IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: New version of rsa-sha2-256 draft: Back to PKCS#1 v1.5



The format of the private key is OpenSSH, yes. I can also export in PuTTY or Bitvise format, but I'm not sure either of those would be more helpful... :)

You can also send me an RSA public key (e.g. in standard SSH format, or OpenSSH format) and I can import it, if you like.


----- Original Message -----
From: Peter Gutmann
Sent: Thursday, November 12, 2015 21:18
To: denis bider
Cc: ietf-ssh%netbsd.org@localhost ; djm%mindrot.org@localhost ; terrafrost%gmail.com@localhost ; thierry.moreau%connotech.com@localhost
Subject: RE: New version of rsa-sha2-256 draft: Back to PKCS#1 v1.5

denis bider <ietf-ssh3%denisbider.com@localhost> writes:

>Alright - I have enabled CBC mode algorithms to make testing easier.

OK, that worked:

  Testing SSH session...
  Remote host: experiment.bitvise.com:10712.
  Attempt to activate SSH client session failed with error code -22, line 1129.
  Error message = 'Server reported: Invalid password'.
  (Incorrect username/password, continuing...)

This is some generic test code, so it tries to feed in a default password,
thus the "invalid password".  What format is the private key the banner in?
It looks OpenSSL-ey...

Peter.



Home | Main Index | Thread Index | Old Index