search for: secgov

Displaying 3 results from an estimated 3 matches for "secgov".

Did you mean: secg
2023 Jul 03
1
Subsystem sftp invoked even though forced command created
...1: session_by_channel: session 0 channel 0 > debug1: session_input_channel_req: session 0 req subsystem > debug2: subsystem request for sftp by user m61586 > debug1: subsystem: exec() /usr/libexec/openssh/sftp-server > Starting session: forced-command (key-option) '/opt/app/workload/secgov/opt/sact-central/bin/receive.ksh' for m61586 from 135.99.45.25 port 49734 id 0 Well, I'll be ... Looks like the server side recognizes the forced-command setup, but honors the SFTP subsystem request by exec()ing that nonetheless ... ! Kind regards, -- Jochen Bern Systemingenieur Binec...
2023 Jun 30
1
Subsystem sftp invoked even though forced command created
On 30/06/2023 09:56, Damien Miller wrote: > It's very hard to figure out what is happening here without a debug log. > > You can get one by stopping the listening sshd and running it manually > in debug mode, e.g. "/usr/sbin/sshd -ddd" Or starting one in debug mode on a different port, e.g. "-p99 -ddd"
2023 Jul 05
1
Subsystem sftp invoked even though forced command created
...0 channel 0 > > debug1: session_input_channel_req: session 0 req subsystem > > debug2: subsystem request for sftp by user m61586 > > debug1: subsystem: exec() /usr/libexec/openssh/sftp-server > > Starting session: forced-command (key-option) > > '/opt/app/workload/secgov/opt/sact-central/bin/receive.ksh' for m61586 from > > 135.99.45.25 port 49734 id 0 > > Well, I'll be ... Looks like the server side recognizes the forced-command > setup, but honors the SFTP subsystem request by exec()ing that nonetheless ... no, that's the log message...