[EMAIL PROTECTED] ~]# ssh -v -c blowfish-cbc -i /root/nessus_key [EMAIL PROTECTED] id
OpenSSH_4.3p2, OpenSSL 0.9.8a 11 Oct 2005
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Connecting to 10.4.2.193 [10.4.2.193] port 22.
debug1: Connection established.
debug1: permanently_set_uid: 0/0
debug1: identity file /root/nessus_key type 2
debug1: Remote protocol version 2.0, remote software version OpenSSH_3.6.1p2
debug1: match: OpenSSH_3.6.1p2 pat OpenSSH_3.*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_4.3
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client blowfish-cbc hmac-md5 none
debug1: kex: client->server blowfish-cbc hmac-md5 none
debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP
debug1: SSH2_MSG_KEX_DH_GEX_INIT sent
debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY
debug1: Host '10.4.2.193' is known and matches the RSA host key.
debug1: Found key in /root/.ssh/known_hosts:1
debug1: ssh_rsa_verify: signature correct
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug1: SSH2_MSG_SERVICE_ACCEPT received
debug1: Authentications that can continue: publickey,password,keyboard-interactive
debug1: Next authentication method: publickey
debug1: Offering public key: /root/nessus_key
debug1: Server accepts key: pkalg ssh-dss blen 432
debug1: read PEM private key done: type DSA
debug1: Authentication succeeded (publickey).
debug1: channel 0: new [client-session]
debug1: Entering interactive session.
debug1: Sending environment.
debug1: Sending env LANG = en_US.UTF-8
debug1: Sending command: id
uid=501(nessus) gid=501(nessus) groups=501(nessus)
debug1: client_input_channel_req: channel 0 rtype exit-status reply 0
debug1: channel 0: free: client-session, nchannels 1
debug1: Transferred: stdin 0, stdout 0, stderr 0 bytes in 0.3 seconds
debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.0
debug1: Exit status 0


That seems to work also.  :(

My environment, since I failed to mention it all, is:
I am running Fedora Core 5 on a virtual PC running Nessusd
I am scanning a Fedora Core 1 virtual PC, hosted on the same computer

on my FC1 computer I was running:
[EMAIL PROTECTED] root]# rpm -qa openssh*
openssh-askpass-3.6.1p2-19
openssh-3.6.1p2-19
openssh-server-3.6.1p2-19
openssh-askpass-gnome-3.6.1p2-19
openssh-clients-3.6.1p2-19

But I recently upgraded to:
[EMAIL PROTECTED] root]# rpm -qa openssh*
openssh-askpass-gnome-3.6.1p2-19.4.legacy
openssh-askpass-3.6.1p2-19.4.legacy
openssh-clients-3.6.1p2-19.4.legacy
openssh-3.6.1p2-19.4.legacy
openssh-server-3.6.1p2-19.4.legacy

When I do an ssh from the command-line, there is an 8 second delay or so as it connects. So far as I can tell, this is because the FC1 computer is doing a DNS lookup.

Hmmm... That is interesting. I had not timed it before. ssh_get_info.nasl finishes up in 6 seconds... [21478] ssh_get_info.nasl (process 10) finished its job in 6.428 seconds

   - Tim

Josh Zlatin wrote:
On Mon, 5 Jun 2006, Tim Young wrote:

(I guess I was not subscribed to nessus_at_lists.nessus.org Hope this continues the thread)

It successfully logs me in to the other box. But, in case you know something I do not, I will paste the dump from when I connect up...

For local checks to work on *nix, Nessus requires SSH2 support and
support for the "blowfish-cbc" encryption algorithm. The log you sent shows that the target indeed supports SSH2. Can you test for "blowfish-cbc" support?
Try running the following command:
ssh -v -c blowfish-cbc -i /root/nessus_key [EMAIL PROTECTED] id

--
 - Josh
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus



_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to