OpenSSH Now Supports SSH2 49
Anonymous Coward writes: "The OpenSSH project released version 2.1 earlier this month. It now supports the SSH2 protocol. SSH2 is regarded by many as a more secure protocol (but was for a long time only supported in a restricted license implementation)." Nice work, guys. I'm downloading the
source,
I'm buying a
T-shirt,
life is good.
Re:SSHv2 is crap (Score:1)
Point is, I don't have the same problem that ClaudioLeite did, and I doubt that a majority of people connecting with an ssh1 client to an sshd2-on-sshd1 server do.
Re:sftp would be cool (Score:2)
Re:OpenBSD 2.7 waiting in the wings too... (Score:1)
---
Free SSH client for Win (Re:Number two.) (Score:2)
I also struggled with TeraTerm.
why don't you check out 'PuTTY' it's a telnet/ssh/raw client:
http://www.chiark.greenend.org.u k/~sgtatham/putty/ [greenend.org.uk]
it works great !
(plus it has basic xterm mouse-handling !!! so you can just cut'n'paste between Windows and the terminal with your mouse-buttons !!!)
--
Dutch Linux Users Group [nllgg.nl]
Re:Finding RPMS for Openssh / Openssl (Score:2)
There's a .spec file buried in the openssh tarball, which you can use to build your RPMs. It's not a very "high-quality" .spec file, but should be good enough to put together a basic package with all the defaults.
Last year I mailed the maintainer a far more robust spec file, which I use, but, as typical with most OSS developers, the mail simply vanished into a black hole. Screw 'em.
Re:Free SSH client for Win (PUTTY -- zmodem?) (Score:2)
Why should I upgrade? (Score:1)
good answer. I just don't know it.
Why should I upgrad from a SSHv1 client/server
to a SSHv2 client/server?
FiSSH (Score:1)
Fissh [massconfusion.com]
Where's Kerberos V support? (Score:2)
Re:Why should I upgrade? (Score:1)
Apart from that, I haven't been able to find any clear documentation about the differences in the new protocol aside from vague assurances that it's "more secure".
NO help from DOMAIN SQUATTER (Score:1)
Re:SSHv2 is crap (Score:1)
I don't experience the halting problem too often, it's more of a matter of speed and compatibility that make me hate ssh2. There aren't any new features that are of any use to the average person (except maybe sftp), so I see no reason to upgrade.
The files are gone??? (Score:1)
Number two. (Score:3)
>Number two is that scp2 doesn't quite work, because it uses a proprietary protocol, although you can use scp1 over ssh2 fine.
scp uses ssh to transfer files. ssh supports the version 2 protocol - this is clearly documented and not "proprietary" as you claimed. What is proprietary is the sftp protocol used by ssh.com's commercial server. Is this what you mean?
OpenBSD 2.7 waiting in the wings too... (Score:3)
I just installed OpenBSD-current for the first time from anoncvs to test it out, as part of a migration from Linux to OpenBSD, and it utterly rocks so far! The huge difference is just the fact that it is secure out of the box, and comes with a wealth of audit scripts that scan the box every day and mail you with automated changelogs and security alerts. I can easily believe their claim that they have not had any remote exploits for over 2 years.
Big kudos to the OpenSSH and OpenBSD teams
PS: No affiliation to openbsd myself; I visited the webpage for the first time 3 days ago
--
Anil Madhavapeddy, anil@recoil.org
Sftp support ? (Score:2)
Re:I'll wait for the idiots to run it first. (Score:2)
a) openssh has been out for some time (though this ssh2 protocol stuff is new)
b) c'mon, this is the openbsd team. You think they'd jeapordize their record
you've got a point, but this is probably a lot better than most other
INSTALL file (Score:1)
Re:Still a couple holes (Score:1)
ssh-keygen generates and manages authentication keys for ssh(1). ssh-keygen defaults to generating an RSA key for use by protocols 1.3 and 1.5; specifying the -d flag will create a DSA key instead for use by protocol 2.0.
I believe that ssh2 needs to be on all the machines involved, but key login seems to work for me.
Re:Whatever happened to the openssh org vs com deb (Score:2)
there are two development groups (from what I see on the page), a core openssh group (which handles openbsd) and a porting group. While a little bit unusual, I don't really see how the org structure harms that much (or maybe it's just a personal thing among developers, I wouldn't know about that).
Re:Compatibility with SSH2 keys. (Score:1)
Surely you weren't hoping to give it a public key and get the private key on stout?
--
The circle is now complete... (sort of) (Score:1)
Thanks to that and the OpenSSH group, I have been able to eliminate all clear-text passwords from my network, AND all my Windows users are happy!
As a note - I've been running OpenSSH 2 for about two weeks now on RedHat 6.1 with no problems.
Re:Number two. (Score:3)
rpmfind does it for me (Score:1)
Re:Before the cheering commences.. (Score:4)
LIBS=-lcrypt
Works perfectly for me now.
Re:Number two. (Score:2)
Old news (Score:1)
Re:Still a couple holes (Score:2)
Re:INSTALL file (Score:1)
Finding RPMS for Openssh / Openssl (Score:2)
Unfortunately, a new version of openssl is required and rpms for it seem harder to find (no luck at freshmeat or rpmfind).
The good news is that the old openssh/linux site (which seems to be in the process of being phased out) still exists and has links. Here is a list of mirrors [ibs.com.au] completely distinct from those listed at www.openssh.com. Start with one of them to get the openssh rpms. Then look in the "support" subdirectory to get openssl-0.9.5a-1.
Let's hope that these other openssh mirrors continue to exist!!
Re:Number one (Score:2)
socks support? (Score:1)
Definitely NOT a domain squatter (Score:1)
Not related to this, this guy runs one of the best archives of crypto/security-related software for RedHat, the ftp.zedz.net [zedz.net] (which used to be ftp.replay.com before they sold the domain).
Alex de Joode is definitely NOT a cybersquatter.
-Yenya
--
Re:Finding RPMS for Openssh / Openssl (Score:1)
Re:NO help from DOMAIN SQUATTER (Score:2)
1) I never claimed to be involved with Theo's OpenSSH Project.
2) there is no competing project.
3) there is no FUD [*1]
4) actually I offered it again, this time to Markus Friedl, who does most of the work. [*2]
[*1]
Actually Markus thought the same, after I explained some things to him, the structure of the OpenSSH Project suddenly was changed, (which is Good [TM]) there now is a 'OpenBSD' and a 'Ported' version of SSH. The websites are also merged.
So if you feel some of the stuff on the site is FUD you have to realise that it was written before the OpenSSH Project addressed the issues I raised.
[*2] ..
Markus hasn't decided if he wants to accept the offer
Your score: 1 correct fact, 1 incorrect suggestion, 3 incorrect facts, 1 useless 'what if'.
--
Re:what is the OpenBSD Wireframe Daemon head shirt (Score:1)
Re:Finding RPMS for Openssh / Openssl (Score:2)
Re:Whatever happened to the openssh org vs com deb (Score:2)
C'mon, this is free software, the openssh team don't control its distribution and can't rescind its license. Wheras the non-free ssh2 is in the hands of a single company who can pretty much stop all development for a given platform whenever they please. Is it really sensible to give the proprietory version more weight because a few people may have moronic streaks?
Re:Old news (Score:1)
(Also, if Slashdot ever were the first to announce something, the cries of "This isn't Freshmeat!" would be deafening.)
I find the OpenBSD/SSH team's attitude towards the other BSDs to be interesting. For instance, you can go to openssh.com and click on the alternative (to OpenBSD) OS of your choice, listed on the blue sidebar. Other BSDs are listed on that blue sidebar, but when you're taken to http://www.openssh.com/portable.html, they aren't mentioned. That can't possibly be a simple oversight.
"Linux" is first on the list, though. I don't see this supposed anti-GNU/Linux mentality. Hell, they provide RPMs! (Red Hat isn't Linux, but you have to quite a "lun1x lu53r" to distribute RPMs. What's so wrong with tarballs?)
Also, they aren't making a big deal about US and International releases with this new version. Are they deciding to keep the politics with the OS, or just tiring of all the animosity? As I'm sure Theo knows, it's very taxing, mentally and physically, to be angry all the time.
Congrats to the team, though. A great product. I hope people will buy some merchandise while they're there. OpenBSD doesn't enjoy the corporate funding that other OSs do; they may not want the corporate funding, but development costs money all the same.
---------///----------
This post is not redundant, please don't moderate it as such. I repeat, this post is not redundant.
Still a couple holes (Score:4)
Number two is that scp2 doesn't quite work, because it uses a proprietary protocol, although you can use scp1 over ssh2 fine.
Otherwise, it works great. There's a tool to convert ssh2 keys into a form ossh understands, and I had no problem using it.
Compatibility with SSH2 keys. (Score:3)
-x This option will read a private OpenSSH DSA format file and print a SSH2-compatible public key to stdout.
-X This option will read a SSH2-compatible public key file and print an OpenSSH DSA compatible public key to stdout.
Am I the only one who finds this a little strange?
Maybe that's why they call them asymmetric ciphers
----
non openbsd versions (Score:3)
--
Whatever happened to the openssh org vs com debate (Score:3)
SSHv2 is crap (Score:3)
SSHv1 and the old OpenSSH have none of these problems. SSHD2 with fallback to SSHD1 still has all these problems, even though it is using the SSH1 client.
I always loved the fact that SSHv2 had bad licensing, so most people didn't use it. Now with this, more intelligent people will be using version 2 daemons, which means the rest of us who aren't lucky enough to have fast connections will suffer.
Re:Number two. (Score:1)
I wish I could find a free one with keymapping, TeraTerm's not quite getting the job done at my office, and I can't code worth a damn.
-jpowers
Before the cheering commences.. (Score:3)
This really hurts me with scp stuff back and forth.
Problem manifests itself as a 'password incorrect' error. Nothing obvious when using -v at the client & debug/nodaemon flags at the server.
I've not fully digested this problem yet so I haven't majorly pursued this (or filed any bug report). I want to make sure it's not MY fault. If you have a sizable ssh1 implementation you may want to stick this on a single box & watch it a day or two. I plan to upgrade ALL my unix boxes.. but will still need some ssh1 support as my PD win (HUSH) ssh clients only support ssh1.
Thx to the OpenSSH team for 'helping' us with that goofyass ssh2 license problem the 'other' product has.
Re:Whatever happened to the openssh org vs com deb (Score:1)
OpenBSD is good software, which I use in several places for several organizations, and Theo seems like a pretty nice guy most of the time, but he definitely has difficulties controling his temper, especially when he doesn't get his way.
Better than the original (?)... (Score:3)
Okay, so it wasn't that much hassle installing both versions, but the OpenSSH way is a neater solution.
Now the real question -- apparent minor lack of functionality aside -- is: how long before we're all happy to chuck out our official copies of both SSH 1 and 2 and start using OpenSSH instead? How long do people wait before deciding "It's been out long enough that it's probably as secure as the alternative"? (It being something of a faith issue for those of us who don't have the time or skill to do a full audit of the code.)
Re:SSHv2 is crap (Score:2)
I connect quite regularly from an aging Gateway machine running Win98 via a dialup at my apartment to my NetBSD/macppc machine running sshd2 on Swarthmore College's campus. Granted, the dialup and the server are on the same LAN, but I see no greater latency connecting to my NetBSD machine with a G3) than I do connecting to the Computer Science Program's Solaris 2.6 box running sshd1 (which has two UltraSparcs).
It seems more likely that your server processor is slow enough that the encryption time is significant.