Subject: pkg/17405: Server side "blowfish" version 1 ciper broken in openssh-3.3.0.1
To: None <gnats-bugs@gnats.netbsd.org>
From: Frederick Bruckman <fredb@immanent.net>
List: netbsd-bugs
Date: 06/26/2002 10:17:08
>Number: 17405
>Category: pkg
>Synopsis: Server side "blowfish" version 1 ciper broken in openssh-3.3.0.1
>Confidential: no
>Severity: serious
>Priority: medium
>Responsible: pkg-manager
>State: open
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Wed Jun 26 08:18:01 PDT 2002
>Closed-Date:
>Last-Modified:
>Originator: Frederick Bruckman
>Release: NetBSD 1.5.2
>Organization:
Frederick
>Environment:
System: NetBSD despair.immanent.net 1.5.2 NetBSD 1.5.2 (HANDY) #3:
Wed Dec 26 15:58:27 CST 2001
fredb@despair.immanent.net:/s/src/sys/arch/i386/compile/HANDY i386
#pkg_info -b openssh
Information for openssh-3.3.0.1:
Build version:
security/openssh/Makefile:# $NetBSD: Makefile,v 1.77 2002/06/26 07:44:38 itojun Exp $
security/openssh/files/sshd.sh:# $NetBSD: sshd.sh,v 1.8 2002/04/02 10:14:42 seb Exp $
security/openssh/MESSAGE:$NetBSD: MESSAGE,v 1.6 2002/06/26 11:38:44 itojun Exp $
security/openssh/MESSAGE.pam:$NetBSD: MESSAGE.pam,v 1.1 2002/02/05 04:17:31 jlam Exp $
security/openssh/MESSAGE.urandom:$NetBSD: MESSAGE.urandom,v 1.1 2002/02/05 04:17:31 jlam Exp $
security/openssh/Makefile:# $NetBSD: Makefile,v 1.77 2002/06/26 07:44:38 itojun Exp $
security/openssh/PLIST:@comment $NetBSD: PLIST,v 1.6 2002/06/26 10:29:59 seb Exp $
security/openssh/PLIST.pam:@comment $NetBSD: PLIST.pam,v 1.1 2002/02/05 04:17:32 jlam Exp $
security/openssh/PLIST.prng:@comment $NetBSD: PLIST.prng,v 1.1 2002/02/05 04:17:32 jlam Exp $
security/openssh/distinfo:$NetBSD: distinfo,v 1.19 2002/06/25 18:10:50 toshii Exp $
security/openssh/patches/patch-aa:$NetBSD: patch-aa,v 1.24 2002/06/25 02:13:12 itojun Exp $
security/openssh/patches/patch-ab:$NetBSD: patch-ab,v 1.11 2002/06/25 02:13:13 itojun Exp $
security/openssh/patches/patch-ac:$NetBSD: patch-ac,v 1.7 2002/06/25 18:09:45 toshii Exp $
security/openssh/patches/patch-ad:$NetBSD: patch-ad,v 1.4 2002/06/25 18:09:46 toshii Exp $
security/openssh/patches/patch-ah:$NetBSD: patch-ah,v 1.19 2002/06/25 02:13:13 itojun Exp $
>Description:
Trying to "ssh" to a newly built pkgsrc "sshd" using version 1
protocol, with "Cipher: blowfish", leads to a "Corrupted
check bytes..." error. Fault is in the new "sshd", not the old
client -- I'm seeing a similar error with an older NetBSD openssh
"ssh", older cygwin openssh "ssh", and with PuttY, a win32 client.
I don't yet know if the problem affects the in-tree openssh for
NetBSD 1.6B and netbsd-1-6, though it likely would.
>How-To-Repeat:
#ssh -v -1 -o 'Cipher blowfish' handy
OpenSSH_2.5.1 NetBSD_Secure_Shell-20010614, SSH protocols 1.5/2.0, OpenSSL 0x0090581f
debug: Reading configuration data /u/fredb/.ssh/config
debug: Applying options for handy
debug: Applying options for *
debug: Reading configuration data /etc/ssh.conf
debug: Rhosts Authentication disabled, originating port will not be trusted.
debug: ssh_connect: getuid 99 geteuid 99 anon 1
debug: Connecting to handy [192.168.0.1] port 22.
debug: Connection established.
debug: identity file /u/fredb/.ssh/identity type 0
debug: Remote protocol version 1.99, remote software version OpenSSH_3.3
debug: match: OpenSSH_3.3 pat ^OpenSSH
debug: Local version string SSH-1.5-OpenSSH_2.5.1 NetBSD_Secure_Shell-20010614
debug: Waiting for server public key.
debug: Received server public key (768 bits) and host key (1024 bits).
debug: Host 'handy' is known and matches the RSA1 host key.
debug: Found key in /etc/ssh_known_hosts:3
debug: Encryption type: blowfish
debug: Sent encrypted session key.
debug: Installing crc compensation attack detector.
Disconnecting: Corrupted check bytes on input.
debug: Calling cleanup 0x8057764(0x0)
>Fix:
Don't use "blowfish".
>Release-Note:
>Audit-Trail:
>Unformatted: