Displaying 12 results from an estimated 12 matches for "proposal_server_host_key_algs".
2005 Oct 26
2
openssh 4.2p1 zlib compression broken for old clients
...OC] = "none";
} else if (options.compression == COMP_DELAYED) {
myproposal[PROPOSAL_COMP_ALGS_CTOS] =
- myproposal[PROPOSAL_COMP_ALGS_STOC] = "none,zlib at openssh.com";
+ myproposal[PROPOSAL_COMP_ALGS_STOC] = "none,zlib at openssh.com,zlib";
}
myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = list_hostkey_types();
-------------------------------------------------------------------------------
Harald Koenig
PS: yes I know about the security issues using such old ssh clients, but it's
only used in fairly protected small internal customer networks, and the customer
insists not to...
2020 Feb 06
3
Call for testing: OpenSSH 8.2
On 2020-02-05 at 20:39 -0500, Phil Pennock wrote:
> On 2020-02-06 at 10:29 +1100, Damien Miller wrote:
> > OpenSSH 8.2p1 is almost ready for release, so we would appreciate testing
> > on as many platforms and systems as possible. This is a feature release.
>
> > * The RFC8332 RSA SHA-2 signature algorithms rsa-sha2-256/512. These
> This actually affects me:
2009 Mar 31
2
Memory leak in do_ssh2_kex()
Hi guys
Apparently, there is small memory leak in the do_ssh2_kex() routine in sshd.c.
Line 2195 in sshd.c states:
myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = list_hostkey_types();
Where list_hostkey_types() returns a pointer allocated by the xstrdup call (line 735). This pointer should be freed in the calling routine do_ssh2_key().
Should I make a patch for this?
Also, since my previous patch was not according to the your standards, how many lines...
2009 Apr 01
3
[Bug 1582] New: memory leak in do_ssh2_kex() routine (sshd.c)
...at arcelormittal.com
CC: miguel.sanders at arcelormittal.com
Created an attachment (id=1620)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=1620)
Fix for memory leak
There is small memory leak in the do_ssh2_kex() routine in sshd.c.
Line 2195 in sshd.c states:
myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = list_hostkey_types();
Where list_hostkey_types() returns a pointer allocated by the xstrdup
call (line 735). This pointer should be freed in the calling routine
do_ssh2_kex().
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because...
2003 Jan 26
8
[Bug 148] Key Exchange Guesses not supported
http://bugzilla.mindrot.org/show_bug.cgi?id=148
markus at openbsd.org changed:
What |Removed |Added
----------------------------------------------------------------------------
AssignedTo|markus at openbsd.org |openssh-unix-dev at mindrot.org
------- You are receiving this mail because: -------
You are the assignee for the bug, or are
2001 Mar 07
1
patch to select pkalg
...-2.5.1p2/sshconnect2.c Thu Feb 15 20:34:57 2001
--- sshconnect2.c Wed Mar 7 00:06:05 2001
***************
*** 94,99 ****
--- 94,102 ----
myproposal[PROPOSAL_MAC_ALGS_CTOS] =
myproposal[PROPOSAL_MAC_ALGS_STOC] = options.macs;
}
+ if (options.pkalgorithms != NULL) {
+ myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = options.pkalgorithms;
+ }
/* buffers with raw kexinit messages */
server_kexinit = xmalloc(sizeof(*server_kexinit));
================================================================================
2001 Mar 11
0
patch to allow client to select rsa/dss
...:37 2001
***************
*** 94,99 ****
--- 94,104 ----
myproposal[PROPOSAL_MAC_ALGS_CTOS] =
myproposal[PROPOSAL_MAC_ALGS_STOC] = options.macs;
}
+ if (options.pkalg != NULL) {
+ debug("Copying pkalg=%.100s to mypromposal", options.pkalg);
+ myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = options.pkalg;
+ }
+
/* buffers with raw kexinit messages */
server_kexinit = xmalloc(sizeof(*server_kexinit));
--cut-here-
Most of the patch is based on the handling of 'macs', and 'ciphers',
it is quite possible that there is a cleaner way to achieve the same
effect...
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |
2007 Mar 14
1
sshd gets stuck: select() in packet_read_seqnr waits indefinitely
Dear OpenSSH Portable sshd developers,
I'm having a problem where sshd login sessions are occasionally
(as often as once a day) getting stuck indefinitely. I enabled debug
messages and got a backtrace of a stuck sshd, and I think I've found
the bug. I wanted to run it by the list once before filing.
sshd version:
OpenSSH_4.2p1 FreeBSD-20050903, OpenSSL 0.9.7e-p1 25 Oct 2004
2012 Nov 24
0
ssh-keyscan continuity patch --
...dout = 0;
+
packet_set_connection(c->c_fd, c->c_fd);
+/*
+ * Use our "timeout" value to set the maximum allowed wait time for data
+ * to become available in the `packet.c:packet_read_seqnr()' function.
+ */
+ packet_set_timeout(timeout, 1);
+
enable_compat20();
myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = c->c_keytype == KT_DSA?
"ssh-dss" : (c->c_keytype == KT_RSA ? "ssh-rsa" :
@@ -296,8 +318,11 @@
memset(&hints, 0, sizeof(hints));
hints.ai_family = IPv4or6;
hints.ai_socktype = SOCK_STREAM;
- if ((gaierr = getaddrinfo(host, strport, &hints, &aitop...
2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
...mote_minor)
+{
+ switch (remote_major) {
+ case 1:
+ if (remote_minor == 99)
+ return 1;
+ break;
+ case 2:
+ return 1;
+ default:
+ break;
+ }
+ return 0;
+}
+
+static Key *
+keygrab_ssh2(con *c)
+{
+ int j;
+
+ packet_set_connection(c->c_fd, c->c_fd);
+ enable_compat20();
+ myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = c->c_keytype == KT_DSA?
+ "ssh-dss": "ssh-rsa";
+ c->c_kex = kex_setup(myproposal);
+ c->c_kex->verify_host_key = hostjump;
+
+ if (!(j = setjmp(kexjmp))) {
+ nonfatal_fatal = 1;
+ dispatch_run(DISPATCH_BLOCK, &c->c_kex->done, c->c_kex);
+ fpri...
2017 Mar 02
64
[Bug 2687] New: Coverity scan fixes
https://bugzilla.mindrot.org/show_bug.cgi?id=2687
Bug ID: 2687
Summary: Coverity scan fixes
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee: unassigned-bugs at mindrot.org