search for: hash_known_hosts

Displaying 7 results from an estimated 7 matches for "hash_known_hosts".

2003 Mar 04
0
hashing known_hosts
...b diff -u -p openssh-3.4p1/hostfile.c openssh-3.4p1-hash/hostfile.c --- openssh-3.4p1/hostfile.c Thu Dec 20 20:47:09 2001 +++ openssh-3.4p1-hash/hostfile.c Mon Mar 3 17:28:25 2003 @@ -135,8 +135,13 @@ check_host_in_hostfile(const char *filen ; /* Check if the host name matches. */ +#ifdef HASH_KNOWN_HOSTS + if (match_hashed_hostname(host, cp, (u_int) (cp2 - cp)) != 1) + continue; +#else if (match_hostname(host, cp, (u_int) (cp2 - cp)) != 1) continue; +#endif /* Got a match. Skip host name. */ cp = cp2; diff -u -p openssh-3.4p1/match.c openssh-3.4...
2006 Feb 04
2
[PATCH] allow user to update changed key in known_hosts
...o fail; - } - /* - * If not in strict mode, add the key automatically to the - * local known_hosts file. - */ - if (options.check_host_ip && ip_status == HOST_NEW) { - snprintf(hostline, sizeof(hostline), "%s,%s", - host, ip); - hostp = hostline; - if (options.hash_known_hosts) { - /* Add hash of host and IP separately */ - r = add_host_to_hostfile(user_hostfile, host, - host_key, options.hash_known_hosts) && - add_host_to_hostfile(user_hostfile, ip, - host_key, options.hash_known_hosts); - } else { - /* Add unhashed "host,ip&...
2013 Mar 22
1
[PATCH] Allow matching HostName against Host entries
...t_name == 1 && &options->hostname != NULL && + match_pattern(options->hostname, arg))) { if (negated) { debug("%.200s line %d: Skipping Host " "block because of negated match " @@ -970,6 +973,10 @@ intptr = &options->hash_known_hosts; goto parse_flag; + case oMatchHostName: + intptr = &options->match_host_name; + goto parse_flag; + case oTunnel: intptr = &options->tun_open; arg = strdelim(&s); @@ -1207,6 +1214,7 @@ options->control_persist = -1; options->control_persist_timeout = 0;...
2005 Jun 23
0
ControlPersist.
...lPersist }, { "hashknownhosts", oHashKnownHosts }, { NULL, oBadOption } }; @@ -818,6 +819,10 @@ parse_int: *intptr = value; break; + case oControlPersist: + intptr = &options->control_persist; + goto parse_flag; + case oHashKnownHosts: intptr = &options->hash_known_hosts; goto parse_flag; --- openssh/readconf.h~ 2005-06-16 04:19:42.000000000 +0100 +++ openssh/readconf.h 2005-06-23 11:02:01.000000000 +0100 @@ -112,6 +112,7 @@ typedef struct { char *control_path; int control_master; + int control_persist; int hash_known_hosts; } Options; -- dwm...
2006 Feb 10
0
OpenSSH ControlAllowUsers, et al Patch
...oups >= MAX_CONTROL_DENY_GROUPS) + fatal("%s line %d: too many control deny groups.", + filename, linenum); + options->control_deny_groups[options->num_control_deny_groups++] = + xstrdup(arg); + } + break; + case oHashKnownHosts: intptr = &options->hash_known_hosts; goto parse_flag; @@ -963,8 +1020,13 @@ options->server_alive_interval = -1; options->server_alive_count_max = -1; options->num_send_env = 0; + options->control_bind_mask = 0177; options->control_path = NULL; options->control_master = -1; + options->num_control_all...
2009 Jul 08
4
Feature request: "SetupCommand" invoked before connecting
Hi, (I'm not subscribed to the list, so please CC me on reply.) I'd like to request adding a feature to OpenSSH: Task: ~~~~~ It is quite sometime useful to invoke a program prior to connecting to an ssh server. The most common use case will probably be port knocking. That is a small program sends certain packets to a server and the server reacts to this by unlocking the ssh port, which
2005 Jun 12
2
%h,%p,%u expansion for ControlPath
This allows me to set 'ControlPath ~/.ssh/sockets/%h.%p.%u' for example. Have I missed a good reason why ssh_connect finds the default port number for itself instead of just having it in options.port (like we do for the the default in options.user)? --- openssh-4.1p1/ssh.c~ 2005-06-12 09:47:18.000000000 +0100 +++ openssh-4.1p1/ssh.c 2005-06-12 09:40:53.000000000 +0100 @@ -604,6 +604,17