Displaying 20 results from an estimated 1000 matches similar to: "Key fingerprint feature request"
2000 Aug 13
1
Anybody working on -R support for proto 2 ?
Hi !
Is anyone working on getting -R (remote port forwarding) working with
protocol 2 ?
I might be interested in helping but don't want to duplicate any
previous work.
-Jarno
--
Jarno Huuskonen - System Administrator | Jarno.Huuskonen at uku.fi
University of Kuopio - Computer Center | Work: +358 17 162822
PO BOX 1627, 70211 Kuopio, Finland | Mobile: +358 40 5388169
2000 Nov 07
4
RedHat sshd.init script typo ?
Hi,
I noticed one small possible error in the
openssh-2.3.0p1/contrib/redhat/sshd.init script.
In the stop option:
stop)
echo -n "Shutting down sshd: "
if [ -f $PID_FILE ] ; then
killproc sshd
[ $RETVAL -eq 0 ] && rm -f /var/lock/subsys/sshd
fi
echo
2000 Aug 07
1
--with-ipaddr-display patch
Hi !
I think that the configure option --with-ipaddr-display doesn't set
the IPADDR_IN_DISPLAY define in config.h
Here's a small patch to configure.in that should enable the feature (after
running autoconf again).
-Jarno
--- openssh-2.1.1p4-orig/configure.in Sat Jul 15 07:59:14 2000
+++ openssh-2.1.1p4/configure.in Mon Aug 7 08:18:15 2000
@@ -1026,7 +1026,7 @@
2001 Jun 20
1
openssh and port forwarding as root
Hi,
Openssh sshd opens the socket that forwards users requested port
forwards as root, so the connection seems to come from root. Is it
enough to open the socket as normal user so the connection would appear
to come from that user ? (On Linux this seems to work, but what about
other OS's ?)
I tested this briefly by wrapping the
channel_connect_to(target,target_port);
(in
2000 Aug 05
0
Protocol 2 and fork
Hello !
Like Edmund EVANS reported openssh-2.1.1p4 won't fork to background when
using protocol 2.
I managed to hack a little patch that might work ...
What is the -N command line option supposed to do ? I gather it should work
only with protocol2 and without any command to run on the server (and with
some port forwardings ??)
Anyway in the patch I put some code to check that -N is used
2000 Nov 27
0
/var/log/btmp logging ?
Hi,
Openssh doesn't log failed logins to /var/log/btmp like login does
(if btmp exists). This is on RH6.2.
Is there a specific reason for not logging to btmp ?
I think that logging to btmp would be a 'good thing'(tm). What about
other unices ? Do they have /var/log/btmp or something similar (AIX has
something like that and I think openssh already logs the failed attempts).
AFAIK
2001 Jan 03
0
AIX loginsuccess and aixloginmsg ?
Hi,
I noticed that the AIX specific loginsuccess call uses
char *aixloginmsg to retrieve login information. Later this message is
printed in session.c (around line 753). Loginsuccess mallocs space for
this message and according to the aix docs it's the responsibility of the
calling program to free this message.
I didn't notice any code in openssh that would free the aixloginmsg.
Can
2001 Feb 08
1
ssh1 keyexchange problem ?
Hi,
Has anybody produced diffs for openssh-2.3.0p1 for the rsa keyexchange
problem that Core-SDI described ? ( I noticed that fix is already
in openbsd tree ).
-Jarno
--
Jarno Huuskonen - System Administrator | Jarno.Huuskonen at uku.fi
University of Kuopio - Computer Center | Work: +358 17 162822
PO BOX 1627, 70211 Kuopio, Finland | Mobile: +358 40 5388169
2000 Aug 15
0
Experimental -R support patch for openssh client
Hi !
Here's an experimental patch for openssh-2.1.1p4 to add support
(to openssh client) for -R (protocol 2).
So if you have access to a commercial ssh2 server (that allows port
forwardings) could you test this patch.
(Note the openssh server doesn't have support for -R with protocol 2 so
testing with openssh server won't do much good).
To test remember to use -o "Protocol
2000 Aug 13
1
Patches for openssh port forwarding
Hi !
I hacked together a couple of patches for Openssh 2.1.1p4 port forwarding.
It is a one patch file that does the following two things:
First:
If the server is configured not to allow port forwardings it sends
SSH_SMSG_FAILURE (protocol 1) while openssh client expects SSH_SMSG_SUCCESS.
When the client gets the failure it exists with protocol error message.
This patch will accept both failure
2000 Aug 23
1
Protocol 2 remote forwarding patch
Hi !
Here's a patch to add remote port forwarding support (protocol 2) for
openssh. I have tried to test that it works like it should but a more
thorough testing is needed. This patch adds both client/server support.
The patch should be applied to openssh-2.1.1p4 source tree.
Also included is a PortForwarding sshd_config option, new ./configure
option --disable-forwarding that should make it
2000 May 29
1
Syslog facility in Linux
Hi !
While browsing Linux manpages (man 3 syslog) I noticed that the manual
says that the LOG_AUTH facility is deprecated use LOG_AUTHPRIV instead.
Is there a good reason why OpenSSH doesn't have an option to use
LOG_AUTHPRIV facility ? (Looks like that tcpd/telnet etc. use the AUTHPRIV
facility (in RH6.2)).
Shouldn't be too hard to add the AUTH_PRIV facility ?
Cheers,
-Jarno
--
2000 Jan 20
0
ssh and expired passwords ?
Hi !
Is it possible to add support for expired passwords to OpenSSH ? What I mean
by this is that when users password has expired the user is forced to
change the password before the shell is executed.
At least OpenSSH on linux+pam (RedHat 6.0) denies access if the password has
expired ...
Would something like this work (as a temporary fix): If the password is expired
run a command that first
2001 Feb 10
3
Protocol 2 remote forwarding patch
Hi all,
I'm very new in this list, as looking for codes to plug up the lack of
functionality of "Protocol 2 Remote Forwardig".
Fortunately, I could find it in MARC's archive. Mr. Jarno Huuskonen
posted the codes in Sept, last year, and I tried applying it to my
FreeBSD box environment.
I couldn't apply an original patch, of course, for incompatibility of
virsion. The
2002 Jan 27
1
Strange read_passphrase behaviour ?
Hi,
I'm sorry if this has already come up on the list, I did a quick search
of the archive and didn't notice it.
I noticed IMHO strange behavior in read_passphrase:
If readpassphrase returns NULL and sets errno to ENOTTY, then
read_passphrase returns an empty passphrase to the caller instead of
error, now what happens with password authentication is that
if readpassphrase fails every
2001 Sep 26
1
Protocol 2 remote port forwarding
Hi all,
I'm using openssh-2.9p2 on Solaris 2.8. I can get remote port forwarding to
work using the -R flag, but only with ssh protocol 1 not ssh protocol 2.
I've read that remote forwarding protocol 2 was not supported in earlier
versions of openssh, but I'm wondering if this is still the case. Jarno
Huuskonen [Jarno.Huuskonen at uku.fi], posted a patch in 2000 to add support
for
2001 Jun 05
1
OpenSSH tmp cleanup
Hi,
I noticed that Markus has fixed the temporary file cleanup problems in
OpenSSH cvs. What files need patching for this ? I only noticed
changes in: session.c, channels.h and channels.c.
-Jarno
--
Jarno Huuskonen <Jarno.Huuskonen at uku.fi>
2013 Oct 18
1
nsd-4.0.0b5(and rc2) and changing zone from master to slave ?
Hi,
I'm doing some quick tests with nsd-4.0.0b5 and (rc2). And found
something strange when changing (nsd-control reconfig) one
zone from:
zone:
name: 10.in-addr.arpa
zonefile: /zones/empty.zone
to
zone:
name: 10.in-addr.arpa
request-xfr: 192.168.122.12 NOKEY
allow-notify: 192.168.122.12 NOKEY
zonefile: /zones/slave/10.rev
and doing nsd-control reconfig.
After
2000 Nov 20
3
OpenSSH Security bug: port forwarding
Hi. OpenSSH 2.3.0p1 exhibits the following behavior on Linux 2.2.5. I
believe this is a bug. Can anyone else replicate this?
On any given SSH machine (let's call it 'test'), start ssh like
this:
./ssh -L2526:mail.blah.com:25 -f mail.blah.com sleep 1000
(where mail.blah.com is some machine running sendmail, you have a login
account, etc.)
In a just world (and this works with
2010 Apr 19
3
[Bug 1759] New: allow display of bubblebabble fingerprint when connecting
https://bugzilla.mindrot.org/show_bug.cgi?id=1759
Summary: allow display of bubblebabble fingerprint when
connecting
Product: Portable OpenSSH
Version: -current
Platform: All
URL: http://bugs.debian.org/578422
OS/Version: Linux
Status: NEW
Severity: enhancement
Priority: P2