Displaying 9 results from an estimated 9 matches for "host_new".
Did you mean:
vhost_new
2010 Feb 22
2
ld: Unsatisfied symbol "options" in file ./libssh.a[hostfile.o]
...uot;check_host_in_hostfile: filename %s", filename);
/* Open the file containing the list of known hosts. */
f = fopen(filename, "r");
if (!f)
{
if(options.usesshldaphostkey)
return check_hostkey_in_ldap(host,key,HOST_NEW);
else
return HOST_NEW;
}
.......
So any ideas about this?
Thanks!
Kai Yang
2010 Dec 09
0
[PATCH] mention ssh-keyscan in remote host fingerprint warning
....c 2010-12-09 10:22:02.139864915 -0500
@@ -908,14 +908,17 @@
error("%s. This could either mean that", key_msg);
error("DNS SPOOFING is happening or the IP address for the host");
error("and its host key have changed at the same time.");
- if (ip_status != HOST_NEW)
+ if (ip_status != HOST_NEW) {
error("Offending key for IP in %s:%d", ip_file, ip_line);
+ error(" remove with: ssh-keygen -f \"%s\" -R %d", ip_file, ip_line);
+ }
}
/* The host key has changed. */
warn_changed_key(host_key);
error("Add c...
2003 Mar 04
0
hashing known_hosts
..., host,ip);
+ SHA1(hostline, strlen(hostline), md);
+ uuencode(md, SHA_DIGEST_LENGTH, uu, SHA_DIGEST_LENGTH*2);
+ host_status = check_host_in_hostfile(host_file, uu, host_key,
+ file_key, &host_line);
+ if (host_status == HOST_NEW) {
+ host_file = system_hostfile;
+ host_status = check_host_in_hostfile(host_file, uu,
+ host_key, file_key, &host_line);
+ }
+ } else {
+#endif
host_status = check_host_in_hostfile(host_file, host,...
2006 Feb 04
2
[PATCH] allow user to update changed key in known_hosts
...ng "
- "(yes/no)? ",
- host, ip, msg1, type, fp, msg2);
- xfree(fp);
- if (!confirm(msg))
- goto fail;
- }
- /*
- * If not in strict mode, add the key automatically to the
- * local known_hosts file.
- */
- if (options.check_host_ip && ip_status == HOST_NEW) {
- snprintf(hostline, sizeof(hostline), "%s,%s",
- host, ip);
- hostp = hostline;
- if (options.hash_known_hosts) {
- /* Add hash of host and IP separately */
- r = add_host_to_hostfile(user_hostfile, host,
- host_key, options.hash_known_hosts) &&
-...
2002 Feb 13
0
[Bug 112] New: Using host key fingerprint instead of "yes"
..."Are you sure you want to continue connecting "
"(yes/no)? ", host, ip, type, fp);
- xfree(fp);
- if (!confirm(prompt)) {
+ if (!confirm(prompt, fp)) {
+ xfree(fp);
goto fail;
}
+ xfree(fp);
}
if (options.check_host_ip && ip_status == HOST_NEW) {
snprintf(hostline, sizeof(hostline), "%s,%s", host, ip);
@@ -815,7 +818,7 @@
goto fail;
} else if (options.strict_host_key_checking == 2) {
if (!confirm("Are you sure you want "
- "to continue connecting (yes/no)? ")) {
+ "to continu...
2015 Feb 19
2
Proposal: Allow HostKeyAlias to be used in hostname check against certificate principal.
Howdy --
I have a number of servers with host keys validated by certificates.
These systems are behind a load-balanced frontend, and the
certificates are signed as valid for the DNS name used by that common
frontend address.
This works well for the primary use case of the systems; however, when
wishing to address only a single unit within the pool, the certificate
cannot be used to validate that
2010 Jan 06
12
Dom0 NETTX, NETRX alway are 0
I tried netperf / netserver with Dom0 / DomU, but I could''nt get a correct
NW traffic with xentop. Is there anybody could help me?
At Host1''s Dom0, run netperf -H VMIP
At Host2''s DomU (with VMIP named TTVM), run netserver
At Host1, run xentop this way ->"xentop -n -b -d 1"
At Host2, run xentop this way->"xentop -n -b -d 1"
In Host2''s
2004 Oct 03
0
[patch] tell user about hosts with same key
...e(f);
+ if (thishost != NULL)
+ free(thishost);
+
+ return hostlist;
+}
+
int
lookup_key_in_hostfile_by_type(const char *filename, const char *host,
int keytype, Key *found, int *numret)
--- hostfile.h 2004/10/02 21:45:51 1.1
+++ hostfile.h 2004/10/02 21:56:52
@@ -18,11 +18,18 @@
HOST_OK, HOST_NEW, HOST_CHANGED, HOST_FOUND
} HostStatus;
+typedef struct HostList {
+ char *host;
+ struct HostList *next;
+} HostList;
+
int hostfile_read_key(char **, u_int *, Key *);
HostStatus check_host_in_hostfile(const char *, const char *,
const Key *, Key *, int *);
int add_host_to_hostf...
2024 Oct 14
2
[RFC] Preferentially TOFU certificate authorities rather than host keys
...9,19 +1237,26 @@ check_host_key(char *hostname, const struct ssh_conn_info *cinfo,
* If in "new" or "off" strict mode, add the key automatically
* to the local known_hosts file.
*/
+ if (cert)
+ host_key = cert;
if (options.check_host_ip && ip_status == HOST_NEW) {
snprintf(hostline, sizeof(hostline), "%s,%s", host, ip);
hostp = hostline;
if (options.hash_known_hosts) {
/* Add hash of host and IP separately */
r = add_host_to_hostfile(user_hostfiles[0],
- host, host_key, options.hash_known_hosts) &&
- a...