similar to: patch adding none cipher/mac for ssh v2

Displaying 20 results from an estimated 700 matches similar to: "patch adding none cipher/mac for ssh v2"

2004 Oct 17
0
OpenSSH 3.9.1 fix for IRIX 5.3 cc
Hi, the following patch to cipher.c enables OpenSSH 3.9.1 to compile on IRIX 5.3 with the native IDO cc: --- cipher.c.orig 2004-10-17 12:04:10.000000000 +0200 +++ cipher.c 2004-10-17 13:43:22.000000000 +0200 @@ -76,15 +76,15 @@ u_int key_len; const EVP_CIPHER *(*evptype)(void); } ciphers[] = { - { "none", SSH_CIPHER_NONE, 8, 0,
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi, I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with FIPS 140-2 OpenSSL. These are based on previously reported patches by Steve Marquess <marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>, for ver. OpenSSH 3.8. Note that these patches are NOT OFFICIAL, and MAY be used freely by anyone. Issues [partially] handled: SSL FIPS Self test. RC4,
2004 Jun 05
50
[Bug 877] ssh 3.8.1p1 client cannot disable encryption with "-c none"
http://bugzilla.mindrot.org/show_bug.cgi?id=877 Summary: ssh 3.8.1p1 client cannot disable encryption with "-c none" Product: Portable OpenSSH Version: 3.8.1p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo:
2002 Jul 25
1
[Bug 371] New: OpenSSH fails to build on Alpha True64 in cipher.c
http://bugzilla.mindrot.org/show_bug.cgi?id=371 Summary: OpenSSH fails to build on Alpha True64 in cipher.c Product: Portable OpenSSH Version: -current Platform: Alpha OS/Version: OSF/1 Status: NEW Severity: normal Priority: P2 Component: Build system AssignedTo: openssh-unix-dev at mindrot.org
2008 May 05
2
PCI serial card works on 6.2 but not on 6.3
We have upgraded a box from 6.2 to 6.3-RELEASE. Afterwards the box does not recognize its ST Lab I-160 serial card with Netmos 9845 Chipset. It worked flawlessly on 6.2 with puc(4) driver. >From dmesg: pci1: <simple comms, UART> at device 8.0 (no driver attached) ~# pciconf -l -v | grep -B 4 UART none2@pci1:8:0: class=0x070002 card=0x00041000 chip=0x98459710 rev=0x01 hdr=0x00
2008 Nov 21
1
Integrated RTL8168/8111 NIC not assigned interface
I'm running 7.0-RELEASE-i386 on Jetway's NC92-N230 mainboard. The board has one integrated RTL8168/8111 gigabit NIC as well as an expansion board with three RTL8168/8111 NICs. Why would the three NICs work while the onboard NIC does not? none2@pci0:1:0:0: class=0x020000 card=0x816810ec chip=0x816810ec rev=0x02 hdr=0x00 vendor = 'Realtek Semiconductor' device
2000 Jan 14
2
The cipher 'none' in OpenSSH
Hallo to everyone! First I would like to thank everybody for making a free implementation of ssh available. I am administrating the network at the computer science department of the University of Munich. Here, rcp (as in many other places, I guess) is banned for security reasons. I, aswell as others, use scp regulary to copy files from one machine to another. The problem is, that the transfer
2006 Nov 21
1
NEWBIE: Help explaining use of lm()?
I'm attempting the heruclean task of teaching myself Introductory Statistics and R at the same time. I'm working through Peter Dalgaard's Introductory Statistics with R, but don't understand why the answer to one of the exercises works. I'm hoping someone will have the patience to explain the answer to me, both in the statistics and R areas. Exercise 6.1 says: The zelazo data
2013 Sep 08
1
Looking for driver help
I sent an email out to freebsd-net without a response, soo this is my last attempt at getting any assistance here. I have a QLE3142-CU-CK (rebranded NetXen NX3-20GCU w/ NX3031 chipset) with no driver support in *BSD from anything I saw. I came across solaris's ntxn driver which seems to work appropriately but I have no use for solaris as a host o/s. Naturally I'll attempt at trying to get
2014 Jul 15
2
missing HAVE_EVP_RIPEMD160 breaks ssh client
Hello, I've updated sources but forgot to recreate configure so I've ended without #define HAVE_EVP_RIPEMD160 1 and ssh client ended with: OpenSSH_6.7p1, OpenSSL 1.0.1h-fips 5 Jun 2014 debug1: Reading configuration data ssh.config main: mux digest failed The problem was that ssh_digest_by_alg() couldn't verify alg with an index bigger than 1 since the line with SSH_DIGEST_RIPEMD160
2001 Jul 03
1
turning on none cipher for v1 and v2 server
Hi all, Is there a straightforward way to enable the none cipher for v1 and v2 in the server? Please include my email address in your reply, as I'm not subscribed to this list. Thanks! Mordy -- Mordy Ovits Network Engineer Bloomberg L.P.
2007 Jan 05
1
No warning message is displayed for "none" cipher
Hello all, I tried to connect to the server that supports protocol 1: # ssh -1 -o "cipher none" remotehost <No valid SSH1 cipher, using 3des instead> As per the code in sshconnect1.c, it has to alert the user about "none" cipher usage. try_challenge_response_authentication() { .... if (options.cipher == SSH_CIPHER_NONE)
2007 Sep 26
1
Inconsistent none cipher behavior
Using stock OpenSSH 4.7 I found different behavior when trying to specify the use of the 'none' cipher depending on the command line option nomenclature. This is under linux 2.6.19-web100 using -ocipher=none [root at delta openssh-4.7p1-hpnv19]# /home/rapier/ssh47/bin/scp -S /home/rapier/ssh47/bin/ssh -ocipher=none -P 2222 ~rapier/2gb rapier at localhost:/dev/null rapier at
2007 Nov 24
1
enable none cipher
Hello, Does anybody know how cam I enable the usage of the 'none' cipher in OpenSSH 4.7 yours, Mihai
2008 Jan 02
0
enable none cipher
Hi, I was looking at the thread on the 'null' cipher and was wondering if you have done anything one it, if you need any help (or just encouragement ;)). I'm a radio experimenter (radio ham) and currently I'm using ssh illegally over the air, as I'm not legally allowed to encrypt sessions over the Radio Link. Being able to have strong authentication with no
2011 Aug 07
1
"Cipher = none" doesn't seem to be working properly
I have a simple pair of nodes set up, connected wirelessly, with tincd 1.0.16 running in switch mode. Setting Cipher and Digest to "none", and Compression to 0, the bridge is still CPU-bound, with most of tincd's CPU time spent in libcrypto. I narrowed it down to this line in net_setup.c: myself->connection->outcipher = EVP_bf_ofb(); It looks as though all outgoing data is
2018 May 23
1
Cipher=none seems to be not working
Hi, i try to etablish unencrypted onnection and have in my config: Cipher=aes But this causes the following error: 2018-05-23 12:08:27 tinc.backbone[14746]: tincd 1.0.31 starting, debug level 5 2018-05-23 12:08:27 tinc.backbone[14746]: Got fatal signal 11 (Segmentation fault) 2018-05-23 12:08:27 tinc.backbone[14746]: Trying to re-execute in 5 seconds... I have no idea what i'm doing
2009 Feb 26
1
OpenSSH with 'none' cipher (after reading bug #877)
Hi, I'd like to argue in favor of bug #877 ( https://bugzilla.mindrot.org/show_bug.cgi?id=877) from a new perspective. Instead of performance, I wish to raise the issue of regulatory compliance and auditing. I read all of #877 and I understand the arguments for and against, but I felt at the end the decisive comment by Damien was mostly based on 'We don't want users to use
2008 Jan 10
2
[Bug 1430] New: Restore support for "none" cipher, i.e., unencrypted connections
https://bugzilla.mindrot.org/show_bug.cgi?id=1430 Summary: Restore support for "none" cipher, i.e., unencrypted connections Classification: Unclassified Product: Portable OpenSSH Version: 4.7p1 Platform: Other OS/Version: Other Status: NEW Severity: normal Priority: P2
2004 Aug 06
0
[PATCH] Add per-listener and per-mount connection time limits.
Attached you will find a patch against the icecast-2.0.0 released source code which implements listener time limits on a global or mount-specific scope. Two new configuration elements are added with this patch: client-time-limit: This is a GLOBAL directive which covers all connections. Its value is given in seconds. So for example, if you want to limit all listeners on all mount points to 1