search for: bad_opt

Displaying 15 results from an estimated 15 matches for "bad_opt".

Did you mean: bad_op
2006 Jun 21
3
png() or jpeg() in a php script
Hello, I've got a problem with a PHP script, in which I call the system function (to call another processes). The call is : system("R --slave --vanilla < path/to/source/source.R"); if in this R file, I've got the lines: pdf(file="/path/to/file/file.pdf") commands dev.off() the pdf file is perfectly created but if I change the lines to:
2005 Feb 22
0
TR: 3.8.1p1 option "permitopennet" added
...quot;'; + continue; + } + patterns[i++] = *opts++; + } + if (!*opts) { + debug("%.100s, line %lu: missing end quote", + file, linenum); + auth_debug_add("%.100s, line %lu: missing end quote", + file, linenum); + xfree(patterns); + goto bad_option; + } + patterns[i] = 0; + opts++; + + if (sscanf(patterns, "%255[^:/]/%255[^:]:%5[0-9]-%5[0-9]", netblock, netmask , sporta, sportb) != 4 && + sscanf(patterns, "%255[^:/]/%255[^:]:%5[0-9]", netblock, netmask , sporta) != 3 ) { + debug("%.100s, line...
2002 Sep 30
2
[PATCH] Allow "ProxyCommand none" in ssh_config
...----------- Index: readconf.c =================================================================== RCS file: /cvs/openssh/readconf.c,v retrieving revision 1.76 diff -u -r1.76 readconf.c --- readconf.c 9 Jul 2002 14:06:40 -0000 1.76 +++ readconf.c 30 Sep 2002 19:00:22 -0000 @@ -724,6 +724,19 @@ if (bad_options > 0) fatal("%s: terminating, %d bad configuration options", filename, bad_options); + + /* + * If proxy_command is set to 'none' (actually ' none' due to the way + * the code in process_config_line works), unset it. This allows for + * excluding certain...
2007 Mar 22
1
ChallengeResponseAuthentication defaults to no?
Hello, I have just installed OpenSSH 4.6p1 and it appears that ChallengeResponseAuthentication is not allowed unless I explicitly set it to "yes" in the sshd_config file. I am using the same config file as I did with 4.5p1 where it was allowed by default. Also, this is OpenSSH package from sunfreeware, but I believe that both versions were compiled with the same options. Is this the
2011 Jan 07
1
[RFC/PATCH] ssh: config directive to modify the local environment
..., &mod); + } + break; + case oDeprecated: debug("%s line %d: Deprecated option \"%s\"", filename, linenum, keyword); @@ -1034,6 +1089,7 @@ read_config_file(const char *filename, const char *host, Options *options, char line[1024]; int active, linenum; int bad_options = 0; + int prev_num_local_env_mods = options->num_local_env_mods; if ((f = fopen(filename, "r")) == NULL) return 0; @@ -1066,6 +1122,36 @@ read_config_file(const char *filename, const char *host, Options *options, if (bad_options > 0) fatal("%s: terminating, %d...
2002 Aug 13
1
[PATCH] global port forwarding restriction
...2) { + if (channel_add_permitted_opens(patterns) < 0) { debug("%.100s, line %lu: Bad permitopen specification " "<%.100s>", file, linenum, patterns); auth_debug_add("%.100s, line %lu: " @@ -256,16 +253,6 @@ xfree(patterns); goto bad_option; } - if ((port = a2port(sport)) == 0) { - debug("%.100s, line %lu: Bad permitopen port <%.100s>", - file, linenum, sport); - auth_debug_add("%.100s, line %lu: " - "Bad permitopen port", file, linenum); - xfree(patterns); - goto...
2017 May 04
5
OpenSSH contract development / patch
On Thu, May 04, 2017 at 09:37:59AM +1000, Adam Eijdenberg wrote: > Hi Devin, have you looked at using openssh certificates to help manage [...] > While the feature has been around for a while now (and is really > useful), there doesn't seem to be huge amount of documentation around > it. I found the following useful when getting a client of my running Yeah, when I wrote about it
2001 Oct 04
1
patch - forceshell
...forced_shell[i++] = *opts++; + } + if (!*opts) { + debug("%.100s, line %lu: missing end quote", + file, linenum); + packet_send_debug("%.100s, line %lu: missing end quote", + file, linenum); + xfree(forced_shell); + forced_shell = NULL; + goto bad_option; + } + forced_shell[i] = 0; + packet_send_debug("Forced shell: %.900s", forced_shell); + opts++; goto next_option; } cp = "command=\""; diff -ur openssh-2.9p2/auth-options.h openssh-2.9p2_forceshell/auth-options.h --- openssh-2.9p2/auth-options.h Sun Ja...
2003 Jan 29
0
[PATCH] features for restricted shell environments
...2) { + if (channel_add_permitted_opens(patterns) < 0) { debug("%.100s, line %lu: Bad permitopen specification " "<%.100s>", file, linenum, patterns); auth_debug_add("%.100s, line %lu: " @@ -252,16 +251,6 @@ xfree(patterns); goto bad_option; } - if ((port = a2port(sport)) == 0) { - debug("%.100s, line %lu: Bad permitopen port <%.100s>", - file, linenum, sport); - auth_debug_add("%.100s, line %lu: " - "Bad permitopen port", file, linenum); - xfree(patterns); - goto...
2001 Nov 12
4
Please test -current
Could people please test -current? We will be making a release fairly soon. -d -- | By convention there is color, \\ Damien Miller <djm at mindrot.org> | By convention sweetness, By convention bitterness, \\ www.mindrot.org | But in reality there are atoms and space - Democritus (c. 400 BCE)
2011 Oct 08
3
[PATCH] add log= directive to authorized_hosts
Attached is a patch which adds a log= directive to authorized_keys. The text in the log="text" directive is appended to the log line, so you can easily tell which key is matched. For instance the line: log="hello world!",no-agent-forwarding,command="/bin/true",no-pty, no-user-rc,no-X11-forwarding,permitopen="127.0.0.1:7" ssh-rsa AAAAB3Nza....xcgaK9xXoU=
2006 Mar 29
7
sshd config parser
Hi All. For various reasons, we're currently looking at extending (or even overhauling) the config parser used for sshd_config. Right now the syntax I'm looking at is a cumulative "Match" keyword that matches when all of the specified criteria are met. This would be similar the the Host directive used in ssh_config, although it's still limiting (eg you can't easily
2004 Jan 19
3
Security suggestion concering SSH and port forwarding.
Hi, sorry if it is the wrong approuch to suggest improvments to OpenSSH, but here comes my suggestion: I recently stumbled upon the scponly shell which in it's chroot:ed form is an ideal solution when you want to share some files with people you trust more or less. The problem is, if you use the scponlyc as shell, port forwarding is still allowed. This can of course be dissallowed in
2001 Nov 20
3
problem with AFS token forwarding
Hello, I came across an interoperability problem in OpenSSH 3.0p1 and 3.0.1p1 concerning the AFS token forwarding. That means that the new versions are not able to exchange AFS tokens (and Kerberos TGTs) with older OpenSSH releases (including 2.9p2) and with the old SSH 1.2.2x. In my opinion this problem already existed in Openssh 2.9.9p1, but I have never used this version (I only looked at the
2001 Oct 24
2
disable features
...s.c --- auth-options.c 30 Aug 2001 20:36:34 -0000 1.20 +++ auth-options.c 22 Oct 2001 18:26:52 -0000 @@ -53,7 +53,9 @@ xfree(forced_command); forced_command = NULL; } +#ifdef WITH_TCPFWD channel_clear_permitted_opens(); +#endif } /* @@ -257,8 +259,10 @@ xfree(patterns); goto bad_option; } +#ifdef WITH_TCPFWD if (options.allow_tcp_forwarding) channel_add_permitted_opens(host, port); +#endif xfree(patterns); goto next_option; } Index: channels.c =================================================================== RCS file: /home/markus/cvs/ssh/channels.c,v...