search for: forward_ag

Displaying 19 results from an estimated 19 matches for "forward_ag".

Did you mean: forward_as
2000 Oct 30
1
Compatibility with 1.2.16 (commercial)?
Hi folks, I'm currently trying to connect to version 1.2.16 of the commercial server. The server says it supports protocol version 1.4 and that that is incompatible with protocol version 1.5. Is that actually true? The complete output from "ssh -v xxxxxxx" is: $ ./ssh -v xxxxxxx SSH Version OpenSSH_2.3.0p1, protocol versions 1.5/2.0. Compiled with SSL (0x0090581f). debug:
2001 Oct 26
2
Patch to add "warn" value to ForwardX11 and ForwardAgent
...'t find any references to GNATS on www.openbsd.com or www.openssh.com. How do I submit a patch to it? - Dave Dykstra --- readconf.c.O Fri Oct 26 10:45:15 2001 +++ readconf.c Fri Oct 26 11:42:22 2001 @@ -296,28 +296,44 @@ /* NOTREACHED */ case oForwardAgent: intptr = &options->forward_agent; -parse_flag: +parse_yesnowarn: arg = strdelim(&s); if (!arg || *arg == '\0') - fatal("%.200s line %d: Missing yes/no argument.", filename, linenum); + fatal("%.200s line %d: Missing yes/no/warn argument.", + filename, linenum); value = 0; /*...
2000 Feb 04
0
Patch that allows equal sign in options
...,7 @@ return 0; /* Get the keyword. (Each line is supposed to begin with a keyword). */ - cp = strtok(cp, WHITESPACE); + cp = strtok(cp, WHITESPACE_EQ); opcode = parse_token(cp, filename, linenum); switch (opcode) { @@ -248,7 +249,7 @@ case oForwardAgent: intptr = &options->forward_agent; parse_flag: - cp = strtok(NULL, WHITESPACE); + cp = strtok(NULL, WHITESPACE_EQ); if (!cp) fatal("%.200s line %d: Missing yes/no argument.", filename, linenum); value = 0; /* To avoid compiler warning... */ @@ -330,7 +331,7 @@ case oStrictHostKeyChecking: intptr = &...
2002 May 22
0
[PATCH] connect() timeout
...al("%.200s line %d: Missing time argument.", filename, linenum); + if ((value = convtime(arg)) == -1) + fatal("%.200s line %d: Invalid time argument.", filename, linenum); + if (*intptr == -1) + *intptr = value; + break; + case oForwardAgent: intptr = &options->forward_agent; parse_flag: @@ -775,6 +790,7 @@ options->compression_level = -1; options->port = -1; options->connection_attempts = -1; + options->connection_timeout = -1; options->number_of_password_prompts = -1; options->cipher = -1; options->ciphers = NULL; --- openssh-3.2....
2011 Nov 09
4
Starting out with puppet and capistrano
Hey guys. I am starting out with puppet and am in the process of writing a bootstrap script for the clients and a capistrano recipe for the server. I have the client bootstrap done which installs ruby, puppet, sets a host name, and then points the client at the puppet server and now I am in the process of setting up the puppet server. My first attempt was to set up a git project for puppet, an
2002 Jan 26
5
[PATCH] Connect timeout
...ut", oConnectTimeout }, { NULL, 0 } }; @@ -294,6 +296,11 @@ /* don't panic, but count bad options */ return -1; /* NOTREACHED */ + + case oConnectTimeout: + intptr = &options->connection_timeout; + goto parse_int; + case oForwardAgent: intptr = &options->forward_agent; parse_flag: @@ -775,6 +782,7 @@ options->compression_level = -1; options->port = -1; options->connection_attempts = -1; + options->connection_timeout = -1; options->number_of_password_prompts = -1; options->cipher = -1; options->ciphers = NULL; --- readconf.h.O...
2001 Oct 24
2
disable features
...input_port_open); +#endif dispatch_set(SSH_SMSG_EXITSTATUS, &client_input_exit_status); dispatch_set(SSH_SMSG_STDERR_DATA, &client_input_stderr_data); dispatch_set(SSH_SMSG_STDOUT_DATA, &client_input_stdout_data); +#ifdef WITH_AGENTFWD dispatch_set(SSH_SMSG_AGENT_OPEN, options.forward_agent ? &auth_input_open_request : &deny_input_open); +#endif +#ifdef WITH_X11FWD dispatch_set(SSH_SMSG_X11_OPEN, options.forward_x11 ? &x11_input_open : &deny_input_open); +#endif } static void client_init_dispatch_15(void) Index: compress.c ==========================...
2002 Aug 09
0
patch to ssh.c for KerberosTgtPassing and readability patches for config files and manpages
.../* AFS */ fprintf(stderr, " -X Enable X11 connection forwarding.\n"); fprintf(stderr, " -x Disable X11 connection forwarding (default).\n"); @@ -312,7 +312,7 @@ case 'A': options.forward_agent = 1; break; -#ifdef AFS +#if defined (AFS) || defined (KRB5) case 'k': options.kerberos_tgt_passing = 0; options.afs_token_passing = 0; Index: ssh.1 ===================================================...
2001 Nov 17
0
[PATCH] Connect timeout
...ut", oConnectTimeout }, { NULL, 0 } }; @@ -294,6 +296,11 @@ /* don't panic, but count bad options */ return -1; /* NOTREACHED */ + + case oConnectTimeout: + intptr = &options->connection_timeout; + goto parse_int; + case oForwardAgent: intptr = &options->forward_agent; parse_flag: @@ -775,6 +782,7 @@ options->compression_level = -1; options->port = -1; options->connection_attempts = -1; + options->connection_timeout = -1; options->number_of_password_prompts = -1; options->cipher = -1; options->ciphers = NULL; --- openssh-3.0....
2003 Apr 15
0
Connect timeout patch
...l("%.200s line %d: Missing time argument.", filename, linenum); + if ((value = convtime(arg)) == -1) + fatal("%.200s line %d: Invalid time argument.", filename, linenum); + if (*intptr == -1) + *intptr = value; + break; + case oForwardAgent: intptr = &options->forward_agent; parse_flag: @@ -770,6 +783,7 @@ options->compression_level = -1; options->port = -1; options->connection_attempts = -1; + options->connection_timeout = -1; options->number_of_password_prompts = -1; options->cipher = -1; options->ciphers = NULL; --- openssh-3.6....
2002 Apr 03
1
[PATCH] connect() timeout
...al("%.200s line %d: Missing time argument.", filename, linenum); + if ((value = convtime(arg)) == -1) + fatal("%.200s line %d: Invalid time argument.", filename, linenum); + if (*intptr == -1) + *intptr = value; + break; + case oForwardAgent: intptr = &options->forward_agent; parse_flag: @@ -775,6 +790,7 @@ options->compression_level = -1; options->port = -1; options->connection_attempts = -1; + options->connection_timeout = -1; options->number_of_password_prompts = -1; options->cipher = -1; options->ciphers = NULL; --- openssh-3.1p...
2002 Oct 17
0
[PATCH] connect() timeout for OpenSSH-3.5p1
...l("%.200s line %d: Missing time argument.", filename, linenum); + if ((value = convtime(arg)) == -1) + fatal("%.200s line %d: Invalid time argument.", filename, linenum); + if (*intptr == -1) + *intptr = value; + break; + case oForwardAgent: intptr = &options->forward_agent; parse_flag: @@ -769,6 +782,7 @@ options->compression_level = -1; options->port = -1; options->connection_attempts = -1; + options->connection_timeout = -1; options->number_of_password_prompts = -1; options->cipher = -1; options->ciphers = NULL; --- openssh-3.5p...
2012 Feb 12
0
PATCH: multiple BindAddress
...6 +#define SSH_MAX_HOSTS_FILES 256 +#define SSH_MAX_BIND_ADDRESSES 8 /* 16 addresses, should be enough */ + +#define SSH_BIND_ADDRESS_ANY "any" /* any address mark, used in configuration file */ +#define SSH_BIND_ADDRESS_ANYlen strlen(SSH_BIND_ADDRESS_ANY) typedef struct { int forward_agent; /* Forward authentication agent. */ @@ -89,7 +93,10 @@ typedef struct { u_int num_user_hostfiles; /* Path for $HOME/.ssh/known_hosts */ char *user_hostfiles[SSH_MAX_HOSTS_FILES]; char *preferred_authentications; - char *bind_address; /* local socket address for connection to sshd */...
2002 Jan 23
1
Fix AFS and Kerberos interaction
...rr, " -X Enable X11 connection forwarding.\n"); fprintf(stderr, " -x Disable X11 connection forwarding (default).\n"); fprintf(stderr, " -i file Identity for public key authentication " @@ -351,10 +351,14 @@ case 'A': options.forward_agent = 1; break; -#ifdef AFS +#if defined(AFS) && defined(KRB4) case 'k': options.kerberos_tgt_passing = 0; options.afs_token_passing = 0; + break; +#elif defined(KRB5) + case 'k': + options.kerberos_tgt_passing = 0; break; #endif case 'i':...
2006 Feb 10
0
OpenSSH ControlAllowUsers, et al Patch
...Forward; /* Data structure for representing option data. */ -#define MAX_SEND_ENV 256 +#define MAX_SEND_ENV 256 +#define MAX_CONTROL_ALLOW_USERS 256 +#define MAX_CONTROL_DENY_USERS 256 +#define MAX_CONTROL_ALLOW_GROUPS 256 +#define MAX_CONTROL_DENY_GROUPS 256 + typedef struct { int forward_agent; /* Forward authentication agent. */ int forward_x11; /* Forward X11 display. */ @@ -110,8 +115,17 @@ int num_send_env; char *send_env[MAX_SEND_ENV]; + mode_t control_bind_mask; char *control_path; int control_master; + u_int num_control_allow_users; + char *control_allow_u...
2009 Aug 11
10
Git, Capistrano, Passenger, and Apache Questions
First, I''m trying to do the legwork with utilizing all 4 together because many people say it''s a good combination to use. I already have apache setup (was using it with the PHP version of my site formerly). I''ve installed all gems and dependencies that I need on my slice (using slicehost). I have a fully pushed git repository (master) on github (private git) with one
2010 Jan 14
1
ssh(1) multiplexing rewrite
...&data); - /* Request forwarding with authentication spoofing. */ - debug("Requesting X11 forwarding with authentication spoofing."); - x11_request_forwarding_with_spoofing(id, display, proto, data); - /* XXX wait for reply */ - } - - if (cctx->want_agent_fwd && options.forward_agent) { - debug("Requesting authentication agent forwarding."); - channel_request_start(id, "auth-agent-req at openssh.com", 0); - packet_send(); - } + Channel *sc, *c = channel_by_id(cid); - client_session2_setup(id, cctx->want_tty, cctx->want_subsys, - cctx->te...
2013 Oct 07
4
Feature request: FQDN Host match
Hello! I'm hoping that Gmail won't HTML format this mail so that I'll get flamed :) Anyway, my question relates to ssh_config. The problem I find is that the Host pattern is only applied to the argument given on the command line, as outlined in the man page: "The host is the hostname argument given on the command line (i.e. the name is not converted to a canonicalized host name
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly: http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html <quote> The paper concludes that the keystroke timing data observable from today's SSH implementations reveals a dangerously significant amount of information about user terminal sessions--enough to locate typed passwords in the session data stream and reduce the