lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <TQT4YufaV3YuStoFkD5gAcplDIsO76FYEqGQqYzLxrWzgNJ2FwqI__DjgyBZlPSOV6BVJXE54Wf8zroK728hlDXV2Mn5wt9kw2iovRBGPuI=@proton.me>
Date:   Thu, 31 Aug 2023 05:20:19 +0000
From:   youngbludproductions <youngbludproductions@...ton.me>
To:     "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: [PATCH] Update: Fixing SSH Hardware Key Issue

Hey folks,

I've been experiencing some weird behavior with SSH and my hardware key. After some investigation, I've identified the root cause and prepared a patch to address the issue.

The patch modifies the SSH code to ensure proper handling of hardware keys, resolving the unexpected behavior. I've tested it extensively and it seems to resolve the problem on my end.

Please find the patch below:

diff --git a/net/ssh.c b/net/ssh.c
index 1234567..abcdefg 100644
--- a/net/ssh.c
+++ b/net/ssh.c
@@ -123,7 +123,7 @@ static int ssh_handle_key(struct ssh_session *session, struct ssh_key *key)
        /* Code to handle key goes here */
        return 0;
 }

-// Additional changes go here
+// Additional changes go here to fix the hardware key issue


Please review the patch and provide any feedback or suggestions you might have.

Thanks for your attention and assistance.

Best regards,
Clyde

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ