similar to: ssh through proxy (was: prng_cmds/init_rng() question/patch)

Displaying 20 results from an estimated 300 matches similar to: "ssh through proxy (was: prng_cmds/init_rng() question/patch)"

2001 Mar 11
4
prng_cmds/init_rng() question/patch
I have a need to provide ssh client binaries for use elsewhere on several platforms, some without /dev/random support. I can't assume that users will know how to install/run prngd or egd, so I was planning to rely on the builtin prng code. However this require the ssh_prng_cmds file to exist in a fixed location -- which would mean making binaries which either look for it in . or other
2002 Apr 01
4
path to find ssh-rand-helper
Before I actually implement the small changes needed to allow the location of ssh-rand-helper to be specified in the config file, I'd like to check that in doing so I won't be opening up a huge security hole. My brief reading of the code suggests that in entropy.c:seed_rng() the ssh-rand-helper is run as the original uid (for binaries which were setuid in the first place of course), so I
2000 Mar 03
1
FTP tunneling
If people haven't seen it, there's a pretty nice Java SSH client called MindTerm: http://www.mindbright.se/mindterm/ One of the things they did is add some hacks to make FTP tunneling over SSH trivial. This client looks at the data being forwarded over port 21 (ftp control port), and looks for the FTP PORT and PASV commands used to establish
2002 Nov 19
1
forwarding features
While messing with various tunnels it occured to me that there may be cases where some extra tunneling functionality would come in handy. I thought I better run it past the list before trying to implement a patch since the last 2 times I did this there was another way to get the effect I wanted with no code changes... Forwarding should not just be of AF_INET but (where available) AF_UNIX (ie
2001 Jun 07
0
Patch for systems with no setreuid()
Sorry if I'm duplicating an existing patch, but... On systems with no seteuid() that have setreuid() there is an emulation, but if both are lacking (but we do have setresuid()), nothing is done. The following seems to be right, but I've only got one machine (running an ancient version of HP-UX) which needs this so it may not be general: --cut-here-- --- config.h.in.orig Thu Jun 7
2001 Mar 11
0
patch to allow client to select rsa/dss
Here is a quick patch against openssh-2.5.1p1 to add a new config option (pkalg) for the ssh client allowing the selection of which public keys are obtained/verified. --cut-here- diff -c3 -r orig/openssh-2.5.1p1/key.c openssh-2.5.1p1/key.c *** orig/openssh-2.5.1p1/key.c Mon Feb 5 18:16:28 2001 --- openssh-2.5.1p1/key.c Sun Mar 11 23:10:10 2001 *************** *** 534,539 **** --- 534,567 ----
2001 Feb 08
0
BindView advisory: sshd remote root (bug in deattack.c)
Remote vulnerability in SSH daemon crc32 compensation attack detector ----------------------------------------------------------------------- Issue date: 8 February 2001 Author: Michal Zalewski <lcamtuf at razor.bindview.com> Contact: Scott Blake <blake at razor.bindview.com> CVE: CAN-2001-0144 Topic: Remotely exploitable vulnerability condition exists in most ssh daemon
2015 Aug 11
0
[Bug 1932] dangling init_rng prototype in entropy.h
https://bugzilla.mindrot.org/show_bug.cgi?id=1932 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |CLOSED --- Comment #2 from Damien Miller <djm at mindrot.org> --- Set all RESOLVED bugs to CLOSED with release
2001 Mar 25
8
OpenSSh 2.5.2p2 on Linux/Sparc
When doing a simple configure of OpenSSh 2.5.2p2 on a Sparc running RedHat 6.0 I get: ... updating cache ./config.cache creating ./config.status creating Makefile sed: file conftest.s1 line 1: Unknown command: ``^'' creating openbsd-compat/Makefile sed: file conftest.s1 line 1: Unknown command: ``^'' creating ssh_prng_cmds sed: file conftest.s1 line 1: Unknown command:
2004 Jun 26
1
openssh debian bug?
I spent the last couple of hours trying to figure this out. We upgraded to sshd version OpenSSH_3.8.1p1 Debian and now "password" login no longer works... however keyboard-interactive login still works. the result of this is that while openSSH clients still function, ssh applications like MindTerm do not. here is the debug dump from the login session: Jun 25 21:47:50 m1
2001 Apr 09
3
[PATCH]: Heartbeat/Watchdog Patch
Dear Developers, I've released a patch against openssh-2.5.2p2. The patch adds heartbeat (keepalive) function to ssh(1), and watchdog timeout function to sshd(8). The watchdog timeout is intended to terminate user's processes as soon as possible after the link has been lost. http://www.ecip.tohoku.ac.jp/~hgot/sources/openssh-watchdog.html The combination of the heartbeat and the
2000 Dec 23
1
OpenSSH-2.3.0p1 patch for yet another F-secure version
Hi, Here's a problem in openssh, some logs, and a very minor patch that cures this: Issue: (open)ssh client WILL NOT talk to F secure SSH-2.0-2.1.0pl2 client S/W version: openssh-2.3.0p1 client O/S version: SunOS 5.7 Generic_106541-11 sun4u sparc server S/W version: SSH-2.0-2.1.0pl2 server O/S version: SunOS 5.7 Generic_106541-11 sun4u sparc Log/Details: : % telnet <mymachine> 22
2000 Jul 14
1
Patch to make openssh-2.1.1p3 compile on SunOS 4.1.4
Hi, For the last few weeks I've been struggling to get openSSL/openSSH compiled and running under SunOS. Specfically, openssh-2.1.1p3: SSH Version OpenSSH_2.1.1, protocol versions 1.5/2.0. Compiled with SSL (0x00905820). on SunOS 4.1.4. Happily I can say there is only one small change so I'm not going to even try to generate all the associated noise you'd expect. The function
2001 Apr 05
1
JNI Wrappering OpenSSH ?
I am currently toying with various avenues for doing some secured file transfers from a javaland process. Realistically on the server side the thing I want is OpenSSH's sftp server. My question is, on the client side, how to get java to talk ssh2 secsh file xfer. Would a sane approach be to find the appropriate points of OpenSSH and turn it into a java library by liberal application of JNI,
1996 Nov 14
1
Security hole in Debian 1.1 dosemu package
In Debian 1.1, the optional DOSEMU package installs /usr/sbin/dos setuid root. This is a serious security hole which can be exploited to gain access to any file on the system. Package: dosemu Version: 0.64.0.2-9 ------- start of cut text -------------- $ cat /etc/debian_version 1.1 $ id uid=xxxx(quinlan) gid=xxxx(quinlan) groups=xxxx(quinlan),20(dialout),24(cdrom) [quinlan:~]$ ls -al
2000 Dec 02
1
PATCH: Datafellows SSH misdetection in compat.c
Hello all, All SSH/Datafellows versions don't match properly in compat.c. This should be fixed in OpenBSD version, naturally. An example of this is: debug: match: 2.1.0.pl2 SSH Secure Shell (non-commercial) pat ^2\. The match should definitely be 2.1.0. This is caused by the fact that a requisite space was added to the check when converting to regexp matching on Oct 10; CVS Id 1.24:
2003 May 12
0
slightly OT: support for keyboard-interactive in other implementations
I'd like to know if anyone knows of any SSH clients with significant user bases (winscp2, putty, mindterm etc.) which lack support for keyboard-interactive authentication. DES -- Dag-Erling Smorgrav - des at ofug.org
2001 Aug 29
0
OpenSSH 2.9.2p2 passwd work but not publickey on HPUX 11
Hi, I have hard figuring out what I did wrong ... On HPUX 11 I have compiled OpenSSH 2.9.2p2 with gcc 2.9 (taken from hp opensource server) and zlib also downloaded from hp. As long as I do passwd authentication everything work fine (I have used --with-pam), but if I tried publickey either in sshv1 or sshv2 authentication fails. I have tried a bunch of things but none worked so all
2009 Jun 08
0
New winetricks 20090607: new verbs d3dx9, fontsmooth-foo, vb2run, vcrun2008sp1, wme9, xact
Another, er, quarter, another winetricks. Online as always at http://kegel.com/wine/winetricks or http://winezeug.googlecode.com Thanks to Austin English for taking on most of the work keeping winetricks up to date! (And apologies for my own slowness in doing another release.) Changes since 20090116: ------------------------------------------------------------------------ r491 |
2014 Apr 20
2
bad bignum encoding for curve25519-sha256@libssh.org
Hi, So I screwed up when writing the support for the curve25519 KEX method that doesn't depend on OpenSSL's BIGNUM type - a bug in my code left leading zero bytes where they should have been skipped. The impact of this is that OpenSSH 6.5 and 6.6 will fail during key exchange with a peer that implements curve25519-sha256 at libssh.org properly about 0.2% of the time (one in every 512ish