Displaying 20 results from an estimated 10000 matches similar to: "[Bug 1367] New: Please document KbdInteractiveAuthentication in ssh_config( 5)"
2009 Mar 26
0
Processed: updating submitter e-mail address
Processing commands for control at bugs.debian.org:
> # changing bug submitter e-mail address from
> # dkg-debian.org at fifthhorsemannet to
> # dkg at fifthhorseman.net for consolidation
> submitter 318123 !
Bug#318123: [CVE-2006-0061] xlockmore: xlock segfaults with libpam-opensc, returns to user session
Changed Bug submitter from Daniel Kahn Gillmor <dkg-debian.org at
2013 May 16
1
[Bug 1545] ssh-keygen -R removes all comments from known_hosts file
https://bugzilla.mindrot.org/show_bug.cgi?id=1545
Daniel Kahn Gillmor <dkg at fifthhorseman.net> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |dkg at fifthhorseman.net
--- Comment #15 from Daniel Kahn Gillmor <dkg at fifthhorseman.net> ---
2008 Jul 31
5
[Bug 1498] New: OpenSC smartcard access should use raw public keys, not X.509 certificates
https://bugzilla.mindrot.org/show_bug.cgi?id=1498
Summary: OpenSC smartcard access should use raw public keys,
not X.509 certificates
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.1p1
Platform: Other
OS/Version: Linux
Status: NEW
Keywords: patch
Severity: normal
2008 Jun 09
1
Problem in RSA Key authentication
Hello Damien,
I am using OpenSSH-5.0 on my ARM board. I want to perform RSA
authentication, but server is not accepting the key generated by the
client. I have copied the authorized_keys in the "$HOME/.ssh/" folder
and provided permission (755) to that folder. Please help me how to
solve this problem.
Following is the log from the client
OpenSSH_4.3p2, OpenSSL 0.9.8b 04 May 2006
[Bug 1922] New: Disabling ChallengeResponseAuthentication also disables KbdInteractiveAuthentication
2011 Jul 30
0
[Bug 1922] New: Disabling ChallengeResponseAuthentication also disables KbdInteractiveAuthentication
https://bugzilla.mindrot.org/show_bug.cgi?id=1922
Bug #: 1922
Summary: Disabling ChallengeResponseAuthentication also
disables KbdInteractiveAuthentication
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.8p2
Platform: All
OS/Version: All
Status: NEW
Severity: normal
2015 Jan 15
3
OpenSSH v6.7 & NumberOfPasswordPrompts Option ...
Yes, I have tried that option with no difference in behavior. It seems it ignores that option when provided. Just for reference, I am building it on RedHat 5. I have never had this issue on any previous version of OpenSSH. I use the default configuration with only the changes specified in the RHEL 5 STIG applied.
I appreciate the security advice. The root account was indicated simply as an
2008 Oct 29
0
ssh disregarding umask for creation of known_hosts (and other files?)
Hey folks--
When ssh creates a known_hosts file for a user, it disregards the
currently-set umask, and can actually turn on mode bits that the user
has explicitly masked. While i'm happy to have ssh make files *more*
secure than my umask (in situations where that's reasonable, like the
creation of new ssh keys, etc), i'm not sure that i see the point in
ssh making the files more open
2015 Mar 06
3
[Bug 2362] New: Please add a possibility to disable IdentityFiles
https://bugzilla.mindrot.org/show_bug.cgi?id=2362
Bug ID: 2362
Summary: Please add a possibility to disable IdentityFiles
Product: Portable OpenSSH
Version: 6.7p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee: unassigned-bugs
2011 Feb 24
6
[Bug 1869] New: ssh-add can no longer read from FIFOs as of 5.7p1
https://bugzilla.mindrot.org/show_bug.cgi?id=1869
Summary: ssh-add can no longer read from FIFOs as of 5.7p1
Product: Portable OpenSSH
Version: 5.8p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh-add
AssignedTo: unassigned-bugs at mindrot.org
2010 Jun 09
5
[Bug 1777] New: KnownHostsCommand
https://bugzilla.mindrot.org/show_bug.cgi?id=1777
Summary: KnownHostsCommand
Product: Portable OpenSSH
Version: 5.5p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy: dkg at fifthhorseman.net
A
2005 Nov 11
1
Can't get LocalForward to work when using ControlPath
Hello All--
First, thanks for ControlPath/ControlMaster. It's very handy, and
ControlMaster=autoask is just what i wanted!
I'm having difficulty with a common use case, however. I want to
LocalForward on secondary connections using an already-established
ControlPath. From what i can tell, the second ssh connection doesn't
report any errors, but silently ignores the supplied
2011 Feb 24
3
[Bug 1871] New: ssh-askpass should be able to distinguish between a prompt for confirmation and a prompt for an actual passphrase
https://bugzilla.mindrot.org/show_bug.cgi?id=1871
Summary: ssh-askpass should be able to distinguish between a
prompt for confirmation and a prompt for an actual
passphrase
Product: Portable OpenSSH
Version: 5.8p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
2008 Aug 16
21
[Bug 1506] New: rationalize agent behavior on smartcard removal/reattachment
https://bugzilla.mindrot.org/show_bug.cgi?id=1506
Summary: rationalize agent behavior on smartcard
removal/reattachment
Product: Portable OpenSSH
Version: 5.1p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Smartcard
AssignedTo:
2011 May 12
6
[Bug 1905] New: check_parent_exists() logic does not cover all cases
https://bugzilla.mindrot.org/show_bug.cgi?id=1905
Summary: check_parent_exists() logic does not cover all cases
Product: Portable OpenSSH
Version: 5.8p2
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh-agent
AssignedTo: unassigned-bugs at mindrot.org
2014 Sep 04
1
Fwd: making the passphrase prompt more clear
This got me thinking, shouldn't this go through PAM so that password
strength restrictions can be set as well? Obviously most ssh keys are
created locally. But, if this were implemented, I think most distros
would adopt the same strength criteria on this as they do with passwd
and the like.
---------- Forwarded message ----------
From: Daniel Kahn Gillmor <dkg at fifthhorseman.net>
2009 Jun 20
7
[Bug 1612] New: ssh-add should not discard constraints if the agent fails to implement them
https://bugzilla.mindrot.org/show_bug.cgi?id=1612
Summary: ssh-add should not discard constraints if the agent
fails to implement them
Product: Portable OpenSSH
Version: 5.2p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ssh-add
2011 Mar 07
1
[Bug 1876] New: Requests to use keys held by the ssh-agent have no way of indicating their context
https://bugzilla.mindrot.org/show_bug.cgi?id=1876
Summary: Requests to use keys held by the ssh-agent have no way
of indicating their context
Product: Portable OpenSSH
Version: 5.8p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh-agent
2008 Aug 21
2
[Bug 1512] New: Only a single smartcard/PIN is supported by the ssh-agent
https://bugzilla.mindrot.org/show_bug.cgi?id=1512
Summary: Only a single smartcard/PIN is supported by the
ssh-agent
Product: Portable OpenSSH
Version: 5.1p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Smartcard
AssignedTo:
2015 Feb 06
4
Creating users "on - the - fly"
I guess I didn't want to litter the users table either - it just seems
"wrong" to be actually adding things to the host when it is really so
transient. It feels like it should be LDAP-ish. Just ask the server
for the keys and do a one-off authentication. But I've seen even LDAP
creates the user directories.
I see that 2.6 kernels can have some 4B users, which should last me a
2015 Feb 06
2
Re: Creating users "on - the - fly"
This is a good suggestion - and maybe I'm not totally clear on the
restrictions...
So - in these situations gitolite will actually append things to your
authorized_keys file. Which can get very long. And after a while - it
gets *very* long. I think I saw comments that it should be limited to
about 20k or so. And around 20k the look up times are in the seconds.
So that wouldn't be enough