From owner-freebsd-security Mon Oct 29 3:58:39 2001 Delivered-To: freebsd-security@freebsd.org Received: from purgatory.unfix.org (purgatory.xs4all.nl [194.109.237.229]) by hub.freebsd.org (Postfix) with ESMTP id 097AF37B407 for ; Mon, 29 Oct 2001 03:58:32 -0800 (PST) Received: from HELL (hell.unfix.org [::ffff:10.100.13.66]) by purgatory.unfix.org (Postfix) with ESMTP id 9AF8732E5; Mon, 29 Oct 2001 12:58:28 +0100 (CET) From: "Jeroen Massar" To: "'Tom Beer'" Cc: , Subject: RE: Putty & SSH Date: Mon, 29 Oct 2001 12:57:14 +0100 Organization: Unfix Message-ID: <000001c16070$da2620a0$420d640a@HELL> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Priority: 3 (Normal) X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook, Build 10.0.2616 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000 In-Reply-To: <005501c15eca$4a47aaa0$0901a8c0@system> Importance: Normal Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Tom Beer wrote: > Hi, > > first thanks for all the considerations! Hmmm dunno but the CVS version of PuTTY (which I built 10th of January 2001, 20:23) which nicely supports IPv6 (how should that come :) and for that SSH2 "problem": To FreeBSD: 8<---------------------- Server version: SSH-1.99-OpenSSH_2.9 We claim version: SSH-2.0-PuTTY Using SSH protocol version 2 Host key fingerprint is: 1024 fd:1e:f9:a8:f4:a0:20:84:08:8a:6a:2b:ea:03:fe:ea Initialised zlib (RFC1950) compression Initialised zlib (RFC1950) decompression Initialised triple-DES client->server encryption Initialised triple-DES server->client encryption Opened channel for session Allocated pty Started a shell/command --------------------->8 And to NetBSD: 8<------------------- Server version: SSH-1.99-OpenSSH_2.5.1 NetBSD_Secure_Shell-20010614 We claim version: SSH-2.0-PuTTY Using SSH protocol version 2 Host key fingerprint is: 1024 27:8d:06:d8:c0:42:fb:57:72:8d:9d:fd:f9:ae:b7:18 Initialised zlib (RFC1950) compression Initialised zlib (RFC1950) decompression Initialised triple-DES client->server encryption Initialised triple-DES server->client encryption Opened channel for session Allocated pty Started a shell/command ---------------------->8 And last but not entirely least () Debian GNU/Linux: 8<-------------------------------------- Server version: SSH-1.99-OpenSSH_2.9p2 We claim version: SSH-2.0-PuTTY Using SSH protocol version 2 Host key fingerprint is: 1024 8e:33:c5:85:92:2d:6d:b2:9e:ae:f1:0b:cb:1f:bd:bf Initialised zlib (RFC1950) compression Initialised zlib (RFC1950) decompression Initialised triple-DES client->server encryption Initialised triple-DES server->client encryption Opened channel for session Allocated pty Started a shell/command -------------------------------------->8 I think that SSH2 (nor compression:) isn't that much of a problem..... :) And with the PuTTY tools one can easily generate working keys for autologin too... Greets, Jeroen To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message