Displaying 20 results from an estimated 5000 matches similar to: "[Bug 1674] New: Log ~/.ssh/authorized_keys comments when using LogLevel=VERBOSE"
2009 Aug 04
0
[PATCH] Log ~/.ssh/authorized_keys comments when using LogLevel=VERBOSE
Hi,
Attached is a patch to log key comments upon successful login. It just
adds them to the already existing verbose() call. I find it useful e.g.
on shared accounts where it's sometimes not enough to have the key
fingerprint in the log file.
Can this be applied?
--
Fernando Vezzosi
qw(MDAx MTAw MDEw MDEx MDAw _5 MTEw _6 _1 _5 _5 _4 _2 _2 _6
MTEx _1 _5 _5 _4 _5 _2 _6
2010 Oct 13
3
Routing local generted packets with fwmark
Hi all,
I need to route local generated packages depending on which tcp or udp
service I need to use. To accomplish this I have configured two routing
tables:
[root at lothlorien ~]# ip ru ls
0: from all lookup 255
32762: from all fwmark 0x2 lookup FirstLan
32763: from all fwmark 0x1 lookup SecondLan
32764: from 172.25.80.10 lookup SecondLan
32765: from 172.25.70.18 lookup FirstLan
2010 Mar 01
2
[Bug 1720] New: would be nice if authorized_keys(5) existed
https://bugzilla.mindrot.org/show_bug.cgi?id=1720
Summary: would be nice if authorized_keys(5) existed
Product: Portable OpenSSH
Version: 5.3p1
Platform: Other
URL: http://bugs.debian.org/441817
OS/Version: Linux
Status: NEW
Severity: enhancement
Priority: P2
Component: Documentation
2017 Feb 16
1
[Bug 2678] New: PubKey Authentication fails when more than one user/group ACL is set on any Path component to authorized_keys
https://bugzilla.mindrot.org/show_bug.cgi?id=2678
Bug ID: 2678
Summary: PubKey Authentication fails when more than one
user/group ACL is set on any Path component to
authorized_keys
Product: Portable OpenSSH
Version: 5.3p1
Hardware: amd64
OS: Linux
Status: NEW
2010 Apr 29
12
[Bug 1765] New: Error message if key not first in authorized_keys file
https://bugzilla.mindrot.org/show_bug.cgi?id=1765
Summary: Error message if key not first in authorized_keys file
Product: Portable OpenSSH
Version: 5.5p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
2013 Apr 03
1
Problem with integrate function
Hello,
The following code of mine is giving the error:
Error in integrate(fx[[2]], 0.056, 1) :
maximum number of subdivisions reached
Can anyone help?
Thanks and Regards.
Swagato
--------------------------
fv<-vector("list")
fx<-vector("list")
v<-0
c<-0
n<-0
NOV<-0
i<-0
while(n<200){
fv[[1]]<-function(x)1 #prior function
2010 Mar 12
1
Usage of apply function with two matrices
Hello,
I am struggling to overcome following problem:
I have matrix Vf and matrix V, which both have 3 columns and I want to
create a spline function basing on coordinates from this matrices (more
precisely coordinates of function nr 1: x are taken from Vf[,1] and y are
taken from V[,1] respectively), because function apply() base on 1 argument
I made it in this way:
2006 Dec 10
1
Noncentral t & F distributions
Dear List:
The square of the noncentral t-statistic with noncentrality parameter
\delta is a noncentral F with noncentrality parameter \lambda=\delta^2.
So, t^2_{\nu,\delta} = F_{1,\nu,\lambda=\delta^2}. Consequently, it
should follow that t^2_{1-\alpha/2,\nu,\delta} =
f_{1-alpha,1,\vu,\lambda=\delta^2}. However, this is not what is
happening with the following code. The central
2007 Jul 13
1
Cygwin: store authorized_keys in /etc/ssh/user/authorized_keys?
Hi folks,
If I try to login on a Cygwin host via ssh, then my
.ssh on a network drive is unaccessible until I login.
I have to enter my password, even if my authorized_keys
would allow me to login without. This is fatal, since it
forces me to use an interactive session for working on a
Windows host. Unusable for automatic builds and tests
managed from a central machine, for example.
There is no
2012 Sep 14
5
[Bug 2042] New: Troubleshooting information should be logged when sshd doesn't have permission to read user's authorized_keys file
https://bugzilla.mindrot.org/show_bug.cgi?id=2042
Priority: P5
Bug ID: 2042
Assignee: unassigned-bugs at mindrot.org
Summary: Troubleshooting information should be logged when sshd
doesn't have permission to read user's authorized_keys
file
Severity: enhancement
Classification: Unclassified
2009 Jun 16
2
there should be an authorized_keys(5) man page
Hi.
On
http://openssh.org/manual.html
I think there should be
authorized_keys(5)
known_hosts(5)
Can an authorized_keys entry say something like
from=192.168.1.32,192.168.1.33 command=/bin/foo ...
or do I need to make a separate entry for each IP address?
Thanks
Dave
2011 Oct 18
2
Non-linear maximization function in R
Hello,
# Full disclosure. I am not sure if my problem is a bug(s) in the code, or a
fundamental misunderstanding on my part about what I am trying to do with
these statistics. I am not familiar with maximum likelihood tests.
# I currently have two vectors
Aequipecten<-c(0, 0, 1, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0,
0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 1, 0, 0, 0, 0, 0, 0, 0,
2003 Aug 19
3
splitting big authorized_keys files
Hello everybody,
I have a problem. You may have the answer :-)
I'd like to use openssh for an authentication service.
But that gives me a user, whose ~/.ssh/authorized_keys file has about 15000
entries.
With about 300 characters per line I'd get 4,5 MB of data.
I believe that this length of file could lead to performance issues; so I'm
looking for solutions.
I already saw the
2002 Apr 17
0
[Bug 220] New: sshd fails to read other users authorized_keys over nfs as root
http://bugzilla.mindrot.org/show_bug.cgi?id=220
Summary: sshd fails to read other users authorized_keys over nfs
as root
Product: Portable OpenSSH
Version: 3.0.2p1
Platform: All
URL: http://www.hut.fi/cc/
OS/Version: All
Status: NEW
Severity: major
Priority: P1
Component:
2011 Dec 15
3
Retrieving authorized_keys via remote script
Here's a simple patch which retrieves authorized_keys via exec'ing a
program, rather than reading a flat file.
I added a simple option, AuthorizedKeysExec, to sshd_config which simply
executes the respective file, passing the username as argv[1].
Keys are returned via stdout.
Notes:
If AuthorizedKeysExec is set and an authorized_keys file exists,
checking the existing authorized_keys
2002 Apr 07
0
missing corner case in authorized_keys?
I've written up a little HOWTO on how I set up my CVS server to allow
anonymous access via ssh. I did it a little bit differently than the
method documented by Theo and crew. Where their login shell has a lot
of stuff in it, mine is a simple execle() statement. Url is here:
http://reactor-core.org/#code
After following the steps outlined in the HOWTO, I came across the
following
2004 Mar 10
1
MAN pages: authorized_keys
Howdy,
I would like to suggest a change in the ssh documentation for the
use of authorized_keys. The man page states:
This file is not highly sensitive, but the recommended permissions are
read/write for the user, and not accessible by others.
I'm may be knit picking, but it could be read that, while not
recommended, it is possible to allow access to the authorized_keys file
to other
2009 Oct 31
2
authorized_keys command=""
Hello,
as I have read manual, if I use in file authorized_keys option
command="" with some command, no other commands will be permitted. I
have tried it, created authorized_keys2 for root and added there
command="rdiff-backup --server" and after that tried to login. Thit
command was executed, but I was normally able to supply other comand
as root. Can you tell me why?
Thank
2006 Jan 19
3
ownership of authorized_keys
Hi,
I would like to make it impossible for users to change the
contents of the authorized_keys-file.
I just found out about the sshd_config setting:
AuthorizedKeysFile /etc/ssh/authorized_keys/%u
But even in that case that file has to be owned by the user,
unless I set ``StrictModes no'' which would allow other
nastyness. I would like to request that that file could also be
owned by
2013 Jul 15
3
[Bug 2128] New: ssh-copy-id doesn't check if a public key already exists in a remote servers ~/.ssh/authorized_keys file
https://bugzilla.mindrot.org/show_bug.cgi?id=2128
Bug ID: 2128
Summary: ssh-copy-id doesn't check if a public key already
exists in a remote servers ~/.ssh/authorized_keys file
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Other
Status: NEW
Severity: enhancement