Announce: OpenSSH 4.6 released

Corinna Vinschen vinschen at redhat.com
Sat Mar 10 02:00:15 EST 2007


On Mar  9 08:57, Darren Tucker wrote:
> On Fri, Mar 09, 2007 at 07:25:22AM +1100, Darren Tucker wrote:
> > Corinna Vinschen wrote:
> [...]
> > > $ ssh -1 somemachine
> > > Disconnecting: Corrupted check bytes on input.
> > > [...]
> In fact, if you're using OpenSSL 0.9.8e I suggest you apply the following
> patch to it, recompile everything and see if your problem persists.
> 
> The symmetry of the problem (ie it works with itself but doesn't
> interoperate) is the same as  what I saw with the AES counter-mode
> problems in OpenSSH bug #1291.
> 
> That workaround above only helps for the bits of OpenSSH that use
> EVP_CIPHER_CTX_key_length, it doesn't help where OpenSSL itself uses it,
> which may be the case here.  See bugzilla #1291 for details.
> 
> Index: crypto/evp/evp_lib.c
> ===================================================================
> RCS file: /home/dtucker/src/security/openssl/cvs/openssl-cvs/openssl/crypto/evp/evp_lib.c,v
> retrieving revision 1.10.2.1
> diff -u -p -r1.10.2.1 evp_lib.c
> --- crypto/evp/evp_lib.c	29 Nov 2006 20:47:13 -0000	1.10.2.1
> +++ crypto/evp/evp_lib.c	3 Mar 2007 23:54:00 -0000
> @@ -225,7 +225,7 @@ int EVP_CIPHER_key_length(const EVP_CIPH
>  
>  int EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx)
>  	{
> -	return ctx->cipher->key_len;
> +	return ctx->key_len;
>  	}
>  
>  int EVP_CIPHER_nid(const EVP_CIPHER *cipher)

Thanks Darren, that did it!  I first tried with just adding the missing
#include to cipher-bf1.c, but that didn't help.  Only by applying the
above patch to openssl-0.9.8e I could connect to the Linux box using
openssh-4.5p1 with openssl-0.9.8d.

So, the bottom line is, I have to release a patched version of openssl.
Oh well.


Thanks again,
Corinna

-- 
Corinna Vinschen
Cygwin Project Co-Leader
Red Hat


More information about the openssh-unix-dev mailing list