Displaying 20 results from an estimated 6000 matches similar to: "Announce: OpenSSH 4.6 released"
2002 Jun 25
10
Last call.
Outside the pre-auth patch by Markus to fix Cygwin and a few other
platforms.
SEND ME (privately) ANY required patch against the lastest snapshot.
I'm doing the final commits this evening.
Patches that have been temporary rejected for this release.
- Owl's full patch for SysV Shm if mmap fails
- mmap() on /dev/zero
- mmap() on sparse file
.. Not looked at the BSD/OS 5.0 patch
2007 Mar 03
18
[Bug 1291] aes256-ctr, aes192-ctr, arcfour256 broken with OpenSSL 0.9.8e
http://bugzilla.mindrot.org/show_bug.cgi?id=1291
Summary: aes256-ctr, aes192-ctr, arcfour256 broken with OpenSSL
0.9.8e
Product: Portable OpenSSH
Version: 4.5p1
Platform: All
OS/Version: All
Status: NEW
Severity: minor
Priority: P2
Component: sshd
AssignedTo: bitbucket at
2002 Mar 07
20
[Bug 138] Incorrect OpenSSL version requirment?
http://bugzilla.mindrot.org/show_bug.cgi?id=138
mouring at eviladmin.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |vjo at dulug.duke.edu
------- Additional Comments From mouring at eviladmin.org 2002-03-08 04:49 -------
*** Bug 139 has been
2002 Mar 16
4
[Bug 165] Problem with SSH1 Keys on RedHat7.2
http://bugzilla.mindrot.org/show_bug.cgi?id=165
------- Additional Comments From markus at openbsd.org 2002-03-17 04:31 -------
never seen this. what does sshd -ddd say?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2004 Aug 24
1
Possible problem with hostbased protocol 1 rhosts authentication
I found this problem when working with the Suse9.1 distribution, but have
since reproduced it with a vanilla build of Openssh
(openssh-3.9p1.tar.gz). Basically I cannot get a command like this:
XXXX>ssh -vvv -1 -o "RhostsAuthentication yes" AAAA
to work. Yes the appropriate settings are in the servers sshd_config file.
Hostbased protocol 1 ssh using rhosts between computers is
2002 Mar 07
12
[Bug 141] openssh-3.1p1-1.src.rpm will not build on RedHat Linux 6.1
http://bugzilla.mindrot.org/show_bug.cgi?id=141
markus at openbsd.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Summary| openssh-3.1p1-1.src.rpm |openssh-3.1p1-1.src.rpm will
|will not build on RedHat |not build on RedHat Linux
|Linux 6.1
2002 Apr 26
7
[Bug 227] 2nd Client Instance Can Login Without Authorization
http://bugzilla.mindrot.org/show_bug.cgi?id=227
------- Additional Comments From mouring at eviladmin.org 2002-04-26 15:03 -------
Provide us with your environment and a reproducable example.
The only thing I can think of is that you are using ssh-agent and you've
registered your key with the agent the first time. Thus it is now usable for
all following SSH sessions (from your account)
2008 Jun 12
2
FIPS mode OpenSSH suggestion
Hi OpenSSH team,
I find a url http://www.gossamer-threads.com/lists/openssh/dev/42808?do=post_view_threaded#42808, which provides unofficial patch for FIPS Capable OpenSSH. I try it and it seems working for some cases.
(BTW, I also find that aes128-ctr, aes192-ctr and aes256-ctr ciphers can't work in FIPS mode properly.
The fips mode sshd debug info is as following.
2007 Mar 01
11
Call for release testing.
Hi All.
We are planning on doing one of our regular OpenSSH releases (4.6/4.6p1)
some time next week. This is a mostly a bugfix release, but there is
one new feature:
sshd now allows the enabling and disabling of authentication methods on
a per user, group, host and network basis via the Match directive in
sshd_config.
The bugs fixed are:
#52 ssh hangs on exit.
#1252 sftp returns 0 when
2018 Mar 23
2
Call for testing: OpenSSH 7.7
On 24 March 2018 at 03:03, Corinna Vinschen <vinschen at redhat.com> wrote:
[...]
> session opened for local user corinna from [UNKNOWN]
> received client version 3
> debug2: Permitting whitelisted realpath request
> debug3: request 1: realpath
> realpath "."
> debug1: request 1: sent names count 1
> Refusing non-whitelisted statvfs request
>
2007 Jun 11
9
Recent MAC improvements
Hi,
There has been some recent work to improve the speed of the Message
Authentication Codes (MACs) that are used in OpenSSH.
The first improvement is a change from Markus Friedl to reuse the MAC
context, rather than reinitialising it for every packet. This saves two
calls to the underlying hash function (e.g. SHA1) for each packet. My
tests found that this yielded at 12-16% speedup for bulk
2002 Jun 21
2
Testing call.
Can I have people test the cvs tree or the next snapshots.
I believe NeXT is still broken (I will try to compile it tonight).
getopts patch will be applied, but I can't find the email address of who
sent to me (can you email me off list, thanks).
- Ben
2020 Apr 14
3
[PATCH v2 2/2] crypto: Remove unnecessary memzero_explicit()
Le 14/04/2020 ? 00:28, Waiman Long a ?crit?:
> Since kfree_sensitive() will do an implicit memzero_explicit(), there
> is no need to call memzero_explicit() before it. Eliminate those
> memzero_explicit() and simplify the call sites. For better correctness,
> the setting of keylen is also moved down after the key pointer check.
>
> Signed-off-by: Waiman Long <longman at
2020 Apr 14
3
[PATCH v2 2/2] crypto: Remove unnecessary memzero_explicit()
Le 14/04/2020 ? 00:28, Waiman Long a ?crit?:
> Since kfree_sensitive() will do an implicit memzero_explicit(), there
> is no need to call memzero_explicit() before it. Eliminate those
> memzero_explicit() and simplify the call sites. For better correctness,
> the setting of keylen is also moved down after the key pointer check.
>
> Signed-off-by: Waiman Long <longman at
2020 Apr 13
1
[PATCH 2/2] crypto: Remove unnecessary memzero_explicit()
On Mon, 2020-04-13 at 17:15 -0400, Waiman Long wrote:
> Since kfree_sensitive() will do an implicit memzero_explicit(), there
> is no need to call memzero_explicit() before it. Eliminate those
> memzero_explicit() and simplify the call sites.
2 bits of trivia:
> diff --git a/drivers/crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c b/drivers/crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c
[]
2020 Apr 13
1
[PATCH 2/2] crypto: Remove unnecessary memzero_explicit()
On Mon, 2020-04-13 at 17:15 -0400, Waiman Long wrote:
> Since kfree_sensitive() will do an implicit memzero_explicit(), there
> is no need to call memzero_explicit() before it. Eliminate those
> memzero_explicit() and simplify the call sites.
2 bits of trivia:
> diff --git a/drivers/crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c b/drivers/crypto/allwinner/sun8i-ce/sun8i-ce-cipher.c
[]
2020 Apr 13
10
[PATCH 0/2] mm, treewide: Rename kzfree() to kfree_sensitive()
This patchset makes a global rename of the kzfree() to kfree_sensitive()
to highlight the fact buffer clearing is only needed if the data objects
contain sensitive information like encrpytion key. The fact that kzfree()
uses memset() to do the clearing isn't totally safe either as compiler
may compile out the clearing in their optimizer. Instead, the new
kfree_sensitive() uses
2008 Apr 23
2
CHANNEL SIZE.
Recently I updated to Hardy Heron(Ubuntu beta) and with it cam
openssh-client 4.7p1. In my environment we have alot of
Extreme(www.extremenetworks.com) switch devices which we access via
ssh.
4.7p1 would no longer allow me to connect to the switches, however 4.6p1
would. The error I received was.
' channel 0: open failed: resource shortage: Channel open failed'
I did some diggin and
2016 Feb 29
5
Announce: OpenSSH 7.2 released
OpenSSH 7.2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support. OpenSSH also includes
transitional support for the legacy SSH 1.3 and 1.5 protocols
that may be enabled at compile-time.
Once again, we would like to thank the OpenSSH community
2002 May 16
5
OpenSSH 3.2.2 released
OpenSSH 3.2.2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support and encouragement.
Security Changes:
=================
- fixed buffer overflow