similar to: [Bug 34] Incorrect claim about Commercial SSH's key length

Displaying 20 results from an estimated 60000 matches similar to: "[Bug 34] Incorrect claim about Commercial SSH's key length"

2002 Apr 06
2
[Bug 34] Incorrect claim about Commercial SSH's key length
http://bugzilla.mindrot.org/show_bug.cgi?id=34 mouring at eviladmin.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|REOPENED |RESOLVED Resolution| |DUPLICATE ------- Additional Comments From mouring at eviladmin.org
2001 Feb 19
2
Dubious use of BN_num_bits in sshconnect1.c (resend)
------- Forwarded Message Subject: Re: Dubious use of BN_num_bits in sshconnect1.c From: Niels Provos <provos at citi.umich.edu> In-Reply-To: alex at foogod.com, Sun, 18 Feb 2001 19:38:56 PST To: alex at foogod.com Cc: openssh-unix-dev at mindrot.org Date: Mon, 19 Feb 2001 10:07:24 -0500 Sender: provos at citi.umich.edu Hi Alex, there is no problem in OpenSSH. In message
2002 Jun 21
6
OpenSSH 3.3 released
OpenSSH 3.3 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. We would like to thank the OpenSSH community for their continued support and encouragement. Changes since OpenSSH 3.2.3: ============================
2002 May 23
0
OpenSSH 3.2.3 released
OpenSSH 3.2.3 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. We would like to thank the OpenSSH community for their continued support and encouragement. Changes since OpenSSH 3.2.2: ============================
2001 Feb 08
2
Authentication By-Pass Vulnerability in OpenSSH 2.3.1 (devel snapshot) (fwd)
fyi for those running snapshots. the latest portable cvs has the fix and the version is 2.3.2p1. Kevin ---------- Forwarded message ---------- Date: Thu, 08 Feb 2001 18:15:00 -0500 From: Niels Provos <provos at citi.umich.edu> To: security-announce at openbsd.org Subject: Authentication By-Pass Vulnerability in OpenSSH 2.3.1 (devel snapshot)
2002 May 16
5
OpenSSH 3.2.2 released
OpenSSH 3.2.2 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. We would like to thank the OpenSSH community for their continued support and encouragement. Security Changes: ================= - fixed buffer overflow
2002 Jul 10
2
[protois@ensea.fr: NVIDIA and Privilege Separation]
Does someone understand this? I do not. Niels. ----- Forwarded message from laurent Protois <protois at ensea.fr> ----- Subject: NVIDIA and Privilege Separation From: laurent Protois <protois at ensea.fr> To: provos at citi.umich.edu X-Mailer: Ximian Evolution 1.0.7-1mdk Date: 10 Jul 2002 09:29:45 +0200 Hi Niels, i have a little problem with openssh 3.4 and Nvidia kernel driver:
2002 Jul 05
1
[jlevine@utcnist.colorado.edu: Privilege separation]
Is this a known problem? Niels. ----- Forwarded message from Judah Levine <jlevine at utcnist.colorado.edu> ----- Date: Fri, 5 Jul 2002 08:58:46 -0600 (MDT) From: Judah Levine <jlevine at utcnist.colorado.edu> To: provos at citi.umich.edu Subject: Privilege separation Hello, I have just installed openssh-3.4p1 on a COMPAQ/DEC/HP Alpha running True64 UNIX v4.0F. The privilege
2015 Mar 19
2
NFS4 ACLs with samba 3 (or 4)
> Date: Thu, 19 Mar 2015 11:59:47 +0100 > From: Volker.Lendecke at SerNet.DE > To: groucho.64738 at hotmail.com > CC: samba at lists.samba.org > Subject: Re: [Samba] NFS4 ACLs with samba 3 (or 4) > > On Wed, Mar 18, 2015 at 01:17:34PM -0400, Kevin Taylor wrote: > > I know this was discussed a lot a few years ago, but my google searches aren't quite getting me where
2001 Nov 06
13
OpenSSH 3.0
OpenSSH 3.0 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. This release contains many portability bug-fixes (listed in the ChangeLog) as well as several new features (listed below). We would like to thank the
2001 Jul 05
1
Patch to workaround host key size mismatch bug in old SSH sshd
Below is a patch against the current OpenBSD OpenSSH CVS to workaround a behavior I have observed when converting from SSH 1.2.27 to OpenSSH while using the same old RSA1 host key for protocol 1. In several cases I saw that old SSH sshd reported a host key size of 1024 bits when OpenSSH saw it as 1023 bits. Without the patch, when OpenSSH's ssh client connects to an old SSH sshd it warns
2019 Apr 11
4
Understanding Problem with rsa min key length 1024
Hello, Sometime ago min rsa key length was increased to 1024 bit and i have a little understanding problem with this. I hope somebody with some crypto-experience can enlighten me. To make that clear, that is not about allowing lower keys in general. Personally i would tend to use even longer keys(2048bit+). However Due nature of RSA-algorithm in case of 1024bit this might result in a key
2002 Jun 24
4
README.privsep
Hi, This is included in the release now; any feedback? Privilege separation, or privsep, is method in OpenSSH by which operations that require root privilege are performed by a separate privileged monitor process. Its purpose is to prevent privilege escalation by containing corruption to an unprivileged process. More information is available at:
2015 Mar 23
0
NFS4 ACLs with samba 3 (or 4)
On Thu, Mar 19, 2015 at 10:17:36AM -0400, Kevin Taylor wrote: > Name : nfs4-acl-tools Relocations: (not relocatable) > Version : 0.3.3 Vendor: CentOS > Release : 6.el6 Build Date: Fri 22 Jun 2012 02:10:47 AM EDT > Install Date: Mon 31 Mar 2014 10:41:48 AM EDT Build Host: c6b10.bsys.dev.centos.org >
2017 Aug 06
3
deprecation of UsePrivilegeSeparation breaks container use cases
Hello, there are emerging container services that restrict regular users to launch containers under some random uid for security reasons. If such user needs sshd in their container, they need to turn off `UsePrivilegeSeparation` so that sshd is executed as the current uid and not `root`. I understand that privilege separation [1] is more than changing the process uid. On the other hand, it is
2008 Jun 15
7
[Bug 1477] New: ssh-keygen not reading stdin as expected
https://bugzilla.mindrot.org/show_bug.cgi?id=1477 Summary: ssh-keygen not reading stdin as expected Classification: Unclassified Product: Portable OpenSSH Version: 4.7p1 Platform: ix86 OS/Version: OpenBSD Status: NEW Severity: normal Priority: P2 Component: ssh-keygen AssignedTo:
2014 Jul 28
0
[Bug 1477] ssh-keygen not reading stdin as expected
https://bugzilla.mindrot.org/show_bug.cgi?id=1477 Will <will at aether.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Severity|enhancement |normal CC| |will at aether.com Version|-current
2001 Feb 16
0
[beldridg@best.com: Re: [fw-wiz] SecureID vs Certificates]
Hmmm... You guys aware of this project to incorporate Smart Cards into ssh-agent? I remember hearing about some stuff for OpenSSL, but I don't recall hearing about this on the OpenSSH list or on the Muscle list. This would be a really nice thing... :-) Mike -- Michael H. Warfield | (770) 985-6132 | mhw at WittsEnd.com (The Mad Wizard) | (678) 463-0932 |
2015 Dec 04
2
Linux & NFSv4 ACLs
----- Original Message ----- > From: "Jeremy Allison" <jra at samba.org> > To: "Nick E Couchman" <nick.couchman at seakr.com> > Cc: samba at lists.samba.org > Sent: Thursday, December 3, 2015 6:13:51 PM > Subject: Re: [Samba] Linux & NFSv4 ACLs > On Thu, Dec 03, 2015 at 06:03:39PM -0700, Nick Couchman wrote: >> >> > On Dec 3,
2015 Dec 04
0
Linux & NFSv4 ACLs
On Fri, Dec 04, 2015 at 01:37:33PM -0700, Nick Couchman wrote: > ----- Original Message ----- > > From: "Jeremy Allison" <jra at samba.org> > > To: "Nick E Couchman" <nick.couchman at seakr.com> > > Cc: samba at lists.samba.org > > Sent: Friday, December 4, 2015 1:22:06 PM > > Subject: Re: [Samba] Linux & NFSv4 ACLs > >