Displaying 20 results from an estimated 165 matches for "modulis".
Did you mean:
modules
2005 Feb 07
1
moduli(5) changes
Hi folks,
This applies to src/share/man/man5/moduli.5 in the OpenBSD source
tree, and doesn't seem to apply to the portable OpenSSH, so I've
sent this change here instead of via Bugzilla.
The wording of moduli(5) implies that sshd puts more thought about which
modulus it selects than it really does. The following patch corrects
this.
Simon.
--
Simon Burge
2004 Feb 24
2
Updated moduli file in OpenSSH 3.8
Hi,
Can anybody briefly explain the significance of the updated moduli file?
Is this a critical update? Should all existing installations update
their moduli file?
Thanks in advance,
-- Dan
2014 Jan 24
1
Openssh, moduli and ssh-keygen
Hi,
my question is related to the kex algorithm
diffie-hellman-group-exchange-sha256 and moduli generation. I've seen that
through ssh-keygen, I'm able to re-generate my moduli file used by DH but
I'm note sure to understand one point in the ssh-keygen manpage :
"Screened DH groups may be installed in /etc/ssh/moduli. It is important
that this file contains moduli of a range of
2019 Feb 15
2
Can we disable diffie-hellman-group-exchange-sha1 by default?
On Fri, 2019-02-15 at 15:57 +1100, Darren Tucker wrote:
> That was the original intent (and it's mentioned in RFC4419) however
> each moduli file we ship (70-80 instances of 6 sizes) takes about 1
> cpu-month to generate on a lowish-power x86-64 machine. Most of it
> is
> parallelizable, but even then it'd likely take a few hours to
> generate
> one of each size. I
2016 Aug 01
4
OpenSSH 7.3p1 can't be build on Solaris 10
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Solaris 10 x64 kernel 150401-35
LibreSSL 2.4.1
GCC 5.2
./configure --with-privsep-user=sshd --with-pam --with-pie
--with-ssl-dir=/usr/local 'CFLAGS=-O3 -m64 -mtune=native -pipe'
'LDFLAGS=-m64'
successful.
gmake produces error:
root @ khorne /patch/openssh-7.3p1 # gmake
conffile=`echo sshd_config.out | sed
2011 Sep 16
2
weird make errors on portable snapshots
When doing a make with the portable developer version,
I came across this error:
ssh/ssh_host_ecdsa_key|/opt/etc/ssh_host_ecdsa_key|g' -e
's|/etc/ssh/ssh_host_dsa_key|/opt/etc/ssh_host_dsa_key|g' -e
's|/etc/ssh/ssh_host_rsa_key|/opt/etc/ssh_host_rsa_key|g' -e
's|/var/run/sshd.pid|/var/run/sshd.pid|g' -e
's|/etc/moduli|/opt/etc/moduli|g' -e
2016 Aug 02
6
OpenSSH 7.3p1 can't be build on Solaris 10
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
With this change built ok.
But patch must be quite different on my platform (see attached) for
portable version.
And, of course, after autoreconf run.
02.08.2016 10:55, Darren Tucker ?????:
> --- a/configure.ac
> +++ b/configure.ac
> @@ -754,6 +754,9 @@ main() { if (NSVersionOfRunTimeLibrary("System")
>= (60 << 16))
2019 Feb 15
4
Can we disable diffie-hellman-group-exchange-sha1 by default?
I'm not nearly knowledgeable enough in crypto to fully understand your
answer, but I will try. I wonder why moduli are not automatically
generated the first time sshd is started though. That would make much
more sense than shipping a default moduli file but also asking
everyone to replace it with their own.
On Fri, Feb 15, 2019 at 5:50 AM Mark D. Baushke <mdb at juniper.net> wrote:
>
2007 Oct 03
4
[Bug 1372] New: sshd(8) and ssh-keygen(1) refer to non-existent moduli(5)
http://bugzilla.mindrot.org/show_bug.cgi?id=1372
Summary: sshd(8) and ssh-keygen(1) refer to non-existent
moduli(5)
Product: Portable OpenSSH
Version: 4.7p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: Documentation
AssignedTo: bitbucket at
2019 Feb 15
4
Can we disable diffie-hellman-group-exchange-sha1 by default?
Also, how are default moduli shipped with OpenSSH for use in
diffie-hellman-group-exchange-sha1/sha256 chosen? Are they chosen
randomly by developers or are they chosen for security properties? If
they are random, why not use moduli from RFC 7919 instead, like
Mozilla recommends?
On Fri, Feb 15, 2019 at 3:48 AM Mark D. Baushke <mdb at juniper.net> wrote:
>
> Yegor Ievlev <koops1997
2007 Mar 01
1
Proposed patch: ssh-keygen allows writing to stdout for moduli generation
Hello all,
I propose the following patch to ssh-keygen.c for openssh version 4.5.
It allows to redirect output of the moduli operations to stdout, to do
something like e.g.:
$ ssh-keygen -G - -b 2048 | ssh-keygen -T - -f - >moduli
Best regards,
Christian
--- ssh/ssh-keygen.c.old 2007-03-01 12:43:06.000000000 +0100
+++ ssh/ssh-keygen.c 2007-03-01 12:47:32.000000000 +0100
@@ -1270,13
2002 Apr 10
1
problem with making solaris package (openssh)
if [ ! -f
/opt/sldx/slwo/openssh-3.1p1/openssh-3.1p1/contrib/solaris/package/usr/local/etc/moduli
]; then \
if [ -f
/opt/sldx/slwo/openssh-3.1p1/openssh-3.1p1/contrib/solaris/package/usr/local/etc/primes
]; then \
echo "moving
/opt/sldx/slwo/openssh-3.1p1/openssh-3.1p1/contrib/solaris/package/usr/local/etc/primes
to /opt/sldx/
2019 Feb 15
3
Can we disable diffie-hellman-group-exchange-sha1 by default?
I don't think there is any point to generate so many moduli. Actually,
3 moduli of sizes 2048, 3072 and 4096 seem like a sane choice.
On Fri, Feb 15, 2019 at 7:58 AM Darren Tucker <dtucker at dtucker.net> wrote:
>
> On Fri, 15 Feb 2019 at 14:22, Yegor Ievlev <koops1997 at gmail.com> wrote:
> > I'm not nearly knowledgeable enough in crypto to fully understand your
2003 Jul 02
2
[Bug 612] moduli.5 documentation doesn't match ssh code (off by 1)
http://bugzilla.mindrot.org/show_bug.cgi?id=612
Summary: moduli.5 documentation doesn't match ssh code (off by 1)
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: trivial
Priority: P2
Component: sshd
AssignedTo: openssh-bugs at mindrot.org
2016 Sep 11
5
[Bug 2614] New: ssh-keygen: Moduli generation not accepting start line and count options
https://bugzilla.mindrot.org/show_bug.cgi?id=2614
Bug ID: 2614
Summary: ssh-keygen: Moduli generation not accepting start line
and count options
Product: Portable OpenSSH
Version: 7.2p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component:
2016 Mar 30
6
[Bug 2559] New: Warnings from reading moduli file, refer to primes file
https://bugzilla.mindrot.org/show_bug.cgi?id=2559
Bug ID: 2559
Summary: Warnings from reading moduli file, refer to primes
file
Product: Portable OpenSSH
Version: 7.2p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
2017 Sep 21
5
DH Group Exchange Fallback
Hi,
I'm interested in requiring a minimum of 3072-bit DH moduli when
using the "diffie-hellman-group-exchange-sha256" kex, so I edited my
/etc/ssh/moduli file such that only 3071+ moduli are left. However,
when clients ask for a max of 2048-bit moduli, they actually get one
(!). I poked around and found that a fallback mechanism exists
(dh.c:185), which returns back the
2017 Sep 24
3
DH Group Exchange Fallback
On 09/24/2017 12:21 AM, Mark D. Baushke wrote:
> I suggest you upgrade to a more recent edition of the OpenSSH software.
> The most recent release is OpenSSH 7.5 and OpenSSH 7.6 will be released
> very soon.
This problem is in v7.5 and v7.6. See dh.c:436.
> OpenSSH 6.6 was first released on October 6, 2014.
I brought up v6.6 to give an example that older clients wouldn't be
2015 May 22
4
Weak DH primes and openssh
On Fri 2015-05-22 00:06:29 -0400, Darren Tucker wrote:
> On Thu, May 21, 2015 at 11:26 PM, Matthew Vernon <matthew at debian.org> wrote:
>>
>> You will be aware of https://weakdh.org/ by now, I presume; the
>> take-home seems to be that 1024-bit DH primes might well be too weak.
>> I'm wondering what (if anything!) you propose to do about this issue,
>>
2002 Nov 11
0
Why is 'moduli' installed where it is?
[ OS: Solaris 2.8 ]
Curious why 'moduli' is installed in the "--sysconfdir' directory?
Isn't this machine-independent and therefore should go in the
"--datadir" directory?
Also, it seems to me that the datadir/sysconfdir/sharedstatedir/
localstatedir would be more useful if they were set up (or further
expanded) to better support packaging of OpenSSH.
For