Displaying 20 results from an estimated 11000 matches similar to: "[Bug 3759] New: Wrong output for the `Compression` directive"
2023 Mar 03
1
Enforcing sha2 algorithm in ssh-keygen.c
@Dmitry, you may get more traction by reporting this issue (with patch) at https://www.openssh.com/report.html .
It can also help other folks who may be encountering the same issue.
-- 
jmk
> On Mar 3, 2023, at 02:10, Dmitry Belyavskiy <dbelyavs at redhat.com> wrote:
> 
> ?Dear colleagues,
> 
> Could you please take a look?
> 
>> On Fri, Jan 20, 2023 at 12:55?PM
2023 Mar 03
1
Enforcing sha2 algorithm in ssh-keygen.c
Dear colleagues,
Could you please take a look?
On Fri, Jan 20, 2023 at 12:55?PM Dmitry Belyavskiy <dbelyavs at redhat.com> wrote:
>
> Dear colleagues,
>
> ssh-keygen uses SHA1 algorithm (default) when verifying that the key is usable. It causes problems on recent systems where SHA1 is disabled for use with signatures (at least, RHEL 9+).
>
> The proposed patch enforces
2023 Jan 24
1
Upstream forwarding test failure
Dear colleagues,
I came across an upstream test suite failure on Fedora 36.
The test in question is forwarding, the output is
==========
adding modulifile='/home/dbelyavs/work/upstream/openssh-portable/moduli' to
sshd_config
using cached key type ssh-ed25519
using cached key type sk-ssh-ed25519 at openssh.com
using cached key type ecdsa-sha2-nistp256
using cached key type
2021 Mar 29
15
[Bug 3289] New: Patch fixing the issues found by coverity scan
https://bugzilla.mindrot.org/show_bug.cgi?id=3289
            Bug ID: 3289
           Summary: Patch fixing the issues found by coverity scan
           Product: Portable OpenSSH
           Version: 8.5p1
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P5
         Component: Miscellaneous
          Assignee:
2023 Apr 19
3
FIPS compliance efforts in Fedora and RHEL
Dear Damien,
On Wed, Apr 19, 2023 at 9:55?AM Damien Miller <djm at mindrot.org> wrote:
>
> On Wed, 19 Apr 2023, Dmitry Belyavskiy wrote:
>
> > > While I'm sure this is good for RHEL/rawhide users who care about FIPS,
> > > Portable OpenSSH won't be able to merge this. We explictly aim to support
> > > LibreSSL's libcrypto as well as
2023 Jun 28
1
Defend against user enumeration timing attacks - overkill
Dear Peter,
I'm trying to balance the original problem statement (protection from
users enumeration) and avoid doubling time here if the process has
already taken a long time to provide faster auth method iteration.
I believe that a better solution is to set some arbitrary (probably
configurable) timeout and, in case when we spend more time than that
value, avoid doubling it.
On Wed, Jun 28,
2023 Jan 20
1
Enforcing sha2 algorithm in ssh-keygen.c
Dear colleagues,
ssh-keygen uses SHA1 algorithm (default) when verifying that the key is
usable. It causes problems on recent systems where SHA1 is disabled for use
with signatures (at least, RHEL 9+).
The proposed patch enforces using a sha2 algorithm for key verification.
-- 
Dmitry Belyavskiy
-------------- next part --------------
A non-text attachment was scrubbed...
Name: ssh-keygen.patch
2023 Apr 12
1
Defend against user enumeration timing attacks - overkill
Dear colleagues,
I have a question about this commit:
https://github.com/openssh/openssh-portable/commit/e9d910b0289c820852f7afa67f584cef1c05fe95#diff-a25e40214ca9c9f78abce22f23bf2abdb2a24384c6610d60bbb314aed534eb48R216
The function ensure_minimum_time_since effectively doubles the time
spent in the input_userauth_request (mostly presumably in PAM). So if
PAM processing is really slow, it will
2023 Jul 21
1
Announce: OpenSSH 9.3p2 released
On Thu, Jul 20, 2023 at 3:53?AM Damien Miller <djm at mindrot.org> wrote:
>
>
>
> On Wed, 19 Jul 2023, Dmitry Belyavskiy wrote:
>
> > Dear Damien,
> >
> > Could you please clarify which versions are vulnerable?
>
> OpenSSH 5.5 through 9.3p1 inclusive
Many thanks for the clarification!
-- 
Dmitry Belyavskiy
2024 Feb 07
3
[Bug 3665] New: publickey RSA signature unverified: error in libcrypto to RHEL9 sshd (with LEGACY crypto policy enabled)
https://bugzilla.mindrot.org/show_bug.cgi?id=3665
            Bug ID: 3665
           Summary: publickey RSA signature unverified: error in libcrypto
                    to RHEL9 sshd (with LEGACY crypto policy enabled)
           Product: Portable OpenSSH
           Version: 8.7p1
          Hardware: ix86
                OS: Linux
            Status: NEW
          Severity: major
         
2023 Apr 03
13
[Bug 3558] New: Spelling "yes" as "Yes" in sshd_config has a fatal result
https://bugzilla.mindrot.org/show_bug.cgi?id=3558
            Bug ID: 3558
           Summary: Spelling "yes" as "Yes" in sshd_config has a fatal
                    result
           Product: Portable OpenSSH
           Version: 7.2p2
          Hardware: All
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P5
         Component:
2023 Jun 28
1
Defend against user enumeration timing attacks - overkill
Dear colleagues,
May I ask you to explain whether I am wrong in my conclusions?
On Wed, Apr 12, 2023 at 11:55?AM Dmitry Belyavskiy <dbelyavs at redhat.com> wrote:
>
> Dear colleagues,
>
> I have a question about this commit:
>
>
2023 Jul 23
1
Announce: OpenSSH 9.3p2 released
On Fri, Jul 21, 2023 at 4:37?AM Dmitry Belyavskiy <dbelyavs at redhat.com> wrote:
>
> On Thu, Jul 20, 2023 at 3:53?AM Damien Miller <djm at mindrot.org> wrote:
> >
> >
> >
> > On Wed, 19 Jul 2023, Dmitry Belyavskiy wrote:
> >
> > > Dear Damien,
> > >
> > > Could you please clarify which versions are vulnerable?
> >
2023 Aug 17
23
[Bug 3603] New: ssh clients can't communicate with server with default cipher when fips is enabled at server end
https://bugzilla.mindrot.org/show_bug.cgi?id=3603
            Bug ID: 3603
           Summary: ssh clients can't communicate with server with default
                    cipher when fips is enabled at server end
           Product: Portable OpenSSH
           Version: 9.4p1
          Hardware: All
                OS: Linux
            Status: NEW
          Severity: critical
         
2023 Jan 25
1
Upstream forwarding test failure
On Wed, 25 Jan 2023 at 19:29, Darren Tucker <dtucker at dtucker.net> wrote:
[...]
> I have a part-done patch that logs the output from all ssh and sshd
> instances to separate datestamped files.  I'll see if I can tidy that
> up for you to try
You can grab it from here:
https://github.com/daztucker/openssh-portable/commit/b54b39349e1a64cbbb9b56b0f8b91a35589fb528
It's not
2020 Sep 22
0
BUG: _presence_ of valid openssl.cnf Option = 'ServerPreference' causes Dovecot submission relay FAIL: "failed: Failed to initialize SSL: ..."
bump
On 8/24/20 5:17 PM, PGNet Dev wrote:
>   I've
> 
> 	dovecot --version
> 		2.3.10.1 (a3d0e1171)
> 	openssl version
> 		OpenSSL 1.1.1g FIPS  21 Apr 2020
> 
> , atm on Fedora32.
> 
> I configure
> 
> 	/etc/pki/tls/openssl.cnf
> 
> to set preferences for apps' usage, e.g. Postfix etc; Typically, here
> 
> 	cat /etc/pki/tls/openssl.cnf
> 
2020 Aug 25
2
BUG: _presence_ of valid openssl.cnf Option = 'ServerPreference' causes Dovecot submission relay FAIL: "failed: Failed to initialize SSL: ..."
I've
	dovecot --version
		2.3.10.1 (a3d0e1171)
	openssl version
		OpenSSL 1.1.1g FIPS  21 Apr 2020
, atm on Fedora32.
I configure
	/etc/pki/tls/openssl.cnf
to set preferences for apps' usage, e.g. Postfix etc; Typically, here
	cat /etc/pki/tls/openssl.cnf
		openssl_conf = default_conf
		[default_conf]
		ssl_conf = ssl_sect
		[ssl_sect]
		system_default = system_default_sect
	
2020 Sep 22
3
BUG: _presence_ of valid openssl.cnf Option = 'ServerPreference' causes Dovecot submission relay FAIL: "failed: Failed to initialize SSL: ..."
> On 22/09/2020 20:05 PGNet Dev <pgnet.dev at gmail.com> wrote:
> 
>  
> bump
> 
> On 8/24/20 5:17 PM, PGNet Dev wrote:
> >   I've
> > 
> > 	dovecot --version
> > 		2.3.10.1 (a3d0e1171)
> > 	openssl version
> > 		OpenSSL 1.1.1g FIPS  21 Apr 2020
> > 
> > , atm on Fedora32.
> > 
> > I configure
> > 
>
2012 Jan 11
1
sieve under lmtp using wrong homedir ?
Hi,
i have a problem with dovecot-2.0.15.
All is working well except lmtp. Sieve scripts are correctly saved under 
/var/vmail/test.com/test/sieve, but under lmtp sieve will use 
/var/vmail//testuser/
Uid testuser has mail=test at test.com configured in ldap. 
As i could see in the debug logs, there is a difference between the auth 
"master out" lines, but why ?
working if
2008 Sep 08
0
wrong userPassword hash generated by smbpasswd (pam_password=exop and smbk5pwd ) on a samba+ldap PDC running on FreeBSD
Hello everybody,
I've setup a SAMBA 3.0.X (3.0.32 right now) PDC with a LDAP backend
running on FreeBSD 6.3 some time ago and users can't just
login on unix box when the password their password, modified from
Windows, include non-ascii character (such as french letter like "?"
for example)
I guess that they must some kind of charset issue but i just don't
know how to debug