Displaying 20 results from an estimated 27 matches for "server_us".
Did you mean:
server_os
2001 Jan 10
0
Login using ssh without password
Hello,
I'm having a problem trying to use ssh to login from my machine with
server_user as hughes to myself with server_user as hughes. I have no
problem using rlogin - no password required.
How do I use ssh to login from my machine as hughes at pnguy to myself with
the same server_user (hughes) (etc. ssh pnguy) without a password
required. My .rhosts, .shosts in /users/hughes/.s...
2002 May 09
1
Bug report: OpenSSH 3.1p1
I believe auth-rhosts.c, function check_rhosts_file(), contains a bug
that shows up when doing host-based authentication where the
client_user name is not the same as the server_user name.
Line 76 reads:
strlcpy(userbuf, server_user, sizeof(userbuf));
I believe it should read:
strlcpy(userbuf, client_user, sizeof(userbuf));
Otherwise later in the function this test will fail:
/* Verify that user name matches. */
if (user[0] == '@') {
if (!innetgr(user + 1, NULL...
2006 May 15
2
[PATCH 10/12 bugfix: openssh-4.3p2: memory leak
...enssh-4.3p2-kylie/sshconnect.c
--- openssh-4.3p2/sshconnect.c 2005-12-13 02:29:03.000000000 -0600
+++ openssh-4.3p2-kylie/sshconnect.c 2006-05-04 10:07:57.000000000 -0500
@@ -937,6 +937,7 @@ ssh_login(Sensitive *sensitive, const ch
} else {
ssh_kex(host, hostaddr);
ssh_userauth1(local_user, server_user, host, sensitive);
+ xfree(local_user);
}
}
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
...nsafe RSA signature "
"scheme; disabling use of RSA keys", remote_version);
- chop(server_version_string);
+ chop(*server_version_stringp);
}
/* defaults to 'no' */
@@ -1406,6 +1404,8 @@ ssh_login(Sensitive *sensitive, const char *orighost,
{
char *host;
char *server_user, *local_user;
+ char *client_version_string = NULL;
+ char *server_version_string = NULL;
local_user = xstrdup(pw->pw_name);
server_user = options.user ? options.user : local_user;
@@ -1415,7 +1415,7 @@ ssh_login(Sensitive *sensitive, const char *orighost,
lowercase(host);
/* Excha...
2002 Jul 19
1
OpenSSH 3.4p1 hostbased auth - howto?
...in/service sshd restart
Here's the client debugging output:
[...]
debug1: authentications that can continue: publickey,password,hostbased
debug1: next auth method to try is hostbased
debug1: Remote: Accepted by .rhosts.
debug1: Remote: Accepted host ohm-master1 ip 192.168.1.1 client_user root
server_user root
debug1: authentications that can continue: publickey,password,hostbased
debug1: Remote: Accepted by .rhosts.
debug1: Remote: Accepted host ohm-master1 ip 192.168.1.1 client_user root
server_user root
debug1: authentications that can continue: publickey,password,hostbased
debug1: userauth_hos...
2002 Jul 16
0
[Bug 356] New: 3.4p1 hostbased authentication between Linux and Solaris
...tbased: chost enfm-pc8.utcc.utoronto.ca.
debug1: ssh_keysign called
debug3: msg_send: type 2
debug3: msg_recv entering
debug2: we sent a hostbased packet, wait for reply
debug1: Remote: Accepted by .rhosts.
debug1: Remote: Accepted host enfm-pc8.utcc.utoronto.ca ip 128.100.102.101
client_user mikep server_user mikep
debug1: authentications that can continue:
publickey,password,keyboard-interactive,hostbased
debug2: userauth_hostbased: chost enfm-pc8.utcc.utoronto.ca.
debug1: ssh_keysign called
debug3: msg_send: type 2
debug3: msg_recv entering
debug2: we sent a hostbased packet, wait for reply
debug1:...
2002 Jun 28
2
ssh_rsa_verify: RSA_verify failed: error:
...ForwardX11 yes
HostbasedAuthentication yes
RhostsRSAAuthentication yes
The relevant part of sshd -ddd output seems to be:
debug3: mm_send_debug: Sending debug: Accepted by .rhosts.
debug3: mm_send_debug: Sending debug: Accepted host bmx.comp.uvic.ca ip
142.104.16.101 client_user klewall server_user klewall
debug3: mm_key_verify entering
debug3: mm_request_send entering: type 22
debug3: monitor_read: checking request 22
ssh_rsa_verify: RSA_verify failed:
error:04077068:lib(4):func(119):reason(104)
debug1: ssh_rsa_verify: signature incorrect
debug3: mm_answer_keyverify: key 2003b5e8 signature...
2010 Nov 28
2
[PATCH] Use canonical hostname for DNS SSHFP lookup
...NS_VERIFY_FOUND) {
@@ -1108,7 +1116,8 @@
*/
void
ssh_login(Sensitive *sensitive, const char *orighost,
- struct sockaddr *hostaddr, struct passwd *pw, int timeout_ms)
+ struct sockaddr *hostaddr, struct passwd *pw, int timeout_ms,
+ const char *canohost)
{
char *host, *cp;
char *server_user, *local_user;
@@ -1131,7 +1140,7 @@
/* key exchange */
/* authenticate user */
if (compat20) {
- ssh_kex2(host, hostaddr);
+ ssh_kex2(host, hostaddr, canohost);
ssh_userauth2(local_user, server_user, host, sensitive);
} else {
ssh_kex(host, hostaddr);
diff -ur openssh/sshconnect.h...
2000 Sep 09
0
2.2.0p1 PATCH: ssh/scp/slogin will invoke ssh-askpass
...n denied, please try again.");
-
+ if (!interactive && getenv("DISPLAY")) {
+ if (getenv(SSH_ASKPASS_ENV))
+ askpass = getenv(SSH_ASKPASS_ENV);
+ else
+ askpass = SSH_ASKPASS_DEFAULT;
+ }
snprintf(prompt, sizeof(prompt), "%.30s@%.40s's password: ",
server_user, host);
- password = read_passphrase(prompt, 0);
+ if (!interactive && getenv("DISPLAY")) {
+ if (attempt != 1)
+ password = ssh_askpass(askpass,
+ "Permission denied, please try again:");
+ else
+ password = ssh_askpass(askpass, prompt);
+ } else {
+ if (...
2002 Apr 22
9
Password from open filedescriptor
...ttempt++ >= 1)
+ return 0;
+
+ password = read_password_from_fd(options.password_from_fd);
+ } else {
if (attempt++ >= options.number_of_password_prompts)
return 0;
@@ -451,6 +458,8 @@
snprintf(prompt, sizeof(prompt), "%.30s@%.128s's password: ",
authctxt->server_user, authctxt->host);
password = read_passphrase(prompt, 0);
+ }
+
packet_start(SSH2_MSG_USERAUTH_REQUEST);
packet_put_cstring(authctxt->server_user);
packet_put_cstring(authctxt->service);
--
/Peter ?strand <astrand at lysator.liu.se>
2002 Oct 16
3
ssh-3.5p1 core dumps on Solaris 2.6
...bols from /software/@sys/usr/lib/libdb-4.0.so...done.
Reading symbols from /usr/platform/SUNW,Ultra-30/lib/libc_psr.so.1...done.
Reading symbols from /usr/lib/nss_files.so.1...done.
Reading symbols from /usr/lib/nss_dns.so.1...done.
#0 0x24210 in ssh_userauth1 (local_user=0xf7b30 "root", server_user=0xf79e0 "root",
host=0xfa790 "pf-i400", sensitive=0xf433c) at sshconnect1.c:1248
1248 if (options.identity_keys[i] != NULL &&
(gdb) where
#0 0x24210 in ssh_userauth1 (local_user=0xf7b30 "root", server_user=0xf79e0 "root&qu...
2002 Nov 23
0
2.2.7 and printer status
...nf
filter_ld_path=/lib:/usr/lib:/usr/X11R6/lib:/usr/local/lib
filter_path=/bin:/usr/bin:/usr/local/bin:/usr/sbin:/usr/local/sbin:/usr
/lib/filters:/usr/X11R6/bin
mail_operator_on_error=root
pr=/usr/bin/pr
printcap_path=/etc/printcap
printer_perms_path=/etc/lpd.perms
server_config_file=/etc/lpd.conf
server_user=lp
user=lp
group=lp
send_data_first@
Relevant Information for printing in lpd.perms:
ACCEPT SERVICE=C SERVER REMOTEUSER=root
ACCEPT SERVICE=C LPC=lpd,status,printcap
REJECT SERVICE=C
ACCEPT SERVICE=M SAMEHOST SAMEUSER
ACCEPT SERVICE=M SERVER REMOTEUSER=root
REJECT SERVICE=M
DEFAULT ACCEPT
Th...
2001 Mar 27
0
openssh stack corruption in arc4random_stir () on OS X
...ipher, using 3des instead.
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug1: Installing crc compensation attack detector.
debug1: Received encrypted confirmation.
Segmentation fault
A backtrace in GDB gives:
#0 0x00006bd4 in ssh_userauth (local_user=0x339d0 "",
server_user=0xbffffc0c "cjm", host=0xe00c0 "sun4", host_key_valid=211808,
own_host_key=0xdff50) at sshconnect1.c:1020
#1 0x000058fc in ssh_login (host_key_valid=0, own_host_key=0xdff50,
orighost=0xbffffc10 "sun4", hostaddr=0x338b0, original_real_uid=917696) at
sshconnect.c:7...
2004 Jun 25
0
SSH_MSG_USERAUTH_PASSWD_CHANGEREQ and 3.1.0 F-SECURE SSH - Pr oces s Software SSH for OpenVMS
...) {
+ lang = packet_get_string(NULL);
+ xfree(lang);
+ }
if (strlen(info) > 0)
logit("%s", info);
xfree(info);
- xfree(lang);
packet_start(SSH2_MSG_USERAUTH_REQUEST);
packet_put_cstring(authctxt->server_user);
packet_put_cstring(authctxt->service);
2002 Jul 18
1
[Bug 342] RhostsRSAAuthentication does not work with 3.4p1
http://bugzilla.mindrot.org/show_bug.cgi?id=342
stevesk at pobox.com changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |INVALID
------- Additional Comments From stevesk at pobox.com 2002-07-18
2001 Oct 02
2
AFS and tokenforwarding
...Fax: ++41 56 310 3649
-------------- next part --------------
--- openssh-2.9.9p2.orig/sshconnect1.c Sat Jul 14 04:17:00 2001
+++ openssh-2.9.9p2/sshconnect1.c Thu Sep 27 09:58:37 2001
@@ -1111,13 +1111,14 @@
ssh_userauth1(const char *local_user, const char *server_user, char *host,
Key **keys, int nkeys)
{
+
#ifdef KRB5
krb5_context context = NULL;
krb5_auth_context auth_context = NULL;
#endif
int i, type;
int payload_len;
-
+
if (supported_authentications == 0)
fatal("ssh_userauth1: server supports no auth methods");
@@ -1139...
2001 Apr 04
1
compiler warnings about format strings
...er user if no user name was given. */
pw = getpwuid(original_real_uid);
if (!pw)
- fatal("User id %u not found from user database.", original_real_uid);
+ fatal("User id %lu not found from user database.", (long)original_real_uid);
local_user = xstrdup(pw->pw_name);
server_user = options.user ? options.user : local_user;
Index: sshd.c
@@ -1053,7 +1053,7 @@
if (pid < 0)
error("fork: %.100s", strerror(errno));
else
- debug("Forked child %d.", pid);
+ debug("Forked child %ld.", (long)pid);
close(startup_p[1]);...
2004 Jun 17
2
SSH_MSG_USERAUTH_PASSWD_CHANGEREQ and 3.1.0 F-SECURE SSH - Proces s Software SSH for OpenVMS
...ang = packet_get_string(NULL);
+ if (!(datafellows & SSH_BUG_PWDCHGREQ)) {
+ lang = packet_get_string(NULL);
+ xfree(lang);
+ }
if (strlen(info) > 0)
logit("%s", info);
xfree(info);
- xfree(lang);
packet_start(SSH2_MSG_USERAUTH_REQUEST);
packet_put_cstring(authctxt->server_user);
packet_put_cstring(authctxt->service);
[1] http://www.ietf.org/internet-drafts/draft-ietf-secsh-userauth-21.txt
2002 Jun 21
1
XP and NT printer driver conflicts
...il_operator_on_error=root
pr=/usr/bin/pr
printcap_path=/usr/local/etc/printcap
# If you distribute your printcap entries through NIS,
# use the following line instead:
#printcap_path=|/usr/lib/yp/match_printcap
printer_perms_path=/usr/local/etc/lpd.perms
server_config_file=/usr/local/etc/lpd.conf
server_user=lp
user=lp
group=lp
# If your printer doesn't print the job remove the "@" from the following
# line. (for example necessary for HP4M with a JetDirect Card)
send_data_first@
<snip>
Here is my printcap file
<snip>
hp2500cp_q
:cm=HP DesignJet 2500 CP
:rm=10.224.2....
2016 Aug 24
3
kex protocol error: type 7 seq xxx error message
...send by the server every time it is sending an
SSH_NEWKEYS packet, hence after every rekeying. I reproduced it on my
system with OpenSSH 7.3p1 and manually rekeying with escape R
http://pastebin.com/Xk0dF0mc
on the client side:
sshconnect2.c:
void
ssh_userauth2(const char *local_user, const char *server_user, char *host,
Sensitive *sensitive)
{
...
ssh_dispatch_set(ssh, SSH2_MSG_EXT_INFO, &input_userauth_ext_info);
ssh_dispatch_set(ssh, SSH2_MSG_SERVICE_ACCEPT,
&input_userauth_service_accept);
ssh_dispatch_run(ssh, DISPATCH_BLOCK, &authctxt.success,
&authct...