search for: host_new

Displaying 9 results from an estimated 9 matches for "host_new".

Did you mean: vhost_new
2010 Feb 22
2
ld: Unsatisfied symbol "options" in file ./libssh.a[hostfile.o]
...uot;check_host_in_hostfile: filename %s", filename); /* Open the file containing the list of known hosts. */ f = fopen(filename, "r"); if (!f) { if(options.usesshldaphostkey) return check_hostkey_in_ldap(host,key,HOST_NEW); else return HOST_NEW; } ....... So any ideas about this? Thanks! Kai Yang
2010 Dec 09
0
[PATCH] mention ssh-keyscan in remote host fingerprint warning
....c 2010-12-09 10:22:02.139864915 -0500 @@ -908,14 +908,17 @@ error("%s. This could either mean that", key_msg); error("DNS SPOOFING is happening or the IP address for the host"); error("and its host key have changed at the same time."); - if (ip_status != HOST_NEW) + if (ip_status != HOST_NEW) { error("Offending key for IP in %s:%d", ip_file, ip_line); + error(" remove with: ssh-keygen -f \"%s\" -R %d", ip_file, ip_line); + } } /* The host key has changed. */ warn_changed_key(host_key); error("Add c...
2003 Mar 04
0
hashing known_hosts
..., host,ip); + SHA1(hostline, strlen(hostline), md); + uuencode(md, SHA_DIGEST_LENGTH, uu, SHA_DIGEST_LENGTH*2); + host_status = check_host_in_hostfile(host_file, uu, host_key, + file_key, &host_line); + if (host_status == HOST_NEW) { + host_file = system_hostfile; + host_status = check_host_in_hostfile(host_file, uu, + host_key, file_key, &host_line); + } + } else { +#endif host_status = check_host_in_hostfile(host_file, host,...
2006 Feb 04
2
[PATCH] allow user to update changed key in known_hosts
...ng " - "(yes/no)? ", - host, ip, msg1, type, fp, msg2); - xfree(fp); - if (!confirm(msg)) - goto fail; - } - /* - * If not in strict mode, add the key automatically to the - * local known_hosts file. - */ - if (options.check_host_ip && ip_status == HOST_NEW) { - snprintf(hostline, sizeof(hostline), "%s,%s", - host, ip); - hostp = hostline; - if (options.hash_known_hosts) { - /* Add hash of host and IP separately */ - r = add_host_to_hostfile(user_hostfile, host, - host_key, options.hash_known_hosts) && -...
2002 Feb 13
0
[Bug 112] New: Using host key fingerprint instead of "yes"
..."Are you sure you want to continue connecting " "(yes/no)? ", host, ip, type, fp); - xfree(fp); - if (!confirm(prompt)) { + if (!confirm(prompt, fp)) { + xfree(fp); goto fail; } + xfree(fp); } if (options.check_host_ip && ip_status == HOST_NEW) { snprintf(hostline, sizeof(hostline), "%s,%s", host, ip); @@ -815,7 +818,7 @@ goto fail; } else if (options.strict_host_key_checking == 2) { if (!confirm("Are you sure you want " - "to continue connecting (yes/no)? ")) { + "to continu...
2015 Feb 19
2
Proposal: Allow HostKeyAlias to be used in hostname check against certificate principal.
Howdy -- I have a number of servers with host keys validated by certificates. These systems are behind a load-balanced frontend, and the certificates are signed as valid for the DNS name used by that common frontend address. This works well for the primary use case of the systems; however, when wishing to address only a single unit within the pool, the certificate cannot be used to validate that
2010 Jan 06
12
Dom0 NETTX, NETRX alway are 0
I tried netperf / netserver with Dom0 / DomU, but I could''nt get a correct NW traffic with xentop. Is there anybody could help me? At Host1''s Dom0, run netperf -H VMIP At Host2''s DomU (with VMIP named TTVM), run netserver At Host1, run xentop this way ->"xentop -n -b -d 1" At Host2, run xentop this way->"xentop -n -b -d 1" In Host2''s
2004 Oct 03
0
[patch] tell user about hosts with same key
...e(f); + if (thishost != NULL) + free(thishost); + + return hostlist; +} + int lookup_key_in_hostfile_by_type(const char *filename, const char *host, int keytype, Key *found, int *numret) --- hostfile.h 2004/10/02 21:45:51 1.1 +++ hostfile.h 2004/10/02 21:56:52 @@ -18,11 +18,18 @@ HOST_OK, HOST_NEW, HOST_CHANGED, HOST_FOUND } HostStatus; +typedef struct HostList { + char *host; + struct HostList *next; +} HostList; + int hostfile_read_key(char **, u_int *, Key *); HostStatus check_host_in_hostfile(const char *, const char *, const Key *, Key *, int *); int add_host_to_hostf...
2024 Oct 14
2
[RFC] Preferentially TOFU certificate authorities rather than host keys
...9,19 +1237,26 @@ check_host_key(char *hostname, const struct ssh_conn_info *cinfo, * If in "new" or "off" strict mode, add the key automatically * to the local known_hosts file. */ + if (cert) + host_key = cert; if (options.check_host_ip && ip_status == HOST_NEW) { snprintf(hostline, sizeof(hostline), "%s,%s", host, ip); hostp = hostline; if (options.hash_known_hosts) { /* Add hash of host and IP separately */ r = add_host_to_hostfile(user_hostfiles[0], - host, host_key, options.hash_known_hosts) && - a...