Displaying 20 results from an estimated 10000 matches similar to: "[Bug 454] SSH doesn't consider distinguish ports for host-key verification"
2002 Dec 10
2
[Bug 454] SSH doesn't consider distinguish ports for host-key verification
http://bugzilla.mindrot.org/show_bug.cgi?id=454
------- Additional Comments From markus at openbsd.org 2002-12-10 20:14 -------
hm, i think about adding
ManglePort=yes
to the options. This option will create Hostkeyaliases on
the fly if the port is != 22, and use
'foor.bar.com at portXXX'
as an alias.
------- You are receiving this mail because: -------
You are the assignee for
2003 Mar 27
1
[Bug 454] SSH doesn't consider distinguish ports for host-key verification
http://bugzilla.mindrot.org/show_bug.cgi?id=454
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |misiek at pld.org.pl
------- Additional Comments From djm at mindrot.org 2003-03-27 21:35 -------
*** Bug 523 has been marked as a
2002 Dec 09
0
[Bug 454] New: SSH doesn't consider distinguish ports for host-key verification
http://bugzilla.mindrot.org/show_bug.cgi?id=454
Summary: SSH doesn't consider distinguish ports for host-key
verification
Product: Portable OpenSSH
Version: 3.4p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
AssignedTo:
2003 Feb 07
0
[Bug 454] SSH doesn't consider distinguish ports for host-key verification
http://bugzilla.mindrot.org/show_bug.cgi?id=454
------- Additional Comments From august at dce.chalmers.se 2003-02-07 21:03 -------
This feature would be useful for another issue as well:
I have a dlink nat/gateway/switch/dhcp thingy, and a static IP. Behind it are
about 3-5 machines. I can specify one IP on the inside that gets connections
made to port 22 from the outside.
But if I want
2004 Dec 16
0
[Bug 454] SSH doesn't consider distinguish ports for host-key verification
http://bugzilla.mindrot.org/show_bug.cgi?id=454
------- Additional Comments From foomzilla at fuhm.net 2004-12-17 06:01 -------
See also bug 910 for a patch.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2005 Feb 25
0
[Bug 454] SSH doesn't consider distinguish ports for host-key verification
http://bugzilla.mindrot.org/show_bug.cgi?id=454
dave at dave.clendenan.ca changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |dave at dave.clendenan.ca
------- You are receiving this mail because: -------
You are the assignee for the bug, or are
2005 Apr 21
0
[Bug 454] SSH doesn't consider distinguish ports for host-key verification
http://bugzilla.mindrot.org/show_bug.cgi?id=454
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |DUPLICATE
------- Additional Comments From djm at mindrot.org 2005-04-21
2006 Oct 07
0
[Bug 454] SSH doesn't consider distinguish ports for host-key verification
http://bugzilla.mindrot.org/show_bug.cgi?id=454
dtucker at zip.com.au changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
------- Comment #11 from dtucker at zip.com.au 2006-10-07 11:35 -------
Change all RESOLVED bug to CLOSED with the exception
2008 Mar 25
1
OpenSSH_4.7p1, OpenSSL 0.9.8g Host Key Verification Failed
Greetings,
I am trying to cross compile OpenSSH 4.7 for ppc with QNX Neutrino as my OS.
I have a workstation with QNX on it (x86) and I have linked the utils used
by autoconf to their ppc versions. I have been able to successfully build
sshd/ssh. I copy the binaries built on the x86 to the ppc, and sshd works
great. I can ssh from any machine to it, but when I try to ssh from the ppc
machine to
2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
In the past 2 months another change occurred in the CVS code that
broke my ssh-keyscan patch. Here's an updated version that tweaks the
changed name (in the Kex struct) and also causes an attempt to grab an
ssh2 key from an older server (without ssh2 support) to fail earlier
and without an error message (Stuart Pearlman emailed me some code for
this).
This patch is based on the BSD CVS
2010 Jan 28
1
Possible issue with stdio forwarding
Greetings,
I've been doing a little testing with the stdio forwarding support added
in recent snapshots and have encountered one possible issue. First, I
should say that this feature generally seems to work. However, I haven't
been able to get it to work when connecting to a server running
SSH.COM's product.
The config file I am using is fairly simple:
Host sfe1
LogLevel debug3
2005 Mar 02
0
Ssh / sft /scp password problems, agent runs fine
Hi :-)
When i use scp or sftp with password login, it dont com back
fbeckman at zvadm6:/home/fbeckman $ scp /etc/hosts root at devil3:/var/tmp/
Password:
hosts 100% 283KB 283.4KB/s 00:00
....
<sleep>
^CKilled by signal 2.
fbeckman at zvadm6:/home/fbeckman $
Only Ctrl C helps
Exsample 2:
ssh devil3
2008 Mar 26
24
[Bug 15206] New: [dualhead, randr12, ppc] Second head displays nothing
http://bugs.freedesktop.org/show_bug.cgi?id=15206
Summary: [dualhead, randr12, ppc] Second head displays nothing
Product: xorg
Version: unspecified
Platform: PowerPC
OS/Version: Linux (All)
Status: NEW
Severity: normal
Priority: medium
Component: Driver/nouveau
AssignedTo: nouveau at
2014 Oct 18
10
[Bug 2297] New: EDD25519 Signature verification failed on Solaris
https://bugzilla.mindrot.org/show_bug.cgi?id=2297
Bug ID: 2297
Summary: EDD25519 Signature verification failed on Solaris
Product: Portable OpenSSH
Version: 6.7p1
Hardware: amd64
OS: Solaris
Status: NEW
Severity: major
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2008 Apr 03
3
[Bug 971] New: zfs key -l fails after unloading (keyscope=dataset)
http://defect.opensolaris.org/bz/show_bug.cgi?id=971
Summary: zfs key -l fails after unloading (keyscope=dataset)
Classification: Development
Product: zfs-crypto
Version: unspecified
Platform: Other
OS/Version: Solaris
Status: NEW
Severity: major
Priority: P2
Component: other
AssignedTo:
2020 Sep 16
2
ssh-ed25519 and ecdsa-sha2-nistp256 host keys
Here you go:
OpenSSH_7.9p1, OpenSSL 1.1.1d 10 Sep 2019
debug1: Reading configuration data /home/ryantm/.ssh/config
debug1: /home/ryantm/.ssh/config line 4: Applying options for *
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 13: Applying options for *
debug2: resolving "{REDACTED}" port 22
debug2: ssh_connect_direct
debug1: Connecting to
2003 Oct 20
1
[Bug 746] host authentication requires RSA1 keys
http://bugzilla.mindrot.org/show_bug.cgi?id=746
Summary: host authentication requires RSA1 keys
Product: Portable OpenSSH
Version: 3.7p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Documentation
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2004 Mar 18
1
3.8p1 password expiry, Solaris 8
I can't seem to get the /etc/shadow password expiry working on
3.8p1 on Solaris 8. It works fine with 3.7.1p2 and pwexp26.
Logins aren't affected after a 'passwd -df' or 'passwd -f'.
Here's the configure, using gcc 3.2:
--prefix=/usr --sysconfdir=/etc/ssh --with-tcp-wrappers \
--without-pam --libexecdir=/usr/sbin --mandir=/usr/share/man \
--with-shadow
'uname
2003 Oct 20
12
[Bug 747] host authentication requires RSA1 keys
http://bugzilla.mindrot.org/show_bug.cgi?id=747
Summary: host authentication requires RSA1 keys
Product: Portable OpenSSH
Version: 3.7.1p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Documentation
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2012 Jul 06
1
Can not login with key-exchange is chrooted sftp environment
Hi,
We need to allow log in based on public key generated using ssh-keygen (rsa key) for SFTP with chroot (internal sftp). I am not able to log in with just key exchange. I can login using password.
I am able to log-in with out password for an ssh session unlike sftp session.
Is there a way to login with key-exchange only for internal-sftp with chroot?
Here is the trace
OpenSSH_3.9p1, OpenSSL