From nobody@FreeBSD.org  Sun Mar 11 22:07:31 2001
Return-Path: <nobody@FreeBSD.org>
Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21])
	by hub.freebsd.org (Postfix) with ESMTP id 55FBC37B719
	for <freebsd-gnats-submit@FreeBSD.org>; Sun, 11 Mar 2001 22:07:31 -0800 (PST)
	(envelope-from nobody@FreeBSD.org)
Received: (from nobody@localhost)
	by freefall.freebsd.org (8.11.1/8.11.1) id f2C67VE40280;
	Sun, 11 Mar 2001 22:07:31 -0800 (PST)
	(envelope-from nobody)
Message-Id: <200103120607.f2C67VE40280@freefall.freebsd.org>
Date: Sun, 11 Mar 2001 22:07:31 -0800 (PST)
From: seraf@2600.com
To: freebsd-gnats-submit@FreeBSD.org
Subject: OpenSSH on 4.2 excessively regenerates RSA host key
X-Send-Pr-Version: www-1.0

>Number:         25723
>Category:       bin
>Synopsis:       OpenSSH on 4.2 excessively regenerates RSA host key
>Confidential:   no
>Severity:       non-critical
>Priority:       medium
>Responsible:    green
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Sun Mar 11 22:10:01 PST 2001
>Closed-Date:    Sat Jul 12 21:16:59 PDT 2003
>Last-Modified:  Sat Jul 12 21:16:59 PDT 2003
>Originator:     Dominick LaTrappe
>Release:        4.2-20010212-STABLE
>Organization:
>Environment:
FreeBSD pocks.tdl-m.sambuca 4.2-20010212-STABLE FreeBSD 4.2-20010212-STABLE #4: Wed Feb 13 08:09:25 UTC 2001     sysbuild@protopocks.tdl.dev.sambuca :/usr/src/sys/compile/POCKS_M  i386
>Description:
When an SSH-2 session is started with FreeBSD 4.2's sshd in "Protocol 1,2" mode (i.e., accepting both SSH-1 and SSH-2 protocols), sshd maintains an RSA host key for use with SSH-1. The life of this key, ONCE IT HAS BEEN USED, is controlled by "KeyRegenerationInterval". However, when an SSH-2 connection is established, which does not utilize said key, said key is considered "used" anyway, increasing the number of key regenerations unnecessarily.
>How-To-Repeat:
/etc/ssh/sshd_config contains "Protocols 1,2" and "KeyRegenerationInterval 1" (to make the bug dramatic ;-). Enter: "ssh -2 somebody@localhost" and then examine your sshd logs. You will see that each time an SSH-2 connection is formed, the SSH-1 RSA host key regenerates unnecessarily.
>Fix:

>Release-Note:
>Audit-Trail:

From: David Xu <bsddiy@21cn.com>
To: seraf@2600.com
Cc: freebsd-gnats-submit@FreeBSD.org
Subject: Re: bin/25723: OpenSSH on 4.2 excessively regenerates RSA host key
Date: Mon, 12 Mar 2001 14:21:35 +0800

 Hello seraf,
 
 Monday, March 12, 2001, 2:07:31 PM, you wrote:
 
 
 >>Number:         25723
 >>Category:       bin
 >>Synopsis:       OpenSSH on 4.2 excessively regenerates RSA host key
 >>Confidential:   no
 >>Severity:       non-critical
 >>Priority:       medium
 >>Responsible:    freebsd-bugs
 >>State:          open
 >>Quarter:        
 >>Keywords:       
 >>Date-Required:
 >>Class:          sw-bug
 >>Submitter-Id:   current-users
 >>Arrival-Date:   Sun Mar 11 22:10:01 PST 2001
 >>Closed-Date:
 >>Last-Modified:
 >>Originator:     Dominick LaTrappe
 >>Release:        4.2-20010212-STABLE
 >>Organization:
 >>Environment:
 s2c> FreeBSD pocks.tdl-m.sambuca 4.2-20010212-STABLE FreeBSD 4.2-20010212-STABLE #4: Wed Feb 13 08:09:25 UTC 2001     sysbuild@protopocks.tdl.dev.sambuca :/usr/src/sys/compile/POCKS_M  i386
 >>Description:
 s2c> When an SSH-2 session is started with FreeBSD 4.2's sshd in "Protocol 1,2" mode (i.e., accepting both SSH-1 and SSH-2 protocols), sshd maintains an RSA host key for use with SSH-1. The life of
 s2c> this key, ONCE IT HAS BEEN USED, is controlled by "KeyRegenerationInterval". However, when an SSH-2 connection is established, which does not utilize said key, said key is considered "used"
 s2c> anyway, increasing the number of key regenerations unnecessarily.
 >>How-To-Repeat:
 s2c> /etc/ssh/sshd_config contains "Protocols 1,2" and "KeyRegenerationInterval 1" (to make the bug dramatic ;-). Enter: "ssh -2 somebody@localhost" and then examine your sshd logs. You will see that
 s2c> each time an SSH-2 connection is formed, the SSH-1 RSA host key regenerates unnecessarily.
 >>Fix:
 
 I think this is a feature of SSH-2 to avoid key guess attack.
 
 -- 
 David Xu
 
 
Responsible-Changed-From-To: freebsd-bugs->green 
Responsible-Changed-By: kris 
Responsible-Changed-When: Sun Mar 11 22:28:00 PST 2001 
Responsible-Changed-Why:  
Brian is the SSH maintainer 

http://www.freebsd.org/cgi/query-pr.cgi?pr=25723 

From: Kris Kennaway <kris@obsecurity.org>
To: seraf@2600.com
Cc: freebsd-gnats-submit@FreeBSD.org
Subject: Re: bin/25723: OpenSSH on 4.2 excessively regenerates RSA host key
Date: Thu, 12 Jul 2001 17:26:53 -0700

 --nVMJ2NtxeReIH9PS
 Content-Type: text/plain; charset=us-ascii
 Content-Disposition: inline
 
 On Sun, Mar 11, 2001 at 10:07:31PM -0800, seraf@2600.com wrote:
 
 > When an SSH-2 session is started with FreeBSD 4.2's sshd in
 > "Protocol 1,2" mode (i.e., accepting both SSH-1 and SSH-2
 > protocols), sshd maintains an RSA host key for use with SSH-1. The
 > life of this key, ONCE IT HAS BEEN USED, is controlled by
 > "KeyRegenerationInterval". However, when an SSH-2 connection is
 > established, which does not utilize said key, said key is considered
 > "used" anyway, increasing the number of key regenerations
 > unnecessarily.
 
 BTW, this bug should be reported to the OpenSSH developers (see
 www.openssh.com), not FreeBSD, since we don't maintain unnecessary
 OpenSSH changes separately to the main project.
 
 Kris
 
 --nVMJ2NtxeReIH9PS
 Content-Type: application/pgp-signature
 Content-Disposition: inline
 
 -----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1.0.6 (FreeBSD)
 Comment: For info see http://www.gnupg.org
 
 iD8DBQE7TkBNWry0BWjoQKURAqquAJ4mFysS6PG1q6d0Yk8kolajyYsfuwCfSX6o
 ld2Dg7NXbnsvJsgxQXeyzQ4=
 =aCHD
 -----END PGP SIGNATURE-----
 
 --nVMJ2NtxeReIH9PS--
State-Changed-From-To: open->closed 
State-Changed-By: green 
State-Changed-When: Sat Jul 12 21:16:17 PDT 2003 
State-Changed-Why:  
Old/not FreeBSD bug. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=25723 
>Unformatted:
