similar to: Shell access to SSH KDF

Displaying 20 results from an estimated 1000 matches similar to: "Shell access to SSH KDF"

2014 Apr 02
1
Openssh KDF testing
Hello Everyone, I am writing code to test derive_keys functionality. The function signature is: static u_char * derive_key(Kex *kex, int id, u_int need, u_char *hash, u_int hashlen, BIGNUM *shared_secret) Now, the input which is provided to us is K(share_secret) as an array of characters. H(Hash) as an array of characters. Session_id as an array of characters Now, first I converted hash
2006 Apr 07
1
Bell Canada Requests $987.14 Rate increase 9 11 /VOIP Providers
If you are a Canadian VoIP provider or CLEC, help make a difference by joining the CAVP: www.cavp.ca >OMFG, >I thought April Fools day was over. This is hard to believe. If true it >tells me that Bell has not changed at all. They are still trying to >manipulate and take advantage of the parts of the market they have absolute >control over. The CRTC was right to continue to
2014 Mar 03
6
[Bug 2207] New: Potential NULL deference, found using coverity
https://bugzilla.mindrot.org/show_bug.cgi?id=2207 Bug ID: 2207 Summary: Potential NULL deference, found using coverity Product: Portable OpenSSH Version: -current Hardware: Other OS: FreeBSD Status: NEW Severity: enhancement Priority: P5 Component: sshd Assignee:
2013 May 23
1
Time for key stretching in encrypted private keys?
In 0.9.7 the private key encryption was switched from 3DES to AES, (https://bugzilla.mindrot.org/show_bug.cgi?id=1550) the motivation for this being that 128-bits of security is better than the 112 or so you get from 3DES these days. Interestingly that bug is about upgrading to AES-256, but we ended up with AES-128. Presumably due to the Solaris crippling? However ssh-keygen still uses a
2006 May 02
0
The CAVP is now accepting memberships applications
On-line signup form are available on our website at www.cavp.ca in the "Membership" section or please call 1-866-940-CAVP (2287) and select option 3 (CAVP treasurer). -------------- The CAVP is now accepting memberships applications. This is a pivotal moment for the CAVP and we need your support. Establishing a solid membership base will determine the organizations ability to function
2006 Feb 15
0
[CAVPdiscussion] OT: RFC: Canadian Association o f Voice over IP Users (CAVU)
In the latest CAVP conference call, the membership body voted to restrict membership to VoIP LEC's and to create a seperate membership body for any other parties interested in contributing to the CAVP's efforts in CRTC lobbying and providing a unified industry presence in the Canadian telco industry with a view to VoIP services. Accordingly, I would like to propose an adjutant association
2020 Apr 25
2
[PATCH 1/3] Add private key protection information extraction to ssh-keygen
Add private key protection information extraction to shh-keygen using -v option on top of -y option which is already parsing the private key. Technically, the passphrase isn't necessary to do this, but it is the most logical thing to do for me. Adding this to -l option is not appropriate because fingerprinting is using the .pub file when available. An other idea is to add a new option, I
2024 May 16
1
PEM_write_ed25519
For no particular reason, i'm looking to convert my ed25519 private key to pem. A user on stackoverflow suggested running `ssh-keygen -p -f path/to/your/key -m pem` [^1], which errors, printing `do_convert_to_pem: unsupported key type ED25519`. Looking at the corresponding line in source, it seems that only RSA, DSA, & ECDSA keys can be converted to pem.[^2] With new keys defaulting
2006 May 15
0
Ottawa Asterisk User Group Kickoff - Wed -- May 17 -- 5:00
Hello, Please join us Wednesday May 17th for an informal kickoff to openly discuss and formulate a plan to resurrect the Ottawa Asterisk User Group as well as discuss additional topics of interest that impact the VOIP marketplace and may also be included in our collective strategy. We'll also hear from the folks responsible for the Canadian Association of VOIP Providers (CAVP)
2023 Jul 31
5
Call for testing: OpenSSH 9.4
Hi, OpenSSH 9.4 is almost ready for release, so we would appreciate testing on as many platforms and systems as possible. This is a bugfix release. Snapshot releases for portable OpenSSH are available from http://www.mindrot.org/openssh_snap/ The OpenBSD version is available in CVS HEAD: http://www.openbsd.org/anoncvs.html Portable OpenSSH is also available via git using the instructions at
2019 Jan 19
4
Can we disable diffie-hellman-group14-sha1 by default?
I'm not sure if collision resistance is required for DH key derivation, but generally, SHA-1 is on its way out. If it's possible (if there's not a very large percentage of servers that do not support anything newer), it should be disabled.
2004 Aug 23
1
Update -> Someone with "Access Denied" from Windows plstry this test to compare notes with me
I do if you're interested... -----Original Message----- From: Gerald (Jerry) Carter [mailto:jerry@samba.org] Sent: Monday, August 23, 2004 11:45 AM To: mlueck@lueckdatasystems.com Cc: samba@lists.samba.org Subject: Re: [Samba] Update -> Someone with "Access Denied" from Windows plstry this test to compare notes with me -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Michael
2015 Jul 29
0
Fedora change that will probably affect RHEL
On Jul 29, 2015, at 3:16 PM, Chris Murphy <lists at colorremedies.com> wrote: > > On Wed, Jul 29, 2015 at 2:15 PM, Warren Young <wyml at etr-usa.com> wrote: >> Just because one particular method of prophylaxis fails to protect against all threats doesn?t mean we should stop using it, or increase its strength. > > Actually it does.There is no more obvious head
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches? --- Scott Neugroschl | XYPRO Technology Corporation 4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string client_version_string. These are used just in a few functions and can easily be passed as parameters. Also, there is a strange construct, where their memory is allocated to the global pointers, then copies of these pointers are assigned to the kex structure. The kex_free finally frees them via cleanup of the kex
2023 Aug 10
1
Announce: OpenSSH 9.4 released
OpenSSH 9.4 has just been released. It will be available from the mirrors listed at https://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support. Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested
2023 Aug 09
1
Call for testing: OpenSSH 9.4
Compiled on OpenIndiana using GCC 11 :; SunOS 5.11 illumos-2e79e00041 illumos Although snapshot was downloaded, it shows 9.3 version: :; ssh -V OpenSSH_9.3p1-snap20230809, OpenSSL 1.1.1v? 1 Aug 2023 Thanks and regards. On 31.07.2023 08:12, Damien Miller wrote: > Hi, > > OpenSSH 9.4 is almost ready for release, so we would appreciate testing > on as many platforms and systems as
2014 Jan 30
0
Announce: OpenSSH 6.5 released
Changes since OpenSSH 6.4 ========================= This is a feature-focused release. New features: * ssh(1), sshd(8): Add support for key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein's Curve25519. This key exchange method is the default when both the client and server support it. * ssh(1), sshd(8): Add support for Ed25519 as a public key type. Ed25519 is a
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
Dear OpenSSH developers, I've worked this week on an alternative key exchange mechanism, in reaction to the whole NSA leaks and claims over cryptographic backdoors and/or cracking advances. The key exchange is in my opinion the most critical defense against passive eavesdropping attacks. I believe Curve25519 from DJB can give users a secure alternative to classical Diffie-Hellman (with fixed
2014 Jan 17
15
Call for testing: OpenSSH-6.5
Hi, OpenSSH 6.5 is almost ready for release, so we would appreciate testing on as many platforms and systems as possible. This release contains some substantial new features and a number of bugfixes. Snapshot releases for portable OpenSSH are available from http://www.mindrot.org/openssh_snap/ The OpenBSD version is available in CVS HEAD: http://www.openbsd.org/anoncvs.html Portable OpenSSH is