Displaying 15 results from an estimated 15 matches for "sshagent".
2006 Jul 25
2
Shovel/TextDrive error: missing SSHAgent.socket
Hi there
When running the initial ''rake remote:exec ACTION=setup_lighty''
command I get this error:
''No such file or directory - /tmp/501/nl.uu.phil.SSHAgent.socket''
Any clues would be appreciated.
Richard Sandilands
2001 May 10
2
2.9p1 ssh-add/ssh-askpass first try fails
...y putting the
following line at the top of my .xsession file which was copied from
/etc/X11/xinit/Xclients:
[ -r $HOME/.ssh/id_rsa ] && ssh-add $HOME/.ssh/id_rsa < /dev/null
I changed /etc/X11/xdm/Xsession so ssh-agent runs as the root of
my session. Here're the relevant lines:
sshagent=
[ -d $HOME/.ssh ] && sshagent=ssh-agent
exec $sshagent gnome-session
I also note that, after logging in, executing the 2.9p1 version of
"ssh-add < /dev/null" works on the first try.
Regards,
John
--
John Dunlap University of Washington
Senior El...
2003 Jun 20
0
[PATCH] Regression test portabilization.
...TDIR)$(mandir)/$(mansubdir)8/sftp-server.8
-rm -f $(DESTDIR)$(mandir)/$(mansubdir)8/ssh-keysign.8
-rm -f $(DESTDIR)$(mandir)/$(mansubdir)1/slogin.1
+
+tests: $(TARGETS)
+ BUILDDIR=`pwd`; \
+ TEST_SSH_SSH="$${BUILDDIR}/ssh"; \
+ TEST_SSH_SSHD="$${BUILDDIR}/sshd"; \
+ TEST_SSH_SSHAGENT="$${BUILDDIR}/ssh-agent"; \
+ TEST_SSH_SSHADD="$${BUILDDIR}/ssh-add"; \
+ TEST_SSH_SSHKEYGEN="$${BUILDDIR}/ssh-keygen"; \
+ TEST_SSH_SSHKEYSCAN="$${BUILDDIR}/ssh-keyscan"; \
+ TEST_SSH_SFTP="$${BUILDDIR}/sftp"; \
+ TEST_SSH_SFTPSERVER="$${BUILD...
2024 Nov 12
0
[PATCH 1/2] Add test to cover multiple server hostkeys with agent
...[ $? -ne 0 ]; then
+ fail "Hostkeys-prove error. Unable to proceed"
+fi
+if [ "$SSH_CONNECTION" != "UNKNOWN 65535 UNKNOWN 65535" ]; then
+ fail "bad SSH_CONNECTION key type $k"
+fi
+
+
+read -p "End (y/n)? " answer
+
trace "kill agent"
${SSHAGENT} -k > /dev/null
--
2.47.0
2015 Jul 29
2
[PATCH] ssh: Add option to present certificates on command line
...cert in config in protocol $p"
+ fi
+done
+
+#next, using an agent in combination with the keys
+SSH_AUTH_SOCK=/nonexistent ${SSHADD} -l > /dev/null 2>&1
+if [ $? -ne 2 ]; then
+ fatal "ssh-add -l did not fail with exit code 2"
+fi
+
+trace "start agent"
+eval `${SSHAGENT} -s` > /dev/null
+r=$?
+if [ $r -ne 0 ]; then
+ fatal "could not start ssh-agent: exit code $r"
+fi
+
+# add private keys to agent
+${SSHADD} -k $OBJ/user_key2 > /dev/null 2>&1
+if [ $? -ne 0 ]; then
+ fatal "ssh-add did not succeed with exit code 0"
+fi
+${SSHADD}...
2025 Jan 10
2
[PATCH v2] ssh-add: support external parsing of key listing
...th exit code 0"
fi
verbose "authentication with agent (no restrict)"
diff --git a/regress/agent-timeout.sh b/regress/agent-timeout.sh
index 6dec09285..1c11c5da6 100644
--- a/regress/agent-timeout.sh
+++ b/regress/agent-timeout.sh
@@ -28,10 +28,7 @@ else
trace "sleeping 2*${SSHAGENT_TIMEOUT} seconds"
sleep ${SSHAGENT_TIMEOUT}
sleep ${SSHAGENT_TIMEOUT}
- ${SSHADD} -l 2> /dev/null | grep 'The agent has no identities.' >/dev/null
- if [ $? -ne 0 ]; then
- fail "ssh-add -l still returns keys after timeout"
- fi
+ check_keys_absent "after time...
2024 Nov 12
3
[PATCH 0/2] Specify signature algorithm during server hostkeys prove
From: Maxime Rey <maximejeanrey at gmail.com>
Hello,
I've discovered an issue with sshd when it's configured to use the SSH agent
alongside multiple host keys. Specifically, this problem happens during the
hostkeys-prove-00 at openssh.com request, when the server attempts to
demonstrate ownership of the host keys by calling the agent.
The issue occurs because, while processing the
2006 Sep 25
1
[PATCH] implementation of getpeereid() for Solaris
...ed (not supported on this platform)"
exit 0
@@ -34,7 +36,7 @@
< /dev/null ${SUDO} -S -u ${UNPRIV} ssh-add -l > /dev/null 2>&1
r=$?
- if [ $r -lt 2 ]; then
+ if [ $r -le 2 ]; then
fail "ssh-add did not fail for ${UNPRIV}: $r < 2"
fi
@@ -42,4 +44,4 @@
${SSHAGENT} -k > /dev/null
fi
-rm -f ${OBJ}/agent
+rm -f $ASOCK
2002 Jul 22
9
[Patch] Improve portability of regression tests
...==============
RCS file: /cvs/openssh/regress/runtests.sh,v
retrieving revision 1.1
diff -u -r1.1 runtests.sh
--- regress/runtests.sh 1 May 2002 03:17:35 -0000 1.1
+++ regress/runtests.sh 22 Jul 2002 12:33:42 -0000
@@ -1,13 +1,45 @@
#!/bin/sh
-TEST_SSH_SSH=../ssh
-TEST_SSH_SSHD=../sshd
-TEST_SSH_SSHAGENT=../ssh-agent
-TEST_SSH_SSHADD=../ssh-add
-TEST_SSH_SSHKEYGEN=../ssh-keygen
-TEST_SSH_SSHKEYSCAN=../ssh-keyscan
-TEST_SSH_SFTP=../sftp
-TEST_SSH_SFTPSERVER=../sftp-server
+pwd=`pwd`
+bindir=`dirname $pwd`
+PATH="$bindir:$PATH"
+export PATH
-pmake
+TEST_SSH_TRACE=no # Enable for more deta...
2016 Dec 31
2
Baffling regress/forwarding.sh failure, new in 7.4p1
...mp/user/tree/regress/forwarding.sh
+ true
+ unset SSH_AUTH_SOCK
+ dirname /tmp/autopkgtest-virt-lxc.shared.hhquaatj/downtmp/autopkgtest_tmp/user/tree/regress/forwarding.sh
+ SRC=/tmp/autopkgtest-virt-lxc.shared.hhquaatj/downtmp/autopkgtest_tmp/user/tree/regress
+ SSH=ssh
+ SSHD=sshd
+ SSHAGENT=ssh-agent
+ SSHADD=ssh-add
+ SSHKEYGEN=ssh-keygen
+ SSHKEYSCAN=ssh-keyscan
+ SFTP=sftp
+ SFTPSERVER=/usr/libexec/openssh/sftp-server
+ SCP=scp
+ PLINK=plink
+ PUTTYGEN=puttygen
+ CONCH=conch
+ [ x != x ]
+ [ x != x ]
+ [ x != x ]
+ [ x != x ]
+ [ x != x ]
+ [ x != x ]...
2020 May 07
6
[Bug 3161] New: ssh -J <public IPv6> <LL IPv6%scopeID> doesn't work as expected
...sh_exchange_identification: Connection closed by remote host
Jump host is Fedora 31 with the following SSH Packages installed:
sshpass-1.06-8.fc31.x86_64
qemu-block-ssh-4.1.1-1.fc31.x86_64
libssh-0.9.3-1.fc31.x86_64
apache-sshd-2.2.0-2.fc31.noarch
libssh-config-0.9.3-1.fc31.noarch
jsch-agent-proxy-sshagent-0.0.8-11.fc31.noarch
jsch-agent-proxy-trilead-ssh2-0.0.8-11.fc31.noarch
openssh-clients-8.1p1-1.fc31.x86_64
libssh2-1.9.0-3.fc31.x86_64
trilead-ssh2-217-13.jenkins8.fc31.noarch
openssh-8.1p1-1.fc31.x86_64
openssh-server-8.1p1-1.fc31.x86_64
Target host (and origin host) is iMac running OSX Mojave 1...
2005 Mar 01
7
[Bug 989] openssh-3.9p1 on Solaris 8 - multiplex.sh NOK
...]
+ /usr/ucb/whoami
USER=root
OBJ=/opt/SSH/openssh-3.9p1/regress
+ [ x/opt/SSH/openssh-3.9p1/regress = x ]
+ [ ! -d /opt/SSH/openssh-3.9p1/regress ]
SCRIPT=multiplex.sh
+ [ xmultiplex.sh = x ]
+ [ ! -f multiplex.sh ]
+ /bin/sh -n multiplex.sh
+ true
+ unset SSH_AUTH_SOCK
SSH=ssh
SSHD=sshd
SSHAGENT=ssh-agent
SSHADD=ssh-add
SSHKEYGEN=ssh-keygen
SSHKEYSCAN=ssh-keyscan
SFTP=sftp
SFTPSERVER=/usr/libexec/openssh/sftp-server
SCP=scp
+ [ x != x ]
+ [ x != x ]
+ [ x != x ]
+ [ x != x ]
+ [ x != x ]
+ [ x != x ]
+ [ x != x ]
+ [ x != x ]
+ [ x != x ]
+ which sshd
SSHD=/opt/SSH/openssh-3.9p1/...
2025 Jan 10
1
[PATCH v2] ssh-add: support external parsing of key listing
...il with exit code 0"
fi
verbose "authentication with agent (no restrict)"
diff --git a/regress/agent-timeout.sh b/regress/agent-timeout.sh
index 6dec09285..1c11c5da6 100644
--- a/regress/agent-timeout.sh
+++ b/regress/agent-timeout.sh
@@ -28,10 +28,7 @@ else
trace "sleeping 2*${SSHAGENT_TIMEOUT} seconds"
sleep ${SSHAGENT_TIMEOUT}
sleep ${SSHAGENT_TIMEOUT}
- ${SSHADD} -l 2> /dev/null | grep 'The agent has no identities.' >/dev/null
- if [ $? -ne 0 ]; then
- fail "ssh-add -l still returns keys after timeout"
- fi
+ check_keys_absent "after timeout&q...
2020 Jul 21
11
[RFC PATCH 0/4] PAM module for ssh-agent user authentication
...easy.
A few things that are missing:
- man page
- installation
- support for multiple keys in the auth file
I'm also asking to the Linux PAM people to double-check my usage of PAM.
Regards,
Domenico
[0] https://github.com/jbeverly/pam_ssh_agent_auth
[1] https://sourceforge.net/projects/pamsshagentauth/
--
rsa4096: 3B10 0CA1 8674 ACBA B4FE FCD2 CE5B CF17 9960 DE13
ed25519: FFB4 0CC3 7F2E 091D F7DA 356E CC79 2832 ED38 CB05
2025 Jan 09
2
[PATCH] ssh-add: support parser-friendly operation
From: Corey Hickey <chickey at tagged.com>
When ssh-add is used in a script like:
if ! KEY_LISTING=$(ssh-add -l 2>&1) ; then
echo "SSH agent error" >&2
exit 2
fi
...the operation fails when there is an agent but there are no keys in
the agent. This is because ssh-add exits with status of 1. If the
intent is to examine the keys in the agent,