Displaying 20 results from an estimated 4000 matches similar to: "Windows 10 instalation issue"
2019 Feb 15
3
Can we disable diffie-hellman-group-exchange-sha1 by default?
I don't think there is any point to generate so many moduli. Actually,
3 moduli of sizes 2048, 3072 and 4096 seem like a sane choice.
On Fri, Feb 15, 2019 at 7:58 AM Darren Tucker <dtucker at dtucker.net> wrote:
>
> On Fri, 15 Feb 2019 at 14:22, Yegor Ievlev <koops1997 at gmail.com> wrote:
> > I'm not nearly knowledgeable enough in crypto to fully understand your
2017 Feb 13
3
Logfile encoding question
Hello.
I've got a question about encoding in sshd's log files.
When I try to log in with a "?" username, which is a cyrillic "h" (U+0445),
I get this message in a logfile: input_userauth_request: invalid user
\\321\\205 [preauth].
I am struggling to understand: is that hex, is that octal? It doesn't map
to any encoding that I know of.
2020 Jun 01
5
"ssh -Q key" does not list rsa-sha2 algorithms
On Tue, 2 Jun 2020 at 06:12, Christian Weisgerber <naddy at mips.inka.de> wrote
> On 2020-06-01, Ethan Rahn <ethan.rahn at gmail.com> wrote:
>
> > With the upcoming deprecation of ssh-rsa I was trying to see what keys my
> > version of OpenSSH ( 7.8p1 ) supports. I noticed that "ssh -Q key" does not
> > actually list the suggested algorithms to
2018 Aug 17
3
Call for testing: OpenSSH 7.8
On SPARC Solaris 10, using Solaris' native OpenSSL and Solaris
Studio 12.2, I got the following errors:
run test agent-getpeereid.sh ...
ssh-add did not fail for nobody: 1 < 2
failed disallow agent attach from other uid
gmake[1]: *** [t-exec] Error 1
gmake[1]: Leaving directory
`/scratch/wieland/src/openssh/openssh-SNAP-20180817/regress'
gmake: *** [tests] Error 2
--
Jeff Wieland,
2016 Dec 20
2
Need Help to Fix CVE-2016-6210
Hi All,
Actually I am working with the OpenSSH version 6.2p which is vulnerable to
above mentioned vulnerabilities (CVE-2016-6210).
So am looking for some help how I can fix these vulnerabilities in my
version. I need to fix it in the OpenSSH code.
Regards
Abhishek
2017 Jan 10
2
Any interest in a patch for setting the syslog facility for the ssh client?
Hello,
I recently made a change to the openssh ssh client code to allow
configuring the client syslog facility to use. I made the change in
openssh-6.6p1. If there is interest I can port the change to the openssh
portable github.
Cheers,
Ethan
2017 Sep 21
2
Call for testing: OpenSSH 7.6
So far on FreeBSD 11.1
reject openssl 1.1.0
make with Openssl 1.0.2 l no issues
Attempt to test in openssl 1.0.2m -dev -fips
chokes on tests.
--
Member - Liberal International This is doctor@@nl2k.ab.ca Ici doctor@@nl2k.ab.ca
Yahweh, Queen & country!Never Satan President Republic!Beware AntiChrist rising!
https://www.empire.kred/ROOTNK?t=94a1f39b Look at Psalms 14 and 53 on Atheism
Talk
2018 Oct 22
2
[PATCH] ssh: Add missing openssl-compat.h where needed
OpenSSL_add_all_algorithms has been deprecated with 1.1. Compatibility
is needed.
Signed-off-by: Rosen Penev <rosenp at gmail.com>
---
ssh-keysign.c | 1 +
ssh_api.c | 2 ++
2 files changed, 3 insertions(+)
diff --git a/ssh-keysign.c b/ssh-keysign.c
index 744ecb4f..bcd1508c 100644
--- a/ssh-keysign.c
+++ b/ssh-keysign.c
@@ -40,6 +40,7 @@
#include <openssl/evp.h>
#include
2019 Feb 06
2
[PATCH] Remove unused since ssh1 protocol removal crc32.[ch]
A non-text attachment was scrubbed...
Name: 0001-Remove-unused-since-ssh1-protocol-removal-crc32.-ch.patch
Type: text/x-patch
Size: 20097 bytes
Desc: not available
URL: <http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20190206/ca9d8d10/attachment-0001.bin>
2017 Jan 24
2
Need information to bypass the preauth in openssh
Hi,
I am Vishwanath, I got one requirement from our clients regarding remote
authentication. In which all users info present in remote user database.
Currently using openssh for SSH connections.
To open a new remote session via SSH, the openssh will look into the
/etc/passwd file. If user present then it will allow to login using
password or key authentication.
But in my case all user info is
2017 Feb 15
2
Issue with ssh-keygen
Hi,
I am running openssh7.3p1 on an embedded Linux system and discovered this problem.
If I run:
ssh-keygen -t rsa1 -f testfile
it appears to generate the key and I get the output:
Generating public/private rsa1 key pair.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Saving key "testfile" failed: unknown or unsupported key type
Should this option
2019 Feb 15
2
Can we disable diffie-hellman-group-exchange-sha1 by default?
That doesn't seem to be the case. See
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf
(5.6.1 Comparable Algorithm Strengths)
On Fri, Feb 15, 2019 at 8:28 AM Darren Tucker <dtucker at dtucker.net> wrote:
>
> On Fri, 15 Feb 2019 at 16:00, Yegor Ievlev <koops1997 at gmail.com> wrote:
> > I don't think there is any point to generate so
2017 Feb 16
2
Issue with ssh-keygen
On Fri, Feb 17, 2017 at 09:28:52AM +1100, Darren Tucker wrote:
[...]
> so yeah, ssh-keygen should have probably errored out "unsupported key type".
diff --git a/sshkey.c b/sshkey.c
index 4768790..f45e239 100644
--- a/sshkey.c
+++ b/sshkey.c
@@ -89,7 +89,9 @@ static const struct keytype keytypes[] = {
{ "ssh-ed25519-cert-v01 at openssh.com", "ED25519-CERT",
2018 Feb 22
3
Attempts to connect to Axway SFTP server result in publickey auth loopin
We are attempting to use openssh sftp to connect to a server that is
running some version of the Axway SFTP server. After a publickey auth
completes, the server resends publickey as a valid auth. This results in
a loop as openssh sftp resubmits the publickey information. This seems
similar to a discussion in 2014 that terminated with the thought that it
might be nice if the client tracked
2016 Aug 02
2
OpenSSH 7.3p1 can't be build on Solaris 10
On Tue, Aug 2, 2016 at 12:52 AM, Darren Tucker <dtucker at zip.com.au> wrote:
[...]
>> Seems can't. But why? 7.2 does.
>
> Dunno, I can't think of any obvious changes to compiler flags. Maybe
> try it without setting CFLAGS?
OK, I think I see why it started in 7.3: it was when the wide
character support was added. In configure.ac:
dnl Wide character support. Linux
2016 Jul 21
2
Openssh use enumeration
On Thu, Jul 21, 2016 at 1:34 PM, Selphie Keller
<selphie.keller at gmail.com> wrote:
> yeah I like this idea, fixes the issue with blowfish hashes and non root
> passwords, maybe random delay as the final fall back if no salts/passwords
> are found.
Well if there are no accounts with a valid salt then there's also no
valid account to compare the timing of invalid accounts
2016 Jul 21
4
Openssh use enumeration
On Wed, Jul 20, 2016 at 09:02:57PM -0600, Selphie Keller wrote:
> I wonder if could be useful to set the fall back account to something user
> defined to avoid suggesting people add passwords to root, though I do like
> root since the account is always there,
Since committing that diff I've heard of people running in production
with no root password (ie *LK*, !! or similar).
2016 Jul 19
2
Openssh use enumeration
Hi, sorry I don't know if I send this to the correct channel.
I have notice that OpenSSH has recognized the presence of the user
enumeration as a vulnerability,
http://seclists.org/fulldisclosure/2016/Jul/51 (CVE-2016-6210).
I want to make an appreciation, this is a old vulnerability
already announced three years ago.
2017 Jan 19
4
Force sshd to prompt username
Hi, Can I send ssh request to sshd to prompt for username along with
password.
Ex:
cogan at localhost$ ssh myserver
Login:xyz
password:
Login is automatically taken as cogan, wanted to ignore this and
instead prompt login and take it from user, Please suggest.
Best Regards,
2017 Apr 07
2
Any interest in a patch for setting the syslog facility for the ssh client?
To revive this thread - I filed a bug in bugzilla.mindrot.org ( Bug 2705 -
https://bugzilla.mindrot.org/show_bug.cgi?id=2705 ).
I have a patch attached to the email that implements this as well. I wasn't
able to find a list of coding standards or contribution guidelines for
OpenSSH, so please correct me if I'm wrong. I'd also like to thank Jakuje
for helping me out with some info on