search for: ssh_fp_hex

Displaying 17 results from an estimated 17 matches for "ssh_fp_hex".

2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi, I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with FIPS 140-2 OpenSSL. These are based on previously reported patches by Steve Marquess <marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>, for ver. OpenSSH 3.8. Note that these patches are NOT OFFICIAL, and MAY be used freely by anyone. Issues [partially] handled: SSL FIPS Self test. RC4,
2012 Aug 29
1
second FIPS patch for openssh 6.0p1, fix pubkey
...sl/sha.h> + #ifdef OPENSSL_FIPS + #include <openssl/fips.h> + #endif + + /* import */ extern char *client_version_string; extern char *server_version_string; *************** *** 591,597 **** key->type, pktype); goto done; } ! fp = key_fingerprint(key, SSH_FP_MD5, SSH_FP_HEX); debug2("input_userauth_pk_ok: fp %s", fp); xfree(fp); --- 604,611 ---- key->type, pktype); goto done; } ! fp = key_fingerprint(key, FIPS_mode() ? SSH_FP_SHA1 : SSH_FP_MD5, ! SSH_FP_HEX); debug2("input_userauth_pk_ok: fp %s&...
2003 Feb 09
1
Logging of comments on keys
...- next part -------------- *** auth2-pubkey.c.orig Sun Feb 9 12:48:09 2003 --- auth2-pubkey.c Sun Feb 9 19:57:09 2003 *************** *** 183,188 **** --- 183,193 ---- debug("trying public key file %s", file); + /* log public key */ + + fp = key_fingerprint(key, SSH_FP_MD5, SSH_FP_HEX); + verbose("Attempt public key authentication for %s with %s key: %s", pw->pw_name, key_type(key), fp); + /* Fail quietly if file does not exist */ if (stat(file, &st) < 0) { /* Restore the privileged uid. */ *************** *** 244,249 **** --- 249,255 ---- fp...
2001 Dec 04
0
PATCH: log key fingerprint upon successful login
...ing. */ authenticated = 1; + if (options.log_fingerprint) { + Key *auth_key = key_new(KEY_RSA1); + auth_key->rsa->n = pk->n; + auth_key->rsa->e = pk->e; + log("Found matching %s key: %s", + key_type(auth_key), + key_fingerprint(auth_key, SSH_FP_MD5, SSH_FP_HEX)); + key_free(auth_key); + } break; } diff -ruN openssh-3.0.2p1.dist/auth2.c openssh-3.0.2p1/auth2.c --- openssh-3.0.2p1.dist/auth2.c Tue Nov 13 04:46:19 2001 +++ openssh-3.0.2p1/auth2.c Tue Dec 4 14:12:37 2001 @@ -690,8 +690,13 @@ found_key = 0; found = key_new(key->type); + if...
2010 Mar 03
2
Viewing cetificate details
Hi, I don't see any way to view the details of a certificate once it is generated. Having such a capability would be very handy for debugging purposes to check what constraints, principals, and validity interval are associated with a given cert. -- Iain Morgan
2005 Jul 26
1
Linux in-kernel keys support
...ef HAVE_LIBKEYUTIL + if (inkernel) { + u_char *blob; + u_int len; + + xfree(comment); + comment = xmalloc(strlen(filename) + strlen("ssh:") + 1); + sprintf(comment, "ssh:%s", filename); + + fprintf(stderr, "Adding key %s\n", key_fingerprint(private, SSH_FP_MD5, SSH_FP_HEX)); + if (!key_to_blob(private, &blob, &len)) + fatal("key_to_blob: %s\n", filename); + + if (add_key("user", comment, blob, len, KEY_SPEC_USER_SESSION_KEYRING) < 0) + fatal("Failed to add key: %s\n", filename); + + xfree(comment); + key_free(private...
2002 Jan 29
2
Key fingerprint logging
...f authentication was successful; * otherwise continue searching. */ authenticated = 1; + + if (options.log_key_fingerprint == 1) { + Key *k = key_new(KEY_RSA); + RSA *old_rsa = k->rsa; + k->rsa = pk; + snprintf(info,info_size," fp %s",key_fingerprint(k,SSH_FP_MD5,SSH_FP_HEX)); + k->rsa = old_rsa; + key_free(k); + } break; } /* Restore the privileged uid. */ restore_uid(); diff -u5 openssh-3.0.2p1.orig/auth.h openssh-3.0.2p1/auth.h --- openssh-3.0.2p1.orig/auth.h Wed Jul 4 06:46:57 2001 +++ openssh-3.0.2p1/auth.h Tue Jan 29 13:45:29 2002 @@ -91,11 +...
2010 Apr 29
12
[Bug 1765] New: Error message if key not first in authorized_keys file
https://bugzilla.mindrot.org/show_bug.cgi?id=1765 Summary: Error message if key not first in authorized_keys file Product: Portable OpenSSH Version: 5.5p1 Platform: Other OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: unassigned-bugs at mindrot.org
2003 May 12
0
Patch logging comment field of authorized key being used
...strlen(cp) && ( cp[strlen(cp)-1] == '\n' ) ) + cp[strlen(cp)-1] = '\0'; + log("Authorized key '%s' in %s", cp, file); debug("matching key found: file %s, line %lu", file, linenum); fp = key_fingerprint(found, SSH_FP_MD5, SSH_FP_HEX); verbose("Found matching %s key: %s", key_type(found), fp);
2013 Jun 09
1
pass fingerprint to authorizedkeyscommand
...nssh-6.2p1-modified/auth2-pubkey.c 2013-06-09 20:07:15.039975210 +0200 @@ -554,7 +554,8 @@ } execl(options.authorized_keys_command, - options.authorized_keys_command, user_pw->pw_name, NULL); + options.authorized_keys_command, user_pw->pw_name, + key_fingerprint(key, SSH_FP_MD5, SSH_FP_HEX), NULL); error("AuthorizedKeysCommand %s exec failed: %s", options.authorized_keys_command, strerror(errno)); Does this sound interesting? Thanks, Jason
2014 Mar 26
1
SSHFP issue
Have you seen this? https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742513 --mancha
2006 Feb 04
2
[PATCH] allow user to update changed key in known_hosts
...ow_other_keys(host, host_key)) - snprintf(msg1, sizeof(msg1), - "\nbut keys of different type are already" - " known for this host."); - else - snprintf(msg1, sizeof(msg1), "."); - /* The default */ - fp = key_fingerprint(host_key, SSH_FP_MD5, SSH_FP_HEX); - msg2[0] = '\0'; - if (options.verify_host_key_dns) { - if (matching_host_key_dns) - snprintf(msg2, sizeof(msg2), - "Matching host key fingerprint" - " found in DNS.\n"); - else - snprintf(msg2, sizeof(msg2), - "No matchi...
2009 Mar 24
3
A way to log what line of authorized_keys that was used
Hi! I'm pretty sure that this isn't currently supported, so, I'll give it a shot and rather be rtfm-flamed instead of not trying :) Is there any way of logging what line of authorized_keys (and what file) that was used when a user logs in? It would be very nice to have to improve auditing logins of accounts with multiple publickeys. And, if there isn't - Would it be of
2004 Oct 03
0
[patch] tell user about hosts with same key
...break; + strcat(msg_same_key, "\t"); + strcat(msg_same_key, x->host); + strcat(msg_same_key, "\n"); + } + free_hostlist(keyhosts); + } else { + msg_same_key[0] = '\0'; + } + /* The default */ fp = key_fingerprint(host_key, SSH_FP_MD5, SSH_FP_HEX); msg2[0] = '\0'; @@ -740,10 +763,11 @@ snprintf(msg, sizeof(msg), "The authenticity of host '%.200s (%s)' can't be " "established%s\n" + "%s" "%s key fingerprint is %s.\n%s" "Are you sure...
2006 Nov 15
11
OpenSSH Certkey (PKI)
...rmat. They consist of a single +string, containing values separated by semi-colons, in the following order + + fingerprint;caname;identity;options;validfrom;validto;algorithm;signature + +Values must not contain semi-colons or NUL bytes, but may be empty. + +'fingerprint' is the SSH_FP_MD5 SSH_FP_HEX fingerprint of the RSA key signing +the certificate (the CA key), e.g. the output of ssh-keygen -l for +/etc/ssh/ca.pub. + +'caname' is the name of the CA. This can be used to associate certificates with +CAs. The format is not defined, though using domain names is suggested. + +'identi...
2011 Sep 06
16
[Bug 983] Required authentication
https://bugzilla.mindrot.org/show_bug.cgi?id=983 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks| |1930 --- Comment #34 from Damien Miller <djm at mindrot.org> 2011-09-06 10:34:24 EST --- Retarget unresolved
2002 May 09
0
functions : server_input_channel_req userauth_pubkey
...comment = cp; + commentlen = strlen(comment); + if (commentlen > 0 && comment[commentlen -1] == '\n') + comment[commentlen - 1] = '\0'; + fp = key_fingerprint(found, SSH_FP_MD5, SSH_FP_HEX); verbose("Found matching %s key: %s", key_type(found), fp); @@ -721,6 +765,9 @@ break; } } + + strncpy(realname, comment, commentlen); + restore_uid(); fclose(f);...