Displaying 20 results from an estimated 9000 matches similar to: "hostbased for root?"
2001 May 10
2
2.9p1 ssh-add/ssh-askpass first try fails
OpenSSH Version 2.9p1 of "ssh-add $HOME/.ssh/id_rsa < /dev/null"
fails on the first try of using ssh-askpass before the window manager
starts. The second try works. The error message on the first try is
"Bad passphrase, try again".
This did not occur using OpenSSH-2.5.2p2.tar.gz. I've tested this
on both RHL6.2 and RHL7.1, both with all RH rpm updates applied.
I
2001 Feb 22
1
2.5.1p1 logout hangs after RHL crond start
The RHL 6.2 command "/etc/rc.d/init.d/crond start" prevents
clean logout from compiled version of OpenSSH-2.5.1p1 on all
hosts.
The command "/etc/rc.d/init.d/crond stop" is OK.
This occurs for interactive or command line requests.
ssh remotehost /etc/rc.d/init.d/crond stop --- works every time
ssh remotehost /etc/rc.d/init.d/crond start --- hangs every time
Control-C will
2001 Mar 16
1
suggestion for syslog messages
To allow easier targeting of users of old protocols I would find
it useful for the syslog "Accepted" messages to be more uniform.
1. Include the string "ssh1" for ssh1 connections as is done for ssh2
connections.
2. Change the "publickey" message for ssh2 connections to specify
which publickey, "dsa" or "rsa". This is already the case for
2001 Oct 24
0
readpass.c patch
To make readpass.c work on first try with gnome-askpass on RHL 7.1:
wget http://bass.directhit.com/openssh_snap/openssh-SNAP-20011023.tar.gz
tar xfz openssh-SNAP-20011023.tar.gz
cd openssh
./configure --with-pam --enable-gnome-askpass --with-tcp-wrappers
mv readpass.c readpass.c1
new readpass.c according to patch I received from djm 5-13-01:
--------------------- cut here
2001 Mar 21
1
Disconnecting: Bad packet length 2056273721.
OpenSSH-2.5.2.p1 won't connect to OpenSSH-2.5.1p2 using
version 2 protocol, quitting with the error message:
[dunlap at tesla dunlap]$ ssh -2 kraken
7a 90 3f 39 37 67 0d 9e ac 43 74 c3 83 83 f5 a2
Disconnecting: Bad packet length 2056273721.
tesla is Linux tesla.apl.washington.edu 2.2.16-3 #1 Mon Jun 19
19:11:44 EDT 2000 i686 unknown Intel RHL6.2 with OpenSSH-2.5.2.p1
compiled from sources
2001 Feb 22
3
intermittent stderr
The command "ssh ls -l /doesnotexist" gives various responses:
Running from a 200 MHz PentiumPro with dsa key added to ssh-agent:
Mistakes worst to fast machine:
To a faster 600 MHz dual processor i686 600 MHz machine:
ls: /doesnotexist: No such file or directory -- correct
nothing at all -- wrong
ls: select: Bad file descriptor -- wrong
2003 May 14
0
OpenSSH Hostbased authentication HOWTO
Hi,
I have tried to configure hostbased authentication on different OS
platforms using
OpenSSH both on client and server side:
RedHat 7.[2,3] with OpenSSH versions 3.1p1, 3.5p1, 3.6p1
SunOS 5.8 (SOLARIS8) with OpenSSH versions 2.9p1, 3.4p1
BSD/OS 4.1 with OpenSSH version 3.4p1
BIG-IP 4.2PTF-08 with OpenSSH version 3.4p1
Finally I have found a general
2010 Jun 04
0
Hostbased authentication with certificates
Greetings,
For those interested in using certificates with hostbased
authentication, I have just submitted an enhancement request[1] to the
OpenSSH bugzilla site with a preliminary patch that adds support for
this.
Despite the fact that hostbased authentication is, by default, disabled
for both the client and server, there are environments where hostbased
authentication can be very useful. One
2013 Jul 20
0
problem with minus signs when using postscript/pdf functions with ComputerModernItalic family
When I use the postscript with the ComputerModernItalic family, minus signs are not properly displayed, but are changed into capital gammas. The attached test-postscript.pdf file illustrates the problem, which I created starting with the following R code:
> postscript("test-postscript.eps", family = "ComputerModernItalic")
> plot(seq(-5,5,1),seq(-5,5,1))
> dev.off()
2002 Jul 16
0
[Bug 356] New: 3.4p1 hostbased authentication between Linux and Solaris
http://bugzilla.mindrot.org/show_bug.cgi?id=356
Summary: 3.4p1 hostbased authentication between Linux and Solaris
Product: Portable OpenSSH
Version: -current
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: major
Priority: P2
Component: ssh
AssignedTo: openssh-unix-dev at mindrot.org
2023 Nov 15
0
@cert-authority for hostbased auth - sans shosts?
On 11/15/23, 10:51 AM, "openssh-unix-dev on behalf of Marian Beermann" <openssh-unix-dev-bounces+iain.morgan=nasa.gov at mindrot.org <mailto:nasa.gov at mindrot.org> on behalf of public at enkore.de <mailto:public at enkore.de>> wrote:
On 11/15/23 18:09, Chris Rapier wrote:
> On 11/11/23 9:31 PM, Damien Miller wrote:
>
>> It's not discouraged so much as
2002 Jul 19
1
OpenSSH 3.4p1 hostbased auth - howto?
How do you enable hostbased authentication in OpenSSH?
I have two Red Hat 7.3 machines running openssh-3.4p1, and I would like to
be able to ssh from either of the machines to the other, as any user,
without using passwords or per-user keys.
My /etc/ssh/sshd_config contains:
[...]
IgnoreRhosts no
HostbasedAuthentication yes
[...]
My /etc/ssh/ssh_config contains:
[...]
2003 Dec 07
1
hostbased failing and can't derive reason of failure in debugging output
Hello,
I've troubles getting the hostbased method to work. I've given up on
system-to-system for now (different versions), and I'm just trying to
debug localhost. As far as I can see, the key is accepted, but then a
sudden "Failed hostbased" is returned:
[...]
debug3: mm_answer_keyallowed: key 0x8099bc0 is disallowed
debug3: mm_append_debug: Appending debug messages for
2003 Feb 05
0
openssh 3.5p1 hostbased authentication
hello,
i did some debugging today, here is the weird portion form sshd -d -d -d
debug1: userauth-request for user jholland service ssh-connection method
hostbased
debug1: attempt 1 failures 1
debug2: input_userauth_request: try method hostbased
debug1: userauth_hostbased: cuser jholland chost i2-0. pkalg ssh-dss slen
55
debug3: mm_key_allowed entering
debug3: mm_request_send entering: type 20
2014 Mar 14
7
[Bug 2211] New: Too many hostbased authentication attempts
https://bugzilla.mindrot.org/show_bug.cgi?id=2211
Bug ID: 2211
Summary: Too many hostbased authentication attempts
Product: Portable OpenSSH
Version: 6.5p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee: unassigned-bugs at
2023 Nov 09
1
@cert-authority for hostbased auth - sans shosts?
Hi,
we're looking to reduce the number of host lists that
need to be kept in sync in our system. (There are quite a few of them
all over the place)
OpenSSH CAs are an obvious solution for not having to
keep all host keys in sync in /etc/ssh/known_hosts, however,
while OpenSSH does support using a CA in conjunction with hostbased
authentication,
it still requires a list of all authorized
2003 Feb 26
2
OpenSSH 3.4p1 hostbased authentication
Hi,
We want to use Hostbased Authentication in OpenSSH 3.4p1 completely based on
rhosts or shosts. Don't want to have any keys exchange between server and
client.
Created /etc/ssh/sshd_config on OpenSSH server with:
RhostsAuthentication yes
IgnoreRhosts no
HostbasedAuthentication yes
Created /etc/ssh/ssh_config on client with:
Host *
HostbasedAuthentication yes
Created /etc/rhosts.equiv,
2010 Apr 20
1
Hostbased authentication and certificates
Hi,
Based on some experimentation with 5.4p1 and a cursory examination of
the source code, it doesn't look like hostbased authentication takes
advantage of certificates other than to authenticate the server. Is that
correct?
In cluster environments, hostbased authentication is still useful but
the size of the ssh_known_hosts file can become unwieldy in large
clusters. As an example, a few
2015 Jan 09
5
OpenSSH_6.7p1 hostbased authentication failing on linux->linux connection. what's wrong with my config?
I run OpenSSH on linux
@ client
which ssh
/usr/local/bin/ssh
ssh -v
OpenSSH_6.7p1, OpenSSL 1.0.1j 15 Oct 2014
@ server
which sshd
/usr/local/bin/sshd
sshd -v
unknown option -- V
OpenSSH_6.7p1, OpenSSL 1.0.1j 15 Oct 2014
usage: sshd [-46DdeiqTt] [-b bits] [-C connection_spec] [-c host_cert_file]
[-E log_file] [-f config_file] [-g login_grace_time]
2003 Mar 17
1
[Bug 512] Hostbased authentication bypass PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=512
Summary: Hostbased authentication bypass PAM
Product: Portable OpenSSH
Version: 3.5p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: yaccck at