Displaying 20 results from an estimated 700 matches similar to: "patch adding none cipher/mac for ssh v2"
2004 Oct 17
0
OpenSSH 3.9.1 fix for IRIX 5.3 cc
Hi,
the following patch to cipher.c enables OpenSSH 3.9.1 to compile on IRIX 5.3 with the native IDO cc:
--- cipher.c.orig 2004-10-17 12:04:10.000000000 +0200
+++ cipher.c 2004-10-17 13:43:22.000000000 +0200
@@ -76,15 +76,15 @@
u_int key_len;
const EVP_CIPHER *(*evptype)(void);
} ciphers[] = {
- { "none", SSH_CIPHER_NONE, 8, 0,
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi,
I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with
FIPS 140-2 OpenSSL.
These are based on previously reported patches by Steve Marquess
<marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>,
for ver. OpenSSH 3.8.
Note that these patches are NOT OFFICIAL, and MAY be used freely by
anyone.
Issues [partially] handled:
SSL FIPS Self test.
RC4,
2004 Jun 05
50
[Bug 877] ssh 3.8.1p1 client cannot disable encryption with "-c none"
http://bugzilla.mindrot.org/show_bug.cgi?id=877
Summary: ssh 3.8.1p1 client cannot disable encryption with "-c
none"
Product: Portable OpenSSH
Version: 3.8.1p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo:
2002 Jul 25
1
[Bug 371] New: OpenSSH fails to build on Alpha True64 in cipher.c
http://bugzilla.mindrot.org/show_bug.cgi?id=371
Summary: OpenSSH fails to build on Alpha True64 in cipher.c
Product: Portable OpenSSH
Version: -current
Platform: Alpha
OS/Version: OSF/1
Status: NEW
Severity: normal
Priority: P2
Component: Build system
AssignedTo: openssh-unix-dev at mindrot.org
2008 May 05
2
PCI serial card works on 6.2 but not on 6.3
We have upgraded a box from 6.2 to 6.3-RELEASE. Afterwards the box does not
recognize its ST Lab I-160 serial card with Netmos 9845 Chipset. It worked
flawlessly on 6.2 with puc(4) driver.
>From dmesg:
pci1: <simple comms, UART> at device 8.0 (no driver attached)
~# pciconf -l -v | grep -B 4 UART
none2@pci1:8:0: class=0x070002 card=0x00041000 chip=0x98459710 rev=0x01
hdr=0x00
2008 Nov 21
1
Integrated RTL8168/8111 NIC not assigned interface
I'm running 7.0-RELEASE-i386 on Jetway's NC92-N230 mainboard. The board has
one integrated RTL8168/8111 gigabit NIC as well as an expansion board with
three RTL8168/8111 NICs. Why would the three NICs work while the onboard NIC
does not?
none2@pci0:1:0:0: class=0x020000 card=0x816810ec chip=0x816810ec
rev=0x02 hdr=0x00
vendor = 'Realtek Semiconductor'
device
2000 Jan 14
2
The cipher 'none' in OpenSSH
Hallo to everyone!
First I would like to thank everybody for making a free implementation
of ssh available.
I am administrating the network at the computer science department of
the University of Munich. Here, rcp (as in many other places, I guess)
is banned for security reasons. I, aswell as others, use scp regulary
to copy files from one machine to another.
The problem is, that the transfer
2006 Nov 21
1
NEWBIE: Help explaining use of lm()?
I'm attempting the heruclean task of teaching myself Introductory
Statistics and R at the same time. I'm working through Peter Dalgaard's
Introductory Statistics with R, but don't understand why the answer to
one of the exercises works. I'm hoping someone will have the patience to
explain the answer to me, both in the statistics and R areas.
Exercise 6.1 says:
The zelazo data
2013 Sep 08
1
Looking for driver help
I sent an email out to freebsd-net without a response, soo this is my last
attempt at getting any assistance here.
I have a QLE3142-CU-CK (rebranded NetXen NX3-20GCU w/ NX3031 chipset) with
no driver support in *BSD from anything I saw. I came across solaris's ntxn
driver which seems to work appropriately but I have no use for solaris as a
host o/s. Naturally I'll attempt at trying to get
2014 Jul 15
2
missing HAVE_EVP_RIPEMD160 breaks ssh client
Hello,
I've updated sources but forgot to recreate configure so I've ended without
#define HAVE_EVP_RIPEMD160 1
and ssh client ended with:
OpenSSH_6.7p1, OpenSSL 1.0.1h-fips 5 Jun 2014
debug1: Reading configuration data ssh.config
main: mux digest failed
The problem was that ssh_digest_by_alg() couldn't verify alg with an index bigger than 1 since
the line with SSH_DIGEST_RIPEMD160
2001 Jul 03
1
turning on none cipher for v1 and v2 server
Hi all,
Is there a straightforward way to enable the none cipher for v1 and v2 in the
server?
Please include my email address in your reply, as I'm not subscribed to this
list.
Thanks!
Mordy
--
Mordy Ovits
Network Engineer
Bloomberg L.P.
2007 Jan 05
1
No warning message is displayed for "none" cipher
Hello all,
I tried to connect to the server that supports protocol 1:
# ssh -1 -o "cipher none" remotehost
<No valid SSH1 cipher, using 3des instead>
As per the code in sshconnect1.c, it has to alert the user about "none" cipher usage.
try_challenge_response_authentication() {
....
if (options.cipher == SSH_CIPHER_NONE)
2007 Sep 26
1
Inconsistent none cipher behavior
Using stock OpenSSH 4.7 I found different behavior when trying to
specify the use of the 'none' cipher depending on the command line
option nomenclature. This is under linux 2.6.19-web100
using -ocipher=none
[root at delta openssh-4.7p1-hpnv19]# /home/rapier/ssh47/bin/scp -S
/home/rapier/ssh47/bin/ssh -ocipher=none -P 2222 ~rapier/2gb
rapier at localhost:/dev/null
rapier at
2007 Nov 24
1
enable none cipher
Hello,
Does anybody know how cam I enable the usage of the 'none' cipher in
OpenSSH 4.7
yours,
Mihai
2008 Jan 02
0
enable none cipher
Hi,
I was looking at the thread on the 'null' cipher and was wondering if
you have done anything one it, if you need any help (or just
encouragement ;)).
I'm a radio experimenter (radio ham) and currently I'm using ssh
illegally over the air, as I'm not legally allowed to encrypt
sessions over the Radio Link. Being able to have strong
authentication with no
2011 Aug 07
1
"Cipher = none" doesn't seem to be working properly
I have a simple pair of nodes set up, connected wirelessly, with tincd
1.0.16 running in switch mode. Setting Cipher and Digest to "none",
and Compression to 0, the bridge is still CPU-bound, with most of
tincd's CPU time spent in libcrypto. I narrowed it down to this line
in net_setup.c:
myself->connection->outcipher = EVP_bf_ofb();
It looks as though all outgoing data is
2018 May 23
1
Cipher=none seems to be not working
Hi,
i try to etablish unencrypted onnection and have in my config:
Cipher=aes
But this causes the following error:
2018-05-23 12:08:27 tinc.backbone[14746]: tincd 1.0.31 starting, debug level 5
2018-05-23 12:08:27 tinc.backbone[14746]: Got fatal signal 11 (Segmentation fault)
2018-05-23 12:08:27 tinc.backbone[14746]: Trying to re-execute in 5 seconds...
I have no idea what i'm doing
2009 Feb 26
1
OpenSSH with 'none' cipher (after reading bug #877)
Hi,
I'd like to argue in favor of bug #877 (
https://bugzilla.mindrot.org/show_bug.cgi?id=877) from a new perspective.
Instead of performance, I wish to raise the issue of regulatory compliance
and auditing.
I read all of #877 and I understand the arguments for and against, but I
felt at the end the decisive comment by Damien was mostly based on 'We don't
want users to use
2008 Jan 10
2
[Bug 1430] New: Restore support for "none" cipher, i.e., unencrypted connections
https://bugzilla.mindrot.org/show_bug.cgi?id=1430
Summary: Restore support for "none" cipher, i.e., unencrypted
connections
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.7p1
Platform: Other
OS/Version: Other
Status: NEW
Severity: normal
Priority: P2
2004 Aug 06
0
[PATCH] Add per-listener and per-mount connection time limits.
Attached you will find a patch against the icecast-2.0.0 released source
code which implements listener time limits on a global or mount-specific
scope.
Two new configuration elements are added with this patch:
client-time-limit: This is a GLOBAL directive which covers all
connections. Its value is given in seconds. So for example, if you want to
limit all listeners on all mount points to 1