Displaying 20 results from an estimated 21 matches for "ologlevel".
Did you mean:
loglevel
2024 Apr 25
1
[PATCH] Enable ssh_config to set LogPath option (-E)
...e301e78 100644
--- a/readconf.c
+++ b/readconf.c
@@ -156,7 +156,7 @@ typedef enum {
oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts,
oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression,
oTCPKeepAlive, oNumberOfPasswordPrompts,
- oLogFacility, oLogLevel, oLogVerbose, oCiphers, oMacs,
+ oLogFacility, oLogLevel, oLogPath, oLogVerbose, oCiphers, oMacs,
oPubkeyAuthentication,
oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias,
oDynamicForward, oPreferredAuthentications, oHostbasedAuthentication,
@@ -271,...
2001 Mar 07
1
patch to select pkalg
...===============================================================================
*** ../../openssh-2.5.1p2/readconf.c Wed Feb 14 22:02:00 2001
--- readconf.c Wed Mar 7 00:59:44 2001
***************
*** 109,115 ****
oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts,
oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oMacs,
oGlobalKnownHostsFile2, oUserKnownHostsFile2, oPubkeyAuthentication,
! oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias
} OpCodes;
/* Textual representations of the tokens. */
--- 109,116 ----
oCompressionLevel, oKeepAlives, oNumberOfPa...
2009 Feb 13
2
when to display a banner
i want to be able to suppress the banner from the client side
(ssh/slogin/scp/sftp) but i don't see a way to do it cleanly. for
example, if there were a -B flag that suppressed the banner that would
be alright. i did try -q, but that suppresses all stderr, which is
unacceptable since i do want to see the error output when ssh fails to
know why it failed. another idea would be to have -q
2000 Mar 03
7
[PATCH] Add a Maximum Idle Time (1.2.2)
...er, oHost, oEscapeChar, oRhostsRSAAuthentication, oProxyCommand,
oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts,
oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression,
- oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts, oTISAuthentication,
- oUsePrivilegedPort, oLogLevel
+ oCompressionLevel, oKeepAlives, oTransmitInterlude, oNumberOfPasswordPrompts,
+ oTISAuthentication, oUsePrivilegedPort, oLogLevel
} OpCodes;
/* Textual representations of the tokens. */
@@ -148,6 +149,7 @@
{ "compression", oCompression },
{ "compressionlevel", oCompres...
2001 Oct 11
0
[patch] option to prevent connection timeout
...n, oProxyCommand,
oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts,
oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression,
- oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts,
+ oCompressionLevel, oKeepAlives, oIdle, oNumberOfPasswordPrompts,
oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oMacs,
oGlobalKnownHostsFile2, oUserKnownHostsFile2, oPubkeyAuthentication,
oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias,
@@ -178,6 +178,7 @@
{ "compression", oCompression },
{ "compressionlevel", oCompressionLevel },
{ &qu...
2001 Mar 14
1
[PATCH] Added Null packet keepalive option
...* SSH_MSG_NONE packets to keep
+ * firewall connections from
+ * timing out */
LogLevel log_level; /* Level for logging. */
int port; /* Port to connect. */
--- readconf.c 2001/03/11 01:49:20 1.40
+++ readconf.c 2001/03/14 19:11:15
@@ -110,7 +110,7 @@
oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oMacs,
oGlobalKnownHostsFile2, oUserKnownHostsFile2, oPubkeyAuthentication,
oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias,
- oPreferredAuthentications
+ oPreferredAuthentications,oNoopMsgFrequency
} OpCodes;
/* Textual representations of the toke...
2001 Aug 24
2
[PATCH] SO_KEEPALIVE for port forwards
...and,
oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts,
oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression,
- oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts,
+ oCompressionLevel, oKeepAlives, oKeepAlivesForward, oNumberOfPasswordPrompts,
oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oMacs,
oGlobalKnownHostsFile2, oUserKnownHostsFile2, oPubkeyAuthentication,
oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias,
@@ -172,6 +172,7 @@
{ "compression", oCompression },
{ "compressionlevel", oCompressionLevel },
{ &qu...
2001 Mar 11
0
patch to allow client to select rsa/dss
...t;
/* Format of the configuration file:
***************
*** 107,113 ****
oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts,
oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression,
oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts,
! oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oMacs,
oGlobalKnownHostsFile2, oUserKnownHostsFile2, oPubkeyAuthentication,
oKbdInteractiveAuthentication, oKbdInteractiveDevices, oHostKeyAlias
} OpCodes;
--- 108,114 ----
oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts,
oBatchMode, oCheckHostIP,...
2000 Jun 06
0
connection timeout
...er, oHost, oEscapeChar, oRhostsRSAAuthentication, oProxyCommand,
oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts,
- oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression,
- oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts, oTISAuthentication,
- oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oIdentityFile2,
+ oConnectionTimeout, oBatchMode, oCheckHostIP, oStrictHostKeyChecking,
+ oCompression, oCompressionLevel, oKeepAlives,
+ oNumberOfPasswordPrompts, oTISAuthentication, oUsePrivilegedPort,
+ oLogLevel, oCiphers, oProtocol, oIdentityFile2,
oGlobalKnownHostsFile...
2000 Aug 25
1
[patch] configurable ssh_prng_cmds
...;match.h"
+#include "entropy.h"
#include "xmalloc.h"
#include "compat.h"
@@ -105,7 +106,8 @@
oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression,
oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts, oTISAuthentication,
oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oIdentityFile2,
- oGlobalKnownHostsFile2, oUserKnownHostsFile2, oDSAAuthentication
+ oGlobalKnownHostsFile2, oUserKnownHostsFile2, oDSAAuthentication,
+ oPrngCommandFile
} OpCodes;
/* Textual representations of the tokens. */
@@ -161,6 +163,7 @@
{ "numberofpa...
2000 Feb 04
0
Patch that allows equal sign in options
...39;9')
@@ -434,7 +435,7 @@
case oCipher:
intptr = &options->cipher;
- cp = strtok(NULL, WHITESPACE);
+ cp = strtok(NULL, WHITESPACE_EQ);
value = cipher_number(cp);
if (value == -1)
fatal("%.200s line %d: Bad cipher '%s'.",
@@ -445,7 +446,7 @@
case oLogLevel:
intptr = (int *) &options->log_level;
- cp = strtok(NULL, WHITESPACE);
+ cp = strtok(NULL, WHITESPACE_EQ);
value = log_level_number(cp);
if (value == (LogLevel) - 1)
fatal("%.200s line %d: unsupported log level '%s'\n",
@@ -455,14 +456,14 @@
break;
ca...
2015 Jan 21
18
[Bug 2340] New: Openssh issue: unable to ssh the solaris server from ldap users
https://bugzilla.mindrot.org/show_bug.cgi?id=2340
Bug ID: 2340
Summary: Openssh issue: unable to ssh the solaris server from
ldap users
Product: Portable OpenSSH
Version: 5.8p1
Hardware: Sparc
OS: Solaris
Status: NEW
Severity: critical
Priority: P5
Component: PAM
2023 Apr 08
1
Killing the OpenSSH server doesn't cause the Windows OpenSSH client to die
On 4/7/23 21:46, Damien Miller wrote:
> without debug logs from both the client and server in this situation, it's
> not really possible to say what is going on.
What are the options that I should use to generate logs?
Yuri
2000 Nov 14
1
[PATCH] Added option 'RetryDelay'
...ostsFile, oUserKnownHostsFile, oConnectionAttempts,
+ oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts, oRetryDelay,
oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression,
oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts, oTISAuthentication,
oUsePrivilegedPort, oLogLevel, oCiphers, oProtocol, oIdentityFile2,
@@ -152,6 +152,7 @@
{ "globalknownhostsfile2", oGlobalKnownHostsFile2 },
{ "userknownhostsfile2", oUserKnownHostsFile2 },
{ "connectionattempts", oConnectionAttempts },
+ { "retrydelay", oRetryDelay },
{ "bat...
2007 Oct 07
4
[Bug 1374] New: sshd -D produces zombies if authentication is interrupted
http://bugzilla.mindrot.org/show_bug.cgi?id=1374
Summary: sshd -D produces zombies if authentication is
interrupted
Product: Portable OpenSSH
Version: 4.7p1
Platform: All
OS/Version: FreeBSD
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: bitbucket at
2023 Jul 20
3
Ten second intermittent delay on login
Hi, folks,
We're experiencing an odd ten-second delay intermittently when logging
into any of our Linux boxes which authenticate against LDAP. Here's where
it happens:
Jul 13 11:54:23 console2 sshd[1853]: debug1: temporarily_use_uid: <my
uid\gid> (e=0/0)
Jul 13 11:54:35 console2 sshd[1853]: debug1: trying public key file <my key
file>
My assumption is there's
2007 Apr 10
6
[PATCH 0/6] openssh V_4_6: minor fixes/cleanups
This patch series consists of minor fixes and cleanups I made during
update to openssh V_4_6 branch.
openssh/auth-pam.c | 9 ++++-----
openssh/auth2.c | 2 --
openssh/readconf.c | 7 ++++---
openssh/servconf.c | 14 ++++++++------
openssh/sftp-server.c | 9 ++++++---
openssh/sshd.c | 2 +-
6 files changed, 23 insertions(+), 20 deletions(-)
--
ldv
2001 Sep 26
1
[PATCH] random SSH_MSG_IGNORE packets
...t;, oCompressionLevel },
{ "keepalive", oKeepAlives },
+ { "BogusTrafficIntervalMax", oBogusTrafficIntervalMax },
+ { "BogusTrafficIntervalMin", oBogusTrafficIntervalMin },
{ "numberofpasswordprompts", oNumberOfPasswordPrompts },
{ "loglevel", oLogLevel },
{ "dynamicforward", oDynamicForward },
@@ -394,6 +396,42 @@
intptr = &options->keepalives;
goto parse_flag;
+ case oBogusTrafficIntervalMax:
+ intptr = &options->bogus_traffic_interval_max;
+ arg = strdelim(&s);
+ if (!arg || *arg == '\0')
+ fat...
2010 Feb 27
8
[Bug 1719] New: Debug server prints debug messages on client
https://bugzilla.mindrot.org/show_bug.cgi?id=1719
Summary: Debug server prints debug messages on client
Product: Portable OpenSSH
Version: 5.4p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy:
2002 Dec 30
2
Problem while exiting sftp on SX-6...
...: channel_free: channel 0: server-session, nchannels 1
debug1: Received SIGCHLD.
debug1: session_close: session 0 pid 9679
Closing connection to 204.160.252.25
---------------------------------------------------------------------
Client side (I pressed ^C on client side): -
$ ./sftp -oPort=12020 -oLogLevel=DEBUG3 perl at sx6ihcl
Connecting to sx6ihcl...
debug1: Reading configuration data /usr/local/etc/ssh_config
debug3: Seeing PRNG from /usr/local/libexec/ssh-rand-helper
debug1: Rhosts Authentication disabled, originating port will not be
trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 106...