: mm_request_send entering: type 20
debug3: monitor_read: checking request 20
debug3: mm_answer_keyallowed entering
debug3: mm_answer_keyallowed: key_from_blob: 0x80a4e88
debug2: userauth_hostbased: chost mckinley. resolvedname mckinley ipaddr
192.168.10.1
debug2: stripping trailing dot from chost mckinley.
debug2: auth_rhosts2: clientuser root hostname mckinley ipaddr
192.168.10.1
debug1: temporarily_use_uid: 0/0 (e=0/0)
debug1: restore_uid: 0/0
debug1...
2001 Mar 11
0
patch to allow client to select rsa/dss
...strcmp(p, "ssh-dss") != 0)) {
+ debug("bad pkalg %s [%s]", p, names);
+ xfree(keys);
+ return 0;
+ } else {
+ debug3("pkalg ok: %s [%s]", p, names);
+ }
+ }
+ debug3("pkalgs ok: [%s]", names);
+ xfree(keys);
+ return 1;
+ }
+
+
Key *
key_from_blob(char *blob, int blen)
{
diff -c3 -r orig/openssh-2.5.1p1/key.h openssh-2.5.1p1/key.h
*** orig/openssh-2.5.1p1/key.h Mon Jan 29 07:39:26 2001
--- openssh-2.5.1p1/key.h Sun Mar 11 22:50:23 2001
***************
*** 55,60 ****
--- 55,61 ----
Key *key_generate(int type, u_int bits);
Key *key_from_...
2009 Jan 22
0
Unintended key info disclosure via ForwardAgent?
...e key info about remotea
and locala being disclosed to remoteb1. Namely, failed attempts
with the remotea and locala keypairs against remoteb1.
## from locala1
# client tries the first key against remoteb1
client debug1: Offering public key: .ssh/id_dsa_remotea
server debug3: mm_answer_keyallowed: key_from_blob: 0x81db150
server debug3: mm_answer_keyallowed: key 0x81db150 is not allowed
# client tries the second key against remoteb1
client debug1: Offering public key: .ssh/id_dsa_locala
server debug3: mm_answer_keyallowed: key_from_blob: 0x81db170
server debug3: mm_answer_keyallowed: key 0x81db170 is not...
2001 Jun 28
1
Adding 'name' key types
Playing around with the [wonderful] GSS-API patches for OpenSSH [1] I
noticed that there is a bit of functionality missing from
OpenSSH/GSS-API, namely that authorized_keys2 has no meaning when using
GSS authentication.
Yes, ~/.k5login can be used to grant access to an account for
applications that support Kerberos, as does OpenSSH with those GSS
patches, but .k5login does not and cannot provide
2005 Jul 26
1
Linux in-kernel keys support
...+
+ had_identities = 1;
+ comment = buf + dlen;
+ printf("In-kernel key %d (%s)\n", kkey, comment);
+
+ ret = keyctl_read_alloc(kkey, (void **) &buf2);
+ if (ret < 1) {
+ fprintf(stderr, "Error in keyctl_read_alloc\n");
+ goto out;
+ }
+
+ key = key_from_blob(buf2, ret);
+ free(buf2);
+ if (!key) {
+ fprintf(stderr, "key_from_blob failed: %s\n", comment);
+ goto out;
+ }
+ key->flags = KEY_FLAG_KERN;
+
+ if (do_fp) {
+ fp = key_fingerprint(key, SSH_FP_MD5,
+ SSH_FP_HEX);
+ printf("%d %s %s (%s)\n",...
2015 Feb 28
2
SAP-2015-3-1 issues
On Sun, Mar 01, 2015 at 03:23:04AM +1100, Damien Miller wrote:
>
>
> On Sat, 28 Feb 2015, The Doctor wrote:
>
> > BSD/OS issues
> >
> > with 1.0.2a dev
>
> Thanks for testing.
>
You are welcome.
> > make tests
> >
> > regress/netcat.c:656: `on' undeclared (first use in this function)
> > regress/netcat.c:656: (Each
2002 Jan 24
1
PATCH: krb4/krb5/... names/patterns in auth_keys entries
...h;
+ debug3("key_read: key: %s", k->name);
+ }
+ k->name_type = name_type;
+ } else {
+ len = 2*strlen(cp);
+ blob = xmalloc(len);
+ n = uudecode(cp, blob, len);
+ if (n < 0) {
+ error("key_read: uudecode %s failed", cp);
+ return -1;
+ }
+ k = key_from_blob(blob, n);
}
- k = key_from_blob(blob, n);
if (k == NULL) {
error("key_read: key_from_blob %s failed", cp);
return -1;
}
- xfree(blob);
+ if (blob != NULL)
+ xfree(blob);
if (k->type != type) {
- error("key_read: type mismatch: encoding error");
-...
2001 Aug 15
0
[ossh patch] principal name/patterns in authorized_keys2
...key %s", k->name_type);
+ } else {
+ len = 2*strlen(cp);
+ blob = xmalloc(len);
+ n = uudecode(cp, blob, len);
+ if (n < 0) {
+ error("key_read: uudecode %s failed", cp);
+ return -1;
+ }
+ debug3("key_read: reading uuencoded key %s", blob);
+ k = key_from_blob(blob, n);
}
- k = key_from_blob(blob, n);
if (k == NULL) {
error("key_read: key_from_blob %s failed", cp);
return -1;
}
- xfree(blob);
+ if (blob != NULL)
+ xfree(blob);
if (k->type != type) {
- error("key_read: type mismatch: encoding error");
-...
2003 Oct 08
4
OS/390 openssh
...9 2003
@@ -336,7 +336,7 @@
BN_num_bits(key->rsa->n), bits);
break;
case 2:
- blob = buffer_get_string(&auth->identities, &blen);
+ blob = buffer_get_binary(&auth->identities, &blen);
*comment = buffer_get_string(&auth->identities, NULL);
key = key_from_blob(blob, blen);
xfree(blob);
@@ -430,8 +430,8 @@
buffer_init(&msg);
buffer_put_char(&msg, SSH2_AGENTC_SIGN_REQUEST);
- buffer_put_string(&msg, blob, blen);
- buffer_put_string(&msg, data, datalen);
+ buffer_put_binary(&msg, blob, blen);
+ buffer_put_binary(&msg, data,...
2002 Aug 07
0
[Bug 382] New: Privilege Separation breaks HostbasedAuthentication
...debug3: mm_request_send entering: type 20
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED
debug3: mm_request_receive_expect entering: type 21
debug3: mm_request_receive entering
debug3: monitor_read: checking request 20
debug3: mm_answer_keyallowed entering
debug3: mm_answer_keyallowed: key_from_blob: 1245e0
debug2: userauth_hostbased: chost evereska. resolvedname evereska.wan.erac.com
ipaddr 10.49.191.9
debug2: auth_rhosts2: clientuser rjl01 hostname evereska. ipaddr evereska.
debug1: temporarily_use_uid: 503/5005 (e=0)
debug1: restore_uid
debug2: userauth_hostbased: access allowed by auth_rh...
2002 Jul 03
3
[Bug 333] X11 forwarding not working in OpenSSH 3.4p1
http://bugzilla.mindrot.org/show_bug.cgi?id=333
------- Additional Comments From stevesk at pobox.com 2002-07-04 05:41 -------
i will guess configure did not find an xauth when
it was built ($PATH is irrelevant here). please
verify.
see $HOME/.ssh/rc example in sshd.8 which can be used
as a workaround in this case.
djm: autoconf-2.53 exposes a bug for xauth path detection.
------- You
2003 Feb 24
1
[Bug 502] New: sshd fails when "Compression yes" set on HPUX
...es 1
debug2: input_userauth_request: try method publickey
debug1: test whether pkalg/pkblob are acceptable
debug3: entering
debug3: entering: type 20
debug3: : waiting for MONITOR_ANS_KEYALLOWED
debug3: : checking request 20debug3: entering: type 21
debug3: entering
debug3: entering
debug3: : key_from_blob: 4002f8a0
debug1: temporarily_use_uid: 0/3 (e=0/3)
debug1: trying public key file //.ssh/authorized_keys
debug1: restore_uid: 0/3
debug1: temporarily_use_uid: 0/3 (e=0/3)
debug1: trying public key file //.ssh/authorized_keys2
debug3: secure_filename: checking '/.ssh'
debug3: secure_filename...
2006 Aug 28
0
patch for ssh-agent force confirm keys
...!= NULL && (!id->confirm || confirm_key(id) == 0)) {
Key *private = id->key;
/* Decrypt the challenge using the private key. */
if (rsa_private_decrypt(challenge, challenge, private->rsa) <= 0)
@@ -306,7 +303,7 @@
key = key_from_blob(blob, blen);
if (key != NULL) {
Identity *id = lookup_identity(key, 2);
- if (id != NULL && ((!confirm && !id->confirm) || confirm_key(id) == 0))
+ if (id != NULL && (!id->confirm || confirm_key(id) == 0))...
2012 Nov 23
1
Public Key Authentication
Hi,
I wonder, how can i use openssh Public key authentification with
ActivCard pkcs11 x509 certificate store and login to only my account
reading/using username provided from certificate DN, or principal
name,friendly name ?
b111887 and e411617 is administrator on this os. I have rights to put
e411617 pub keys to b111887 home folder authorized keys. And because
openssh ask's me to provide
2003 Oct 09
1
Key-based auth fails - OpenSSH 3.7.1p2 (cygwin)
...debug3: mm_request_send entering: type 20
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED
debug3: mm_request_receive_expect entering: type 21
debug3: mm_request_receive entering
debug3: monitor_read: checking request 20
debug3: mm_answer_keyallowed entering
debug3: mm_answer_keyallowed: key_from_blob: 0x100f4158
debug1: temporarily_use_uid: 132690/513 (e=18/544)
debug1: trying public key file /home/hayward/.ssh/authorized_keys
debug1: restore_uid: (unprivileged)
debug1: temporarily_use_uid: 132690/513 (e=18/544)
debug1: trying public key file /home/hayward/.ssh/authorized_keys
debug1: restore_u...
2010 Apr 02
3
[Bug 1749] New: ssh-keygen cant "import" a generic x509 rsa public key
...====
I have a public key generated via
prompt> openssl x509 -in cavanaug.x509 -pubkey -noout >
cavanaug_x509.pub
that I would like to have ssh-keygen convert to an openssh public key
format.
prompt> ssh-keygen -i -f cavanaug_x509.pub
buffer_get_string_ret: bad string length 813826338
key_from_blob: can't read key type
decode blob failed.
prompt> cat cavanaug_x509.pub
-----BEGIN PUBLIC KEY-----
MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApy+8jp5YdUEqoNjmhg3X
c+oMARMrXH5erMRh+C1DeAE/KxZd0ZXjhbDJ1NwvvIlmLJO6tmlqtbnNILgpJjna
dPor6fcVsiLgHtwD5CuydAfxjQBXRCvPBqL+/M1tNMhcgR4AYzfitUP2IFhSLmg...
2009 Feb 06
3
Hung connection over Juniper Tunnel
...debug3: mm_request_send entering: type 21
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED
debug3: mm_request_receive_expect entering: type 22
debug3: mm_request_receive entering
debug3: monitor_read: checking request 21
debug3: mm_answer_keyallowed entering
debug3: mm_answer_keyallowed: key_from_blob: 0x7f8a5c7aaf20
debug1: temporarily_use_uid: 0/0 (e=0/0)
debug1: trying public key file /root/.ssh/authorized_keys
debug3: secure_filename: checking '/root/.ssh'
debug3: secure_filename: checking '/root'
debug3: secure_filename: terminating check at '/root'
debug3: key_read:...