Displaying 20 results from an estimated 3000 matches similar to: "[Bug 1506] New: rationalize agent behavior on smartcard removal/reattachment"
2008 Jul 31
5
[Bug 1498] New: OpenSC smartcard access should use raw public keys, not X.509 certificates
https://bugzilla.mindrot.org/show_bug.cgi?id=1498
Summary: OpenSC smartcard access should use raw public keys,
not X.509 certificates
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.1p1
Platform: Other
OS/Version: Linux
Status: NEW
Keywords: patch
Severity: normal
2012 Feb 22
1
[Bug 1984] New: Add Unix Domain Socket Forwarding
https://bugzilla.mindrot.org/show_bug.cgi?id=1984
Bug #: 1984
Summary: Add Unix Domain Socket Forwarding
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.9p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
AssignedTo:
2016 Mar 29
3
request: add IP address to a log message to allow blocking
On Tue 2016-03-29 18:10:00 -0400, Damien Miller wrote:
> On Tue, 29 Mar 2016, IMAP List Administration wrote:
>> If you haven't already, an you please add the IP address to this message, and
>> any similar messages? I'm using version 6.7p1.
>
> I actually added that recently. It will be in openssh-7.3, due in a
> couple of months.
Will it be configurable? There
2010 Jun 09
5
[Bug 1777] New: KnownHostsCommand
https://bugzilla.mindrot.org/show_bug.cgi?id=1777
Summary: KnownHostsCommand
Product: Portable OpenSSH
Version: 5.5p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy: dkg at fifthhorseman.net
A
2010 Aug 23
3
[Bug 1808] New: "SetupCommand" invoked before connecting
https://bugzilla.mindrot.org/show_bug.cgi?id=1808
Summary: "SetupCommand" invoked before connecting
Product: Portable OpenSSH
Version: 5.6p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at mindrot.org
2010 Apr 19
3
[Bug 1759] New: allow display of bubblebabble fingerprint when connecting
https://bugzilla.mindrot.org/show_bug.cgi?id=1759
Summary: allow display of bubblebabble fingerprint when
connecting
Product: Portable OpenSSH
Version: -current
Platform: All
URL: http://bugs.debian.org/578422
OS/Version: Linux
Status: NEW
Severity: enhancement
Priority: P2
2015 Nov 10
4
[Bug 2493] New: Accept host key fingerprint as the same as 'yes'
https://bugzilla.mindrot.org/show_bug.cgi?id=2493
Bug ID: 2493
Summary: Accept host key fingerprint as the same as 'yes'
Product: Portable OpenSSH
Version: 6.9p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee:
2011 Feb 24
3
[Bug 1871] New: ssh-askpass should be able to distinguish between a prompt for confirmation and a prompt for an actual passphrase
https://bugzilla.mindrot.org/show_bug.cgi?id=1871
Summary: ssh-askpass should be able to distinguish between a
prompt for confirmation and a prompt for an actual
passphrase
Product: Portable OpenSSH
Version: 5.8p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
2011 Nov 21
3
ssh-keygen -r should support SSHFP records for ECDSA (or at least return non-zero error code on failure)
hi folks:
it looks like ssh-keygen -r can''t export SSHFP records for ECDSA keys:
0 dkg@pip:/tmp/cdtemp.oiRYAS$ ssh-keygen -f foobar -t ecdsa -q -P ''''
0 dkg@pip:/tmp/cdtemp.oiRYAS$ ssh-keygen -r foobar -f foobar.pub
export_dns_rr: unsupported algorithm
0 dkg@pip:/tmp/cdtemp.oiRYAS$
the first number in my prompt is the return code of the last command;
note that
2015 Feb 06
4
Creating users "on - the - fly"
I guess I didn't want to litter the users table either - it just seems
"wrong" to be actually adding things to the host when it is really so
transient. It feels like it should be LDAP-ish. Just ask the server
for the keys and do a one-off authentication. But I've seen even LDAP
creates the user directories.
I see that 2.6 kernels can have some 4B users, which should last me a
2015 Feb 06
2
Re: Creating users "on - the - fly"
On Fri 2015-02-06 14:30:13 -0500, Cary FitzHugh wrote:
> Hence - maybe a NSS User Database extension which looks for the
> public keys from a webservice (and then maybe writes them to
> /tmp/<username>.
No, i'm suggesting that when you want to look up the user, use NSS to
find the username and map it to a numeric user ID and the other
information that is typically found in
2011 Feb 24
6
[Bug 1869] New: ssh-add can no longer read from FIFOs as of 5.7p1
https://bugzilla.mindrot.org/show_bug.cgi?id=1869
Summary: ssh-add can no longer read from FIFOs as of 5.7p1
Product: Portable OpenSSH
Version: 5.8p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh-add
AssignedTo: unassigned-bugs at mindrot.org
2005 Oct 05
2
ssh-agent add PKCS#11 support
Hello,
PKCS#11 is a standard API interface that can be used in
order to access cryptographic tokens. You can find the
specification at
http://www.rsasecurity.com/rsalabs/node.asp?id=2133, most
smartcard and other cryptographic device vendors support
PKCS#11, opensc also provides PKCS#11 interface.
I can easily make the scard.c, scard-opensc.c and
ssh-agent.c support PKCS#11.
PKCS#11 is
2013 May 16
1
[Bug 1545] ssh-keygen -R removes all comments from known_hosts file
https://bugzilla.mindrot.org/show_bug.cgi?id=1545
Daniel Kahn Gillmor <dkg at fifthhorseman.net> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |dkg at fifthhorseman.net
--- Comment #15 from Daniel Kahn Gillmor <dkg at fifthhorseman.net> ---
2015 Jan 15
3
OpenSSH v6.7 & NumberOfPasswordPrompts Option ...
Yes, I have tried that option with no difference in behavior. It seems it ignores that option when provided. Just for reference, I am building it on RedHat 5. I have never had this issue on any previous version of OpenSSH. I use the default configuration with only the changes specified in the RHEL 5 STIG applied.
I appreciate the security advice. The root account was indicated simply as an
2016 Feb 04
3
Unix socket support for sshd
Greetings everyone!
I would like to know if adding support for Unix socket to sshd would be a
feature that would be consider to be added upstream? (ListenAddress).
One of the main reason for this question to you all is that tor now has Unix
socket support for hidden services that is traffic of a hidden service can be
forwarded to a Unix socket (see HiddenServicePort in tor.1). The rationale
2009 Oct 22
39
[Bug 1663] New: Allow to use agent for distribution of public keys.
https://bugzilla.mindrot.org/show_bug.cgi?id=1663
Summary: Allow to use agent for distribution of public keys.
Product: Portable OpenSSH
Version: 5.3p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
2016 Aug 08
3
ssh(d) identification string in portable (clarification)
Hello all,
We got a report [1], that we miss "p1" suffix in the sshd identification
strings in Fedora. I dig in and found out that it is also missing from
portable usptream since 2004, when you were rewriting version.h header
file with this information.
Debian somehow patched this information back during the time in some
places (ssh_api.c is missing).
It does not look like
2003 May 08
3
get_pin for scard-opensc.c
I'm attaching a patch to allow ssh client to get a pin from the command line
when using a smartcard. Most of it is from a patch by Danny De Cock
<godot () ulyssis ! org>, but I've used the ssh read_passphrase function
instead. Any errors are mine, I'm sure.
This enables ssh -I 0 to use a pin-protected smartcard via opensc.
Thanks,
Kevin Stefanik
-------------- next part
2007 Jan 31
2
Patch to fix the 255 status code problem
Hi,
Currently using openssh-4.5p1 on Solaris 8 in conjunction with Oracle 8i
dataguard. Is there a patch available to prevent ssh returning status
code 255 for a successful execution of a remote connection/command.
Many Thanks,
Tim Mann