Displaying 12 results from an estimated 12 matches for "strict_host_key_checking".
2006 Feb 04
2
[PATCH] allow user to update changed key in known_hosts
...king },
+ { "offendingkeyoverride", oOffendingKeyOverride },
{ "compression", oCompression },
{ "compressionlevel", oCompressionLevel },
{ "tcpkeepalive", oTCPKeepAlive },
@@ -434,6 +435,7 @@
case oStrictHostKeyChecking:
intptr = &options->strict_host_key_checking;
+
parse_yesnoask:
arg = strdelim(&s);
if (!arg || *arg == '\0')
@@ -452,6 +454,10 @@
*intptr = value;
break;
+ case oOffendingKeyOverride:
+ intptr = &options->offending_key_override;
+ goto parse_flag;
+
case oCompression:
intptr = &options->c...
2000 Feb 04
0
Patch that allows equal sign in options
...:
- cp = strtok(NULL, WHITESPACE);
+ cp = strtok(NULL, WHITESPACE_EQ);
if (!cp)
fatal("%.200s line %d: Missing yes/no argument.", filename, linenum);
value = 0; /* To avoid compiler warning... */
@@ -330,7 +331,7 @@
case oStrictHostKeyChecking:
intptr = &options->strict_host_key_checking;
- cp = strtok(NULL, WHITESPACE);
+ cp = strtok(NULL, WHITESPACE_EQ);
if (!cp)
fatal("%.200s line %d: Missing yes/no argument.",
filename, linenum);
@@ -364,7 +365,7 @@
goto parse_int;
case oIdentityFile:
- cp = strtok(NULL, WHITESPACE);
+ cp = strtok(NULL, WHI...
2002 Feb 13
0
[Bug 112] New: Using host key fingerprint instead of "yes"
...nfirm(prompt)) {
+ if (!confirm(prompt, fp)) {
+ xfree(fp);
goto fail;
}
+ xfree(fp);
}
if (options.check_host_ip && ip_status == HOST_NEW) {
snprintf(hostline, sizeof(hostline), "%s,%s", host, ip);
@@ -815,7 +818,7 @@
goto fail;
} else if (options.strict_host_key_checking == 2) {
if (!confirm("Are you sure you want "
- "to continue connecting (yes/no)? ")) {
+ "to continue connecting (yes/no)? ", NULL)) {
goto fail;
}
}
------- You are receiving this mail because: -------
You are the assignee for the bug,...
2003 Nov 04
0
ServerLiesWarning
...el },
{ "keepalive", oKeepAlives },
@@ -402,6 +403,10 @@
intptr = &options->verify_host_key_dns;
goto parse_flag;
+ case oServerLiesWarning:
+ intptr = &options->server_lies_warning;
+ goto parse_flag;
+
case oStrictHostKeyChecking:
intptr = &options->strict_host_key_checking;
arg = strdelim(&s);
@@ -856,6 +861,7 @@
options->no_host_authentication_for_localhost = - 1;
options->rekey_limit = - 1;
options->verify_host_key_dns = -1;
+ options->server_lies_warning = -1;
}
/*
@@ -968,6 +974,8 @@
options->rekey_limit = 0;
if (options->v...
2001 Oct 11
0
[patch] option to prevent connection timeout
...},
@@ -415,6 +416,10 @@
intptr = &options->keepalives;
goto parse_flag;
+ case oIdle:
+ intptr = &options->idle;
+ goto parse_int;
+
case oNumberOfPasswordPrompts:
intptr = &options->number_of_password_prompts;
goto parse_int;
@@ -767,6 +772,7 @@
options->strict_host_key_checking = -1;
options->compression = -1;
options->keepalives = -1;
+ options->idle = -1;
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
@@ -859,6 +865,8 @@
options->compression = 0;
if (options->keepalives == -1)
options->...
2001 Mar 14
1
[PATCH] Added Null packet keepalive option
...intptr = &options->keepalives;
goto parse_flag;
+ case oNoopMsgFrequency:
+ intptr = &options->noop_msg_frequency;
+ goto parse_int;
+
case oNumberOfPasswordPrompts:
intptr = &options->number_of_password_prompts;
goto parse_int;
@@ -707,6 +712,7 @@
options->strict_host_key_checking = -1;
options->compression = -1;
options->keepalives = -1;
+ options->noop_msg_frequency = -1;
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
@@ -791,6 +797,8 @@
options->compression = 0;
if (options->keepalives == -1)...
2001 Aug 24
2
[PATCH] SO_KEEPALIVE for port forwards
...ntptr = &options->keepalives;
goto parse_flag;
+ case oKeepAlivesForward:
+ intptr = &options->keepalives_forward;
+ goto parse_flag;
+
case oNumberOfPasswordPrompts:
intptr = &options->number_of_password_prompts;
goto parse_int;
@@ -738,6 +743,7 @@
options->strict_host_key_checking = -1;
options->compression = -1;
options->keepalives = -1;
+ options->keepalives_forward = -1;
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
@@ -825,6 +831,8 @@
options->compression = 0;
if (options->keepalives == -1)...
2004 Oct 03
0
[patch] tell user about hosts with same key
...y won't have time to clean it up this month.
-- kolya
-------------- next part --------------
--- sshconnect.c 2004/10/02 21:27:29 1.1
+++ sshconnect.c 2004/10/02 22:01:52
@@ -716,7 +716,7 @@
"have requested strict checking.", type, host);
goto fail;
} else if (options.strict_host_key_checking == 2) {
- char msg1[1024], msg2[1024];
+ char msg1[1024], msg2[1024], msg_same_key[1024];
if (show_other_keys(host, host_key))
snprintf(msg1, sizeof(msg1),
@@ -724,6 +724,29 @@
" known for this host.");
else
snprintf(msg1, sizeof(msg1), ".");
+
+...
2001 Sep 26
1
[PATCH] random SSH_MSG_IGNORE packets
...tptr = value;
+ if (options->bogus_traffic_interval_max <= value)
+ fatal("%.200s line %d: Bad value.", filename, linenum);
+ break;
+
case oNumberOfPasswordPrompts:
intptr = &options->number_of_password_prompts;
goto parse_int;
@@ -738,6 +776,8 @@
options->strict_host_key_checking = -1;
options->compression = -1;
options->keepalives = -1;
+ options->bogus_traffic_interval_max = -1;
+ options->bogus_traffic_interval_min = -1;
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
@@ -825,6 +865,10 @@
options-&...
2000 Mar 03
7
[PATCH] Add a Maximum Idle Time (1.2.2)
...@@
intptr = &options->keepalives;
goto parse_flag;
+ case oTransmitInterlude:
+ intptr = &options->trans_inter;
+ goto parse_int;
+
case oNumberOfPasswordPrompts:
intptr = &options->number_of_password_prompts;
goto parse_int;
@@ -610,6 +616,7 @@
options->strict_host_key_checking = -1;
options->compression = -1;
options->keepalives = -1;
+ options->trans_inter = -1;
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
@@ -677,6 +684,8 @@
options->compression = 0;
if (options->keepalives == -1)
opti...
2003 Mar 04
0
hashing known_hosts
...parse_flag:
intptr = &options->check_host_ip;
goto parse_flag;
+#ifdef HASH_KNOWN_HOSTS
+ case oHashKnownHosts:
+ intptr = &options->hash_known_hosts;
+ goto parse_flag;
+#endif
+
case oStrictHostKeyChecking:
intptr = &options->strict_host_key_checking;
arg = strdelim(&s);
@@ -793,6 +805,9 @@ initialize_options(Options * options)
options->bind_address = NULL;
options->smartcard_device = NULL;
options->no_host_authentication_for_localhost = - 1;
+#ifdef HASH_KNOWN_HOSTS
+ options->hash_known_hosts = -1;
+#endif
}...
2013 Oct 07
4
Feature request: FQDN Host match
Hello!
I'm hoping that Gmail won't HTML format this mail so that I'll get flamed :)
Anyway, my question relates to ssh_config. The problem I find is that
the Host pattern is only applied to the argument given on the command
line, as outlined in the man page:
"The host is the hostname argument given on the command line (i.e. the
name is not converted to a canonicalized host name