bugzilla-daemon at bugzilla.mindrot.org
2010-Jun-26 19:38 UTC
[Bug 866] ssh(1) is too picky about unknown options in ~/.ssh/config
https://bugzilla.mindrot.org/show_bug.cgi?id=866 --- Comment #19 from Josh Triplett <josh at joshtriplett.org> --- (In reply to comment #17)> Created attachment 1610 [details] > Patch which allows OpenSSH to ignore unknown options. > > This is a patch which implements alternative 1 from Josh Triplett. This > patch makes ssh ignore all unknown options which are prefixed with '@'. > For example, the following works: > > Host * > @InvalidOption asdf > > Any chance of having this patch (or something similar) included in > OpenSSH?This patch looks very promising. However, it doesn't handle the case of ignoring an option that OpenSSH knows about but doesn't support, such as the GSSAPI* options on an installation of OpenSSH that got configured without GSSAPI support. These options have an opcode of oUnsupported. This seems simple enough to fix: change "return keywords[i].opcode;" to: if (ignoreunknown && keywords[i].opcode == oUnsupported) return oIgnored; return keywords[i].opcode; Real-world application of this: I set "GSSAPIAuthentication no" in my ~/.ssh/config, and OpenSSH on my N900 doesn't have GSSAPI support, so I get a warning message every time I use ssh. -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. You are watching someone on the CC list of the bug.
Possibly Parallel Threads
- [Bug 866] ssh(1) is too picky about unknown options in ~/.ssh/config
- [Bug 866] ssh(1) is too picky about unknown options in ~/.ssh/config
- [PATCH 2/3] x86: tss: Eliminate fragile calculation of TSS segment limit
- [PATCH 2/3] x86: tss: Eliminate fragile calculation of TSS segment limit
- [PATCH] chrreplace: Don't skip the first character