From owner-freebsd-security Wed Jul 24 11: 2:12 2002 Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.FreeBSD.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id C7E4337B400 for ; Wed, 24 Jul 2002 11:02:09 -0700 (PDT) Received: from web10102.mail.yahoo.com (web10102.mail.yahoo.com [216.136.130.52]) by mx1.FreeBSD.org (Postfix) with SMTP id 83E6543E3B for ; Wed, 24 Jul 2002 11:02:09 -0700 (PDT) (envelope-from twigles@yahoo.com) Message-ID: <20020724180209.30857.qmail@web10102.mail.yahoo.com> Received: from [68.5.49.41] by web10102.mail.yahoo.com via HTTP; Wed, 24 Jul 2002 11:02:09 PDT Date: Wed, 24 Jul 2002 11:02:09 -0700 (PDT) From: twig les Subject: ssh cipher To: freebsd-security@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org All, I have a POS box running an old version of openssh (not allowed to upgrade it, sigh). Right now our jumpoff point is running ssh.com software and gets the following error immediately: ssh 1.1.1.1 warning: Authentication failed. Disconnected; connection lost (Connection closed.). I've tried specifying the user and even the port but I think the problem may be that the openssh (2.5 i think) may not be using the correct cipher. How do I check what cipher this guy is using? Also, this box has got to be logging the connections attempts somewhere, but I haven't seen it. ===== ----------------------------------------------------------- All warfare is based on deception. ----------------------------------------------------------- __________________________________________________ Do You Yahoo!? Yahoo! Health - Feel better, live better http://health.yahoo.com To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message