Addendum: I would be happy enough if it was Hardy backports, vs. the
distro proper.
--
OpenSSH should support VIA PadLock
https://bugs.launchpad.net/bugs/119295
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in ubuntu.
--
Launchpad Janitor wrote on 2008-07-25:
This bug was fixed in the package openssh - 1:5.1p1-1ubuntu1
Will this fix be put into Ubuntu 8.04 (Hardy)? I have a low power
machine that I think I would like to keep running Hardy, since it's an
LTS release, but I don't want to do without this feature.
This bug was fixed in the package openssh - 1:5.1p1-1ubuntu1
---
openssh (1:5.1p1-1ubuntu1) intrepid; urgency=low
* Resynchronise with Debian. Remaining changes:
- Add support for registering ConsoleKit sessions on login.
- Drop openssh-blacklist and openssh-blacklist-extra
Fixed via OpenSSH 4.9p1. I'll be aiming to get 5.1p1 into Intrepid.
** Changed in: openssh (Ubuntu)
Status: Confirmed = Fix Committed
--
OpenSSH should support VIA PadLock
https://bugs.launchpad.net/bugs/119295
You received this bug notification because you are a member of Ubuntu
Server
** Description changed:
VIA PadLock is a hardware cryptography engine for AES and SHA1/256.
- OpenSSH should support PadLock. Initial work on PadLock support has already
been done:
+ OpenSSH should support PadLock. Upstream OpenSSH versions do support
+ padlock, and a working patch exists
Confirmed: openssl is using x86 crypto even with -engine padlock, both
in latest upstream and in the current hardy packages.
If I interrupt a debug build of openssl while running openssl speed
aes-128-cbc -engnie padlock on a C3 gdb generally reports that it's
been interrupted in:
** These bugs are fixed upstream in OpenSSH 4.9 and OpenSSL 0.9.8h **
You can apply the fix to OpenSSH 4.7 from Ubuntu just fine:
https://bugzilla.mindrot.org/attachment.cgi?id=1458 . It applies cleanly
except for two rejects at points where the changes have already been
applied, so the rejects
Quick instructions on rebuilding openssh and openssl to include the fix,
for those not used to patching Debian packages:
pre
mkdir wrk
cd wrk
sudo apt-get install build-essential fakeroot wget
sudo apt-get build-dep openssl openssh
apt-get source openssl openssh
cd openssl-0.9.8g
wget --quiet -O
From the OpenSSL engine documentation at
http://www.openssl.org/docs/crypto/engine.html :
Automatically using builtin ENGINE implementations
Here we'll assume we want to load and register all ENGINE implementations
bundled with OpenSSL, such that for any cryptographic algorithm required by
At first glance it looks like the OpenSSL engine code has broken caching
logic (in crypto/engine/eng_table.c) in all versions of 0.9.8, but is
reversed and correct in all versions of 0.9.7. I haven't tested it, but
I suspect the attached patch will fix the issue.
** Attachment added: Patch to
I've now tested the above patch and it seems to do the trick, so I've
sent it in upstream to the OpenSSL RT system.
--
OpenSSH should support VIA PadLock
https://bugs.launchpad.net/bugs/119295
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed
11 matches
Mail list logo