Subject: pkg/17405: Server side "blowfish" version 1 ciper broken in openssh-3.3.0.1
To: None <gnats-bugs@gnats.netbsd.org>
From: Frederick Bruckman <fredb@immanent.net>
List: netbsd-bugs
Date: 06/26/2002 10:17:08
>Number:         17405
>Category:       pkg
>Synopsis:       Server side "blowfish" version 1 ciper broken in openssh-3.3.0.1
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    pkg-manager
>State:          open
>Class:          sw-bug
>Submitter-Id:   net
>Arrival-Date:   Wed Jun 26 08:18:01 PDT 2002
>Closed-Date:
>Last-Modified:
>Originator:     Frederick Bruckman
>Release:        NetBSD 1.5.2
>Organization:

Frederick
>Environment:
	
System: NetBSD despair.immanent.net 1.5.2 NetBSD 1.5.2 (HANDY) #3:
Wed Dec 26 15:58:27 CST 2001
fredb@despair.immanent.net:/s/src/sys/arch/i386/compile/HANDY i386

#pkg_info -b openssh
Information for openssh-3.3.0.1:

Build version:
security/openssh/Makefile:# $NetBSD: Makefile,v 1.77 2002/06/26 07:44:38 itojun Exp $
security/openssh/files/sshd.sh:# $NetBSD: sshd.sh,v 1.8 2002/04/02 10:14:42 seb Exp $
security/openssh/MESSAGE:$NetBSD: MESSAGE,v 1.6 2002/06/26 11:38:44 itojun Exp $
security/openssh/MESSAGE.pam:$NetBSD: MESSAGE.pam,v 1.1 2002/02/05 04:17:31 jlam Exp $
security/openssh/MESSAGE.urandom:$NetBSD: MESSAGE.urandom,v 1.1 2002/02/05 04:17:31 jlam Exp $
security/openssh/Makefile:# $NetBSD: Makefile,v 1.77 2002/06/26 07:44:38 itojun Exp $
security/openssh/PLIST:@comment $NetBSD: PLIST,v 1.6 2002/06/26 10:29:59 seb Exp $
security/openssh/PLIST.pam:@comment $NetBSD: PLIST.pam,v 1.1 2002/02/05 04:17:32 jlam Exp $
security/openssh/PLIST.prng:@comment $NetBSD: PLIST.prng,v 1.1 2002/02/05 04:17:32 jlam Exp $
security/openssh/distinfo:$NetBSD: distinfo,v 1.19 2002/06/25 18:10:50 toshii Exp $
security/openssh/patches/patch-aa:$NetBSD: patch-aa,v 1.24 2002/06/25 02:13:12 itojun Exp $
security/openssh/patches/patch-ab:$NetBSD: patch-ab,v 1.11 2002/06/25 02:13:13 itojun Exp $
security/openssh/patches/patch-ac:$NetBSD: patch-ac,v 1.7 2002/06/25 18:09:45 toshii Exp $
security/openssh/patches/patch-ad:$NetBSD: patch-ad,v 1.4 2002/06/25 18:09:46 toshii Exp $
security/openssh/patches/patch-ah:$NetBSD: patch-ah,v 1.19 2002/06/25 02:13:13 itojun Exp $


>Description:
	
	Trying to "ssh" to a newly built pkgsrc "sshd" using version 1
	protocol, with "Cipher: blowfish", leads to a "Corrupted
	check bytes..." error. Fault is in the new "sshd", not the old
	client -- I'm seeing a similar error with an older NetBSD openssh
	"ssh", older cygwin openssh "ssh", and with PuttY, a win32 client.

	I don't yet know if the problem affects the in-tree openssh for
	NetBSD 1.6B and netbsd-1-6, though it likely would.

>How-To-Repeat:
	

#ssh -v -1 -o 'Cipher blowfish' handy
	
OpenSSH_2.5.1 NetBSD_Secure_Shell-20010614, SSH protocols 1.5/2.0, OpenSSL 0x0090581f
debug: Reading configuration data /u/fredb/.ssh/config
debug: Applying options for handy
debug: Applying options for *
debug: Reading configuration data /etc/ssh.conf
debug: Rhosts Authentication disabled, originating port will not be trusted.
debug: ssh_connect: getuid 99 geteuid 99 anon 1
debug: Connecting to handy [192.168.0.1] port 22.
debug: Connection established.
debug: identity file /u/fredb/.ssh/identity type 0
debug: Remote protocol version 1.99, remote software version OpenSSH_3.3
debug: match: OpenSSH_3.3 pat ^OpenSSH
debug: Local version string SSH-1.5-OpenSSH_2.5.1 NetBSD_Secure_Shell-20010614
debug: Waiting for server public key.
debug: Received server public key (768 bits) and host key (1024 bits).
debug: Host 'handy' is known and matches the RSA1 host key.
debug: Found key in /etc/ssh_known_hosts:3
debug: Encryption type: blowfish
debug: Sent encrypted session key.
debug: Installing crc compensation attack detector.
Disconnecting: Corrupted check bytes on input.
debug: Calling cleanup 0x8057764(0x0)

>Fix:
	

	Don't use "blowfish".
>Release-Note:
>Audit-Trail:
>Unformatted: