Displaying 20 results from an estimated 9000 matches similar to: "[Bug 430] Could add option to sftp-server to disable write access"
2013 Jun 04
1
[PATCH] add restricted mode to sftp-server
Hello.
These patches add a new mode of operation for the sftp server.
It is located between the ordinary, unrestricted mode and read-only mode.
It allows you to add files to the server, but only if these files do
not exist on the server before.
Changes to existing files - are prohibited.
Please review them, maybe these patches will be useful not only to me.
Thank you.
-------------- next part
2006 Oct 09
1
About sftp-server root path
Hi,
I saw in archive that some people made a patch to sftp-server, and that patch
sets a root path.
I'd like to know if there's an ideia to apply that patch in main tree of
openssh?
With the use of SSHFS [wich uses sftp-server], it would be interesting to
have someting like that, because as we have netboot workstations, the access
to devices [such as, floppy, cdrom and usb data] are
2017 Feb 20
3
[Bug 2681] New: postauth processes to log via monitor
https://bugzilla.mindrot.org/show_bug.cgi?id=2681
Bug ID: 2681
Summary: postauth processes to log via monitor
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2024 Apr 25
1
[PATCH] Enable ssh_config to set LogPath option (-E)
ssh client has the ability to set the destination of debug logs via the `-E` flag. ssh_config lacks an equivalent keyword to set the same option via configs.
This patch follows the same semantics of other `*Path` type keywords and creates a new ssh_config keyword `LogPath`.
[0] Bugzilla: https://bugzilla.mindrot.org/show_bug.cgi?id=3683
[1] GitHub PR:
2007 Jun 18
0
[PATCH] sftp-server argument error handling
When you give sftp-server a bogus -l or -f parameter, it logs a useful
error message then blunders on to call log_init() with the bogus value.
log_init() then prints a less useful message to stderr and exits. The
following patch tidies this up by only printing the more useful error to
stderr and not blundering on afterwards.
--- sftp-server.c.orig Mon Jun 18 16:37:46 2007
+++ sftp-server.c Mon
2007 Apr 10
6
[PATCH 0/6] openssh V_4_6: minor fixes/cleanups
This patch series consists of minor fixes and cleanups I made during
update to openssh V_4_6 branch.
openssh/auth-pam.c | 9 ++++-----
openssh/auth2.c | 2 --
openssh/readconf.c | 7 ++++---
openssh/servconf.c | 14 ++++++++------
openssh/sftp-server.c | 9 ++++++---
openssh/sshd.c | 2 +-
6 files changed, 23 insertions(+), 20 deletions(-)
--
ldv
2023 May 26
3
[Bug 3575] New: wrong usage message: "-Q protocol_feature" is an invalid query type
https://bugzilla.mindrot.org/show_bug.cgi?id=3575
Bug ID: 3575
Summary: wrong usage message: "-Q protocol_feature" is an
invalid query type
Product: Portable OpenSSH
Version: 9.2p1
Hardware: Other
OS: Linux
Status: NEW
Severity: minor
Priority: P5
2009 Aug 28
1
[Bug 430] Could add option to sftp-server to disable write access
https://bugzilla.mindrot.org/show_bug.cgi?id=430
Darren Tucker <dtucker at zip.com.au> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |dtucker at zip.com.au
Blocks| |1626
Status|NEW
2001 Nov 12
4
Please test -current
Could people please test -current? We will be making a release fairly
soon.
-d
--
| By convention there is color, \\ Damien Miller <djm at mindrot.org>
| By convention sweetness, By convention bitterness, \\ www.mindrot.org
| But in reality there are atoms and space - Democritus (c. 400 BCE)
2002 Nov 07
0
[Bug 430] New: Could add option to sftp-server to disable write access
http://bugzilla.mindrot.org/show_bug.cgi?id=430
Summary: Could add option to sftp-server to disable write access
Product: Portable OpenSSH
Version: 3.4p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P3
Component: sftp-server
AssignedTo: openssh-unix-dev at mindrot.org
2002 Nov 07
0
[Bug 430] Could add option to sftp-server to disable write access
http://bugzilla.mindrot.org/show_bug.cgi?id=430
------- Additional Comments From gfernandez at livevault.com 2002-11-08 00:32 -------
Created an attachment (id=173)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=173&action=view)
adds readonly flag to sftp-server
this applies to sftp-server.c
------- You are receiving this mail because: -------
You are the assignee for the
2003 Feb 16
0
[Bug 430] Could add option to sftp-server to disable write access
http://bugzilla.mindrot.org/show_bug.cgi?id=430
markus at openbsd.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Severity|normal |enhancement
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2005 Apr 21
0
[Bug 430] Could add option to sftp-server to disable write access
http://bugzilla.mindrot.org/show_bug.cgi?id=430
------- Additional Comments From djm at mindrot.org 2005-04-21 19:02 -------
hm, these really need extension of sshd's Subsystem directive to accept a
commandline argument.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2007 Sep 12
0
PATCH: fix incorrect checking of syslog facility in sftp-server
hi, there is a typo like error in sftp-server.c - obviously
"log_facility" should be used in the comparison for '-f' option, not
"log_level". That way the error can't be ever printed because log_level is
always not equal to -1 there. However, using incorrect facility will trigger
"Unrecognized internal syslog level code ..." in log_init() later though
2010 Nov 02
1
SFTP subsystem and umask
Hello,
I have noticed that the -u parameter to the sftp-server or internal-sftp subsystem is not working correctly. For openssh-5.6p1 I believe that the problem lies in this code, starting at line 1414 in sftp-server.c:
----------------------------------------------------------
case 'u':
mask = (mode_t)strtonum(optarg, 0, 0777, &errmsg);
if (errmsg != NULL)
2007 Nov 11
1
ftp-server patch - restrict user to directory
Hi,
please find a patch against openssh-4.7p1
This patch:
1) Allows for an optional configuration file
2) Allows a user to be restricted to a directory and it's children.
Enjoy
--
Alain Williams
Linux Consultant - Mail systems, Web sites, Networking, Programmer, IT Lecturer.
+44 (0) 787 668 0256 http://www.phcomp.co.uk/
Parliament Hill Computers Ltd. Registration Information:
2008 Apr 06
1
lme cant get parameter estimated correctly
I am caught in a mental trap. Why isn't the between groups variance estimated
(0.0038) to be around the value with which I generated the data (0.0002)?
Thanks Toby
set.seed(76589437887)
fph = 0.4
Sigh = sqrt(0.0002)
Sigi = sqrt(0.04)
ci = 1
fpi = matrix(,7200,3)
for (i in 1:90) {
fph = rnorm(1, fph, Sigh)
for (k in 1:80) {
fpi[ci,1:3] = matrix(c(i, k, rnorm(1, fph, Sigi)),1)
ci
2000 Aug 11
1
OpenSSH Questions
Heya,
I'm trying to convince my company to use OpenSSH instead of the commercial SSH version. I need a little help:
1. What features does OpenSSH offer over commercial SSH (besides being free and open source of course)?
2. Our lawyers want details on the licensing / patents stuff. I have the high level details from the OpenSSH page. I need the nitty gritty like RSA patent# and
2001 Nov 20
3
problem with AFS token forwarding
Hello,
I came across an interoperability problem in OpenSSH 3.0p1 and 3.0.1p1
concerning the AFS token forwarding. That means that the new versions are
not able to exchange AFS tokens (and Kerberos TGTs) with older OpenSSH
releases (including 2.9p2) and with the old SSH 1.2.2x. In my opinion this
problem already existed in Openssh 2.9.9p1, but I have never used this
version (I only looked at the
2002 Dec 18
2
patch for openssh3.5p1 - adds logging option
this patch adds a LogFile option to sshd_config. it just logs messages
directly to a file instead of stderr or syslog. the largest change
is an additional argument to log_init() in log.c for the log file name
(and then changes to the rest of the tools to add a NULL arg).
galt
-------------- next part --------------
diff -urN openssh-3.5p1-orig/log.c openssh-3.5p1/log.c
---