Displaying 20 results from an estimated 40000 matches similar to: "[Bug 1619] New: unable to fetch the files from remote server"
2007 Dec 19
4
[Bug 1405] New: scp: pattern-driven copying process
https://bugzilla.mindrot.org/show_bug.cgi?id=1405
Summary: scp: pattern-driven copying process
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.7p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: scp
AssignedTo: bitbucket at mindrot.org
2007 Jun 11
3
[Bug 1321] New: sshd connection refused
http://bugzilla.mindrot.org/show_bug.cgi?id=1321
Summary: sshd connection refused
Product: Portable OpenSSH
Version: 4.6p1
Platform: UltraSparc
OS/Version: Solaris
Status: NEW
Severity: major
Priority: P2
Component: ssh
AssignedTo: bitbucket at mindrot.org
ReportedBy: annette.brady at
2023 Jan 05
6
[Bug 3518] New: Skip scp transfer over multiplexed connection if there's no scp on remote path as scp3 test did
https://bugzilla.mindrot.org/show_bug.cgi?id=3518
Bug ID: 3518
Summary: Skip scp transfer over multiplexed connection if
there's no scp on remote path as scp3 test did
Product: Portable OpenSSH
Version: 9.1p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
2016 May 08
4
Dynamic Remote Port forward?
On Sun, May 8, 2016 at 9:04 PM, Markus Friedl <mfriedl at gmail.com> wrote:
> I have an ugly patch for that feature that requires protocol modification.
Why does it require a protocol modification? Couldn't the client
request regular forwarded-tcpip from the server then decode SOCKS
entirely within the client?
--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9
2004 Aug 27
2
OpenSSH-3.9p1 permanently_set_uid behavior on Linux
Aloha,
I'm curious about the following code at line 203 in uidswap.c:
/* Try restoration of GID if changed (test clearing of saved gid) */
if (old_gid != pw->pw_gid &&
(setgid(old_gid) != -1 || setegid(old_gid) != -1))
fatal("%s: was able to restore old [e]gid", __func__);
This causes permanently_set_uid to fail in the following case:
$ su
Password: ????????
#
2015 Feb 27
2
remote-remote scp
Hi everyone,
I know scp is kind of the red-headed stepchild of the suite, but I'd like to propose an extension to the syntax for remote-remote passthrough using the "-3" option.
Currently the syntax is essentially
scp -3 [ -P port ] [user@]host1:file [user@]host2:file
This is great, as long as both remotes are on the same port. It causes difficulties if host1 and host2 are not
2020 Jan 11
7
Why are the arguments supplied for the command run through ssh interpreted by shell before they are passed to the command on the server side?
On 2020-01-11 01:38, Darren Tucker wrote:
> The command you give is always handled on the server by your shell in some
> fashion. It has to be, because SSH only specifies an opaque string for the
> remote command, so without doing so you would not be able to specify
> arguments at all.
It's not obvious why does it have to be this way. ssh sends the command
as an array of
2010 Nov 09
15
[Bug 1837] New: scp fails key auth/connection on second host when two remote paths are specified
https://bugzilla.mindrot.org/show_bug.cgi?id=1837
Summary: scp fails key auth/connection on second host when two
remote paths are specified
Product: Portable OpenSSH
Version: 5.3p1
Platform: All
OS/Version: All
Status: NEW
Severity: minor
Priority: P4
Component: scp
AssignedTo:
2010 Jul 16
8
[Bug 1799] New: Unable to login through PAM on Solaris 8 x86 due to PAM_TTY
https://bugzilla.mindrot.org/show_bug.cgi?id=1799
Summary: Unable to login through PAM on Solaris 8 x86 due to
PAM_TTY
Product: Portable OpenSSH
Version: 5.5p1
Platform: ix86
OS/Version: Solaris
Status: NEW
Severity: major
Priority: P2
Component: PAM support
AssignedTo:
2003 Aug 06
6
ssh_exchange_identification: Connection closed by remote host
Hello,
I encountered the following problem while I typing "ssh -v <host_name>"
"
hkmarmmspd:/export/home/hkcheung> ssh -v hkmauat
OpenSSH_3.6.1p1, SSH protocols 1.5/2.0, OpenSSL 0x0090701f
debug1: Reading configuration data /usr/local/etc/ssh_config
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: Connecting to hkmauat [172.28.68.52]
2024 Aug 30
1
Unable to build OpenSSH-9.8p1 with custom SSL
On Fri, 30 Aug 2024 at 09:58, radiatejava <radiatejava at gmail.com> wrote:
> I am trying to build OpenSSH 9.8p1 with my SSL installed at
> /opt/customssl, but it fails. It fails at the configure cmd itself. It
> does not seem to be honor --with-ssl-dir=/opt/customssl option. What
> could be the issue here?
Assuming your custom thing is API compatible, the usual reason for
this
2003 Oct 02
1
Permission denied (publickey,password,keyboard-interactive)
Hello,
I have recently downloaded and compiled openssh-3.7.1p2 on both HP-UX
10.20 and HP-UX 11.00. The compile went fine. Logging in on the system
used for the build works fine. However, logging in on a different
system (where the newly compiled openssh is installed) results in the
following error:
Permission denied (publickey,password,keyboard-interactive).
I have tried several things I
2004 Mar 16
1
ssh timeout
Hello,
I am wondering if there is any way I can get ssh to timeout (return) if
nothing is entered when prompted for a password? I understand there is
a LoginGraceTime value that can be used in the sshd_config file, but
that still doesn't make ssh return (exit) when no password is ever
entered. The command just hangs until a <return> is pressed. Is there
any way to make it return
2015 May 02
10
[Bug 2392] New: unable to ssh with umac has algorithm. error:Disconnecting packet:corrupted MAC on input.
https://bugzilla.mindrot.org/show_bug.cgi?id=2392
Bug ID: 2392
Summary: unable to ssh with umac has algorithm.
error:Disconnecting packet:corrupted MAC on input.
Product: Portable OpenSSH
Version: 5.0p1
Hardware: PPC
OS: Linux
Status: NEW
Severity: critical
Priority: P5
2012 Dec 23
8
[Bug 2054] New: Environment fails to provide cryptographic identity of remote party
https://bugzilla.mindrot.org/show_bug.cgi?id=2054
Bug ID: 2054
Summary: Environment fails to provide cryptographic identity of
remote party
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.9p1
Hardware: All
OS: All
Status: NEW
Keywords: low-hanging-fruit,
2012 Jun 21
2
[Bug 2020] New: Remote-to-remote copying doesn't work when second host not on port 22
https://bugzilla.mindrot.org/show_bug.cgi?id=2020
Bug #: 2020
Summary: Remote-to-remote copying doesn't work when second host
not on port 22
Classification: Unclassified
Product: Portable OpenSSH
Version: 6.0p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
2009 Mar 06
20
[Bug 1567] New: Insufficient privileges to chroot() on AIX
https://bugzilla.mindrot.org/show_bug.cgi?id=1567
Summary: Insufficient privileges to chroot() on AIX
Product: Portable OpenSSH
Version: 5.2p1
Platform: PPC
OS/Version: AIX
Status: NEW
Severity: major
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy: bana
2014 Jul 15
8
[Bug 2255] New: tunneling with -W does not report non 0 exit codes on failure even with ExitOnForwardFailure=yes
https://bugzilla.mindrot.org/show_bug.cgi?id=2255
Bug ID: 2255
Summary: tunneling with -W does not report non 0 exit codes on
failure even with ExitOnForwardFailure=yes
Product: Portable OpenSSH
Version: 6.6p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: normal
Priority:
2006 Sep 19
5
weird DH problems
Dear Damien and Darren,
I recently ran into a really weird and spooky ssh problem. My brain is going to mad trying to explain that it is a hardware issue since on two machines, one of which is a Celeon 2.8 Ghz with 1 GB RAM, another is a Xeon 4 CPU box with 3 Gig RAM and I guess 3 Ghz or something, both of which are running FreeBSD 6.1 with latest version of OpenSSH bundled with it. The version
2010 Dec 09
7
[Bug 1843] New: ssh should mention ssh-keyscan in remote host fingerprint warning
https://bugzilla.mindrot.org/show_bug.cgi?id=1843
Summary: ssh should mention ssh-keyscan in remote host
fingerprint warning
Product: Portable OpenSSH
Version: 5.6p1
Platform: All
OS/Version: All
Status: NEW
Severity: minor
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs