similar to: Documentation for OpenSSL

Displaying 20 results from an estimated 20000 matches similar to: "Documentation for OpenSSL"

2007 Dec 10
2
Help with encryption
So I have this key information that I got by generating a private and public key in VB, but it gave it to me in the form of a modulus and exponent in an XML file. Now, I need to encrypt some stuff in ruby using that info. On this site: http://blog.internautdesign.com/2007/11/2/ruby-openssl-rsa-public-key-from-modulus-and-exponent/comments/165, they explain how to do that, but clearly this info is
2006 Sep 06
0
FreeBSD Security Advisory FreeBSD-SA-06:19.openssl
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ============================================================================= FreeBSD-SA-06:19.openssl Security Advisory The FreeBSD Project Topic: Incorrect PKCS#1 v1.5 padding validation in crypto(3) Category: contrib Module: openssl
2010 Mar 05
1
WEBrick 500 error only with https
I have an application i''m installing on my application server. I''ve been using WEBrick and for now i''d like to just keep using it working in prototype development mode. This works fine on my development machine using both http and https, where the host is ''localhost'' (ports 3000,3001). It also works fine on the application server http port 3000. The
2011 Feb 21
1
A possible typo in sshd(8) ?
>>>> AUTHORIZED*_**KEYS FILE* FORMAT *AuthorizedKeysFile* specifies the file containing public keys for public key authentication; if none is specified, the default is *~/.ssh/authorized_keys*. Each line of the file contains one key (empty lines and lines starting with a `#' are ignored as comments). Protocol 1 public keys consist of the following
2013 Dec 09
1
[Bug 2180] New: Improve the handling of the key comment field
https://bugzilla.mindrot.org/show_bug.cgi?id=2180 Bug ID: 2180 Summary: Improve the handling of the key comment field Product: Portable OpenSSH Version: 6.4p1 Hardware: All OS: All Status: NEW Severity: enhancement Priority: P5 Component: ssh-keygen Assignee: unassigned-bugs
2015 Apr 26
7
[Bug 2390] New: PROTOCOL.key mis-describes private section
https://bugzilla.mindrot.org/show_bug.cgi?id=2390 Bug ID: 2390 Summary: PROTOCOL.key mis-describes private section Product: Portable OpenSSH Version: 6.8p1 Hardware: All OS: All Status: NEW Severity: normal Priority: P5 Component: Documentation Assignee: unassigned-bugs at
2004 Nov 27
0
buffer_get_bignum2: negative numbers not supported
Hi I have added smartcard support to PuTTY and this worked fine until yesterday when we replaced one of our Slackware-9 machines by a Slackware-10 one. Slackware-9 contained OpenSSH 3.5p1 while Slackware-10 has OpenSSH 3.8.1p1. Now the same keys that worked before do not work anymore and OpenSSH fails with buffer_get_bignum2: negative numbers not supported I first supected that my
2020 Nov 16
0
no shared cipher openssl
> On 16/11/2020 09:54 lists at lazygranch.com <lists at lazygranch.com> wrote: > > > On Sun, 15 Nov 2020 17:31:07 -0500 > Mike Schroeder <mikeschroe at gmail.com> wrote: > > > CentOS 7 > > Dovecot 2.2.36 > > > > Nov 14 07:13:08 mail dovecot: pop3-login: Disconnected (no auth > > attempts in 0 secs): > > user=<>,
2015 Oct 15
2
Segfault on invalid SSH keys.
Hi, I reported a bug against the Debian distribution, but it might be more useful to report it here. Via fuzzing I discovered a key which will cause the ssh-keygen process to segfault when fingerprinting via: ssh-keygen -l -f bogus.key This segfault is a NULL pointer dereference, and is a denial of service attack if you run a service which allows SSH keys to be uploaded and
2002 Jan 31
7
x509 for hostkeys.
This (very quick) patch allows you to connect with the commercial ssh.com windows client and use x509 certs for hostkeys. You have to import your CA cert (ca.crt) in the windows client and certify your hostkey: $ cat << 'EOF' > x509v3.cnf CERTPATHLEN = 1 CERTUSAGE = digitalSignature,keyCertSign CERTIP = 0.0.0.0 [x509v3_CA]
2006 Apr 12
3
uninitialized constant OpenSSL::Digest::SHA1
I just updated my ruby from 1.8.2 to the Windows Installer 184-16 RC1, and now when I try to start Webrick I get the following: c:/program files/dev/ruby/lib/ruby/site_ruby/1.8/rubygems/security.rb:18: uninitialized constant OpenSSL::Digest::SHA1 (NameError) from c:/program files/dev/ruby/lib/ruby/site_ruby/1.8/rubygems.rb:397 from c:/program
2000 May 14
0
OpenSSH 2.1.0+OpenSSL 0.9.5a+RSAref 2.0 trouble
Hello. I have been having trouble configuring the source code for the abovementioned. I have to use RSARef as I'm a resident of the USA, so I can avoid patent violation. The configure script fails to see the OpenSSL+RSAref mix on three different platforms, including the following: FreeBSD 4.0-STABLE (Which has its own port, but I wanted to try it there to see if I could reliably reproduce
2006 Sep 28
1
Fw: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-06:23.openssl
Bill Moran wrote: > Can anyone define "exceptionally large" as noted in this statement?: > > "NOTE ALSO: The above patch reduces the functionality of libcrypto(3) by > prohibiting the use of exceptionally large public keys. It is believed > that no existing applications legitimately use such key lengths as would > be affected by this change." > > It
2011 Nov 14
1
Is there a documentation of the key file formats?
Hello, part of a usual OpenSSH installation are quite some files containing key material, like private keys (id_rsa, id_dsa, id_ecdsa) and the corresponding public keys (id_rsa.pub, id_dsa.pub, id_ecdsa.pub). Inspired by a recent question on Stack Overflow [1], I had a look at the OpenSSH documentation to see what format these key files have. The sshd man page [2] contains some paragraphs about
2016 Apr 01
4
[Bug 2560] New: sshd: Description of hashed known_hosts file does not make sense and format is outdated
https://bugzilla.mindrot.org/show_bug.cgi?id=2560 Bug ID: 2560 Summary: sshd: Description of hashed known_hosts file does not make sense and format is outdated Product: Portable OpenSSH Version: -current Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5
2007 Mar 29
0
using certificates with ActiveResource
I''m trying to hack ActiveResource to use a self-signed certificate when connecting to my RESTful rails app (seems like a pretty glaring hole that it doesn''t offer this out of the box... though I guess it is alpha software). I started out going through the ActiveResource code looking for somewhere I could set the cert and key. Didn''t find it, so I took the approach
2003 Dec 05
1
TLS: hostname doesn't match CN??
Hi, I'm configuring Samba 3.0 to store users in ldap server. I've configured openldap 2.1 with SSL and it worked properly with ldap commands but when I try using then smbpasswd command it reports me the error: failed to bind to server with dn= cn=Manager,dc=openwired,dc=net Error: Can't contact LDAP server TLS: hostname does not match CN in peer certificate Connection to
2016 Nov 02
0
v2.2.26.0 released
On 2016-11-02, Aki Tuomi <aki.tuomi at dovecot.fi> wrote: > If the standard way works, I am happy to include the original patch I > sent, amended so that it checks for presence of LIBRESSL_VERSION_NUMBER. > If they keep this promise, then we should have no worries about things > breaking up. Diff below is what I've added to OpenBSD ports. The libressl API is not cast in
2010 Aug 24
1
The length of an RSA signature sent during the handshake
I have noticed that OpenSSH clients (at least version 5.1p1) occasionally send an RSA signature during the handshake phase such that if the RSA key pair used to generate it happens to be associated to an N-byte long modulus, the signature is N - 1 bytes long. My question is, Is this behavior correct? I mean, an RSA signature is an unstructured byte string, and therefore any leading zeros should be
2020 Nov 15
1
no shared cipher openssl
CentOS 7 Dovecot 2.2.36 Nov 14 07:13:08 mail dovecot: pop3-login: Disconnected (no auth attempts in 0 secs): user=<>, rip=73.0.0.0, lip=192.64.118.242, TLS handshaking: SSL_accept() failed: error:1408A0C1:SSL routines:ssl3_get_client_hello:no shared cipher, session=<> Was working fine for over a year, until the cert expired and I replaced it. I've tried the good cert I have for