Displaying 20 results from an estimated 30000 matches similar to: "[Bug 935] Restrict commands in sshd_config"
2013 Jun 18
0
Problems in slogin.1, sshd_config.5, ssh_config.5
This is automatically generated email about markup problems in a man
page for which you appear to be responsible. If you are not the right
person or list, please tell me so I can correct my database.
See http://catb.org/~esr/doclifter/bugs.html for details on how and
why these patches were generated. Feel free to email me with any
questions. Note: These patches do not change the modification
2002 Aug 19
0
[Bug 387] New: command="" in authorized_keys fails when sshd_config has "PermitRootLogon forced-commands-only"
http://cvs-mirror.mozilla.org/webtools/bugzilla/show_bug.cgi?id=387
Summary: command="" in authorized_keys fails when sshd_config has
"PermitRootLogon forced-commands-only"
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: Linux
Status: NEW
Severity: major
2013 Oct 16
4
[Bug 2160] New: Option to disable ~/.ssh/rc in sshd_config
https://bugzilla.mindrot.org/show_bug.cgi?id=2160
Bug ID: 2160
Summary: Option to disable ~/.ssh/rc in sshd_config
Product: Portable OpenSSH
Version: 6.2p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2014 Nov 15
2
[Bug 2317] New: sshd_config man page not clear on PermitUserEnvironment
https://bugzilla.mindrot.org/show_bug.cgi?id=2317
Bug ID: 2317
Summary: sshd_config man page not clear on
PermitUserEnvironment
Product: Portable OpenSSH
Version: 6.6p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
2024 Feb 08
3
[Bug 3667] New: Trailing space is added when parsing Subsystem in sshd_config
https://bugzilla.mindrot.org/show_bug.cgi?id=3667
Bug ID: 3667
Summary: Trailing space is added when parsing Subsystem in
sshd_config
Product: Portable OpenSSH
Version: 9.5p1
Hardware: All
OS: FreeBSD
Status: NEW
Severity: normal
Priority: P5
Component: sshd
2002 Aug 21
3
[Bug 387] command="" in authorized_keys fails when sshd_config has "PermitRootLogon forced-commands-only"
http://bugzilla.mindrot.org/show_bug.cgi?id=387
------- Additional Comments From markus at openbsd.org 2002-08-22 06:27 -------
hm, the logoutput from the server would be more helpfull.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2003 Feb 06
4
[Bug 387] command="" in authorized_keys fails when sshd_config has "PermitRootLogon forced-commands-only"
http://bugzilla.mindrot.org/show_bug.cgi?id=387
markus at openbsd.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |REOPENED
Resolution|FIXED |
------- Additional Comments From markus at openbsd.org 2003-02-07 08:16
2016 Mar 10
0
OpenSSH Security Advisory: xauth command injection
OpenSSH Security Advisory: x11fwd.adv
This document may be found at: http://www.openssh.com/txt/x11fwd.adv
1. Affected configurations
All versions of OpenSSH prior to 7.2p2 with X11Forwarding
enabled.
2. Vulnerability
Missing sanitisation of untrusted input allows an
authenticated user who is able to request X11 forwarding
to inject commands to xauth(1).
Injection of xauth
2016 Mar 10
2
OpenSSH Security Advisory: xauth command injection
OpenSSH Security Advisory: x11fwd.adv
This document may be found at: http://www.openssh.com/txt/x11fwd.adv
1. Affected configurations
All versions of OpenSSH prior to 7.2p2 with X11Forwarding
enabled.
2. Vulnerability
Missing sanitisation of untrusted input allows an
authenticated user who is able to request X11 forwarding
to inject commands to xauth(1).
Injection of xauth
2004 Jul 20
4
[Bug 898] support for AddressFamily in sshd_config
http://bugzilla.mindrot.org/show_bug.cgi?id=898
Summary: support for AddressFamily in sshd_config
Product: Portable OpenSSH
Version: 3.8.1p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo: openssh-bugs at mindrot.org
ReportedBy: peak
2000 Jun 11
0
Additions to UPGRADING?
In upgrading from ssh-1.1.25 to openssh-2.1.1p1, I've come
across a pair of incompatibilities not mentioned in the UPGRADING
list. The first involves the authorized_keys file:
n. No un-quoted spaces are permitted in the options field of the
authorized_keys file.
While this was documented as a restriction in F-Secure SSH, in
practice this was not enforced. OpenSSH does enforce this
2018 Aug 24
0
Announce: OpenSSH 7.8 released
OpenSSH 7.8 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested
2018 Aug 24
0
Announce: OpenSSH 7.8 released
OpenSSH 7.8 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested
2013 Apr 15
12
[Bug 2090] New: SSH/SSHD hang with a Match User setting in sshd_config .
https://bugzilla.mindrot.org/show_bug.cgi?id=2090
Bug ID: 2090
Summary: SSH/SSHD hang with a Match User setting in sshd_config
.
Classification: Unclassified
Product: Portable OpenSSH
Version: 6.1p1
Hardware: Other
OS: AIX
Status: NEW
Severity: critical
Priority: P5
2001 Dec 01
0
ssh/sshd_config option confusion ...
Hello,
The item that causes me the most difficulty in deploying OpenSSH (and
the commercial ssh, as well) is confusion over the large number of
options for the configuration file; while the man page gives an
explanation of each one, they are listed alphabetically there, with
no "logical" grouping.
For my own use, I've created a heavily annotated sample sshd_config
file,
2010 Mar 08
1
Announce: OpenSSH 5.4 released
OpenSSH 5.4 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed code
or patches,
2016 Aug 03
2
Configure option '--with-ssh1' breaks openssh-7.3p1
On 08/03/16 03:19, Darren Tucker wrote:
>
> Yes. Debugging something on a system you can't interact with is hard
> enough without having information withheld.
>
I'll run again and add the relevant unedited texts as attachments.
There is nothing in /var/log/secure.
Also a diff between the config.h 's without and with --with-ssh1 is
attached.
I have a centos-6.7 under
2016 Feb 29
0
Announce: OpenSSH 7.2 released
OpenSSH 7.2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support. OpenSSH also includes
transitional support for the legacy SSH 1.3 and 1.5 protocols
that may be enabled at compile-time.
Once again, we would like to thank the OpenSSH community
2012 Feb 12
4
[Bug 1979] New: Enhancement patch: Restrict sftp-server to basic commands, by user or group
https://bugzilla.mindrot.org/show_bug.cgi?id=1979
Bug #: 1979
Summary: Enhancement patch: Restrict sftp-server to basic
commands, by user or group
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.9p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
2020 Feb 14
2
Announce: OpenSSH 8.2 released
OpenSSH 8.2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested