search for: cipher_spec

Displaying 20 results from an estimated 22 matches for "cipher_spec".

2010 Jul 22
3
[Bug 1801] New: cipher_spec section of ssh man page needs update
https://bugzilla.mindrot.org/show_bug.cgi?id=1801 Summary: cipher_spec section of ssh man page needs update Product: Portable OpenSSH Version: 5.5p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: Documentation AssignedTo: unassigned-bugs at mind...
2014 Jun 23
1
-h, --help option
...--help option, and for `ssh` binary I usually use Google + StackOverflow. Having --help option that works as an human friendly entrypoint for more information about command would certainly save some time. Current output from `ssh --help`: usage: ssh [-1246AaCfgkMNnqsTtVvXxY] [-b bind_address] [-c cipher_spec] [-D [bind_address:]port] [-e escape_char] [-F configfile] [-i identity_file] [-L [bind_address:]port:host:hostport] [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port] [-R [bind_address:]port:host:hostport] [-S ctl_path] [-w local...
2011 Jul 17
2
openSSH 5.8p2 BindPort patch
...sh-5.8p2-srcport//ssh.0 --- openssh-5.8p2//ssh.0 2011-05-05 02:58:10.000000000 +0100 +++ openssh-5.8p2-srcport//ssh.0 2011-07-17 21:00:05.153358189 +0100 @@ -4,7 +4,7 @@ NAME ssh - OpenSSH SSH client (remote login program) SYNOPSIS - ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] + ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-B bind_port ] [-c cipher_spec] [-D [bind_address:]port] [-e escape_char] [-F configfile] [-I pkcs11] [-i identity_file] [-L [bind_address:]port:host:hostport] [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o opti...
2017 Mar 07
4
[Bug 2690] New: Add command line "ssh --version"
...1 Mar 2016 Would you support a patch to add "ssh --version" this is the standard way to check the version, it is unclear what version ssh from the help output, so could add it to that as well. If there was agreement. $ ssh usage: ssh [-1246AaCfGgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] [-D [bind_address:]port] [-E log_file] [-e escape_char] [-F configfile] [-I pkcs11] [-i identity_file] [-L address] [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port] [-Q query_option] [-R address] [-S ctl_path] [-W host:port] [-...
2007 Aug 22
0
Patch to allow checking of v1 keys on remote host.
...= 0; i < options.number_of_password_prompts; i++) { --- orig/openssh-4.6p1/ssh.c 2007-01-05 00:30:17.000000000 -0500 +++ openssh-4.6p1/ssh.c 2007-05-10 11:40:06.279706888 -0400 @@ -185,7 +185,7 @@ usage(void) { fprintf(stderr, -"usage: ssh [-1246AaCfgkMNnqsTtVvXxY] [-b bind_address] [-c cipher_spec]\n" +"usage: ssh [-1246AaCfgkMNnqsTtuVvXxY] [-b bind_address] [-c cipher_spec]\n" " [-D [bind_address:]port] [-e escape_char] [-F configfile]\n" " [-i identity_file] [-L [bind_address:]port:host:hostport]\n" " [-l login_name]...
2009 Jul 09
0
[PATCH] Allow binding to a local port (OpenSSH 5.2)
...verify_host_key_dns; /* Verify host key using DNS */ diff -ruN a/ssh.c b/ssh.c --- a/ssh.c 2009-02-14 06:28:21.000000000 +0100 +++ b/ssh.c 2009-07-09 18:35:12.000000000 +0200 @@ -179,10 +179,11 @@ usage(void) { fprintf(stderr, -"usage: ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec]\n" -" [-D [bind_address:]port] [-e escape_char] [-F configfile]\n" -" [-i identity_file] [-L [bind_address:]port:host:hostport]\n" -" [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port]\n" +"usage: ssh [-1246AaCfgKk...
2000 Dec 21
1
Patch to allow DSA as well as RSA identities to be specified on the command line
...multiple -I options (and multiple identities specified in config- uration files). diff -U2 openssh-2.2.0p1/ssh.1 openssh-2.2.0p1.nigelw/ssh.1 --- openssh-2.2.0p1/ssh.1 Tue Aug 29 11:33:51 2000 +++ openssh-2.2.0p1.nigelw/ssh.1 Thu Dec 21 10:56:23 2000 @@ -28,5 +28,6 @@ .Op Fl c Ar cipher_spec .Op Fl e Ar escape_char -.Op Fl i Ar identity_file +.Op Fl i Ar rsa_identity_file +.Op Fl I Ar dsa_identity_file .Op Fl l Ar login_name .Op Fl o Ar option @@ -381,9 +382,21 @@ .It Fl g Allows remote hosts to connect to local forwarded ports. -.It Fl i Ar identity_file +.It Fl i Ar rsa_identity...
2001 Sep 13
4
ssh argv[0] support
....Dd September 7, 2001 .Dt SSH-ARGV0 1 .Os Debian Project .Sh NAME .Nm ssh-argv0 .Nd replaces the old ssh command-name as hostname handling .Sh SYNOPSIS .Ar hostname | user at hostname .Op Fl l Ar login_name .Op Ar command .Pp .Ar hostname | user at hostname .Op Fl afgknqstvxACNPTX1246 .Op Fl c Ar cipher_spec .Op Fl e Ar escape_char .Op Fl i Ar identity_file .Op Fl l Ar login_name .Op Fl m Ar mac_spec .Op Fl o Ar option .Op Fl p Ar port .Oo Fl L Xo .Sm off .Ar port : .Ar host : .Ar hostport .Sm on .Xc .Oc .Oo Fl R Xo .Sm off .Ar port : .Ar host : .Ar hostport .Sm on .Xc .Oc .Op Ar command .Sh DESCRIPTIO...
2014 Feb 10
0
[PATCH] Basic SCTP support for OpenSSH client and server
...ServerOptions; /* Information about the incoming connection as used by Match */ diff --git a/ssh.c b/ssh.c index add760c..c2f663c 100644 --- a/ssh.c +++ b/ssh.c @@ -196,7 +196,7 @@ static void usage(void) { fprintf(stderr, -"usage: ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec]\n" +"usage: ssh [-1246AaCfgHhKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec]\n" " [-D [bind_address:]port] [-E log_file] [-e escape_char]\n" " [-F configfile] [-I pkcs11] [-i identity_file]\n" " [-L [bind_address:]port:ho...
2020 Jan 26
1
[Bug 3115] New: Add --help
...n-accidental way to trigger the usage messages. $ scp --help $ ssh --help etc. Already works like $ cat --help except for the "unknown option" and error $? value. $ ssh --help unknown option -- - usage: ssh [-46AaCfGgKkMNnqsTtVvXxYy] [-B bind_interface] [-b bind_address] [-c cipher_spec] [-D [bind_address:]port] [-E log_file] [-e escape_char] [-F configfile] [-I pkcs11] [-i identity_file] [-J [user@]host[:port]] [-L address] [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port] [-Q query_option] [-R address] [-S ctl_path] [-W...
2004 Nov 20
1
[Bug 955] ssh -h " Displayed as illegal options " in SSH 3.9
...e Option -h ( Basic help ) dispalyed in the SSH Usage as well as SSH man page But when we try this as "ssh -h" , we are get Message as "ssh: illegal option -- h" log given below # ssh -h ssh: illegal option -- h usage: ssh [-1246AaCfghkMNnqsTtVvXxY] [-b bind_address] [-c cipher_spec] [-D port] [-e escape_char] [-F configfile] [-i identity_file] [-L port:host:hostport] [-l login_name] [-m mac_spec] [-o option] [-p port] [-R port:host:hostport] [-S ctl] [user@]hostname [command] To avoid this we have include the 'h' character in getopt(...
2004 Sep 08
0
[PATCH]Extending user@host syntax
...included in openssh? Torsten diff -Naur openssh-3.9p1/ssh.c openssh-3.9p1.new/ssh.c - --- openssh-3.9p1/ssh.c 2004-08-15 09:23:34.000000000 +0200 +++ openssh-3.9p1.new/ssh.c 2004-09-08 16:12:58.000000000 +0200 @@ -157,7 +157,8 @@ "usage: ssh [-1246AaCfghkMNnqsTtVvXxY] [-b bind_address] [-c cipher_spec]\n" " [-D port] [-e escape_char] [-F configfile] [-i identity_file]\n" " [-L port:host:hostport] [-l login_name] [-m mac_spec] [-o option]\n" - -" [-p port] [-R port:host:hostport] [-S ctl] [user@]hostname [command]\n" +"...
2024 Jan 06
14
[Bug 3649] New: Control sockets do not connect anymore (after updating OpenSSH)
https://bugzilla.mindrot.org/show_bug.cgi?id=3649 Bug ID: 3649 Summary: Control sockets do not connect anymore (after updating OpenSSH) Product: Portable OpenSSH Version: 9.6p1 Hardware: ARM OS: Mac OS X Status: NEW Severity: enhancement Priority: P5 Component: ssh
2013 Nov 23
2
[Bug 2174] New: no-pty in authorized_keys does not prevent and interactive shell
...ocation request failed on channel 0 Linux hostname 2.6.32-5-amd64 #1 SMP Mon Oct 3 03:59:20 UTC 2011 x86_64 cat ~/.ssh/authorized_keys no-pty ssh-rsa AAAA..5KS3+Q== ssh -v OpenSSH_5.5p1 Debian-6+squeeze3, OpenSSL 0.9.8o 01 Jun 2010 usage: ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] [-D [bind_address:]port] [-e escape_char] [-F configfile] [-I pkcs11] [-i identity_file] [-L [bind_address:]port:host:hostport] [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port] [-R [bind_address:]port:host:hostport] [-S ctl_pat...
2009 Mar 20
4
[Bug 1576] New: ssh-add doesn't have --help or --version options
https://bugzilla.mindrot.org/show_bug.cgi?id=1576 Summary: ssh-add doesn't have --help or --version options Product: Portable OpenSSH Version: 5.2p1 Platform: Other OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: Documentation AssignedTo: unassigned-bugs at mindrot.org
2015 Oct 21
7
[Bug 2481] New: Tilde expansion in -i option inconsistent
...file ~/.ssh/keyfile not accessible: No such file or directory. ---snip-- ---snip-- stat("/home/ec2-user/.ssh/keyfile", {st_mode=S_IFREG|0600, st_size=1676, ...}) = 0 write(2, "usage: ssh [-1246AaCfgKkMNnqsTtV"..., 524usage: ssh [-1246AaCfgKkMNnqsTtVvXxYy] [-b bind_address] [-c cipher_spec] ---snip-- Without a tilde it works with or without a space. -- You are receiving this mail because: You are watching the assignee of the bug.
2008 Jul 14
5
EOL in stderr of ssh - Linux
Hello everyone, recently I've found something I consider a bug. Correct me if I'm wrong, but I always thought that Linux' EOL is 0x0A. Imagine my surprise when I saw that all messages that are being output on to the stderr (on any Linux I've tested - Fedora and Ubuntu) are terminated with 0x0D, 0x0A. Maybe that's standard behaviour of all stderr messages in all Linux
2000 Aug 24
0
patch for a few things
...msg[count]->msg); pam_msg_cat(msg[count]->msg); ! } break; default: free(reply); *** ./ssh.1.orig Thu Aug 17 23:59:06 2000 --- ./ssh.1 Thu Aug 24 11:02:14 2000 *************** *** 24,30 **** .Op Ar command .Pp .Nm ssh ! .Op Fl afgknqtvxACNPTX246 .Op Fl c Ar cipher_spec .Op Fl e Ar escape_char .Op Fl i Ar identity_file --- 24,30 ---- .Op Ar command .Pp .Nm ssh ! .Op Fl afgknqtvxACNPTX1246 .Op Fl c Ar cipher_spec .Op Fl e Ar escape_char .Op Fl i Ar identity_file *************** *** 512,517 **** --- 512,521 ---- Port forwardings can also be specifi...
2001 Feb 06
4
argv[0] => host feature considered harmful
OpenSSH still has this feature, SSH-1.2.27 no longer has it. Admittedly it can be useful sometimes, even though I'd prefer this to be done using a trivial shell wrapper, which would be the UNIX way of doing things. Not being able to call OpenSSH's ssh by another name (say ``ssh1'') can get in the way when having to maintain two versions of ssh in parallel because the ``ssh ->
2002 Apr 22
9
Password from open filedescriptor
...st char *, int); +char *read_password_from_fd(int fd); diff -bur openssh-3.1p1.org/ssh.1 openssh-3.1p1/ssh.1 --- openssh-3.1p1.org/ssh.1 Tue Feb 19 05:27:24 2002 +++ openssh-3.1p1/ssh.1 Mon Apr 22 10:34:59 2002 @@ -51,6 +51,7 @@ .Op Fl afgknqstvxACNPTX1246 .Op Fl b Ar bind_address .Op Fl c Ar cipher_spec +.Op Fl d Ar fd .Op Fl e Ar escape_char .Op Fl i Ar identity_file .Op Fl l Ar login_name @@ -415,6 +416,10 @@ See .Cm Ciphers for more information. +.It Fl d Ar fd +Read the password from file descriptor fd. If you use 0 for fd, the +passphrase will be read from stdin. Don't use this opti...