www.libssh2.org | Daily snapshots | Mailing list archive | Docs | Examples | github

Archive Index This month's Index

Subject: Re: Key exchange trashing memory

Re: Key exchange trashing memory

From: Mike Abdullah <mabdullah_at_karelia.com>
Date: Mon, 22 Oct 2012 09:46:49 +0100


If you're interested, our libssh2 wrapper lives here:

It might help locate your problem. (Even better in my book if you can just extend it to your needs)

On 22 Oct 2012, at 00:27, James Sumners <james.sumners_at_gmail.com> wrote:

> I'm writing an Objective-C interface to libssh2. During my initial testing I was communicating with a server that reports the version string "OpenSSH_5.5p1 Debian-6+squeeze2" and didn't have any problems. Now, I'm testing against a server that reports simply "OpenSSH_6.0" (it's a slightly outdated Arch Linux server; OpenSSH 6.1 is available as an update) and the key exchange is failing. I'm using libssh2 version 1.4.3_DEV.
> I recorded a video of what is happening -- http://www.youtube.com/watch?v=vD364d9J8bc . This video shows the problem being run through LLDB.
> In the video, you can see that in the `void libssh2_sha1(const unsigned char *message, unsigned long len, unsigned char *out)` function in openssl.c (line 512) the `len` and `out` variables are getting overwritten after the call to `EVP_DigestInit`. Also shown in the video is a patch that allows the function to finish, but causes a crash later on in the process.
> Can anyone shed some light on what is happening here?
> The trace for the key exchange is:
> [libssh2] 0.229073 Key Ex: Sent KEX: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1
> [libssh2] 0.229620 Key Ex: Sent HOSTKEY: ssh-rsa,ssh-dss
> [libssh2] 0.229920 Key Ex: Sent CRYPT_CS: aes128-ctr,aes192-ctr,aes256-ctr,aes256-cbc,rijndael-cbc_at_lysator.liu.se,aes192-cbc,aes128-cbc,blowfish-cbc,arcfour128,arcfour,cast128-cbc,3des-cbc
> [libssh2] 0.230242 Key Ex: Sent CRYPT_SC: aes128-ctr,aes192-ctr,aes256-ctr,aes256-cbc,rijndael-cbc_at_lysator.liu.se,aes192-cbc,aes128-cbc,blowfish-cbc,arcfour128,arcfour,cast128-cbc,3des-cbc
> [libssh2] 0.230549 Key Ex: Sent MAC_CS: hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,hmac-ripemd160,hmac-ripemd160_at_openssh.com
> [libssh2] 0.230828 Key Ex: Sent MAC_SC: hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,hmac-ripemd160,hmac-ripemd160_at_openssh.com
> [libssh2] 0.248835 Key Ex: Sent COMP_CS: none
> [libssh2] 0.249782 Key Ex: Sent COMP_SC: none
> [libssh2] 0.250296 Key Ex: Sent LANG_CS:
> [libssh2] 0.250665 Key Ex: Sent LANG_SC:
> [libssh2] 0.251181 Key Ex: Agreed on KEX method: diffie-hellman-group14-sha1
> [libssh2] 0.251501 Key Ex: Agreed on HOSTKEY method: ssh-rsa
> [libssh2] 0.251799 Key Ex: Agreed on CRYPT_CS method: aes128-ctr
> [libssh2] 0.252076 Key Ex: Agreed on CRYPT_SC method: aes128-ctr
> [libssh2] 0.252362 Key Ex: Agreed on MAC_CS method: hmac-sha1
> [libssh2] 0.252644 Key Ex: Agreed on MAC_SC method: hmac-sha1
> [libssh2] 0.252915 Key Ex: Agreed on COMP_CS method: none
> [libssh2] 0.253183 Key Ex: Agreed on COMP_SC method: none
> [libssh2] 0.262499 Key Ex: Initiating Diffie-Hellman Group14 Key Exchange
> [libssh2] 0.273457 Key Ex: Sending KEX packet 30
> [libssh2] 0.380532 Key Ex: Server's MD5 Fingerprint: 4b:ae:9e:24:47:80:5a:73:86:1e:ba:55:4c:b8:54:79
> [libssh2] 0.381142 Key Ex: Server's SHA1 Fingerprint: 3f:de:ee:71:0b:2f:f4:92:7c:78:c6:0f:5b:ed:be:65:29:70:19:1d
> _______________________________________________
> libssh2-devel http://cool.haxx.se/cgi-bin/mailman/listinfo/libssh2-devel

libssh2-devel http://cool.haxx.se/cgi-bin/mailman/listinfo/libssh2-devel
Received on 2012-10-22

the libssh2 team