Displaying 20 results from an estimated 800 matches similar to: "[Bug 1197] Enhancement request to enable fips compatibility mode in OpenSSH"
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi,
I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with
FIPS 140-2 OpenSSL.
These are based on previously reported patches by Steve Marquess
<marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>,
for ver. OpenSSH 3.8.
Note that these patches are NOT OFFICIAL, and MAY be used freely by
anyone.
Issues [partially] handled:
SSL FIPS Self test.
RC4,
2010 Jul 23
0
[Bug 1197] Enhancement request to enable fips compatibility mode in OpenSSH
https://bugzilla.mindrot.org/show_bug.cgi?id=1197
kpimm at yahoo.com changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |kpimm at yahoo.com
--- Comment #7 from kpimm at yahoo.com ---
I'm having likely the same problem as halsteaw. Can someone please
2004 Jun 04
2
Patch for FIPS 140 mode - take 3
Greetings.
(Third try at sending this, the first two seemed to disappear without a
trace.
Perhaps use of MS Outlook was the problem, even though in plain text...? Or
attachment too big (22Kb)? Would like to know...)
The final source code and documentation package for a FIPS 140 validated
mode
of OpenSSL was recently submitted. Once the final certification is
awarded by
NIST, in a month or
2015 Dec 07
2
OpenSSH FIPS 140-2 support using OpenSSL FIPS modules?
Thanks Roumen.
>Lets assume that application use OpenSSL FIPS validated module. FIPS mode
is activated in openssl command if environment variable OPENSSL_FIPS is
set. Similarly I use OPENSSL_FIPS environment variable to activate FIPS
mode. Code will call FIPS_mode_set(1) if crypto module is not FIPS mode.
Did you mean the FIPS patched OpenSSH server and client (such as
ssh-keygen) always
2015 Dec 07
2
OpenSSH FIPS 140-2 support using OpenSSL FIPS modules?
Thanks Roumen.
I have few more questions below:
1. What version of OpenSSH can the patch be applied to? What branch should
I check out the patch?
2.
>Impact is not only for source code. Build process has to be updated as
well. Red Hat is based on "fipscheck".
What build process should be changed? What is fipscheck?
3. My understanding any application (such as OpenSSH) which need
2023 Aug 05
11
[Bug 3599] New: How to scan for keys when sshd server has fips enabled?
https://bugzilla.mindrot.org/show_bug.cgi?id=3599
Bug ID: 3599
Summary: How to scan for keys when sshd server has fips
enabled?
Product: Portable OpenSSH
Version: 9.3p2
Hardware: All
OS: Linux
Status: NEW
Severity: critical
Priority: P5
Component: ssh-keyscan
2006 Jun 16
0
[Bug 1197] Enhancement request to enable fips compatibility mode in OpenSSH
http://bugzilla.mindrot.org/show_bug.cgi?id=1197
Summary: Enhancement request to enable fips compatibility mode in
OpenSSH
Product: Portable OpenSSH
Version: 4.3p2
Platform: All
URL: http://csrc.nist.gov/cryptval/140-1/140sp/140sp642.pdf
http://www.openssl.org/docs/fips/UserGuide-1.0.pdf
2015 May 26
0
[Bug 1197] Enhancement request to enable fips compatibility mode in OpenSSH
https://bugzilla.mindrot.org/show_bug.cgi?id=1197
Darren Tucker <dtucker at zip.com.au> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |dtucker at zip.com.au
--- Comment #8 from Darren Tucker <dtucker at zip.com.au> ---
You're pretty much
2008 Jun 19
0
Is there any plan for OpenSSH to support FIPS?
Hi OpenSSh Developer,
Currently, I can make openssh-5.0p1 working in FIPS mode. The detail steps I did are as follows.
1) Build FIPS OpenSSL according to FIPS User Guide(http://www.openssl.org/docs/fips/) on HP-UX PA 11.23 box.
FIPS object module is generated by compiling openssl-fips-1.1.2.
FIPS OpenSSL is built by openssl-0.9.7m, which is passed fips option for Configure step.
2) Modify
2010 Mar 15
1
5.4p1 and FIPS 140-2
My office is working with government contracts, and it appears that they
are wanting FIPS enabled OpenSSL and OpenSSH is coming in the next year.
We have been able to compile OpenSSL to create the container, but all
the diffs to enable FIPS 140-2 in OpenSSH are for 5.3p1. Will the diffs
from:
https://bugzilla.mindrot.org/attachment.cgi?id=1789&action=edit
build in 5.4p1 will a little
2017 Oct 23
7
[Bug 1197] New: 255.255.255.255 is transformed into 255.255.255.255-255.255.255.255
https://bugzilla.netfilter.org/show_bug.cgi?id=1197
Bug ID: 1197
Summary: 255.255.255.255 is transformed into
255.255.255.255-255.255.255.255
Product: nftables
Version: unspecified
Hardware: x86_64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
2015 Jul 02
1
CESA-2015:1197 Moderate CentOS 5 openssl Security Update
CentOS Errata and Security Advisory 2015:1197 Moderate
Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1197.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
8b8c609255b3fc78e8a8227dfcf456fc6fad6ee44402b00741d66eb7a7c91b02 openssl-0.9.8e-36.el5_11.i386.rpm
2015 Jul 02
1
CESA-2015:1197 Moderate CentOS 5 openssl Security Update
CentOS Errata and Security Advisory 2015:1197 Moderate
Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1197.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
8b8c609255b3fc78e8a8227dfcf456fc6fad6ee44402b00741d66eb7a7c91b02 openssl-0.9.8e-36.el5_11.i386.rpm
2002 Nov 18
1
Prediction from arima() object (library ts) (PR#2305)
Full_Name: Allan McRae
Version: 1.6.0
OS: Win 2000 P
Submission from: (NULL) (129.215.190.229)
When using predict.Arima in library ts(), it appears differencing is only
accounted for in the first step of prediction and so any trend is not apparent
in the predictions. The example shows the difference between the predictions of
an arima(1,1,1) model and the backtransformed predictions of an
2012 Aug 29
1
second FIPS patch for openssh 6.0p1, fix pubkey
The patch to enable FIPS mode for openssh 6.0p1 missed two instances of
the ssh client trying to use MD5. It causes pubkey-based authentication
to fail in FIPS mode.
I have copied the missing changes from auth2-pubkey.c into sshconnect2.c.
Here is a patch:
diff -cr openssh-6.0p1/sshconnect2.c openssh-6.0p1-patched/sshconnect2.c
*** openssh-6.0p1/sshconnect2.c Sun May 29 07:42:34 2011
---
2010 Jun 21
1
FIPS patch for OpenSSH on RHEL 4?
Hi All,
Our requirement is to have OpenSSH with FIPS 140-2 support deployed on
RHEL 4.8 (going to RHEL 5 is not an option as of now). From the mailing
list I have found that FIPS patches are available for openssh 3.8p1, but
that is older than the openssh version (3.9 p1) that is bundled with
RHEL 4.8. FIPS support seems to be available on 5.3p1, however I am not
sure whether that can be built
2008 Nov 26
0
[RFE] Request support for FIPS mode support
Greetings,
As those working in the government sector (US and Canada) already know,
compliance with FIPS 140-2 is a significant issue. While there are a few
patches out there that add support for FIPS mode to OpenSSH, it is not
currently in the mainstream.
With the recent validation of the 1.2 version of the OpenSSL FIPS
cryptographic object module, is there any chance that support could be
added
2010 Jan 21
7
[Bug 1701] New: FIPS-140-2 requires call to RAND_cleanup() before the program using RAND exits
https://bugzilla.mindrot.org/show_bug.cgi?id=1701
Summary: FIPS-140-2 requires call to RAND_cleanup() before the
program using RAND exits
Product: Portable OpenSSH
Version: 5.3p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Miscellaneous
2013 Apr 07
2
group data in classes
Hello all!
I have a problem to group my data (years) in 10 years classes. For example
for year
year decade
1598 1590-1600
1599 1590-1600
1600 1590-1600
1601 1600-1610
---
my is like this>
[1] 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611
1612
[16] 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626
1627
[31] 1628 1629 1630 1631 1632 1633
2015 Jul 02
0
[CentOS-announce] CESA-2015:1197 Moderate CentOS 5 openssl Security Update
FYI I believe applying this openssl update may result in breaking SSL
MySQL connections similar to RHEL/CentOS 6 -
https://bugzilla.redhat.com/show_bug.cgi?id=1228755
I opened a bug report for RHEL5/CentOS 5 weeks ago -
https://bugzilla.redhat.com/show_bug.cgi?id=1231960. However, it hasn't
gained any attention.
--Blake
Johnny Hughes wrote on 7/2/2015 7:10 AM:
> CentOS Errata and