| Summary: | sshd to log one unique string or prefix after connection failure, no matter why. | ||
|---|---|---|---|
| Product: | Portable OpenSSH | Reporter: | octavsly |
| Component: | sshd | Assignee: | Assigned to nobody <unassigned-bugs> |
| Status: | CLOSED FIXED | ||
| Severity: | enhancement | CC: | dtucker, karl |
| Priority: | P5 | ||
| Version: | 6.7p1 | ||
| Hardware: | All | ||
| OS: | Linux | ||
|
Description
octavsly
2014-12-14 09:45:49 AEDT
This poorly titled bug has been around a long time. The key is the IP address is missing. This bug is alive at Cisco https://quickview.cloudapps.cisco.com/quickview/bug/CSCuv42794 It is also listed as a bug in Debian https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726579 Having the IP address on the same line - with info log level is obviously needed for identifying attackers.. From /var/log/auth.log Jul 28 08:37:27 hostname sshd[12053]: fatal: no matching cipher found: client aes128-cbc,blowfish-cbc,3des-cbc server aes256-ctr,aes192-ctr,aes128-ctr [preauth] Jul 28 08:58:38 hostname sshd[12512]: fatal: Unable to negotiate a key exchange method [preauth] I think more examples of the missing IP address exist. (In reply to Karl Schmidt from comment #1) [...] > Jul 28 08:58:38 hostname sshd[12512]: fatal: Unable to negotiate a > key exchange method [preauth] These ones have been fixed for a while: $ ssh -p 2022 -o kexalgorithms=diffie-hellman-group1-sha1 localhost ssh_dispatch_run_fatal: Connection to 127.0.0.1: no matching key exchange method found [preauth] $ ssh -p 2022 -o ciphers=3des-cbc localhost ssh_dispatch_run_fatal: Connection to 127.0.0.1: no matching cipher found [preauth] I'm running 6.7p1 - at which version fixed this? (No backport for Debian stable ) If fixed, we should close these bugs.. It varies depending on exactly which bit you are looking at. Remote IP addresses: bug#2257 since at least 6.9: https://anongit.mindrot.org/openssh.git/commit/?id=639d6bc5 Remote port numbers: bug#2503, first in 7.2 https://anongit.mindrot.org/openssh.git/commit/?id=a4b9e0f4 closing resolved bugs as of 8.6p1 release |