similar to: checking for "dh_gen_key: group too small" errors

Displaying 20 results from an estimated 1000 matches similar to: "checking for "dh_gen_key: group too small" errors"

2015 Mar 14
3
[Bug 2365] New: openssh client ignores -o Tunnel=ethernet option, creating an IP tunnel device instead of an ethernet tap device
https://bugzilla.mindrot.org/show_bug.cgi?id=2365 Bug ID: 2365 Summary: openssh client ignores -o Tunnel=ethernet option, creating an IP tunnel device instead of an ethernet tap device Product: Portable OpenSSH Version: 6.6p1 Hardware: amd64 OS: Linux Status: NEW
2024 Feb 05
0
Server-side algorithms selection
Hi, according to RFC 4253 https://www.rfc-editor.org/rfc/rfc4253#section-7.1 for the selection of algorithms (ciphers, KEX, MAC etc.), the leftmost matching client algorithm is picked. While this is fine in most cases, there are cases where it is not desirable, for example: 1) for compatibility with a single old client you enable an old cipher, say aes128-cbc, server side. A modern client
2013 Dec 11
1
Why ssh client breaks connection in expecting SSH2_MSG_NEWKEYS state?
I have a client host that I don't have access to now, which attempts to establish ssh connection back to my BSD server using the private key. Client runs this command: /usr/bin/ssh -i ~/.ssh/my_key_rsa -o "ExitOnForwardFailure yes" -p $HPORT $HUSER@$HOST -R $LPORT:localhost:$LPORT -N On the server debug log looks like this: Connection from NNN.NNN.NNN.NNN port 43567 debug1: HPN
2016 Apr 28
4
Centos hold me back from work - sshd ...bull
ine-imac-andy:~ andy$ ssh 141.52.135.21 @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that a host key has just been
2005 Jun 16
1
Bug report: first_kex_packet_follows behaviour seems wrong
Hello, It seems to me the algorithm negotiation of the transport layer has a bug, it does not follow the specification of draft-ietf-secsh-transport-24, page 19, where the behaviour of first_kex_packet_follows is specified. I've got an ssh client that sends an SSH_MSG_KEXINIT message and specifies only 'diffie-hellman-group1-sha1' as key exchange algorithm. It sets
2014 May 28
1
sftp session disconnects right after passwd enter
Greetings All, I have a ssh server which allows sftp connections from the Internet while ssh connections from within the local net, here is the config: Code: Port 11111 Port 11113 Protocol 2 LogLevel DEBUG
2014 Mar 31
1
Version string
6.2p2 prints the same version string in the debugging output as it does when invoked with -V: % ssh -V OpenSSH_6.2p2, OpenSSL 0.9.8y 5 Feb 2013 % ssh -v nonesuch |& head -1 OpenSSH_6.2p2, OpenSSL 0.9.8y 5 Feb 2013 6.3p1 and newer don't - I don't have anything at hand that runs 6.3p1, but here are 6.[456]p1: % ssh -V OpenSSH_6.4p1, OpenSSL 1.0.1e-freebsd 11 Feb 2013 % ssh -v
2017 Sep 12
0
Load R data files
The object you load has the same name as the object you saved. In this case datahs0csv and not the name of the file sans .rda On Di., 12. Sep. 2017, 21:26 AbouEl-Makarim Aboueissa < abouelmakarim1962 at gmail.com> wrote: > Dear All: > > > It was saved, but there was a space somewhere. So it works for me now. > > I do have another similar problem. > > I saved an R
2013 Mar 22
1
Experiencing kernel panic with SSH + LVM + Xen + significant amounts of data
Hi all, I''m running into a kernel panic with Xen, under fairly specific circumstances. I''ll post it here first, and follow up on xen-devel if it looks like it''s a Xen bug. After some experimentation, it seems like the panic occurs under the following circumstances: 1) A significant amount of data is being moved 2) ...Onto (or off of?) an LVM partition 3)
2012 Aug 14
3
[Bug 2033] New: Should exit correctly when connection is lost
https://bugzilla.mindrot.org/show_bug.cgi?id=2033 Priority: P5 Bug ID: 2033 Assignee: unassigned-bugs at mindrot.org Summary: Should exit correctly when connection is lost Severity: enhancement Classification: Unclassified OS: Linux Reporter: icegood1980 at gmail.com Hardware: Other Status:
2017 Sep 12
2
Load R data files
Dear All: It was saved, but there was a space somewhere. So it works for me now. I do have another similar problem. I saved an R data file save(datahs0csv,file=" F:\Fall_2017\5-STA574\2-Notes\1-R\1-R_new\chapter4-Entering_Data/datahs0csv2 .rda") *The new R data file "*datahs0csv2.rda*" is in the directory.* I tried to load the file "" to R, but I got an error
2016 Apr 28
0
Centos hold me back from work - sshd ...bull
On 4/28/2016 2:09 AM, Andreas Benzler wrote: > ine-imac-andy:~ andy$ ssh -vvvandy at 141.52.135.21 > debug1: Remote protocol version 2.0, remote software version OpenSSH_5.9p1 Debian-5ubuntu1.8 > debug1: match: OpenSSH_5.9p1 Debian-5ubuntu1.8 pat OpenSSH_5* compat 0x0c000000 thats not CentOS. are you sure you're connecting to the right address ? -- john r pierce, recycling bits
2017 Sep 12
0
Load R data files
Hi Abou, You haven't saved the datahs0csv. When you are done manipulating datahs0csv you can use save(datahs0csv, file = 'datahs0csv.rda'). Then you should be able to load the data. HTH Ulrik On Tue, 12 Sep 2017, 20:46 AbouEl-Makarim Aboueissa < abouelmakarim1962 at gmail.com> wrote: > Dear All: > > I am trying to load an R data set, but I got the following message.
2000 Feb 15
1
Rekeying
Hello, I apologize that this is slightly off topic. According to the Internet Draft I found for SSH ver 1 (draft-ietf-tls-ssh-00.txt from Jun 13, 1996), the client or server can send a SSH_MSG_KEXINIT at any time to force a new key exchange. I looked through the code for OpenSSH and ssh-1.2.27 and can't find where it does this. I then searched the Secure Shell mailing list archives and saw
2018 Jan 03
2
SSHD and PAM
Hi I am trying to write pam_radius module which talks to RADIUS server for aaa. I see sshd checks /etc/passwd for user list. Since RADIUS server has user list, can sshd ignore this check for RADIUS/TACACS+ authentication, Please suggest if there are any flags to control it. I am using the following versions. OpenSSH_6.6p1, OpenSSL 1.0.2n 7 Dec 2017 I see sssd (NAS) being used for such use
2017 Sep 12
3
Load R data files
Dear All: I am trying to load an R data set, but I got the following message. Please see below. The file is there. setwd("F:/Fall_2017/5-STA574/2-Notes/1-R/1-R_new/chapter4-Entering_Data") datahs0csv <- read.table("hs0.csv", header=T, sep=",") attach(datahs0csv) detach(datahs0csv) rm(list=ls()) Then I tried to reload the data, but I got this error message. I
2014 May 06
6
[Bug 2239] New: ssh-keygen cannot handle Linux with 64 char long hostname
https://bugzilla.mindrot.org/show_bug.cgi?id=2239 Bug ID: 2239 Summary: ssh-keygen cannot handle Linux with 64 char long hostname Product: Portable OpenSSH Version: 6.6p1 Hardware: All OS: Linux Status: NEW Severity: minor Priority: P5 Component: ssh-keygen
2011 Sep 30
2
Interop problem with old dropbear and new openssh
Hi, I have a router running an old version of OpenWRT with an old version of dropbear (Dropbear sshd v0.44test3). It has been working for many years and I ssh in from my desktop systems (running Debian Testing) with no problem. However, recently I upgraded one of my desktops and I can no longer connect to the router. Dropbear on the router is exiting with: exit before auth: bad
2016 Nov 08
4
one host only: ssh_dispatch_run_fatal
Darren Tucker <dtucker at zip.com.au> writes: > On Tue, Nov 8, 2016 at 2:43 PM, Harry Putnam <reader at newsguy.com> wrote: >> Darren Tucker <dtucker at zip.com.au> writes: >> >>> On Tue, Nov 8, 2016 at 1:02 PM, Harry Putnam <reader at newsguy.com> wrote: >>> [...] >>>> gv harry> ssh -vv 2x >>>> >>>>
2014 Jun 20
1
malformed DNS query
On CoreOS, runnng openssh sshd version "OpenSSH_6.6p1-hpn14v4, OpenSSL 1.0.1g", when connecting the following query is sent to the DNS server: query[A] 2.2.0.10.in-addr.arpa Which makes no sense, it's an "A" request for a reverse record. Adding "UseDNS no", prevent the request (proving that the request does come from sshd). When connecting to machines