Displaying 20 results from an estimated 200 matches similar to: "Silly question on DH key exch in ssh"
2002 Jul 04
2
DH keys exchanged - encoding?
Hi,
Could anyone pls help by telling me how the DH pubkey from the server
(f) is encoded when it is sent back to me? I understand that it comes
across as an mpint, but after I decode the mpint into the bytes that
make up the number, what does this number represent? Is it a X509
encoded key? Or is it something else?
The reason for my question: I am trying to write a ssh client in Java,
2002 Jul 03
0
Java, JCE and OpenSSH
Hello, all.
Firstly, sorry for the cross-posting...
Has anyone out there tried to use JCE (1.2.1, with JDK1.3.1) to create a
Diffie Hellman key using the group1 prime modulus and base generator,
and then pass on the public key to an OpenSSH (v3.1) server as a part of
the diffie-hellman-group1-sha1 key exchange?
For some reason, the ssh server rejects the key saying it is invalid ...
I have
2002 Sep 11
1
Silly question on DH key exch in ssh
hello,
I'm also developing a ssh application in java and I also got stuck with
DH-Key Exchange.
I just get to the SSH_MSG_KEXDH_REPLY from the server. But what is he
expecting me to send
then, as far as I understand the Transport Layer Protcol I should send the
SSH_MSG_NEWKEYS
message, but that doesn't work.
Does anyone know what to send then?
(the hint from Markus Friedl with kexdh.c
2013 Nov 02
2
[PATCH] curve25519-sha256@libssh.org key exchange proposal
Am 02.11.2013 um 11:38 schrieb Aris Adamantiadis <aris at 0xbadc0de.be>:
> RFC4251 describes mpint to be multi-size and with positive values having
> MSB clear, so it's clearly incompatible with raw string.
>
> Since you both agreed on the curve25519 implementation to use, I'll work
> today on Markus' patch to make the changes Damien wanted.
What do you want to
2006 Jan 20
1
[protoype] Problem with Effects on draggable element if revert is true
hi,
I have a draggable element (cart-item) in a shopping cart
<%= draggable_element "item_#{product}_#{i}", :revert => true %>
When this element is dragged outside the cart into the "main_div", I want to
show a puff effect and remove the element. When it is dragged within the
cart, it should revert.
So i wrote this code for drop_receiving _element
<%=
2024 Nov 23
1
[PATCH] sshsig: check hashalg before selecting the RSA signature algorithm
There is no hash algorithm associated with SSH keys. The key format for RSA keys is always ?ssh-rsa?, and it is capable of being used with any of the available signature algorithms (ssh-rsa for SHA-1 and rsa-sha2-256 or rsa-sha2-512 for SHA-2).
See section 3 in https://www.rfc-editor.org/rfc/rfc8332:
rsa-sha2-256 RECOMMENDED sign Raw RSA key
rsa-sha2-512 OPTIONAL
2015 Apr 26
7
[Bug 2390] New: PROTOCOL.key mis-describes private section
https://bugzilla.mindrot.org/show_bug.cgi?id=2390
Bug ID: 2390
Summary: PROTOCOL.key mis-describes private section
Product: Portable OpenSSH
Version: 6.8p1
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: Documentation
Assignee: unassigned-bugs at
2019 Jan 19
3
Can we disable diffie-hellman-group14-sha1 by default?
e.g. can we make it throw warnings etc. rsa-sha2-256 and rsa-sha2-512
are fine, they use PSS.
On Sun, Jan 20, 2019 at 1:55 AM Yegor Ievlev <koops1997 at gmail.com> wrote:
>
> Also can we do anything with ssh-rsa? It uses both SHA-1 and
> deprecated PKCS#1 padding. If it's used to sign certificates, there's
> no additional protection of SHA-2 hashing before SHA-1
2011 Sep 10
2
hosting ror app using xampp on windows OS
HI ALL,
it''s so frustuating to me from so many days--hosting ror app in apache
on win os.
i installed xampp and running ror apps using webrick server .
but when comes to hosting that app into apache i can''t make it.i gone
through the
so many sites can anyone give me an assistance to solve this problem.
thanks in advance
regards,
Manik.
--
You received this message because you
2013 Nov 02
3
[PATCH] curve25519-sha256@libssh.org key exchange proposal
It should be compatible with the original patch. However I think that the shared secret should be encoded as a string, too. What does libssh do?
> Am 02.11.2013 um 05:46 schrieb Damien Miller <djm at mindrot.org>:
>
>> On Fri, 1 Nov 2013, Markus Friedl wrote:
>>
>> Here are three versions (patch against openbsd cvs)
>>
>> 1) repace nacl w/libsodium,
2024 Nov 23
2
[PATCH] sshsig: check hashalg before selecting the RSA signature algorithm
Hi,
I sent this patch back inn april and I still have a need for this. Would it be
possible to get any pointers how we can have `hashalg` selectable by `ssh-keygen -Y`?
--
Morten Linderud
PGP: 9C02FF419FECBE16
On Thu, Apr 11, 2024 at 09:16:39PM +0200, Morten Linderud wrote:
> `ssh-keygen -Y sign` only selects the signing algorithm `rsa-sha2-512`
> and this prevents ssh-agent
2004 Jul 22
3
ebcdic problem in bufaux.c
I am working on a port of Openssh 3.8p1 after already
having done a port of Openssh 3.5p1. There are a
couple of new lines in buffer_get_bignum2() that are
causing me problems:
if (len > 0 && (bin[0] & 0x80))
fatal("buffer_get_bignum2: negative
numbers not supported");
The "& 0x80" check is not relevant in ebcdic.
Does anyone
2016 Jan 26
2
Questions about inferred state machines for OpenSSH
Dear all,
For my thesis, I've been working on automatic inference of state
machines for SSH servers. I ran into a couple of particularities
regarding OpenSSH's inferred state machine, and was hoping some of you
might be interested. Maybe you can even shed some light on it.
Setup: I'm using LearnLib's (Java) version of the L* learning
algorithm [1] to come up with sequences of
2015 Jun 02
1
[Bug 2302] with DH-GEX, ssh (and sshd) should not fall back to unconfigured DH groups or at least document this behaviour and use a stronger group
https://bugzilla.mindrot.org/show_bug.cgi?id=2302
--- Comment #13 from Darren Tucker <dtucker at zip.com.au> ---
(In reply to Christoph Anton Mitterer from comment #10)
[...]
> Even though an attacker cannot (AFAIU??) for a connection to
> downgrade to the weaker groups,
The server's DH-GEX exchange hash includes the DH group sizes it
received from the client. If these are
2015 May 26
1
[Bug 2302] with DH-GEX, ssh (and sshd) should not fall back to unconfigured DH groups or at least document this behaviour and use a stronger group
https://bugzilla.mindrot.org/show_bug.cgi?id=2302
--- Comment #4 from Damien Miller <djm at mindrot.org> ---
Comment on attachment 2630
--> https://bugzilla.mindrot.org/attachment.cgi?id=2630
Make the DH-GEX fallback group 4k bit.
Where did this group come from? IMO it would be best to use one of the
standard groups if we're picking another fixed one - logjam attacks
aren't
2014 Oct 28
2
[Bug 2303] New: ssh (and perhaps even sshd) should allow to specify the minimum DH group sizes for DH GEX
https://bugzilla.mindrot.org/show_bug.cgi?id=2303
Bug ID: 2303
Summary: ssh (and perhaps even sshd) should allow to specify
the minimum DH group sizes for DH GEX
Product: Portable OpenSSH
Version: 6.7p1
Hardware: All
OS: All
Status: NEW
Severity: security
Priority: P5
2018 Nov 13
12
[Bug 2929] New: OpenSSH server should not send the SSH_MSG_EXT_INFO message after rekeying
https://bugzilla.mindrot.org/show_bug.cgi?id=2929
Bug ID: 2929
Summary: OpenSSH server should not send the SSH_MSG_EXT_INFO
message after rekeying
Product: Portable OpenSSH
Version: 7.7p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
2015 Jun 12
2
[Bug 2302] with DH-GEX, ssh (and sshd) should not fall back to unconfigured DH groups or at least document this behaviour and use a stronger group
On Fri 2015-06-12 01:52:54 -0400, Mark D. Baushke wrote:
> I have communicated with Allen Roginsky on this topic and I have been given permission to post his response.
>
> In this message below, the 'vendor' was Darren Tucker's generated prime
> that used a generator value of 5.
>
> -- Mark
>
> From: "Roginsky, Allen" <allen.roginsky at
2015 May 27
4
[Bug 2302] with DH-GEX, ssh (and sshd) should not fall back to unconfigured DH groups or at least document this behaviour and use a stronger group
On Wed, May 27, 2015 at 05:08:25PM -0400, Daniel Kahn Gillmor wrote:
> On Tue 2015-05-26 15:39:49 -0400, Mark D. Baushke wrote:
> > Hi Folks,
> >
> > The generator value of 5 does not lead to a q-ordered subgroup which
> > is needed to pass tests in
> >
> > http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf
>
> I
2006 Feb 20
1
the EXTRAVERSION problem in dh-kpatches...
... is actually old & very well known by the maintainer!
there is a bug report for exactly this that is 3 years and 124 days old!
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=165505
I can also add my report to this bug and mention that we need a fixed version
for our xen packages, but as it looks for me (at the moment) the maintainer
is not really interessted in getting this