Displaying 20 results from an estimated 1000 matches similar to: "Logging the suggested algorithms of the client during key exchange"
2007 Sep 21
4
Diffie Hellman key exchange algorithms
A few questions regarding the OpenSSH support for the Diffie Hellman key exchange algorithms:
(1) Are the diffie-hellman-group-exchange-sha256",
"diffie-hellman-group-exchange-sha1"
, "diffie-hellman-group14-sha1" "diffie-hellman-group1-sha1" (as
defined in RFCs 4253 and RFC 4419) the complete list of key exchange
algorithms supported by OpenSSH?
(2) Is there a
2005 Aug 12
0
failure during key exchange?
I have been contacted by some people who are having a problem with
transfer files using OpenSSH 4.1p1 with the HPN patch. I've taken a look
at their problem and I don't think its a problem with the HPN code so I
thought I would bounce it over here to see if anyone here has some insight.
In brief the connection is dying without spitting out an error message
during the key exchange. Of
2006 Sep 16
2
Forcing encryption algorithms on server side
As the man pages say, you can force an encryption algorithm from the
server side by use of the "Cipher" command. How would one verify this is
working? Thanks.
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev at mindrot.org
http://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
2013 May 15
2
Support for "ssh-rsa-sha256" and "ssh-dss-sha256" ?
Functionality request for supporting Digital Signatures for RSA and DSS
Public Key Algorithms in alignment with NIST SP800-131A.
I
assume this has been asked before, but I could not find in the
archives. Support of "ssh-rsa-sha256" and "ssh-dss-sha256" public key
algorithms for OpenSSH? I know Suite B Algorithms and x509 SSH
Extension Algorithms are supported, but not a
2006 Jan 24
0
weird issues with DH Group1 key exchange
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
We recently upgraded to OpenSSH 4.2p1 with the chroot patch supplied on
sourceforge. Since then, we've noticed odd problems with random client
failures. Today I wrote little scripts to keep restarting sshd with the
- -ddd flag and finally captured what's going on, I believe.
First, openssh is compiled as so:
OpenSSH_4.2p1, OpenSSL
2012 Jul 06
1
Can not login with key-exchange is chrooted sftp environment
Hi,
We need to allow log in based on public key generated using ssh-keygen (rsa key) for SFTP with chroot (internal sftp). I am not able to log in with just key exchange. I can login using password.
I am able to log-in with out password for an ssh session unlike sftp session.
Is there a way to login with key-exchange only for internal-sftp with chroot?
Here is the trace
OpenSSH_3.9p1, OpenSSL
2020 Feb 06
3
Call for testing: OpenSSH 8.2
On 2020-02-05 at 20:39 -0500, Phil Pennock wrote:
> On 2020-02-06 at 10:29 +1100, Damien Miller wrote:
> > OpenSSH 8.2p1 is almost ready for release, so we would appreciate testing
> > on as many platforms and systems as possible. This is a feature release.
>
> > * The RFC8332 RSA SHA-2 signature algorithms rsa-sha2-256/512. These
> This actually affects me:
2013 May 07
2
SSH key exchange algorithm negotiation payload growth
Howdy-
TL;DR
An SSH daemon for a memory-constrained embedded platform didn't work with a recent OpenSSH client because it couldn't handle the payload size during key exchange. In general, what should SSH implementors in such limited environments do to ensure forwards compatibility with future OpenSSH releases?
I am unable to SSH to any of my HP servers' iLO2 interfaces using
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string
client_version_string.
These are used just in a few functions and can easily be passed as
parameters.
Also, there is a strange construct, where their memory is allocated to
the global pointers, then copies of these pointers are assigned to the
kex structure. The kex_free finally frees them via cleanup of the kex
2014 Jul 16
1
ssh - Connection closed by UNKNOWN
Hi,
ssh clients shows "closed by UNKNOWN" message when a socket is closed by a
remote side while ssh is waiting for user's password:
$ ssh user at localhost
user at localhost's password:
Connection closed by UNKNOWN
When the packet_read_seqnr() calls get_remote_ipaddr(), a connection's
socket is already closed and there's not been any other call of this function
yet
2001 Nov 08
2
logging of root logins
On Thu, Nov 08, 2001 at 01:59:25PM +0100, Arthur de Jong wrote:
> root and warthur both have user id 0. Sorry, I should have made that
> clearer. They both have different passwords and rsa keys and I would like
> to be able to make the distinction in the logs. Currently ssh only logs
> that a ROOT user has logged in, not which one.
hm, i don't think uid sharing is a standard unix
2004 Jul 14
3
Logging of wrong pubkey auth
Hello ml,
i've set up a ssh server with public-key authentication.
But soon i realized that wrong pubkey authentications are not shown in the logs.
So i wrote a small patch for monitor.c included as attachement.
patch against 3.8.1p1
$ patch -p0 < /path/to/keyauth-loggin.patch
Kindly regards,
Jan Gehring
2014 Mar 21
0
For all algorithms lovers, Introducing the algorithm repository
Hi,
We have developed an algorithm repository(built on rubyonrails framework)
which contains ~ 245 algorithms from 51 different sources. Check out -
http://algorithm.daqwest.com
Hope u like it! Would be very glad to have ur feedback and suggestions! You
can drop us a note at contact.daqwest-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org
Follow us on facebook <https://www.facebook.com/daqwest>
2012 Nov 24
0
ssh-keyscan continuity patch --
I apologize, this patch should have been sent awhile ago. Between a lot
of things that needed to be completed at work as a sysadmin for the
Research Computing group at Purdue University and retiring from work
after 38 years at the end of May (2012), I basically ignored it. This
patch is from a clone of my workstation that I just activated at home.
The patch was primarily written to fix the
2013 Sep 24
2
Multiple keys/methods per key exchange (e.g. multi-md5-sha1-md4@libssh.org) Re: [PATCH] curve25519-sha256@libssh.org key exchange proposal
On Tue, Sep 24, 2013 at 10:21 PM, Aris Adamantiadis <aris at 0xbadc0de.be> wrote:
[snip]
> I've worked this week on an alternative key exchange mechanism, in
> reaction to the whole NSA leaks and claims over cryptographic backdoors
> and/or cracking advances. The key exchange is in my opinion the most
> critical defense against passive eavesdropping attacks.
> I believe
2005 Dec 08
0
Genetic Algorithms with rbga.bin using AIC as the evalFunc
Hi all.
I would like to use the rbga.bin function (from the "genalg" package) as
part of a model selection process to whittle down a list of ~40
potential explanatory variables to only the most important ones.
Unfortunately, despite my working knowledge of R for linear modeling and
basic statistics, I cannot understand the two examples provided with the
documentation for rbga.bin
2012 May 24
0
Btrfs and more compression algorithms
Hi Chris, Hi Josef,
Hi Btrfs-List and all other Btrfs-devs that I''ve forgot,
is there a chance we''ll see a xz file-compression support in Btrfs
anytime soon ?
I''m sure folks have been waiting for additional compression support
besides gzip and lzo (bzip2 seems out of question due to its slowness,
there''s pbzip2 but that''s not included in the
2002 Sep 17
0
ga: genetic algorithms package
Dear all,
at the following address
http://linaria.dst.unive.it/~claudio/R/Rmaterial.html#ga
you can download a package to build simple genetic algorithms. I wrote
this package to introduce genetic algorithms to student in labs, which
means, the package emphasize "how a ga works" instead of "how
fast it could be".
Please, let me know any comments or suggestions,
Bests,
2013 Oct 28
0
Package for PAV and MPAV algorithms
Hi experts,
Is there any packag for PAV and MPAV algorithms (Pattern Anomaly Value)
[[alternative HTML version deleted]]
2003 Dec 21
0
Software/algorithms for competing risks analysis
Dear R group:
I am compiling a list of available algorithms/macros/software for
performing the following types of competing risks analyses:
(1) cumulative (crude) incidence regression
(2) Gray's K-sample log-rank test for cmulative incidence
(3) multi-state models
(4) dependent competing risks modeling with (a) copulas, (b) Robin's
Inverse probability of censoring weighted (IPCW)