Displaying 20 results from an estimated 3000 matches similar to: "[Bug 2446] New: Provide an option to show SHA256 fingerprints in a more pronouncable format"
2015 Jan 07
11
[Bug 2332] New: Show more secure fingerprints than MD5 (e.g. SHA256) in ssh and ssh-keygen
https://bugzilla.mindrot.org/show_bug.cgi?id=2332
Bug ID: 2332
Summary: Show more secure fingerprints than MD5 (e.g. SHA256)
in ssh and ssh-keygen
Product: Portable OpenSSH
Version: 6.6p1
Hardware: Other
OS: All
Status: NEW
Severity: enhancement
Priority: P5
2015 Aug 05
27
[Bug 2439] New: New sha256-base64 SSH Fingerprints in openssh-6.8
https://bugzilla.mindrot.org/show_bug.cgi?id=2439
Bug ID: 2439
Summary: New sha256-base64 SSH Fingerprints in openssh-6.8
Product: Portable OpenSSH
Version: 6.9p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee:
2010 Mar 12
1
Problem with libvirt migration
I have two hosts, vm1 and vm2, which are both running libvirt 0.7.0.
They share a common ocfs2 file system that resides on a san, and have
identical network configurations. I am running qemu-kvm 0.11.0 on
ubuntu 9.10 servers.
I start base32 on vm1 and it comes up (it also runs fine if started on
vm2). Then from vm2 I do:
vm2#: virsh -c qemu://vm1/system
migrate --live base32 qemu://vm2/system
2014 Feb 18
1
[PATCH] verify against known fingerprints
I've just written this patch, it's undergone minimal testing and "works
for me" and I'm after feedback as to acceptability of approach, anything
I should be doing differently for the feature to be acceptable upstream
and what I should be doing about automated testing.
Use-case: you have the host's SSH fingerprints via an out-of-band
mechanism which you trust and want to
2001 Feb 07
2
DSA Fingerprints...
Hello,
Questions, observations, and curiosities.
Maybe this is something stupid or maybe I'm doing something wrong...
But... In light of the Kurt Seifried paper on SSH and SSL, I was looking
for the finger prints on my various servers and known hosts files to have
a little crib sheet and maybe plug the list into a database on my palm pilot.
I found that ssh-keygen lists out the
2013 Jun 27
0
CentOS 5.9 and google-authenticator
I'm playing with google-authenticator libpam
https://code.google.com/p/google-authenticator/
It appears to be failing the "make test" on CentOS 5.9 32bit.
./pam_google_authenticator_unittest
Testing base32 encoding
Testing base32 decoding
Testing HMAC_SHA1
Loading PAM module
Running tests, querying for verification code
Testing failed login attempt
Testing
2002 Jun 14
0
[Bug 279] New: ssh-keyscan can't check for fingerprints
http://bugzilla.mindrot.org/show_bug.cgi?id=279
Summary: ssh-keyscan can't check for fingerprints
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: Miscellaneous
AssignedTo: openssh-unix-dev at mindrot.org
2013 Oct 27
1
[Bug 1872] Support better hash algorithms for key fingerprints (FIPS compat)
https://bugzilla.mindrot.org/show_bug.cgi?id=1872
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |djm at mindrot.org
Summary|proposal how to change |Support better hash
2014 Dec 17
0
[Bug 1872] Support better hash algorithms for key fingerprints (FIPS compat)
https://bugzilla.mindrot.org/show_bug.cgi?id=1872
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #2007|0 |1
is obsolete| |
Attachment #2429|0 |1
is
2015 Feb 17
1
[PATCH] builder: when not checking sigs, ignore --fingerprint args (RHBZ#1193237)
When the user chooses to not verify the signatures on the indexes
(using --no-check-signature), there is no point in requiring as many
--fingerprint as --source (or even just one), as they will not be used
anyway.
In this case just ignore all the values of the specified --fingerprint
arguments.
---
builder/cmdline.ml | 19 ++++++++++++-------
1 file changed, 12 insertions(+), 7 deletions(-)
2001 Jan 14
1
openssh 2.3.0p1 doesn't show fingerprints
On Sat, Jan 13, 2001 at 09:33:24PM -0800, Noam Sturmwind wrote:
> I've noticed that in openssh 2.3.0 when I connect to a new server or to
> one on which the host key has changed, it warns me that the key is unknown
> or changed, but doesn't show me the host key fingerprint so I can verify
> it. This goes for both protocols 1 (RSA host key) and 2 (DSA host key). I
> remember
2009 Apr 26
0
[Bug 1592] New: Fingerprints for SSHD host key don't match (local ssh-keygen -l vs. ssh localhost)
https://bugzilla.mindrot.org/show_bug.cgi?id=1592
Summary: Fingerprints for SSHD host key don't match (local
ssh-keygen -l vs. ssh localhost)
Product: Portable OpenSSH
Version: 5.1p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
2003 May 25
2
assign() won't work
Hey everyone, I've been searching the mail lists, and I can't find a real discussion about my problem. Here it is:
I have created a loop fitting various time series models to my data. I labeled each one of the outputs by using the assign and paste statements, i.e. assign(paste("group","subgroup",i),arima(...)). Works great, but here's what I need...
I want to
2010 Feb 24
0
live migration not working correctly
I have two servers running Ubuntu 9.10, with shared disk from ISCSI SAN
and OCFS2, identical network configurations, shared ssh keys, and pki
keys. My vm will boot from either machine and run correctly. When I
attempt to do a live migration with "migrate --live base32 qemu
+[ssh/tcp]://vm1/system" it initiates the vm on the other server, but
leaves the vm on the current server in the
2004 Sep 10
1
[Flac-users] Re: Fingerprint Verification Problem
--- "David W. Tamkin" <dattier@panix.com> wrote:
> Our Leader asked,
>
> | In any case, if you run flac -t and it passes, the only extra
> | information you get from comparing the MD5 sum to the text
> | file is to know if the original seeder put the right text file
> | together with the right FLAC file. But if you don't need the
> | contents of the text
2020 Sep 08
3
ssh: case insensitive fingerprint validation
Hello!
I noticed the ssh client now allows you to paste a fingerprint at the
host key verification question which I thought was pretty cool and a
welcome feature.
When testing it out I discovered it did not care about the case of the
entered hash, and looking at sshconnect.c I see strcasecmp() is
used which explains why.
I'm just curious if this was a deliberate decision or if it would make
2015 Aug 05
2
[PATCH 1/1] document all hash algorithms available for key fingerprint display
From: Christian Hesse <mail at eworm.de>
Signed-off-by: Christian Hesse <mail at eworm.de>
---
ssh_config.5 | 8 ++++++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/ssh_config.5 b/ssh_config.5
index 5b0975f..28f7714 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -649,9 +649,13 @@ The default is
.It Cm FingerprintHash
Specifies the hash algorithm used when
2007 May 14
0
[SAMBA-SECURITY] CVE-2007-2446: Multiple Heap Overflows Allow Remote Code Execution
Spam detection software, running on the system "mail.montanhydraulik.com", has
identified this incoming email as possible spam. The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email. If you have any questions, see
postmaster for details.
Content preview: -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
2007 May 14
0
Patched 3.0.24 tree for CVE-2007-2444, CVE-2007-2446, and CVE-2007-2447
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Folks,
As a small means of community service, I've decided to provide
an unofficial patched version of 3.0.24 (tagged as 3.0.24-gc-1)
to address the CVE-2007-2444, CVE-2007-2446, and CVE-2007-2447
security advisories.
The bzr branch is hosted at
http://people.samba.org/bzr/jerry/samba-3-0-24-gc.bzr/
The source tarball is available from
2001 Jan 12
1
Key fingerprint feature request
Hi,
Does anyone know what algorithm the commercial ssh-2.3.0 uses to display
the key fingerprints ? On the manual it says the algorithm is
'bubble babble' but I didn't find out how to actually create this
bubble string (I guess I could find out from the sources).
I think that it would be a nice option if OpenSSH could print out
the host keys fingerprint in same format as the