similar to: [Bug 138] Incorrect OpenSSL version requirment?

Displaying 20 results from an estimated 40000 matches similar to: "[Bug 138] Incorrect OpenSSL version requirment?"

2002 May 12
3
[Bug 138] Incorrect OpenSSL version requirment?
http://bugzilla.mindrot.org/show_bug.cgi?id=138 patl at cag.lcs.mit.edu changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |REOPENED Resolution|FIXED | ------- Additional Comments From patl at cag.lcs.mit.edu 2002-05-13 00:55
2002 Apr 10
0
[Bug 138] Incorrect OpenSSL version requirment?
http://bugzilla.mindrot.org/show_bug.cgi?id=138 ------- Additional Comments From eds at reric.net 2002-04-11 08:13 ------- As far as I can tell, blowfish is indeed broken in ssh1. [eds at ike eds]$ ssh -v -1 postal OpenSSH_3.1p1, SSH protocols 1.5/2.0, OpenSSL 0x0090581f ... snip some output ... debug1: Remote protocol version 1.99, remote software version OpenSSH_3.1p1 debug1: match:
2002 Mar 07
20
[Bug 138] Incorrect OpenSSL version requirment?
http://bugzilla.mindrot.org/show_bug.cgi?id=138 mouring at eviladmin.org changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |vjo at dulug.duke.edu ------- Additional Comments From mouring at eviladmin.org 2002-03-08 04:49 ------- *** Bug 139 has been
2002 Sep 10
0
[Bug 138] Incorrect OpenSSL version requirment?
http://bugzilla.mindrot.org/show_bug.cgi?id=138 djm at mindrot.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|REOPENED |RESOLVED Resolution| |FIXED ------- Additional Comments From djm at mindrot.org 2002-09-10 22:27
2006 Sep 28
0
Corrupted check bytes on input with SSH1 - OpenSSH-4.3 and OpenSSL-0.9.6b
I am getting the error "Corrupted check bytes on input" from the SSH server when I try to connect using SSH1 protocol. The same OpenSSL-4.3 and OpenSSL-0.9.6b work just fine when I try to connect using SSH2. Has any one heard of any incompatibility issue with ciphers of the OpenSSL version mentioned in the subject? I have found that there was an issue like this (URL below) at one time
2000 Sep 14
2
openssh 2.2.0p1 fails with openssl 0.9.6-beta1
On Wed, Sep 13, 2000 at 09:13:26AM +0000, Graham Murray wrote: > On upgrading to openssl 0.9.6-beta1, I find that openssh 2.2.0p1 fails > to connect. I did some more experiments and also saw the problems. They occur when using a 0.9.6-beta client to connect to 0.9.5a and 0.9.6-beta servers. They also occur when using a 0.9.5a client connecting to a 0.9.6-beta server. Connections fail with
2002 Jun 25
0
[Bug 297] New: sshd version 3.3 incompatible with pre-3.3 clients in ssh1 mode
http://bugzilla.mindrot.org/show_bug.cgi?id=297 Summary: sshd version 3.3 incompatible with pre-3.3 clients in ssh1 mode Product: Portable OpenSSH Version: -current Platform: ix86 OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo:
2010 Aug 05
1
[LLVMdev] possible miscompilation of openssl on x86-64
Hi folks, I'm playing with this version of OpenSSL: openssl-SNAP-20100804 On x86 using clang I can build it and run all tests successfully. On x86-64 using clang r110287 I get the error message below during "make test". Not sure if anyone has time to look into this but I'm probably not the right person to start debugging it... Thanks, John Regehr
2001 Jan 08
2
openSSH: configure ciphers.
I see that: SSH uses the following ciphers for encryption: Cipher SSH1 SSH2 DES yes no 3DES yes yes IDEA yes no Blowfish yes yes Twofish no yes Arcfour no yes Cast128-cbc no yes Two ques re: sshd: 1) Using openssh, how do I configure which
2001 Feb 21
1
OpenSSL + OpenSSH version problems
Hello all, OpenSSL 0.9.5a and 0.9.6 are incompatible, causing weird errors. I'd like to get a check for this in the RPMs. However, now I want to make sure whether anyone has experienced problems with RHL 0.9.5a OpenSSL libs vs. the 0.9.5a ones provided at openbsd.org? Ie: is it enough to check like '= 0.9.5a' or do you have to check '= 0.9.5a-xyz'. -- Pekka Savola
2012 Nov 12
0
srikanth@codeforce.com
[1]Click here to unsubscribe if you no longer wish to receive our emails Dear Recruiter, Let me present you with list of consultants currently available. E-Mail me for below candidate details. My Mail ID : srikanth at codeforce.com Consultant Job Title Total Experience Current Location Availability Action Atrayee Paul Sr. ETL Datastage Developer 7 years Detroit Metro Area
2003 Jul 01
1
X11 forwarding when pw is aged
Hi All, 1st Simple question: bug or feature ? sshd version OpenSSH_3.6.1p2-pwexp20 on solaris sparc X11 forwarding works fine Set pw to aged (3rd entry in /etc/shadow to 0) login as: steffenb Sent username "steffenb" steffenb at saturn's password: Warning: Your password has expired, please change it now. passwd: Changing password for steffenb Enter login password: New password:
2013 Nov 27
0
Requirement for Ruby on rails [REQ:10217055]
[1]Click here to unsubscribe if you no longer wish to receive our emails Dear Recruiter, Here is our Direct client requirement which can be filled immediately. Kindly respond to this requirement with your consultant resume, contact and current location info to speed up the interview process. [2]Click here to submit for this position online and to speed up the
2000 Sep 27
2
trouble logging out when using protocol version 2
Dear OpenSSH gurus, My machine is running Red Hat Linux 6.1 and has installed all of the 6.binary rpms generated from the source rpms openssh-2.2.0p1-2.src.rpm 6.and openssl-0.9.5a-3.src.rpm. When I use protocol version 2 (by specifying "Protocol 2,1" in ~/.ssh/config), I can establish connections properly, but they do not shut down properly. When I run a remote command by "ssh
2002 Jul 27
2
OpenSSH 3.4p1 on SourceMage client ssh fails
Hi guys, I have a OpenSSH 3.4p1 installation on a SourceMage box, and I am trying to connect to a OpenSSH 3.3p1 installation on a RedHat 7.x box and any other machine. The client fails with a "Host key verification failed." Any other client connects correctly to the RedHat box, and any other server that I try to connect to from the SourceMage box fails with the same error message.
2012 Apr 02
0
Requirement for Java Developer [REQ:104605]
[1]Click here to unsubscribe if you no longer wish to receive our emails Dear Partner, Here is our Direct client requirement which can be filled immediately. Kindly respond to this requirement with your consultant resume, contact and current location info to speed up the interview process. [2]Click here to submit for this position online and to speed up the
2005 Nov 20
0
[PATCH] Solaris 10 and missing OpenSSL functions >128bit
Hi all. Solaris 10's default libcrypto does not have support for AES 192 and 256 bit functions. The attached patch, against -current, and based partially on an earlier one by djm, will use OpenSSH's builtin rijndael code for all AES crypto functions and thus will allow it to build and function on Solaris 10 without the extra crypto packages (SUNWcry, SUNWcryr) or a locally built OpenSSL.
2008 Mar 25
1
OpenSSH_4.7p1, OpenSSL 0.9.8g Host Key Verification Failed
Greetings, I am trying to cross compile OpenSSH 4.7 for ppc with QNX Neutrino as my OS. I have a workstation with QNX on it (x86) and I have linked the utils used by autoconf to their ppc versions. I have been able to successfully build sshd/ssh. I copy the binaries built on the x86 to the ppc, and sshd works great. I can ssh from any machine to it, but when I try to ssh from the ppc machine to
2002 Nov 06
1
openssl version mismatch !!
Hi Everybody, I am running openssh 3.4p1 on solaris 8 sparc machine. We recently upgraded our openssh,which is version 3.4p1. when I do "ssh -V" it shows "openssl version mismatch....." and even I try to generate keys with ssh-keygen it gives same error message. I would appreciate if somebody let me know what could be the reason for this error and How I can resolve it.
2009 May 11
0
using OpenSSL blowfish algorithm
Hi, Just wondering if anybody is familiar with how this is implemented? In particular, if there is a way to set the key size to something larger than the default (ie, set it for 256-bit). If I generate a key of this size will it automatically get used, or is it truncated down to the default size? I''m a little confused since when using AES it seems like you specify the size