Displaying 20 results from an estimated 5000 matches similar to: "[Bug 1042] Allow TCP wrapper refusals to follow SyslogFacility"
2008 Feb 28
4
[Bug 1445] ssh segmentation fault
https://bugzilla.mindrot.org/show_bug.cgi?id=1445
qianliguo <qianliguo2002 at 163.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Summary|ssh s |ssh segmentation fault
--
Configure bugmail:
2000 May 29
1
Syslog facility in Linux
Hi !
While browsing Linux manpages (man 3 syslog) I noticed that the manual
says that the LOG_AUTH facility is deprecated use LOG_AUTHPRIV instead.
Is there a good reason why OpenSSH doesn't have an option to use
LOG_AUTHPRIV facility ? (Looks like that tcpd/telnet etc. use the AUTHPRIV
facility (in RH6.2)).
Shouldn't be too hard to add the AUTH_PRIV facility ?
Cheers,
-Jarno
--
2024 Apr 25
1
[PATCH] Enable ssh_config to set LogPath option (-E)
ssh client has the ability to set the destination of debug logs via the `-E` flag. ssh_config lacks an equivalent keyword to set the same option via configs.
This patch follows the same semantics of other `*Path` type keywords and creates a new ssh_config keyword `LogPath`.
[0] Bugzilla: https://bugzilla.mindrot.org/show_bug.cgi?id=3683
[1] GitHub PR:
2006 Oct 09
1
About sftp-server root path
Hi,
I saw in archive that some people made a patch to sftp-server, and that patch
sets a root path.
I'd like to know if there's an ideia to apply that patch in main tree of
openssh?
With the use of SSHFS [wich uses sftp-server], it would be interesting to
have someting like that, because as we have netboot workstations, the access
to devices [such as, floppy, cdrom and usb data] are
2010 Jan 04
3
[Bug 430] Could add option to sftp-server to disable write access
https://bugzilla.mindrot.org/show_bug.cgi?id=430
--- Comment #6 from Damien Miller <djm at mindrot.org> 2010-01-04 14:00:26 EST ---
Created an attachment (id=1763)
--> (https://bugzilla.mindrot.org/attachment.cgi?id=1763)
/home/djm/sftp-ro.diff
Adds a -R commandline option to disable writes and other filesystem-
modifying options.
--
Configure bugmail:
2007 Apr 10
6
[PATCH 0/6] openssh V_4_6: minor fixes/cleanups
This patch series consists of minor fixes and cleanups I made during
update to openssh V_4_6 branch.
openssh/auth-pam.c | 9 ++++-----
openssh/auth2.c | 2 --
openssh/readconf.c | 7 ++++---
openssh/servconf.c | 14 ++++++++------
openssh/sftp-server.c | 9 ++++++---
openssh/sshd.c | 2 +-
6 files changed, 23 insertions(+), 20 deletions(-)
--
ldv
2001 Nov 12
4
Please test -current
Could people please test -current? We will be making a release fairly
soon.
-d
--
| By convention there is color, \\ Damien Miller <djm at mindrot.org>
| By convention sweetness, By convention bitterness, \\ www.mindrot.org
| But in reality there are atoms and space - Democritus (c. 400 BCE)
2016 Mar 28
2
Is it possible to extend log message?
Hello folks,
Is it possible to extend log message as large as PATH_MAX?
Current length of message format including file path is small against linux PATH_MAX, 4096.
diff --git a/log.c b/log.c
index ad12930..95df4a9 100644
--- a/log.c
+++ b/log.c
@@ -359,7 +359,7 @@ log_redirect_stderr_to(const char *logfile)
log_stderr_fd = fd;
}
-#define MSGBUFSIZ 1024
+#define MSGBUFSIZ 5192
void
2017 Feb 20
3
[Bug 2681] New: postauth processes to log via monitor
https://bugzilla.mindrot.org/show_bug.cgi?id=2681
Bug ID: 2681
Summary: postauth processes to log via monitor
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2010 Nov 02
1
SFTP subsystem and umask
Hello,
I have noticed that the -u parameter to the sftp-server or internal-sftp subsystem is not working correctly. For openssh-5.6p1 I believe that the problem lies in this code, starting at line 1414 in sftp-server.c:
----------------------------------------------------------
case 'u':
mask = (mode_t)strtonum(optarg, 0, 0777, &errmsg);
if (errmsg != NULL)
2002 Dec 18
2
patch for openssh3.5p1 - adds logging option
this patch adds a LogFile option to sshd_config. it just logs messages
directly to a file instead of stderr or syslog. the largest change
is an additional argument to log_init() in log.c for the log file name
(and then changes to the rest of the tools to add a NULL arg).
galt
-------------- next part --------------
diff -urN openssh-3.5p1-orig/log.c openssh-3.5p1/log.c
---
2001 Nov 20
3
problem with AFS token forwarding
Hello,
I came across an interoperability problem in OpenSSH 3.0p1 and 3.0.1p1
concerning the AFS token forwarding. That means that the new versions are
not able to exchange AFS tokens (and Kerberos TGTs) with older OpenSSH
releases (including 2.9p2) and with the old SSH 1.2.2x. In my opinion this
problem already existed in Openssh 2.9.9p1, but I have never used this
version (I only looked at the
2013 Jun 04
1
[PATCH] add restricted mode to sftp-server
Hello.
These patches add a new mode of operation for the sftp server.
It is located between the ordinary, unrestricted mode and read-only mode.
It allows you to add files to the server, but only if these files do
not exist on the server before.
Changes to existing files - are prohibited.
Please review them, maybe these patches will be useful not only to me.
Thank you.
-------------- next part
2000 Aug 11
1
OpenSSH Questions
Heya,
I'm trying to convince my company to use OpenSSH instead of the commercial SSH version. I need a little help:
1. What features does OpenSSH offer over commercial SSH (besides being free and open source of course)?
2. Our lawyers want details on the licensing / patents stuff. I have the high level details from the OpenSSH page. I need the nitty gritty like RSA patent# and
2002 Jun 25
0
[Bug 294] New: tcp wrapper access changed between 2.9.9p2 and 3.3p1
http://bugzilla.mindrot.org/show_bug.cgi?id=294
Summary: tcp wrapper access changed between 2.9.9p2 and 3.3p1
Product: Portable OpenSSH
Version: -current
Platform: MIPS
OS/Version: IRIX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
2009 Feb 26
1
RFC: Use tcp-wrapper for all connections to upsd
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
after some experimenting and digging through the code i found no solution
how to completely disable access to upsd from specific hosts.
In previous versions (before r1233) it was possible to allow or deny
access to upsd completely by using ACL, ACCEPT and REJECT entries in
upsd.conf. As this functionality was removed and tcp-wrappers support
2002 Jun 25
7
[Bug 294] tcp wrapper access changed between 2.9.9p2 and 3.3p1
http://bugzilla.mindrot.org/show_bug.cgi?id=294
------- Additional Comments From ktaylor at daac.gsfc.nasa.gov 2002-06-26 00:53 -------
This is what's reported in the syslog from openssh-2.9.9p2 - with an ip address
range listed in hosts.allow
Jun 25 10:50:08 6D:server sshd[30123536]: Failed keyboard-interactive for
ktaylor from xxx.xxx.xxx.xxx port 40333 ssh2
Jun 25 10:50:13 6D:server
2023 May 26
3
[Bug 3575] New: wrong usage message: "-Q protocol_feature" is an invalid query type
https://bugzilla.mindrot.org/show_bug.cgi?id=3575
Bug ID: 3575
Summary: wrong usage message: "-Q protocol_feature" is an
invalid query type
Product: Portable OpenSSH
Version: 9.2p1
Hardware: Other
OS: Linux
Status: NEW
Severity: minor
Priority: P5
2008 Feb 28
0
[Bug 1445] ssh s
https://bugzilla.mindrot.org/show_bug.cgi?id=1445
--- Comment #1 from qianliguo <qianliguo2002 at 163.com> 2008-02-28 13:56:17 ---
# strace ssh
execve("/usr/bin/ssh", ["ssh"], [/* 16 vars */]) = 0
mmap2(NULL, 20, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0)
= 0x40005000
stat("/etc/ld.so.cache", {st_mode=S_IFREG|0644, st_size=1796, ...}) = 0
2012 Mar 16
4
tcp-wrapper not found
Hi, all!
Actually I have two questions for a same reason: I want to share my NUT to my LAN, or read UPS from remote device.
/**************** firstly *****************/
I downloaded tcp-wrapper, but NUT could not detected it.
Previously I successfully configured and make NUT into my embedded system. It worked and UPS is recognized.
I downloaded tcp-wrapper (Ver 7.6, most files in the package