Displaying 20 results from an estimated 20000 matches similar to: "Documentation for OpenSSL"
2007 Dec 10
2
Help with encryption
So I have this key information that I got by generating a private and
public key in VB, but it gave it to me in the form of a modulus and
exponent in an XML file. Now, I need to encrypt some stuff in ruby using
that info. On this site:
http://blog.internautdesign.com/2007/11/2/ruby-openssl-rsa-public-key-from-modulus-and-exponent/comments/165,
they explain how to do that, but clearly this info is
2006 Sep 06
0
FreeBSD Security Advisory FreeBSD-SA-06:19.openssl
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-06:19.openssl Security Advisory
The FreeBSD Project
Topic: Incorrect PKCS#1 v1.5 padding validation in crypto(3)
Category: contrib
Module: openssl
2010 Mar 05
1
WEBrick 500 error only with https
I have an application i''m installing on my application server. I''ve
been
using WEBrick and for now i''d like to just keep using it working in
prototype development mode. This works fine on my development machine
using both http and https, where the host is ''localhost'' (ports
3000,3001). It also works fine on the application server http port
3000.
The
2011 Feb 21
1
A possible typo in sshd(8) ?
>>>>
AUTHORIZED*_**KEYS FILE* FORMAT
*AuthorizedKeysFile* specifies the file containing public keys for public
key authentication; if none is specified, the default is
*~/.ssh/authorized_keys*. Each line of the file contains one key (empty
lines and lines starting with a `#' are ignored as comments). Protocol 1
public keys consist of the following
2013 Dec 09
1
[Bug 2180] New: Improve the handling of the key comment field
https://bugzilla.mindrot.org/show_bug.cgi?id=2180
Bug ID: 2180
Summary: Improve the handling of the key comment field
Product: Portable OpenSSH
Version: 6.4p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh-keygen
Assignee: unassigned-bugs
2015 Apr 26
7
[Bug 2390] New: PROTOCOL.key mis-describes private section
https://bugzilla.mindrot.org/show_bug.cgi?id=2390
Bug ID: 2390
Summary: PROTOCOL.key mis-describes private section
Product: Portable OpenSSH
Version: 6.8p1
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: Documentation
Assignee: unassigned-bugs at
2004 Nov 27
0
buffer_get_bignum2: negative numbers not supported
Hi
I have added smartcard support to PuTTY and this worked fine
until yesterday when we replaced one of our Slackware-9 machines
by a Slackware-10 one.
Slackware-9 contained OpenSSH 3.5p1 while Slackware-10 has
OpenSSH 3.8.1p1.
Now the same keys that worked before do not work anymore and
OpenSSH fails with
buffer_get_bignum2: negative numbers not supported
I first supected that my
2020 Nov 16
0
no shared cipher openssl
> On 16/11/2020 09:54 lists at lazygranch.com <lists at lazygranch.com> wrote:
>
>
> On Sun, 15 Nov 2020 17:31:07 -0500
> Mike Schroeder <mikeschroe at gmail.com> wrote:
>
> > CentOS 7
> > Dovecot 2.2.36
> >
> > Nov 14 07:13:08 mail dovecot: pop3-login: Disconnected (no auth
> > attempts in 0 secs):
> > user=<>,
2015 Oct 15
2
Segfault on invalid SSH keys.
Hi,
I reported a bug against the Debian distribution,
but it might be more useful to report it here.
Via fuzzing I discovered a key which will cause
the ssh-keygen process to segfault when fingerprinting
via:
ssh-keygen -l -f bogus.key
This segfault is a NULL pointer dereference, and is
a denial of service attack if you run a service which
allows SSH keys to be uploaded and
2002 Jan 31
7
x509 for hostkeys.
This (very quick) patch allows you to connect with the commercial
ssh.com windows client and use x509 certs for hostkeys. You have
to import your CA cert (ca.crt) in the windows client and certify
your hostkey:
$ cat << 'EOF' > x509v3.cnf
CERTPATHLEN = 1
CERTUSAGE = digitalSignature,keyCertSign
CERTIP = 0.0.0.0
[x509v3_CA]
2006 Apr 12
3
uninitialized constant OpenSSL::Digest::SHA1
I just updated my ruby from 1.8.2 to the Windows Installer 184-16 RC1,
and now when I try to start Webrick I get the following:
c:/program
files/dev/ruby/lib/ruby/site_ruby/1.8/rubygems/security.rb:18:
uninitialized constant OpenSSL::Digest::SHA1 (NameError)
from c:/program files/dev/ruby/lib/ruby/site_ruby/1.8/rubygems.rb:397
from c:/program
2000 May 14
0
OpenSSH 2.1.0+OpenSSL 0.9.5a+RSAref 2.0 trouble
Hello.
I have been having trouble configuring the source code for the
abovementioned. I have to use RSARef as I'm a resident of the USA, so I
can avoid patent violation.
The configure script fails to see the OpenSSL+RSAref mix on three
different platforms, including the following:
FreeBSD 4.0-STABLE (Which has its own port, but I wanted to try it there
to see if I could reliably reproduce
2006 Sep 28
1
Fw: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-06:23.openssl
Bill Moran wrote:
> Can anyone define "exceptionally large" as noted in this statement?:
>
> "NOTE ALSO: The above patch reduces the functionality of libcrypto(3) by
> prohibiting the use of exceptionally large public keys. It is believed
> that no existing applications legitimately use such key lengths as would
> be affected by this change."
>
> It
2011 Nov 14
1
Is there a documentation of the key file formats?
Hello,
part of a usual OpenSSH installation are quite some files containing key material,
like private keys (id_rsa, id_dsa, id_ecdsa) and the corresponding public keys
(id_rsa.pub, id_dsa.pub, id_ecdsa.pub).
Inspired by a recent question on Stack Overflow [1], I had a look at the
OpenSSH documentation to see what format these key files have.
The sshd man page [2] contains some paragraphs about
2016 Apr 01
4
[Bug 2560] New: sshd: Description of hashed known_hosts file does not make sense and format is outdated
https://bugzilla.mindrot.org/show_bug.cgi?id=2560
Bug ID: 2560
Summary: sshd: Description of hashed known_hosts file does not
make sense and format is outdated
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
2007 Mar 29
0
using certificates with ActiveResource
I''m trying to hack ActiveResource to use a self-signed certificate when
connecting to my RESTful rails app (seems like a pretty glaring hole
that it doesn''t offer this out of the box... though I guess it is alpha
software).
I started out going through the ActiveResource code looking for
somewhere I could set the cert and key. Didn''t find it, so I took the
approach
2003 Dec 05
1
TLS: hostname doesn't match CN??
Hi,
I'm configuring Samba 3.0 to store users in ldap server.
I've configured openldap 2.1 with SSL and it worked properly with ldap
commands but when
I try using then smbpasswd command it reports me the error:
failed to bind to server with dn= cn=Manager,dc=openwired,dc=net Error:
Can't contact LDAP server
TLS: hostname does not match CN in peer certificate
Connection to
2016 Nov 02
0
v2.2.26.0 released
On 2016-11-02, Aki Tuomi <aki.tuomi at dovecot.fi> wrote:
> If the standard way works, I am happy to include the original patch I
> sent, amended so that it checks for presence of LIBRESSL_VERSION_NUMBER.
> If they keep this promise, then we should have no worries about things
> breaking up.
Diff below is what I've added to OpenBSD ports.
The libressl API is not cast in
2010 Aug 24
1
The length of an RSA signature sent during the handshake
I have noticed that OpenSSH clients (at least version 5.1p1)
occasionally send an RSA signature during the handshake phase such
that if the RSA key pair used to generate it happens to be associated
to an N-byte long modulus, the signature is N - 1 bytes long. My
question is, Is this behavior correct? I mean, an RSA signature is an
unstructured byte string, and therefore any leading zeros should be
2020 Nov 15
1
no shared cipher openssl
CentOS 7
Dovecot 2.2.36
Nov 14 07:13:08 mail dovecot: pop3-login: Disconnected (no auth attempts in
0 secs):
user=<>, rip=73.0.0.0, lip=192.64.118.242, TLS handshaking: SSL_accept()
failed:
error:1408A0C1:SSL routines:ssl3_get_client_hello:no shared cipher,
session=<>
Was working fine for over a year, until the cert expired and I replaced it.
I've tried the good cert I have for