Displaying 14 results from an estimated 14 matches for "a543".
Did you mean:
543
2009 Apr 02
2
Method to permit ssh while denying sftp
Is there a way to permit ssh sessions while denying sftp with openssh
3.8?
In openssh 4.4+ this is possible using the Match directive with Force
Command but I don't know how to configure this in older versions.
Thanks in advance for any guidance.
Brenda
2009 Jan 30
1
Patch to log tunnel information
First, all credit to Vladimir Parkhaev as this is his code. He may have
submitted this before for all I know, but I for one definitely would like
to see this end up in the codebase, so I'm submitting it.
*** openssh-5.1p1/serverloop.c Fri Jul 4 09:10:49 2008
--- openssh-5.1p1-RCFHACKS/serverloop.c Thu Jan 29 08:56:11 2009
***************
*** 957,962 ****
--- 957,968 ----
c =
2010 Feb 25
1
secure Xapps tunnel
hi,
eventually newbie:
i want to show remote X-apps on my desktop.
now, i know from google that xhost and xauth is not the way to
so that very secure.
now, i have a ssh_config with X forwarding enabled and a server with
forwarding enabled, too.
now when i connect to server i read that ssh creates automaticaly a
Xauthory file.
So i know that this is the xauth way with supercookies etc.
but i
2008 Sep 02
2
Queries on ssh_askpass
Hi,
I had developed a program which spawns a shell where i am trying to use ssh
commands to log into a linux server.
There is a pop up dialog window which is prompting me for key-ing the
password.
Actually i want to get rid of this pop up dialog box, as i don't want this
to be visible in my program/code execution.
Could you please let me know is there any way to resolve and stop this
2009 Jan 20
1
OpenSSH private key encryption: time for AES?
...ml
[2] http://csrc.nist.gov/groups/ST/toolkit/documents/SP800-57Part1_3-8-07.pdf
--
jim knoble | jmknoble at pobox.com | http://www.pobox.com/~jmknoble/
(GnuPG key ID: C6F31FFA >>>>>> http://www.pobox.com/~jmknoble/keys/ )
(GnuPG fingerprint: 99D8:1D89:8C66:08B5:5C34::5527:A543:8C33:C6F3:1FFA)
+----------------------------------------------------------------------+
|[L]iberty, as we all know, cannot flourish in a country that is perma-|
| nently on a war footing, or even a near-war footing. --Aldous Huxley|
+---------------------------------------------------------------...
2008 Dec 16
2
Request change to file match.c, function match_pattern_list
Greetings,
This request is in the grey area between a bug report and an
enhancement request.
Request
-------
Please apply the following diff (or something functionally similar) to
file ``match.c'' in OpenSSH-5.1p1:
161a162,164
> } else {
> if (negated)
> got_positive = 1; /* Negative match, negated = Positive */
In case the lines above wrapped in the email
2008 Dec 09
2
Feature request: AlwaysDenyLogin, LoginDelayTime
Please consider adding the following features to sshd:
1. AlwaysDenyLogin - a setting that will result in always denying
login regardless of the credentials given by the client.
2. LoginDelayTime - to specify a delay in milliseconds before the
server responds to a client's login attempt.
These would help to employ brute force bots.
Regards
2008 Jul 15
2
Risk of StrictMode (but read only)
Is there a risk associated with having authorized_keys files set to readable but "StrictMode no"?
I am thinking particularly in the case of having public keys all centralized in a directory in /etc or something.
Is it really a potential hack vector if someone can read a public key, or is the only real danger if they were writable?
---
Don Hoover
dxh at yahoo.com
2008 Aug 20
1
using ssh-add unattended on dubious files -- how can i avoid a hang?
I need ssh-add to fail cleanly if it tries and fails to read a key,
rather than prompting the user. I can't seem to figure out how to do
that.
This is on a Linux 2.6.26 system, running OpenSSH 5.1p1 (as built on
debian lenny/sid)
First, the things i've tried:
* i've unset the DISPLAY and SSH_ASKPASS environment variables, so no
X11-style prompting should happen.
* i've
2008 Nov 11
2
Fwd: Permissions in chroot SFTP
Hi,
I configured openssh 5.1p1 for sftp server.
Here the specifications in sshd_config file:
Subsystem sftp internal-sftp
Match Group sftp
ForceCommand internal-sftp
ChrootDirectory /home/%u
AllowTcpForwarding no
When a user is logged in, he can't upload his document and he receives
this message:
carlo at Music:~$ sftp user at 213.217.147.123
Connecting to
2008 Nov 21
3
OpenSSH security advisory: cbc.adv
OpenSSH Security Advisory: cbc.adv
Regarding the "Plaintext Recovery Attack Against SSH" reported as
CPNI-957037[1]:
The OpenSSH team has been made aware of an attack against the SSH
protocol version 2 by researchers at the University of London.
Unfortunately, due to the report lacking any detailed technical
description of the attack and CPNI's unwillingness to share necessary
2009 Dec 23
3
Question on SSH_ASKPASS
Hi everybody,
I have asked a question a long time ago regarding SSH_ASKPASS, but with the
latest version of OpenSSH I am not able to get the desired result.
My goal is to launch a script on a remote server via SSH without having to
type a password, because it is locally executed from a script. This should
not be too complicated, but somehow I am not able to figure this out myself.
I have
2011 Aug 18
0
zfs-discuss Digest, Vol 70, Issue 37
...d Elling <richard.elling at gmail.com>
> To: Ding Honghui <hhding.gnu at gmail.com>
> Cc: zfs-discuss at opensolaris.org
> Subject: Re: [zfs-discuss] solaris 10u8 hangs with message
> Disconnected command timeout for Target 0
> Message-ID: <F4778486-39E8-4B0E-A543-DDA2D851C968 at gmail.com>
> Content-Type: text/plain; charset=iso-8859-1
>
> On Aug 15, 2011, at 11:17 PM, Ding Honghui wrote:
> > My solaris storage hangs. I login to the console and there is messages[1]
> display on the console.
> > I can''t login into the cons...
2009 Jun 05
2
ssh trouble checklist
Hi.
There should be a checklist of everything that can go wrong with
making an ssh connection.
Here's one entry for the list, which I didn't know before, and
* I couldn't see the problem from the -ddd and -vvv output, and
* there were no /var/log/* file entries to give hints.
Here's what I did
sudo kill <pid-of-sshd>
/usr/sbin/sshd
No good.
Usually I did kill