similar to: [Bug 2446] New: Provide an option to show SHA256 fingerprints in a more pronouncable format

Displaying 20 results from an estimated 3000 matches similar to: "[Bug 2446] New: Provide an option to show SHA256 fingerprints in a more pronouncable format"

2015 Jan 07
11
[Bug 2332] New: Show more secure fingerprints than MD5 (e.g. SHA256) in ssh and ssh-keygen
https://bugzilla.mindrot.org/show_bug.cgi?id=2332 Bug ID: 2332 Summary: Show more secure fingerprints than MD5 (e.g. SHA256) in ssh and ssh-keygen Product: Portable OpenSSH Version: 6.6p1 Hardware: Other OS: All Status: NEW Severity: enhancement Priority: P5
2015 Aug 05
27
[Bug 2439] New: New sha256-base64 SSH Fingerprints in openssh-6.8
https://bugzilla.mindrot.org/show_bug.cgi?id=2439 Bug ID: 2439 Summary: New sha256-base64 SSH Fingerprints in openssh-6.8 Product: Portable OpenSSH Version: 6.9p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: Miscellaneous Assignee:
2010 Mar 12
1
Problem with libvirt migration
I have two hosts, vm1 and vm2, which are both running libvirt 0.7.0. They share a common ocfs2 file system that resides on a san, and have identical network configurations. I am running qemu-kvm 0.11.0 on ubuntu 9.10 servers. I start base32 on vm1 and it comes up (it also runs fine if started on vm2). Then from vm2 I do: vm2#: virsh -c qemu://vm1/system migrate --live base32 qemu://vm2/system
2014 Feb 18
1
[PATCH] verify against known fingerprints
I've just written this patch, it's undergone minimal testing and "works for me" and I'm after feedback as to acceptability of approach, anything I should be doing differently for the feature to be acceptable upstream and what I should be doing about automated testing. Use-case: you have the host's SSH fingerprints via an out-of-band mechanism which you trust and want to
2001 Feb 07
2
DSA Fingerprints...
Hello, Questions, observations, and curiosities. Maybe this is something stupid or maybe I'm doing something wrong... But... In light of the Kurt Seifried paper on SSH and SSL, I was looking for the finger prints on my various servers and known hosts files to have a little crib sheet and maybe plug the list into a database on my palm pilot. I found that ssh-keygen lists out the
2013 Jun 27
0
CentOS 5.9 and google-authenticator
I'm playing with google-authenticator libpam https://code.google.com/p/google-authenticator/ It appears to be failing the "make test" on CentOS 5.9 32bit. ./pam_google_authenticator_unittest Testing base32 encoding Testing base32 decoding Testing HMAC_SHA1 Loading PAM module Running tests, querying for verification code Testing failed login attempt Testing
2002 Jun 14
0
[Bug 279] New: ssh-keyscan can't check for fingerprints
http://bugzilla.mindrot.org/show_bug.cgi?id=279 Summary: ssh-keyscan can't check for fingerprints Product: Portable OpenSSH Version: -current Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P2 Component: Miscellaneous AssignedTo: openssh-unix-dev at mindrot.org
2013 Oct 27
1
[Bug 1872] Support better hash algorithms for key fingerprints (FIPS compat)
https://bugzilla.mindrot.org/show_bug.cgi?id=1872 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |djm at mindrot.org Summary|proposal how to change |Support better hash
2014 Dec 17
0
[Bug 1872] Support better hash algorithms for key fingerprints (FIPS compat)
https://bugzilla.mindrot.org/show_bug.cgi?id=1872 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #2007|0 |1 is obsolete| | Attachment #2429|0 |1 is
2015 Feb 17
1
[PATCH] builder: when not checking sigs, ignore --fingerprint args (RHBZ#1193237)
When the user chooses to not verify the signatures on the indexes (using --no-check-signature), there is no point in requiring as many --fingerprint as --source (or even just one), as they will not be used anyway. In this case just ignore all the values of the specified --fingerprint arguments. --- builder/cmdline.ml | 19 ++++++++++++------- 1 file changed, 12 insertions(+), 7 deletions(-)
2001 Jan 14
1
openssh 2.3.0p1 doesn't show fingerprints
On Sat, Jan 13, 2001 at 09:33:24PM -0800, Noam Sturmwind wrote: > I've noticed that in openssh 2.3.0 when I connect to a new server or to > one on which the host key has changed, it warns me that the key is unknown > or changed, but doesn't show me the host key fingerprint so I can verify > it. This goes for both protocols 1 (RSA host key) and 2 (DSA host key). I > remember
2009 Apr 26
0
[Bug 1592] New: Fingerprints for SSHD host key don't match (local ssh-keygen -l vs. ssh localhost)
https://bugzilla.mindrot.org/show_bug.cgi?id=1592 Summary: Fingerprints for SSHD host key don't match (local ssh-keygen -l vs. ssh localhost) Product: Portable OpenSSH Version: 5.1p1 Platform: Other OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: sshd
2003 May 25
2
assign() won't work
Hey everyone, I've been searching the mail lists, and I can't find a real discussion about my problem. Here it is: I have created a loop fitting various time series models to my data. I labeled each one of the outputs by using the assign and paste statements, i.e. assign(paste("group","subgroup",i),arima(...)). Works great, but here's what I need... I want to
2010 Feb 24
0
live migration not working correctly
I have two servers running Ubuntu 9.10, with shared disk from ISCSI SAN and OCFS2, identical network configurations, shared ssh keys, and pki keys. My vm will boot from either machine and run correctly. When I attempt to do a live migration with "migrate --live base32 qemu +[ssh/tcp]://vm1/system" it initiates the vm on the other server, but leaves the vm on the current server in the
2004 Sep 10
1
[Flac-users] Re: Fingerprint Verification Problem
--- "David W. Tamkin" <dattier@panix.com> wrote: > Our Leader asked, > > | In any case, if you run flac -t and it passes, the only extra > | information you get from comparing the MD5 sum to the text > | file is to know if the original seeder put the right text file > | together with the right FLAC file. But if you don't need the > | contents of the text
2020 Sep 08
3
ssh: case insensitive fingerprint validation
Hello! I noticed the ssh client now allows you to paste a fingerprint at the host key verification question which I thought was pretty cool and a welcome feature. When testing it out I discovered it did not care about the case of the entered hash, and looking at sshconnect.c I see strcasecmp() is used which explains why. I'm just curious if this was a deliberate decision or if it would make
2015 Aug 05
2
[PATCH 1/1] document all hash algorithms available for key fingerprint display
From: Christian Hesse <mail at eworm.de> Signed-off-by: Christian Hesse <mail at eworm.de> --- ssh_config.5 | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/ssh_config.5 b/ssh_config.5 index 5b0975f..28f7714 100644 --- a/ssh_config.5 +++ b/ssh_config.5 @@ -649,9 +649,13 @@ The default is .It Cm FingerprintHash Specifies the hash algorithm used when
2007 May 14
0
[SAMBA-SECURITY] CVE-2007-2446: Multiple Heap Overflows Allow Remote Code Execution
Spam detection software, running on the system "mail.montanhydraulik.com", has identified this incoming email as possible spam. The original message has been attached to this so you can view it (if it isn't spam) or label similar future email. If you have any questions, see postmaster for details. Content preview: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
2007 May 14
0
Patched 3.0.24 tree for CVE-2007-2444, CVE-2007-2446, and CVE-2007-2447
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Folks, As a small means of community service, I've decided to provide an unofficial patched version of 3.0.24 (tagged as 3.0.24-gc-1) to address the CVE-2007-2444, CVE-2007-2446, and CVE-2007-2447 security advisories. The bzr branch is hosted at http://people.samba.org/bzr/jerry/samba-3-0-24-gc.bzr/ The source tarball is available from
2001 Jan 12
1
Key fingerprint feature request
Hi, Does anyone know what algorithm the commercial ssh-2.3.0 uses to display the key fingerprints ? On the manual it says the algorithm is 'bubble babble' but I didn't find out how to actually create this bubble string (I guess I could find out from the sources). I think that it would be a nice option if OpenSSH could print out the host keys fingerprint in same format as the