Displaying 6 results from an estimated 6 matches for "ssh_bug_hmac".
2000 Dec 23
1
OpenSSH-2.3.0p1 patch for yet another F-secure version
...e. This causes death.
one Working patch to the problem:
---------------------------------
*** compat.c Sat Nov 4 21:42:36 2000
--- compat.c.new Fri Dec 22 11:10:52 2000
***************
*** 66,71 ****
--- 66,74 ----
{ "MindTerm", 0 },
{ "^2\\.1\\.0 ", SSH_BUG_SIGBLOB|SSH_BUG_HMAC|
SSH_OLD_SESSIONID },
+ /* yetanother 2.1.0 */
+ { "^2\\.1\\.0.pl2 ", SSH_BUG_SIGBLOB|SSH_BUG_HMAC|
+ SSH_OLD_SESSIONID },
{ "^2\\.0\\.", SSH_BUG_SIGBLOB|SSH_BUG_HMAC|
SSH_OLD_SESSIONID|
SSH_BUG_PUBKEYAUTH|SSH_BUG_X11FWD },
2000 Dec 02
1
PATCH: Datafellows SSH misdetection in compat.c
...ds
-------------- next part --------------
--- compat.c.orig Sun Nov 5 07:42:36 2000
+++ compat.c Sat Dec 2 17:58:56 2000
@@ -64,12 +64,12 @@
} check[] = {
{ "^OpenSSH[-_]2\\.[012]", SSH_OLD_SESSIONID },
{ "MindTerm", 0 },
- { "^2\\.1\\.0 ", SSH_BUG_SIGBLOB|SSH_BUG_HMAC|
+ { "^2\\.1\\.0", SSH_BUG_SIGBLOB|SSH_BUG_HMAC|
SSH_OLD_SESSIONID },
{ "^2\\.0\\.", SSH_BUG_SIGBLOB|SSH_BUG_HMAC|
SSH_OLD_SESSIONID|
SSH_BUG_PUBKEYAUTH|SSH_BUG_X11FWD },
- { "^2\\.[23]\\.0 ", SSH_BUG_HMAC},
+ { "^2\\.[23]\\.0", SSH_...
2001 Sep 04
3
2.9p2 behaves different from 2.5.2p2 on tunneling issue
Hi,
I have a problem with a Linux box which I updated from 2.5.2p2
to 2.9p2 recently. It's running a tunnel started via inittab
using a script which starts
ssh -2 -N -o 'ConnectionAttempts 3600' -L <tunnel> $host
This has run reliable with 2.5.2 over the last months. Now, after
I have upgraded to 2.9p2, the tunnel is closed right after each
attempt of an application to use
2000 Jun 21
1
SSH 2.2.0
Yo All!
I have been playing with SSH 2.2.0 from www.ssh.com. I can not
connect to openssh 2.2.1p1 using Ver 2 protocol from ssh Ver 2.2.0.
Ver 1 works fine.
See below for the debug output from both ends
If I force hmac-md5 (-m hmac-md5) from the sender it works!
The other 3 choices fail: hmac-sha1; hmac-md5-96; and none.
I have no problem connecting to this openssh host (hobbes) from
2014 Apr 20
2
bad bignum encoding for curve25519-sha256@libssh.org
...SH_BUG_DYNAMIC_RPORT},
+ { "OpenSSH_6.6.1*", SSH_NEW_OPENSSH},
+ { "OpenSSH_6.5*,"
+ "OpenSSH_6.6*", SSH_NEW_OPENSSH|SSH_BUG_CURVE25519PAD},
{ "OpenSSH*", SSH_NEW_OPENSSH },
{ "*MindTerm*", 0 },
{ "2.1.0*", SSH_BUG_SIGBLOB|SSH_BUG_HMAC|
@@ -251,7 +254,6 @@ compat_cipher_proposal(char *cipher_prop
return cipher_prop;
}
-
char *
compat_pkalg_proposal(char *pkalg_prop)
{
@@ -263,5 +265,18 @@ compat_pkalg_proposal(char *pkalg_prop)
if (*pkalg_prop == '\0')
fatal("No supported PK algorithms found");
re...
2013 May 15
2
Support for "ssh-rsa-sha256" and "ssh-dss-sha256" ?
Functionality request for supporting Digital Signatures for RSA and DSS
Public Key Algorithms in alignment with NIST SP800-131A.
I
assume this has been asked before, but I could not find in the
archives. Support of "ssh-rsa-sha256" and "ssh-dss-sha256" public key
algorithms for OpenSSH? I know Suite B Algorithms and x509 SSH
Extension Algorithms are supported, but not a