From owner-freebsd-security Mon Oct 29 5:11:45 2001 Delivered-To: freebsd-security@freebsd.org Received: from relay.pair.com (relay1.pair.com [209.68.1.20]) by hub.freebsd.org (Postfix) with SMTP id F234137B405 for ; Mon, 29 Oct 2001 05:11:38 -0800 (PST) Received: (qmail 90038 invoked from network); 29 Oct 2001 13:11:37 -0000 Received: from pec-134-70.tnt9.m2.uunet.de (HELO laptop) (149.225.134.70) by relay1.pair.com with SMTP; 29 Oct 2001 13:11:37 -0000 X-pair-Authenticated: 149.225.134.70 Message-ID: <000f01c1607b$4c47c3a0$0901a8c0@system> From: "Tom Beer" To: "Jeroen Massar" Cc: , References: <000001c16070$da2620a0$420d640a@HELL> Subject: Re: Putty & SSH Date: Mon, 29 Oct 2001 14:11:06 +0100 MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 5.00.2615.200 X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2615.200 Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Hey, and why is there a box in Putty to choose between ssh1 and ssh2, if the latter isn't supported? Greets Tom > Tom Beer wrote: > > > Hi, > > > > first thanks for all the considerations! > > Hmmm dunno but the CVS version of PuTTY (which I built 10th of January > 2001, 20:23) > which nicely supports IPv6 (how should that come :) and for that SSH2 > "problem": > > To FreeBSD: > 8<---------------------- > Server version: SSH-1.99-OpenSSH_2.9 > We claim version: SSH-2.0-PuTTY > Using SSH protocol version 2 > Host key fingerprint is: > 1024 fd:1e:f9:a8:f4:a0:20:84:08:8a:6a:2b:ea:03:fe:ea > Initialised zlib (RFC1950) compression > Initialised zlib (RFC1950) decompression > Initialised triple-DES client->server encryption > Initialised triple-DES server->client encryption > Opened channel for session > Allocated pty > Started a shell/command > --------------------->8 > > And to NetBSD: > 8<------------------- > Server version: SSH-1.99-OpenSSH_2.5.1 NetBSD_Secure_Shell-20010614 > We claim version: SSH-2.0-PuTTY > Using SSH protocol version 2 > Host key fingerprint is: > 1024 27:8d:06:d8:c0:42:fb:57:72:8d:9d:fd:f9:ae:b7:18 > Initialised zlib (RFC1950) compression > Initialised zlib (RFC1950) decompression > Initialised triple-DES client->server encryption > Initialised triple-DES server->client encryption > Opened channel for session > Allocated pty > Started a shell/command > ---------------------->8 > > And last but not entirely least () Debian GNU/Linux: > 8<-------------------------------------- > Server version: SSH-1.99-OpenSSH_2.9p2 > We claim version: SSH-2.0-PuTTY > Using SSH protocol version 2 > Host key fingerprint is: > 1024 8e:33:c5:85:92:2d:6d:b2:9e:ae:f1:0b:cb:1f:bd:bf > Initialised zlib (RFC1950) compression > Initialised zlib (RFC1950) decompression > Initialised triple-DES client->server encryption > Initialised triple-DES server->client encryption > Opened channel for session > Allocated pty > Started a shell/command > -------------------------------------->8 > > I think that SSH2 (nor compression:) isn't that much of a problem..... > :) > And with the PuTTY tools one can easily generate working keys for > autologin too... > > Greets, > Jeroen > > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message