- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - OpenVMS
- >
- SSH-1.99 sent by client not RFC compliant?
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-20-2010 06:27 AM
тАО09-20-2010 06:27 AM
http://forums13.itrc.hp.com/service/forums/questionanswer.do?threadId=1437023
Thanks for the excellent analysis and workaround! It works! However, just as I was about to send a note back to the network staff where this problem was occurring to tell them that their firewall was exhibiting non-RFC-compliant behaviour, I checked the RFC Hoff cited myself:
http://www.faqs.org/rfcs/rfc4253.html
5.1. Old Client, New Server
Server implementations MAY support a configurable compatibility flag
that enables compatibility with old versions. When this flag is on,
the server SHOULD identify its 'protoversion' as "1.99". ...
Nowhere in the above excerpt nor anywhere else in the RFC do I see where it says the client should announce as "1.99" if it is capable of both v1 and v2. So isn't it the client that's not being RFC compliant?
Ben
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-20-2010 07:18 AM
тАО09-20-2010 07:18 AM
SolutionSomebody might well choose to argue that a client sending 1.99 is a bug. Or might argue that version 1.99 from the client is a logical extension to the RFC, and for compatibility purposes with older servers. But nowhere in the RFC document do I see anything that specifically precludes an ssh client from sending that 1.99 value as the client version.
My own assumption would be that this behavior is compliant with the RFC (that's part of the "joy" of most anything that's left "unspecified" in an RFC), and that the use of 1.99 by the client is entirely intentional, and that the usage was to indicate the client could provide both versions 1 and 2 connections.
Beyond the lack of any specific "you can't do that" in the RFC (and parsing RFCs is such "fun"), this assumption is also based on the lack of a command-level knob to force the ssh client version within the OpenVMS ssh client (haven't checked 5.7 or the ssh update for 5.6), and also based on the generally crufty state of ssh support on OpenVMS. (And that the local V5.6-9ECO5 ssh client version mis-identifies itself as V5.5, after all.)
The usual approach for mandated requirements would be to disable V1 compatibility on one or both ends, and move on to more pressing matters. There's not a whole lot of reason to keep V1 around any more, after all.
If you're looking for an official statement from HP here in ITRC (and that's the only statement that really matters here, particularly if there are regulatory or audit or other concerns), then use the formal problem-reporting channels into the HP support center, and get the official answer to your question.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-20-2010 08:45 AM
тАО09-20-2010 08:45 AM
Re: SSH-1.99 sent by client not RFC compliant?
Now I'll have to see if we want to expend further energy, having solved the problem satisfactorily for this one case, trying to get HP to admit to a mistake here and possibly fix it. I have a feeling it's not going to be worth it. (Or on the flip side, complain to the vendor of the firewall product ... with a similar likelihood of not yielding satisfactory results.)
Sigh.
Ben
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-20-2010 11:28 AM
тАО09-20-2010 11:28 AM
Re: SSH-1.99 sent by client not RFC compliant?
Time to start the work around adding that support, or loading an open-source or add-on ssh tool chain, or mayhap migrating to a platform where you can get that, then. Things are going to get dicy around here for sites lacking that if (when?) the patch lockdown arrives.
If the TCPIP$SSH_AIX_PATCH exec-mode system logical name from that other discussion didn't resolve this, then you're probably down-revision on your version or your patches, or there's a regression of some sort.
From TCP/IP Services V5.6 circa ECO3, and from V5.7...
30-Apr-2007 Alpha and IA64
Problem:
Connecting from an OpenVMS SSH client to AIX OpenSSH server
resulted in the following error message:
"Did not receive identification string from n.n.n.n"
Deliverables:
All SSH images
Reference:
TCPIP_BUGS Note 3576
Note:
The SSH client's modified behavior (sending an SSH protocol
version string of "SSH-2.0" rather than "SSH-1.99") applies
only when the new TCPIP$SSH_AIX_PATCH logical is defined in
the SYSTEM table with a non-zero value.
--
And FWIW, there should be nothing wrong with an sshd server getting that 1.99 version from a client. A 1.x sshd server should treat that as a 1.99 client, and either honor it or punt. A 2.x sshd server might choose to hand you 1 or 2 connection, depending on how it's coded. But it should work.
If the firewall vendor is Cisco, there are discussions around the 'net of how ssh 1.99 is handled. It was in use before the RFC got out, and this wouldn't be the first down-revision Cisco box in existence. (And there are probably also various other discussions of ssh and sshd "fun" for other vendors posted around the net, but you can run Google as well as I can.)
Regardless, call HP support if you have that access and get an official answer. I'm NOT that.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-21-2010 02:33 AM
тАО09-21-2010 02:33 AM
Re: SSH-1.99 sent by client not RFC compliant?
In my response to the network support staff who look after the firewall, I have pointed at this discussion, so if they want to pursue how their firewall is dealing with 1.99 with Cisco (or whoever their vendor is) I'll leave that to them, now.
Thanks again,
Ben
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-21-2010 08:33 AM
тАО09-21-2010 08:33 AM
Re: SSH-1.99 sent by client not RFC compliant?
This is part of the "fun" of RFCs; they're not called standards for a reason; they're called requests for comments. The occasional truck-sized holes, err, omissions and ambiguities, and the requisite connect-a-thon events are a commonplace occurrence, too. And in some cases I'm well aware of, if you actually follow the applicable RFCs as they're written, your code will not interoperate. At all. NFS had a few of those, and particularly in the older revisions.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО09-21-2010 08:36 AM
тАО09-21-2010 08:36 AM
Re: SSH-1.99 sent by client not RFC compliant?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО10-20-2010 05:04 PM
тАО10-20-2010 05:04 PM
Re: SSH-1.99 sent by client not RFC compliant?
Sorry I'm late to this party...
SSH that started shipping with TCPIP v5.4 (field tested with v5.3) never supported SSH protocol v1:
http://h71000.www7.hp.com/doc/732final/tcp_rn/tcp_rnpro_001.html#ssh2_problems
"The SSH1 protocol suite is not supported for terminal sessions, remote command execution, and file transfer operations. Parameters related to SSH1 in the server and client configuration files are ignored. "
And this is still true as of today (v5.7 ECO1) - we only support SSH protocol version 2 or SSH2.
As for RFC 4253,
"When this flag is on,
the server SHOULD identify its 'protoversion' as "1.99". Clients
using protocol 2.0 MUST be able to identify this as identical to
"2.0"."
One could argue that this should be both ways... And typically, I've seen it's a Firewall that's in between that's interfering when v1.99 is sent and firewall could be neither the server nor the client.
Neverthless, as mentioned prior, the AIX logical was created to avoid confusion and issues...
Jay So
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО10-21-2010 03:21 AM
тАО10-21-2010 03:21 AM