IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: New version of rsa-sha2-256 draft: Back to PKCS#1 v1.5
The format of the private key is OpenSSH, yes. I can also export in PuTTY or Bitvise format, but I'm not sure either of those would be more helpful... :)
You can also send me an RSA public key (e.g. in standard SSH format, or OpenSSH format) and I can import it, if you like.
----- Original Message -----
From: Peter Gutmann
Sent: Thursday, November 12, 2015 21:18
To: denis bider
Cc: ietf-ssh%netbsd.org@localhost ; djm%mindrot.org@localhost ; terrafrost%gmail.com@localhost ; thierry.moreau%connotech.com@localhost
Subject: RE: New version of rsa-sha2-256 draft: Back to PKCS#1 v1.5
denis bider <ietf-ssh3%denisbider.com@localhost> writes:
>Alright - I have enabled CBC mode algorithms to make testing easier.
OK, that worked:
Testing SSH session...
Remote host: experiment.bitvise.com:10712.
Attempt to activate SSH client session failed with error code -22, line 1129.
Error message = 'Server reported: Invalid password'.
(Incorrect username/password, continuing...)
This is some generic test code, so it tries to feed in a default password,
thus the "invalid password". What format is the private key the banner in?
It looks OpenSSL-ey...
Peter.
Home |
Main Index |
Thread Index |
Old Index