search for: sign_and_send_pubkey

Displaying 20 results from an estimated 69 matches for "sign_and_send_pubkey".

2022 Mar 14
8
[Bug 3406] New: RSA key authentication doesn't work with enabled GSSAPIKeyExchange: sign_and_send_pubkey: internal error: initial hostkey not recorded
https://bugzilla.mindrot.org/show_bug.cgi?id=3406 Bug ID: 3406 Summary: RSA key authentication doesn't work with enabled GSSAPIKeyExchange: sign_and_send_pubkey: internal error: initial hostkey not recorded Product: Portable OpenSSH Version: 8.9p1 Hardware: Other OS: Linux Status: NEW Severity: normal Priority: P5 Component: Kerberos support...
2016 Mar 10
10
[Bug 2550] New: ssh can't use an in-memory-only certificate
...private and the cert (also with the private key) loaded together to work. if I try to use just the cert after this commit, I see: debug1: Server accepts key: pkalg ssh-rsa-cert-v01 at openssh.com blen 2769 debug2: input_userauth_pk_ok: fp SHA256:XiFOO+XzZ0m/aWzkQLgxVFI2HJV3abWpNyuIhcEYKuc debug3: sign_and_send_pubkey: RSA-CERT SHA256:XiFOO+XzZ0m/aWzkQLgxVFI2HJV3abWpNyuIhcEYKuc debug1: sign_and_send_pubkey: no private key for certificate "[Valid until Fri 11 Mar 2016 18:10 UTC, Version 2]" if I modify the ca to add both the cert (with private key) and the private key, so my agent looks like this: $ ....
2024 Nov 19
2
[Bug 3752] New: ssh agent with host constraints fails creating a signature
...ect using ssh certificates and host constraints. Hi, I've tried using SSH certificates with host constraints in the agent, however I get the following error: in ssh: ``` debug1: Server accepts key: thibault at emil ED25519-CERT SHA256:ieHFl8uwTyPo18egdwxbBq+YqmfN6SyE3cE9Hc5ZxiQ agent debug3: sign_and_send_pubkey: using publickey-hostbound-v00 at openssh.com with ED25519-CERT SHA256:ieHFl8uwTyPo18egdwxbBq+YqmfN6SyE3cE9Hc5ZxiQ debug2: sign_and_send_pubkey: using private key "thibault at emil" from agent for certificate debug3: sign_and_send_pubkey: signing using ssh-ed25519-cert-v01 at openssh.com...
2024 Oct 29
14
[Bug 3748] New: "webauthn-sk-ecdsa-sha2-nistp256@openssh.com" signature type not supported from ssh agent
...turn this webauthn signature type for an "sk-ecdsa-sha2-nistp256-cert-v01 at openssh.com" cert. However, this fails with the following output on the client side: ``` debug1: Server accepts key: ECDSA-SK-CERT SHA256:1FFCks/uvL5MVUBOcr8f3mNlLpdaw1Qt1CHA7JNqZp0 authenticator agent debug3: sign_and_send_pubkey: using publickey with ECDSA-SK-CERT SHA256:1FFCks/uvL5MVUBOcr8f3mNlLpdaw1Qt1CHA7JNqZp0 debug1: sign_and_send_pubkey: no separate private key for certificate "" debug3: sign_and_send_pubkey: signing using sk-ecdsa-sha2-nistp256-cert-v01 at openssh.com SHA256:1FFCks/uvL5MVUBOcr8f3mNlLpdaw1Q...
2016 Sep 26
28
[Bug 2617] New: sign_and_send_pubkey: no separate private key for certificate
https://bugzilla.mindrot.org/show_bug.cgi?id=2617 Bug ID: 2617 Summary: sign_and_send_pubkey: no separate private key for certificate Product: Portable OpenSSH Version: 7.3p1 Hardware: 68k OS: Mac OS X Status: NEW Severity: normal Priority: P5 Component: ssh Assignee: unas...
2016 Oct 27
11
[Bug 2635] New: Unable to use SSH Agent and user level PKCS11Provider configuration directive
...lib/pkcs11/opensc-pkcs11.so $ ssh -vv $REMOTEHOST OpenSSH_7.3p1, OpenSSL 1.0.2j 26 Sep 2016 ... debug1: Offering RSA public key: /usr/lib/libykcs11.so debug2: we sent a publickey packet, wait for reply debug1: Server accepts key: pkalg ssh-rsa blen 279 debug2: input_userauth_pk_ok: fp SHA256:... sign_and_send_pubkey: signing failed: agent refused operation ... debug1: Next authentication method: password $USER@$REMOTEHOST's password: If I remove the library (and keys) and try the connection again: $ ssh-add -e /lib/pkcs11/opensc-pkcs11.so Card removed: /lib/pkcs11/opensc-pkcs11.so $ ssh-add -l The agent...
2024 Jul 04
1
Apple's SSH x OpenSSH (brew) x CTK x Security Key types
...ldn?t get this to work. Or rather it seems to work with no error, but doesn?t _actually_ work: This is with Yubikey 5C and certificate in 9a slot (9c does the same) debug1: Server accepts key: id_ecdsa_sk_rk ECDSA-SK SHA256:0dttd879INvMlZ92xl4NOIkJ2AJUksEAsup0UgSqu5k explicit authenticator debug3: sign_and_send_pubkey: using publickey-hostbound-v00 at openssh.com with ECDSA-SK SHA256:0dttd879INvMlZ92xl4NOIkJ2AJUksEAsup0UgSqu5k debug3: sign_and_send_pubkey: signing using sk-ecdsa-sha2-nistp256 at openssh.com SHA256:0dttd879INvMlZ92xl4NOIkJ2AJUksEAsup0UgSqu5k Confirm user presence for key ECDSA-SK SHA256:0dttd879I...
2024 Jan 02
1
How to get "Enter passphrase" on command line rather than GUI pop-up?
...e local system window gets the GUI pop-up the 'two ssh' > window asks for the passphrase in the terminal. > I think I have it! I need to unset SSH_AUTH_SOCK, that's all that's needed. See:- chris$ ssh -i backup_id_rsa backup [here the pop-up appears and I cancel it] sign_and_send_pubkey: signing failed for RSA "backup_id_rsa" from agent: agent refused operation chris at backup's password: chris$ env | grep SSH SSH_AUTH_SOCK=/run/user/1000/keyring/ssh SSH_ASKPASS_REQUIRE=never chris$ unset SSH_AUTH_SOCK chris$ ssh -i backup_id_rsa backup...
2024 Jan 03
1
How to get "Enter passphrase" on command line rather than GUI pop-up?
On 2024/01/02 09:51, Chris Green wrote: > I think I have it! I need to unset SSH_AUTH_SOCK, that's all that's > needed. See:- > > chris$ ssh -i backup_id_rsa backup > [here the pop-up appears and I cancel it] > sign_and_send_pubkey: signing failed for RSA "backup_id_rsa" from > agent: agent refused operation > chris at backup's password: > > chris$ env | grep SSH > SSH_AUTH_SOCK=/run/user/1000/keyring/ssh > SSH_ASKPASS_REQUIRE=never > chris$ unset SSH_AUTH_SOCK >...
2012 Aug 29
1
second FIPS patch for openssh 6.0p1, fix pubkey
...mode() ? SSH_FP_SHA1 : SSH_FP_MD5, ! SSH_FP_HEX); debug2("input_userauth_pk_ok: fp %s", fp); xfree(fp); *************** *** 1204,1210 **** int have_sig = 1; char *fp; ! fp = key_fingerprint(id->key, SSH_FP_MD5, SSH_FP_HEX); debug3("sign_and_send_pubkey: %s %s", key_type(id->key), fp); xfree(fp); --- 1218,1225 ---- int have_sig = 1; char *fp; ! fp = key_fingerprint(id->key, FIPS_mode() ? SSH_FP_SHA1 : SSH_FP_MD5, ! SSH_FP_HEX); debug3("sign_and_send_pubkey: %s %s", key_type(id-&gt...
2002 Oct 08
2
Memory fault on HP-UX 11.0, 3.4p1
...erauth_pubkey_agent: testing agent key /root/.ssh/id_rsa debug3: send_pubkey_test debug2: we sent a publickey packet, wait for reply debug1: input_userauth_pk_ok: pkalg ssh-rsa blen 149 lastkey 400377a0 hint -1 debug2: input_userauth_pk_ok: fp 7a:44:be:6c:94:18:fb:0c:ff:e5:1a:9a:07:98:a5:27 debug3: sign_and_send_pubkey debug3: clear_auth_state: key_free 400377a0 debug1: ssh-userauth2 successful: method publickey debug1: channel 0: new [client-session] debug3: ssh_session2_open: channel_new: 0 debug1: send channel open 0 Memory fault(coredump) # ssh -V OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090607f HP-...
2024 Sep 09
1
OL8 (RHEL8), ssh-rsa turned off using update-crypto-policies, receiving an openssh error that I don't seem to be able to override in my personal .ssh/config file
...ithms +ssh-rsa,ssh-rsa-cert-v01 at openssh.com or HostkeyAlgorithms +ssh-rsa-cert-v01 at openssh.com,ssh-rsa PubkeyAcceptedAlgorithms +ssh-rsa-cert-v01 at openssh.com,ssh-rsa to my .ssh/config and still receive an error message of: agent key RSA-CERT SHA256:..... returned incorrect signature type sign_and_send_pubkey: no mutual signature supported if I update-crpyto-policies to the DEFAULT policy, the connectivity works correctly. I'm a bit confused as to why openssh isn't using my personal config settings to override the system wide settings or am I not setting the necessary or is this by design? --...
2010 Jan 12
2
[patch] Automatically add keys to agent
...======================== RCS file: /usr/obsd-repos/src/usr.bin/ssh/sshconnect2.c,v retrieving revision 1.178 diff -u -N -p sshconnect2.c --- sshconnect2.c 11 Jan 2010 04:46:45 -0000 1.178 +++ sshconnect2.c 11 Jan 2010 23:12:38 -0000 @@ -244,7 +244,7 @@ void userauth(Authctxt *, char *); static int sign_and_send_pubkey(Authctxt *, Identity *); static void pubkey_prepare(Authctxt *); static void pubkey_cleanup(Authctxt *); -static Key *load_identity_file(char *); +static Key *load_identity_file(char *, AuthenticationConnection *); static Authmethod *authmethod_get(char *authlist); static Authmethod *authmeth...
2018 Jul 31
11
[Bug 2890] New: ssh-agent should not fail after removing and inserting smart card
https://bugzilla.mindrot.org/show_bug.cgi?id=2890 Bug ID: 2890 Summary: ssh-agent should not fail after removing and inserting smart card Product: Portable OpenSSH Version: 7.7p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component:
2024 Sep 09
2
OL8 (RHEL8), ssh-rsa turned off using update-crypto-policies, receiving an openssh error that I don't seem to be able to override in my personal .ssh/config file
...sh.com > or > HostkeyAlgorithms +ssh-rsa-cert-v01 at openssh.com,ssh-rsa > PubkeyAcceptedAlgorithms +ssh-rsa-cert-v01 at openssh.com,ssh-rsa > > to my .ssh/config and still receive an error message of: > > agent key RSA-CERT SHA256:..... returned incorrect signature type > sign_and_send_pubkey: no mutual signature supported > > if I update-crpyto-policies to the DEFAULT policy, the connectivity works > correctly. I'm a bit confused as to why openssh isn't using my personal > config settings to override the system wide settings or am I not setting > the necessary...
2024 Sep 09
1
OL8 (RHEL8), ssh-rsa turned off using update-crypto-policies, receiving an openssh error that I don't seem to be able to override in my personal .ssh/config file
...lgorithms +ssh-rsa-cert-v01 at openssh.com,ssh-rsa > > PubkeyAcceptedAlgorithms +ssh-rsa-cert-v01 at openssh.com,ssh-rsa > > > > to my .ssh/config and still receive an error message of: > > > > agent key RSA-CERT SHA256:..... returned incorrect signature type > > sign_and_send_pubkey: no mutual signature supported > > > > if I update-crpyto-policies to the DEFAULT policy, the connectivity works > > correctly. I'm a bit confused as to why openssh isn't using my personal > > config settings to override the system wide settings or am I not setting...
2018 Feb 22
3
Attempts to connect to Axway SFTP server result in publickey auth loopin
...sh/keys/secret.key debug3: send_pubkey_test debug3: send packet: type 50 debug2: we sent a publickey packet, wait for reply debug3: receive packet: type 60 debug1: Server accepts key: pkalg ssh-rsa blen 535 debug2: input_userauth_pk_ok: fp SHA256:W0A/tu/vWh2vk0zHJUdTsZN9adQmS6x7fEbMbSTayfs debug3: sign_and_send_pubkey: RSA SHA256:W0A/tu/vWh2vk0zHJUdTsZN9adQmS6x7fEbMbSTayfs debug3: send packet: type 50 debug3: receive packet: type 51 Authenticated with partial success. debug1: Authentications that can continue: password,publickey,keyboard-interactive debug1: Offering RSA public key: /ssh/keys/secret.key LOOP
2002 Nov 25
2
weird behaviour of commands option : bug or not ?
Hello I think I've found a bug but since no one replied to me on comp.security.ssh, I'll try my luck here. On my client, PreferredAuthentications is set to publickey,password. When using the commands option in authorized_keys file like command="ls" ssh-dss <key>... it is supposed to connect using the private key associated with <key>, perform ls and then quits.
2017 Jul 04
12
[Bug 2737] New: function identity_sign() assume private key's pub part as same as the .pub key.
...f method pubkey failed. the reasion is identity_sign() used the id_rsa2.pub as pubkey, and signed it by id_rsa1 private key. that sshd verify signature failed. but, if you remove ~/.ssh/id_rsa.pub, ssh client will used full ~/.ssh/id_rsa (extract pubkey,privatekey) through userauth_pubkey() -->sign_and_send_pubkey() -->identity_sign() and login success. i think ssh designed to login use pubkey as possible we you can. and if id_rsa unmatch id_rsa.pub, ssh should trust id_rsa and drop the rsa.pub file, try do login again as id_rsa.pub not exist. -- You are receiving this mail because: You are watchi...
2011 Nov 03
1
Help with CA Certificates for user authentication?
...ect to the target server from the test client: $ ssh -vvv -Y -p 2022 -l test 172.31.44.115 There is verbose output, which mostly seems right until (on the client): debug1: ssh_rsa_verify: signature correct debug2: input_userauth_pk_ok: fp c9:42:44:91:48:04:45:b2:ee:93:12:3f:e5:89:13:ab debug3: sign_and_send_pubkey: RSA-CERT c9:42:44:91:48:04:45:b2:ee:93:12:3f:e5:89:13:ab debug1: read PEM private key begin debug1: key_parse_private_pem: PEM_read_PrivateKey failed debug1: read PEM private key done: type <unknown> Enter passphrase for key '/home/test/.ssh/id_rsa': ...and, correspondingly on the s...