Displaying 10 results from an estimated 10 matches for "jakuje".
Did you mean:
jakub
2017 Apr 24
5
PKCS#11 URIs in OpenSSH
...and to work with
ssh-agent. It does not bring any new dependency, provides unit and
regress tests (while fixing agent-pkcs11 regress test).
The code is on github and ready for comments/reviews (some details will
need to be adjusted):
https://github.com/openssh/openssh-portable/compare/master...Jakuje:jjelen-pkcs11
I will fill a bugzilla later. I would be grateful for your ideas,
comments or reviews for this feature.
Other useful parts of RFC, that could be implemented would be a way to
provide a PIN or a PIN source for the token, other ways of providing
module-path (module-name).
Regards,...
2018 Jan 05
11
[Bug 2817] New: Add support for PKCS#11 URIs (RFC 7512)
...sed by other tools working with PKCS#11 devices.
It would be very simple to extend the work to allow specifying various
ways for providing PINs, which is part of the RFC.
The commits are reviewable on github [1] or in the attachment.
[1] https://tools.ietf.org/html/rfc7512
[2] https://github.com/Jakuje/openssh-portable/commits/jjelen-pkcs11
--
You are receiving this mail because:
You are watching the assignee of the bug.
2017 Nov 09
2
RSA Signatures using SHA2 provided by different ssh-agent are not properly verified
...2 extension is used, under the hood there is just SHA1. This is
because the different agents are ignoring the flags passed with the
signature request. This can be simply reproduced with the following
patch, which dumps the actual hash algorithm used in the signature
itself:
https://gist.github.com/Jakuje/b1f7161d89472c4b6a3e2024675b0b46
The issue can be simply reproduced by running ssh-agent from gnome-
keyring (pageant or others should do the same) and connect to the
server with the above patch. In the server log, we can notice the
following messages (where hash_alg=1 is SSH_DIGEST_SHA1):
debug1...
2017 Jan 10
2
Any interest in a patch for setting the syslog facility for the ssh client?
Hello,
I recently made a change to the openssh ssh client code to allow
configuring the client syslog facility to use. I made the change in
openssh-6.6p1. If there is interest I can port the change to the openssh
portable github.
Cheers,
Ethan
2015 Jul 15
0
[Bug 1278] CYGWIN controlMaster connections don't work.
...sting it here to see if upstream is interested in this feature,
otherwise it will have to be maintained as downstream cygwin patch. And
of course, comments, improvements and patches are welcomed.
[1]
https://github.com/OpenSCAP/scap-workbench/issues/14#issuecomment-120105262
[2]
https://github.com/Jakuje/stuff/blob/master/openssh_without_fdpass.patch
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
2017 Apr 07
2
Any interest in a patch for setting the syslog facility for the ssh client?
...ot.org ( Bug 2705 -
https://bugzilla.mindrot.org/show_bug.cgi?id=2705 ).
I have a patch attached to the email that implements this as well. I wasn't
able to find a list of coding standards or contribution guidelines for
OpenSSH, so please correct me if I'm wrong. I'd also like to thank Jakuje
for helping me out with some info on the whitespace standards a few months
ago when I posted this on GitHub.
Cheers,
Ethan
On Mon, Jan 9, 2017 at 5:15 PM, Darren Tucker <dtucker at zip.com.au> wrote:
> On Tue, Jan 10, 2017 at 11:34 AM, Ethan Rahn <ethan.rahn at gmail.com> wrote:...
2020 Feb 24
4
Re-adding PKCS#11 key in ssh-agent produces "agent refused operation" error.
On Sat, 2020-02-22 at 10:50 -0600, Douglas E Engert wrote:
> As a side note, OpenSC is looking at issues with using tokens vs
> separate
> readers and smart cards. The code paths in PKCS#11 differ. Removing a
> card
> from a reader leaves the pkcs#11 slot still available. Removing a
> token (Yubikey)
> removes both the reader and and its builtin smart card. Firefox has a
>
2019 Oct 01
9
Call for testing: OpenSSH 8.1
Hi,
OpenSSH 8.1p1 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This is a bugfix release.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is also available via git using the
instructions at
2015 Sep 15
36
[Bug 2468] New: Option to include external files to sshd_config
https://bugzilla.mindrot.org/show_bug.cgi?id=2468
Bug ID: 2468
Summary: Option to include external files to sshd_config
Product: Portable OpenSSH
Version: 7.1p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs
2020 Jun 09
3
[PATCH v2 0/2] Add openssl engine keys with provider upgrade path
I've architected this in a way that looks future proof at least to the
openssl provider transition. What will happen in openssl 3.0.0 is
that providers become active and will accept keys via URI. The
current file mechanisms will still be available but internally it will
become a file URI. To support the provider interface, openssl will
have to accept keys by URI instead of file and may