Displaying 20 results from an estimated 22 matches for "cipher_spec".
2010 Jul 22
3
[Bug 1801] New: cipher_spec section of ssh man page needs update
https://bugzilla.mindrot.org/show_bug.cgi?id=1801
Summary: cipher_spec section of ssh man page needs update
Product: Portable OpenSSH
Version: 5.5p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: Documentation
AssignedTo: unassigned-bugs at mind...
2014 Jun 23
1
-h, --help option
...--help option, and for
`ssh` binary I usually use Google + StackOverflow. Having --help
option that works as an human friendly entrypoint for more
information about command would certainly save some time.
Current output from `ssh --help`:
usage: ssh [-1246AaCfgkMNnqsTtVvXxY] [-b bind_address] [-c cipher_spec]
[-D [bind_address:]port] [-e escape_char] [-F configfile]
[-i identity_file] [-L [bind_address:]port:host:hostport]
[-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port]
[-R [bind_address:]port:host:hostport] [-S ctl_path]
[-w local...
2011 Jul 17
2
openSSH 5.8p2 BindPort patch
...sh-5.8p2-srcport//ssh.0
--- openssh-5.8p2//ssh.0 2011-05-05 02:58:10.000000000 +0100
+++ openssh-5.8p2-srcport//ssh.0 2011-07-17 21:00:05.153358189 +0100
@@ -4,7 +4,7 @@ NAME
ssh - OpenSSH SSH client (remote login program)
SYNOPSIS
- ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec]
+ ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-B bind_port
] [-c cipher_spec]
[-D [bind_address:]port] [-e escape_char] [-F configfile] [-I pkcs11]
[-i identity_file] [-L [bind_address:]port:host:hostport]
[-l login_name] [-m mac_spec] [-O ctl_cmd] [-o opti...
2017 Mar 07
4
[Bug 2690] New: Add command line "ssh --version"
...1 Mar 2016
Would you support a patch to add "ssh --version" this is the standard
way to check the version, it is unclear what version ssh from the help
output, so could add it to that as well. If there was agreement.
$ ssh
usage: ssh [-1246AaCfGgKkMNnqsTtVvXxYy] [-b bind_address] [-c
cipher_spec]
[-D [bind_address:]port] [-E log_file] [-e escape_char]
[-F configfile] [-I pkcs11] [-i identity_file] [-L address]
[-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p
port]
[-Q query_option] [-R address] [-S ctl_path] [-W host:port]
[-...
2007 Aug 22
0
Patch to allow checking of v1 keys on remote host.
...= 0; i < options.number_of_password_prompts; i++) {
--- orig/openssh-4.6p1/ssh.c 2007-01-05 00:30:17.000000000 -0500
+++ openssh-4.6p1/ssh.c 2007-05-10 11:40:06.279706888 -0400
@@ -185,7 +185,7 @@
usage(void)
{
fprintf(stderr,
-"usage: ssh [-1246AaCfgkMNnqsTtVvXxY] [-b bind_address] [-c cipher_spec]\n"
+"usage: ssh [-1246AaCfgkMNnqsTtuVvXxY] [-b bind_address] [-c cipher_spec]\n"
" [-D [bind_address:]port] [-e escape_char] [-F configfile]\n"
" [-i identity_file] [-L [bind_address:]port:host:hostport]\n"
" [-l login_name]...
2009 Jul 09
0
[PATCH] Allow binding to a local port (OpenSSH 5.2)
...verify_host_key_dns; /* Verify host key using DNS */
diff -ruN a/ssh.c b/ssh.c
--- a/ssh.c 2009-02-14 06:28:21.000000000 +0100
+++ b/ssh.c 2009-07-09 18:35:12.000000000 +0200
@@ -179,10 +179,11 @@
usage(void)
{
fprintf(stderr,
-"usage: ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec]\n"
-" [-D [bind_address:]port] [-e escape_char] [-F configfile]\n"
-" [-i identity_file] [-L [bind_address:]port:host:hostport]\n"
-" [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port]\n"
+"usage: ssh [-1246AaCfgKk...
2000 Dec 21
1
Patch to allow DSA as well as RSA identities to be specified on the command line
...multiple -I options (and multiple identities specified in config-
uration files).
diff -U2 openssh-2.2.0p1/ssh.1 openssh-2.2.0p1.nigelw/ssh.1
--- openssh-2.2.0p1/ssh.1 Tue Aug 29 11:33:51 2000
+++ openssh-2.2.0p1.nigelw/ssh.1 Thu Dec 21 10:56:23 2000
@@ -28,5 +28,6 @@
.Op Fl c Ar cipher_spec
.Op Fl e Ar escape_char
-.Op Fl i Ar identity_file
+.Op Fl i Ar rsa_identity_file
+.Op Fl I Ar dsa_identity_file
.Op Fl l Ar login_name
.Op Fl o Ar option
@@ -381,9 +382,21 @@
.It Fl g
Allows remote hosts to connect to local forwarded ports.
-.It Fl i Ar identity_file
+.It Fl i Ar rsa_identity...
2001 Sep 13
4
ssh argv[0] support
....Dd September 7, 2001
.Dt SSH-ARGV0 1
.Os Debian Project
.Sh NAME
.Nm ssh-argv0
.Nd replaces the old ssh command-name as hostname handling
.Sh SYNOPSIS
.Ar hostname | user at hostname
.Op Fl l Ar login_name
.Op Ar command
.Pp
.Ar hostname | user at hostname
.Op Fl afgknqstvxACNPTX1246
.Op Fl c Ar cipher_spec
.Op Fl e Ar escape_char
.Op Fl i Ar identity_file
.Op Fl l Ar login_name
.Op Fl m Ar mac_spec
.Op Fl o Ar option
.Op Fl p Ar port
.Oo Fl L Xo
.Sm off
.Ar port :
.Ar host :
.Ar hostport
.Sm on
.Xc
.Oc
.Oo Fl R Xo
.Sm off
.Ar port :
.Ar host :
.Ar hostport
.Sm on
.Xc
.Oc
.Op Ar command
.Sh DESCRIPTIO...
2014 Feb 10
0
[PATCH] Basic SCTP support for OpenSSH client and server
...ServerOptions;
/* Information about the incoming connection as used by Match */
diff --git a/ssh.c b/ssh.c
index add760c..c2f663c 100644
--- a/ssh.c
+++ b/ssh.c
@@ -196,7 +196,7 @@ static void
usage(void)
{
fprintf(stderr,
-"usage: ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec]\n"
+"usage: ssh [-1246AaCfgHhKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec]\n"
" [-D [bind_address:]port] [-E log_file] [-e escape_char]\n"
" [-F configfile] [-I pkcs11] [-i identity_file]\n"
" [-L [bind_address:]port:ho...
2020 Jan 26
1
[Bug 3115] New: Add --help
...n-accidental way
to trigger the usage messages.
$ scp --help
$ ssh --help
etc.
Already works like
$ cat --help
except for the "unknown option" and error $? value.
$ ssh --help
unknown option -- -
usage: ssh [-46AaCfGgKkMNnqsTtVvXxYy] [-B bind_interface]
[-b bind_address] [-c cipher_spec] [-D [bind_address:]port]
[-E log_file] [-e escape_char] [-F configfile] [-I pkcs11]
[-i identity_file] [-J [user@]host[:port]] [-L address]
[-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p
port]
[-Q query_option] [-R address] [-S ctl_path] [-W...
2004 Nov 20
1
[Bug 955] ssh -h " Displayed as illegal options " in SSH 3.9
...e Option -h ( Basic help ) dispalyed in the SSH Usage as
well as SSH man page
But when we try this as "ssh -h" ,
we are get Message as "ssh: illegal option -- h" log given below
# ssh -h
ssh: illegal option -- h
usage: ssh [-1246AaCfghkMNnqsTtVvXxY] [-b bind_address] [-c cipher_spec]
[-D port] [-e escape_char] [-F configfile] [-i identity_file]
[-L port:host:hostport] [-l login_name] [-m mac_spec] [-o option]
[-p port] [-R port:host:hostport] [-S ctl] [user@]hostname [command]
To avoid this we have include the 'h' character in getopt(...
2004 Sep 08
0
[PATCH]Extending user@host syntax
...included in openssh?
Torsten
diff -Naur openssh-3.9p1/ssh.c openssh-3.9p1.new/ssh.c
- --- openssh-3.9p1/ssh.c 2004-08-15 09:23:34.000000000 +0200
+++ openssh-3.9p1.new/ssh.c 2004-09-08 16:12:58.000000000 +0200
@@ -157,7 +157,8 @@
"usage: ssh [-1246AaCfghkMNnqsTtVvXxY] [-b bind_address] [-c cipher_spec]\n"
" [-D port] [-e escape_char] [-F configfile] [-i identity_file]\n"
" [-L port:host:hostport] [-l login_name] [-m mac_spec] [-o option]\n"
- -" [-p port] [-R port:host:hostport] [-S ctl] [user@]hostname [command]\n"
+"...
2024 Jan 06
14
[Bug 3649] New: Control sockets do not connect anymore (after updating OpenSSH)
https://bugzilla.mindrot.org/show_bug.cgi?id=3649
Bug ID: 3649
Summary: Control sockets do not connect anymore (after updating
OpenSSH)
Product: Portable OpenSSH
Version: 9.6p1
Hardware: ARM
OS: Mac OS X
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
2013 Nov 23
2
[Bug 2174] New: no-pty in authorized_keys does not prevent and interactive shell
...ocation request failed on channel 0
Linux hostname 2.6.32-5-amd64 #1 SMP Mon Oct 3 03:59:20 UTC 2011 x86_64
cat ~/.ssh/authorized_keys
no-pty ssh-rsa AAAA..5KS3+Q==
ssh -v
OpenSSH_5.5p1 Debian-6+squeeze3, OpenSSL 0.9.8o 01 Jun 2010
usage: ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c
cipher_spec]
[-D [bind_address:]port] [-e escape_char] [-F configfile]
[-I pkcs11] [-i identity_file]
[-L [bind_address:]port:host:hostport]
[-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p
port]
[-R [bind_address:]port:host:hostport] [-S ctl_pat...
2009 Mar 20
4
[Bug 1576] New: ssh-add doesn't have --help or --version options
https://bugzilla.mindrot.org/show_bug.cgi?id=1576
Summary: ssh-add doesn't have --help or --version options
Product: Portable OpenSSH
Version: 5.2p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Documentation
AssignedTo: unassigned-bugs at mindrot.org
2015 Oct 21
7
[Bug 2481] New: Tilde expansion in -i option inconsistent
...file ~/.ssh/keyfile not accessible: No such file or directory.
---snip--
---snip--
stat("/home/ec2-user/.ssh/keyfile", {st_mode=S_IFREG|0600,
st_size=1676, ...}) = 0
write(2, "usage: ssh [-1246AaCfgKkMNnqsTtV"..., 524usage: ssh
[-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec]
---snip--
Without a tilde it works with or without a space.
--
You are receiving this mail because:
You are watching the assignee of the bug.
2008 Jul 14
5
EOL in stderr of ssh - Linux
Hello everyone,
recently I've found something I consider a bug.
Correct me if I'm wrong, but I always thought that Linux' EOL is 0x0A.
Imagine my surprise when I saw that all messages that are being output
on to the stderr (on any Linux I've tested - Fedora and Ubuntu) are
terminated with 0x0D, 0x0A.
Maybe that's standard behaviour of all stderr messages in all Linux
2000 Aug 24
0
patch for a few things
...msg[count]->msg);
pam_msg_cat(msg[count]->msg);
! }
break;
default:
free(reply);
*** ./ssh.1.orig Thu Aug 17 23:59:06 2000
--- ./ssh.1 Thu Aug 24 11:02:14 2000
***************
*** 24,30 ****
.Op Ar command
.Pp
.Nm ssh
! .Op Fl afgknqtvxACNPTX246
.Op Fl c Ar cipher_spec
.Op Fl e Ar escape_char
.Op Fl i Ar identity_file
--- 24,30 ----
.Op Ar command
.Pp
.Nm ssh
! .Op Fl afgknqtvxACNPTX1246
.Op Fl c Ar cipher_spec
.Op Fl e Ar escape_char
.Op Fl i Ar identity_file
***************
*** 512,517 ****
--- 512,521 ----
Port forwardings can also be specifi...
2001 Feb 06
4
argv[0] => host feature considered harmful
OpenSSH still has this feature, SSH-1.2.27 no longer has it. Admittedly it
can be useful sometimes, even though I'd prefer this to be done using a
trivial shell wrapper, which would be the UNIX way of doing things.
Not being able to call OpenSSH's ssh by another name (say ``ssh1'') can get in
the way when having to maintain two versions of ssh in parallel because the
``ssh ->
2002 Apr 22
9
Password from open filedescriptor
...st char *, int);
+char *read_password_from_fd(int fd);
diff -bur openssh-3.1p1.org/ssh.1 openssh-3.1p1/ssh.1
--- openssh-3.1p1.org/ssh.1 Tue Feb 19 05:27:24 2002
+++ openssh-3.1p1/ssh.1 Mon Apr 22 10:34:59 2002
@@ -51,6 +51,7 @@
.Op Fl afgknqstvxACNPTX1246
.Op Fl b Ar bind_address
.Op Fl c Ar cipher_spec
+.Op Fl d Ar fd
.Op Fl e Ar escape_char
.Op Fl i Ar identity_file
.Op Fl l Ar login_name
@@ -415,6 +416,10 @@
See
.Cm Ciphers
for more information.
+.It Fl d Ar fd
+Read the password from file descriptor fd. If you use 0 for fd, the
+passphrase will be read from stdin. Don't use this opti...