similar to: [Bug 94] Userdefineable identification string

Displaying 20 results from an estimated 20000 matches similar to: "[Bug 94] Userdefineable identification string"

2002 Feb 01
4
[Bug 93] Added ability for ssh-add to parse config files to retrieve a list of valid IdentityFiles.
http://bugzilla.mindrot.org/show_bug.cgi?id=93 ------- Additional Comments From jprondak at visualmedia.com 2002-02-02 08:45 ------- Created an attachment (id=16) ssh-add.c patch to search ssh_config for IdentityFile(s) ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2002 Feb 01
1
[Bug 95] Allow '%' expansion to work in ssh and ssh-add
http://bugzilla.mindrot.org/show_bug.cgi?id=95 ------- Additional Comments From jprondak at visualmedia.com 2002-02-02 09:25 ------- Created an attachment (id=18) patch to tildexpand.c and auth.c to allow '%' substitution everywhere ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2006 Feb 22
8
[Bug 1159] %u and %h not handled in IdentityFile
http://bugzilla.mindrot.org/show_bug.cgi?id=1159 Summary: %u and %h not handled in IdentityFile Product: Portable OpenSSH Version: 4.3p2 Platform: All URL: http://www.math.ualberta.ca/imaging/snfs/openssh.html OS/Version: Linux Status: NEW Keywords: patch Severity: normal Priority: P2
2002 Feb 01
0
[Bug 95] New: Allow '%' expansion to work in ssh and ssh-add
http://bugzilla.mindrot.org/show_bug.cgi?id=95 Summary: Allow '%' expansion to work in ssh and ssh-add Product: Portable OpenSSH Version: 3.0.2p1 Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P2 Component: ssh AssignedTo: openssh-unix-dev at mindrot.org
2003 Apr 06
1
[Bug 537] Identification should depend on port number
http://bugzilla.mindrot.org/show_bug.cgi?id=537 Summary: Identification should depend on port number Product: Portable OpenSSH Version: 3.5p1 Platform: Other OS/Version: Linux Status: NEW Severity: minor Priority: P2 Component: ssh AssignedTo: openssh-unix-dev at mindrot.org ReportedBy:
2008 Feb 26
5
[Bug 1443] New: Missing terminating CR in identification string (RFC non-compliance)
https://bugzilla.mindrot.org/show_bug.cgi?id=1443 Summary: Missing terminating CR in identification string (RFC non-compliance) Classification: Unclassified Product: Portable OpenSSH Version: 4.7p1
2006 Jul 07
0
Bug#377276: "Did not receive identification string" warning reappeared
Package: logcheck-database Version: 1.2.45 Severity: normal Tags: patch pending confirmed My bad, sorry. --- rulefiles/linux/ignore.d.server/ssh 6 Jul 2006 10:16:41 -0000 1.18 +++ rulefiles/linux/ignore.d.server/ssh 7 Jul 2006 19:35:19 -0000 @@ -10,7 +10,7 @@ ^\w{3} [ :0-9]{11} [._[:alnum:]-]+ sshd\[[0-9]+\]: refused connect from [:[:alnum:].]+ \([:[:alnum:].]+\)$ ^\w{3} [ :0-9]{11}
2016 Aug 08
3
ssh(d) identification string in portable (clarification)
Hello all, We got a report [1], that we miss "p1" suffix in the sshd identification strings in Fedora. I dig in and found out that it is also missing from portable usptream since 2004, when you were rewriting version.h header file with this information. Debian somehow patched this information back during the time in some places (ssh_api.c is missing). It does not look like
2004 Aug 28
2
[Bug 921] Add operating system to OpenSSH version string
http://bugzilla.mindrot.org/show_bug.cgi?id=921 Summary: Add operating system to OpenSSH version string Product: Portable OpenSSH Version: -current Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P2 Component: sshd AssignedTo: openssh-bugs at mindrot.org
2006 Oct 03
3
[Bug 1246] Protocol version identification errors don't log the sender IP anymore, always UNKNOWN
http://bugzilla.mindrot.org/show_bug.cgi?id=1246 Summary: Protocol version identification errors don't log the sender IP anymore, always UNKNOWN Product: Portable OpenSSH Version: 4.4p1 Platform: ix86 OS/Version: Linux Status: NEW Severity: minor Priority: P2 Component: sshd
2006 Jun 19
1
[Bug 1198] ssh associates the host identification to just IP/hostname , and it should also include remote port.
http://bugzilla.mindrot.org/show_bug.cgi?id=1198 Summary: ssh associates the host identification to just IP/hostname , and it should also include remote port. Product: Portable OpenSSH Version: 4.3p2 Platform: All OS/Version: Linux Status: NEW Severity: enhancement Priority: P2
2003 Jul 01
10
[Bug 610] sshd should display the openssl version string from usage()
http://bugzilla.mindrot.org/show_bug.cgi?id=610 Summary: sshd should display the openssl version string from usage() Product: Portable OpenSSH Version: -current Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P5 Component: sshd AssignedTo: openssh-bugs
2008 Feb 29
1
FreeBSD 7.0 + Xen 3.1 + HVM: Success!
Just thought I'd pass along that I have successfully installed FreeBSD 7.0 into a Xen 3.1 HVM. ?This one went as smooth as I expected, considering my experience with 6.3. ?Haven't done any benchmarking or stress testing or port installs or anything. ?But so far it's working nicely. Here's all the info. ?If you'd like to see anything else, let me know. Host hardware: ?
2008 Apr 09
11
Number of words in a string
Hi R, A quick question: How do we find the number of words in a string? Example: C="Have a nice day" And the number of words should be 4. any built in function or?... Thanks, Shubha Shubha Karanth | Amba Research Ph +91 80 3980 8031 | Mob +91 94 4886 4510 Bangalore * Colombo * London * New York * San José * Singapore * www.ambaresearch.com This e-mail may contain
2002 Feb 13
8
[Bug 112] Using host key fingerprint instead of "yes"
http://bugzilla.mindrot.org/show_bug.cgi?id=112 ------- Additional Comments From dan at doxpara.com 2002-02-13 11:43 ------- Heh, I kinda like that. You should update the yes/no prompt to say that pasting the expected host key will result in appropriate testing, as well as providing some sort of error if the remote side *doesn't* match the key pasted in. I hadn't thought of cut
2006 Oct 15
0
sshd "bad protocol version identification" messages
I'm seeing lines like the following in my security logs: Oct 14 06:56:32 srv sshd[41370]: Bad protocol version identification '\200b\001\003\001' from 24.203.221.239 From what I've read, this is a buffer overflow attack on the sshd whereby the attacker triggers the overflow before the identification string is sent then attempts commands to see if elevated priveleges were
2007 May 03
2
Called party identification - where to take called name?
Hello, I am trying to apply the "called party identification" patch (patch 8824) and managed to make it work with a static data. Where do I take the name of the called person (the "equivalent" of CALLERID, but the other way...)? BTW, one note to the above patch: To make it work the device should have the parameter sendrpid set to true.
2005 Jul 28
2
Question about the identification header
Hi, I'm writing a little API in java that read/write ogg's comments (in the comment header), as well as reading the information header. All the "read" part is done and is working well, but I am having a little problem while coding the "write" part of the API. In the docs (I use http://www.xiph.org/ogg/vorbis/doc/Vorbis_I_spec.html#id4726648), I founded everything
2004 Jan 09
1
Called Party Identification
Does * support Called Party Identification? Say for example, I dial extension 2000, SIP sends back John Doe from the sip.conf file where extension 2000 is defined? Would this violate the SIP RFC? - Brent
2016 Jun 24
1
UDP Constant IP Identification Field Fingerprinting Vulnerability
We received a notice from our pci-dss auditors respecting this: CVE-2002-0510 The UDP implementation in Linux 2.4.x kernels keeps the IP Identification field at 0 for all non-fragmented packets, which could allow remote attackers to determine that a target system is running Linux. The NVD entry for which contains this note: CHANGE> [Cox changed vote from REVIEWING to NOOP] Cox> So I