| 48 |
#define DEATTACK_DETECTED 1 |
#define DEATTACK_DETECTED 1 |
| 49 |
|
|
| 50 |
/* |
/* |
| 51 |
* $Id: crypt.c,v 1.21 2008-06-20 11:58:47 doda Exp $ Cryptographic attack |
* $Id: crypt.c,v 1.22 2008-11-17 08:45:12 maya Exp $ Cryptographic attack |
| 52 |
* detector for ssh - source code (C)1998 CORE-SDI, Buenos Aires Argentina |
* detector for ssh - source code (C)1998 CORE-SDI, Buenos Aires Argentina |
| 53 |
* Ariel Futoransky(futo@core-sdi.com) <http://www.core-sdi.com> |
* Ariel Futoransky(futo@core-sdi.com) <http://www.core-sdi.com> |
| 54 |
*/ |
*/ |
| 704 |
} else { // for SSH2(yutaka) |
} else { // for SSH2(yutaka) |
| 705 |
// SSH2がサポートするデータ通信用アルゴリズム(公開鍵交換用とは別) |
// SSH2がサポートするデータ通信用アルゴリズム(公開鍵交換用とは別) |
| 706 |
cipher_mask = (1 << SSH2_CIPHER_3DES_CBC) |
cipher_mask = (1 << SSH2_CIPHER_3DES_CBC) |
| 707 |
| (1 << SSH2_CIPHER_AES128) |
| (1 << SSH2_CIPHER_AES128_CBC) |
| 708 |
| (1 << SSH2_CIPHER_BLOWFISH) |
| (1 << SSH2_CIPHER_BLOWFISH_CBC) |
| 709 |
| (1 << SSH2_CIPHER_AES192) |
| (1 << SSH2_CIPHER_AES192_CBC) |
| 710 |
| (1 << SSH2_CIPHER_AES256); |
| (1 << SSH2_CIPHER_AES256_CBC); |
| 711 |
} |
} |
| 712 |
|
|
| 713 |
sender_ciphers &= cipher_mask; |
sender_ciphers &= cipher_mask; |
| 1171 |
} |
} |
| 1172 |
|
|
| 1173 |
// for SSH2(yutaka) |
// for SSH2(yutaka) |
| 1174 |
case SSH2_CIPHER_AES128: |
case SSH2_CIPHER_AES128_CBC: |
| 1175 |
case SSH2_CIPHER_AES192: |
case SSH2_CIPHER_AES192_CBC: |
| 1176 |
case SSH2_CIPHER_AES256: |
case SSH2_CIPHER_AES256_CBC: |
| 1177 |
{ |
{ |
| 1178 |
struct Enc *enc; |
struct Enc *enc; |
| 1179 |
|
|
| 1192 |
break; |
break; |
| 1193 |
} |
} |
| 1194 |
|
|
| 1195 |
case SSH2_CIPHER_BLOWFISH: |
case SSH2_CIPHER_BLOWFISH_CBC: |
| 1196 |
{ |
{ |
| 1197 |
struct Enc *enc; |
struct Enc *enc; |
| 1198 |
|
|
| 1267 |
} |
} |
| 1268 |
|
|
| 1269 |
// for SSH2(yutaka) |
// for SSH2(yutaka) |
| 1270 |
case SSH2_CIPHER_AES128: |
case SSH2_CIPHER_AES128_CBC: |
| 1271 |
case SSH2_CIPHER_AES192: |
case SSH2_CIPHER_AES192_CBC: |
| 1272 |
case SSH2_CIPHER_AES256: |
case SSH2_CIPHER_AES256_CBC: |
| 1273 |
{ |
{ |
| 1274 |
struct Enc *enc; |
struct Enc *enc; |
| 1275 |
|
|
| 1288 |
break; |
break; |
| 1289 |
} |
} |
| 1290 |
|
|
| 1291 |
case SSH2_CIPHER_BLOWFISH: |
case SSH2_CIPHER_BLOWFISH_CBC: |
| 1292 |
{ |
{ |
| 1293 |
struct Enc *enc; |
struct Enc *enc; |
| 1294 |
|
|
| 1384 |
// SSH2 |
// SSH2 |
| 1385 |
case SSH2_CIPHER_3DES_CBC: |
case SSH2_CIPHER_3DES_CBC: |
| 1386 |
return "3DES-CBC"; |
return "3DES-CBC"; |
| 1387 |
case SSH2_CIPHER_AES128: |
case SSH2_CIPHER_AES128_CBC: |
| 1388 |
return "AES128"; |
return "AES128-CBC"; |
| 1389 |
case SSH2_CIPHER_AES192: |
case SSH2_CIPHER_AES192_CBC: |
| 1390 |
return "AES192"; |
return "AES192-CBC"; |
| 1391 |
case SSH2_CIPHER_AES256: |
case SSH2_CIPHER_AES256_CBC: |
| 1392 |
return "AES256"; |
return "AES256-CBC"; |
| 1393 |
case SSH2_CIPHER_BLOWFISH: |
case SSH2_CIPHER_BLOWFISH_CBC: |
| 1394 |
return "Blowfish"; |
return "Blowfish-CBC"; |
| 1395 |
|
|
| 1396 |
default: |
default: |
| 1397 |
return "Unknown"; |
return "Unknown"; |