Displaying 17 results from an estimated 17 matches for "ssh2_msg_kex_dh_gex_request_old".
2002 Apr 11
2
SSH2_MSG_KEX_DH_GEX_REQUEST_OLD
Hi All,
I am trying to decode the message received from openssh client 3.1.0
Following is the third message which I received.
length = 0000 008c
padding length = 06
messagetype = 1e (SSH2_MSG_KEX_DH_GEX_REQUEST_OLD)
padding = b8 218e c680
and the next four byte should have the n which is 0000 0080 which is less
than 1024.
0000 008c 061e 0000 0080 2a19 a9e4 05fb
aee2 b107 4fa9 f0c1 83d3 3bf0 15a2 8dc8
a74b 7be1 6cab 817f cffc b835 04f2 0958
850c b2ec dc0a 81de 0929 2d4c 9a6c 17a8
5a81 95bc 657b 0ac0 6a8e 246...
2006 Sep 10
2
Corrupted MAC problem on PSOS platform
...#39;t
establish connection with the server.
<First connection..............................>
debug: Enabling compatibility mode for protocol 2.0
debug: SSH2_MSG_KEXINIT sent
debug: kex: client->server aes256-cbc hmac-sha1 none
debug: kex: server->client aes256-cbc hmac-sha1 none
debug: SSH2_MSG_KEX_DH_GEX_REQUEST_OLD received
debug: SSH2_MSG_KEX_DH_GEX_GROUP sent
debug: expecting SSH2_MSG_KEX_DH_GEX_INIT
debug: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug: kex_derive_keys........................
debug: newkeys[1]=0xfd4868
debug: SSH2_MSG_NEWKEYS sent
debug: expecting SSH2_MSG_NEWKEYS
debug: newkeys[0]=0xfd4748
debug: S...
2007 Mar 14
1
sshd gets stuck: select() in packet_read_seqnr waits indefinitely
...keying
via key exchange. Here's an example of a successful rekeying:
Mar 11 19:02:35 SSH2_MSG_KEXINIT received
Mar 11 19:02:35 SSH2_MSG_KEXINIT sent
Mar 11 19:02:35 kex: client->server aes256-ctr hmac-sha1 none
Mar 11 19:02:35 kex: server->client aes256-ctr hmac-sha1 none
Mar 11 19:02:35 SSH2_MSG_KEX_DH_GEX_REQUEST_OLD received
Mar 11 19:02:35 SSH2_MSG_KEX_DH_GEX_GROUP sent
Mar 11 19:02:35 expecting SSH2_MSG_KEX_DH_GEX_INIT
Mar 11 19:02:38 SSH2_MSG_KEX_DH_GEX_REPLY sent
Mar 11 19:02:38 set_newkeys: rekeying
Mar 11 19:02:38 SSH2_MSG_NEWKEYS sent
Mar 11 19:02:38 expecting SSH2_MSG_NEWKEYS
Mar 11 19:02:38 set_newkey...
2003 May 14
1
SFTP on OS390
Hi
Anyone have any idea on how to implement sftp in os390?
Well .. using OpenSSH .. I've already installed SSL and SSH successfully ..
I can do putty and scp .. but sftp is still a problem ..
anyone has a guideline?
thanks
2001 Oct 24
1
OpenSSH/ls locks term
...13 pat ^OpenSSH_2\.3\.0
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_2.9p2
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client 3des-cbc hmac-md5 none
debug1: kex: client->server 3des-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST_OLD sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 193/384
debug1: bits set: 1034/2049
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host 'myhost' is known and matches the DSA host key.
debug1: Found key in /ne...
2001 Sep 27
3
sftp error on LynxOs
I am trying to initiate an sftp session from a Linux (Redhat) to a LynxOs
machine (where i have ported opnessh-2.9p1) and configured without PAM
support (as I was not able to find PAM version for LynxOS operating system)
I get the following error:
$ sftp -P /home/telica -l telica -v ben
select: Bad file descriptor
read: Input/output error
sftp>
Can somebody help me asap on this?
2015 Nov 11
8
[Bug 2494] New: kex_protocol_error should send SSH2_MSG_UNIMPLEMENTED
...tually find out that a message it has sent was
unrecognised rather than simply hanging, and perhaps even have a
fallback. This would appear to be a MUST in RFC 4253 section 11.4, if
I'm reading it correctly.
(Discovered while debugging a twisted.conch hang that turned out to be
due to sending SSH2_MSG_KEX_DH_GEX_REQUEST_OLD, but it would have been
easier to spot if I'd got an unimplemented packet back from sshd.)
--
You are receiving this mail because:
You are watching the assignee of the bug.
2002 Oct 01
1
ssh with iptables and equalize
...:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_init: found hmac-md5
debug1: kex: server->client aes128-cbc hmac-md5 none
debug2: mac_init: found hmac-md5
debug1: kex: client->server aes128-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST_OLD sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 140/256
debug1: bits set: 504/1024
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug3: check_host_in_hostfile: filename /home/mohan/.ssh/known_hosts
debug3: check_host_in_ho...
2007 Sep 17
18
[Bug 1363] New: sshd gets stuck: select() in packet_read_seqnr waits indefinitely
...keying
via key exchange. Here's an example of a successful rekeying:
Mar 11 19:02:35 SSH2_MSG_KEXINIT received
Mar 11 19:02:35 SSH2_MSG_KEXINIT sent
Mar 11 19:02:35 kex: client->server aes256-ctr hmac-sha1 none
Mar 11 19:02:35 kex: server->client aes256-ctr hmac-sha1 none
Mar 11 19:02:35 SSH2_MSG_KEX_DH_GEX_REQUEST_OLD received
Mar 11 19:02:35 SSH2_MSG_KEX_DH_GEX_GROUP sent
Mar 11 19:02:35 expecting SSH2_MSG_KEX_DH_GEX_INIT
Mar 11 19:02:38 SSH2_MSG_KEX_DH_GEX_REPLY sent
Mar 11 19:02:38 set_newkeys: rekeying
Mar 11 19:02:38 SSH2_MSG_NEWKEYS sent
Mar 11 19:02:38 expecting SSH2_MSG_NEWKEYS
Mar 11 19:02:38 set_newkey...
2006 Feb 14
15
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131
------- Comment #5 from dtucker at zip.com.au 2006-02-14 22:17 -------
Also, what compiler did you use to compile OpenSSH? If you compile OpenSSH
(and openssl and zlib if possible) with optimization disabled (-O0) does the
error still occur?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are
2015 Jul 01
0
Announce: OpenSSH 6.9 released
...bz#928
* ssh-keygen(1): support "ssh-keygen -lF hostname" to search
known_hosts and print key hashes rather than full keys.
* ssh-agent(1): add -D flag to leave ssh-agent in foreground without
enabling debug mode; bz#2381
Bugfixes
--------
* ssh(1), sshd(8): deprecate legacy SSH2_MSG_KEX_DH_GEX_REQUEST_OLD
message and do not try to use it against some 3rd-party SSH
implementations that use it (older PuTTY, WinSCP).
* Many fixes for problems caused by compile-time deactivation of
SSH1 support (including bz#2369)
* ssh(1), sshd(8): cap DH-GEX group size at 4Kbits for Cisco
implementatio...
2002 May 28
5
Problems with UsePrivilegeSeparation (was: port fwd as user != root?
I just upgraded to OpenSSH3.2.3p1 as it seemed that
UsePrivilegeSeparation yes
might help with my problem (connections forwarded
are owned by root instead of the user I logged in as
on the server), but instead, sshd barfs on receiving
a connection. Without UsePrivilegeSeparation
the server works fine.
# strace -o /tmp/sshd.str sshd -d
debug1: sshd version OpenSSH_3.2.3p1
debug1: private host
2015 Jul 01
5
Announce: OpenSSH 6.9 released
...bz#928
* ssh-keygen(1): support "ssh-keygen -lF hostname" to search
known_hosts and print key hashes rather than full keys.
* ssh-agent(1): add -D flag to leave ssh-agent in foreground without
enabling debug mode; bz#2381
Bugfixes
--------
* ssh(1), sshd(8): deprecate legacy SSH2_MSG_KEX_DH_GEX_REQUEST_OLD
message and do not try to use it against some 3rd-party SSH
implementations that use it (older PuTTY, WinSCP).
* Many fixes for problems caused by compile-time deactivation of
SSH1 support (including bz#2369)
* ssh(1), sshd(8): cap DH-GEX group size at 4Kbits for Cisco
implementatio...
2006 Mar 16
11
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
...:
debug2: kex_parse_kexinit:
debug2: kex_parse_kexinit: first_kex_follows 0
debug2: kex_parse_kexinit: reserved 0
debug2: mac_init: found hmac-sha1
debug1: kex: client->server 3des-cbc hmac-sha1 none
debug2: mac_init: found hmac-sha1
debug1: kex: server->client 3des-cbc hmac-sha1 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST_OLD received
debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent
debug2: dh_gen_key: priv key bits set: 206/384
debug2: bits set: 495/1024
debug1: expecting SSH2_MSG_KEX_DH_GEX_INIT
debug2: bits set: 522/1024
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug2: kex_derive_keys
debug2: set_newkeys: mode 1
debug1: SSH2_MSG...
2015 Apr 07
2
OpenSSH 6.6.x sends invalid SSH_MSG_USERAUTH_INFO_REQUEST
...eauth]
debug2: kex_parse_kexinit: reserved 0 [preauth]
debug2: mac_setup: setup hmac-sha2-256 [preauth]
debug1: kex: client->server 3des-cbc hmac-sha2-256 none [preauth]
debug2: mac_setup: setup hmac-sha2-256 [preauth]
debug1: kex: server->client 3des-cbc hmac-sha2-256 none [preauth]
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST_OLD received [preauth]
debug3: mm_request_send entering: type 0 [preauth]
debug3: mm_choose_dh: waiting for MONITOR_ANS_MODULI [preauth]
debug3: mm_request_receive_expect entering: type 1 [preauth]
debug3: mm_request_receive entering [preauth]
debug3: mm_request_receive entering
debug3: monitor_read: c...
2002 Mar 13
3
zlib compression, the exploit, and OpenSSH
...OpenSSH_2\.5\.[012]
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_2.9p2
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-cbc hmac-md5 zlib
debug1: kex: client->server aes128-cbc hmac-md5 zlib
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST_OLD sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 142/256
debug1: bits set: 1025/2049
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host 'raid' is known and matches the DSA host key.
debug1: Found key in /home...
2015 May 29
16
Call for testing: OpenSSH 6.9
...bz#928
* ssh-keygen(1): support "ssh-keygen -lF hostname" to search
known_hosts and print key hashes rather than full keys.
* ssh-agent(1): add -D flag to leave ssh-agent in foreground without
enabling debug mode; bz#2381
Bugfixes
--------
* ssh(1), sshd(8): deprecate legacy SSH2_MSG_KEX_DH_GEX_REQUEST_OLD
message and do not try to use it against some 3rd-party SSH
implementations that use it (older PuTTY, WinSCP).
* Many fixes for problems caused by compile-time deactivation of
SSH1 support (including bz#2369)
* ssh(1), sshd(8): cap DH-GEX group size at 4Kbits for Cisco
implementatio...