Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Encryption Security

OpenSSH Project Now at openssh.com 132

Anonymous Coward writes "The OpenSSH project now has a central webpage at www.openssh.com. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced and many other clean-ups."
This discussion has been archived. No new comments can be posted.

OpenSSH Project Now at openssh.com

Comments Filter:
  • I know psst has links to some free SSH implementations. Are these going to merge or what?

    Also I have to say that I am quite happy to have a Free (speech) SSH implementation. I feel dirty using the commercial one. But I need the functionality.
  • Nice page, too. Think they use blowfish, much? :)

    I, personally, could care less, but I'd love to see that this stuff can be included in Debian and all the other purist distributions, and contributed to, and stuff. That's the good part.

    Besides, the licensing for SSH 2 got worse, I understand, and that's why we have free versions: to protect us from that.
    ---
    pb Reply rather than vaguely moderate me.
  • One aspect of OpenSSH that many people should like is that the most recent security hole in ssh-1.2.27 was non-existant in OpenSSH. For that reason alone, OpenSSH might be a better choice -- especially with the lack of developer news concerning ssh1 and ssh2.

    -B

    ps. Check www.securityfocus.com [securityfocus.com] for the bugtraq archives and mailing list.
  • IMHO, closed-source doesn't necessarily mean evil. I think the present SSH is great. Admittedly, I'd prefer it if it was OSS, but that's the way it is. I'll continue to use ClosedSSH, just because of all the superior algorithms and stuff ... Just my $0.03 (2c is rounded down to 0). d


    -
  • by Anonymous Coward on Wednesday November 17, 1999 @07:30PM (#1523339)
    Excellent, now we have an open ssh package. No more visiting RedHat's ssh page and filling out those "are you a US citizen" forms before I can securely login to a remote machine.

    Seriously, why does the US even bother with cryptographic export laws when many other countries can ship products that contain the same strength encryption as they are trying to keep locked up?

    Especially with open source projects involving encryption that are being developed all over the world, this country's policies seem downright pointless.

    Or am I missing the point?
  • by Anonymous Coward
    Debian has been coerced into renaming the OpenSSH package to SSH. In other words, people who are upgrading their system will have the real SSH transparently removed and replaced with OpenSSH.

    There is no warning although the functionalities are not equivalent. The original SSH package has been renamed.

    It is my understanding that all this has happened at the bequest of Theo. This is yet another case where POLITICS interferes with the TECHNICAL aspects of Debian.
  • Superior algorithms and stuff?

    Stuff like the latest exploit?

    And what exactly is the 'superior algorithm' you are still using ClosedSSH for?

  • It's odd that you "must speak up", yet refuse to divulge your identity.

    It is my understanding that all this has happened at the bequest of Theo.
    Goodness, I hadn't realized that he'd passed away! Or was that not in fact the word you were looking for? Try "behest", not "bequest"--unless you're trying to say something shocking.
  • I recently learned about and began using SSH. Does anyone know of a good Windows SSH2 Client thats not comercial that has full strength crypto. Secure CRT seems OK for an american crypto product (honestly i dont want to use American based crypto anything at this point). Is OpenSSH SSH2 compliant ?
  • One aspect of OpenSSH that many people should like is that the most recent security hole in ssh-1.2.27 was non-existant in OpenSSH. For that reason alone, OpenSSH might be a better choice -- especially with the lack of developer news concerning ssh1 and ssh2.

    Does that mean that OpenSSH would be more secure? I don't think so. The fact that it didn't have the bug which was in ssh-1.2.27 does not mean that it wouldn't have bugs which don't exist in ssh. The fact that there haven't been so many OpenSSH bugs in public simply means that it isn't as widely used as ssh. Widely used == widely tested.

    Repeat after me: There is no bug-free software! (and ssh is actually really good; I can only remember two "public" bugs in it in the last year or so, compare to e.g. browsers..)

    On the other hand, it might be possible that OpenSSH would respond faster to security bugs; If it becomes really popular, time will tell.


    --
  • by SEAL ( 88488 ) on Wednesday November 17, 1999 @07:51PM (#1523346)
    I will try to avoid the classic open / closed source arguments here, although they creep in a little bit :-)

    I think OpenSSH is very important to everyone. License status aside, it represents an alternative way to use the SSH protocol. Some people may prefer it while others may like the closed source version. But I think more people overall will be using one of the two. This is a good thing. There's still alot of plaintext authentication on the net, and I'd be happy to see less of it. POP3, FTP, and telnet are all commonly used, for example.

    We all know the average user is lazy about passwords. Sniffing one password often compromises many things. Yes, the user is at fault but now the sysadmin can do something about it (namely wrapping the protocol in SSH). With OpenSSH, perhaps more sysadmins will agree with the licensing.

    Additionally, I seem to remember reading somewhere that the IETF needs two independent implementations of a protocol before it can progress towards being an official standard. (Someone correct me if I'm wrong - I'm sorry I don't have a link to provide). With that in mind, SSH can get the IETF's blessing before a corporation with its own goals decides to muck with what should be in the standard.

    Just my $.02

    SEAL
  • Sorry I shouldn't have called it open vs. closed source. I meant to emphasize that OpenSSH has a less restrictive license. My error.

    SEAL
  • Excellent, ssh with a less restrictive licensing is a very powerful tool for sysadmins.

    At the risk of getting flamed, does anyone know if there is a Windows client program that will work with OpenSSH? All Matter-AntiMatter jokes aside, I like to be able to admin from as many different platforms as possible (flexibility) and currently use TeraTerm's SSH extensions. Is there a free (speech, beer, whatever) 'doze client that will work with OpenSSH?

  • by Anonymous Coward
    Heh. Yeah, I *could*. It's conditional. I've debated that one before, but never enough to post it.

    However, I couldn't care less about your post. ;)

    ...and next time I'm writing in English, I'll be sure to say:

    OpenSSH.cool = 5; me.care = 8;
    (OpenSSH.cool>me->care) ? me.contribute(OpenSSH) : me.dolife();
    (OpenSSH.cool>3) ? Debian->nerds->contribute(OpenSSH) : Slashdot->nerds->flame(OpenSSH);

    ---

    pb, but who cares, eh?
  • Stuff like the latest exploit?

    Has there been an exploit? I remember seeing a buffer overflow. I also seem to remember someone saying it would be *hard* (but not impossible) to exploit.

    I've still not seen any exploits floating around.


    --
  • Since SSH contains crypto algo, can OpenSSH be used OUTSIDE of the U.S. of A. ?
  • But this is more than free speech, this is liberty.
  • I was using ssh for a while. Then I heard of open ssh. Installing openssh was easier (rpm) and so was configuring it. When I got openssh running I got rid of telnet completely.

    Originally when I got ssh I got the newest version. 2.x.x then I realized that it was incompatable as hell. So I had to get the 1.x.x version. openssh just worked, Everyone should use it, there is no reason not to.
  • >

    The OpenBSD project is based in Canada.

    The Export Control List of Canada places no significant restriction on the export of cryptographic software, and is even more explicit about the free export of freely-available cryptographic software. Marc Plumb has done some research to test the cryptographic laws.

    From http://www.openbsd.org/crypto.html [openbsd.org].

  • by arcade ( 16638 ) on Wednesday November 17, 1999 @08:09PM (#1523357) Homepage
    We all know the average user is lazy about passwords. Sniffing one password often compromises many things. Yes, the user is at fault but now the sysadmin can do something about it (namely wrapping the protocol in SSH). With OpenSSH, perhaps more sysadmins will agree with the licensing.

    For me and you, and probably the rest of the slashdot readers, its obvious that sending passwords in the clear is a Bad Thing (tm). The problem is that most people don't give a damn about getting their passwords sniffed. (Ha! Someone may read my email! What a catastrophy!). I've heard the last argument at least 10 times during this term at the university ALONE.

    What they don't realise, is that they compromize a LOT more than just their email. They make the systems vulnerable to local exploits. Careless users is a *Bad Thing* -- but they don't seem to care.

    Why don't sysadmins just disable telnet / ssh and so on? Well, the problem - of course - is that would send people rioting. People want to use the application they're used to. They don't give a damn about security. Me, and a lot of other administrators, tend to set up pop3only accounts - so that if the pop3 pwd is compromised -- nothing but the persons email is available for the sniffer (i hope? :-). But, if they use the same pwd for their pop3 and for their shellaccount - then there is trouble.


    You mention the lisence. Yes - a lot of us want to be 'good buds' who use the open source things. But, if it means that I've got to compile Yet Another Program - then it will be done .. tomorrow. Always tomorrow, never today. That means it will take time. People will start using it - SLOWLY. Not necessarily because they are afraid of using something new -- but they want to do LESS work. And, since they're already using the non-GPL'en version , and using it happily -- why should they do a lot of "unneccessary" work? (I will do it.. in time.. because I want to support the Effort. ;-)


    ohwell, yet another long slashdot rant in my probably far to shabby english.


    --
  • At the risk of getting flamed, does anyone know if there is a Windows client program that will work with OpenSSH?

    At the risk of making a fool of myself (again). I think you may use all existing SSH1 compilant clients.


    --
  • One of the aims of Debian is to produce a distribution that is as unencumbered as possible. In this case, OpenSSH is quite obviously more "free" than the original SSH, so if you don't like that policy, I'd say it's time for you to move to a distribution like TurboLinux that has no qualms about including commercial or otherwise "less-free" software.

  • That's the point. You couldn't distribute SSH in america to foriegners. OpenBSD is based in Canada (so it gets passed all the mess US laws), so yes.

    I think, but I likely have this confused, that US developers couldn't design a free implement because of the patents and export laws. When OpenSSH came out, I remember one of my LUGs chatting about wanting to port or copy (whichever got Linux the most credit), but were annoyed because US developers would only hurt the project.
  • If there's a hole in something as widely used (and blindly trusted) as ssh, you can bet there are lots of folks working on exploiting it.
  • Keep in mind OpenSSH is by the same folks that brought you OpenBSD. They don't code sloppy.
  • by phred ( 14852 ) on Wednesday November 17, 1999 @08:19PM (#1523364)
    "Coerced" is awfully strong language. So is "politics." Some might even consider them swear-words. Instead, may I suggest: "Consistency." "Principles."

    As is often the case, here we have someone wanting to make a noisy controversy out of a normal event. The background, as I understand it, is that the OpenBSD folks didn't much care for the Data Fellows licensing policy for the new ssh, so they decided to rewrite the old version 1 as OpenSSH, and in the process nipped at least one known bug. The new version will be in OpenBSD 2.6 scheduled for release on December 1.

    Meanwhile Debian decided to substitute this version, in line with its policy to have only totally free packages in the free distribution. The other version will continue to be available in non-free.

    It's not as if this is some deep dark secret, nor has it been some big folderol. Matter-of-fact coverage can be found at BugTraq, OpenBSD and the Debian development lists.

    There was also an announcement in Joey Hess' Debian Weekly News last week -- and here [debian.org] is the real scoop from Phil Hands.

    "Politics" myass.

    -------
  • Debian actually switched out the ssh package to be ssh-nonfree and brought in the OpenSSH as their ssh about two weeks ago in potato.

  • by demon ( 1039 ) on Wednesday November 17, 1999 @08:24PM (#1523367)
    I recommend Tera Term Pro [vector.co.jp] and the TTSSH extension [zip.com.au] if you must use Windows. Or use MindTerm [mindbright.se], which is a Java-based SSH client. I've used both, and they both work well with any SSH 1.x server. (Including OpenSSH.)
  • Well, yes, it's called rsh, and it's exactly that sort of idiocy that ssh was designed to prevent. Relying on either hostnames or IP addresses for authentication is about the easiest way to get your box rooted by someone that can do elementary spoofing. Don't use it.

  • I'll continue to use ClosedSSH

    Show me "ClosedSSH" - you won't find it. The SSH 2.x package is under a more restrictive license, for sure (I haven't paid much attention to the original SSH 1.x license, but it must have been liberal enough for the OpenBSD folk to adopt - good thing).

    just because of all the superior algorithms and stuff

    Umm. only the patent-encumbered algorithms (nee IDEA and the like) were removed. Blowfish, however, is NOT encumbered (Thank you Bruce Schneier!), and is one of the encryption methods still included in OpenSSH. I think 256-bit Blowfish encryption should be strong enough for most people's purposes... don't you think???
  • Seriously, why does the US even bother with cryptographic export laws

    I think we Americans ask ourselves that regularly. :)
  • Can I now just delete my SSH installation(s) and replace them with OpenSSH/Psst/LSH? Will OpenSSH etc work transparently with commercial SSH? What impact does not having support for the patented algos have?

    Also can someone compare SSH, OpenSSH, Psst and LSH. What state is each of them at WRT each other?

    TIA,

    --
    Simon.
  • I really need to pay attention to the world. I missed this little security hole. Ah, well, all patched up now. At least ssh, while not being free in all the good ways, has source code available which is heavily reviewed. I guess that would be Visible Source software. Should I trademark that name, do you think? :-)
  • by fries ( 14958 ) <todd@fries.net> on Wednesday November 17, 1999 @09:05PM (#1523376) Homepage Journal
    re psst .. I'm sure any contributions from psst
    would be welcomed, and I'm sure psst can read the
    license and note they're welcomed to any code in
    the OpenSSH tree, but a merger I doubt would occur, considering the different audiences each
    is addressing.

    re sshv2 protocol, it is a freely available spec,
    and as such, has potential to be implemented in
    OpenSSH (although has not yet been done). The
    initial thrust of OpenSSH was to have something
    equivalant to and compatible with ssh-1.2.x in OpenBSD 2.6, and that has certainly been accomplished. It is certianly not illegal to implement it in a free product; that the commercal
    'ssh2' program costs something is the company
    charging for their programmers, not the protocol.

    While the incident with 1.2.27's security bug doesn't necessarily suggest OpenSSH is more secure in general, it does seem interesting to note that
    in the code cleanup of creating OpenSSH, the bug
    was accidentally fixed. Hats off to the programmers who have a high enough standard of coding that they accidentally fix bugs :-)

    ClosedSSH has superior algorithms? I implore you to back your statement with facts. Last I checked, the algorithms available in OpenSSH are
    limited to those in the crypto library, and there
    may be less algorithms in OpenSSH than ClosedSSH
    because of this, but why include the insecure ones?

    Beware of two things. First, I'm not a lawyer. Second, I believe my understanding of the crypto laws suggests if you compile it outside the us, you can use it outside the us, if you compile it inside the us you can't ship it outside the us,
    and if you use it in the us, you can't use an
    alternative to rsa's library if you wish to use
    that particular algorithm, which at this time
    requires commercial entities to talk to rsa for
    licenses. I think. Someone maybe should confirm this though.

    Read the man page for logging in from a particular ip without a password. Look for .shosts.
  • You use the .rhost and .shost files in the home directory of the target machine... long time since i set it up, but it is described in the man pages.

    Another option is to use ssh-agent, which means that you only need to enter the password once, and can log into all sites you have access to without entering a password.

  • Putty's another good client, although its not particularly configurable at the moment.
    CloudWarrior . "I may be in the gutter but I'm looking to the stars"
  • >Debian has been coerced into renaming the OpenSSH
    >package to SSH. In other words, people who are
    >upgrading their system will have the real SSH
    >transparently removed and replaced with OpenSSH.

    Bullshit.

    When installing the new Debian ssh, you will be warned if you don't have debconf on your system, and if you do, It explains that they've changed the name of the 1.2.27 ssh package.


    >There is no warning although the functionalities
    >are not equivalent. The original SSH package has
    >been renamed.

    How are they not? I am able to connect to 1.2.27 servers w/ the OpenBSD version.

    X11 Forwarding, ssh-agent, and all of the pgp Identification all work fine.
  • The US government still thinks like a dinosaur mother - not particularly quickly nor effectively, but with concern for its eggs. It's just those damned mammals underfoot "what causes unrest". The US has always thought that two big oceans meant it really could keep the world outside. The same unstated assumptions lead the Soviet coup-makers to not bother to seize the TV stations for hours and ignore those silly newfangled fax machines (actually more useful against the coup-makers than the net, at least at that time). I would sympathize, but as a Canadian who is appalled by US legislation that tries to penalize companies in other sovereign nations that dare to trade with Cuba (which unlike, say, Chile under Pinochet or Nicaragua prior to the Sandanistas were marvelously democratic engines of social reform), I consider this the usual "We're in charge here...and by the way, where the hell are we?" of American foreign policy. America is still far and away the most polite superpower in history, which is probably why many Canadians such as myself remain sympathetic with the goals if not always the execution of American foreign policy. Just remember that if you don't vote and don't get involved that you've got no right to kvetch (a marvellous Yiddish word meaning to bitch, moan and complain in however many modes your audience will tolerate until they have done with you - this message being itself an example). Let your congresscritter know that you think this not only futile, but just plain silly.
  • by Wanker ( 17907 ) on Wednesday November 17, 1999 @10:12PM (#1523383)

    There seems to be a bit of confusion about exactly what this software offers over the standard SSH. Hopefully I can help clear it up a bit.

    • Licensing

      SSH1 comes with a license which is rather ambiguous about commercial use. The most common interpretation is that it's OK to use it commercially so long as one isn't making a profit directly off it. (e.g. charging people for the software.) SSH2 is much clearer [cs.hut.fi]-- in order to use SSH2 in a business you must use the closed-source, $400-a-server version from DataFellows.

      Here is the vague portion of the SSH1 license:

      Companies are permitted to use this program as long as it is not used for revenue-generating purposes. For example, an Internet service provider is allowed to install this program on their systems and permit clients to use SSH to connect; however, actively distributing SSH to clients for the purpose of providing added value requires separate licensing.

    • Compatibility

      SSH2 clients cannot talk to SSH1 servers. This was by design in an attempt to drive people to upgrade to the new protocol. SSH1 clients are able to talk to SSH2 servers.

    • Patents

      The IDEA (default) algorithm is patented and requires a license to use commercially. The RSA algorithm is also patented, but that patent has either expired or is about to expire. If one can find a copy of "rsaref", formerly offered freely from RSA's FTP site [rsa.com], then one can use it instead of the internal RSA algorithm to work around this little hurdle.

    One reason there is demand for another implementation of the SSH protocol is so that people in small businesses can continue to use SSH while still maintaining access to the source code and also staying $400/server closer to being profitable.

    Given the incompatibility of the clients, upgrading from SSH1 to SSH2 requires a flag day [tuxedo.org] upon which day every client and server must be simultaneously upgraded to SSH2. Trying to upgrade in stages results in those with SSH2 unable to connect to SSH1 servers. It is possible to install both versions of the client, but the user will have to be the one "failing over" to the other version. Irritating at best, costly and time-consuming at worst.

    For more information about SSH implementations, check out the Open Directory Project's SSH Category [dmoz.org].

  • I have to admit I have issues with the OpenBSD folks who are maintaining OpenSSH.

    Their code is very BSD oriented, makes no attempt to be portable. (this is not inherently a huge sin, I am sure it was tiring writing the thing in the first place ;-) ) So some guy in Australia ports it to Linux/autoconf-automake so it will compile on Linux and other *nixs...

    Along the way, he introduces PAM (which is a *nix standard, OpenBSD just chooses not to use it) and in general improves the code (I don't have the rest of the feature list handy)

    instead of allowing him to merge it back into the code tree, or even offering to host it, www.openssh.com takes credit for it by adding a link labeled "Linux/Solaris" and links directly to the ftp location. No acknowledgements, no link to the web page.

    This sort of snottiness may or may not be endemic to the *BSD community, such a generalization would be unfair. HOWEVER it _does_ worsen their reputation, not to mention fly in the face of the commonly accepted code of ethics that accompany the open source concept.

    I do not mean this as a flame of anyone other than those from the OpenSSH project who were actually involved in the decision to ignore the compatibility initiative. The rest have my unequivocal admiration and gratitude, as the product itself (OpenSSH) is very impressive, and we all should thank them for volunteering their time to provide us with it.

    And for the record, other than admiring him and his work, I have no relation to that chap from Australia nor his port of OpenSSH to Linux...

    -RS
    We are all in the gutter, but some of us are looking at the stars --Oscar Wilde
  • Actually, OpenSSH and the original ssh are equally affected by US laws against exporting cryptography. The difference is that the OpenBSD people are not located in the US, so they don't need to worry about exporting ssh. If RedHat weren't a US company you could already download ssh RPMs from them without filling out any forms.

    Of course, you can already find RPMs for ssh from other non-US sites. Try rpmfind.net [rpmfind.net].

  • Compatibility

    SSH2 clients cannot talk to SSH1 servers. This was by design in an attempt to drive people to upgrade to the new protocol. SSH1
    clients are able to talk to SSH2 servers.


    I must disagree, if one compiles ssh1 and then ssh2, ssh2 autodetects its existence, and compiles both the ssh2 daemon and client such that it can accept connections from ssh1 clients, and connect to ssh1 servers.

    ssh1 clients cannot connect to ssh2 servers w/o this, as the protocols are completely non-interoperable.

    FWIW, the SSH2 protocol is actually better

    Given the incompatibility of the clients, upgrading from SSH1 to SSH2 requires a flag day upon which day every client and server must be
    simultaneously upgraded to SSH2. Trying to upgrade in stages results in those with SSH2 unable to connect to SSH1 servers.


    again this is incorrect, a "proper" installation of ssh2 over ssh1 will not have this problem unless you specifically compile ssh2 to not have compatibility (which would truely be foolish)

    -RS
    We are all in the gutter, but some of us are looking at the stars --Oscar Wilde
  • by Forward The Light Br ( 21092 ) on Wednesday November 17, 1999 @10:28PM (#1523387)
    DISCLAIMER: I do not support this law, I just want to explain it.

    Seriously, why does the US even bother with cryptographic export laws when many other countries can ship products that contain the same
    strength encryption as they are trying to keep locked up?


    the theory goes, that much of the crypto (and generally, much of the research in areas restricted by this law) reseach in this country is sponsored at least partly by the federal government, the development of crypto entirely in the private sector is a new developement (as opposed to simply implementing it, which has been private sector for a while)

    The federal government did not want to fund research that could come back to haunt them in terms of inhibiting SIGINT obtained overseas from being useable.

    Realize that this is an old law, and the crypto battle between the Soviets and the US was very active for much of the last 50 years.

    Even now, the US government has an interest in trying to prevent strong crypto from existing outside this country, and in point of fact, most currently existing crypto DOES originate from inside US borders (SSH included)

    the only caveat is that the US Judicial branch has ruled that the federal government had better have a very compelling reason to inhibit written speach. To legislate prior restraint is almost impossible...

    to keep the law constitutional, written algorithms were exempted from the law.

    That is how PGP got outside the US, and how OpenSSH was able to exist.

    Even if some crypto is leaking out, the USG has a compelling interest in trying to read foreign SIGINT.

    I think they should just invest more money in finding ways to break the codes, as that is likely to be more effective, but I fault them more for their methods than their motives...

    -RS
    We are all in the gutter, but some of us are looking at the stars --Oscar Wilde
  • by MagicMike ( 7992 ) on Wednesday November 17, 1999 @10:30PM (#1523388) Homepage

    I have to say, with all the privacy stuff getting posted on /., and the entire "Your Rights Online" section, maybe its about time we recognized that being anonymous is actually a pretty brave thing.

    When I look back on it, I used to think being "anonymous coward" was cowardly, nowadays I'm thinking its not going to be too long before there's no choice in the matter...

    To be on topic for a bit, I just installed OpenBSD (yes, after I read the /. thing, okay, I'm a lemming), and its really very very nice. OpenSSH is from the same crew, and they do very good work. Tight security. Astounding documentation. Attention to detail. Very nice. More power to them.

  • This is a good thing.
    There's still alot of plaintext authentication on the net, and I'd be happy to see less of it. POP3, FTP, and telnet are all commonly used, for
    example.


    Join the IETF working-group mailing lists for these protocols! Most working groups (at least the one I am on) while not requiring an actual consensus, try for general agreement before making a decision, so if you have a good idea for a protocol, join up and let everyone know about it. You will be surprised what the ratio of corporate-sponsored members to random folk are on these WGs (heavily in the commercial folk favor) try to even it a bit. ;-)

    Additionally, I seem to remember reading somewhere that the IETF needs two independent implementations of a protocol before it can progress
    towards being an official standard.


    I am pretty sure this is correct, I remember seeing it on the (commercial) ssh webpage of all places ;-)

    -RS
    We are all in the gutter, but some of us are looking at the stars --Oscar Wilde
  • by Phil Hands ( 2365 ) on Wednesday November 17, 1999 @10:33PM (#1523390) Homepage
    no warning:

    The package tells you exactly what is going on using the shiny new debconf tool to put a nice dialog box up to ask you if you want to continue, or give you the chance to install ssh-nonfree instead.

    Coerced:

    As the Debian maintainer of both ssh (OpenSSH) and ssh-nonfree (the non-free ssh) I can tell you that the decision was mine. (I did check that nobody from the OpenSSH team minded)

    My decision was based on the fact that Debian does not consider non-free software to be part of the distribution, so if there is a free and a non-free implementation of a package, the free one gets the name because its actually part of the distribution.

    I've got nothing against ssh-nonfree (otherwise I wouldn't have maintained a Debian package of it for years) and I really appreciate the fact that Tatu wrote it, and allowed us all to use it. It just happens to be non-free, so the DFSG free [debian.org] alternative gets priority in our case.

    I hope that clears things up.

    Cheers, Phil.
  • Unfortunately, it is not easy to do a "proper" installation on a Win32 system. (Which, curiously enough, are the source of most of the complaints about SSH1 servers.) The DataFellows SSH2 Win32 client simply refuses to connect to an SSH1 server. I'll admit that it has been many months since I tried, so it's possible that they've since come to their senses.

    Don't even get me started about wishing for a better scp client. (The only one I know of requires CygWin-- which is too large for many users to download.)

    A great many people install just ssh2, assuming that since it's newer it will connect properly to all existing ssh servers. These people usually get a nasty surprise and start complaining that the ssh servers are "broken". I'm forced to agree. ("Broken as designed" comes to mind...)

    It's also a toss-up whether a binary distribution was built "properly" or not. Of course, something as critical as ssh really ought to be built from the sources, but laziness can be a great motivator.

    BTW, I agree that the SSH2 version is a better protocol-- I just wish DataFellows had implemented it so that the upgrade could be more trouble-free.

  • Debian never distributed the SSH package anyway.

    If debian never distributed ssh (which comes as a surprise to me, given that I've been maintaining it for over two years) then why are you complaining that it overwrites the old package?

    Why does Debian decide to BREAK the user's system by RENAMING packages?

    If OpenSSH has broken your system, please report a bug, and I will endeavor to resolve your problem.

    If on the other hand you are just being an idiot, please shut up and stop wasting our time.

    Cheers, Phil.
  • Sorry I guess I wasn't very clear, especially with my little slip up about licensing.

    First part: stupid users

    The idea here is to make things transparent to them. Let them use their same old apps, but make the behind-the-scenes networking secure. For example, some mail programs can now connect using SSL. If a sysadmin sets it up this way, the end user doesn't usually care (or even know). That's how we need to attack the stupid-user problem. I agree with you that we can't rely on them to get un-stupid.

    Part 2: licensing

    I said that having OpenSSH in addition to SSH will serve to increase the number of people using this protocol. Reason: I was thinking of the sysadmin ohhhh... like ME :) who wanted SSH installed at work, but was prevented from doing so because the boss didn't want to pay for it. OpenSSH is a blessing for people in my position.

    Other companies may prefer to purchase SSH so that they have someone to call up when things go wrong. That's OK too - there's nothing wrong with paying for a commercial version. I think it is a good thing to have BOTH implementations out there.

    Best regards,

    SEAL
  • You stated that SSH1 clients cannot connect to SSH2-servers ....
    Well i think I can burst this bubble, as the way the FreeBSD-ports system installs SSH happens to work around this problem just fine.

    FreeBSD's ports-system has SSH1 as a dependency for SSH2. When installing SSH2 it therfor automatically installs SSH1 as well ... renaming the binaries to ssh*.old or something similair.

    Now the fun part.

    When I create an ssh-connection to any server on default ssh2 is used to make that connection.
    If however ssh2 detects it's connecting to an ssh1-server ... it will (just like you said) revert back to the ssh1-protocol.

    When an ssh1-client however connects to my system, which is running the ssh2-server, my ssh2-server detects an ssh1-client is connecting and activates the ssh1-server to handle that specific request, completely transparently.

    This means that by simply installing the FreeBSD's ssh-ports. I do not have to manually fiddle with ssh1/ssh2 to connect to servers ... and others do not have to manually fiddel with ssh1/ssh2 to see which one they should use to connect to my system.
    As all is handled internally automagically for you.

    I would say if the FreeBSD ports can do this. So should any other OS be able to do the same thing.
  • Comment removed based on user account deletion
  • Perhaps you should try using the software, before complaining about it.

    If you find a real, non-ficional non-FUD-based problem, please report a bug.
  • SSH is NOT distributed on the Debian/GNU CD.

    Neither will OpenSSH be (on the official USA CD anyway). Not until the USA develop a sensible crypto policy --- your point is ?

    Some kind soul has made it available on a site outside the US where there are no legal problems. HTH.

    Oh dear. Your talking to one of the ``Kind Souls''. Doh!

    OpenSSH is not fully compatible with SSH as it does not support all the encryption algorithms. Please RTFM.

    And this has affected you has it? I doubt that very much, but if so, please report a bug. I'm not saying I'll be able to fix it in this case (for obvious reasons), but it'll be amusing to hear what weirdness you've indulged in to actually notice the missing algorithms.
  • Perhaps you should actually check out debconf before criticising it.

    As it happens you could easily run it under expect, but since one of the main objectives of debconf is to allow Debian to do non-interactive installs, doing so would not be a particularly bright thing to do.
  • Even now, the US government has an interest in trying to prevent strong crypto from existing outside this country, and in point of fact, most currently existing crypto DOES originate from inside US borders (SSH included)

    Hmm? Tatu Ylönen is a Finnish programmer and SSH Communications Security Ltd is a Finnish company.

    Cheers,
    -j.

  • I never used ssh or telnet or any other way of remotly connecting to connect to my box. All my ports are closed and I feel safe from outside attacks. But I have always wanted to connect from my school as they run Windows (a Bad Thing) and I run Linux (a Good Thing) and I am in a programming class. I think now with this openssh I will get VNC and do so. Does anyone know if there is a windows version of openssh?


    If you think you know what the hell is really going on you're probably full of shit.

  • It's newer.

    Duh.

    You haven't been using computers very long, have you :-))

    -
    We cannot reason ourselves out of our basic irrationality. All we can do is learn the art of being irrational in a reasonable way.
  • Read the man page for logging in from a particular ip without a password. Look for .shosts.

    Or search google for RSAAuthentication. You should come across a .gov mailing list that discusses a bit about it. There were too many URL's to list here. The only reason I even mention it, is that I spent 2 hours last night trying to get it to work for this webcam software that I'm trying to get to replace ftp with sftp and didn't feel like putting the recompiling the damn thing everytime I changed the password on that account.
    "We hope you find fun and laughter in the new millenium" - Top half of fastfood gamepiece
  • Then what is the point??

    You had an unfounded objection to something. I explained why it was unfounded. What more point do you require?

    You are still clobbering the original program with another completely different one.

    Given that the two programs in question are branches of the same source tree, and that OpenSSH is intended to be a drop in replacement for ssh-nonfree, characterising them as completely different is ridiculous.

    This is madness and I'm sorry you don't get it.

    LOL
  • Nice to be appreciated :-)
  • Changing the binary for ls, telnet or something else in there system. No reaction at all. They and every most other software developers have changed the default binary and or source base. So why not Debian? Peronaly I was a little sceptical but that actuallt not the worst chnage in Debian history.

    / Balp
  • Lsh is not really ready for real-world use yet, but it's making progress. It's based on the IETF spec on the SSH2 protocol.

    For developers who want to have a look at what's being done, you can have a look http://www.lysator.liu.se/~nisse/lsh/ [lysator.liu.se].
  • On the subject of the "dumb US export laws" discussed above, be aware that the restriction is on all export of crypto implementations.

    So if you are in, say, Europe, and download the SSH implementaion to your laptop you are OK to travel to the USA. However, legally you can not leave until you have deleted SSH from your laptop.

    I know they do not normally search your harddisks at the airport, but you might want to consider the implications if they make an exception for you.

    (I remember this was a real problem fro a Swedish company who used strong encryption for their internal e-mail systems. Their executives had to wipe their laptops everytime they left JFK and then re-install back in Sweden. It really is a stupid law.)

  • I wouldn't say that his complaint is with the OpenBSD folks not supporting the Linux OS. He just stated that they didn't incorporate the PAM standard. He is mainly complaining that they didn't give credit to the poor Australian chap for his work.

    I disagree with him not with you arguement. But if you go to the site [ibs.com.au] you will see the following credits:

    Credits -

    The OpenBSD team
    'jonchen' - the original author of PAM support of SSH
    Dan Brosemer <odin@linuxfreak.com> - Autoconf and build fixes & Debian scripts
    Niels Kristian Bech Jensen <nkbj@image.dk> - Makefile patch
    Nalin Dahyabhai <nalin.dahyabhai@pobox.com> - PAM environment patch
    Phil Hands <phil@hands.com> - Debian scripts, assorted patches
    Niels Kristian Bech Jensen <nkbj@image.dk> - Makefile patches
    Marc G. Fournier <marc.fournier@acadiau.ca> - Solaris patches
    Thomas Neumann <tom@smart.ruhr.de> - Shadow passwords
    Jim Knoble <jmknoble@pobox.com> - RPM spec file fixes


    Steven Rostedt
  • If OpenSSH removes the patent encumbered algorithms that are used in vanilla SSH, does that mean that the two cannot interoperate? Or has vanilla SSH included unencumbered algorithms all along, so that the two versions can just use those algorithms to communicate?


    I use ssh as my primary way of logging in to my work machines from home, and I'd like to install the free version of ssh, but the machines at work are not under my control. Am I going to run into compatibility problems if I install OpenSSH here but can't convince the powers that be to change over?


    -r

  • Interesting concept. Did you even bother to
    suggest that the web page be changed before you started openly flaming a volunteer effort here?

    Here's a thought for you. Most of your networking package, daemons, standard rpc and telnet and ftp and etc came originally from ... bsd!

    So do you condone the BSD world for not supporting
    Linux in their source trees? What on earth would ever entice them to do so?

    If you consider it 'not nice' to provide a link to an existing usage of the OpenSSH program, what do you expect to happen from your statements? I daresay that any contribution to the source will be credited in the commit message, the typical way of giving credit in any BSD project. If no contribution from that Linux port was given back, why should you be complaining?

    As for the suggestion that pam is a unix standard, well, as far as I'm concerned it is typical of 'blind and free' software advocates views. Have you ever looked at the pam sourcecode? It is a mess. A hideous mess. On top of that it is hard to figure out and even harder to implement a new module. And you TRUST this convoluted mess as your authentication standard? Any clues as to why BSD has chosen to use the 'true' unix standard POSIX libc functions as their 'standard' authentication library?

    Since OpenBSD is the only distribution I know of that has the ability to ship with a package in the core os that is encrypted like it is, why the problem with the fact that you have to download and do your own custom patch each time you want to update the OpenSSH you have? BSD has been doing this for years with a system called 'ports'. 'make install' in the proper directory, and files download themselves, patches apply themselves, source builds itself, and without further interaction the package has been upgraded. It's not a new concept is my point, and I don't understand how you can suggest it is worse than trivial to accomplish.

    If OpenSSH hosts any packages, and they refused your particular author's package, that would be one thing. But do you see a 'list of downloadable packages' on the web site? I don't. I see a reference to where the source is and the first os that is going to ship with the software, as well as a reference to every other os that has implemented packages of the software. How in this planet can that be anything but fair?

    If anyone wishes to contribute and improve the OpenSSH that is freely available, without tainting its freely available license, I cannot imagine it would be unwelcomed. This implies implicit activity on the behalf of the contributor, not on the OpenSSH development team whos jobs are not defined as 'go digging through all packages created from OpenSSH to detect any potentials for contribution' ..

    As for the complaint about being BSD oriented, well, apparently that is not something that cannot
    be overcome, it works fine in Linux as many fine individuals will attest, and it may even suggest more secure ways of programming (mkstemp anyone?).

    Lastly, I suggest you get yourself an attitude check. You do the free community a dis-service by dissing some very hard working developers who have provided you with a freely available product. Guess what freel avilable means? If you don't like it, you have the source. It does not mean if you don't like it you have a right to complain until things go your way. You could always grab
    yourself a copy of OpenBSD, pay secnet.net for
    support, and whine at them waving your money till you are satisfied, but I doubt your money is where your mouth is.
  • the theory goes, that much of the crypto (and generally, much of the research in areas restricted by this law) reseach in this country is sponsored at least partly by the federal government, the development of crypto entirely in the private sector is a new developement (as opposed to simply implementing it, which has been private sector for a while)
    The federal government did not want to fund research that could come back to haunt them in terms of inhibiting SIGINT obtained overseas from being useable.


    Funding research and prohibiting exports are completely different things. The Feds have a full right not to give money to projects they don't like. That doesn't translate into export restrictions, however. Besides, it's not like these damned foreigners are completely clueless and cannot come up with a crypto system of their own.

    Even now, the US government has an interest in trying to prevent strong crypto from existing outside this country

    Probably true, but so what? The US government also has an interest in having everybody on this planet answering "Sir, yes Sir!" every time a US official asked them to do something. It also has an interest in having all governments and corporations send to the US copies of all their correspondence, reports, and meetings minutes. So?

    in point of fact, most currently existing crypto DOES originate from inside US borders (SSH included)

    Thanks to the export restrictions this fact is rapidly changing (and SSH was coded in Finland AFAIK).

    Even if some crypto is leaking out, the USG has a compelling interest in trying to read foreign SIGINT.

    Just because the government has an interest, it doesn't necessarily have the right to do everything to further that interest, especially when the means it chose are stupid, do not work, and are the laughingstock of all more or less civilized world. Yes, I know the argument that these restrictions are quite effective in preventing widespread default use of crypto, but the loss of credibility for the US government has been substantial. Besides, the world is a small place. All it means is that US citizens and companies are locked out of a quite an important area.

    Kaa
  • I use Vandyke's SecureCRT software, which is a win32 SSH v1, v2, telnet, and general terminal emulation client. Version 3.0 lets you connect to either SSHv1 or SSHv2 servers with lots of encryption/compression/port forwarding options. If you're using a client like this a v1 to v2 server upgrade "flag" day isn't as annoying as it could be.

    I don't have any affiliation with Vandyke, but I would like to say that they make beta releases readily available, return email promptly with a personal reply, and emailed me the the upgrade license from version 2 to version 3 without any "upgrade" charge. Yes, it's closed, non-free software, but much better than most I've dealt with.

    -OT
  • Of course (Free)BSD can do SMP ....
    Why shouldn't it be able to ?

    Next time you want to start flame-war topics like these ... please be at least man enough to put your name on it as well
  • Even now, the US government has an interest in trying to prevent strong crypto from existing outside this country, and in point of fact, most currently existing crypto DOES originate from inside US borders (SSH included)

    Hmm? Tatu Ylönen is a Finnish programmer and SSH Communications Security Ltd is a Finnish company.

    Now, take this one step further...

    This would imply that US export restrictions have the most effect upon US citizens and corporations. Since the rest of the world merely goes to an archive (in say Finland) and doesn't bother going to the US for crypto, US citizens, being used to getting nearly everything from American sites, go to American sites and have to fill out forms and sign agreements and do a two-step to download crypto components.

    Net result -- the US government knows who has crypto, and also puts barriers in the way of those trying to get crypto (every additional click and form submission reduces the % of Americans likely to download crypto). Why would they care???

    Because they're concerned with spying upon the American people -- and crypto slows that down.

    Drop the export restrictions and there's no good excuse to make Americans fill out forms to get crypto.

    Starting to make sense?

    [ by the way, mr. 3-letter agency, I use PGP, GPG, SSH, SSH2, OpenSSH (now), IPsec/IKE/ photurisd/isakmpd, PGPNet, anonymizer.com, the new beta of Freedom (zeroknowledge.com), DES, 3DES, blowfish, StegFS, outguess, twofish, Kerberos, and I'm sure some others that I've forgotten. I'm a US citizen. Screw you criminal bastards. ]

  • It's a European product, remember?

    I think the AES competition (www.nist.gov/aes [nist.gov]), a competition for the replacement of DES by the U.S. government, should finally put a end to the lie that the U.S. has some kind of monopoly on encryption. A full 40% of the finalists were foreign in origin, despite a selection process that was biased for American solutions.

    Similarly, while MIT/RSADI hold the U.S. patent on the RSA public key encryption method used in SSH, most modern cryptographers believe that RSA public key encrpytion is obsolete. Most of the work on its proposed replacement, elliptic curve cryptography, is being done in Britain and Canada (in fact, the biggest vendor of elliptic curve cryptography is Canadian).

    Don't get me wrong, the U.S. still has many great cryptographers. Bruce Schneier, Ron Rivest, the list goes on. But I seriously doubt that the U.S. still does the majority of public cryptographic research. If you don't believe me, go browse the cryptographic links section on my home page [tripod.com].

    -E

  • First :

    You can add the patented algorithms to OpenSSH just by installing the right shared libs, it's a personnal decision and not the default because of CDs distribution. (and because patents sucks)

    Second :

    ssh always included non-patented algorithms like triple-DES.

  • Theo's dead?? You would have thought it would have hit all the news. I mean, he's the founder of OpenBSD! If he really is dead, I have dibs on his bicycle.

    (let's see if we can start a rumor here).
    -russ
  • if you dont like debian, dont use it. this is why we have fourteen thousand linux distributions. I'm quite certain you can track one down that doesnt get your panties all in a knot.

    if the maintainer of a distribution wants to change the distribution, and if users of the distribution are allowed to use other distributions, there is no problem at all. I see no way to compare this to "OH WHAT IF MICROSOFT DID THIS".

    quit bitching. thanks!
  • Does ttssh work with OpenSSH ? And BTW do you know of any mac clients that work ?

    Cheers,

  • Most Linux compiles of 'ssh' have for years defaulted to the Blowfish encryption method rather than the patented IDEA encryption method that was removed from OpenSSH. If you wish to connect to a 'ssh1' server from an OpenSSH client, it will automatically adjust to use BlowFish. If you wish to connect from a 'ssh1' client that was not compiled to default to Blowfish, you MAY need to pass it an option to tell it to go to 'Blowfish' rather than IDEA.

    One thing I'd like to do is remove the RSA encryption entirely from SSH and replace it with a non-patent-encumbered method of doing the public key authentication. RSA really isn't necessary anymore, there are now patent-unencumbered methods for doing public key session key exchanges and public key digest authentication without use of the RSA patented algorithm. My understanding is that RSA was kept in OpenSSH because it's necessary in order to maintain backward compatibility.

    So yes, backward compatibility should be maintained by OpenSSH, unless something seriously stupid was done. I'm about to go test that theory personally :-).

    -E

  • The idea here is to make things transparent to them. Let them use their same old apps, but make the behind-the-scenes networking secure.

    Only works if their clients support "secure" connections.

  • nstead of allowing him to merge it back into the code tree, or even offering to host it, www.openssh.com takes credit for it by adding a link labeled "Linux/Solaris"

    Wait a minute ...

    • The OpenBSD crowd are a small team, and they've been working their butts off on OpenSSH. They can't integrate the fixes into the source tree overnight ( remember, they will need/want to audit every line of code ).
    • Do they really "take the credit" ? If all contributor's names are in the credits file, then they are playing fair. If not, you may have a point. ( It looks like they do give credit - see this thread )
    I don't think the OpenBSD people are being exclusivists. And I think you should be a little patient. I think they will cooperate. However, the OpenBSD place emphasis on quality development, not "rapid development". Don't expect everything to happen overnight.

  • People have no sense of humor these days (Russ excepted :-).
  • by dmiller ( 581 ) <djm @ m i n d r o t . o rg> on Thursday November 18, 1999 @09:34AM (#1523446) Homepage
    As the "guy in Australia" who made the changes you mentioned, I cannot agree with your view. The OpenBSD developers have been very accomodating and we have been actively swapping patches and bug reports. I have not been "improving the code" as it is of good (and improving) quality already.

    I have no expectation that the OpenBSD developers choke their CVS tree up with cross-platform cruft. Part of the reason why their OS is so clean and secure is that there is none of that junk in there. As mentioned previously, we do exchange patches to close bugs and add features.

    Finally I find it ironic that, in a diatribe about how others failed to give me due credit, you didn't even bother to use my real name.

  • no, if you install ssh1 and then ssh2 on a server, ssh1 clients will be able to connect to the server transparently, on *BSD or Linux or any other *nix...

    _however_ if one does a pure SSH2 install, the ssh1 client cannot connect... all I meant was that the protocols are mutually incompatible...


    We are all in the gutter, but some of us are looking at the stars --Oscar Wilde
  • I was under the impression that SSH had originally been developed inside the US, (perhaps by Mr Ylonen) and then when time came to incorporate, they moved overseas...

    then again, maybe I am full of shit ;-)
    We are all in the gutter, but some of us are looking at the stars --Oscar Wilde
  • That is a frightening statement on their home page. Let's hope they do not honestly believe that.
  • "IMHO, closed-source doesn't necessarily mean evil. I think the present SSH is great. Admittedly, I'd prefer it if it was OSS"

    Excuse me, but where did you get the idea that the non-free (DataFellows) SSH (called ClosedSSH here for clarity's sake) was not OSS? While it may not be DFSG-free [debian.org] or meet Debian's social contract guidelines [debian.org], that doesn't means it is not OSS.

  • "IMHO, closed-source doesn't necessarily mean evil. I think the present SSH is great. Admittedly, I'd prefer it if it was OSS"

    Excuse me, but where did you get the idea that the non-free (DataFellows) SSH (called ClosedSSH here for clarity's sake) was not OSS? While it may not be DFSG-free [debian.org] or meet Debian's social contract guidelines [debian.org], that doesn't means it is not OSS.

    The problem which makes it non-free is one of (evil) licensing, not one of source unavailability.

    Had the source been unavailable, ClosedSSH would never have been viewed with any credibility in the cryptographic community, IMO.

  • Definitely not (to the first part :-).

    It was Tatu Ylönen's graduation work from the Helsinki University of Technology. So all original Finnish work.
  • "Most Linux compiles of 'ssh' have for years defaulted to the Blowfish encryption method rather than the patented IDEA encryption method that was removed from OpenSSH."

    While I do respect your knowledge of cryptography generally, Eric, I must question this.

    All of the man pages and associated documentation I've read over the years on sshd(8) and ssh(1) state that IDEA is the default cipher used, not Blowfish. Was the documentation which I read incorrect?

    Obviously, one can create site-wide configurations to change the default, in any case, provided the desired cipher is compiled into the binary. But I feel I must question the accuracy of "default" above.

    <humor> And no, I'm not promoting LAZARUS19U.ZIP here! &lt/humor> (Apologies to those not familiar with sci.crypt.)

  • I use scp in all of the scripts where I used to use ftp. Sure, the switches differ, but I think I fail to see why you say this is a "frightening statement". I don't believe they meant a literal s/ftp/scp/g would work.

    The ability to eliminate cleartext transmission of passwords is important to me.

  • I've been using the beta scp from the author of PuTTY [greenend.org.uk], a very good free SSH1 client for Win32.
  • While it may not be DFSG-free or meet Debian's social contract guidelines, that doesn't means it is not OSS.

    Huh? Are you not aware that the Open Source Definition actually is the same document as the DFSG? ESR and Perens just changed the name for the OSF.

    ---

  • Ooops ....
    Appologies on my behalf ... i seemed to have missed some of the earlier discussion ...

    looking back at it I indeed was entirely out of line
  • "One thing that I haven't figured out, though, is how to get the equivalent of ssh -l username with scp"

    scp filenamehere userthere@host.there:filenamethere

    Slashdot: docs for nerds [slashdot.org] ;)

  • NiftyTelnet will work on the Mac, but if you're inside the United States you need a license from RSA to use it legally (until September 2000). I don't remember seeing a version that uses with RSAREF.
  • Script usage is very much a corner case. How about interactive ftp?

The finest eloquence is that which gets things done.

Working...