HPE GreenLake Administration
- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - OpenVMS
- >
- TCP/IP 5.6ECO3 SSH Server Key Regeneration Problem...
Operating System - OpenVMS
1827720
Members
2910
Online
109968
Solutions
Forums
Categories
Company
Local Language
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
02-25-2009 08:47 AM
02-25-2009 08:47 AM
TCP/IP 5.6ECO3 SSH Server Key Regeneration Problems
The issue I've been investigating concerns key regeneration. After upgrading to TCP/IP 5.6ECO3, proper SSH key regeneration is broken. One HP rep confirmed he has seen this with other systems. Setting the Putty option, "Handles SSH-2 key re-exchange badly" to "On" corrects the issue. However, I was wondering if anyone else had come across this or found a more proper fix.
2 REPLIES 2
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-10-2009 09:13 AM
04-10-2009 09:13 AM
Re: TCP/IP 5.6ECO3 SSH Server Key Regeneration Problems
I don't use PuTTY at my site but I've seen the Key Regen issue. There is a published bug in both Solaris and UNIX SSH, and of course the TCPIP stack's implementation of SSH is just a port of a UNIX version. If for some reason a server has had more than one server key AND the client-side has copies of both the old and new keys AND the old (obsolete) key is first in the list, you get problem with the key regen process.
My solution was to get into the hostkeys subfolder in my client-side machine and purge old keys. Or all keys for that machine. Then, of course, at next connection attempt, you have to accept the server key again. But this time it is going to be first in the list and the ReKey feature will work better. At least, it did for me.
My solution was to get into the hostkeys subfolder in my client-side machine and purge old keys. Or all keys for that machine. Then, of course, at next connection attempt, you have to accept the server key again. But this time it is going to be first in the list and the ReKey feature will work better. At least, it did for me.
Sr. Systems Janitor
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-10-2009 09:23 AM
04-10-2009 09:23 AM
Re: TCP/IP 5.6ECO3 SSH Server Key Regeneration Problems
Proper fix? That's going to be the subject to some local discussion and decisions. One option would be to replace the ssh server here with an ssh server that (better) supports key renegotiation.
PuTTY is working around this, using the specified knob.
Per the PuTTY documentation:
--
4.24.8 â Handles SSH-2 key re-exchange badlyâ
Some SSH servers cannot cope with repeat key exchange at all, and will ignore attempts by the client to start one. Since PuTTY pauses the session while performing a repeat key exchange, the effect of this would be to cause the session to hang after an hour (unless you have your rekey timeout set differently; see section 4.19.2 for more about rekeys). Other, very old, SSH servers handle repeat key exchange even more badly, and disconnect upon receiving a repeat key exchange request.
If this bug is detected, PuTTY will never initiate a repeat key exchange. If this bug is enabled when talking to a correct server, the session should still function, but may be less secure than you would expect.
This is an SSH-2-specific bug.
--
For details of the rekey process, see:
http://tartarus.org/~simon/putty-snapshots/htmldoc/Chapter4.html#config-ssh-kex-rekey
PuTTY is working around this, using the specified knob.
Per the PuTTY documentation:
--
4.24.8 â Handles SSH-2 key re-exchange badlyâ
Some SSH servers cannot cope with repeat key exchange at all, and will ignore attempts by the client to start one. Since PuTTY pauses the session while performing a repeat key exchange, the effect of this would be to cause the session to hang after an hour (unless you have your rekey timeout set differently; see section 4.19.2 for more about rekeys). Other, very old, SSH servers handle repeat key exchange even more badly, and disconnect upon receiving a repeat key exchange request.
If this bug is detected, PuTTY will never initiate a repeat key exchange. If this bug is enabled when talking to a correct server, the session should still function, but may be less secure than you would expect.
This is an SSH-2-specific bug.
--
For details of the rekey process, see:
http://tartarus.org/~simon/putty-snapshots/htmldoc/Chapter4.html#config-ssh-kex-rekey
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
Company
Support
Events and news
Customer resources
© Copyright 2025 Hewlett Packard Enterprise Development LP