Displaying 20 results from an estimated 1000 matches similar to: "[Bug 2567] New: Wrong terminology used for ssh-keygen "-m" option"
2012 Jul 28
1
[PATCH] ssh-keygen: support public key import/export using SubjectPublicKeyInfo
ssh-keygen already supports importing and exporting ssh keys using
various formats.
The "-m PEM" which should have been the easiest to be used with
various of external application expects PKCS#1 encoded key, while
many applications use SubjectPublicKeyInfo encoded key.
This change adds SubjectPublicKeyInfo support, to ease integration
with applications.
Examples:
## convert
2004 Feb 13
1
public key format
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
hello!
i would like to use tinc with public keys which are extracted from x509
certificates. the only public key format i was able to extract from
certificates with openssl commands looked like this:
- -----BEGIN PUBLIC KEY-----
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCwXDZs8EBb/JyZ9daB3Zk9WHxD
2013 Nov 11
0
ssh-keygen :: PEM_write_RSA_PUBKEY failed
I am trying to understand a change to ssh-keygen that is included with OS X
Mavericks, 6.2p2 that prevents the option, -m PKCS8, from working.
Previous to Mavericks I had 5.9p1 and didn''t have this problem.
This used to work previously-
ssh-keygen -e -m PKCS8 -f $my_rsa_public_key
Now it outputs-
-----BEGIN PUBLIC KEY-----
-----END PUBLIC KEY-----
PEM_write_RSA_PUBKEY failed
I think
2020 Apr 25
2
[PATCH 1/3] Add private key protection information extraction to ssh-keygen
Add private key protection information extraction to shh-keygen using -v
option on top of -y option which is already parsing the private key.
Technically, the passphrase isn't necessary to do this, but it is the
most logical thing to do for me.
Adding this to -l option is not appropriate because fingerprinting is
using the .pub file when available.
An other idea is to add a new option, I
2020 Jul 18
10
[Bug 3195] New: ssh-keygen unable to convert ED25519 public keys
https://bugzilla.mindrot.org/show_bug.cgi?id=3195
Bug ID: 3195
Summary: ssh-keygen unable to convert ED25519 public keys
Product: Portable OpenSSH
Version: 8.2p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh-keygen
Assignee:
2024 Aug 26
1
[Bug 3724] New: Unable to convert from OpenSSH to PKCS8 or PEM
https://bugzilla.mindrot.org/show_bug.cgi?id=3724
Bug ID: 3724
Summary: Unable to convert from OpenSSH to PKCS8 or PEM
Product: Portable OpenSSH
Version: 9.8p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: ssh-keygen
Assignee: unassigned-bugs
2015 Jan 07
11
[Bug 2332] New: Show more secure fingerprints than MD5 (e.g. SHA256) in ssh and ssh-keygen
https://bugzilla.mindrot.org/show_bug.cgi?id=2332
Bug ID: 2332
Summary: Show more secure fingerprints than MD5 (e.g. SHA256)
in ssh and ssh-keygen
Product: Portable OpenSSH
Version: 6.6p1
Hardware: Other
OS: All
Status: NEW
Severity: enhancement
Priority: P5
2013 Dec 09
1
[Bug 2180] New: Improve the handling of the key comment field
https://bugzilla.mindrot.org/show_bug.cgi?id=2180
Bug ID: 2180
Summary: Improve the handling of the key comment field
Product: Portable OpenSSH
Version: 6.4p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh-keygen
Assignee: unassigned-bugs
2014 Jun 23
0
Wishlist: add a variable %{x509} expanding to the client cert in Dovecot-auth
Hi there,
As of Dovecot 2.2.9, it's possible to enable passwordless authentication
using client certificates [1]:
ssl_ca = </etc/ssl/ca.pem
ssl_verify_client_cert = yes
auth_ssl_username_from_cert = yes
(Password checking can be bypassed by returning the extra fields
?password= nopassword? in the passdb when the variable ?%k? expands to
"valid".)
However this
2012 Sep 09
2
Patch for ssh-keygen to allow conversion of public key to openssh format
Hi,
I needed to convert a public RSA key to autorized_keys format and found
ssh-keygen lacking this feature.
I made the option -Q publicfile to allow an conversion like
ssh-keygen -Q pubrsa.pem -y
The patch is produced using unified diff and made on latest release.
If you like it and can make a patch for the man-page also!
Regards,
/Lars
-------------- next part --------------
diff -u
2013 May 23
1
Time for key stretching in encrypted private keys?
In 0.9.7 the private key encryption was switched from 3DES to AES,
(https://bugzilla.mindrot.org/show_bug.cgi?id=1550) the motivation for this
being that 128-bits of security is better than the 112 or so you get from
3DES these days. Interestingly that bug is about upgrading to AES-256, but
we ended up with AES-128. Presumably due to the Solaris crippling?
However ssh-keygen still uses a
2019 Oct 09
0
Announce: OpenSSH 8.1 released
OpenSSH 8.1 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested
2004 Aug 24
1
error when unsubscribe (PR#7198)
Full_Name: Huan Huang
Version: 1.9.1
OS: Win NT
Submission from: (NULL) (155.140.122.227)
Traceback:
Traceback (most recent call last):
File "/scratch/local/app/mailman-sfs/2.1.5/scripts/driver", line 87, in
run_main
main()
File "/scratch/local/app/mailman-sfs/2.1.5/Mailman/Cgi/options.py", line 91,
in main
language = cgidata.getvalue('language')
File
2004 Feb 06
0
Bug (PR#6550)
Full_Name: Huan Huang
Version: 1.8.1
OS: WIN NT
Submission from: (NULL) (155.140.122.227)
Bug in Mailman version 2.1.4
We're sorry, we hit a bug!
If you would like to help us identify the problem, please email a copy of this
page to the webmaster for this site with a description of what happened. Thanks!
Traceback:
Traceback (most recent call last):
File
2004 Jan 06
0
bug report (PR#6394)
Full_Name: Huan Huang
Version:
OS:
Submission from: (NULL) (155.140.122.227)
Bug in Mailman version 2.1.4
We're sorry, we hit a bug!
If you would like to help us identify the problem, please email a copy of this
page to the webmaster for this site with a description of what happened. Thanks!
Traceback:
Traceback (most recent call last):
File
2017 Nov 24
1
SSL configuration
Hello subscribers,
I have a very strange question regarding SSL setup on gluster storage.
I have create a common CA and sign certificate for my gluster nodes, placed host certificate, key and common CA certificate into /etc/ssl/,
create a file called secure-access into /var/lib/glusterd/
Then, I start glusterd on all nodes, system work fine, I see with peer status all of my nodes.
No problem.
2003 May 23
1
error with make clean in /usr/src
Hello,
I am getting errors when doing a make clean under /usr/src, I have always
done this before doing a make world, and never a problem. I have tried
deleting all of /usr/src and re cvsuped, but the problem persists.
FreeBSD 4.7-STABLE #0: Fri Feb 14 13:49:58 EST 2003
===> secure/usr.bin/openssl
rm -f buildinf.h openssl/opensslconf.h openssl/evp.h xopenssl app_rand.o
apps.o asn1pars.o ca.o
2015 Mar 14
6
[Bug 2366] New: ssh-keygen doesn't correctly decode new format GCM-encrypted keys
https://bugzilla.mindrot.org/show_bug.cgi?id=2366
Bug ID: 2366
Summary: ssh-keygen doesn't correctly decode new format
GCM-encrypted keys
Product: Portable OpenSSH
Version: 6.7p1
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component:
2012 Aug 29
0
Announce: OpenSSH 6.1 released
OpenSSH 6.1 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches,
2012 Aug 29
0
Announce: OpenSSH 6.1 released
OpenSSH 6.1 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches,