Displaying 8 results from an estimated 8 matches for "host_status".
2003 Mar 04
0
hashing known_hosts
...options.check_host_ip = 0;
+
+ snprintf(hostline, sizeof(hostline), "%s,%s", host,ip);
+ SHA1(hostline, strlen(hostline), md);
+ uuencode(md, SHA_DIGEST_LENGTH, uu, SHA_DIGEST_LENGTH*2);
+ host_status = check_host_in_hostfile(host_file, uu, host_key,
+ file_key, &host_line);
+ if (host_status == HOST_NEW) {
+ host_file = system_hostfile;
+ host_status = check_host_in_hostfile(host_file, uu,
+...
2016 Feb 01
1
Advice on virtio, or any virtualization solution for hdparm
...IO, {'S', SG_DXFER_FROM_DEV, cmd[16]=[85, 08, 0e, 00, 00, 00,
01, 00, 00, 00, 00, 00, 00, 40, ec, 00], mx_sb_len=32, iovec_count=0,
dxfer_len=512, timeout=15000, flags=0,
data[512]=["@\0\377?7\310\20\0\0\0\0\0?\0\0\0\0\0\0\0HPAD0409105B"...],
status=00, masked_status=00, sb[0]=[], host_status=0, driver_status=0,
resid=0, duration=184, info=0}) = 0
ioctl(3, HDIO_GET_IDENTITY, 0x7fffda088500) = -1 EINVAL (Invalid argument)
HDIO_GET_IDENTITY failed: Invalid argument
+++ exited with 22 +++
And at the host level:
ioctl(1, SNDCTL_TMR_TIMEBASE or SNDRV_TIMER_IOCTL_NEXT_DEVICE or TCGETS,
0x7...
2001 Nov 06
13
OpenSSH 3.0
OpenSSH 3.0 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
This release contains many portability bug-fixes (listed in the
ChangeLog) as well as several new features (listed below).
We would like to thank the
2007 Sep 07
0
Public key reading abstraction (to allow future work)
...izeof(line)) != 0) {
- xfree(file);
- fclose(f);
- logit("Authentication refused: %s", line);
+ xfree(file);
restore_uid();
return (0);
}
=== modified file 'auth.c'
--- auth.c 2007-07-30 09:54:36 +0000
+++ auth.c 2007-08-02 12:03:02 +0000
@@ -397,79 +397,6 @@
return host_status;
}
-
-/*
- * Check a given file for security. This is defined as all components
- * of the path to the file must be owned by either the owner of
- * of the file or root and no directories must be group or world writable.
- *
- * XXX Should any specific check be done for sym links ?
- *
- * Takes...
2002 Mar 28
1
[PATCH] Feature addition: user access control per auth method
...+ if (!pubkey_allowed_user(authctxt->pw)) {
+ debug2("userauth_pubkey: user not allowed pubkey auth");
+ return 0;
+ }
+
have_sig = packet_get_char();
if (datafellows & SSH_BUG_PKAUTH) {
debug2("userauth_pubkey: SSH_BUG_PKAUTH");
@@ -796,3 +805,24 @@
return (host_status == HOST_OK);
}
+
+
+/*
+ * Check if the user is allowed to log in with public key authentication.
+ */
+static int pubkey_allowed_user(struct passwd *pw)
+{
+ Authaccess access;
+
+ access.num_allow_users = options.num_pkey_allow_users;
+ access.allow_users = options.pkey_allow_users;
+ access.num...
2024 Oct 14
2
[RFC] Preferentially TOFU certificate authorities rather than host keys
...y_write(key, f) == 0))
success = 1;
else
error_fr(r, "sshkey_write");
diff --git a/sshconnect.c b/sshconnect.c
index 7cf6b6386..72bdc7d1f 100644
--- a/sshconnect.c
+++ b/sshconnect.c
@@ -964,7 +964,7 @@ check_host_key(char *hostname, const struct ssh_conn_info *cinfo,
HostStatus host_status = -1, ip_status = -1;
struct sshkey *raw_key = NULL;
char *ip = NULL, *host = NULL;
- char hostline[1000], *hostp, *fp, *ra;
+ char hostline[1000], *hostp, *fp, *cafp, *ra;
char msg[1024];
const char *type, *fail_reason = NULL;
const struct hostkey_entry *host_found = NULL, *ip_found = NU...
2014 Nov 05
17
[Bug 2305] New: sshd does not accept @cert-authority when doing host based authentication.
https://bugzilla.mindrot.org/show_bug.cgi?id=2305
Bug ID: 2305
Summary: sshd does not accept @cert-authority when doing host
based authentication.
Product: Portable OpenSSH
Version: 6.5p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component:
2006 Feb 04
2
[PATCH] allow user to update changed key in known_hosts
...const char* ip, const char* type, HostStatus ip_status,
+ const char *user_hostfile);
/*
* Connect to the given ssh server using a proxy command.
@@ -524,10 +527,9 @@
Key *file_key;
const char *type = key_type(host_key);
char *ip = NULL;
- char hostline[1000], *hostp, *fp;
HostStatus host_status;
HostStatus ip_status;
- int r, local = 0, host_ip_differ = 0;
+ int local = 0, host_ip_differ = 0;
int salen;
char ntop[NI_MAXHOST];
char msg[1024];
@@ -674,71 +676,10 @@
error("No %s host key is known for %.200s and you "
"have requested strict checking.",...