Displaying 20 results from an estimated 20000 matches similar to: "[Bug 94] Userdefineable identification string"
2002 Feb 01
4
[Bug 93] Added ability for ssh-add to parse config files to retrieve a list of valid IdentityFiles.
http://bugzilla.mindrot.org/show_bug.cgi?id=93
------- Additional Comments From jprondak at visualmedia.com 2002-02-02 08:45 -------
Created an attachment (id=16)
ssh-add.c patch to search ssh_config for IdentityFile(s)
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Feb 01
1
[Bug 95] Allow '%' expansion to work in ssh and ssh-add
http://bugzilla.mindrot.org/show_bug.cgi?id=95
------- Additional Comments From jprondak at visualmedia.com 2002-02-02 09:25 -------
Created an attachment (id=18)
patch to tildexpand.c and auth.c to allow '%' substitution everywhere
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2006 Feb 22
8
[Bug 1159] %u and %h not handled in IdentityFile
http://bugzilla.mindrot.org/show_bug.cgi?id=1159
Summary: %u and %h not handled in IdentityFile
Product: Portable OpenSSH
Version: 4.3p2
Platform: All
URL: http://www.math.ualberta.ca/imaging/snfs/openssh.html
OS/Version: Linux
Status: NEW
Keywords: patch
Severity: normal
Priority: P2
2002 Feb 01
0
[Bug 95] New: Allow '%' expansion to work in ssh and ssh-add
http://bugzilla.mindrot.org/show_bug.cgi?id=95
Summary: Allow '%' expansion to work in ssh and ssh-add
Product: Portable OpenSSH
Version: 3.0.2p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
AssignedTo: openssh-unix-dev at mindrot.org
2003 Apr 06
1
[Bug 537] Identification should depend on port number
http://bugzilla.mindrot.org/show_bug.cgi?id=537
Summary: Identification should depend on port number
Product: Portable OpenSSH
Version: 3.5p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: minor
Priority: P2
Component: ssh
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy:
2008 Feb 26
5
[Bug 1443] New: Missing terminating CR in identification string (RFC non-compliance)
https://bugzilla.mindrot.org/show_bug.cgi?id=1443
Summary: Missing terminating CR in identification string (RFC
non-compliance)
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.7p1
2006 Jul 07
0
Bug#377276: "Did not receive identification string" warning reappeared
Package: logcheck-database
Version: 1.2.45
Severity: normal
Tags: patch pending confirmed
My bad, sorry.
--- rulefiles/linux/ignore.d.server/ssh 6 Jul 2006 10:16:41 -0000 1.18
+++ rulefiles/linux/ignore.d.server/ssh 7 Jul 2006 19:35:19 -0000
@@ -10,7 +10,7 @@
^\w{3} [ :0-9]{11} [._[:alnum:]-]+ sshd\[[0-9]+\]: refused connect from [:[:alnum:].]+ \([:[:alnum:].]+\)$
^\w{3} [ :0-9]{11}
2016 Aug 08
3
ssh(d) identification string in portable (clarification)
Hello all,
We got a report [1], that we miss "p1" suffix in the sshd identification
strings in Fedora. I dig in and found out that it is also missing from
portable usptream since 2004, when you were rewriting version.h header
file with this information.
Debian somehow patched this information back during the time in some
places (ssh_api.c is missing).
It does not look like
2004 Aug 28
2
[Bug 921] Add operating system to OpenSSH version string
http://bugzilla.mindrot.org/show_bug.cgi?id=921
Summary: Add operating system to OpenSSH version string
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo: openssh-bugs at mindrot.org
2006 Oct 03
3
[Bug 1246] Protocol version identification errors don't log the sender IP anymore, always UNKNOWN
http://bugzilla.mindrot.org/show_bug.cgi?id=1246
Summary: Protocol version identification errors don't log the
sender IP anymore, always UNKNOWN
Product: Portable OpenSSH
Version: 4.4p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: minor
Priority: P2
Component: sshd
2006 Jun 19
1
[Bug 1198] ssh associates the host identification to just IP/hostname , and it should also include remote port.
http://bugzilla.mindrot.org/show_bug.cgi?id=1198
Summary: ssh associates the host identification to just
IP/hostname , and it should also include remote port.
Product: Portable OpenSSH
Version: 4.3p2
Platform: All
OS/Version: Linux
Status: NEW
Severity: enhancement
Priority: P2
2003 Jul 01
10
[Bug 610] sshd should display the openssl version string from usage()
http://bugzilla.mindrot.org/show_bug.cgi?id=610
Summary: sshd should display the openssl version string from
usage()
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
AssignedTo: openssh-bugs
2008 Feb 29
1
FreeBSD 7.0 + Xen 3.1 + HVM: Success!
Just thought I'd pass along that I have successfully installed FreeBSD 7.0
into a Xen 3.1 HVM. ?This one went as smooth as I expected, considering my
experience with 6.3. ?Haven't done any benchmarking or stress testing or
port installs or anything. ?But so far it's working nicely.
Here's all the info. ?If you'd like to see anything else, let me know.
Host hardware:
?
2008 Apr 09
11
Number of words in a string
Hi R,
A quick question: How do we find the number of words in a string?
Example:
C="Have a nice day"
And the number of words should be 4. any built in function or?...
Thanks, Shubha
Shubha Karanth | Amba Research
Ph +91 80 3980 8031 | Mob +91 94 4886 4510
Bangalore * Colombo * London * New York * San José * Singapore * www.ambaresearch.com
This e-mail may contain
2002 Feb 13
8
[Bug 112] Using host key fingerprint instead of "yes"
http://bugzilla.mindrot.org/show_bug.cgi?id=112
------- Additional Comments From dan at doxpara.com 2002-02-13 11:43 -------
Heh, I kinda like that. You should update the yes/no prompt to say that
pasting the expected host key will result in appropriate testing, as well as
providing some sort of error if the remote side *doesn't* match the key pasted
in.
I hadn't thought of cut
2006 Oct 15
0
sshd "bad protocol version identification" messages
I'm seeing lines like the following in my security logs:
Oct 14 06:56:32 srv sshd[41370]: Bad protocol version identification
'\200b\001\003\001' from 24.203.221.239
From what I've read, this is a buffer overflow attack on the sshd
whereby the attacker triggers the overflow before the identification
string is sent then attempts commands to see if elevated priveleges were
2007 May 03
2
Called party identification - where to take called name?
Hello,
I am trying to apply the "called party identification" patch (patch 8824) and
managed to make it work with a static data. Where do I take the name of the
called person (the "equivalent" of CALLERID, but the other way...)?
BTW, one note to the above patch: To make it work the device should have the
parameter sendrpid set to true.
2005 Jul 28
2
Question about the identification header
Hi,
I'm writing a little API in java that read/write ogg's comments (in the
comment header), as well as reading the information header. All the
"read" part is done and is working well, but I am having a little
problem while coding the "write" part of the API.
In the docs (I use
http://www.xiph.org/ogg/vorbis/doc/Vorbis_I_spec.html#id4726648), I
founded everything
2004 Jan 09
1
Called Party Identification
Does * support Called Party Identification? Say for example, I dial
extension 2000, SIP sends back John Doe from the sip.conf file where
extension 2000 is defined? Would this violate the SIP RFC?
- Brent
2016 Jun 24
1
UDP Constant IP Identification Field Fingerprinting Vulnerability
We received a notice from our pci-dss auditors respecting this:
CVE-2002-0510 The UDP implementation in Linux 2.4.x kernels keeps the
IP Identification field at 0 for all non-fragmented packets, which
could allow remote attackers to determine that a target system is
running Linux.
The NVD entry for which contains this note:
CHANGE> [Cox changed vote from REVIEWING to NOOP]
Cox> So I