Displaying 20 results from an estimated 40000 matches similar to: "[Bug 138] Incorrect OpenSSL version requirment?"
2002 May 12
3
[Bug 138] Incorrect OpenSSL version requirment?
http://bugzilla.mindrot.org/show_bug.cgi?id=138
patl at cag.lcs.mit.edu changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |REOPENED
Resolution|FIXED |
------- Additional Comments From patl at cag.lcs.mit.edu 2002-05-13 00:55
2002 Apr 10
0
[Bug 138] Incorrect OpenSSL version requirment?
http://bugzilla.mindrot.org/show_bug.cgi?id=138
------- Additional Comments From eds at reric.net 2002-04-11 08:13 -------
As far as I can tell, blowfish is indeed broken in ssh1.
[eds at ike eds]$ ssh -v -1 postal
OpenSSH_3.1p1, SSH protocols 1.5/2.0, OpenSSL 0x0090581f
... snip some output ...
debug1: Remote protocol version 1.99, remote software version OpenSSH_3.1p1
debug1: match:
2002 Mar 07
20
[Bug 138] Incorrect OpenSSL version requirment?
http://bugzilla.mindrot.org/show_bug.cgi?id=138
mouring at eviladmin.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |vjo at dulug.duke.edu
------- Additional Comments From mouring at eviladmin.org 2002-03-08 04:49 -------
*** Bug 139 has been
2002 Sep 10
0
[Bug 138] Incorrect OpenSSL version requirment?
http://bugzilla.mindrot.org/show_bug.cgi?id=138
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|REOPENED |RESOLVED
Resolution| |FIXED
------- Additional Comments From djm at mindrot.org 2002-09-10 22:27
2006 Sep 28
0
Corrupted check bytes on input with SSH1 - OpenSSH-4.3 and OpenSSL-0.9.6b
I am getting the error "Corrupted check bytes on input" from the SSH
server when I try to connect using SSH1 protocol. The same OpenSSL-4.3
and OpenSSL-0.9.6b work just fine when I try to connect using SSH2. Has
any one heard of any incompatibility issue with ciphers of the OpenSSL
version mentioned in the subject?
I have found that there was an issue like this (URL below) at one time
2000 Sep 14
2
openssh 2.2.0p1 fails with openssl 0.9.6-beta1
On Wed, Sep 13, 2000 at 09:13:26AM +0000, Graham Murray wrote:
> On upgrading to openssl 0.9.6-beta1, I find that openssh 2.2.0p1 fails
> to connect.
I did some more experiments and also saw the problems.
They occur when using a 0.9.6-beta client to connect to 0.9.5a and 0.9.6-beta
servers.
They also occur when using a 0.9.5a client connecting to a 0.9.6-beta
server.
Connections fail with
2002 Jun 25
0
[Bug 297] New: sshd version 3.3 incompatible with pre-3.3 clients in ssh1 mode
http://bugzilla.mindrot.org/show_bug.cgi?id=297
Summary: sshd version 3.3 incompatible with pre-3.3 clients in
ssh1 mode
Product: Portable OpenSSH
Version: -current
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo:
2010 Aug 05
1
[LLVMdev] possible miscompilation of openssl on x86-64
Hi folks,
I'm playing with this version of OpenSSL:
openssl-SNAP-20100804
On x86 using clang I can build it and run all tests successfully. On
x86-64 using clang r110287 I get the error message below during "make test".
Not sure if anyone has time to look into this but I'm probably not the
right person to start debugging it...
Thanks,
John Regehr
2001 Jan 08
2
openSSH: configure ciphers.
I see that:
SSH uses the following ciphers for encryption:
Cipher SSH1 SSH2
DES yes no
3DES yes yes
IDEA yes no
Blowfish yes yes
Twofish no yes
Arcfour no yes
Cast128-cbc no yes
Two ques re: sshd:
1) Using openssh, how do I configure which
2001 Feb 21
1
OpenSSL + OpenSSH version problems
Hello all,
OpenSSL 0.9.5a and 0.9.6 are incompatible, causing weird errors.
I'd like to get a check for this in the RPMs.
However, now I want to make sure whether anyone has experienced problems
with RHL 0.9.5a OpenSSL libs vs. the 0.9.5a ones provided at openbsd.org?
Ie: is it enough to check like '= 0.9.5a' or do you have to check '=
0.9.5a-xyz'.
--
Pekka Savola
2012 Nov 12
0
srikanth@codeforce.com
[1]Click here to unsubscribe if you no longer wish to receive our emails
Dear Recruiter,
Let me present you with list of consultants currently available.
E-Mail me for below candidate details.
My Mail ID : srikanth at codeforce.com
Consultant Job Title Total Experience Current Location Availability Action
Atrayee Paul Sr. ETL Datastage Developer 7 years Detroit Metro Area
2003 Jul 01
1
X11 forwarding when pw is aged
Hi All,
1st Simple question: bug or feature ?
sshd version OpenSSH_3.6.1p2-pwexp20 on solaris sparc
X11 forwarding works fine
Set pw to aged (3rd entry in /etc/shadow to 0)
login as: steffenb
Sent username "steffenb"
steffenb at saturn's password:
Warning: Your password has expired, please change it now.
passwd: Changing password for steffenb
Enter login password:
New password:
2013 Nov 27
0
Requirement for Ruby on rails [REQ:10217055]
[1]Click here to unsubscribe if you no longer wish to receive our emails
Dear Recruiter,
Here is our Direct client requirement which can be filled
immediately. Kindly respond to this requirement with your consultant resume,
contact and current location info to speed up the interview process.
[2]Click here to submit for this position online and to speed up the
2000 Sep 27
2
trouble logging out when using protocol version 2
Dear OpenSSH gurus,
My machine is running Red Hat Linux 6.1 and has installed all of the
6.binary rpms generated from the source rpms openssh-2.2.0p1-2.src.rpm
6.and openssl-0.9.5a-3.src.rpm.
When I use protocol version 2 (by specifying "Protocol 2,1" in
~/.ssh/config), I can establish connections properly, but they do not
shut down properly. When I run a remote command by "ssh
2002 Jul 27
2
OpenSSH 3.4p1 on SourceMage client ssh fails
Hi guys,
I have a OpenSSH 3.4p1 installation on a SourceMage box, and I am trying to
connect to a OpenSSH 3.3p1 installation on a RedHat 7.x box and any other
machine.
The client fails with a "Host key verification failed."
Any other client connects correctly to the RedHat box, and any other server
that I try to connect to from the SourceMage box fails with the same error
message.
2012 Apr 02
0
Requirement for Java Developer [REQ:104605]
[1]Click here to unsubscribe if you no longer wish to receive our emails
Dear Partner,
Here is our Direct client requirement which can be filled
immediately. Kindly respond to this requirement with your consultant resume,
contact and current location info to speed up the interview process.
[2]Click here to submit for this position online and to speed up the
2005 Nov 20
0
[PATCH] Solaris 10 and missing OpenSSL functions >128bit
Hi all.
Solaris 10's default libcrypto does not have support for AES 192 and 256
bit functions. The attached patch, against -current, and based partially
on an earlier one by djm, will use OpenSSH's builtin rijndael code for
all AES crypto functions and thus will allow it to build and function
on Solaris 10 without the extra crypto packages (SUNWcry, SUNWcryr)
or a locally built OpenSSL.
2008 Mar 25
1
OpenSSH_4.7p1, OpenSSL 0.9.8g Host Key Verification Failed
Greetings,
I am trying to cross compile OpenSSH 4.7 for ppc with QNX Neutrino as my OS.
I have a workstation with QNX on it (x86) and I have linked the utils used
by autoconf to their ppc versions. I have been able to successfully build
sshd/ssh. I copy the binaries built on the x86 to the ppc, and sshd works
great. I can ssh from any machine to it, but when I try to ssh from the ppc
machine to
2002 Nov 06
1
openssl version mismatch !!
Hi Everybody,
I am running openssh 3.4p1 on solaris 8 sparc machine. We recently
upgraded our openssh,which is version 3.4p1. when I do "ssh -V"
it shows "openssl version mismatch....." and even I try to generate
keys with ssh-keygen it gives same error message.
I would appreciate if somebody let me know what could be the reason
for this error and How I can resolve it.
2009 May 11
0
using OpenSSL blowfish algorithm
Hi,
Just wondering if anybody is familiar with how this is implemented?
In particular, if there is a way to set the key size to something
larger than the default (ie, set it for 256-bit). If I generate a key
of this size will it automatically get used, or is it truncated down
to the default size?
I''m a little confused since when using AES it seems like you specify
the size