Displaying 20 results from an estimated 2000 matches similar to: "AllowHosts support in sshd missing."
2000 Aug 01
0
AllowHosts implementation plea.
Hello all,
I'd like to see sshd_config directive AllowHosts implemented. This is
about the only SSH 1.2.27 (etc.) thing not supported by OpenSSH.
The reason for this would be drop-in compatibility. Sure, you can do
about the same thing with hosts.allow, but the syntax is a bit different
and you'd have to modify sshd_config and you lose the possibility to have
multiple security layers
2001 Feb 27
4
AllowHosts / DenyHosts
I'd like to see a feature of the commercial ssh in openssh:
AllowHosts xxx.yyy.xxx.yyy *.domain.net
DenyHosts xxx.yyy.xxx.* name.domain.net
This allows or denies connects from certain machines (including wildcard
matching).
Is there any chance for this feature to be included? No, we don't want to
use tcp-wrapper for this.
Bye.
2001 Feb 21
1
OpenSSL + OpenSSH version problems
Hello all,
OpenSSL 0.9.5a and 0.9.6 are incompatible, causing weird errors.
I'd like to get a check for this in the RPMs.
However, now I want to make sure whether anyone has experienced problems
with RHL 0.9.5a OpenSSL libs vs. the 0.9.5a ones provided at openbsd.org?
Ie: is it enough to check like '= 0.9.5a' or do you have to check '=
0.9.5a-xyz'.
--
Pekka Savola
2000 Jun 09
2
openssh-2.1.1p1 RH62 compile failure
Hello all,
Compiling 2.1.1p1 on my RedHat Linux 6.2 w/ 2.2.16 kernel seems to cause
errors from the start..
----
gcc -O2 -m486 -fno-strength-reduce -Wall -DETCDIR=\"/etc/ssh\" -DSSH_PROGRAM=\"/usr/bin/ssh\" -DSSH_ASKPASS_DEFAULT=\"/usr/libexec/ssh/ssh-askpass\" -DHAVE_CONFIG_H -c -o bsd-base64.o bsd-base64.c
In file included from defines.h:261,
from
2000 Sep 27
4
Irix: PRNG initialization failed
Hello all,
I tried OpenSSH versions 2.1.1p4, 2.2.0p1 and the latest snapshot briefly
on 64-bit Irix 6.5.7f an 6.5.9m.
Both times, no matter what I do, I'll get 'PRNG initialization failed
-- exiting'. This happens with ssh-keygen (the keys aren't even generated
yet, ssh binary etc.)
It's clear that Irix etc. don't have a proper entropy pool like *BSD and
Linux do, but
2001 Mar 05
2
--with-ipv4-default and sshd IPv4/6 dual bind hack
Hello all,
I just found a bug a nice bug that can be turned into a real feature on
systems (usually Linux) that are built with --with-ipv4-default.
If you enable IPv6 in kernel, and enable both listenaddress 0.0.0.0 and
::, sshd will error out 'address family not supported'.
However, you can work around this error by starting sshd with 'sshd -4 -6'.
As far as man page is
2000 Oct 02
3
still sftp-server problems with Irix?
Hello all,
Using 20000930 snapshot on Irix 6.5.9m.
SFTP connections with SSH 2.3.0 (Windows) die right out. Similar
configuration and the same version works fine in Red Hat Linux 6.2.
This is probably related to 'sftp' thread 7-10 days ago.
The error messages captured in debug mode:
---
debug1: server_input_channel_open: ctype session rchan 1 win 100000 max 8192
debug1: open session
2000 Oct 30
2
RhostsAuthentication + nondefault port doesn't work?
Hello all,
It seems that RhostsAuthentication does not work on non-default port no
matter what when connecting from OpenSSH (2.1.1, 2.2.0 tried) either with
protocol 1 or protocol 2 (shouldn't work either..).
_However_ when connecting with SSH.COM Ltd's ssh, RhostsAuthentication
works just fine!
Checking the port number of ssh client you can see that OpenSSH doesn't
assign
2001 Feb 21
1
sshd -t to test configuration file syntax?
Hello all,
sshd configuration file options change from one release to another.
If you forget updating sshd_config, sshd will not start.
This is especially painful for update scripts etc. where you can't do e.g.
'sshd -p 2022' to see if it's okay.
May I suggest some option, e.g. sshd -t, which would test config files and
other obvious issues and return an errorcode if something
2001 Jan 01
1
Port forwarding control patch
Hi,
I'd like to bring this up again as there has been discussion about 2.4.0
patches. Getting something this big in would probably delay the release
too much, but something similar should be considered for 2.5 then.
A lot of people would like some control over port forwarding. Florian
Weimer's patches (http://cert.uni-stuttgart.de/files/openssh/) are one,
rather "big"
2001 Mar 26
1
Release with BIGENDIANAES compat option?
Hello all,
Very recently, djm added compability patch so that aes/rijndael encryption
problems could be avoided when talking to broken server/client; and you
wouldn't have to toggle off the protocols yourself.
Might this be a candidate for 2.5.2p2 or the like? This would be helpful
when there are a lot of broken, 2.3.0 and like, systems.
--
Pekka Savola "Tell me of
2001 Apr 25
1
RHL init.d/sshd ipv6 hack
Hello all,
I'm using the attached patch.
With it, if you add
OPTIONS="-6"
in
/etc/sysconfig/sshd
(this kind of sysconfig/<name> is a pretty normal RHL practice), then you
can enable ipv4 and ipv6 on RHL without problems and without having to
modify the init.d/sshd script.
This or something like should IMO be added.
Removing 'noreplace' from sshd_config
2001 Apr 30
1
OpenSSH 2.9p1 release not on FTP sites
ChangeLog:
20010429
- (bal) Updated INSTALL. PCRE moved to a new place.
- (djm) Release OpenSSH-2.9p1
However, OpenSSH 2.9p1 is not on the official FTP sites, at least yet?
--
Pekka Savola "Tell me of difficulties surmounted,
Netcore Oy not those you stumble over and fall"
Systems. Networks. Security. -- Robert Jordan: A Crown of Swords
2002 Mar 07
1
OpenSSH Security Advisory (adv.channelalloc) (fwd)
whoops, not announce.
--
Pekka Savola "Tell me of difficulties surmounted,
Netcore Oy not those you stumble over and fall"
Systems. Networks. Security. -- Robert Jordan: A Crown of Swords
---------- Forwarded message ----------
Date: Thu, 7 Mar 2002 16:59:38 +0200 (EET)
From: Pekka Savola <pekkas at netcore.fi>
To: Markus Friedl <markus at
2001 Jul 23
1
2.9p2: sshd -6, port fwd of ipv4 fails
Hi,
Running openssh-2.9p2 on Linux.
If server is run with 'sshd -6' (to enable ipv6 easily on server end), ie
all IPv4 are represented as mapped addresses, port forwarding will not
work; just running plain ol' IPv4 fixes this of course.
The server error, when forwarding from the client '143:localhost:143' and
connecting to localhost 143 is:
debug1:
2000 Oct 07
2
[PATCH]: Add tcp_wrappers protection to port forwarding
Hi,
attached is a patch by Chris Faylor <cgf at cygnus.com> relative to
2.2.0p1.
Description:
OpenSSH does not allow port gatewaying by default. This means that only
the local host can access forwarded ports. Adding "GatewayPorts yes" to
.ssh/config usually does this job.
Unfortunately, OpenSSH does not recognize the same hosts.allow/
hosts.deny options as ssh.com's sshd
2000 Oct 30
2
Feature disappeared?
Hi,
working on tightening our network (somewhat) today, I found that OpenSSH
doesn't seem to have the "AllowSHosts" directive (in sshd_config) that
Commercial SSH (at least 1.2.25 & up) has.
Now I wonder whether that hasn't been implemented yet, or has been dropped
for a certain reason.
I find this very useful for what I want to achieve - inside the company
network,
2001 Oct 20
8
Recent openssl is required for OPENSSL_free [Re: Please test snapshots for 3.0 release] (fwd)
No response yet, so resending.
--
Pekka Savola "Tell me of difficulties surmounted,
Netcore Oy not those you stumble over and fall"
Systems. Networks. Security. -- Robert Jordan: A Crown of Swords
---------- Forwarded message ----------
Date: Fri, 12 Oct 2001 09:44:54 +0300 (EEST)
From: Pekka Savola <pekkas at netcore.fi>
To: Damien Miller
2001 Jun 02
4
authorized_keys2 directory idea
Hi,
In a mail about two weeks ago, I brought up an idea:
---
How SSH makes this easier is that you only have to sync the
authorized_keys2 database to root account's .ssh/ every time new admin
comes in/leaves the house. This can even be automatized rather easily. A
more modular hack would be using authorized_keys2 _directory_, and the
keys in there would all be counted as authorized. Thus
2000 May 11
3
OpenSSH-2.1: FROM in 'w' empty?
Hello all,
I wonder if this is an oversight/bug/feature, but here it goes.
It seems that in OpenSSH 2.1, 'w' (or who) command may print out something
like this:
----
USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT
pekkas ttyp1 - 3:10am 0.00s 0.08s 0.03s w
----
2.0beta1 was the one I used before, and that printed FROM field properly.
Now,