From: underh20 on
Our 4-port cyclade is currently running SSHv1.68 (see below the ssh
process and sshd_config file). Due to security concern, we must
disable this version SSH v1 and upgrade/run only the SSH protocol
version 2.

Could anyone let me know how to do it without losing my SSH
connection
to this Cyclade ?


Thanks,


Bill


cyclade # ps -ef | grep ssh
306 ? root 4268 S /bin/sshd -f /etc/ssh/sshd_config


cyclade # cat /etc/ssh/sshd_config


# $OpenBSD: sshd_config,v 1.68 2003/12/29 16:39:50 millert Exp
$


# This is the sshd server system-wide configuration file. See
# sshd_config(5) for more information.


# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin://
bin


# The strategy used for options in the default sshd_config shipped
with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented. Uncommented options change a
# default value.


#Port 22
#Protocol 2,1
#ListenAddress 0.0.0.0
#ListenAddress ::


#HostKey for protocol version 1
#HostKey /etc/ssh/ssh_host_key
#HostKeys for protocol version 2
#HostKey /etc/ssh/ssh_host_rsa_key
#HostKey /etc/ssh/ssh_host_dsa_key
:
:
:

From: Doug McIntyre on
underh20 <underh20.scubadiving(a)gmail.com> writes:
>Our 4-port cyclade is currently running SSHv1.68 (see below the ssh
>process and sshd_config file). Due to security concern, we must
>disable this version SSH v1 and upgrade/run only the SSH protocol
>version 2.

>Could anyone let me know how to do it without losing my SSH
>connection
>to this Cyclade ?

>cyclade # ps -ef | grep ssh
> 306 ? root 4268 S /bin/sshd -f /etc/ssh/sshd_config

Couldn't tell you how to make sure your session isn't reset if this is
the only sshd process running, normally there's one owned by root,
and then another process owned by each user logging in on a typical
unix box. After a config change, hup the root one (most likely with
the lowest PID), and you are all set.

># $OpenBSD: sshd_config,v 1.68 2003/12/29 16:39:50 millert Exp

Change this line

>#Protocol 2,1

to

Protocol 2


From: underh20 on

How does one verify that one is using SSH v2 after uncommenting
"Protocol 2" and re-hupping the root SSH session ? Is there certain
command to do so ?

Is Protocol 2 simply a certificate for SSL v2 ? We know that SSL
doesn't encrypt the data but simply ensures the destination is
authentic. SSH on the other hand uses encryption to provide
confidentiality and integrity on both ends over high risk zones.
Looks like we need SSHv2 and not SSLv2.

Thanks,

Bill



On Jan 4, 12:44 pm, Doug McIntyre <mer...(a)geeks.org> wrote:
> underh20 <underh20.scubadiv...(a)gmail.com> writes:
> >Our 4-port cyclade is currently running SSHv1.68 (see below the ssh
> >process and sshd_config file).  Due to security concern, we must
> >disable this version SSH v1 and upgrade/run only the SSH protocol
> >version 2.
> >Could anyone let me know how to do it without losing my SSH
> >connection
> >to this Cyclade ?
> >cyclade # ps -ef | grep ssh
> >  306 ?       root       4268   S   /bin/sshd -f /etc/ssh/sshd_config
>
> Couldn't tell you how to make sure your session isn't reset if this is
> the only sshd process running, normally there's one owned by root,
> and then another process owned by each user logging in on a typical
> unix box. After a config change, hup the root one (most likely with
> the lowest PID), and you are all set.
>
> >#       $OpenBSD: sshd_config,v 1.68 2003/12/29 16:39:50 millert Exp
>
> Change this line
>
> >#Protocol 2,1
>
> to
>
> Protocol 2

From: Doug McIntyre on
underh20 <underh20.scubadiving(a)gmail.com> writes:
>How does one verify that one is using SSH v2 after uncommenting
>"Protocol 2" and re-hupping the root SSH session ? Is there certain
>command to do so ?

You can ssh to the box with a -v flag to make sure v2 is enabled.

ssh -v server
debug1: Enabling compatibility mode for protocol 2.0

And then use the -1 flag to try to force connect as protocol rev 1.

ssh -1 -v server
debug1: Remote protocol version 2.0, remote software version
Protocol major versions differ: 1 vs. 2



>Is Protocol 2 simply a certificate for SSL v2 ? We know that SSL
>doesn't encrypt the data but simply ensures the destination is
>authentic. SSH on the other hand uses encryption to provide
>confidentiality and integrity on both ends over high risk zones.
>Looks like we need SSHv2 and not SSLv2.


SSH is totally unrelated to SSL. SSH doesn't use certificates.
The only thing OpenSSL code is used for in OpenSSH is to not reinvent
the crypto routines, but use mature code. x.509 and certificates and
all that totally doesn't exist in SSH at all.

SSH v2 is the version of protocol used between client and server. The
version 1 protocol has a few known weaknesses. Security audits will
always require fixing anything that has known weaknesses.
From: underh20 on
Hi David,

I just did the "ssh -v" command as suggested at our cyclade. I can
see that ssh protocol v2 is enabled.
However, in the top line, Sun_SSH_1.1.3 and SSH protocols 1.5/2.0
appear. Shouldn't we see something
like 2.X ? I need to show proofs that this cyclade is in fact running
SSH v2 only and no v1.

Thanks again, Bill


# ssh -v atlantis

Sun_SSH_1.1.3, SSH protocols 1.5/2.0, OpenSSL 0x0090704f
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Rhosts Authentication disabled, originating port will not be
trusted.
debug1: ssh_connect: needpriv 0
debug1: Connecting to atlantis [172.25.148.44] port 22.
debug1: Connection established.
debug1: identity file /.ssh/identity type -1
debug1: identity file /.ssh/id_rsa type -1
debug1: identity file /.ssh/id_dsa type -1
debug1: Remote protocol version 1.99, remote software version
OpenSSH_3.8.1p1
debug1: match: OpenSSH_3.8.1p1 pat
OpenSSH_3.6*,OpenSSH_3.7*,OpenSSH_3.8*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-Sun_SSH_1.1.3
debug1: use_engine is 'yes'
debug1: pkcs11 engine initialized, now setting it as default for RSA,
DSA, and symmetric ciphers
debug1: pkcs11 engine initialization complete
debug1: Failed to acquire GSS-API credentials for any mechanisms (No
credentials were supplied, or the credentials were unavailable or
inaccessible
Unknown code 0
)
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-ctr hmac-md5 none
debug1: kex: client->server aes128-ctr hmac-md5 none
debug1: Peer sent proposed langtags, ctos:
debug1: Peer sent proposed langtags, stoc:
debug1: We proposed langtags, ctos: i-default
debug1: We proposed langtags, stoc: i-default
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: dh_gen_key: priv key bits set: 125/256
debug1: bits set: 1016/2048
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host '172.30.142.190' is known and matches the RSA host key.
debug1: Found key in /.ssh/known_hosts:32
debug1: bits set: 1037/2048
debug1: ssh_rsa_verify: signature correct
debug1: newkeys: mode 1
debug1: set_newkeys: setting new keys for 'out' mode
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: set_newkeys: setting new keys for 'in' mode
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: Authentications that can continue: publickey,password,keyboard-
interactive
debug1: Next authentication method: publickey
debug1: Trying private key: /.ssh/identity
debug1: Trying private key: /.ssh/id_rsa
debug1: Trying private key: /.ssh/id_dsa
debug1: Next authentication method: keyboard-interactive
Password:






On Jan 4, 2:33 pm, Doug McIntyre <mer...(a)geeks.org> wrote:
> underh20 <underh20.scubadiv...(a)gmail.com> writes:
> >How does one verify that one is using SSH v2 after uncommenting
> >"Protocol 2" and re-hupping the root SSH session ?  Is there certain
> >command to do so ?
>
> You can ssh to the box with a -v flag to make sure v2 is enabled.
>
> ssh -v server
> debug1: Enabling compatibility mode for protocol 2.0
>
> And then use the -1 flag to try to force connect as protocol rev 1.
>
> ssh -1 -v server
> debug1: Remote protocol version 2.0, remote software version
> Protocol major versions differ: 1 vs. 2
>
> >Is Protocol 2 simply a certificate for SSL v2 ?  We know that SSL
> >doesn't encrypt the data but simply ensures the destination is
> >authentic. SSH on the other hand uses encryption to provide
> >confidentiality and integrity on both ends over high risk zones.
> >Looks like we need SSHv2 and not SSLv2.
>
> SSH is totally unrelated to SSL. SSH doesn't use certificates.
> The only thing OpenSSL code is used for in OpenSSH is to not reinvent
> the crypto routines, but use mature code. x.509 and certificates and
> all that totally doesn't exist in SSH at all.
>
> SSH v2 is the version of protocol used between client and server. The
> version 1 protocol has a few known weaknesses. Security audits will
> always require fixing anything that has known weaknesses.