Displaying 16 results from an estimated 16 matches for "sshdir".
Did you mean:
dsshdir
2010 Jul 06
2
ssh authorized key problem in AIX
hi guys,
I am having an unusual behaviour in puppet with AIX (client node) while
copying ssh key from puppet-server to client.
here is what i am trying to do;
$username = "xyz"
$group = "system"
$home = "/home"
$sshDir = ".ssh"
$pub_key = "id_rsa.pub.xyz"
1. creating all users virtually in one go
2. realize them all and copy each of their''s .ssh/authorized_keys. The
keys are located on puppetserver with name
"/etc/puppet/modules/userkeys/id_rsa.pub.$username"....
2002 May 31
1
openssh-3.2.3p1: Problem with make install after configure --prefix=
...l-dir=/where/ssl/is
Everything compiled Ok but there was a problem when doing make install, as
ssh-rand-helper was looking in the wrong place for prng_command_file, so
here is a patch for ssh-rand-helper.c. You need to delete a space before
the string.
63c63
< # define SSH_PRNG_COMMAND_FILE SSHDIR "/ssh_prng_cmds"
---
> # define SSH_PRNG_COMMAND_FILE SSHDIR"/ssh_prng_cmds"
Regards
Patrick
2023 Nov 14
1
[PATCH v3 1/2] Permit %L and %l percent escapes in ssh Include
...1,11 +1978,14 @@ parse_pubkey_algos:
goto out;
}
if (!path_absolute(arg) && *arg != '~') {
- xasprintf(&arg2, "%s/%s",
+ xasprintf(&arg_pre, "%s/%s",
(flags & SSHCONF_USERCONF) ?
"~/" _PATH_SSH_USER_DIR : SSHDIR, arg);
} else
- arg2 = xstrdup(arg);
+ arg_pre = xstrdup(arg);
+ arg2 = percent_expand(arg_pre,
+ "l", thishost, "L", shorthost, (char *) NULL);
+ free(arg_pre);
memset(&gl, 0, sizeof(gl));
r = glob(arg2, GLOB_TILDE, NULL, &gl);
if (r == GLO...
2023 Dec 20
2
[PATCH RESEND 0/2] Permit %L and %l percent escapes in Include
Using these escapes, the include directive can be crafted to include
differing, host-specific configuration.
Ronan Pigott (2):
Permit %L and %l percent escapes in ssh Include
Permit %L and %l percent escapes in sshd Include
readconf.c | 16 +++++++++++++---
servconf.c | 17 ++++++++++++++---
2 files changed, 27 insertions(+), 6 deletions(-)
base-commit:
2024 Jul 01
2
[PATCH RESEND 0/2] Permit %L and %L percent escapes in Include
Using these escapes, the include directive can be crafted to include
differing, host-specific configuration.
Ronan Pigott (2):
Permit %L and %l percent escapes in Include
Permit %L and %l percent escapes in server Include
readconf.c | 16 +++++++++++++---
servconf.c | 21 ++++++++++++++++-----
2 files changed, 29 insertions(+), 8 deletions(-)
base-commit:
2009 Jun 30
9
[Bug 1614] New: ssh-copy-id doesn't seem to set correct selinux permissions
https://bugzilla.mindrot.org/show_bug.cgi?id=1614
Summary: ssh-copy-id doesn't seem to set correct selinux
permissions
Product: Portable OpenSSH
Version: 5.2p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Miscellaneous
AssignedTo:
2023 Nov 14
0
[PATCH v3 2/2] Permit %L and %l percent escapes in sshd Include
...rgv_next(&ac, &av)) != NULL) {
if (*arg2 == '\0') {
@@ -2140,9 +2147,13 @@ process_server_config_line_depth(ServerOptions *options, char *line,
value++;
found = 0;
if (*arg2 != '/' && *arg2 != '~') {
- xasprintf(&arg, "%s/%s", SSHDIR, arg2);
+ xasprintf(&arg_pre, "%s/%s", SSHDIR, arg2);
} else
- arg = xstrdup(arg2);
+ arg_pre = xstrdup(arg2);
+
+ arg = percent_expand(arg_pre,
+ "l", thishost, "L", shorthost, (char *) NULL);
+ free(arg_pre);
/*
* Don't let inc...
2024 Jul 01
0
[PATCH RESEND 2/2] Permit %L and %l percent escapes in server Include
...rgv_next(&ac, &av)) != NULL) {
if (*arg2 == '\0') {
@@ -2240,9 +2247,13 @@ process_server_config_line_depth(ServerOptions *options, char *line,
value++;
found = 0;
if (*arg2 != '/' && *arg2 != '~') {
- xasprintf(&arg, "%s/%s", SSHDIR, arg2);
+ xasprintf(&arg_pre, "%s/%s", SSHDIR, arg2);
} else
- arg = xstrdup(arg2);
+ arg_pre = xstrdup(arg2);
+
+ arg = percent_expand(arg_pre,
+ "l", thishost, "L", shorthost, (char *) NULL);
+ free(arg_pre);
/*
* Don't let inc...
2024 Jul 01
1
[PATCH RESEND 1/2] Permit %L and %l percent escapes in Include
...3,11 +2010,14 @@ parse_pubkey_algos:
goto out;
}
if (!path_absolute(arg) && *arg != '~') {
- xasprintf(&arg2, "%s/%s",
+ xasprintf(&arg_pre, "%s/%s",
(flags & SSHCONF_USERCONF) ?
"~/" _PATH_SSH_USER_DIR : SSHDIR, arg);
} else
- arg2 = xstrdup(arg);
+ arg_pre = xstrdup(arg);
+ arg2 = percent_expand(arg_pre,
+ "l", thishost, "L", shorthost, (char *) NULL);
+ free(arg_pre);
memset(&gl, 0, sizeof(gl));
r = glob(arg2, GLOB_TILDE, NULL, &gl);
if (r == GLO...
2013 Nov 14
5
Nested parametrized defines
...sted parametrized defines would be forbidden, hence I expected the following code to work:
add_to_ssh_authorized_keys.pp:
--------
define a::ssh_keys::add_to_ssh_authorized_keys($homebasedir="/home", $targetuser="root", $keyowner, $keyownername, $state="present" ) {
$sshdir = "$homebasedir/$targetuser/.ssh"
$authfile = "$sshdir/authorized_keys"
ssh_authorized_key {"$keyowner@censhare.de($keyownername 4096) as $targetuser":
key => template("ssh_public_keys/$keyowner"),
ensure => "$state",
name...
2010 Sep 24
2
grep contents of file on remote server
...uethundr at lbsd8-2.summitnjhome.com==: No such file or directory
grep: root at bt-laptop: No such file or directory
[/code]
Ultimately, what I would like to do is script this in order to
automate this process:
[code]
#!/bin/sh
HOSTS="sum1 sum2 virt1 virt2 virt3 virt4 virt5 virt6 virt7"
SSHDIR=~/.ssh
RSYNC=/usr/local/bin/rsync
KEYFILE=/home/bluethundr/.ssh/id_rsa.pub
CAT='/bin/cat'
GREP='/bin/grep'
for h in $HOSTS ; do
scp $KEYFILE root@$h:~/
if [ $? = 0 ]; then
echo ; echo ; echo
echo "KEY TRANSFERRED TO $h"
else
echo "KEY Transfer To $h has...
2023 Nov 13
2
[PATCH v2] Permit %L and %l percent escapes in Include
...1,11 +1978,14 @@ parse_pubkey_algos:
goto out;
}
if (!path_absolute(arg) && *arg != '~') {
- xasprintf(&arg2, "%s/%s",
+ xasprintf(&arg_pre, "%s/%s",
(flags & SSHCONF_USERCONF) ?
"~/" _PATH_SSH_USER_DIR : SSHDIR, arg);
} else
- arg2 = xstrdup(arg);
+ arg_pre = xstrdup(arg);
+ arg2 = percent_expand(arg_pre,
+ "l", thishost, "L", shorthost, (char *) NULL);
+ free(arg_pre);
memset(&gl, 0, sizeof(gl));
r = glob(arg2, GLOB_TILDE, NULL, &gl);
if (r == GLO...
2024 Jul 01
1
[PATCH RESEND 1/2] Permit %L and %l percent escapes in Include
...y_algos:
> goto out;
> }
> if (!path_absolute(arg) && *arg != '~') {
>- xasprintf(&arg2, "%s/%s",
>+ xasprintf(&arg_pre, "%s/%s",
> (flags & SSHCONF_USERCONF) ?
> "~/" _PATH_SSH_USER_DIR : SSHDIR, arg);
> } else
>- arg2 = xstrdup(arg);
>+ arg_pre = xstrdup(arg);
>+ arg2 = percent_expand(arg_pre,
>+ "l", thishost, "L", shorthost, (char
*) NULL);
>+ free(arg_pre);
> memset(&gl, 0, sizeof(gl));
> r = glob(arg2, GLOB_TILDE,...
2014 Jun 27
1
Using AuthorizedKeysCommand in unprivileged sshd mode
Hi,
I have a setup in which I run sshd as unprivileged user at dedicated port
to serve specific application.
It is working perfectly!
One tweak I had to do, since the AuthorizedKeysCommand feature requires
file to be owned by root, I had to use root owned command at root owned
directory, although it does not add a security value.
At auth2-pubkey.c::user_key_command_allowed2(), we have the
2013 Jun 09
7
[Bug 2119] New: SSHFP with DNSSEC – no trust anchors given, validation always fails
https://bugzilla.mindrot.org/show_bug.cgi?id=2119
Bug ID: 2119
Summary: SSHFP with DNSSEC ? no trust anchors given, validation
always fails
Product: Portable OpenSSH
Version: 6.2p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component:
2006 Nov 15
11
OpenSSH Certkey (PKI)
...f -u -r1.16 pathnames.h
--- pathnames.h 25 Mar 2006 22:22:43 -0000 1.16
+++ pathnames.h 15 Nov 2006 14:14:35 -0000
@@ -36,6 +36,7 @@
#define _PATH_DH_MODULI ETCDIR "/moduli"
/* Backwards compatibility */
#define _PATH_DH_PRIMES ETCDIR "/primes"
+#define _PATH_CA_KEY_FILE SSHDIR "/ca.pub"
#define _PATH_SSH_PROGRAM "/usr/bin/ssh"
Index: readconf.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/readconf.c,v
retrieving revision 1.159
diff -u -r1.159 readconf.c
--- readconf.c 3 Aug 2006 03:34:42 -000...