search for: strict_host_key_check

Displaying 12 results from an estimated 12 matches for "strict_host_key_check".

2006 Feb 04
2
[PATCH] allow user to update changed key in known_hosts
...king }, + { "offendingkeyoverride", oOffendingKeyOverride }, { "compression", oCompression }, { "compressionlevel", oCompressionLevel }, { "tcpkeepalive", oTCPKeepAlive }, @@ -434,6 +435,7 @@ case oStrictHostKeyChecking: intptr = &options->strict_host_key_checking; + parse_yesnoask: arg = strdelim(&s); if (!arg || *arg == '\0') @@ -452,6 +454,10 @@ *intptr = value; break; + case oOffendingKeyOverride: + intptr = &options->offending_key_override; + goto parse_flag; + case oCompression: intptr = &options-&g...
2000 Feb 04
0
Patch that allows equal sign in options
...: - cp = strtok(NULL, WHITESPACE); + cp = strtok(NULL, WHITESPACE_EQ); if (!cp) fatal("%.200s line %d: Missing yes/no argument.", filename, linenum); value = 0; /* To avoid compiler warning... */ @@ -330,7 +331,7 @@ case oStrictHostKeyChecking: intptr = &options->strict_host_key_checking; - cp = strtok(NULL, WHITESPACE); + cp = strtok(NULL, WHITESPACE_EQ); if (!cp) fatal("%.200s line %d: Missing yes/no argument.", filename, linenum); @@ -364,7 +365,7 @@ goto parse_int; case oIdentityFile: - cp = strtok(NULL, WHITESPACE); + cp = strtok(NULL,...
2002 Feb 13
0
[Bug 112] New: Using host key fingerprint instead of "yes"
...nfirm(prompt)) { + if (!confirm(prompt, fp)) { + xfree(fp); goto fail; } + xfree(fp); } if (options.check_host_ip && ip_status == HOST_NEW) { snprintf(hostline, sizeof(hostline), "%s,%s", host, ip); @@ -815,7 +818,7 @@ goto fail; } else if (options.strict_host_key_checking == 2) { if (!confirm("Are you sure you want " - "to continue connecting (yes/no)? ")) { + "to continue connecting (yes/no)? ", NULL)) { goto fail; } } ------- You are receiving this mail because: ------- You are the assignee for the b...
2003 Nov 04
0
ServerLiesWarning
...el }, { "keepalive", oKeepAlives }, @@ -402,6 +403,10 @@ intptr = &options->verify_host_key_dns; goto parse_flag; + case oServerLiesWarning: + intptr = &options->server_lies_warning; + goto parse_flag; + case oStrictHostKeyChecking: intptr = &options->strict_host_key_checking; arg = strdelim(&s); @@ -856,6 +861,7 @@ options->no_host_authentication_for_localhost = - 1; options->rekey_limit = - 1; options->verify_host_key_dns = -1; + options->server_lies_warning = -1; } /* @@ -968,6 +974,8 @@ options->rekey_limit = 0; if (options-&g...
2001 Oct 11
0
[patch] option to prevent connection timeout
...}, @@ -415,6 +416,10 @@ intptr = &options->keepalives; goto parse_flag; + case oIdle: + intptr = &options->idle; + goto parse_int; + case oNumberOfPasswordPrompts: intptr = &options->number_of_password_prompts; goto parse_int; @@ -767,6 +772,7 @@ options->strict_host_key_checking = -1; options->compression = -1; options->keepalives = -1; + options->idle = -1; options->compression_level = -1; options->port = -1; options->connection_attempts = -1; @@ -859,6 +865,8 @@ options->compression = 0; if (options->keepalives == -1) options-...
2001 Mar 14
1
[PATCH] Added Null packet keepalive option
...intptr = &options->keepalives; goto parse_flag; + case oNoopMsgFrequency: + intptr = &options->noop_msg_frequency; + goto parse_int; + case oNumberOfPasswordPrompts: intptr = &options->number_of_password_prompts; goto parse_int; @@ -707,6 +712,7 @@ options->strict_host_key_checking = -1; options->compression = -1; options->keepalives = -1; + options->noop_msg_frequency = -1; options->compression_level = -1; options->port = -1; options->connection_attempts = -1; @@ -791,6 +797,8 @@ options->compression = 0; if (options->keepalives == -...
2001 Aug 24
2
[PATCH] SO_KEEPALIVE for port forwards
...ntptr = &options->keepalives; goto parse_flag; + case oKeepAlivesForward: + intptr = &options->keepalives_forward; + goto parse_flag; + case oNumberOfPasswordPrompts: intptr = &options->number_of_password_prompts; goto parse_int; @@ -738,6 +743,7 @@ options->strict_host_key_checking = -1; options->compression = -1; options->keepalives = -1; + options->keepalives_forward = -1; options->compression_level = -1; options->port = -1; options->connection_attempts = -1; @@ -825,6 +831,8 @@ options->compression = 0; if (options->keepalives == -...
2004 Oct 03
0
[patch] tell user about hosts with same key
...y won't have time to clean it up this month. -- kolya -------------- next part -------------- --- sshconnect.c 2004/10/02 21:27:29 1.1 +++ sshconnect.c 2004/10/02 22:01:52 @@ -716,7 +716,7 @@ "have requested strict checking.", type, host); goto fail; } else if (options.strict_host_key_checking == 2) { - char msg1[1024], msg2[1024]; + char msg1[1024], msg2[1024], msg_same_key[1024]; if (show_other_keys(host, host_key)) snprintf(msg1, sizeof(msg1), @@ -724,6 +724,29 @@ " known for this host."); else snprintf(msg1, sizeof(msg1), "."); +...
2001 Sep 26
1
[PATCH] random SSH_MSG_IGNORE packets
...tptr = value; + if (options->bogus_traffic_interval_max <= value) + fatal("%.200s line %d: Bad value.", filename, linenum); + break; + case oNumberOfPasswordPrompts: intptr = &options->number_of_password_prompts; goto parse_int; @@ -738,6 +776,8 @@ options->strict_host_key_checking = -1; options->compression = -1; options->keepalives = -1; + options->bogus_traffic_interval_max = -1; + options->bogus_traffic_interval_min = -1; options->compression_level = -1; options->port = -1; options->connection_attempts = -1; @@ -825,6 +865,10 @@ option...
2000 Mar 03
7
[PATCH] Add a Maximum Idle Time (1.2.2)
...@@ intptr = &options->keepalives; goto parse_flag; + case oTransmitInterlude: + intptr = &options->trans_inter; + goto parse_int; + case oNumberOfPasswordPrompts: intptr = &options->number_of_password_prompts; goto parse_int; @@ -610,6 +616,7 @@ options->strict_host_key_checking = -1; options->compression = -1; options->keepalives = -1; + options->trans_inter = -1; options->compression_level = -1; options->port = -1; options->connection_attempts = -1; @@ -677,6 +684,8 @@ options->compression = 0; if (options->keepalives == -1) o...
2003 Mar 04
0
hashing known_hosts
...parse_flag: intptr = &options->check_host_ip; goto parse_flag; +#ifdef HASH_KNOWN_HOSTS + case oHashKnownHosts: + intptr = &options->hash_known_hosts; + goto parse_flag; +#endif + case oStrictHostKeyChecking: intptr = &options->strict_host_key_checking; arg = strdelim(&s); @@ -793,6 +805,9 @@ initialize_options(Options * options) options->bind_address = NULL; options->smartcard_device = NULL; options->no_host_authentication_for_localhost = - 1; +#ifdef HASH_KNOWN_HOSTS + options->hash_known_hosts = -1; +#endif...
2013 Oct 07
4
Feature request: FQDN Host match
Hello! I'm hoping that Gmail won't HTML format this mail so that I'll get flamed :) Anyway, my question relates to ssh_config. The problem I find is that the Host pattern is only applied to the argument given on the command line, as outlined in the man page: "The host is the hostname argument given on the command line (i.e. the name is not converted to a canonicalized host name