Displaying 20 results from an estimated 38 matches for "rfc4253".
2017 Feb 04
4
Greeter openssh 7.4 is not according rfc4253.
Hi,
I discovered when using my fuse fs for connecting to a remote host
using sftp that the new
server version 7.4 sends a greeter which is not according the format desribed in
https://tools.ietf.org/html/rfc4253#section-4
There is written that the greeter "MUST be terminated by a single
Carriage Return (CR) and a single Line Feed (LF) character (ASCII 13
and 10, respectively)."
Now the greeter send by openssh 7.4 looks like:
00000000 53 53 48 2d 32 2e 30 2d 4f 70 65 6e 53 53 48 5f |SSH-2.0-...
2017 Feb 06
2
Greeter openssh 7.4 is not according rfc4253.
2017-02-05 23:12 GMT+01:00 Michael Stone <mstone at mathom.us>:
>
> It was probably because of this commit:
>
> http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/sshd.c.diff?r1=1.472&r2=1.473
>
Yes here the combination cr and lf is removed.
> Which removed support for protocols older than 2 but perhaps failed to
> account for the fact that newline had been
2013 May 15
1
key rotation on ssh servers
...but i'm interested in figuring out how something like this
might happen in the future.
Reading the spec i don't see an explicit prohibition against multiple
keys of the same key type, but i don't see how it would be handled
exactly in the protocol either:
https://tools.ietf.org/html/rfc4253#page-18
Looking at sshd.c, it seems to me that get_hostkey_by_type() only
permits sshd to offer a single key of each type.
Would it be possible for some sshd to offer more than one key of any
given type? If so, this would permit such a key transition from clients
that could support it? Or is th...
2015 May 21
8
Weak DH primes and openssh
...H, which must reduce the impact somewhat,
although the main Windows client (PuTTY) doesn't support ECDH yet. But
openssh does still offer diffie-hellman-group1-sha1 (uses a 1024-bit
group) and diffie-hellman-group14-sha1 (uses a 2047-bit group), which
must be considered a bit suspect? Of course RFC4253 says implementations
MUST offer these...
The moduli file you provide has this distribution of sizes:
size count
1023 36
1535 50
2047 36
3071 31
4095 41
6143 27
8191 39
Would it be sensible to remove the <2047 moduli? Generating the larger
ones is quite time-consuming on non-specialist...
2023 Nov 10
1
Question about stderr output containing carriage return External
...t openssh prints lines to stderr
separated by CLRF pairs, and am trying to understand where this
behavior comes from.
This behavior can be seen here:
--snip--
$ ssh u at u 2>&1 | sed -n l
ssh: Could not resolve hostname u: Name or service not known\r$
--snip--
I have seen section 11.3 from rfc4253, but am unsure whether that is
the origin of this behavior. Is a "Debug Message"(SSH_MSG_DEBUG)
considered anything that is logged on stderr?
Any insights welcome!
Cheers,
Josh
2024 Feb 05
0
Server-side algorithms selection
Hi,
according to RFC 4253
https://www.rfc-editor.org/rfc/rfc4253#section-7.1
for the selection of algorithms (ciphers, KEX, MAC etc.), the leftmost
matching client algorithm is picked.
While this is fine in most cases, there are cases where it is not
desirable, for example:
1) for compatibility with a single old client you enable an old cipher,
say aes128-...
2013 Apr 19
0
OpenSSH_6.1p1 sends a SSH packet bigger than 32K
...n individual data packet that can be sent to the sender" without pointing out if specific headers are included or not.
This is equivalent to a 32768+13 byte packet for the lower layer, the binary packet protocol.
There's another section which somewhat clears things out - section 6.1 from RFC4253. Each SSH Connection Protocol packet (RFC 4254) is encapsulated entirely (headers included) in the binary packet protocol (bpp) payload from the SSH Transport Layer (RFC4253). And the above mentioned section stipulates all implementations must support an uncompressed payload length of 32768 for a b...
2014 Mar 06
1
Encryption
...s Harry trying to login), and have no role in the encryption?
I was under the assumption that each connection used a newly generated
key (using DH for key exchange) so each session was unique.
(I believe this because the transport layer needs to be set up before
user keys are even presented, and rfc4253 #6.3 doesn't mention the host
key).
I'm being asked to provide private keys to allow network sniffing
(problem analysis) but I'm not sure this is the right thing to do
because I'm not convinced these keys are used as part of the encryption!
Thanks...
--
rgds
Stephen
2018 Apr 18
3
[PATCH] configure.ac/cipher.c: Check for OpenSSL with EVP_des_ede3_cbc
While compiling openssl with option `no-des', it caused the openssh
build failure
...
cipher.c:85:41: error: 'EVP_des_ede3_cbc' undeclared here (not in a function);
...
Signed-off-by: Hongxu Jia <hongxu.jia at windriver.com>
---
cipher.c | 2 ++
configure.ac | 20 ++++++++++++++++++++
2 files changed, 22 insertions(+)
diff --git a/cipher.c b/cipher.c
index
2024 Jan 11
0
Announce: timeline to remove DSA support in OpenSSH
...as removed.
For example, Debian maintains a "openssh-client-ssh1" package built
from OpenSSH 7.5 for the purpose of connecting to SSHv1 endpoints.
This package or something similar is likely to be sufficient for
DSA-only endpoints too.
* Doesn't this make OpenSSH non-compliant with RFC4253?
Practically, no more than we've been since 2015 when we stopped
offering DSA by default.
* Why make this change now? Why not earlier/later?
We feel like enough time has passed since DSA was disabled by default
for the overwhelming majority of users to have abandoned use of the
algorithm. W...
2024 Jan 11
0
Announce: timeline to remove DSA support in OpenSSH
...as removed.
For example, Debian maintains a "openssh-client-ssh1" package built
from OpenSSH 7.5 for the purpose of connecting to SSHv1 endpoints.
This package or something similar is likely to be sufficient for
DSA-only endpoints too.
* Doesn't this make OpenSSH non-compliant with RFC4253?
Practically, no more than we've been since 2015 when we stopped
offering DSA by default.
* Why make this change now? Why not earlier/later?
We feel like enough time has passed since DSA was disabled by default
for the overwhelming majority of users to have abandoned use of the
algorithm. W...
2011 Jan 26
1
Packets Sizes and Information Leakage
...d my coworker
> needs the data for a presentation to a center director here.
A real problem is that the type of traffic analysis developed for
multi-hop stream encryption protocols (e.g. Tor) becomes trivial and
very efficient when applied to OpenSSH streams.
[1] <http://tools.ietf.org/html/rfc4253#page-7>
2020 Oct 02
4
[Bug 3219] New: Can't connect to a server that is using several host keys of the same type
...ity: normal
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
Reporter: jatjasjem at gmail.com
According to RFC 4253, "There MAY be multiple host keys for a host,
possibly
with different algorithms."
(https://tools.ietf.org/html/rfc4253#section-7.1)
It is possible to connect using all keys that are using different
algorithms
(e.g. you can use ecdsa-sha2-nistp256 and ecdsa-sha2-nistp521 at the
same
time). It also seems to be possible to *specify* multiple keys of the
same
type (e.g. two ecdsa-sha2-nistp256 keys). But in the lat...
2014 Aug 25
1
Cipher Order in sshd_config
...rder given for cipher key word has an impact please?
>> I mean is there a difference for the server if I do the config like :
>> e.g
>> Ciphers aes128-ctr,aes256-ctr
>> vs
>> Ciphers aes256-ctr,aes128-ctr
>
> It matters on the client but not on the server (see RFC4253 section 7.1)
> The selected method will be the first on the client's list that appears on
> the server's list.
I noticed some time ago that OpenSSH still prefers aes128 over aes192/aes256 ciphers in multiple cases (CTR, GCM, and CBC). Is this due to concerns about CPU usage? These da...
2023 Nov 11
1
Question about stderr output containing carriage return External
...by CLRF pairs, and am trying to understand where this
> behavior comes from.
>
> This behavior can be seen here:
> --snip--
> $ ssh u at u 2>&1 | sed -n l
> ssh: Could not resolve hostname u: Name or service not known\r$
> --snip--
>
> I have seen section 11.3 from rfc4253, but am unsure whether that is
> the origin of this behavior. Is a "Debug Message"(SSH_MSG_DEBUG)
> considered anything that is logged on stderr?
>
> Any insights welcome!
>
> Cheers,
> Josh
> _______________________________________________
> openssh-unix-dev ma...
2009 Sep 05
1
[Bug 1647] New: Implement FIPS 186-3 for DSA keys
https://bugzilla.mindrot.org/show_bug.cgi?id=1647
Summary: Implement FIPS 186-3 for DSA keys
Product: Portable OpenSSH
Version: 5.2p1
Platform: Other
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh-keygen
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy:
2009 Nov 06
0
SSL vulnerability and SSH
...ient and server continue the
connection (proxied via the MITM) oblivious to the fact that the MITM
has injected data.
In SSH, the first key exchange generates a "session identifier" in
addition to a key. This session identifier is used in the derivation of
all future cipher and MAC keys (RFC4253 section 7.2). If an attacker
tried the proxy and renegotiate SSL attack on SSH, the real client's
session ID would not match that generated by the server, causing the
derived keys to be different. The connection would terminate with a MAC
error as soon as the first data was exchanged.
(http://...
2012 Apr 26
0
Max Packet Size in sshd server and negotiation with client
Hi,
Forgive what might be a basic question. In channel open processing the server has a hardcoded maximum of 35000 bytes which corresponds to the recommended value in RFC4253. It appears that this is open to negotiation, and the RFC implies it might be desirable to support larger sizes in some channels. What determines what the absolute maximum is in openssh sshd? Presumably no client can negotiate a maximum that is larger than that advertised by the server? Tha...
2012 Dec 17
2
How to control which command is executed with "plain ssh" from remote machine?
Hi!
Is it possible to override in OpenSSH so that the shell specified in the /etc/passwd (or what comes from the LDAP server) is not executed at login?
We have na?vely tried to specify this with subsystem but found out that by default the ssh client does not specify any subsystem. So how to override something that is unset from the client?
/John
--
John Olsson
Ericsson AB
BSC/BSS System
2014 Jul 30
0
checking for "dh_gen_key: group too small" errors
...h]
dh_gen_key: group too small: 1024 (2*need 1024) [preauth]
debug1: do_cleanup [preauth]
This behavior, I believe, is in error as the shared secret produced by the
diffie-hellman key exchange is essentially extended to the appropriate
length by successive hashes that are concatenated together per
RFC4253#section-7.2
Also, it works fine in Ubuntu 14.04 / OpenSSH_6.6p1 Ubuntu-2ubuntu1.
My question is... for what versions of OpenSSH an issue? I'd like to hide
hmac-sha2-512 from the list of supported MAC's the client sends over for
all the affected SSH servers (ie. similar to how PuTTY handle...