Displaying 20 results from an estimated 50000 matches similar to: "[Bug 1056] RekeyLimit can be ridiculously low and is undocumented."
2005 Oct 29
1
[Bug 1056] RekeyLimit can be ridiculously low and is undocumented.
http://bugzilla.mindrot.org/show_bug.cgi?id=1056
------- Comment #2 from djm at mindrot.org 2005-10-30 10:59 -------
hm, I haven't been able to reproduce the hang you have experienced when setting
rekeylimit low. Even setting RekeyLimit=16 produces a working session for me.
This isn't to say that we shouldn't set a minimum.
------- You are receiving this mail because:
2008 Jun 12
0
[Bug 1293] sshd's -r option undocumented
https://bugzilla.mindrot.org/show_bug.cgi?id=1293
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |WONTFIX
CC|
2014 Aug 25
7
[Bug 2264] New: RekeyLimit option does not allow '4G' value when UINT_MAX is 0xffffffff
https://bugzilla.mindrot.org/show_bug.cgi?id=2264
Bug ID: 2264
Summary: RekeyLimit option does not allow '4G' value when
UINT_MAX is 0xffffffff
Product: Portable OpenSSH
Version: 6.6p1
Hardware: Other
OS: Linux
Status: NEW
Severity: normal
Priority: P5
2008 Jul 22
0
[Bug 1293] sshd's -r option undocumented
https://bugzilla.mindrot.org/show_bug.cgi?id=1293
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
--- Comment #2 from Damien Miller <djm at mindrot.org> 2008-07-22 12:12:49 ---
Mass update
2007 Nov 09
6
[Bug 1390] New: RekeyLimit max value is too restrictive
https://bugzilla.mindrot.org/show_bug.cgi?id=1390
Summary: RekeyLimit max value is too restrictive
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.7p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: bitbucket at mindrot.org
2014 Apr 17
3
[Bug 2230] New: Undocumented sftp put -r quirk: Couldn't canonicalize: No such file or directory
https://bugzilla.mindrot.org/show_bug.cgi?id=2230
Bug ID: 2230
Summary: Undocumented sftp put -r quirk: Couldn't canonicalize:
No such file or directory
Product: Portable OpenSSH
Version: 6.5p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: minor
Priority: P5
2014 Jul 06
15
[Bug 2252] New: RekeyLimit breaks ClientAlive
https://bugzilla.mindrot.org/show_bug.cgi?id=2252
Bug ID: 2252
Summary: RekeyLimit breaks ClientAlive
Product: Portable OpenSSH
Version: 6.6p1
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
2011 Aug 17
1
openssh-unix-dev Digest, Vol 100, Issue 3
Works on my netbsd tinkerbox.
NetBSD 5.0.2 NetBSD 5.0.2 (GENERIC)
It uses rlimit.
Privsep sandbox style: rlimit
I also get warnings during make.
fmt_scaled.c: In function 'scan_scaled':
fmt_scaled.c:84: warning: array subscript has type 'char'
fmt_scaled.c:111: warning: array subscript has type 'char'
fmt_scaled.c:155: warning: array subscript has type 'char'
2014 Jan 03
1
VisualHostKey vs. RekeyLimit vs. VerifyHostKeyDNS
Hello list, I'm not sure whether this is bug worthy or just my own
insanity. I'm using 6.4p1 packages from Debian jessie and
wheezy-backports.
I like VisualHostKey, although it may not add any protection (other than
not trusting ones own known_hosts file?), I've become accustomed to it
as it seems that extra neurons fire when I log into a host and get a
visual cue of what looks like
2013 Mar 21
1
[Bug 1669] ssh-copy-id has options that could be added to MAN page
https://bugzilla.mindrot.org/show_bug.cgi?id=1669
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |djm at mindrot.org
Status|NEW |RESOLVED
Resolution|---
2000 Nov 29
0
Snapshot
I have just uploaded a new snapshot to
http://www.mindrot.org/misc/openssh/
Snapshot production is now automated - new snapshots will be made
at about 4:30 am (Australian Eastern time) and will be available from
the URL above.
This snapshot consists of mainly minor fixes over the previous.
The race when sshd exits which was causing data loss (as evidenced by
"ssh localhost dd
2015 Nov 01
4
[Bug 2484] New: ssh-kegen -Z option undocumented
https://bugzilla.mindrot.org/show_bug.cgi?id=2484
Bug ID: 2484
Summary: ssh-kegen -Z option undocumented
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: ssh-keygen
Assignee: unassigned-bugs at mindrot.org
2000 Sep 03
1
installing OpenSSH rpm on SuSE 6.2
I am taking the liberty of forwarding this message to the list. I am
not subscribed to it. If you want to reply to me, please send email to
faheem at email.unc.edu
Thanks, Faheem Mitha.
---------- Forwarded message ----------
From: Faheem Mitha <faheem at email.unc.edu>
Newsgroups: comp.security.ssh
Subject: installing OpenSSH rpm on SuSE 6.2
Dear people,
I tried
2000 Sep 02
0
ANNOUNCE: portable OpenSSH 2.2.0p1
Version 2.2.0p1 of portable OpenSSH has just been uploaded to the
master site and should be making its way to the mirrors in due
course.
http://www.openssh.com/portable.html
This release contains several new features and bugfixes relative to
the previous 2.1.1p4 release. In particular:
- DSA key support in ssh-agent. Please not that this will not
interop with ssh.com's ssh-agent (Markus
2000 Sep 02
0
ANNOUNCE: portable OpenSSH 2.2.0p1
Version 2.2.0p1 of portable OpenSSH has just been uploaded to the
master site and should be making its way to the mirrors in due
course.
http://www.openssh.com/portable.html
This release contains several new features and bugfixes relative to
the previous 2.1.1p4 release. In particular:
- DSA key support in ssh-agent. Please not that this will not
interop with ssh.com's ssh-agent (Markus
2000 Sep 03
0
[PATCH]: openssh.spec file for SuSE 6.4 & 7.0
Attached is a spec file for OpenSSH on SuSE 6.4 and 7.0 systems.
It differs from the current spec file in the following details:
- Only one rpm file is created containing client and server files.
- PreReq `openssl-devel' is changed to `openssl'.
- Path '/usr/libexec/ssh' is changed to '/usr/lib/ssh' for
ssh-askpass and gnome-ssh-askpass.
The resulting
2005 Mar 09
0
[djm@cvs.openbsd.org: OpenSSH 4.0 released]
----- Forwarded message from Damien Miller <djm@cvs.openbsd.org> -----
Subject: OpenSSH 4.0 released
From: Damien Miller <djm@cvs.openbsd.org>
Date: Wed, 9 Mar 2005 02:54:13 -0700 (MST)
To: announce@openbsd.org
X-Original-To: jeremie@le-hen.org
Delivered-To: tataz@tataz.chchile.org
X-Loop: announce@openbsd.org
Precedence: list
OpenSSH 4.0 has just been released. It will be available
2013 Oct 24
1
[Bug 1235] [PATCH] scp does unnecessary getpwuid(), breaking chroot
https://bugzilla.mindrot.org/show_bug.cgi?id=1235
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |WORKSFORME
--- Comment #7 from Damien Miller <djm at
2013 Oct 10
0
[Bug 1684] Support multiple AuthorizedKeysFile entries
https://bugzilla.mindrot.org/show_bug.cgi?id=1684
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |djm at mindrot.org
Status|NEW |RESOLVED
Resolution|---
2013 Sep 13
0
Announce: OpenSSH 6.3 released
Changes since OpenSSH 6.2
=========================
This release is predominantly a bugfix release:
Features:
* sshd(8): add ssh-agent(1) support to sshd(8); allows encrypted hostkeys,
or hostkeys on smartcards.
* ssh(1)/sshd(8): allow optional time-based rekeying via a second argument
to the existing RekeyLimit option. RekeyLimit is now supported in
sshd_config as well as on the