Displaying 20 results from an estimated 1000 matches similar to: "[Bug 1458] New: sftping files from SSH Tectia Server 6.0.0 hangs forever"
2009 Jan 31
1
ssh w/ keys: tectia ->> openssh
I've checked out the ssh.com knowledgebase for instructions about
how to "ssh w/ keys from tectia to openssh" but they did not specifically
go from tectia to openssh. Could someone pls post a complete set of
instructions about how to do this.
thx.,
pete
2008 Jun 20
1
OpenSSH <--> SSH Tectia
Can I use OpenSSH on one end of a connection (Solaris 10) and use the
commercial SSH Tectia software on the other end (zOS)?
--------------------------------------------------------------------
myhosting.com - Premium Microsoft? Windows? and Linux web and application
hosting - http://link.myhosting.com/myhosting
2006 Jan 10
2
2 SSH questions
I am away from my office for the week. In Sacramento for the IEEE
802.1 interim meeting (for anyone in the neighborhood...).
And I am working on SSH with my Centos install(s).
1) For right now I am using my XP drive with Tectia client. I have
SSHed into my Centos server using password method and uploaded my
public key and such. I see everything there. I think. I then
delete all
2002 Aug 12
0
Es-Peri.Com
-----------------------------------------------------------
Esperi ::: Hayat Rehberi
[[ www.es-peri.com ]]
Yenilikler Devam Ediyor... 10/08/2002
-----------------------------------
Hayat?m?za damgas?n? vuran baz? anlar vard?r
ve zaman ikiye b?l?n?r:
?ncesi ve sonras?...
esperi ise hayat?n ?tesinde.
herkesin aynaya d??en aksinde
kendini bulup bulup yitirmesi gibi
anla??lmaz, ula??lmaz...
2013 May 15
2
Support for "ssh-rsa-sha256" and "ssh-dss-sha256" ?
Functionality request for supporting Digital Signatures for RSA and DSS
Public Key Algorithms in alignment with NIST SP800-131A.
I
assume this has been asked before, but I could not find in the
archives. Support of "ssh-rsa-sha256" and "ssh-dss-sha256" public key
algorithms for OpenSSH? I know Suite B Algorithms and x509 SSH
Extension Algorithms are supported, but not a
2008 Jul 23
10
[Bug 1490] New: sshd -T reports a string of UNKNOWNs
https://bugzilla.mindrot.org/show_bug.cgi?id=1490
Summary: sshd -T reports a string of UNKNOWNs
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.1p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: minor
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at
2008 Jul 23
10
[Bug 1490] New: sshd -T reports a string of UNKNOWNs
https://bugzilla.mindrot.org/show_bug.cgi?id=1490
Summary: sshd -T reports a string of UNKNOWNs
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.1p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: minor
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at
2010 Jan 28
1
Possible issue with stdio forwarding
Greetings,
I've been doing a little testing with the stdio forwarding support added
in recent snapshots and have encountered one possible issue. First, I
should say that this feature generally seems to work. However, I haven't
been able to get it to work when connecting to a server running
SSH.COM's product.
The config file I am using is fairly simple:
Host sfe1
LogLevel debug3
2002 Jan 03
3
[PATCH] Improving sftp client performance
The included patch for openssh 3.0.2p1 implements overlapping read
requests for the sftp client. It should be able to handle weird cases
such as shriking files and reordered responses. This is only the first
shot, and I'd be happy for any comments. I plan to implement something
similar for the write path if this works out well.
The maximum number of outstanding requests is quite high at
2012 May 12
0
[Bug 2007] New: The literal string ${prefix}/bin appears in the user PATH under some circumstances
https://bugzilla.mindrot.org/show_bug.cgi?id=2007
Bug #: 2007
Summary: The literal string ${prefix}/bin appears in the user
PATH under some circumstances
Classification: Unclassified
Product: Portable OpenSSH
Version: 6.0p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
2007 Jun 01
2
Need to sftp with automatic login from 1 aix machine to another, the id on the target is a DCE(DFS) id
Hi,
I had a question and can not find out on the web where anyone might have
done this. I am sftping
between one AIX machine and another using automatic login. I have created
the id_rsa.pub on the
source server and added it to the /.ssh/authorized_keys file on the target
server. The problem we
are having seems to be that because the target id is a DCE(DFS) id and it's
home directory is
2020 Aug 28
3
[Bug 1458] New: Consider allowing for variable interpolation
https://bugzilla.netfilter.org/show_bug.cgi?id=1458
Bug ID: 1458
Summary: Consider allowing for variable interpolation
Product: nftables
Version: unspecified
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: nft
Assignee: pablo at netfilter.org
2013 May 15
0
Support for "ssh-rsa-sha256" and "ssh-dss-sha256" ?
Functionality request for supporting Digital Signatures for RSA and DSS Public Key Algorithms in alignment with NIST SP800-131A.
I assume this has been asked before, but I could not find in the archives. Support of "ssh-rsa-sha256" and "ssh-dss-sha256" public key algorithms for OpenSSH? I know Suite B Algorithms and x509 SSH Extension Algorithms are supported, but not a
2011 May 21
1
OpenVAS Vulnerability
Hi,
Please advice me about the below reported vulnerability.
High
OpenSSH X Connections Session Hijacking Vulnerability
Risk: High
Application: ssh
Port: 22
Protocol: tcp
ScriptID: 100584
Overview:
OpenSSH is prone to a vulnerability that allows attackers to hijack
forwarded X connections.
Successfully exploiting this issue may allow an attacker run arbitrary
shell commands with the privileges
2005 Dec 07
4
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131
Summary: buffer_append_space: alloc not supported Error with V
4.2p1
Product: Portable OpenSSH
Version: 4.2p1
Platform: Sparc
OS/Version: Solaris
Status: NEW
Keywords: help-wanted
Severity: normal
Priority: P3
Component: sftp
2015 Jun 02
1
[Bug 2302] with DH-GEX, ssh (and sshd) should not fall back to unconfigured DH groups or at least document this behaviour and use a stronger group
https://bugzilla.mindrot.org/show_bug.cgi?id=2302
--- Comment #13 from Darren Tucker <dtucker at zip.com.au> ---
(In reply to Christoph Anton Mitterer from comment #10)
[...]
> Even though an attacker cannot (AFAIU??) for a connection to
> downgrade to the weaker groups,
The server's DH-GEX exchange hash includes the DH group sizes it
received from the client. If these are
2007 Feb 03
3
Unablce to open VNC
I have vnc working on my server when I am logged into that server. If I
run vncviewer, I have a copy of the Desktop. Hwever, if I SSH into the
server, I get an error. Due to my lack of experience, I am not sure
what the log file means:
http://209.204.172.137/misc/vnc_error.txt
Could someone tell me what I am missing?
Todd
--
Ariste Software
2200 D Street Ext
Petaluma, CA 94952
(707)
2009 Feb 12
2
[patch 1/3] add protocol extension to ATTR message
This patch adds all the missing commonly used UNIX attributes: st_dev,
st_ino, st_nlink, st_rdev, st_blocks, st_blksize, st_ctime. In
addition it extends st_atime and st_mtime to 64bits, and adds
nanosecond resolution to all three timestamps.
This is implemented as an extension to the ATTR message. This patch
alone is sufficient for SSHFS to be able to use these attributes. The
following two
2003 May 31
11
[Bug 581] SFTP "ls" listings never end
http://bugzilla.mindrot.org/show_bug.cgi?id=581
Summary: SFTP "ls" listings never end
Product: Portable OpenSSH
Version: -current
Platform: Alpha
OS/Version: OSF/1
Status: NEW
Severity: major
Priority: P2
Component: sftp-server
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2008 Mar 13
0
[Fwd: Re: OpenSSH and X.509 Certificate Support]
Hi Roumen,
I discovered that the need of appending the .pub part of id_rsa(client
key+cert) on the server can be eliminated by adding the Certificate Blob
to authorized_keys which could look something like this:
x509v3-sign-rsa subject=
/C=FR/ST=PARIS/L=DESEl/O=SSL/OU=VLSI/CN=10.244.82.83/emailAddress=client at company.com
This is extracted from the client certificate using openssl as