Displaying 11 results from an estimated 11 matches for "b919".
Did you mean:
919
2007 Apr 24
1
Logging enhancement
I would like to suggest a logging enhancement that would contribute
greatly to access auditing.
Currently nothing is logged when a user connects to another server as a
different user.
The auditing trail is broken for tracing access.
userA> ssh userB at hostB
A simple syslog addition (for example) to ssh.c closes that gap.
/* Log into the remote system. This never
2008 Feb 20
1
alignment problem in monitor_fdpass.c
Hi,
After FreeBSD changed from using -O2 to using -O on their ARM port, I
found that sshd stopped working. (gcc version 4.2.1 20070719 [FreeBSD])
I have downloaded openssh-SNAP-20080220.tar.gz and the code still look
the same.
Anyway looking into it, I found that the problem is in monitor_fdpass.c
in the functions mm_send_fd and mm_receive_fd. Using -O2 used to align
the tmp array on a 4 byte
2008 Mar 07
1
Command-based ssh_config declarations
How difficult would it be to enhance the client ssh_config file to allow
command-based declarations similar to that provided by the "Host" keyword?
The main reason I need something like this is when ssh is used via CVS and
Subversion. I want all CVS/Subversion traffic to use a different SSH port
and different authentication options.
So... you might have an ssh_config file that
2006 May 10
2
Patch to add resume feature to scp
Dear all,
I have enhanced scp to do the following.
1) Check the SHA1 checksums of the file fragments at the source and
destination and resume file transfer from where it left off last time
2) If the file checksums match and size also matches, then the file is
assumed to be identical and skipped, the user is also informed of the
same
3) If the destination file size is larger than the source,
2007 Dec 26
1
sshd's -e doesn't work as expected
Hello,
I'm running a sshd server using the -e flag so that I can capture its
whole output and later send it to the user. I'm also setting LogLevel
to DEBUG1 in the configuration file and I don't want to disturb syslogd.
But the problem is that it doesn't work as expected (or as I expect,
which I think should be the correct behavior). The log file ends up
being empty because the
2006 Dec 01
2
mirroring a loop device across an ssh connection
all,
I've been looking into a secure way of accessing a remote loopback
encrypted partition securely via openssh.
The basic idea I have currently is that a file/partition is connected to
/dev/loop0 on a remote server, which I have an ssh connection to. I
hold the key (for cryptsetup via dm_crypt) on the local client. I'd
like to mirror the loop device of the server on the client.
2007 Dec 13
3
OpenSSH patches for Mac OS X
OpenSSH Unix Dev,
Mac OS X 10.5 recently shipped with OpenSSH 4.5p1. This build
includes a number of patches, some general bug fixes and some platform-
specific fixes and enhancements. These patches are available from our
open source site (http://www.opensource.apple.com/darwinsource/10.5/OpenSSH-87/
).
Following is a brief description of each patch. We'd be more than
happy to
2008 Jan 31
1
RFC: ssh-copy-id tweaks
I'd like to propose a couple of tweaks to ssh-copy-id:
o Change the default ID_FILE from identity.pub to id_dsa.pub or perhaps
{id_dsa,id_rsa,identity}.pub to cover all the bases, although the
patch below deals only with id_dsa.pub - it would need some more
tweaking to deal with more than one (possibly non-existent) file.
o If the destination authorized_keys file already contains the
2007 Jan 23
3
Move servers public/private keys to a new host
Is it possible to move a server's public and private keys from one host to
another? Or perhaps a better way to ask what I really want... is it
possible to configure a server on a new host to return the same public key
it did on the old host?
I'm in the process of migrating our CVS server from a Solaris host to a
Linux host (this weekend) and I just realized the hostkey is going to
2008 Jun 12
2
Request for added functionality - tracking and blocking attacks
Somebody please forward this, if this is not an appropiate place
to ask the OpenSSH developers for a new feature.
As many of us have seen, any sshd left open on the internet eventually
becomes the target of password guessing attacks. I am aware of
tools for scanning the security logs, and manipulating iptables to
block ongoing attacks, but I am not aware of a way to configure
sshd itself to
2011 Jun 09
1
NFS problem
Hi,
I got the same problem as Juergen,
My volume is a simple replicated volume with 2 host and GlusterFS 3.2.0
Volume Name: poolsave
Type: Replicate
Status: Started
Number of Bricks: 2
Transport-type: tcp
Bricks:
Brick1: ylal2950:/soft/gluster-data
Brick2: ylal2960:/soft/gluster-data
Options Reconfigured:
diagnostics.brick-log-level: DEBUG
network.ping-timeout: 20
performance.cache-size: 512MB