[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: libssh-4.0.2 client code problem
[Thread Prev] | [Thread Next]
- Subject: Re: libssh-4.0.2 client code problem
- From: Eugene Starozhilov <estarozhilov@xxxxxxxxx>
- Reply-to: libssh@xxxxxxxxxx
- Date: Mon, 12 Apr 2010 10:17:20 -0700 (PDT)
- To: libssh@xxxxxxxxxx
Aris,
Just checked:
samplessh -l oracle -p 1778 -c aes128-ctr alpha-dev30.edf.gxs.com
result: sshd[22710]: Disconnecting: Corrupted MAC on input.
samplessh -l oracle -p 1778 alpha-dev30.edf.gxs.com
result: sshd[22778]: Disconnecting: Corrupted MAC on input.
samplessh -l oracle -p 1778 -c aes256-cbc alpha-dev30.edf.gxs.com
result: OK
samplessh -l oracle -p 1778 -c blowfish-cbc alpha-dev30.edf.gxs.com
result: OK
The box has openssh-server-3.9p1-11.el4_7.x86_64.rpm. It is RedHat Enterprise Server 4 distribution.
Thanks,
Eugene
--- On Mon, 4/12/10, Aris Adamantiadis <aris@xxxxxxxxxxxx> wrote:
From: Aris Adamantiadis <aris@xxxxxxxxxxxx>
Subject: Re: libssh-4.0.2 client code problem
To: libssh@xxxxxxxxxx
Date: Monday, April 12, 2010, 12:14 PM
Hi Eugene,
That's very strange. I will check out what has happened.
Have you got any information on the distribution/ssh server installed
on the server ? I suspect it's a problem with aes256-ctr.
In order to verify:
samplessh -l oracle -p 1778 -c aes256-cbc alpha-dev30.edf.gxs.com
samplessh -l oracle -p 1778 -c blowfish-cbc alpha-dev30.edf.gxs.com
It would also help if you tried aes128-ctr.
Thanks,
Aris
Eugene Starozhilov a écrit :
>
> Hi Aris,
>
> Thanks for fixing server api bug. But I ran into another problem with
> client api.
> These are traces from sshd and libssh client code:
>
> --------------------------- sshd
> --------------------------------------------------
> sshd[22309]: Connection from ::ffff:10.160.123.184 port 44351
> sshd[22309]: debug1: Client protocol version 2.0; client software
> version libssh-0.4.2
> sshd[22309]: debug1: no match: libssh-0.4.2
> sshd[22309]: debug1: Enabling compatibility mode for protocol 2.0
> sshd[22309]: debug1: Local version string SSH-1.99-OpenSSH_3.9p1
> sshd[22341]: debug1: permanently_set_uid: 74/74
> sshd[22341]: debug1: list_hostkey_types: ssh-rsa,ssh-dss
> sshd[22341]: debug1: SSH2_MSG_KEXINIT sent
> sshd[22341]: debug1: SSH2_MSG_KEXINIT received
> sshd[22341]: debug1: kex: client->server aes256-ctr hmac-sha1 none
> sshd[22341]: debug1: kex: server->client aes256-ctr hmac-sha1 none
> sshd[22341]: debug1: expecting SSH2_MSG_KEXDH_INIT
> sshd[22341]: debug1: SSH2_MSG_NEWKEYS sent
> sshd[22341]: debug1: expecting SSH2_MSG_NEWKEYS
> sshd[22341]: debug1: SSH2_MSG_NEWKEYS received
> sshd[22341]: debug1: KEX done
> sshd[22341]: Disconnecting: Corrupted MAC on input.
> ------------------------------------------------------------------------------
>
> -------------------- libssh client code -----------------------------
> [3] host 10.160.31.50 matches an IP address
> [1] Trying to connect to host: 10.160.31.50:1778 with timeout 1800.0
> [3] Socket connected with timeout
>
> [1] SSH server banner: SSH-1.99-OpenSSH_3.9p1
> [1] Analyzing banner: SSH-1.99-OpenSSH_3.9p1
> [1] We are talking to an OpenSSH server version: 3.9 (30900)
> [3] Packet size decrypted: 636 (0x27c)
> [3] Read a 636 bytes packet
> [3] 11 bytes padding, 635 bytes left in buffer
> [3] After padding, 624 bytes left in buffer
> [3] Final size 624
> [3] Type 20
> [3] Writing on the wire a packet having 141 bytes before
> [3] 141 bytes after comp + 6 padding bytes = 148 bytes packet
> [3] Writing on the wire a packet having 133 bytes before
> [3] 133 bytes after comp + 6 padding bytes = 140 bytes packet
> [3] Packet size decrypted: 444 (0x1bc)
> [3] Read a 444 bytes packet
> [3] 10 bytes padding, 443 bytes left in buffer
> [3] After padding, 433 bytes left in buffer
> [3] Final size 433
> [3] Type 31
> [3] Writing on the wire a packet having 1 bytes before
> [3] 1 bytes after comp + 10 padding bytes = 12 bytes packet
> [1] SSH_MSG_NEWKEYS sent
>
> [3] Packet size decrypted: 12 (0xc)
> [3] Read a 12 bytes packet
> [3] 10 bytes padding, 11 bytes left in buffer
> [3] After padding, 1 bytes left in buffer
> [3] Final size 1
> [3] Type 21
> [1] Got SSH_MSG_NEWKEYS
>
> [3] Set output algorithm to aes256-ctr
> [3] Set input algorithm to aes256-ctr
>
> [3] Writing on the wire a packet having 17 bytes before
> [3] 17 bytes after comp + 10 padding bytes = 28 bytes packet
> [3] Encrypting packet with seq num: 3, len: 32
> [3] Sent SSH_MSG_SERVICE_REQUEST (service ssh-userauth)
> [3] Decrypting 16 bytes
> [3] Packet size decrypted: 44 (0x2c)
> [3] Read a 44 bytes packet
> [3] Decrypting 32 bytes
> 2010-04-12 13:14:54,211557; 1126189408 procSrvAuth; Did not receive
> SERVICE_ACCEPT
> --------------------------------------------------------------------------------------------
>
> sshd receives corrupted MAC and drops connection. It happens when client
> calls ssh_service_request(session, "ssh-userauth");
>
> I built libssh-4.0.2 from git repository:
>
> git clone git://git.libssh.org/projects/libssh/libssh.git libssh
> git checkout -b v0-4 origin/v0-4
>
> with libcrypto library (openssl 0.9.7a).
>
>
> The same error can be reproduced using samplessh example with sshd.
>
> /usr/sbin/sshd -d -p 1778
> samplessh -l oracle -p 1778 alpha-dev30.edf.gxs.com
>
>
> Thank you,
> Eugene
>
>
> --- On *Sun, 3/28/10, Aris Adamantiadis /<aris@xxxxxxxxxxxx>/* wrote:
>
>
> From: Aris Adamantiadis <aris@xxxxxxxxxxxx>
> Subject: Re: libssh-0.4.2 server api bug
> To: libssh@xxxxxxxxxx
> Date: Sunday, March 28, 2010, 3:51 PM
>
> Hi,
>
> This was resolved in d2bb97c1c6f32c167e1a6093201e01a52bfe0e0d. Thanks
> for your feedback on this bug.
>
> Regards,
>
> Aris
>
> Aris Adamantiadis a écrit :
> > Hi
> > Oops, we missed that bug for the release. I will find a solution.
> >
> > Aris
> >
> > Eugene Starozhilov a écrit :
> >> Hi Aris,
> >>
> >> The new release libssh-0.4.2 has the same problem as libssh-0.4.1
> >> (described below). samplesshd doesn't work with standard LINUX ssh
> >> client. Is any chance to get it fixed soon?
> >>
> >>
> >> Thank you,
> >> Eugene
> >>
>
>
| Re: libssh-4.0.2 client code problem | Aris Adamantiadis <aris@xxxxxxxxxxxx> |
| Re: libssh-4.0.2 client code problem | Aris Adamantiadis <aris@xxxxxxxxxxxx> |
| Re: libssh-4.0.2 client code problem | Aris Adamantiadis <aris@xxxxxxxxxxxx> |