Displaying 7 results from an estimated 7 matches for "debug3_f".
2024 Oct 14
1
SSH host key rotation – known_hosts file not updated
...> already exists under a different name. If you turn the debugging level up,
> then you'll see the name(s) that it matches too:
>
> 2100 if (sshkey_equal(l->key, ctx->keys[i])) {
> 2101 ctx->other_name_seen = 1;
> 2102 debug3_f("found %s key under different "
> 2103 "name/addr at %s:%ld",
> 2104 sshkey_ssh_name(ctx->keys[i]),
> 2105 l->path, l->linenum);
> 2106 return 0;
> 2107 }
&...
2024 Oct 14
1
Re: SSH host key rotation – known_hosts file not updated
...from the server in an update
already exists under a different name. If you turn the debugging level up,
then you'll see the name(s) that it matches too:
2100 if (sshkey_equal(l->key, ctx->keys[i])) {
2101 ctx->other_name_seen = 1;
2102 debug3_f("found %s key under different "
2103 "name/addr at %s:%ld",
2104 sshkey_ssh_name(ctx->keys[i]),
2105 l->path, l->linenum);
2106 return 0;
2107 }
2108 }
-d
2024 May 24
1
sshd -i always exiting with exit status 255
...to the sshd process, so I can tell that the exit status of the main (the "privileged" process?) of sshd originates in mm_request_receive from the EPIPE errno check:
void
mm_request_receive(int sock, struct sshbuf *m)
{
u_char buf[4], *p = NULL;
u_int msg_len;
int r;
debug3_f("entering");
if (atomicio(read, sock, buf, sizeof(buf)) != sizeof(buf)) {
if (errno == EPIPE)
cleanup_exit(255);
fatal_f("read: %s", strerror(errno));
}
Questions:
- Is this the expected exit point of `sshd -i` ?
- If so, is there a re...
2024 Sep 05
1
[PATCH] ssh-add: Support '@' in the user part of destination constraints
...plit on the first '@', now they are split
on the last '@' which matches the behaviour of the client (see lines
1104 and following of the current src/usr.bin/ssh/ssh.c.)
In addition to running the patched version against all my constraints,
I also tested it with the additional line `debug3_f("User: \"%s\"
Host: \"%s\"", dch->user, dch->hostname);` to make sure that I have no
off-by-one error which would lead to wrongly parsed components.
And it obviously also works when connecting to the SSH server that
expects those user names while using the agent....
2024 Oct 13
1
SSH host key rotation – known_hosts file not updated
Hi,
I created new host keys on serverA, updated sshd_config accordingly
(adding the line below) and restarted ssh:
cd /etc/ssh
sudo ssh-keygen -f 2024_ssh_host_ed25519_key -t ed25519 -N ''
sudo vi /etc/ssh/sshd_config
# added line: HostKey /etc/ssh/2024_ssh_host_ed25519_key
sudo service ssh restart
When I connect to serverA (`ssh -v -o UpdateHostKeys=yes serverA`)
afterwards,
2024 Oct 17
2
Re: Re: SSH host key rotation – known_hosts file not updated
...r a different name. If you turn the debugging level up,
> > then you'll see the name(s) that it matches too:
> >
> > 2100 if (sshkey_equal(l->key, ctx->keys[i])) {
> > 2101 ctx->other_name_seen = 1;
> > 2102 debug3_f("found %s key under different "
> > 2103 "name/addr at %s:%ld",
> > 2104 sshkey_ssh_name(ctx->keys[i]),
> > 2105 l->path, l->linenum);
> > 2106 return 0;
>...
2024 Nov 12
3
[PATCH 0/2] Specify signature algorithm during server hostkeys prove
From: Maxime Rey <maximejeanrey at gmail.com>
Hello,
I've discovered an issue with sshd when it's configured to use the SSH agent
alongside multiple host keys. Specifically, this problem happens during the
hostkeys-prove-00 at openssh.com request, when the server attempts to
demonstrate ownership of the host keys by calling the agent.
The issue occurs because, while processing the