search for: ologlevel

Displaying 20 results from an estimated 21 matches for "ologlevel".

Did you mean: loglevel
2024 Apr 25
1
[PATCH] Enable ssh_config to set LogPath option (-E)
...e301e78 100644 --- a/readconf.c +++ b/readconf.c @@ -156,7 +156,7 @@ typedef enum { oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts, oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression, oTCPKeepAlive, oNumberOfPasswordPrompts, - oLogFacility, oLogLevel, oLogVerbose, oCiphers, oMacs, + oLogFacility, oLogLevel, oLogPath, oLogVerbose, oCiphers, oMacs, oPubkeyAuthentication, oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias, oDynamicForward, oPreferredAuthentications, oHostbasedAuthentication, @@ -271,...
2001 Mar 07
1
patch to select pkalg
...=============================================================================== *** ../../openssh-2.5.1p2/readconf.c Wed Feb 14 22:02:00 2001 --- readconf.c Wed Mar 7 00:59:44 2001 *************** *** 109,115 **** oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts, oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oMacs, oGlobalKnownHostsFile2, oUserKnownHostsFile2, oPubkeyAuthentication, ! oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias } OpCodes; /* Textual representations of the tokens. */ --- 109,116 ---- oCompressionLevel, oKeepAlives, oNumberOfPa...
2009 Feb 13
2
when to display a banner
i want to be able to suppress the banner from the client side (ssh/slogin/scp/sftp) but i don't see a way to do it cleanly. for example, if there were a -B flag that suppressed the banner that would be alright. i did try -q, but that suppresses all stderr, which is unacceptable since i do want to see the error output when ssh fails to know why it failed. another idea would be to have -q
2000 Mar 03
7
[PATCH] Add a Maximum Idle Time (1.2.2)
...er, oHost, oEscapeChar, oRhostsRSAAuthentication, oProxyCommand, oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts, oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression, - oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts, oTISAuthentication, - oUsePrivilegedPort, oLogLevel + oCompressionLevel, oKeepAlives, oTransmitInterlude, oNumberOfPasswordPrompts, + oTISAuthentication, oUsePrivilegedPort, oLogLevel } OpCodes; /* Textual representations of the tokens. */ @@ -148,6 +149,7 @@ { "compression", oCompression }, { "compressionlevel", oCompres...
2001 Oct 11
0
[patch] option to prevent connection timeout
...n, oProxyCommand, oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts, oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression, - oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts, + oCompressionLevel, oKeepAlives, oIdle, oNumberOfPasswordPrompts, oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oMacs, oGlobalKnownHostsFile2, oUserKnownHostsFile2, oPubkeyAuthentication, oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias, @@ -178,6 +178,7 @@ { "compression", oCompression }, { "compressionlevel", oCompressionLevel }, { &qu...
2001 Mar 14
1
[PATCH] Added Null packet keepalive option
...* SSH_MSG_NONE packets to keep + * firewall connections from + * timing out */ LogLevel log_level; /* Level for logging. */ int port; /* Port to connect. */ --- readconf.c 2001/03/11 01:49:20 1.40 +++ readconf.c 2001/03/14 19:11:15 @@ -110,7 +110,7 @@ oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oMacs, oGlobalKnownHostsFile2, oUserKnownHostsFile2, oPubkeyAuthentication, oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias, - oPreferredAuthentications + oPreferredAuthentications,oNoopMsgFrequency } OpCodes; /* Textual representations of the toke...
2001 Aug 24
2
[PATCH] SO_KEEPALIVE for port forwards
...and, oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts, oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression, - oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts, + oCompressionLevel, oKeepAlives, oKeepAlivesForward, oNumberOfPasswordPrompts, oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oMacs, oGlobalKnownHostsFile2, oUserKnownHostsFile2, oPubkeyAuthentication, oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias, @@ -172,6 +172,7 @@ { "compression", oCompression }, { "compressionlevel", oCompressionLevel }, { &qu...
2001 Mar 11
0
patch to allow client to select rsa/dss
...t; /* Format of the configuration file: *************** *** 107,113 **** oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts, oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression, oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts, ! oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oMacs, oGlobalKnownHostsFile2, oUserKnownHostsFile2, oPubkeyAuthentication, oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias } OpCodes; --- 108,114 ---- oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts, oBatchMode, oCheckHostIP,...
2000 Jun 06
0
connection timeout
...er, oHost, oEscapeChar, oRhostsRSAAuthentication, oProxyCommand, oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts, - oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression, - oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts, oTISAuthentication, - oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oIdentityFile2, + oConnectionTimeout, oBatchMode, oCheckHostIP, oStrictHostKeyChecking, + oCompression, oCompressionLevel, oKeepAlives, + oNumberOfPasswordPrompts, oTISAuthentication, oUsePrivilegedPort, + oLogLevel, oCiphers, oProtocol, oIdentityFile2, oGlobalKnownHostsFile...
2000 Aug 25
1
[patch] configurable ssh_prng_cmds
...;match.h" +#include "entropy.h" #include "xmalloc.h" #include "compat.h" @@ -105,7 +106,8 @@ oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression, oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts, oTISAuthentication, oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oIdentityFile2, - oGlobalKnownHostsFile2, oUserKnownHostsFile2, oDSAAuthentication + oGlobalKnownHostsFile2, oUserKnownHostsFile2, oDSAAuthentication, + oPrngCommandFile } OpCodes; /* Textual representations of the tokens. */ @@ -161,6 +163,7 @@ { "numberofpa...
2000 Feb 04
0
Patch that allows equal sign in options
...39;9') @@ -434,7 +435,7 @@ case oCipher: intptr = &options->cipher; - cp = strtok(NULL, WHITESPACE); + cp = strtok(NULL, WHITESPACE_EQ); value = cipher_number(cp); if (value == -1) fatal("%.200s line %d: Bad cipher '%s'.", @@ -445,7 +446,7 @@ case oLogLevel: intptr = (int *) &options->log_level; - cp = strtok(NULL, WHITESPACE); + cp = strtok(NULL, WHITESPACE_EQ); value = log_level_number(cp); if (value == (LogLevel) - 1) fatal("%.200s line %d: unsupported log level '%s'\n", @@ -455,14 +456,14 @@ break; ca...
2015 Jan 21
18
[Bug 2340] New: Openssh issue: unable to ssh the solaris server from ldap users
https://bugzilla.mindrot.org/show_bug.cgi?id=2340 Bug ID: 2340 Summary: Openssh issue: unable to ssh the solaris server from ldap users Product: Portable OpenSSH Version: 5.8p1 Hardware: Sparc OS: Solaris Status: NEW Severity: critical Priority: P5 Component: PAM
2023 Apr 08
1
Killing the OpenSSH server doesn't cause the Windows OpenSSH client to die
On 4/7/23 21:46, Damien Miller wrote: > without debug logs from both the client and server in this situation, it's > not really possible to say what is going on. What are the options that I should use to generate logs? Yuri
2000 Nov 14
1
[PATCH] Added option 'RetryDelay'
...ostsFile, oUserKnownHostsFile, oConnectionAttempts, + oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts, oRetryDelay, oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression, oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts, oTISAuthentication, oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oIdentityFile2, @@ -152,6 +152,7 @@ { "globalknownhostsfile2", oGlobalKnownHostsFile2 }, { "userknownhostsfile2", oUserKnownHostsFile2 }, { "connectionattempts", oConnectionAttempts }, + { "retrydelay", oRetryDelay }, { "bat...
2007 Oct 07
4
[Bug 1374] New: sshd -D produces zombies if authentication is interrupted
http://bugzilla.mindrot.org/show_bug.cgi?id=1374 Summary: sshd -D produces zombies if authentication is interrupted Product: Portable OpenSSH Version: 4.7p1 Platform: All OS/Version: FreeBSD Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: bitbucket at
2023 Jul 20
3
Ten second intermittent delay on login
Hi, folks, We're experiencing an odd ten-second delay intermittently when logging into any of our Linux boxes which authenticate against LDAP. Here's where it happens: Jul 13 11:54:23 console2 sshd[1853]: debug1: temporarily_use_uid: <my uid\gid> (e=0/0) Jul 13 11:54:35 console2 sshd[1853]: debug1: trying public key file <my key file> My assumption is there's
2007 Apr 10
6
[PATCH 0/6] openssh V_4_6: minor fixes/cleanups
This patch series consists of minor fixes and cleanups I made during update to openssh V_4_6 branch. openssh/auth-pam.c | 9 ++++----- openssh/auth2.c | 2 -- openssh/readconf.c | 7 ++++--- openssh/servconf.c | 14 ++++++++------ openssh/sftp-server.c | 9 ++++++--- openssh/sshd.c | 2 +- 6 files changed, 23 insertions(+), 20 deletions(-) -- ldv
2001 Sep 26
1
[PATCH] random SSH_MSG_IGNORE packets
...t;, oCompressionLevel }, { "keepalive", oKeepAlives }, + { "BogusTrafficIntervalMax", oBogusTrafficIntervalMax }, + { "BogusTrafficIntervalMin", oBogusTrafficIntervalMin }, { "numberofpasswordprompts", oNumberOfPasswordPrompts }, { "loglevel", oLogLevel }, { "dynamicforward", oDynamicForward }, @@ -394,6 +396,42 @@ intptr = &options->keepalives; goto parse_flag; + case oBogusTrafficIntervalMax: + intptr = &options->bogus_traffic_interval_max; + arg = strdelim(&s); + if (!arg || *arg == '\0') + fat...
2010 Feb 27
8
[Bug 1719] New: Debug server prints debug messages on client
https://bugzilla.mindrot.org/show_bug.cgi?id=1719 Summary: Debug server prints debug messages on client Product: Portable OpenSSH Version: 5.4p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: unassigned-bugs at mindrot.org ReportedBy:
2002 Dec 30
2
Problem while exiting sftp on SX-6...
...: channel_free: channel 0: server-session, nchannels 1 debug1: Received SIGCHLD. debug1: session_close: session 0 pid 9679 Closing connection to 204.160.252.25 --------------------------------------------------------------------- Client side (I pressed ^C on client side): - $ ./sftp -oPort=12020 -oLogLevel=DEBUG3 perl at sx6ihcl Connecting to sx6ihcl... debug1: Reading configuration data /usr/local/etc/ssh_config debug3: Seeing PRNG from /usr/local/libexec/ssh-rand-helper debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: restore_uid debug1: ssh_connect: getuid 106...