Displaying 3 results from an estimated 3 matches for "v_7_8_p1".
Did you mean:
v_7_1_p1
2018 Oct 11
2
no mutual signature algorithm with RSA user certs client 7.8, server 7.4
...ng the way I noticed that there seems to be duplicated entries in
the keytypes[] array - is this intentional? ie the following 2
contiguous sections appear to be identical. I ended up changing both
on my client to remove the "ssh-" prefix:
https://github.com/openssh/openssh-portable/blob/V_7_8_P1/sshkey.c#L116-L123
https://github.com/openssh/openssh-portable/blob/V_7_8_P1/sshkey.c#L124-L131
2018 Oct 10
2
no mutual signature algorithm with RSA user certs client 7.8, server 7.4
Hi,
One of our users who is running an OS (I think it's the latest beta
macOS 10.14.1) with ssh version "OpenSSH_7.8p1, LibreSSL 2.7.3" is
unable to use our user SSH RSA certificates to authenticate to our
servers (which are running "OpenSSH_7.4p1, OpenSSL 1.0.2k-fips 26 Jan
2017").
We see this error on the client side:
debug1: kex_input_ext_info:
2019 Feb 14
2
Can we disable diffie-hellman-group-exchange-sha1 by default?
...sed to:
https://github.com/openssh/openssh-portable/commit/1b9dd4aa
https://bugzilla.mindrot.org/show_bug.cgi?id=2967
Its clear the removal was unintentional because myproposal.h still
lists diffie-hellman-group-exchange-sha1 under KEX_CLIENT_KEX:
https://github.com/openssh/openssh-portable/blob/V_7_8_P1/myproposal.h#L102
I was just thinking that if this hasn't been causing a problem for the
last 2 releases then maybe its time to disable this by default in the
client. This algorithm has been disabled by default in the server since
the 6.7 release in October 2014.
--
Jon
Doge Wrangler
X(7):...