Displaying 20 results from an estimated 6000 matches similar to: "New kex organisation and user options."
2016 Aug 24
3
kex protocol error: type 7 seq xxx error message
Hi,
mancha and me debugged a problem with OpenSSH 7.3p1 that was reported on
the #openssh freenode channel. Symptoms were that this message was
popping on the console during a busy X11 session:
kex protocol error: type 7 seq 1234
I managed to reproduce the problem, it is related to the SSH_EXT_INFO
packet that is send by the server every time it is sending an
SSH_NEWKEYS packet, hence after
2024 Feb 05
6
[Bug 3663] New: KEX host signature length wrong since strict kex introduced
https://bugzilla.mindrot.org/show_bug.cgi?id=3663
            Bug ID: 3663
           Summary: KEX host signature length wrong since strict kex
                    introduced
           Product: Portable OpenSSH
           Version: 9.6p1
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: major
          Priority: P5
         Component: sshd
         
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |
2015 May 16
2
"Invalid KEX record length" during SPTPS key regeneration and related issues
Hi,
I'm currently trying to troubleshoot what appears to be a very subtle
bug (most likely a race condition) in SPTPS that causes state to
become corrupted during SPTPS key regeneration.
The tinc version currently deployed to my production nodes is git
7ac5263, which is somewhat old (2014-09-06), but I think this is still
relevant because the affected code paths haven't really changed
2008 Jul 12
2
[Bug 1486] New: Improperly used buffer during KEX
https://bugzilla.mindrot.org/show_bug.cgi?id=1486
           Summary: Improperly used buffer during KEX
    Classification: Unclassified
           Product: Portable OpenSSH
           Version: 5.0p1
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Miscellaneous
        AssignedTo: unassigned-bugs at
2001 Jul 24
1
OpenSSH 2.9p2+Kerberos5 on RH7.1 fails
I've been installing OpenSSH 2.9p2 onto several RedHat Linux machines,
after compiling in the GSSAPI/Kerberos5 patch from here:
http://www.sxw.org.uk/computing/patches/openssh.html
I've been using ssh both to let users in via passwords and Kerberos
tickets, and both have been working fine...
except for one irritating machine, which (for no good reason I can see)
fails when using kerberos
2008 Jun 28
1
KEX graceful failure
Dear all,
I am currently implementing an experimental key exchange (KEX) algorithm. 
Unlike current algorithms like DH, mine needs to be able to fail gracefully, 
and in case of failure, continue with whatever algorithm would have been 
negotiated if mine was not selected.
My strategy for graceful failure is to remove my KEX algorithm from 
myproposal[KEX_DEFAULT_KEX] and to initiate a new key
2001 Mar 23
1
SSH Conections being dropped.
We are having problems with SSH shells disconnecting.
We are replacing a older version of SSH (Non-Comercial Version which some
one installed in error, but it was working fine.) & Had been running
OpenSSH 2.3.0p? which had similar problems, some of the errors I was
seeing went away with OpenSSH 2.5.2.p1.
compiled against openssl-0.9.6, with SUNWspro & GCC281 on Solaris 2.8 &
Solaris
2014 Jan 24
3
[Bug 2198] New: GSSAPIKeyExchange gssapi-keyex bug in kex.c choose_kex()
https://bugzilla.mindrot.org/show_bug.cgi?id=2198
            Bug ID: 2198
           Summary: GSSAPIKeyExchange gssapi-keyex bug in kex.c
                    choose_kex()
           Product: Portable OpenSSH
           Version: 6.4p1
          Hardware: All
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P5
         Component: Kerberos support
   
2003 Jun 27
3
Kerberos Support in OpenSSH
Dear Sir and Madam:
I'm writing to you on behalf of the MIT Kerberos team and several 
other parties interested in the availability of Kerberos 
authentication for the SSH protocol.
We recently noticed that the OpenSSH developers had added support for 
the kerberos-2 at ssh.com user authentication mechanism.  We are 
delighted but we believe additional steps are necessary, as explained 
2018 Nov 13
12
[Bug 2929] New: OpenSSH server should not send the SSH_MSG_EXT_INFO message after rekeying
https://bugzilla.mindrot.org/show_bug.cgi?id=2929
            Bug ID: 2929
           Summary: OpenSSH server should not send the SSH_MSG_EXT_INFO
                    message after rekeying
           Product: Portable OpenSSH
           Version: 7.7p1
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: enhancement
          Priority: P5
        
2016 Jan 05
14
[Bug 2521] New: subtract buffer size from computed rekey limit to avoid exceeding it
https://bugzilla.mindrot.org/show_bug.cgi?id=2521
            Bug ID: 2521
           Summary: subtract buffer size from computed rekey limit to
                    avoid exceeding it
           Product: Portable OpenSSH
           Version: 6.8p1
          Hardware: amd64
                OS: Linux
            Status: NEW
          Severity: minor
          Priority: P5
         Component: sshd
  
2003 Feb 06
2
kex guess methods incorrect?
Hey guys,
My second post in the last few days (boy I'm active! ;)). We've had a 
few issues with SSH Secure Shell version 3.2.0 (build 267) and sftp and 
while trying to figure it out I noticed something in the debug output 
that I think should be brought to OpenSSH's attention.
Ssh2Transport/trcommon.c:1518: All versions of OpenSSH handle kex 
guesses incorrectly.
Does anyone know
2023 Dec 20
1
Discussion: new terrapin resisting ciphers and macs (alternative to strict-kex) and -ctr mode question.
Hi there,
> So there could be a Chacha20-Poly1305v2 at openssh.com which uses AD data to chain the
> messages together, so it will be resistant against terrapin even without the strict-kex.
>
> Consequently the hmac-etmv2 at openssh.com mode could be deviced in a similar manner, to
> also include the transcript hash or similar things.
This would still require both, client and
2001 Sep 27
3
Kerberos in OpenSsh 2.9.9p2
I note with interest that Kerberos support is now available (for the version 
1 protocol, at least) in OpenSSH 2.9.9p2. However, it does not build with MIT 
Kerberos, due to the usual Heimdal/MIT library differences. These look, by 
and large, like the same problems I encountered when porting Dan Kouril's 
patch to MIT Kerberos - so I'm having a go at fixing them (my GSSAPI patches 
need
2023 Dec 20
1
Discussion: new terrapin resisting ciphers and macs (alternative to strict-kex) and -ctr mode question.
Hello,
in addition to my last thread about a new config option to make strict-kex mandatory,
I also wonder if a new mechanism for ciphers/macs can be introduced and is reliable
by simple both sides using it.
So there could be a Chacha20-Poly1305v2 at openssh.com which uses AD data to chain the
messages together, so it will be resistant against terrapin even without the strict-kex.
Consequently
2016 Jan 26
2
Questions about inferred state machines for OpenSSH
Dear all,
For my thesis, I've been working on automatic inference of state
machines for SSH servers. I ran into a couple of particularities
regarding OpenSSH's inferred state machine, and was hoping some of you
might be interested. Maybe you can even shed some light on it.
Setup: I'm using LearnLib's (Java) version of the L* learning
algorithm [1] to come up with sequences of
2001 May 18
0
OpenSSH GSSAPI patches
An updated version of my GSSAPI patches for OpenSSH 2.9p1 is finally 
available from
http://www.sxw.org.uk/computing/patches/openssh.html
These patches fix a bug with the hash calculation which will break 
interoperation with earlier versions - sorry!
This release supports both Kerberos and GSI (thanks to Von Welch for the GSI 
support) mechanisms, and the code in it has now been widely tested
2001 Nov 13
1
Kerberos / PAM bug in OpenSSH CVS
In do_authloop() in auth1.c(), the Kerberos 4 and 5 code both allocate, then 
xfree() the client_user string. The call to do_pam_account() later in the 
function then tries to use this string, resulting in a corrupt remote user.
Finally, before exiting, the function frees client_user again, resulting in a 
double free and much mess.
Patch attached.
Cheers,
Simon.
-- 
Simon Wilkinson           
2007 Sep 17
18
[Bug 1363] New: sshd gets stuck: select() in packet_read_seqnr waits indefinitely
http://bugzilla.mindrot.org/show_bug.cgi?id=1363
           Summary: sshd gets stuck: select() in packet_read_seqnr waits
                    indefinitely
           Product: Portable OpenSSH
           Version: 4.2p1
          Platform: All
               URL: http://marc.info/?t=117394251600035
        OS/Version: All
            Status: NEW
          Keywords: patch
          Severity: major