search for: useprivilegedport

Displaying 20 results from an estimated 39 matches for "useprivilegedport".

2018 Jul 06
2
Does anyone use UsePrivilegedPort=yes or setuid ssh(1) ?
Hi. Does anyone use UsePrivilegedPort or have ssh(1) setuid, and if so for what use case? ssh(1) has had code in it to support installing setuid root since approximately forever, however OpenBSD has not shipped it in that configuration since 2002 (and I suspect these days no vendor does). As far as I can tell, all of the reasons for...
2018 Jul 06
2
Does anyone use UsePrivilegedPort=yes or setuid ssh(1) ?
On 6 July 2018 at 17:24, Gert Doering <gert at greenie.muc.de>wrote: [...] > I think we have one customer connection where their firewall admin > thinks "it is more secure that way" - read, we can't ssh in if we come > from high ports. > > OTOH, thanks for the pointer with ProxyCommand - it's a very specific > niche problem with a viable workaround, so I
2016 Aug 02
0
[Bug 1211] option BindAddress is ignored by option UsePrivilegedPort
https://bugzilla.mindrot.org/show_bug.cgi?id=1211 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |CLOSED --- Comment #16 from Damien Miller <djm at mindrot.org> --- Close all resolved bugs after 7.3p1 release
2011 Sep 06
2
[Bug 1211] option BindAddress is ignored by option UsePrivilegedPort
https://bugzilla.mindrot.org/show_bug.cgi?id=1211 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks| |1930 --- Comment #4 from Damien Miller <djm at mindrot.org> 2011-09-06 10:34:10 EST --- Retarget unresolved
2013 Jul 25
1
[Bug 1211] option BindAddress is ignored by option UsePrivilegedPort
https://bugzilla.mindrot.org/show_bug.cgi?id=1211 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks| |2130 --- Comment #12 from Damien Miller <djm at mindrot.org> --- Retarget to openssh-6.4 -- You are
2013 Sep 19
2
[Bug 1211] option BindAddress is ignored by option UsePrivilegedPort
https://bugzilla.mindrot.org/show_bug.cgi?id=1211 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |dtucker at zip.com.au Status|NEW |ASSIGNED Assignee|openssh-bugs at
2014 Jan 30
1
Announce: OpenSSH 6.5 released
...nnection and then pass a connected file descriptor back to ssh(1). This allows the ProxyCommand to exit rather than staying around to transfer data. Bugfixes: * ssh(1), sshd(8): Fix potential stack exhaustion caused by nested certificates. * ssh(1): bz#1211: make BindAddress work with UsePrivilegedPort. * sftp(1): bz#2137: fix the progress meter for resumed transfer. * ssh-add(1): bz#2187: do not request smartcard PIN when removing keys from ssh-agent. * sshd(8): bz#2139: fix re-exec fallback when original sshd binary cannot be executed. * ssh-keygen(1): Make relative-specified cert...
2001 Jan 05
0
Problems on RedHat Sparc Linux
I tried setting rhost and rhostrsa authentication to no in /etc/ssh/ssh_config. That didn't work. When I added "UsePrivilegedPorts no" to /etc/ssh/ssh_config, it gave me a syntax error. I tried using ssh -P hostname, which locked up on authenticating to host. Someone I know who uses openssh on an Alpha Linux host has the same problem, but the ports are different even for him (1024-65535). To get openssh to work on a S...
2001 Apr 12
1
ssh not using priv port if target prot not priv
The openSSH ssh command appears to not use a source privileged port (no matter what the options/configs) if the target port isn't a privileged port. For example: ssh -p 22222 foo.ucla.edu would never try to connect from a privileged port. Even with useprivilegedport=yes. This disallows .shosts RSA host authentication without a password. This breaks compatability with ssh-1.2.27 and isn't documented anywhere except possibly in the source to the ssh_create_socket function in sshconnect.c: /* * If we are running as root and want to connect...
2002 Jan 25
1
bug in readconf.c
Hi, there is a tiny bug in readconf.c: options->use_privileged_port is always set to 0 regardless of whether -P is specified or not. This has the effect that RhostsAuthentication is disabled even if "RhostsAuthentication yes" is specified. The (trivial) patch is appended below. Martin ======================================================================== Martin Siegert Academic
2002 Jul 17
1
[Bug 357] New: SSH does not handle "Protocol" option in ~/.ssh/options properly
...OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo: openssh-unix-dev at mindrot.org ReportedBy: dfs at roaringpenguin.com Running OpenSSH 3.4p1 on Linux. Here's the contents of ~/.ssh/options: Host * UsePrivilegedPort no Protocol 1 Host shevy HostName shevy.roaringpenguin.com User dfs Protocol 2 Port 23 When I do "ssh -v shevy", we see: OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090603f debug1: Reading configuration data /home/dfs/.ssh/config debug1: Applying options for * debug1: Applying opt...
2000 Oct 11
2
scp -L option
Hi there, I have a need to have scp pass the -P option to ssh to "bypass" the packetfilters that doesn't allow connections to return to arbitary "priviledged" ports, ie. ports <1024. See attached context sensitive diffs against 2.2.0p1 to please integrate. Thanx Hendrik Visage -------------- next part -------------- *** 1.1 2000/10/11 13:31:45 --- scp.c 2000/10/11
2000 Dec 08
6
opensshd 2.3.0 (oBSD 2.8) ignores ME!
I have a problem I can not identify. Two firewalls with OpenBSD 2.8 sshd version OpenSSH_2.3.0 I do a ssh root at 195.84.181.91 -v SSH Version OpenSSH_2.3.0, protocol versions 1.5/2.0. Compiled with SSL (0x0090581f). debug: Reading configuration data /etc/ssh_config debug: ssh_connect: getuid 0 geteuid 0 anon 0 debug: Connecting to 195.84.181.91 [195.84.181.91] port 22. debug: Allocated
2011 Jul 17
2
openSSH 5.8p2 BindPort patch
...onfig.0 openssh-5.8p2-srcport//ssh_config.0 --- openssh-5.8p2//ssh_config.0 2011-05-05 02:58:10.000000000 +0100 +++ openssh-5.8p2-srcport//ssh_config.0 2011-07-17 20:50:26.881386898 +0100 @@ -66,6 +66,10 @@ DESCRIPTION one address. Note that this option does not work if UsePrivilegedPort is set to ``yes''. + BindPort + Use bind_port port on the local machine as the source port of the + connection. + ChallengeResponseAuthentication Specifies whether to use challenge-response authentication. The argument to this...
2000 Mar 03
7
[PATCH] Add a Maximum Idle Time (1.2.2)
...1,8 +102,8 @@ oUser, oHost, oEscapeChar, oRhostsRSAAuthentication, oProxyCommand, oGlobalKnownHostsFile, oUserKnownHostsFile, oConnectionAttempts, oBatchMode, oCheckHostIP, oStrictHostKeyChecking, oCompression, - oCompressionLevel, oKeepAlives, oNumberOfPasswordPrompts, oTISAuthentication, - oUsePrivilegedPort, oLogLevel + oCompressionLevel, oKeepAlives, oTransmitInterlude, oNumberOfPasswordPrompts, + oTISAuthentication, oUsePrivilegedPort, oLogLevel } OpCodes; /* Textual representations of the tokens. */ @@ -148,6 +149,7 @@ { "compression", oCompression }, { "compressionlevel&quot...
2014 Feb 28
5
Call for testing: OpenSSH 6.6
...d(8): avoid sandbox violation crashes in GSSAPI code by caching the supported list of GSSAPI mechanism OIDs before entering the sandbox. bz#2107 * ssh(1): fix possible crashes in SOCKS4 parsing caused by assumption that the SOCKS username is nul-terminated. * ssh(1): fix regression for UsePrivilegedPort=yes when BindAddress is not specified. * ssh(1), sshd(8): fix memory leak in ECDSA signature verification. * ssh(1): fix matching of 'Host' directives in ssh_config(5) files to be case-sensitive again (regression in 6.5). Portable OpenSSH: * sshd(8): don't fatal if the Free...
2000 Jul 13
2
[PATCH] OpenSSH 2.1.1pl3 (portable), readconf.c and strsep(3)
...nSSH's readconf.c broke many ~/.ssh/config files. Actually those which uses more than one whitespace character to separate keyword and value. For instance my ~/.ssh/config file reads: | BatchMode no | Compression yes | CompressionLevel 3 | FallBackToRsh no | UsePrivilegedPort no | ForwardX11 no | KeepAlive yes | StrictHostKeyChecking no | ... And now I got errors like this: | /u/rse/.ssh/config line 1: Missing yes/no argument. The problem is that strsep(1) explicitly supports empty fields (= the field between two whitespace characters) and...
2000 Oct 08
1
binding to privileged ports
Apologies if this is a FAQ; I couldn't find an answer on openssh.com or the mailing list archive.... Commercial SSH (I looked at 1.2.30) allocates privileged ports by counting /downwards/ from 1023, so that it will obtain a socket with (roughly speaking) the highest available privileged port number. This also appears to be the behaviour of rsh et al: (from sshconnect.c; whitespace elided)
2000 Dec 27
1
scp doesn't have a 'Use non privileged port' switch
Hi, and another feature request that I got from a debian user and that I think should be included in openssh. Thanks. |Unlike the 'old' ssh (Package: ssh; Version: 1.2.26-1.2)'s scp |openssh's scp does not support the -L option which according to |old ssh's manpage does the following: |> -L Use non privileged port. With this you cannot use |>
2001 Aug 10
2
Rhosts Authentication Problem on Solaris
Anyone, HELP!!!!!!!!!!!!!! I currently installed openssh-2.9p2 on SunOS 5.7 and 5.8. From the very moment that start to ssh out I get "Rhosts Authentication disabled ;the originating ip will not be trusted". I 've put "Useprivileged yes " in the ssh_config file, but then the ssh complains that there is a bad config line. Can some one tell me what is going on and how can I