It appears the issue is indeed with keepalives: When a OpenSSH style
keep alive "ping" is sent, both clients in question respond with an
error packet. The keep-alive is simply a "keepalive@openssh.com" global request which expects a reply. It has the following bytes:
This would be something he'd need to take up with the author of Cryptlib
I would think? I'll make a note to look into it a bit more but I don't know when I'll get around to it.
This would be something he'd need to take up with the author of Cryptlib I would think? I'll make a note to look into it a bit more but I don't know when I'll get around to it.
I believe keep alive should be done at the TCP layer on the server, not the software/SSH layer. Although in the case of NetRunner it does do a telnet NOOP when using telnet, Mystic doesn't do any software-based keep alive.
I could be wrong about this but I think I read years ago about an exploit with OpenSSL related to keep alive? Just a faint memory and it could be completely false.
Sysop: | sneaky |
---|---|
Location: | Ashburton,NZ |
Users: | 31 |
Nodes: | 8 (0 / 8) |
Uptime: | 203:12:21 |
Calls: | 2,083 |
Calls today: | 1 |
Files: | 11,139 |
Messages: | 947,992 |