search for: v_7_8_p1

Displaying 3 results from an estimated 3 matches for "v_7_8_p1".

Did you mean: v_7_1_p1
2018 Oct 11
2
no mutual signature algorithm with RSA user certs client 7.8, server 7.4
...ng the way I noticed that there seems to be duplicated entries in the keytypes[] array - is this intentional? ie the following 2 contiguous sections appear to be identical. I ended up changing both on my client to remove the "ssh-" prefix: https://github.com/openssh/openssh-portable/blob/V_7_8_P1/sshkey.c#L116-L123 https://github.com/openssh/openssh-portable/blob/V_7_8_P1/sshkey.c#L124-L131
2018 Oct 10
2
no mutual signature algorithm with RSA user certs client 7.8, server 7.4
Hi, One of our users who is running an OS (I think it's the latest beta macOS 10.14.1) with ssh version "OpenSSH_7.8p1, LibreSSL 2.7.3" is unable to use our user SSH RSA certificates to authenticate to our servers (which are running "OpenSSH_7.4p1, OpenSSL 1.0.2k-fips 26 Jan 2017"). We see this error on the client side: debug1: kex_input_ext_info:
2019 Feb 14
2
Can we disable diffie-hellman-group-exchange-sha1 by default?
...sed to: https://github.com/openssh/openssh-portable/commit/1b9dd4aa https://bugzilla.mindrot.org/show_bug.cgi?id=2967 Its clear the removal was unintentional because myproposal.h still lists diffie-hellman-group-exchange-sha1 under KEX_CLIENT_KEX: https://github.com/openssh/openssh-portable/blob/V_7_8_P1/myproposal.h#L102 I was just thinking that if this hasn't been causing a problem for the last 2 releases then maybe its time to disable this by default in the client. This algorithm has been disabled by default in the server since the 6.7 release in October 2014. -- Jon Doge Wrangler X(7):...