Displaying 20 results from an estimated 1000 matches similar to: "bug in sshd.d (destroy_sensitive_data core dumps)"
2013 Jun 25
1
RFC: encrypted hostkeys patch
Hi,
About a year and a half ago I brought up the topic of encrypted hostkeys
and posted a patch
(http://marc.info/?l=openssh-unix-dev&m=132774431906364&w=2), and while the
general reaction seemed receptive to the idea, a few problems were pointed
out with the implementation (UI issues, ssh-keysign breakage).
I've finally had some spare time in which to get back to this, and I've
2024 Oct 25
1
[PATCH] Memory leak fixed - when lauched as non-root user When we lauch sshd as non-root user, its still able to load public keys but fails to load private keys. So before exiting free the memory allocated for the public key
---
sshd.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/sshd.c b/sshd.c
index dda8d9b77..cbdced5db 100644
--- a/sshd.c
+++ b/sshd.c
@@ -1533,6 +1533,8 @@ main(int ac, char **av)
} else {
do_log2(ll, "Unable to load host key: %s",
options.host_key_files[i]);
+ sshkey_free(pubkey);
+ pubkey = NULL;
sensitive_data.host_keys[i] = NULL;
2012 Nov 21
1
HostKey in hardware?
Hi,
Is there any way to store HostKey in hardware (and delegate the related
processing)?
I have been using Roumen Petrov's x509 patch for clients, which works via an
OpenSSL engine, but it does not seem to support server HostKey:
http://roumenpetrov.info/pipermail/ssh_x509_roumenpetrov.info/2012q4/000019.html
For PKCS#11, I have found an email on this list from a year back suggesting
this
2012 Jan 28
1
PATCH: Support for encrypted host keys
Hello all,
I recently found myself wanting to run sshd with passphrase-protected host keys rather than the usual unencrypted format, and was somewhat surprised to discover that sshd did not support this. I'm not sure if there's any particular reason for that, but I've developed the below patch (relative to current CVS at time of writing) that implements this. It prompts for the
2000 May 15
1
[PATCH] using openssl with no-rsa?
Hello,
Due to patent concerns, I compiled a version of openssl with the no-rsa,
no-idea, no-rc5 options. I was able to then take this compile of openssl, with
the standard openssh-2.1.0 rpms and run it on another machine. Most things
seemed to work fine, except I was unable to ssh into the machine. After
applying the following patch to the sshd code, a quick test with an ssh session
worked:
2013 Oct 31
9
[Bug 2167] New: Connection remains when fork() fails.
https://bugzilla.mindrot.org/show_bug.cgi?id=2167
Bug ID: 2167
Summary: Connection remains when fork() fails.
Product: Portable OpenSSH
Version: 5.3p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2001 Jul 05
1
Patch to workaround host key size mismatch bug in old SSH sshd
Below is a patch against the current OpenBSD OpenSSH CVS to workaround a
behavior I have observed when converting from SSH 1.2.27 to OpenSSH while
using the same old RSA1 host key for protocol 1. In several cases I saw
that old SSH sshd reported a host key size of 1024 bits when OpenSSH saw it
as 1023 bits. Without the patch, when OpenSSH's ssh client connects to an
old SSH sshd it warns
2015 Apr 22
3
shared private key
On Wed, Apr 22, 2015 at 1:53 PM, Gert Doering <gert at greenie.muc.de> wrote:
> Hi,
>
> On Wed, Apr 22, 2015 at 01:26:06PM -0700, Reuben Hawkins wrote:
>> Let me know if I'm missing something. :)
>
> Signed keys from a common CA?
I don't think the signed key helps in my particular case (I may be
wrong, if so please correct me).
I'm working on a management
2016 Mar 08
2
Need Help to Fix CVE-2008-1483, CVE-2008-5161, CVE-2015-5600 and CVE-2015-6565
Hi Gert,
Thanks for your reply.
But we can't upgrade to 7.2 version also we don't have plan to upgrade in
near future. Can I fix these vulnerabilities in the current version?
Regards
Abhishek
On Tue, Mar 8, 2016 at 6:42 PM, Gert Doering <gert at greenie.muc.de> wrote:
> Hi,
>
> On Tue, Mar 08, 2016 at 06:14:01PM +0530, abhi dhiman wrote:
> > Actually I am working
2001 Feb 16
1
CVS and AIX
Hi,
trying "current CVS" on AIX 4.3.3, yields:
gcc -O2 -Wall -I/usr/local/include -I/gnulocal/include -I/gnu/include -I. -I./openbsd-compat -I. -DETCDIR=\"/etc\" -D_PATH_SSH_PROGRAM=\"/gnu/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/gnu/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/gnu/libexec/sftp-server\" -DHAVE_CONFIG_H -c auth.c
auth.c: In
2002 Apr 02
3
PrivSep and portability
Hi,
I've seen a few patches related to the PrivSep works. As far as I can
see, it seems to work by using a shared memory segment to communicate.
I just want to point out that there are some unix systems that do not
have mmap() (SCO, older SVR3 systems) or that might have problems with
anonymous shared mmap() (don't have an examples, but e.g. the INN docs
are full of warnings concerning
2000 Oct 30
2
Feature disappeared?
Hi,
working on tightening our network (somewhat) today, I found that OpenSSH
doesn't seem to have the "AllowSHosts" directive (in sshd_config) that
Commercial SSH (at least 1.2.25 & up) has.
Now I wonder whether that hasn't been implemented yet, or has been dropped
for a certain reason.
I find this very useful for what I want to achieve - inside the company
network,
2001 Nov 12
1
Interesting problem with 3.0p1 and IPv6
Hi,
I just ran into an interesting problem with 3.0p1 on FreeBSD 4.0 and
IPv6/v4 mapped addresses.
If I do "ssh -v machine", where "machine" has an IPv4 address in the
DNS, everything works fine (machine is "hilbert.space.net"):
debug1: Connecting to hilbert [194.59.182.6] port 22.
...
Warning: This may be due to an old implementation of ssh.
debug1: Received
2002 Jul 25
0
openssh-unix-dev digest, Vol 1 #505 - 15 msgs
subscribe openssh-unix-dev at mindrot.org
> Send openssh-unix-dev mailing list submissions to
> openssh-unix-dev at mindrot.org
>
> To subscribe or unsubscribe via the World Wide Web, visit
> http://www.mindrot.org/mailman/listinfo/openssh-unix-dev
> or, via email, send a message with subject or body 'help' to
> openssh-unix-dev-request at mindrot.org
>
2013 Aug 14
1
ssh.c - allocated wrong size for sensitive_data.keys?
Hello,
There's a memory allocation for sensitive_data.keys in ssh.c:848 which uses size of Key instead of Key*.
This is probably harmless but seems to be wrong.
--- a/ssh.c
+++ b/ssh.c
@@ -846,7 +846,7 @@ main(int ac, char **av)
options.hostbased_authentication) {
sensitive_data.nkeys = 7;
sensitive_data.keys = xcalloc(sensitive_data.nkeys,
-
2002 Mar 12
1
Disconnecting: Corrupted check bytes on input.
Hi,
just "cvs update"'d to get the latest portable version, to start
rebuilding our AIX systems to get zlib-1.1.4 and the channel-bug fix.
SSH protocol 2 seems to work nicely, ssh protocol 1 doesn't work properly.
Environment: AIX 4.3.3, openssl 0.9.6c, openssh as of today (Mar 12, 11:20
GMT).
Client/blowfish, to openssh 3.0p1 or to 2.5.1p1:
debug1: Encryption type: blowfish
2000 Dec 22
1
Makefile dependencies
Hi,
the openssh_cvs Makefile includes the following rules:
$(LIBSSH_OBJS): config.h
$(LIBOPENBSD_COMPAT_OBJS): config.h
but no equivalent for $(LIBSSHD_OBJS) - is this desired or an oversigt?
In my case, I built the sshd, tested it, reconfigured with SKEY support,
rebuilt (just running "make", no "make clean"), and tracked down the
non-working s/key for a while before I
2001 Feb 20
2
openssh wish list for 2.6.*
Hi,
something that I'd like to see for the next major release is "build
OpenSSH without installing zlib and openssl".
That is, I have a source tree with the following subdirectories:
.../src/zlib-1.1.3/
/openssl-0.9.6/
/openssh_cvs/
and want "configure", run from openssh_cvs, to be able to find the zlib
and openssl trees in the directory
2001 Nov 09
1
socklen_t - where?
Hi,
openssh_cvs as of today, SCO Open Server 3.0, socklen_t
this typedef doesn't exist on SCO OSR 3, and "configure" properly detects
this, leading to
/* #undef HAVE_SOCKLEN_T */
in config.h.
Problem: I can't find any place where this is actually being used? I'd
expect something like
#ifndef HAVE_SOCKLEN_T
typdef int socklen_t;
#endif
("int" is what the
2001 Nov 15
1
RhostsAuthentication?
Hi,
is anybody out there still using RhostsAuthentication? Can we please
remove it?
I just stumbled over a few sshd_config's set up by colleagues who didn't
bother to understand what they are doing, and since .shosts didn't work
anymore after upgrading to OpenSSH 3, they just enabled RhostsAuth and
voila, back to "working"...
Yes, there is a big warning in the