Displaying 15 results from an estimated 15 matches for "bad_option".
2006 Jun 21
3
png() or jpeg() in a php script
Hello,
I've got a problem with a PHP script, in which I call the system function
(to call another processes). The call is :
system("R --slave --vanilla < path/to/source/source.R");
if in this R file, I've got the lines:
pdf(file="/path/to/file/file.pdf")
commands
dev.off()
the pdf file is perfectly created
but if I change the lines to:
2005 Feb 22
0
TR: 3.8.1p1 option "permitopennet" added
...quot;';
+ continue;
+ }
+ patterns[i++] = *opts++;
+ }
+ if (!*opts) {
+ debug("%.100s, line %lu: missing end quote",
+ file, linenum);
+ auth_debug_add("%.100s, line %lu: missing end quote",
+ file, linenum);
+ xfree(patterns);
+ goto bad_option;
+ }
+ patterns[i] = 0;
+ opts++;
+
+ if (sscanf(patterns, "%255[^:/]/%255[^:]:%5[0-9]-%5[0-9]", netblock, netmask , sporta, sportb) != 4 &&
+ sscanf(patterns, "%255[^:/]/%255[^:]:%5[0-9]", netblock, netmask , sporta) != 3 ) {
+ debug("%.100s, line %lu...
2002 Sep 30
2
[PATCH] Allow "ProxyCommand none" in ssh_config
...-----------
Index: readconf.c
===================================================================
RCS file: /cvs/openssh/readconf.c,v
retrieving revision 1.76
diff -u -r1.76 readconf.c
--- readconf.c 9 Jul 2002 14:06:40 -0000 1.76
+++ readconf.c 30 Sep 2002 19:00:22 -0000
@@ -724,6 +724,19 @@
if (bad_options > 0)
fatal("%s: terminating, %d bad configuration options",
filename, bad_options);
+
+ /*
+ * If proxy_command is set to 'none' (actually ' none' due to the way
+ * the code in process_config_line works), unset it. This allows for
+ * excluding certain ho...
2007 Mar 22
1
ChallengeResponseAuthentication defaults to no?
Hello,
I have just installed OpenSSH 4.6p1 and it appears that ChallengeResponseAuthentication is not allowed unless I explicitly set it to "yes" in the sshd_config file. I am using the same config file as I did with 4.5p1 where it was allowed by default. Also, this is OpenSSH package from sunfreeware, but I believe that both versions were compiled with the same options.
Is this the
2011 Jan 07
1
[RFC/PATCH] ssh: config directive to modify the local environment
..., &mod);
+ }
+ break;
+
case oDeprecated:
debug("%s line %d: Deprecated option \"%s\"",
filename, linenum, keyword);
@@ -1034,6 +1089,7 @@ read_config_file(const char *filename, const char *host, Options *options,
char line[1024];
int active, linenum;
int bad_options = 0;
+ int prev_num_local_env_mods = options->num_local_env_mods;
if ((f = fopen(filename, "r")) == NULL)
return 0;
@@ -1066,6 +1122,36 @@ read_config_file(const char *filename, const char *host, Options *options,
if (bad_options > 0)
fatal("%s: terminating, %d bad...
2002 Aug 13
1
[PATCH] global port forwarding restriction
...2) {
+ if (channel_add_permitted_opens(patterns) < 0) {
debug("%.100s, line %lu: Bad permitopen specification "
"<%.100s>", file, linenum, patterns);
auth_debug_add("%.100s, line %lu: "
@@ -256,16 +253,6 @@
xfree(patterns);
goto bad_option;
}
- if ((port = a2port(sport)) == 0) {
- debug("%.100s, line %lu: Bad permitopen port <%.100s>",
- file, linenum, sport);
- auth_debug_add("%.100s, line %lu: "
- "Bad permitopen port", file, linenum);
- xfree(patterns);
- goto bad...
2017 May 04
5
OpenSSH contract development / patch
On Thu, May 04, 2017 at 09:37:59AM +1000, Adam Eijdenberg wrote:
> Hi Devin, have you looked at using openssh certificates to help manage
[...]
> While the feature has been around for a while now (and is really
> useful), there doesn't seem to be huge amount of documentation around
> it. I found the following useful when getting a client of my running
Yeah, when I wrote about it
2001 Oct 04
1
patch - forceshell
...forced_shell[i++] = *opts++;
+ }
+ if (!*opts) {
+ debug("%.100s, line %lu: missing end quote",
+ file, linenum);
+ packet_send_debug("%.100s, line %lu: missing end quote",
+ file, linenum);
+ xfree(forced_shell);
+ forced_shell = NULL;
+ goto bad_option;
+ }
+ forced_shell[i] = 0;
+ packet_send_debug("Forced shell: %.900s", forced_shell);
+ opts++;
goto next_option;
}
cp = "command=\"";
diff -ur openssh-2.9p2/auth-options.h openssh-2.9p2_forceshell/auth-options.h
--- openssh-2.9p2/auth-options.h Sun Jan 2...
2003 Jan 29
0
[PATCH] features for restricted shell environments
...2) {
+ if (channel_add_permitted_opens(patterns) < 0) {
debug("%.100s, line %lu: Bad permitopen specification "
"<%.100s>", file, linenum, patterns);
auth_debug_add("%.100s, line %lu: "
@@ -252,16 +251,6 @@
xfree(patterns);
goto bad_option;
}
- if ((port = a2port(sport)) == 0) {
- debug("%.100s, line %lu: Bad permitopen port <%.100s>",
- file, linenum, sport);
- auth_debug_add("%.100s, line %lu: "
- "Bad permitopen port", file, linenum);
- xfree(patterns);
- goto bad...
2001 Nov 12
4
Please test -current
Could people please test -current? We will be making a release fairly
soon.
-d
--
| By convention there is color, \\ Damien Miller <djm at mindrot.org>
| By convention sweetness, By convention bitterness, \\ www.mindrot.org
| But in reality there are atoms and space - Democritus (c. 400 BCE)
2011 Oct 08
3
[PATCH] add log= directive to authorized_hosts
Attached is a patch which adds a log= directive to authorized_keys. The text
in the log="text" directive is appended to the log line, so you can easily
tell which key is matched.
For instance the line:
log="hello world!",no-agent-forwarding,command="/bin/true",no-pty,
no-user-rc,no-X11-forwarding,permitopen="127.0.0.1:7"
ssh-rsa AAAAB3Nza....xcgaK9xXoU=
2006 Mar 29
7
sshd config parser
Hi All.
For various reasons, we're currently looking at extending (or even
overhauling) the config parser used for sshd_config.
Right now the syntax I'm looking at is a cumulative "Match" keyword that
matches when all of the specified criteria are met. This would be
similar the the Host directive used in ssh_config, although it's still
limiting (eg you can't easily
2004 Jan 19
3
Security suggestion concering SSH and port forwarding.
Hi,
sorry if it is the wrong approuch to suggest improvments to OpenSSH,
but here comes my suggestion:
I recently stumbled upon the scponly shell which in it's chroot:ed form is
an ideal solution when you want to share some files with people you trust
more or less.
The problem is, if you use the scponlyc as shell, port forwarding is still
allowed. This can of course be dissallowed in
2001 Nov 20
3
problem with AFS token forwarding
Hello,
I came across an interoperability problem in OpenSSH 3.0p1 and 3.0.1p1
concerning the AFS token forwarding. That means that the new versions are
not able to exchange AFS tokens (and Kerberos TGTs) with older OpenSSH
releases (including 2.9p2) and with the old SSH 1.2.2x. In my opinion this
problem already existed in Openssh 2.9.9p1, but I have never used this
version (I only looked at the
2001 Oct 24
2
disable features
...s.c
--- auth-options.c 30 Aug 2001 20:36:34 -0000 1.20
+++ auth-options.c 22 Oct 2001 18:26:52 -0000
@@ -53,7 +53,9 @@
xfree(forced_command);
forced_command = NULL;
}
+#ifdef WITH_TCPFWD
channel_clear_permitted_opens();
+#endif
}
/*
@@ -257,8 +259,10 @@
xfree(patterns);
goto bad_option;
}
+#ifdef WITH_TCPFWD
if (options.allow_tcp_forwarding)
channel_add_permitted_opens(host, port);
+#endif
xfree(patterns);
goto next_option;
}
Index: channels.c
===================================================================
RCS file: /home/markus/cvs/ssh/channels.c,v
re...