Displaying 8 results from an estimated 8 matches for "openssh_rsa_verify".
2015 Sep 08
2
[Bug 2460] New: Non-zero return values are not properly returned from openssh_RSA_verify
https://bugzilla.mindrot.org/show_bug.cgi?id=2460
Bug ID: 2460
Summary: Non-zero return values are not properly returned from
openssh_RSA_verify
Product: Portable OpenSSH
Version: 7.1p1
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
Reporter: me at basilcrow.co...
2012 Apr 19
2
OpenSSL ASN.1 vulnerability: sshd not affected
...N.1 and buffer code that
can be exploited to cause a heap overflow:
http://lists.grok.org.uk/pipermail/full-disclosure/2012-April/086585.html
Fortunately OpenSSH's sshd is not vulnerable - it has avoided the use
of ASN.1 parsing since 2002 when Markus wrote a custom RSA verification
function (openssh_RSA_verify):
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/ssh-rsa.c?rev=HEAD;content-type=text%2Fplain
That's now eight exploitable bugs that this change has saved us from.
It's a good lesson in how excising even a relatively small amount of
complex attack surface can make a substantial dif...
2013 May 15
2
Support for "ssh-rsa-sha256" and "ssh-dss-sha256" ?
Functionality request for supporting Digital Signatures for RSA and DSS
Public Key Algorithms in alignment with NIST SP800-131A.
I
assume this has been asked before, but I could not find in the
archives. Support of "ssh-rsa-sha256" and "ssh-dss-sha256" public key
algorithms for OpenSSH? I know Suite B Algorithms and x509 SSH
Extension Algorithms are supported, but not a
2024 Mar 30
11
[Bug 3675] New: CASignatureAlgorithms should be verified before verifying signatures
...pubkey in authorized_keys etc
However, certificates are verified before such checks:
userauth_pubkey()
-> sshkey_from_blob()
-> sshkey_from_blob_internal()
-> cert_parse()
-> sshkey_verify(key->cert->signature_key)
-> ssh_rsa_verify() (or others, depending on cert type)
-> openssh_RSA_verify()
-> RSA_public_decrypt()
The signature algorithm *is* subsequently checked, but of course
RSA_public_decrypt has already been called by that point.
Outside of CVE-2024-3094, which is not openssh's reponsibility, that is
not a correctness issue. But doing verification of signatures with
a...
2016 Feb 29
0
Announce: OpenSSH 7.2 released
...ts doesn't exist.
* sshd(8): correct packet format for tcpip-forward replies for
requests that don't allocate a port bz#2509
* ssh(1), sshd(8): fix possible hang on closed output. bz#2469
* ssh(1): expand %i in ControlPath to UID. bz#2449
* ssh(1), sshd(8): fix return type of openssh_RSA_verify. bz#2460
* ssh(1), sshd(8): fix some option parsing memory leaks. bz#2182
* ssh(1): add a some debug output before DNS resolution; it's a
place where ssh could previously silently stall in cases of
unresponsive DNS servers. bz#2433
* ssh(1): remove spurious newline in visual ho...
2016 Feb 29
5
Announce: OpenSSH 7.2 released
...ts doesn't exist.
* sshd(8): correct packet format for tcpip-forward replies for
requests that don't allocate a port bz#2509
* ssh(1), sshd(8): fix possible hang on closed output. bz#2469
* ssh(1): expand %i in ControlPath to UID. bz#2449
* ssh(1), sshd(8): fix return type of openssh_RSA_verify. bz#2460
* ssh(1), sshd(8): fix some option parsing memory leaks. bz#2182
* ssh(1): add a some debug output before DNS resolution; it's a
place where ssh could previously silently stall in cases of
unresponsive DNS servers. bz#2433
* ssh(1): remove spurious newline in visual ho...
2016 Feb 12
22
Call for testing: OpenSSH 7.2
...ts doesn't exist.
* sshd(8): correct packet format for tcpip-forward replies for
requests that don't allocate a port bz#2509
* ssh(1), sshd(8): fix possible hang on closed output. bz#2469
* ssh(1): expand %i in ControlPath to UID. bz#2449
* ssh(1), sshd(8): fix return type of openssh_RSA_verify. bz#2460
* ssh(1), sshd(8): fix some option parsing memory leaks. bz#2182
* ssh(1): add a some debug output before DNS resolution; it's a
place where ssh could previously silently stall in cases of
unresponsive DNS servers. bz#2433
* ssh(1): remove spurious newline in visual ho...
2015 Aug 21
124
[Bug 2451] New: Bugs intended to be fixed in 7.2
https://bugzilla.mindrot.org/show_bug.cgi?id=2451
Bug ID: 2451
Summary: Bugs intended to be fixed in 7.2
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: trivial
Priority: P5
Component: Miscellaneous
Assignee: unassigned-bugs at