Displaying 12 results from an estimated 12 matches for "ssh_bug_sigblob".
2000 Dec 23
1
OpenSSH-2.3.0p1 patch for yet another F-secure version
....1.0pl2
server O/S version: SunOS 5.7 Generic_106541-11 sun4u sparc
Log/Details:
: % telnet <mymachine> 22
: Trying xx.xx.xx.xx...
: Connected to sd099001.
: Escape character is '^]'.
: SSH-2.0-2.1.0.pl2 SSH Secure Shell (non-commercial)
: % ssh <mymachine>
: ..
: autodetect SSH_BUG_SIGBLOB
: ..
: len 20 datafellows -2
:
: Received packet with bad string length ......
: ...DIES....
Actual problem:
compat_datafellows() in compat.c does not recognize 2.1.0.pl2
version of SSH as 2.1.0, so it sets the variable "datafellows"
to the wrong value. This causes death.
one Work...
2000 Dec 05
1
SSH_BUG_SIGBLOB?
...debug: kex: client->server 3des-cbc hmac-md5 none
debug: Sending SSH2_MSG_KEXDH_INIT.
debug: bits set: 518/1024
debug: Wait SSH2_MSG_KEXDH_REPLY.
debug: Got SSH2_MSG_KEXDH_REPLY.
debug: Host 'xxxxxx.xxx.xxx.xxx' is known and matches the DSA host key.
debug: bits set: 503/1024
autodetect SSH_BUG_SIGBLOB
debug: len 40 datafellows -2
Received packet with bad string length 419867393
debug: Calling cleanup 0x805f3c0(0x0)
...and there it dies.
Any help or comments is greatly appreciated. Please let me know if there are
any questions about my system configuration or the server's.
-Jeff
2001 Sep 04
3
2.9p2 behaves different from 2.5.2p2 on tunneling issue
Hi,
I have a problem with a Linux box which I updated from 2.5.2p2
to 2.9p2 recently. It's running a tunnel started via inittab
using a script which starts
ssh -2 -N -o 'ConnectionAttempts 3600' -L <tunnel> $host
This has run reliable with 2.5.2 over the last months. Now, after
I have upgraded to 2.9p2, the tunnel is closed right after each
attempt of an application to use
2000 Dec 02
1
PATCH: Datafellows SSH misdetection in compat.c
...A Crown of Swords
-------------- next part --------------
--- compat.c.orig Sun Nov 5 07:42:36 2000
+++ compat.c Sat Dec 2 17:58:56 2000
@@ -64,12 +64,12 @@
} check[] = {
{ "^OpenSSH[-_]2\\.[012]", SSH_OLD_SESSIONID },
{ "MindTerm", 0 },
- { "^2\\.1\\.0 ", SSH_BUG_SIGBLOB|SSH_BUG_HMAC|
+ { "^2\\.1\\.0", SSH_BUG_SIGBLOB|SSH_BUG_HMAC|
SSH_OLD_SESSIONID },
{ "^2\\.0\\.", SSH_BUG_SIGBLOB|SSH_BUG_HMAC|
SSH_OLD_SESSIONID|
SSH_BUG_PUBKEYAUTH|SSH_BUG_X11FWD },
- { "^2\\.[23]\\.0 ", SSH_BUG_HMAC},
+ { "^2\\.[23]\\....
2017 Nov 14
2
OpenSSH 7.6p1 ssh-agent exiting if passed an invalid key blob
...(r = sshbuf_get_string(e->request, &data, &dlen)) != 0 ||
(r = sshbuf_get_u32(e->request, &flags)) != 0)
fatal("%s: buffer error: %s", __func__, ssh_err(r));
if (flags & SSH_AGENT_OLD_SIGNATURE)
compat = SSH_BUG_SIGBLOB;
if ((r = sshkey_from_blob(blob, blen, &key)) != 0) {
error("%s: cannot parse key blob: %s", __func__, ssh_err(r));
goto send;
}
However, in 7.6p1, this changed to:
if ((r = sshkey_froms(e->request, &key)) != 0 ||...
2000 Sep 18
1
ssh-agent and ssh2 servers...
I'm not on the mailing list, so I'd appreciate it if you could cc: me,
though I will keep an eye on the archives.
I am running openssh 2.2.0p1 on Debian GNU/Linux. I was pleased to
see that 2.2.0p1 had support for DSA keys in the agent, and I have
successfully used the v2 protocol to another openssh server with the
agent providing authentication.
I am also able to successfully connect
2000 Jun 21
1
SSH 2.2.0
Yo All!
I have been playing with SSH 2.2.0 from www.ssh.com. I can not
connect to openssh 2.2.1p1 using Ver 2 protocol from ssh Ver 2.2.0.
Ver 1 works fine.
See below for the debug output from both ends
If I force hmac-md5 (-m hmac-md5) from the sender it works!
The other 3 choices fail: hmac-sha1; hmac-md5-96; and none.
I have no problem connecting to this openssh host (hobbes) from
2009 Dec 18
0
[agc@NetBSD.org: CVS commit: src/crypto/external/bsd/openssh/dist]
...fellows = datafellows;
datafellows = 0;
blob = buffer_get_string(&e->request, &blen);
data = buffer_get_string(&e->request, &dlen);
flags = buffer_get_int(&e->request);
- odatafellows = datafellows;
if (flags & SSH_AGENT_OLD_SIGNATURE)
datafellows = SSH_BUG_SIGBLOB;
2017 Nov 15
2
OpenSSH 7.6p1 ssh-agent exiting if passed an invalid key blob
...s: buffer error: %s", __func__, ssh_err(r));
> + (r = sshbuf_get_u32(e->request, &flags)) != 0) {
> + error("%s: couldn't parse request: %s", __func__, ssh_err(r));
> + goto send;
> + }
> +
> if (flags & SSH_AGENT_OLD_SIGNATURE)
> compat = SSH_BUG_SIGBLOB;
> if ((id = lookup_identity(key)) == NULL) {
Thanks Damien, but I?m not sure this is a good fix. Now both cases turn into an error(), but if there is a problem reading the initial pair of strings and u32 value, you really can?t safely keep the connection open to receive additional requests....
2014 Apr 20
2
bad bignum encoding for curve25519-sha256@libssh.org
...SH_NEW_OPENSSH|SSH_BUG_DYNAMIC_RPORT},
+ { "OpenSSH_6.6.1*", SSH_NEW_OPENSSH},
+ { "OpenSSH_6.5*,"
+ "OpenSSH_6.6*", SSH_NEW_OPENSSH|SSH_BUG_CURVE25519PAD},
{ "OpenSSH*", SSH_NEW_OPENSSH },
{ "*MindTerm*", 0 },
{ "2.1.0*", SSH_BUG_SIGBLOB|SSH_BUG_HMAC|
@@ -251,7 +254,6 @@ compat_cipher_proposal(char *cipher_prop
return cipher_prop;
}
-
char *
compat_pkalg_proposal(char *pkalg_prop)
{
@@ -263,5 +265,18 @@ compat_pkalg_proposal(char *pkalg_prop)
if (*pkalg_prop == '\0')
fatal("No supported PK algorithms found...
2013 May 15
2
Support for "ssh-rsa-sha256" and "ssh-dss-sha256" ?
Functionality request for supporting Digital Signatures for RSA and DSS
Public Key Algorithms in alignment with NIST SP800-131A.
I
assume this has been asked before, but I could not find in the
archives. Support of "ssh-rsa-sha256" and "ssh-dss-sha256" public key
algorithms for OpenSSH? I know Suite B Algorithms and x509 SSH
Extension Algorithms are supported, but not a
2002 Mar 26
0
[Bug 187] New: ssh-keygen not converting from and to SECSH standard correctly
...ervice
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue: publickey,password
debug1: next auth method to try is publickey
debug1: try privkey: /home/user1/.ssh/identity
debug1: try privkey: /home/user1/.ssh/id_rsa
debug1: read PEM private key done: type RSA
ssh_rsa_sign: SSH_BUG_SIGBLOB not supported
resulting in a failure to use the private key and dropped into password
authentication
INSTANCE 3)
generated DSA public/private key pair using F-SECURE ssh-keygen v 2.0.12
converted the SECSH keys to OpenSSH format using OpenSSH ssh-keygen as follows
"ssh-keygen -i -f a_sec...