similar to: [Bug 1476] New: .ssh/known_hosts does not save port number

Displaying 20 results from an estimated 2000 matches similar to: "[Bug 1476] New: .ssh/known_hosts does not save port number"

2005 Apr 21
11
[Bug 910] known_hosts port numbers
http://bugzilla.mindrot.org/show_bug.cgi?id=910 djm at mindrot.org changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |foomzilla at fuhm.net ------- Additional Comments From djm at mindrot.org 2005-04-21 18:16 ------- *** Bug 454 has been marked as a
2005 Jan 12
1
OpenSSH-39 not sending syslog msges to proper files
Hello All, My testing of OpenSSH-39 compiled with tcp_wrappers in hpux 11.11 and hpux 11.23 points that sshd is NOT sending the syslog details properly to specified files. This happens when I set the syslogfacility as local7 and Log Level as INFO for sshd. However OpenSSH -38 works correctly for the same setting. I denied a host in /etc/hosts.deny and sshd should send a message "refused
2008 Aug 05
1
rsync problem after ssh upgrade
Hello. In my setup I collected logs from many hosts using ssh + rsync. It worked fine untill I upgraded OpenSSH from version 5.0p1 to 5.1p1 on those hosts running Slackware Linux. After upgrade nothing works as before. When I try to get logs connection breaks with the following message in syslog on the server side: Aug 4 15:34:44 srvhost sshd[8130]: Accepted publickey for user from
2005 Aug 27
1
better than sapply
I have the following two mapping data frames (r) and (h). I want to fill teh value of r$seid with the value of r$seid where r$cid==h$cid. I can do it with sapply as such: > r$seid = sapply(r$cid, function(cid) h[h$cid==cid,]$seid) Is ther a better (faster) way to do this? > r <- data.frame(seid=NA, cid= c(2181,2221,2222)) > r seid cid 1 NA 2181 2 NA 2221 3 NA
2020 Sep 30
3
Human readable .ssh/known_hosts?
On Tue, 29 Sep 2020 at 23:16, Nico Kadel-Garcia <nkadel at gmail.com> wrote: [...] > I gave up on $HOME/.ssh/known_hosts a *long* time ago, because if > servers are DHCP distributed without static IP addresses they can wind > up overlapping IP addresses with mismatched hostkeys You can set CheckHostIP=no in your config. As long as the names don't change it'll do what you
2003 Jun 20
1
[PATCH] accepting changed hostkeys
Hi, I often change the machines (and thus the hostkeys) that are on a IP (a service environment with a IP assinged for the machine to test). So every time I want to connect to a new machine I have to delete the previous key from the known_hosts file. Since I got tired of running a remove script manually, I made this small patch which adds the possibility to replace the real key with the
2006 Feb 15
3
[Bug 1158] Setting the environment in authorized_keys does not work
http://bugzilla.mindrot.org/show_bug.cgi?id=1158 Summary: Setting the environment in authorized_keys does not work Product: Portable OpenSSH Version: 3.9p1 Platform: ix86 OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: bitbucket at mindrot.org
2010 Jan 12
5
Drop last numeral
Hello all, Frustrated and i know you can help I need to drop the last numeral of each of my values in my data set. So for the following i have tried the ?substring but since i have to specify the length, but because my data are of varying lengths it doenst work so well Data<-c("1131", "1132", "1731" ,"1732" ,"1821" ,"1822",
2002 Jun 14
10
Opposite of Samba (Anti-Samba?)
Is there a package to do the opposite of Samba? I.e. I want to use (mount) Win filesystems from a Unix client. -- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Rick von Richter Production Support Manager Voice: 858-831-2222 rickv@mwh.com Maintenance Warehouse/Home Depot Fax: 858-831-2221
2013 Nov 11
4
[Bug 2169] New: command to remove outdated hostkey from known_hosts file wrong
https://bugzilla.mindrot.org/show_bug.cgi?id=2169 Bug ID: 2169 Summary: command to remove outdated hostkey from known_hosts file wrong Product: Portable OpenSSH Version: 6.2p1 Hardware: Other OS: Linux Status: NEW Severity: minor Priority: P5 Component: ssh
2002 Sep 10
8
[Bug 393] 'known_hosts' file should be indexed by IP:PORT, not just IP
http://bugzilla.mindrot.org/show_bug.cgi?id=393 markus at openbsd.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |INVALID ------- Additional Comments From markus at openbsd.org 2002-09-11
2005 Dec 10
2
known_hosts and multiple hosts through a NAT router
The .ssh/known_hosts table cannot handle reaching different sshd servers behind a NAT router. The machines are selected by having the SSHDs respond to differnt ports. A second request would be to allow known_hosts checking solely on the dns name, wildcarding the IP address. This would be useful to avoid continuously warning the user every time you connect to a machine with a changing IP address
2005 Feb 08
11
[Bug 1476] Unexplained timout at end of file transfer.
https://bugzilla.samba.org/show_bug.cgi?id=1476 abartlet@samba.org changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |abartlet@samba.org Status|RESOLVED |REOPENED Resolution|WORKSFORME | -------
2002 May 19
0
using full ip/tcp address in known_hosts
Hello, What about using the full ip/tcp address in known_hosts? I have two hosts at (sample addresses): 192.168.0.1:22 192.168.0.1:2222 When I connect to the first one everything is OK, but if I connect to the second one I get: @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
2004 Aug 05
0
[Bug 910] known_hosts port numbers
http://bugzilla.mindrot.org/show_bug.cgi?id=910 Summary: known_hosts port numbers Product: Portable OpenSSH Version: 3.7.1p2 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo: openssh-bugs at mindrot.org ReportedBy: devin.nate at
2006 Oct 31
2
Running two sshd's
Hi all, I'm wondering whether it is feasible or not to run two distinct sshd daemons with different config options! I have a CentOS 4.4 gateway with 2 Ethernet interfaces. One is connected to the Internet and the other to the LAN. Basically, what I would like to do is having a sshd that listens to the LAN interface with password enabled auth. and a sshd bound to the Internet interface with
2013 Mar 14
3
ERROR: Unknown signalling method ss7
Hi all I installed DAHDI Version - 2.6.1 DAHDI Tools Version - 2.6.1 libss7-trunk Asterisk 11.0.1 from source on Fedora 12 x86_64. Now i`m unable to load chan_dahdi and libss7: myserver*CLI> module load chan_dahdi.so ?ERROR[10124]: chan_dahdi.c:17842 process_dahdi: Unknown signalling method 'ss7' at line 37. myserver*CLI> module load libss7.so Unable to load module libss7.so
2005 May 26
1
Asterisk con X-lite : Register Ok but no calls (404 Not found)
Hi all, I'm working on an implementation of VoIP en Linux. I have a Debian Suse (*.*.*.173) with an * and a X-lite client and a Red Hat 9.0 (*.*.*.172) with another softphone X-lite. Both of the softphones are registering and appear in the peers (sip show peers) with the good parameters of address and port. If I try to make a call, * receive the INVITE request and send a 404 NOT FOUND answer.
2016 Jan 04
4
Forwarding call if extension busy
Hi and happy new year! My question: - two extensions: 1111 and 2222 - an active call on 1111 - incoming calls to 1111 should be forwarded to 1111 (call advice!) and 2222 I know how can I forward an incoming call to more than an extension, but I have no idea how can I get the information, that 1111 has already an active call... I think, I need something like: exten =>
2004 Sep 15
1
Sending IAX2 calls back to a registered client
Greetings folks; I guess I must be missing something, because for the life of me I can't seem to make this work. I have remote clients connecting to Asterisk using IAX2, these clients have changing IPs so we're using the useful register tool. The client can call out successfully, that's not an issue at all. Calling coming from the server to the client, however, do not appear to go