Displaying 9 results from an estimated 9 matches for "rhostsrsa".
2002 Jan 09
0
IRIX 6.5 RhostsRSA problems
...ve been having a very weird problem with the IRIX
version of portable openssh that I think may be a bug in this platform...
I've looked through the FAQs and the man pages and can't find why this might
not be working. The ssh binary is setuid-root, both ssh and sshd are told
that Rhosts and RhostsRSA auth is OK in their config files, etc. I don't want
to post my config files and verbose session transcripts right off, because I
might be missing something obvious and don't want to clog your mailboxes :)
Please let me know what parts of those files will be useful for diagnosing
this and I...
2018 Jul 06
2
Does anyone use UsePrivilegedPort=yes or setuid ssh(1) ?
...however OpenBSD has not shipped it in that
configuration since 2002 (and I suspect these days no vendor does).
As far as I can tell, all of the reasons for this no longer apply:
- setuid root was needed to bind to a privileged (low numbered) ports.
- privileged ports were needed for rhosts and rhostsrsa
authentication. rhosts is long dead, and rhostsrsa went with the last
of Protocol 1.
- root privileges were needed to read the host keys for Protocol 2
hostbased authentication, but that need was replaced by the
ssh-keysign setuid helper program, also in 2002.
So, does anyone use these and if so...
2001 May 02
1
OpenSSH 2.9
...encouragement.
Important Changes:
==================
WARNING: SSH protocol v2 is now the default protocol version
use the 'Protocol' option from ssh(1) and sshd(8) if
you want to change this.
SSH protocol v2 implementation adds support for:
HostbasedAuthentication, similar to RhostsRSA in SSH protocol
v1
Rekeying (negotiate new encryption keys for the current SSH
session, try ~R in interactive SSH sessions)
updated DH group exchange:
draft-ietf-secsh-dh-group-exchange-01.txt
client option HostKeyAlgorithms
server option...
2001 May 02
1
OpenSSH 2.9
...encouragement.
Important Changes:
==================
WARNING: SSH protocol v2 is now the default protocol version
use the 'Protocol' option from ssh(1) and sshd(8) if
you want to change this.
SSH protocol v2 implementation adds support for:
HostbasedAuthentication, similar to RhostsRSA in SSH protocol
v1
Rekeying (negotiate new encryption keys for the current SSH
session, try ~R in interactive SSH sessions)
updated DH group exchange:
draft-ietf-secsh-dh-group-exchange-01.txt
client option HostKeyAlgorithms
server option...
2003 Oct 20
12
[Bug 747] host authentication requires RSA1 keys
http://bugzilla.mindrot.org/show_bug.cgi?id=747
Summary: host authentication requires RSA1 keys
Product: Portable OpenSSH
Version: 3.7.1p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Documentation
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2002 Dec 10
2
[Bug 454] SSH doesn't consider distinguish ports for host-key verification
http://bugzilla.mindrot.org/show_bug.cgi?id=454
------- Additional Comments From markus at openbsd.org 2002-12-10 20:14 -------
hm, i think about adding
ManglePort=yes
to the options. This option will create Hostkeyaliases on
the fly if the port is != 22, and use
'foor.bar.com at portXXX'
as an alias.
------- You are receiving this mail because: -------
You are the assignee for
2000 Jun 21
1
Linux sshd dumps core unless client is insecure.
...-swapping), because the same binary works on
another 2.2.16 machine.
It's not a Slackware problem, since two of the problematic servers are
Debian binaries on Debian servers.
In fact I have run out of ideas, which is why I'm turning to you clever
folks.
The workaround is to use Rhosts or RhostsRSA authentication so that I
don't have to enter my password. But that's a bit nasty and I'd rather
get this figured out for good.
Clients:
========
Kernel 2.2.16, Slackware.
SSH Version OpenSSH-1.2.3, protocol version 1.5.
Compiled with SSL.
...and:
SSH Version OpenSSH_2.1.1, protoc...
2009 Jun 01
2
ssh as root with and without private key
Hi.
I have a client machine using ssh as root via key authorization to a
server. The client uses rsync to send backup data to the server. I
use ForceCommand to allow only this activity when using key
authorization.
But I also want to be able to ssh as root with a required password to
do whatever I like.
So I thought that in addition to root, I'd make a rootback account:
2001 Feb 27
4
AllowHosts / DenyHosts
I'd like to see a feature of the commercial ssh in openssh:
AllowHosts xxx.yyy.xxx.yyy *.domain.net
DenyHosts xxx.yyy.xxx.* name.domain.net
This allows or denies connects from certain machines (including wildcard
matching).
Is there any chance for this feature to be included? No, we don't want to
use tcp-wrapper for this.
Bye.