search for: number_of_password_prompt

Displaying 20 results from an estimated 23 matches for "number_of_password_prompt".

2000 Nov 14
1
[PATCH] Added option 'RetryDelay'
...&options->retry_delay; + goto parse_int; + case oCipher: intptr = &options->cipher; arg = strdelim(&s); @@ -687,6 +692,7 @@ options->compression_level = -1; options->port = -1; options->connection_attempts = -1; + options->retry_delay = -1; options->number_of_password_prompts = -1; options->cipher = -1; options->ciphers = NULL; @@ -770,6 +776,8 @@ options->port = 0; /* Filled in ssh_connect. */ if (options->connection_attempts == -1) options->connection_attempts = 4; + if (options->retry_delay == -1) + options->retry_delay = 1; if (o...
2000 Jun 06
0
connection timeout
...intptr = &options->connection_timeout; + goto parse_int; case oCipher: intptr = &options->cipher; @@ -669,6 +675,7 @@ options->compression_level = -1; options->port = -1; options->connection_attempts = -1; + options->connection_timeout = -1; options->number_of_password_prompts = -1; options->cipher = -1; options->ciphers = NULL; @@ -746,6 +753,8 @@ options->port = 0; /* Filled in ssh_connect. */ if (options->connection_attempts == -1) options->connection_attempts = 4; + if (options->connection_timeout == -1) + options->connection...
2002 May 22
0
[PATCH] connect() timeout
...ntptr == -1) + *intptr = value; + break; + case oForwardAgent: intptr = &options->forward_agent; parse_flag: @@ -775,6 +790,7 @@ options->compression_level = -1; options->port = -1; options->connection_attempts = -1; + options->connection_timeout = -1; options->number_of_password_prompts = -1; options->cipher = -1; options->ciphers = NULL; --- openssh-3.2.2p1/readconf.h.ORIG Tue Mar 5 02:53:05 2002 +++ openssh-3.2.2p1/readconf.h Tue May 21 15:40:06 2002 @@ -68,6 +68,8 @@ int port; /* Port to connect. */ int connection_attempts; /* Max attempts (seconds) bef...
2002 Jan 26
5
[PATCH] Connect timeout
...>connection_timeout; + goto parse_int; + case oForwardAgent: intptr = &options->forward_agent; parse_flag: @@ -775,6 +782,7 @@ options->compression_level = -1; options->port = -1; options->connection_attempts = -1; + options->connection_timeout = -1; options->number_of_password_prompts = -1; options->cipher = -1; options->ciphers = NULL; --- readconf.h.OK Wed Oct 3 19:39:39 2001 +++ readconf.h Sat Jan 26 21:44:35 2002 @@ -68,6 +68,8 @@ int port; /* Port to connect. */ int connection_attempts; /* Max attempts (seconds) before * giving up */ + int...
2000 Sep 09
0
2.2.0p1 PATCH: ssh/scp/slogin will invoke ssh-askpass
...(SSH_ASKPASS_ENV); + else + askpass = SSH_ASKPASS_DEFAULT; + snprintf(buf, sizeof buf, + "Challenge: \"%s\"; enter response:", challenge); + } else { + fprintf(stderr, "%s\n", challenge); + } xfree(challenge); fflush(stderr); for (i = 0; i < options.number_of_password_prompts; i++) { - if (i != 0) - error("Permission denied, please try again."); - response = read_passphrase("Response: ", 0); + if (!interactive && getenv("DISPLAY")) { + if (i != 0) + response = ssh_askpass(askpass, + "Permission denied, please...
2002 Apr 22
9
Password from open filedescriptor
...more clean solution. diff -bur openssh-3.1p1.org/readconf.c openssh-3.1p1/readconf.c --- openssh-3.1p1.org/readconf.c Tue Feb 5 02:26:35 2002 +++ openssh-3.1p1/readconf.c Mon Apr 22 09:56:31 2002 @@ -776,6 +776,7 @@ options->port = -1; options->connection_attempts = -1; options->number_of_password_prompts = -1; + options->password_from_fd = -1; options->cipher = -1; options->ciphers = NULL; options->macs = NULL; diff -bur openssh-3.1p1.org/readconf.h openssh-3.1p1/readconf.h --- openssh-3.1p1.org/readconf.h Tue Mar 5 02:53:05 2002 +++ openssh-3.1p1/readconf.h Mon Apr 22 10:24:06...
2001 Nov 17
0
[PATCH] Connect timeout
...>connection_timeout; + goto parse_int; + case oForwardAgent: intptr = &options->forward_agent; parse_flag: @@ -775,6 +782,7 @@ options->compression_level = -1; options->port = -1; options->connection_attempts = -1; + options->connection_timeout = -1; options->number_of_password_prompts = -1; options->cipher = -1; options->ciphers = NULL; --- openssh-3.0.1p1/readconf.h.ORIG Sat Nov 17 22:49:09 2001 +++ openssh-3.0.1p1/readconf.h Sat Nov 17 22:49:47 2001 @@ -68,6 +68,8 @@ int port; /* Port to connect. */ int connection_attempts; /* Max attempts (seconds) bef...
2003 Apr 15
0
Connect timeout patch
...tptr == -1) + *intptr = value; + break; + case oForwardAgent: intptr = &options->forward_agent; parse_flag: @@ -770,6 +783,7 @@ options->compression_level = -1; options->port = -1; options->connection_attempts = -1; + options->connection_timeout = -1; options->number_of_password_prompts = -1; options->cipher = -1; options->ciphers = NULL; --- openssh-3.6.1p1/readconf.h.ORIG Tue Apr 15 23:06:30 2003 +++ openssh-3.6.1p1/readconf.h Tue Apr 15 23:08:28 2003 @@ -66,6 +66,8 @@ int port; /* Port to connect. */ int connection_attempts; /* Max attempts (seconds) bef...
2002 Apr 03
1
[PATCH] connect() timeout
...ntptr == -1) + *intptr = value; + break; + case oForwardAgent: intptr = &options->forward_agent; parse_flag: @@ -775,6 +790,7 @@ options->compression_level = -1; options->port = -1; options->connection_attempts = -1; + options->connection_timeout = -1; options->number_of_password_prompts = -1; options->cipher = -1; options->ciphers = NULL; --- openssh-3.1p1/readconf.h.ORIG Tue Mar 5 02:53:05 2002 +++ openssh-3.1p1/readconf.h Wed Apr 3 23:33:48 2002 @@ -68,6 +68,8 @@ int port; /* Port to connect. */ int connection_attempts; /* Max attempts (seconds) before...
2002 Oct 17
0
[PATCH] connect() timeout for OpenSSH-3.5p1
...tptr == -1) + *intptr = value; + break; + case oForwardAgent: intptr = &options->forward_agent; parse_flag: @@ -769,6 +782,7 @@ options->compression_level = -1; options->port = -1; options->connection_attempts = -1; + options->connection_timeout = -1; options->number_of_password_prompts = -1; options->cipher = -1; options->ciphers = NULL; --- openssh-3.5p1/readconf.h.ORIG Sun Jun 9 22:04:03 2002 +++ openssh-3.5p1/readconf.h Wed Oct 16 14:59:12 2002 @@ -66,6 +66,8 @@ int port; /* Port to connect. */ int connection_attempts; /* Max attempts (seconds) before...
1999 Dec 10
2
[David Huggins-Daines <dhd@plcom.on.ca>] Bug#52414: ssh-add uses ssh-askpass, but ssh doesn't
...sphrase = ssh_askpass(SSH_ASKPASS_DEFAULT, buf); + } else + passphrase = read_passphrase(buf, 0); + } else { debug("Will not query passphrase for %.100s in batch mode.", comment); passphrase = xstrdup(""); @@ -921,7 +931,14 @@ for (i = 0; i < options.number_of_password_prompts; i++) { if (i != 0) error("Permission denied, please try again."); - response = read_passphrase("Response: ", 0); + if (use_askpass) { + const char * askpass; + if ((askpass = getenv(SSH_ASKPASS_ENV))) + response = ssh_askpass(askpass, "Response: "); +...
2007 Aug 22
0
Patch to allow checking of v1 keys on remote host.
...packet_disconnect("%s",buf); + } + + if (private == NULL && !options.batch_mode && perm_ok && !options.checkey) { snprintf(buf, sizeof(buf), "Enter passphrase for RSA key '%.100s': ", comment); for (i = 0; i < options.number_of_password_prompts; i++) { --- orig/openssh-4.6p1/ssh.c 2007-01-05 00:30:17.000000000 -0500 +++ openssh-4.6p1/ssh.c 2007-05-10 11:40:06.279706888 -0400 @@ -185,7 +185,7 @@ usage(void) { fprintf(stderr, -"usage: ssh [-1246AaCfgkMNnqsTtVvXxY] [-b bind_address] [-c cipher_spec]\n" +"usage: ssh [-1246...
2001 Oct 11
0
[patch] option to prevent connection timeout
...uot;loglevel", oLogLevel }, { "dynamicforward", oDynamicForward }, @@ -415,6 +416,10 @@ intptr = &options->keepalives; goto parse_flag; + case oIdle: + intptr = &options->idle; + goto parse_int; + case oNumberOfPasswordPrompts: intptr = &options->number_of_password_prompts; goto parse_int; @@ -767,6 +772,7 @@ options->strict_host_key_checking = -1; options->compression = -1; options->keepalives = -1; + options->idle = -1; options->compression_level = -1; options->port = -1; options->connection_attempts = -1; @@ -859,6 +865,8 @@...
2001 Mar 14
1
[PATCH] Added Null packet keepalive option
...frequency", oNoopMsgFrequency }, { NULL, 0 } }; @@ -387,6 +388,10 @@ intptr = &options->keepalives; goto parse_flag; + case oNoopMsgFrequency: + intptr = &options->noop_msg_frequency; + goto parse_int; + case oNumberOfPasswordPrompts: intptr = &options->number_of_password_prompts; goto parse_int; @@ -707,6 +712,7 @@ options->strict_host_key_checking = -1; options->compression = -1; options->keepalives = -1; + options->noop_msg_frequency = -1; options->compression_level = -1; options->port = -1; options->connection_attempts = -1; @@ -791,...
2001 Aug 24
2
[PATCH] SO_KEEPALIVE for port forwards
...l }, { "dynamicforward", oDynamicForward }, @@ -394,6 +395,10 @@ intptr = &options->keepalives; goto parse_flag; + case oKeepAlivesForward: + intptr = &options->keepalives_forward; + goto parse_flag; + case oNumberOfPasswordPrompts: intptr = &options->number_of_password_prompts; goto parse_int; @@ -738,6 +743,7 @@ options->strict_host_key_checking = -1; options->compression = -1; options->keepalives = -1; + options->keepalives_forward = -1; options->compression_level = -1; options->port = -1; options->connection_attempts = -1; @@ -825,...
2001 Sep 26
1
[PATCH] random SSH_MSG_IGNORE packets
...ber.", filename, linenum); + if (*activep && *intptr == -1) + *intptr = value; + if (options->bogus_traffic_interval_max <= value) + fatal("%.200s line %d: Bad value.", filename, linenum); + break; + case oNumberOfPasswordPrompts: intptr = &options->number_of_password_prompts; goto parse_int; @@ -738,6 +776,8 @@ options->strict_host_key_checking = -1; options->compression = -1; options->keepalives = -1; + options->bogus_traffic_interval_max = -1; + options->bogus_traffic_interval_min = -1; options->compression_level = -1; options->port...
2001 Oct 09
1
TISviaPAM patch
Here is a patch that does TIS auth via PAM. It's controlled by a switch in the sshd_config. You'd use it by having a PAM module that sets PAM_PROMPT_ECHO_ON. eg, you could use it with pam_skey or pam_smxs. The patch is against the 2.9.9p2 distribution. I'm not on the list, a reply if this patch is accepted would be great. (But not required, I know some folks have a distaste for
2000 Mar 03
7
[PATCH] Add a Maximum Idle Time (1.2.2)
...;, oTISAuthentication }, { "loglevel", oLogLevel }, @@ -355,6 +357,10 @@ intptr = &options->keepalives; goto parse_flag; + case oTransmitInterlude: + intptr = &options->trans_inter; + goto parse_int; + case oNumberOfPasswordPrompts: intptr = &options->number_of_password_prompts; goto parse_int; @@ -610,6 +616,7 @@ options->strict_host_key_checking = -1; options->compression = -1; options->keepalives = -1; + options->trans_inter = -1; options->compression_level = -1; options->port = -1; options->connection_attempts = -1; @@ -677,6 +684,...
2003 Apr 04
5
Anti-idle in OpenSSH client?
Heya, Most of the windows ssh clients (putty, securecrt) have anti-idle features. They offer either a null packet or protocol no-op or user defined string to be sent over every x seconds. Is this possible or planned with the OpenSSH client? Our draconian firewall admins have started timing out ssh sessions. Yes I'm aware I could hack up a port forwarding dumb traffic process, but was
2020 Oct 06
2
Accessing SSH key path using SSH_ASKPASS and passwordstore
Hello, With the introduction of SSH_ASKPASS_REQUIRE in version 8.4, I've set up a script for SSH_ASKPASS to query my local passwordstore (https://www.passwordstore.org/) vault to retrieve the password for a given key. This works for ssh-add as well as ssh (configured with AddKeysToAgent set to 'yes'). My workflow effectively transforms into entering the password for the GPG key used