Displaying 20 results from an estimated 2000 matches similar to: "Require Multiple keys per host"
2004 Sep 10
11
[Bug 910] known_hosts port numbers
http://bugzilla.mindrot.org/show_bug.cgi?id=910
mindrot at askneil.com changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |mindrot at askneil.com
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the
2002 Jan 26
5
[PATCH] Connect timeout
The attached patch adds a new 'ConnectTimeout' option (man page updated
in patch) to avoid wasting time when the target host is down. I needed that
because I was using rsync/rdist over ssh for massive files update and the
default connect() took too long for my purpose.
The patch was tested on Linux only, but I used a similar one for ssh 1.2.XX
on Linux, Solaris and HP-UX without
2002 Feb 01
4
OpenSSH Key Storage
I have had a brief discussion with Damien Miller (below) about storing
host port values in the known_hosts file so as to track multiple ssh
sessions (with independant keys) that run on a single host but accept
connections on different ports. If it were possible to state that a
given key for a remote host belonged to that host's ssh session on port
23 and that another key belonged to that
2008 Jun 27
1
HostKey check for remote hosts via local ports
Another issue for which there might be some tricks that I don't know of:
I have a set of ports on my local machine forwarded (via ssh LocalForward) to machines that I can't directly reach on the localhost. However, as I connect to those machines I get HostKey warnings since it looks for the HostKey of the 'localhost' and depending on the port, it is of course different.
Is there
2014 Oct 14
3
[Bug 2293] New: ssh should have an option to automatically trust a local sshd's host key for a given set of names
https://bugzilla.mindrot.org/show_bug.cgi?id=2293
Bug ID: 2293
Summary: ssh should have an option to automatically trust a
local sshd's host key for a given set of names
Product: Portable OpenSSH
Version: 6.7p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
2005 May 12
6
[Bug 1039] Incomplete application of HostKeyAlias in ssh
http://bugzilla.mindrot.org/show_bug.cgi?id=1039
Summary: Incomplete application of HostKeyAlias in ssh
Product: Portable OpenSSH
Version: 4.0p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: bitbucket at mindrot.org
ReportedBy: cdmclain
2023 Jul 03
1
Subsystem sftp invoked even though forced command created
On 30.06.23 17:56, MCMANUS, MICHAEL P wrote:
> The actual command is similar to the following (parameters inserted to protect the source):
> (print ${FQDN} ; print ${Environment} ; cat ${OutFileXML}) | \
> ssh -Ti ${EmbeddedPrivateKey} \
> -o HostKeyAlias="${Alias}" \
> -o
2003 Oct 07
2
EnableSSHKeysign
It looks like host based authentication will not work if you
attempt to set EnableSSHKeysign on a per host basis.
Ie. This does not work.
-------
Host ou8
HostName ou8.somedomain.com
HostbasedAuthentication yes
EnableSSHKeysign yes
NoHostAuthenticationForLocalhost yes
-------
Unless you also add
-----
Host *
EnableSSHKeysign yes
-----
Is this the intended behavior?
--
Tim Rice
2020 Mar 24
2
[Feature Request] Add (and check against) IP to known_hosts even when domain is used to connect
Hello Bob and thank you for your reply,
first of all I hope that I'm answering in the right way since I had
enabled the daily digest and I'm not sure if it's the right way to use
Thunderbirds "Reply List" feature on this digest. If it's wrong this way
I apologize. I turned of the daily digest so my next messages should be
correct.
> Are you aware of HostKeyAlias?
2005 Dec 10
2
known_hosts and multiple hosts through a NAT router
The .ssh/known_hosts table cannot handle reaching different sshd
servers behind a NAT router. The machines are selected by having
the SSHDs respond to differnt ports.
A second request would be to allow known_hosts checking solely on
the dns name, wildcarding the IP address. This would be useful
to avoid continuously warning the user every time you connect
to a machine with a changing IP address
2002 Sep 26
1
Question regarding patch for ProxyCommand setting
Hi!
I recently started using ProxyCommand and noticed that it's not
possible to specify a "none" value for it. I've already written a
patch for that, but wanted to discuss the issue before posting the
patch.
The problem is the following: I'd like to use a ProxyCommand by
default, but exclude some hosts. But as soon as I have
Host *
ProxyCommand /some/proxy/command %h %p
2002 Sep 10
8
[Bug 393] 'known_hosts' file should be indexed by IP:PORT, not just IP
http://bugzilla.mindrot.org/show_bug.cgi?id=393
markus at openbsd.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |INVALID
------- Additional Comments From markus at openbsd.org 2002-09-11
2001 Aug 28
2
[patch] known hosts with ports
Hello. We are currently installing a new firewall, and would like to use a
mixture of NAT and port mapping to have a single "gateway" host address
which exposes a range of open ports, each of which maps to sshd of a
different host in our internal network (e.g. ssh.jesus.cam.ac.uk on port
6789 maps to internal host1 port 22 whereas ssh.jesus.cam.ac.uk on port 6790
maps to internal
2020 Mar 09
2
[Bug 3133] New: Dynamically Assigned Ports for DynamicForward and LocalForward
https://bugzilla.mindrot.org/show_bug.cgi?id=3133
Bug ID: 3133
Summary: Dynamically Assigned Ports for DynamicForward and
LocalForward
Product: Portable OpenSSH
Version: 8.2p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
2002 Sep 20
2
host_key and fingerprint problem with protocol 2
Hi all,
I just want to upgrade from protocol 1.5 to 1.99 and 2.0, respectively and run into the following problems:
The situation is the following:
I have a client ("c") inside the firewall and two servers outside ("a" and "b"). The firewall accepts connections on two ports (22136 and 22137) and directs the connections directly to port 22 of the two servers
2005 May 15
1
Host verification problem
Hi,
I have a problem with the host verification of ssh in several
networks of the same structure:
In all cases there is a router or a firewall with an official
IP address, making the ssh-ports of several hosts with
RFC1918-addresses available through NAT or TCP forwarding.
Thus, different hosts appear on the same IP address, just with
different ports.
Since SSH uses the IP address but not
2020 Jun 01
1
[Bug 3176] New: can't figure out how to test StrictHostKeyChecking accept-new
https://bugzilla.mindrot.org/show_bug.cgi?id=3176
Bug ID: 3176
Summary: can't figure out how to test StrictHostKeyChecking
accept-new
Product: Portable OpenSSH
Version: 8.3p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
2023 Aug 18
1
Host key verification (known_hosts) with ProxyJump/ProxyCommand
On Fri, 18 Aug 2023 at 17:18, Stuart Longland VK4MSL <me at vk4msl.com> wrote:
> On 18/8/23 15:39, Darren Tucker wrote:
[...]
> > I think you just need "HostKeyAlias mytarget" here.
>
> Ahh, in my scanning through the `ssh_config` manpage, I missed this, and
> change logs seem to indicate this feature has been around since at least
> 2017, so should not cause
2002 Jan 25
4
[Bug 80] Host key conflict with two servers on one IP
http://bugzilla.mindrot.org/show_bug.cgi?id=80
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |WORKSFORME
------- Additional Comments From djm at mindrot.org 2002-01-26 09:59
2015 Jan 09
5
OpenSSH_6.7p1 hostbased authentication failing on linux->linux connection. what's wrong with my config?
I run OpenSSH on linux
@ client
which ssh
/usr/local/bin/ssh
ssh -v
OpenSSH_6.7p1, OpenSSL 1.0.1j 15 Oct 2014
@ server
which sshd
/usr/local/bin/sshd
sshd -v
unknown option -- V
OpenSSH_6.7p1, OpenSSL 1.0.1j 15 Oct 2014
usage: sshd [-46DdeiqTt] [-b bits] [-C connection_spec] [-c host_cert_file]
[-E log_file] [-f config_file] [-g login_grace_time]