Displaying 20 results from an estimated 30000 matches similar to: "[Bug 935] Restrict commands in sshd_config"
2013 Jun 18
0
Problems in slogin.1, sshd_config.5, ssh_config.5
This is automatically generated email about markup problems in a man
page for which you appear to be responsible.  If you are not the right
person or list, please tell me so I can correct my database.
See http://catb.org/~esr/doclifter/bugs.html for details on how and
why these patches were generated.  Feel free to email me with any
questions.  Note: These patches do not change the modification
2002 Aug 19
0
[Bug 387] New: command="" in authorized_keys fails when sshd_config has "PermitRootLogon forced-commands-only"
http://cvs-mirror.mozilla.org/webtools/bugzilla/show_bug.cgi?id=387
           Summary: command="" in authorized_keys fails when sshd_config has
                    "PermitRootLogon forced-commands-only"
           Product: Portable OpenSSH
           Version: -current
          Platform: All
        OS/Version: Linux
            Status: NEW
          Severity: major
         
2013 Oct 16
4
[Bug 2160] New: Option to disable ~/.ssh/rc in sshd_config
https://bugzilla.mindrot.org/show_bug.cgi?id=2160
            Bug ID: 2160
           Summary: Option to disable ~/.ssh/rc in sshd_config
           Product: Portable OpenSSH
           Version: 6.2p1
          Hardware: All
                OS: All
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: sshd
          Assignee: unassigned-bugs at
2014 Nov 15
2
[Bug 2317] New: sshd_config man page not clear on PermitUserEnvironment
https://bugzilla.mindrot.org/show_bug.cgi?id=2317
            Bug ID: 2317
           Summary: sshd_config man page not clear on
                    PermitUserEnvironment
           Product: Portable OpenSSH
           Version: 6.6p1
          Hardware: All
                OS: All
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: sshd
         
2024 Feb 08
3
[Bug 3667] New: Trailing space is added when parsing Subsystem in sshd_config
https://bugzilla.mindrot.org/show_bug.cgi?id=3667
            Bug ID: 3667
           Summary: Trailing space is added when parsing Subsystem in
                    sshd_config
           Product: Portable OpenSSH
           Version: 9.5p1
          Hardware: All
                OS: FreeBSD
            Status: NEW
          Severity: normal
          Priority: P5
         Component: sshd
        
2002 Aug 21
3
[Bug 387] command="" in authorized_keys fails when sshd_config has "PermitRootLogon forced-commands-only"
http://bugzilla.mindrot.org/show_bug.cgi?id=387
------- Additional Comments From markus at openbsd.org  2002-08-22 06:27 -------
hm, the logoutput from the server would be more helpfull.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2003 Feb 06
4
[Bug 387] command="" in authorized_keys fails when sshd_config has "PermitRootLogon forced-commands-only"
http://bugzilla.mindrot.org/show_bug.cgi?id=387
markus at openbsd.org changed:
           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|RESOLVED                    |REOPENED
         Resolution|FIXED                       |
------- Additional Comments From markus at openbsd.org  2003-02-07 08:16
2016 Mar 10
0
OpenSSH Security Advisory: xauth command injection
OpenSSH Security Advisory: x11fwd.adv
This document may be found at: http://www.openssh.com/txt/x11fwd.adv
1. Affected configurations
        All versions of OpenSSH prior to 7.2p2 with X11Forwarding
	enabled.
2. Vulnerability
	Missing sanitisation of untrusted input allows an
	authenticated user who is able to request X11 forwarding
	to inject commands to xauth(1).
	Injection of xauth
2016 Mar 10
2
OpenSSH Security Advisory: xauth command injection
OpenSSH Security Advisory: x11fwd.adv
This document may be found at: http://www.openssh.com/txt/x11fwd.adv
1. Affected configurations
        All versions of OpenSSH prior to 7.2p2 with X11Forwarding
	enabled.
2. Vulnerability
	Missing sanitisation of untrusted input allows an
	authenticated user who is able to request X11 forwarding
	to inject commands to xauth(1).
	Injection of xauth
2004 Jul 20
4
[Bug 898] support for AddressFamily in sshd_config
http://bugzilla.mindrot.org/show_bug.cgi?id=898
           Summary: support for AddressFamily in sshd_config
           Product: Portable OpenSSH
           Version: 3.8.1p1
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: enhancement
          Priority: P2
         Component: sshd
        AssignedTo: openssh-bugs at mindrot.org
        ReportedBy: peak
2000 Jun 11
0
Additions to UPGRADING?
In upgrading from ssh-1.1.25 to openssh-2.1.1p1, I've come
across a pair of incompatibilities not mentioned in the UPGRADING
list.  The first involves the authorized_keys file:
n. No un-quoted spaces are permitted in the options field of the
	authorized_keys file.
While this was documented as a restriction in F-Secure SSH, in
practice this was not enforced.  OpenSSH does enforce this
2018 Aug 24
0
Announce: OpenSSH 7.8 released
OpenSSH 7.8 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested
2018 Aug 24
0
Announce: OpenSSH 7.8 released
OpenSSH 7.8 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested
2013 Apr 15
12
[Bug 2090] New: SSH/SSHD hang with a Match User setting in sshd_config .
https://bugzilla.mindrot.org/show_bug.cgi?id=2090
            Bug ID: 2090
           Summary: SSH/SSHD hang with a Match User setting in sshd_config
                    .
    Classification: Unclassified
           Product: Portable OpenSSH
           Version: 6.1p1
          Hardware: Other
                OS: AIX
            Status: NEW
          Severity: critical
          Priority: P5
     
2001 Dec 01
0
ssh/sshd_config option confusion ...
Hello,
The item that causes me the most difficulty in deploying OpenSSH (and 
the commercial ssh, as well) is confusion over the large number of 
options for the configuration file; while the man page gives an 
explanation of each one, they are listed alphabetically there, with 
no "logical" grouping.
For my own use, I've created a heavily annotated sample sshd_config 
file,
2010 Mar 08
1
Announce: OpenSSH 5.4 released
OpenSSH 5.4 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed code
or patches,
2016 Aug 03
2
Configure option '--with-ssh1' breaks openssh-7.3p1
On 08/03/16 03:19, Darren Tucker wrote:
>
> Yes.  Debugging something on a system you can't interact with is hard
> enough without having information withheld.
>
I'll run again and add the relevant unedited texts as attachments.
There is nothing in /var/log/secure.
Also a diff between the config.h 's without and with --with-ssh1 is 
attached.
I have a centos-6.7 under
2016 Feb 29
0
Announce: OpenSSH 7.2 released
OpenSSH 7.2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support. OpenSSH also includes
transitional support for the legacy SSH 1.3 and 1.5 protocols
that may be enabled at compile-time.
Once again, we would like to thank the OpenSSH community
2012 Feb 12
4
[Bug 1979] New: Enhancement patch: Restrict sftp-server to basic commands, by user or group
https://bugzilla.mindrot.org/show_bug.cgi?id=1979
             Bug #: 1979
           Summary: Enhancement patch: Restrict sftp-server to basic
                    commands, by user or group
    Classification: Unclassified
           Product: Portable OpenSSH
           Version: 5.9p1
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: enhancement
        
2020 Feb 14
2
Announce: OpenSSH 8.2 released
OpenSSH 8.2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested