similar to: [Bug 1458] New: sftping files from SSH Tectia Server 6.0.0 hangs forever

Displaying 20 results from an estimated 1000 matches similar to: "[Bug 1458] New: sftping files from SSH Tectia Server 6.0.0 hangs forever"

2009 Jan 31
1
ssh w/ keys: tectia ->> openssh
I've checked out the ssh.com knowledgebase for instructions about how to "ssh w/ keys from tectia to openssh" but they did not specifically go from tectia to openssh. Could someone pls post a complete set of instructions about how to do this. thx., pete
2008 Jun 20
1
OpenSSH <--> SSH Tectia
Can I use OpenSSH on one end of a connection (Solaris 10) and use the commercial SSH Tectia software on the other end (zOS)? -------------------------------------------------------------------- myhosting.com - Premium Microsoft? Windows? and Linux web and application hosting - http://link.myhosting.com/myhosting
2006 Jan 10
2
2 SSH questions
I am away from my office for the week. In Sacramento for the IEEE 802.1 interim meeting (for anyone in the neighborhood...). And I am working on SSH with my Centos install(s). 1) For right now I am using my XP drive with Tectia client. I have SSHed into my Centos server using password method and uploaded my public key and such. I see everything there. I think. I then delete all
2002 Aug 12
0
Es-Peri.Com
----------------------------------------------------------- Esperi ::: Hayat Rehberi [[ www.es-peri.com ]] Yenilikler Devam Ediyor... 10/08/2002 ----------------------------------- Hayat?m?za damgas?n? vuran baz? anlar vard?r ve zaman ikiye b?l?n?r: ?ncesi ve sonras?... esperi ise hayat?n ?tesinde. herkesin aynaya d??en aksinde kendini bulup bulup yitirmesi gibi anla??lmaz, ula??lmaz...
2013 May 15
2
Support for "ssh-rsa-sha256" and "ssh-dss-sha256" ?‏
Functionality request for supporting Digital Signatures for RSA and DSS Public Key Algorithms in alignment with NIST SP800-131A. I assume this has been asked before, but I could not find in the archives. Support of "ssh-rsa-sha256" and "ssh-dss-sha256" public key algorithms for OpenSSH? I know Suite B Algorithms and x509 SSH Extension Algorithms are supported, but not a
2008 Jul 23
10
[Bug 1490] New: sshd -T reports a string of UNKNOWNs
https://bugzilla.mindrot.org/show_bug.cgi?id=1490 Summary: sshd -T reports a string of UNKNOWNs Classification: Unclassified Product: Portable OpenSSH Version: 5.1p1 Platform: ix86 OS/Version: Linux Status: NEW Severity: minor Priority: P2 Component: sshd AssignedTo: unassigned-bugs at
2008 Jul 23
10
[Bug 1490] New: sshd -T reports a string of UNKNOWNs
https://bugzilla.mindrot.org/show_bug.cgi?id=1490 Summary: sshd -T reports a string of UNKNOWNs Classification: Unclassified Product: Portable OpenSSH Version: 5.1p1 Platform: ix86 OS/Version: Linux Status: NEW Severity: minor Priority: P2 Component: sshd AssignedTo: unassigned-bugs at
2010 Jan 28
1
Possible issue with stdio forwarding
Greetings, I've been doing a little testing with the stdio forwarding support added in recent snapshots and have encountered one possible issue. First, I should say that this feature generally seems to work. However, I haven't been able to get it to work when connecting to a server running SSH.COM's product. The config file I am using is fairly simple: Host sfe1 LogLevel debug3
2002 Jan 03
3
[PATCH] Improving sftp client performance
The included patch for openssh 3.0.2p1 implements overlapping read requests for the sftp client. It should be able to handle weird cases such as shriking files and reordered responses. This is only the first shot, and I'd be happy for any comments. I plan to implement something similar for the write path if this works out well. The maximum number of outstanding requests is quite high at
2012 May 12
0
[Bug 2007] New: The literal string ${prefix}/bin appears in the user PATH under some circumstances
https://bugzilla.mindrot.org/show_bug.cgi?id=2007 Bug #: 2007 Summary: The literal string ${prefix}/bin appears in the user PATH under some circumstances Classification: Unclassified Product: Portable OpenSSH Version: 6.0p1 Platform: All OS/Version: All Status: NEW Severity: normal
2007 Jun 01
2
Need to sftp with automatic login from 1 aix machine to another, the id on the target is a DCE(DFS) id
Hi, I had a question and can not find out on the web where anyone might have done this. I am sftping between one AIX machine and another using automatic login. I have created the id_rsa.pub on the source server and added it to the /.ssh/authorized_keys file on the target server. The problem we are having seems to be that because the target id is a DCE(DFS) id and it's home directory is
2020 Aug 28
3
[Bug 1458] New: Consider allowing for variable interpolation
https://bugzilla.netfilter.org/show_bug.cgi?id=1458 Bug ID: 1458 Summary: Consider allowing for variable interpolation Product: nftables Version: unspecified Hardware: All OS: All Status: NEW Severity: enhancement Priority: P5 Component: nft Assignee: pablo at netfilter.org
2013 May 15
0
Support for "ssh-rsa-sha256" and "ssh-dss-sha256" ?
Functionality request for supporting Digital Signatures for RSA and DSS Public Key Algorithms in alignment with NIST SP800-131A. I assume this has been asked before, but I could not find in the archives. Support of "ssh-rsa-sha256" and "ssh-dss-sha256" public key algorithms for OpenSSH? I know Suite B Algorithms and x509 SSH Extension Algorithms are supported, but not a
2011 May 21
1
OpenVAS Vulnerability
Hi, Please advice me about the below reported vulnerability. High OpenSSH X Connections Session Hijacking Vulnerability Risk: High Application: ssh Port: 22 Protocol: tcp ScriptID: 100584 Overview: OpenSSH is prone to a vulnerability that allows attackers to hijack forwarded X connections. Successfully exploiting this issue may allow an attacker run arbitrary shell commands with the privileges
2005 Dec 07
4
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 Summary: buffer_append_space: alloc not supported Error with V 4.2p1 Product: Portable OpenSSH Version: 4.2p1 Platform: Sparc OS/Version: Solaris Status: NEW Keywords: help-wanted Severity: normal Priority: P3 Component: sftp
2015 Jun 02
1
[Bug 2302] with DH-GEX, ssh (and sshd) should not fall back to unconfigured DH groups or at least document this behaviour and use a stronger group
https://bugzilla.mindrot.org/show_bug.cgi?id=2302 --- Comment #13 from Darren Tucker <dtucker at zip.com.au> --- (In reply to Christoph Anton Mitterer from comment #10) [...] > Even though an attacker cannot (AFAIU??) for a connection to > downgrade to the weaker groups, The server's DH-GEX exchange hash includes the DH group sizes it received from the client. If these are
2007 Feb 03
3
Unablce to open VNC
I have vnc working on my server when I am logged into that server. If I run vncviewer, I have a copy of the Desktop. Hwever, if I SSH into the server, I get an error. Due to my lack of experience, I am not sure what the log file means: http://209.204.172.137/misc/vnc_error.txt Could someone tell me what I am missing? Todd -- Ariste Software 2200 D Street Ext Petaluma, CA 94952 (707)
2009 Feb 12
2
[patch 1/3] add protocol extension to ATTR message
This patch adds all the missing commonly used UNIX attributes: st_dev, st_ino, st_nlink, st_rdev, st_blocks, st_blksize, st_ctime. In addition it extends st_atime and st_mtime to 64bits, and adds nanosecond resolution to all three timestamps. This is implemented as an extension to the ATTR message. This patch alone is sufficient for SSHFS to be able to use these attributes. The following two
2003 May 31
11
[Bug 581] SFTP "ls" listings never end
http://bugzilla.mindrot.org/show_bug.cgi?id=581 Summary: SFTP "ls" listings never end Product: Portable OpenSSH Version: -current Platform: Alpha OS/Version: OSF/1 Status: NEW Severity: major Priority: P2 Component: sftp-server AssignedTo: openssh-bugs at mindrot.org ReportedBy:
2008 Mar 13
0
[Fwd: Re: OpenSSH and X.509 Certificate Support]
Hi Roumen, I discovered that the need of appending the .pub part of id_rsa(client key+cert) on the server can be eliminated by adding the Certificate Blob to authorized_keys which could look something like this: x509v3-sign-rsa subject= /C=FR/ST=PARIS/L=DESEl/O=SSL/OU=VLSI/CN=10.244.82.83/emailAddress=client at company.com This is extracted from the client certificate using openssl as