Displaying 20 results from an estimated 8000 matches similar to: "Private key encryption by Passphrase"
2016 Jan 09
9
[Bug 2523] New: An RSA private key file consistently gives "Badd Passphrase" errors, but worked before
https://bugzilla.mindrot.org/show_bug.cgi?id=2523
Bug ID: 2523
Summary: An RSA private key file consistently gives "Badd
Passphrase" errors, but worked before
Product: Portable OpenSSH
Version: 7.1p1
Hardware: Other
OS: Linux
Status: NEW
Severity: normal
Priority:
2001 Jan 08
2
openSSH: configure ciphers.
I see that:
SSH uses the following ciphers for encryption:
Cipher SSH1 SSH2
DES yes no
3DES yes yes
IDEA yes no
Blowfish yes yes
Twofish no yes
Arcfour no yes
Cast128-cbc no yes
Two ques re: sshd:
1) Using openssh, how do I configure which
2001 Oct 17
2
OpenSSH_2.9.9p2 Configuration problem
I've recently upgraded some of my machines from an ssh1 environment to
an openssh one, and consequently, I'm now using the ssh2 protocol. I
can't seem to get it to allow remote logins without prompting for a
passphrase or password. Is this possible? I've created id_dsa and
id_rsa files etc., using ssh-keygen and have copied the public
information to the remote authorized_keys
2003 Nov 06
3
SSH1 vs. SSH2 - compression level
Hello,
I was searching for this information virtually everywhere, but as I
couldn't find it - I'm asking here.
I was wondering, why setting the Compression Level was removed in SSH2,
and if on, is always set to 6.
In SSH1 it was possible to set the Compression Level from 1 to 9.
I have made some tests with Compression Levels using scp: SSH1,
compression 9 (highest available for
2001 Jan 09
1
sshd: DES in SSH1 ?
I see that commercial SSH version it is possible to
run sshd in SSH1 using DES (i.e, accepting SSH-DES clients).
I understand from Damien Miller that
Cisco routers also run in only SSH1 DES mode.
Is it possible in openSSH to configure sshd (compile-time/runtime)
to run sshd in SSH1 or SSH2 mode and accept SSH1 or SSH2 DES clients ?
[I would like to be able to run sshd in SSH1/DES mode ]
Is
2002 Jun 13
2
please assist
Mr. Lindstrom,
I am trying to upgrade from ssh1 to ssh2. I am getting the following error when I start sshd:
Disabling protocol version 2. Could not load host key
SSHD does start, however, ssh1 is functional, but ssh2 is not.
Please advise,
William
770-671-1888, ext-240
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
2001 Feb 06
4
argv[0] => host feature considered harmful
OpenSSH still has this feature, SSH-1.2.27 no longer has it. Admittedly it
can be useful sometimes, even though I'd prefer this to be done using a
trivial shell wrapper, which would be the UNIX way of doing things.
Not being able to call OpenSSH's ssh by another name (say ``ssh1'') can get in
the way when having to maintain two versions of ssh in parallel because the
``ssh ->
2002 May 15
3
ssh3 with ssh1
On Solaris 8, I have ssh 3.1.0 and on other box Sol 7 I have 1.2.26 (min
version for comtable with ssh 3), I checked also /etc/ssh2/sshd2_config
file
## SSH1 compatibility
# Ssh1Compatibility <set by configure by default>
# Sshd1Path <set by configure by default
2) generate key for ssh3 # ssh-keygen2 -P /etc/ssh2/hostkey
2001 Feb 22
2
Strange behavior with 2.5.1 installed over 2.3.0
Hello.
I've recently installed OpenSSH 2.5.1p1 over a working installation of
2.3.0p1 (both SSH1 and SSH2) and oddly enough I lost SSH2 support. The
banner string states SSH-1.5-OpenSSH_2.5.1p1, which needless to say limits
me to SSH1... I haven't yet bothered to check any conf files, but since I
haven't really made any changes this behavior seems strange to me... Anyway,
hope I'm
2015 Mar 26
4
FYI: SSH1 now disabled at compile-time by default
On Thu, Mar 26, 2015 at 11:55:18 -0700, Dan Kaminsky wrote:
> You're right. My argument the is the next build of OpenSSH should be
> OpenSSH 7, and the one after that 8, then 9, then 10. No minor releases?
> Sure, go ahead. Deprecate the point,
>
> Do you manage any machines running SSHv1?
>
If by "running" you mean accepting SSH1, of course not. From a
2003 Sep 17
1
openssh 3.7p1 and 3.7.1p1 Solaris problems
I have some Solaris 7 boxes (Ultra 3 and Ultra Enterprise 250 hardware)
that I have compiled both 3.7p1 and 3.7.1p1 on and am having some
problems. I am using the same "configure" options that I have in the
past (without problems). I have tried both new and existing (previously
working) ssh_config and sshd_config files. The new versions seem to
have broken SSH 1 support (and
2001 Mar 16
1
suggestion for syslog messages
To allow easier targeting of users of old protocols I would find
it useful for the syslog "Accepted" messages to be more uniform.
1. Include the string "ssh1" for ssh1 connections as is done for ssh2
connections.
2. Change the "publickey" message for ssh2 connections to specify
which publickey, "dsa" or "rsa". This is already the case for
2006 Sep 14
6
sshd audit not happy with ssh1 and scp
I think I've found a bug with sshd handling audit events for commands (like
scp) over ssh1 connections. Specifically, after updating to a recent FreeBSD
6.x with audit support, I'm getting log messages like these when using scp
over ssh1:
Sep 12 14:13:16 <auth.info> bm55 sshd[12335]: Accepted rsa for xxx from
A.B.C.D port 2981
Sep 12 14:13:16 <auth.crit> bm55 sshd[12335]:
2003 May 28
2
SSH1 security with Kerb5
Hi,
I am trying to decide if it is worth the time to test the Kerberos support in a port I am working on of Openssh 3.5p1.
Does using Kerb5 with SSH1 solve the security problems inherent in protocol 1 and bring it up to par with the security level of SSH2 or are there other issues that Kerb5 authentication won't help for SSH1?
Thanks,
Greg Lambert
---------------------------------
Do
2000 Dec 28
2
ssh-agent, protocol 2, openssh-2.3.0p1
Hi --
I saw an email on December 26th in the openssh-unix-dev mailing list
archived on MARC, indicating that agent forwarding is indeed not working
for 2.2, but that it is working for 2.3. That email referred to a user
with 2.3 clients and 2.2 server. I am running the 2.3 client AND server
and am having a similar problem. The only unusual aspect of my installation
is that I'm using port 24
2002 Feb 13
1
Warning message at password prompt
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I've patched my local OpenSSH (currently 2.9p2, but the same
patch applies to 3.0.2) to allow the cipher 'none' for both SSH1 and
SSH2 connections. With SSH1, there is already code to print a warning
that any password you enter will be sent in plain text. However the
userauth_passwd() in sshconnect2.c does not have any such warning. I
2015 Mar 24
7
FYI: SSH1 now disabled at compile-time by default
Hi,
OpenSSH git master now disabled SSH protocol 1 at compile time by
default. If you want it back, then you'll need to pass --with-ssh1
to configure before you build.
We expect to ship this configuration for openssh-6.9 in a few
months.
-d
2000 Jun 08
2
openssh-2.1.0p3 & NetBSD 1.4.2
I have a need to set up an ssh login server that groks both ssh1 and
ssh2. I'm trying to build openssh-2.1.0p3 on NetBSD 1.4.2. Configure
fails when it tries to build the test program conftest. It's not
obvious fron config.log exactly what is going wrong.
Has anyone built that latest openssh under NetBSD 1.4.2?
Thanks in advance.
--
Rick Kelly rmk at rmkhome.com www.rmkhome.com
2003 Sep 03
3
[Bug 634] scp incompatibility with ssh.com scp
http://bugzilla.mindrot.org/show_bug.cgi?id=634
Summary: scp incompatibility with ssh.com scp
Product: Portable OpenSSH
Version: 3.6.1p2
Platform: All
OS/Version: All
Status: NEW
Severity: major
Priority: P2
Component: scp
AssignedTo: openssh-bugs at mindrot.org
ReportedBy: wgs3 at
2019 Dec 26
2
Settable minimum RSA key sizes on the client end for legacy devices.
On 12/26/19 6:35 AM, Stuart Henderson wrote:
> On 2019/12/25 21:02, Steve Sether wrote:
>> Basically I've had to turn on telnet access again, lowering security.
> Does it really lower security? The very old embedded OS is not going to
> be secure anyway, this type of device should only be used on a trusted
> private network. (New embedded OS are often not much better so