Displaying 20 results from an estimated 25 matches for "authorizedkeysfile2".
Did you mean:
authorizedkeysfile
2002 Apr 18
2
AuthorizedKeysFile
OpenSSH 3.1
Not really a bug, but an "undocumented feature".
The default sshd_config file show the default setting for AuthorizedKeysFile
as being:
AuthorizedKeysFile .ssh/authorized_keys
If you uncomment that default, it changes the "undocumented" setting for
"AuthorizedKeysFile2", which is by default:
AuthorizedKeysFile2 .ssh/authorized_keys2
Suggestions for change:
1 - Add AuthorizedKeysFile2 to the man page for sshd.
2 - Add it's default setting to the default sshd_config file.
3 - Make the settings independent (so that setting only AuthorizedKeysFile...
2002 Jan 23
0
[PATCH] Add multiple AuthorizedKeyFiles options
...sh/authorized_keys
# be backwards compatable for a bit longer yet
AuthorizedKeysFile %h/.ssh/authorized_keys2
# more stuff ...
The following patch (against the cvs source) turns the authorizedkeysfile
statement in sshd.conf into one which populates a list of such
files.
I've also turned "authorizedkeysfile2" into an alias for
"authorizedkeysfile" (but perhaps it out to be deprecated instead).
Does this look OK to folk? If so, I'll make the approprate changes
to the manual pages and re-submit (via bugzilla, the mailing list,
or whatever is the Right Thing To Do).
--
Mike Bristow,...
2002 Nov 05
2
[PATCH] Add a chroot_users option to sshd
...+
/* Turn privilege separation on by default */
if (use_privsep == -1)
use_privsep = 1;
***************
*** 298,304 ****
sBanner, sVerifyReverseMapping, sHostbasedAuthentication,
sHostbasedUsesNameFromPacketOnly, sClientAliveInterval,
sClientAliveCountMax, sAuthorizedKeysFile, sAuthorizedKeysFile2,
! sUsePrivilegeSeparation,
sDeprecated
} ServerOpCodes;
--- 302,308 ----
sBanner, sVerifyReverseMapping, sHostbasedAuthentication,
sHostbasedUsesNameFromPacketOnly, sClientAliveInterval,
sClientAliveCountMax, sAuthorizedKeysFile, sAuthorizedKeysFile2,
! sUsePrivilegeSeparation,...
2015 Nov 02
3
[Bug 2489] New: options that can be used in Match blocks but aren't documented as such
...drot.org
Reporter: calestyo at scientia.net
Hey
sshd_config seems to not list those options as being usable inside
Match blocks, while servconf.c seems to mark them as such:
-authorizedprincipalscommand
-authorizedprincipalscommanduser
-gssapiauthentication
-kerberosauthentication
And
-authorizedkeysfile2
but IIRC that was deprecated anyway.
Cheers,
Chris.
--
You are receiving this mail because:
You are watching the assignee of the bug.
2006 Apr 08
1
[Bug 1180] Add finer-grained controls to sshd
http://bugzilla.mindrot.org/show_bug.cgi?id=1180
Summary: Add finer-grained controls to sshd
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo: bitbucket at mindrot.org
ReportedBy: dtucker at
2001 Oct 15
0
cosmetic patch
...oNoHostAuthenticationForLocalhost
- { NULL, 0 }
+ { NULL, (OpCodes)0 }
};
/*
--- openssh-snap/servconf.c Thu Sep 13 01:32:15 2001
+++ openssh/servconf.c Mon Oct 15 17:34:26 2001
@@ -317,7 +330,7 @@
{ "authorizedkeysfile", sAuthorizedKeysFile },
{ "authorizedkeysfile2", sAuthorizedKeysFile2 },
{ "PAMAuthenticationViaKbdInt", sPAMAuthenticationViaKbdInt },
- { NULL, 0 }
+ { NULL, (ServerOpCodes)0 }
};
/*
2002 Mar 18
0
[Bug 172] New: Add multiple AuthorizedKeyFiles options
...sh/authorized_keys
# be backwards compatable for a bit longer yet
AuthorizedKeysFile %h/.ssh/authorized_keys2
# more stuff ...
The following patch (against the cvs source) turns the authorizedkeysfile
statement in sshd.conf into one which populates a list of such
files.
I've also turned "authorizedkeysfile2" into an alias for
"authorizedkeysfile" (but perhaps it out to be deprecated instead).
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2013 Oct 10
0
[Bug 1684] Support multiple AuthorizedKeysFile entries
...|RESOLVED
Resolution|--- |DUPLICATE
--- Comment #3 from Damien Miller <djm at mindrot.org> ---
This has been supported since openssh-5.9:
> * sshd_config(5)'s AuthorizedKeysFile now accepts multiple paths,
> separated by space. The undocumented AuthorizedKeysFile2 option is
> deprecated (though the default for AuthorizedKeysFile includes
> .ssh/authorized_keys2)
*** This bug has been marked as a duplicate of bug 172 ***
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of th...
2011 Sep 06
2
Announce: OpenSSH 5.9 released
...rocess
now logs via a socket shared with the master process, avoiding the
need to maintain /dev/log inside the chroot.
* ssh(1) now warns when a server refuses X11 forwarding
* sshd_config(5)'s AuthorizedKeysFile now accepts multiple paths,
separated by whitespace. The undocumented AuthorizedKeysFile2
option is deprecated (though the default for AuthorizedKeysFile
includes .ssh/authorized_keys2)
* sshd_config(5): similarly deprecate UserKnownHostsFile2 and
GlobalKnownHostsFile2 by making UserKnownHostsFile and
GlobalKnownHostsFile accept multiple options and default to
include k...
2011 Sep 06
2
Announce: OpenSSH 5.9 released
...rocess
now logs via a socket shared with the master process, avoiding the
need to maintain /dev/log inside the chroot.
* ssh(1) now warns when a server refuses X11 forwarding
* sshd_config(5)'s AuthorizedKeysFile now accepts multiple paths,
separated by whitespace. The undocumented AuthorizedKeysFile2
option is deprecated (though the default for AuthorizedKeysFile
includes .ssh/authorized_keys2)
* sshd_config(5): similarly deprecate UserKnownHostsFile2 and
GlobalKnownHostsFile2 by making UserKnownHostsFile and
GlobalKnownHostsFile accept multiple options and default to
include k...
2001 Dec 04
0
PATCH: log key fingerprint upon successful login
...TTED_KEYS;
+ if (options->log_fingerprint == -1)
+ options->log_fingerprint = 0;
}
/* Keyword tokens. */
@@ -261,6 +264,7 @@
sBanner, sReverseMappingCheck, sHostbasedAuthentication,
sHostbasedUsesNameFromPacketOnly, sClientAliveInterval,
sClientAliveCountMax, sAuthorizedKeysFile, sAuthorizedKeysFile2,
+ sLogFingerprint,
sDeprecated
} ServerOpCodes;
@@ -334,6 +338,7 @@
{ "clientalivecountmax", sClientAliveCountMax },
{ "authorizedkeysfile", sAuthorizedKeysFile },
{ "authorizedkeysfile2", sAuthorizedKeysFile2 },
+ { "logfingerprint", sLogFingerp...
2002 Jul 04
4
Chroot patch (v3.4p1)
The following is a patch I've been working on to support a "ChrootUser"
option in the sshd_config file.
I was looking for a way to offer sftp access and at the same time restict
interactive shell access. This patch is a necessary first step (IMO).
It applies clean with 'patch -l'.
Also attached is a shell script that helps to build a chrooted home dir on
a RedHat 7.2
2002 Jan 29
2
Key fingerprint logging
...UserKnownHosts, sCiphers, sMacs, sProtocol, sPidFile,
sGatewayPorts, sPubkeyAuthentication, sXAuthLocation, sSubsystem, sMaxStartups,
sBanner, sReverseMappingCheck, sHostbasedAuthentication,
sHostbasedUsesNameFromPacketOnly, sClientAliveInterval,
sClientAliveCountMax, sAuthorizedKeysFile, sAuthorizedKeysFile2,
- sDeprecated
+ sDeprecated, sLogKeyFingerprint
} ServerOpCodes;
/* Textual representation of the tokens. */
static struct {
const char *name;
@@ -332,10 +335,11 @@
{ "reversemappingcheck", sReverseMappingCheck },
{ "clientaliveinterval", sClientAliveInterval },
{...
2002 Mar 28
1
[PATCH] Feature addition: user access control per auth method
...ny_groups = 0;
options->ciphers = NULL;
options->macs = NULL;
options->protocol = SSH_PROTO_UNKNOWN;
@@ -267,7 +271,8 @@
sBanner, sVerifyReverseMapping, sHostbasedAuthentication,
sHostbasedUsesNameFromPacketOnly, sClientAliveInterval,
sClientAliveCountMax, sAuthorizedKeysFile, sAuthorizedKeysFile2,
- sDeprecated
+ sDeprecated, sPubkeyAllowUsers, sPubkeyDenyUsers,
+ sPubkeyAllowGroups, sPubkeyDenyGroups
} ServerOpCodes;
/* Textual representation of the tokens. */
@@ -342,6 +347,10 @@
{ "clientalivecountmax", sClientAliveCountMax },
{ "authorizedkeysfile", sAuthoriz...
2002 Dec 18
2
patch for openssh3.5p1 - adds logging option
...options->pid_file = NULL;
+ options->log_file = NULL;
options->server_key_bits = -1;
options->login_grace_time = -1;
options->key_regeneration_time = -1;
@@ -302,6 +303,7 @@
sHostbasedUsesNameFromPacketOnly, sClientAliveInterval,
sClientAliveCountMax, sAuthorizedKeysFile, sAuthorizedKeysFile2,
sUsePrivilegeSeparation,
+ sLogFile,
sDeprecated
} ServerOpCodes;
@@ -380,6 +382,7 @@
{ "authorizedkeysfile", sAuthorizedKeysFile },
{ "authorizedkeysfile2", sAuthorizedKeysFile2 },
{ "useprivilegeseparation", sUsePrivilegeSeparation},
+ { "logfile&q...
2008 Jul 23
10
[Bug 1490] New: sshd -T reports a string of UNKNOWNs
...ocalhost yes
strictmodes yes
tcpkeepalive yes
permitemptypasswords no
permituserenvironment yes
uselogin no
compression delayed
gatewayports no
usedns yes
allowtcpforwarding yes
useprivilegeseparation yes
pidfile /var/run/sshd.pid
xauthlocation /usr/bin/xauth
authorizedkeysfile .ssh/authorized_keys
authorizedkeysfile2 .ssh/authorized_keys2
loglevel INFO
syslogfacility AUTH
hostkey /etc/openssh/ssh_host_key
hostkey /etc/openssh/ssh_host_rsa_key
hostkey /etc/openssh/ssh_host_dsa_key
acceptenv DISPLAY
acceptenv X_ORIGINATING_HOST
acceptenv LANG
acceptenv LC_*
subsystem sftp /usr/libexec/sftp-server
maxstartups 10:1...
2008 Jul 23
10
[Bug 1490] New: sshd -T reports a string of UNKNOWNs
...ocalhost yes
strictmodes yes
tcpkeepalive yes
permitemptypasswords no
permituserenvironment yes
uselogin no
compression delayed
gatewayports no
usedns yes
allowtcpforwarding yes
useprivilegeseparation yes
pidfile /var/run/sshd.pid
xauthlocation /usr/bin/xauth
authorizedkeysfile .ssh/authorized_keys
authorizedkeysfile2 .ssh/authorized_keys2
loglevel INFO
syslogfacility AUTH
hostkey /etc/openssh/ssh_host_key
hostkey /etc/openssh/ssh_host_rsa_key
hostkey /etc/openssh/ssh_host_dsa_key
acceptenv DISPLAY
acceptenv X_ORIGINATING_HOST
acceptenv LANG
acceptenv LC_*
subsystem sftp /usr/libexec/sftp-server
maxstartups 10:1...
2011 Aug 14
10
Call for testing: OpenSSH-5.9
...ave process
now logs via a socket shared with the master process, avoiding the
need to maintain /dev/log inside the chroot.
* ssh(1) now warns when a server refuses X11 forwarding
* sshd_config(5)'s AuthorizedKeysFile now accepts multiple paths,
separated by space. The undocumented AuthorizedKeysFile2 option is
deprecated (though the default for AuthorizedKeysFile includes
.ssh/authorized_keys2)
* sshd_config(5): similarly deprecate UserKnownHostsFile2 and
GlobalKnownHostsFile2 by making UserKnownHostsFile and
GlobalKnownHostsFile accept multiple options and default to include
k...
2001 Aug 16
4
Idletimeout patch
While I was updating our ssh-servers, I rewrote my old patch that adds
idletimeout (just like in old ssh1) parameter to openssh. Since reapplying
the patch for all new versions of openssh is not fun at all, I would like
to have it included in the official openssh, if you consider the patch
worthy.
Unlike ClientAlive, idletimeout works for both protocol versions. It also
works together with
2002 Jan 26
7
[PATCH] Added NoDelay config option and nodelay subsystem option
...H_SSH_USER_PERMITTED_KEYS;
+ if (options->nodelay == -1)
+ options->nodelay = 0;
}
/* Keyword tokens. */
@@ -261,6 +264,7 @@
sBanner, sReverseMappingCheck, sHostbasedAuthentication,
sHostbasedUsesNameFromPacketOnly, sClientAliveInterval,
sClientAliveCountMax, sAuthorizedKeysFile, sAuthorizedKeysFile2,
+ sNoDelay,
sDeprecated
} ServerOpCodes;
@@ -334,6 +338,7 @@
{ "clientalivecountmax", sClientAliveCountMax },
{ "authorizedkeysfile", sAuthorizedKeysFile },
{ "authorizedkeysfile2", sAuthorizedKeysFile2 },
+ { "nodelay", sNoDelay },
{ NULL, 0 }...