similar to: [Bug 1118] Annoying "Killed by signal 1" message with ProxyCommand

Displaying 20 results from an estimated 2000 matches similar to: "[Bug 1118] Annoying "Killed by signal 1" message with ProxyCommand"

2010 Mar 01
1
[Bug 1118] Annoying "Killed by signal 1" message with ProxyCommand
https://bugzilla.mindrot.org/show_bug.cgi?id=1118 --- Comment #4 from Colin Watson <cjwatson at debian.org> 2010-03-02 02:50:08 EST --- Created an attachment (id=1803) --> (https://bugzilla.mindrot.org/attachment.cgi?id=1803) debug() and cleanup_exit() on signal rather than fatal() -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving
2006 Mar 12
0
[Bug 1118] Annoying "Killed by signal 1" message with ProxyCommand
http://bugzilla.mindrot.org/show_bug.cgi?id=1118 djm at mindrot.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |WONTFIX ------- Comment #2 from djm at mindrot.org 2006-03-12 15:50 -------
2024 Jul 14
5
[Bug 3710] New: Use of ProxyCommand causes ssh session to never continue prompting for input
https://bugzilla.mindrot.org/show_bug.cgi?id=3710 Bug ID: 3710 Summary: Use of ProxyCommand causes ssh session to never continue prompting for input Product: Portable OpenSSH Version: 9.5p1 Hardware: Other OS: Windows 11 Status: NEW Severity: enhancement Priority: P5
2005 Jul 14
1
memory problem
I'm a beginner in R and, therefore, I don't know how serious my trouble is. After running a script: ** *t**<-c(14598417794,649693)* *data**=data.frame(read.spss("C:\\Ginters\\Kalibracija\\cal_data.sav"))* *Xs=**as.matrix(data[,1:2]) * *koef**=data.frame(read.spss("C:\\Ginters\\Kalibracija\\f.sav")) * *piks=**as.matrix(koef[,1**])*
2017 Nov 03
2
ControlPath versus ProxyCommand
TL;DR: I expect ProxyCommand to have effect in preference to ControlPath. I've just tripped over this one. I have an ssh Host (let us call it "MAIN") with a ControlPath and with ControlMaster=no, from the .ssh/config file. I also have a shell script whose purpose is to hop to a remote host through a port forward, which uses the ProxyCommand option like this: ProxyCommand ssh
2002 Sep 26
1
Question regarding patch for ProxyCommand setting
Hi! I recently started using ProxyCommand and noticed that it's not possible to specify a "none" value for it. I've already written a patch for that, but wanted to discuss the issue before posting the patch. The problem is the following: I'd like to use a ProxyCommand by default, but exclude some hosts. But as soon as I have Host * ProxyCommand /some/proxy/command %h %p
2020 Jun 01
2
[Bug 3175] New: ssh_config(5) - ProxyCommand should explain semantics
https://bugzilla.mindrot.org/show_bug.cgi?id=3175 Bug ID: 3175 Summary: ssh_config(5) - ProxyCommand should explain semantics Product: Portable OpenSSH Version: 8.3p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: ssh Assignee:
2017 Nov 03
2
ControlPath versus ProxyCommand
On 03Nov2017 13:07, Damien Miller <djm at mindrot.org> wrote: >On Fri, 3 Nov 2017, Cameron Simpson wrote: >> TL;DR: I expect ProxyCommand to have effect in preference to >> ControlPath. [...] >> On reflection, of course these are distinct options and that side of >> things isn't, of itself, a bug. However, is there a sane use case for >> using
2010 Nov 08
1
How to explicitly define the default setting for ProxyCommand for a particular host
I would like to create an ssh_config file with two basic groups of settings: A default "Host *" settings group with: Proxycommand=/my/helper/binary %h %p And another specific "Host specialServer" settings group with ProxyCommand= or ProxyCommand='' And yes, my current ssh_config file is setup in the correct order with the "Host *" declaration last. Host
2025 Mar 12
6
[Bug 3801] New: Expand TOKENS available in ProxyCommand to support port forwarding
https://bugzilla.mindrot.org/show_bug.cgi?id=3801 Bug ID: 3801 Summary: Expand TOKENS available in ProxyCommand to support port forwarding Product: Portable OpenSSH Version: 9.9p2 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: ssh
2017 Apr 07
2
[Bug 2706] New: remote code execution via ProxyCommand+browser exploit
https://bugzilla.mindrot.org/show_bug.cgi?id=2706 Bug ID: 2706 Summary: remote code execution via ProxyCommand+browser exploit Product: Portable OpenSSH Version: 7.4p1 Hardware: All OS: Mac OS X Status: NEW Severity: security Priority: P5 Component: ssh Assignee:
2024 Nov 12
2
[Bug 3751] New: ssh fails to parse ProxyCommand option with a string that ends in a backslash
https://bugzilla.mindrot.org/show_bug.cgi?id=3751 Bug ID: 3751 Summary: ssh fails to parse ProxyCommand option with a string that ends in a backslash Product: Portable OpenSSH Version: 8.7p1 Hardware: Other OS: Linux Status: NEW Severity: normal Priority: P5
2009 Sep 11
1
ProxyCommand not working if $SHELL not defined
#ssh -V OpenSSH_5.1p1, OpenSSL 0.9.8i 15 Sep 2008 Probably is not a real issue, because everyone should have its SHELL var defined, but as said above, when it's not, ssh with ProxyCommand will fail. I use connect.c, but with no SHELL var defined is not executed, ssh -v will give "No such file", and I'm pretty sure it refers to the shell, I read in ChangeLog that now ProxyCommand
2003 Mar 17
1
ProxyCommand
Hi all, I tried to use the ProxyCommand option in the ~/.ssh/config file like ProxyCommand /usr/local/bin/corkscrew <firewall> 80 %h %p but it seems th me that the ssh clinet won't use the option .. How can I tell the client to accept the proxy an send all requests to this host, bcause the internet names ("%P") cannot be resolved inside our lan - this must do the proxy.
2017 Nov 10
3
ProxyCommand that creates identity file
Hi there, I'm working on a project to write a ProxyCommand that reaches out to an SSH CA to receive an SSH certificate prior to the connection. The ProxyCommand also creates a tunnel to the upstream SSH server. When using ProxyCommand alone, the issue is that the identity files are loaded as soon as SSH has fork/exec'd the process. It does not wait for a valid server negotiation. I
2014 Mar 23
1
ProxyCommand as both a resolver and connector
I see that the hostname canonicalization configuration options is still rather limited. As that works on DNS level they are of not use if one has to use ProxyCommand to connect over a proxy connection or through a common gateway name where one uses different port numbers to connect to different intranet names. What would be ideal is to extend the ProxyCommand to both return the resolved universal
2024 Jan 14
2
ProxyJump may construct erroneous ProxyCommand
Hello, On macOS, Terminal?s ?New Remote Connection?? command runs ssh in a new window like this: login -pfq $USER /usr/bin/ssh $HOST Here, login executes /usr/bin/ssh with argv[0] set to ?-ssh?. If $HOST has a ProxyJump configuration, the resulting ProxyCommand is: -ssh -W '[%h]:%p' $JUMP_HOST Because of the leading hyphen, this fails to execute. If the user?s shell is zsh, the
2024 Jan 14
2
ProxyJump may construct erroneous ProxyCommand
On Sat, 13 Jan 2024, Rob Leslie wrote: > Hello, > > On macOS, Terminal?s ?New Remote Connection?? command runs ssh in a new window like this: > > login -pfq $USER /usr/bin/ssh $HOST > > Here, login executes /usr/bin/ssh with argv[0] set to ?-ssh?. > > If $HOST has a ProxyJump configuration, the resulting ProxyCommand is: > > -ssh -W '[%h]:%p'
2004 May 12
1
ssh-keyscan not using ProxyCommand?
I have a network without a network connection to other networks. But a socks server is dual homed between it and other networks. I can use socks to ssh to other networks. I use ProxyCommand with the socks aware connect.c program to connect out. All works great. I discovered while trying to use the ssh-keyscan program that it does not use the ProxyCommand configuration. At least in my testing
2013 Oct 23
1
ProxyCommand brokent in recent snapshots
Hello, While testing recent snapshots (20131023 and 20131024) I encountered a problem with ProxyCommand. The regression tests all passed, but the use of ProxyCommand's in my ~/.ssh/config resulted in name resolution errors; even if CanonicalizeHostname was explicitly set to "no." The patch included inline below fixed the issue: Index: ssh.c