search for: sshagent

Displaying 15 results from an estimated 15 matches for "sshagent".

2006 Jul 25
2
Shovel/TextDrive error: missing SSHAgent.socket
Hi there When running the initial ''rake remote:exec ACTION=setup_lighty'' command I get this error: ''No such file or directory - /tmp/501/nl.uu.phil.SSHAgent.socket'' Any clues would be appreciated. Richard Sandilands
2001 May 10
2
2.9p1 ssh-add/ssh-askpass first try fails
...y putting the following line at the top of my .xsession file which was copied from /etc/X11/xinit/Xclients: [ -r $HOME/.ssh/id_rsa ] && ssh-add $HOME/.ssh/id_rsa < /dev/null I changed /etc/X11/xdm/Xsession so ssh-agent runs as the root of my session. Here're the relevant lines: sshagent= [ -d $HOME/.ssh ] && sshagent=ssh-agent exec $sshagent gnome-session I also note that, after logging in, executing the 2.9p1 version of "ssh-add < /dev/null" works on the first try. Regards, John -- John Dunlap University of Washington Senior El...
2003 Jun 20
0
[PATCH] Regression test portabilization.
...TDIR)$(mandir)/$(mansubdir)8/sftp-server.8 -rm -f $(DESTDIR)$(mandir)/$(mansubdir)8/ssh-keysign.8 -rm -f $(DESTDIR)$(mandir)/$(mansubdir)1/slogin.1 + +tests: $(TARGETS) + BUILDDIR=`pwd`; \ + TEST_SSH_SSH="$${BUILDDIR}/ssh"; \ + TEST_SSH_SSHD="$${BUILDDIR}/sshd"; \ + TEST_SSH_SSHAGENT="$${BUILDDIR}/ssh-agent"; \ + TEST_SSH_SSHADD="$${BUILDDIR}/ssh-add"; \ + TEST_SSH_SSHKEYGEN="$${BUILDDIR}/ssh-keygen"; \ + TEST_SSH_SSHKEYSCAN="$${BUILDDIR}/ssh-keyscan"; \ + TEST_SSH_SFTP="$${BUILDDIR}/sftp"; \ + TEST_SSH_SFTPSERVER="$${BUILD...
2024 Nov 12
0
[PATCH 1/2] Add test to cover multiple server hostkeys with agent
...[ $? -ne 0 ]; then + fail "Hostkeys-prove error. Unable to proceed" +fi +if [ "$SSH_CONNECTION" != "UNKNOWN 65535 UNKNOWN 65535" ]; then + fail "bad SSH_CONNECTION key type $k" +fi + + +read -p "End (y/n)? " answer + trace "kill agent" ${SSHAGENT} -k > /dev/null -- 2.47.0
2015 Jul 29
2
[PATCH] ssh: Add option to present certificates on command line
...cert in config in protocol $p" + fi +done + +#next, using an agent in combination with the keys +SSH_AUTH_SOCK=/nonexistent ${SSHADD} -l > /dev/null 2>&1 +if [ $? -ne 2 ]; then + fatal "ssh-add -l did not fail with exit code 2" +fi + +trace "start agent" +eval `${SSHAGENT} -s` > /dev/null +r=$? +if [ $r -ne 0 ]; then + fatal "could not start ssh-agent: exit code $r" +fi + +# add private keys to agent +${SSHADD} -k $OBJ/user_key2 > /dev/null 2>&1 +if [ $? -ne 0 ]; then + fatal "ssh-add did not succeed with exit code 0" +fi +${SSHADD}...
2025 Jan 10
2
[PATCH v2] ssh-add: support external parsing of key listing
...th exit code 0" fi verbose "authentication with agent (no restrict)" diff --git a/regress/agent-timeout.sh b/regress/agent-timeout.sh index 6dec09285..1c11c5da6 100644 --- a/regress/agent-timeout.sh +++ b/regress/agent-timeout.sh @@ -28,10 +28,7 @@ else trace "sleeping 2*${SSHAGENT_TIMEOUT} seconds" sleep ${SSHAGENT_TIMEOUT} sleep ${SSHAGENT_TIMEOUT} - ${SSHADD} -l 2> /dev/null | grep 'The agent has no identities.' >/dev/null - if [ $? -ne 0 ]; then - fail "ssh-add -l still returns keys after timeout" - fi + check_keys_absent "after time...
2024 Nov 12
3
[PATCH 0/2] Specify signature algorithm during server hostkeys prove
From: Maxime Rey <maximejeanrey at gmail.com> Hello, I've discovered an issue with sshd when it's configured to use the SSH agent alongside multiple host keys. Specifically, this problem happens during the hostkeys-prove-00 at openssh.com request, when the server attempts to demonstrate ownership of the host keys by calling the agent. The issue occurs because, while processing the
2006 Sep 25
1
[PATCH] implementation of getpeereid() for Solaris
...ed (not supported on this platform)" exit 0 @@ -34,7 +36,7 @@ < /dev/null ${SUDO} -S -u ${UNPRIV} ssh-add -l > /dev/null 2>&1 r=$? - if [ $r -lt 2 ]; then + if [ $r -le 2 ]; then fail "ssh-add did not fail for ${UNPRIV}: $r < 2" fi @@ -42,4 +44,4 @@ ${SSHAGENT} -k > /dev/null fi -rm -f ${OBJ}/agent +rm -f $ASOCK
2002 Jul 22
9
[Patch] Improve portability of regression tests
...============== RCS file: /cvs/openssh/regress/runtests.sh,v retrieving revision 1.1 diff -u -r1.1 runtests.sh --- regress/runtests.sh 1 May 2002 03:17:35 -0000 1.1 +++ regress/runtests.sh 22 Jul 2002 12:33:42 -0000 @@ -1,13 +1,45 @@ #!/bin/sh -TEST_SSH_SSH=../ssh -TEST_SSH_SSHD=../sshd -TEST_SSH_SSHAGENT=../ssh-agent -TEST_SSH_SSHADD=../ssh-add -TEST_SSH_SSHKEYGEN=../ssh-keygen -TEST_SSH_SSHKEYSCAN=../ssh-keyscan -TEST_SSH_SFTP=../sftp -TEST_SSH_SFTPSERVER=../sftp-server +pwd=`pwd` +bindir=`dirname $pwd` +PATH="$bindir:$PATH" +export PATH -pmake +TEST_SSH_TRACE=no # Enable for more deta...
2016 Dec 31
2
Baffling regress/forwarding.sh failure, new in 7.4p1
...mp/user/tree/regress/forwarding.sh + true + unset SSH_AUTH_SOCK + dirname /tmp/autopkgtest-virt-lxc.shared.hhquaatj/downtmp/autopkgtest_tmp/user/tree/regress/forwarding.sh + SRC=/tmp/autopkgtest-virt-lxc.shared.hhquaatj/downtmp/autopkgtest_tmp/user/tree/regress + SSH=ssh + SSHD=sshd + SSHAGENT=ssh-agent + SSHADD=ssh-add + SSHKEYGEN=ssh-keygen + SSHKEYSCAN=ssh-keyscan + SFTP=sftp + SFTPSERVER=/usr/libexec/openssh/sftp-server + SCP=scp + PLINK=plink + PUTTYGEN=puttygen + CONCH=conch + [ x != x ] + [ x != x ] + [ x != x ] + [ x != x ] + [ x != x ] + [ x != x ]...
2020 May 07
6
[Bug 3161] New: ssh -J <public IPv6> <LL IPv6%scopeID> doesn't work as expected
...sh_exchange_identification: Connection closed by remote host Jump host is Fedora 31 with the following SSH Packages installed: sshpass-1.06-8.fc31.x86_64 qemu-block-ssh-4.1.1-1.fc31.x86_64 libssh-0.9.3-1.fc31.x86_64 apache-sshd-2.2.0-2.fc31.noarch libssh-config-0.9.3-1.fc31.noarch jsch-agent-proxy-sshagent-0.0.8-11.fc31.noarch jsch-agent-proxy-trilead-ssh2-0.0.8-11.fc31.noarch openssh-clients-8.1p1-1.fc31.x86_64 libssh2-1.9.0-3.fc31.x86_64 trilead-ssh2-217-13.jenkins8.fc31.noarch openssh-8.1p1-1.fc31.x86_64 openssh-server-8.1p1-1.fc31.x86_64 Target host (and origin host) is iMac running OSX Mojave 1...
2005 Mar 01
7
[Bug 989] openssh-3.9p1 on Solaris 8 - multiplex.sh NOK
...] + /usr/ucb/whoami USER=root OBJ=/opt/SSH/openssh-3.9p1/regress + [ x/opt/SSH/openssh-3.9p1/regress = x ] + [ ! -d /opt/SSH/openssh-3.9p1/regress ] SCRIPT=multiplex.sh + [ xmultiplex.sh = x ] + [ ! -f multiplex.sh ] + /bin/sh -n multiplex.sh + true + unset SSH_AUTH_SOCK SSH=ssh SSHD=sshd SSHAGENT=ssh-agent SSHADD=ssh-add SSHKEYGEN=ssh-keygen SSHKEYSCAN=ssh-keyscan SFTP=sftp SFTPSERVER=/usr/libexec/openssh/sftp-server SCP=scp + [ x != x ] + [ x != x ] + [ x != x ] + [ x != x ] + [ x != x ] + [ x != x ] + [ x != x ] + [ x != x ] + [ x != x ] + which sshd SSHD=/opt/SSH/openssh-3.9p1/...
2025 Jan 10
1
[PATCH v2] ssh-add: support external parsing of key listing
...il with exit code 0" fi verbose "authentication with agent (no restrict)" diff --git a/regress/agent-timeout.sh b/regress/agent-timeout.sh index 6dec09285..1c11c5da6 100644 --- a/regress/agent-timeout.sh +++ b/regress/agent-timeout.sh @@ -28,10 +28,7 @@ else trace "sleeping 2*${SSHAGENT_TIMEOUT} seconds" sleep ${SSHAGENT_TIMEOUT} sleep ${SSHAGENT_TIMEOUT} - ${SSHADD} -l 2> /dev/null | grep 'The agent has no identities.' >/dev/null - if [ $? -ne 0 ]; then - fail "ssh-add -l still returns keys after timeout" - fi + check_keys_absent "after timeout&q...
2020 Jul 21
11
[RFC PATCH 0/4] PAM module for ssh-agent user authentication
...easy. A few things that are missing: - man page - installation - support for multiple keys in the auth file I'm also asking to the Linux PAM people to double-check my usage of PAM. Regards, Domenico [0] https://github.com/jbeverly/pam_ssh_agent_auth [1] https://sourceforge.net/projects/pamsshagentauth/ -- rsa4096: 3B10 0CA1 8674 ACBA B4FE FCD2 CE5B CF17 9960 DE13 ed25519: FFB4 0CC3 7F2E 091D F7DA 356E CC79 2832 ED38 CB05
2025 Jan 09
2
[PATCH] ssh-add: support parser-friendly operation
From: Corey Hickey <chickey at tagged.com> When ssh-add is used in a script like: if ! KEY_LISTING=$(ssh-add -l 2>&1) ; then echo "SSH agent error" >&2 exit 2 fi ...the operation fails when there is an agent but there are no keys in the agent. This is because ssh-add exits with status of 1. If the intent is to examine the keys in the agent,