Displaying 20 results from an estimated 4000 matches similar to: "[Fwd: Re: X-windows security in Gnome]"
2002 May 17
2
[Fwd: Re: X-windows security in Gnome]
The "integration" of SSH with apps is already there.
Read the OpenSSH [or other SSH implementation's] man pages and the SSHv2 specs. RTFM!
Essentially SSH supports tunneling of X11 traffic. The SSH daemon is responsible for creating a local X11 display endpoint and setting the DISPLAY environment variable appropriately, then the apps you run in SSH sessions with X11 forwarding do
2002 May 17
2
[Fwd: Re: X-windows security in Gnome]
This is from a security discussion on one of the GNOME lists. Jim is
one of the original X11 people, for what that's worth. I just thought
I'd try to tempt some folks here into looking at doing ssh and X
integration "right".
Greg
--
Portland, Oregon, USA.
Please don't copy me on replies to the list.
-------------- next part --------------
An embedded message was
2000 Jul 12
0
Announce: portable OpenSSH 2.1.1p3
The 2.1.1p3 release of portable OpenSSH has been uploaded to the
OpenBSD ftp master site. In a few hours it will be available from one
of the many mirrors listed at:
http://www.openssh.com/portable.html
This release fixes several bugs reported since the previous release
and extends portability to NeXT and Reliant Unix.
As usual, the OpenBSD team has been hard at work further polishing and
2000 Jul 12
0
Announce: portable OpenSSH 2.1.1p3
The 2.1.1p3 release of portable OpenSSH has been uploaded to the
OpenBSD ftp master site. In a few hours it will be available from one
of the many mirrors listed at:
http://www.openssh.com/portable.html
This release fixes several bugs reported since the previous release
and extends portability to NeXT and Reliant Unix.
As usual, the OpenBSD team has been hard at work further polishing and
2000 Jul 11
3
Test snapshot
Can interested users please test the latest snapshot at
http://www.mindrot.org/misc/junk/openssh-SNAP-2000071102.tar.gz
It contains quite a few fixes for small problems that have been
reported in the last few weeks.
Pending feedback it is going to become 2.1.1p3
Regards,
Damien Miller
--------------- Changelog:
20000711
- (djm) Fixup for AIX getuserattr() support from Tom Bertelson
2000 Sep 13
2
Can't connect to server using protocol v2?
Is this really caused by a buggy server, or is this an interoperability
problem? It seems to work ok when I specify -o "protocol 1" on the command
line. Thanks,
Greg
[gleblanc at grego1 gleblanc]$ ssh -v login.metalab.unc.edu
SSH Version OpenSSH_2.2.0p1, protocol versions 1.5/2.0.
Compiled with SSL (0x0090581f).
debug: Reading configuration data /etc/ssh/ssh_config
debug: Applying
2002 Jul 12
0
[Bug 273] sshd hangs on shell exit if user spawned child with/bin/nohup
Perhaps the man page should be fixed then, because neither
rsh nor rlogin provide any kind of port forwarding, or X11
forwarding, etc...
Also, the comparison between ssh and rsh is more appropriate
if you're talking about SSHv1 and much less so if you're
talking about SSHv2.
Nico
--
> -----Original Message-----
> From: Eric Garff [mailto:egarff at omniture.com]
> Sent:
2000 Aug 07
2
smbmount shares not lasting
I've got a machine running RedHat Linux 6.2 on a P-II400 with 256MB of ram.
I'm mounting shares in the manner 'mount -t smbfs -o uid=user,gid=group
//server/share /mount/point'. The server is a genuine NT 4 server, with SP5
and a couple of hotfixes. I mounted a couple of shares yesterday, and
overnight the stopped working. When accessing the share, I get an error
message that
2001 Oct 26
2
SSHv2 sshd exit criteria
When should sshd disconnect an SSHv2 connection?
Markus Friedl says "for protocol v2 the client decides when to close the
connection."
In principle, I agree, because SSHv2 supports multiple sessions over the
same connection, with the client able to launch new sessions anytime
then it should be upto the client.
But this would be a major cultural change for most users, and would
break
2002 Jun 11
0
[Bug 271] New: SSHD should unblock SIGCHLD - POSIX signal blocks survive exec()
http://bugzilla.mindrot.org/show_bug.cgi?id=271
Summary: SSHD should unblock SIGCHLD - POSIX signal blocks
survive exec()
Product: Portable OpenSSH
Version: -current
Platform: Other
OS/Version: other
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo:
2002 Jan 15
1
Channels API and ~& question
When processing ~& with SSHv2 OpenSSH sends \004 (EOT) and does not
bother sending SSH2_MSG_CHANNEL_EOF.
Why is that?
Why is there no direct way to get SSH2_MSG_CHANNEL_EOF or
SSH2_MSG_CHANNEL_CLOSE sent? Or is there and I'm just missing it?
Thanks,
Nico
--
-DISCLAIMER: an automatically appended disclaimer may follow. By posting-
-to a public e-mail mailing list I hereby grant
2002 Feb 05
0
New forkoff() and chan_wont_read/write() API
Markus,
How's this patch?
- a chan_wont_read()/chan_wont_write() API is added that is very much
like chan_read_failed()/chan_write_failed(), but for the debug
messages and chan_wont_*() don't ever call error()
The 3.0.2p1 channel_pre_x11_open() uses chan_*_failed() but looks
like it ought to use chan_wont_*() instead :)
- forkoff() no longer fakes EOF for SSHv2 (still
2002 Feb 01
1
FEATURE: -f -f - fork after successful open of fwd port/display/agent
Background
==========
"ssh -f ..." causes ssh to fork into the background when userauth
successfully completes.
WHAT
===
With this patch "ssh -f -f ..." causes ssh to fork into the background
when the first forwarded port/x11 display/agent is successfully opened.
WHY
===
This feature makes launching remote X11 apps more reliable: when ssh
exits it must have exited because
2002 Feb 04
1
forkoff()
Please review the function below, forkoff(), meant to be used in
clientloop.c instead of daemon() and the code in process_escapes().
The intention is to make ~D ( like ~& but also detach) possible and to
make it possible for ssh -f (or ssh -f -f - see other thread on this)
to detach, not just forkoff().
I also intend to use the same detach technique in a feature patch for
the hang-on-exit
2015 Mar 27
2
FYI: SSH1 now disabled at compile-time by default
Hi,
On Fri, Mar 27, 2015 at 02:36:50PM +0100, Hubert Kario wrote:
> > Same thing with needing sshv1 to access old network gear where even sshv1
> > was an achievement. "Throw away gear that does its job perfectly well,
> > but has no sshv2 for *management*" or "keep around an ssh v1 capable
> > client"?
>
> If you depend on hardware like this,
2009 May 15
2
Changing owner/group on samba share
I've looked around and can't find the answer. We have a Samba file
server joined to our Active Directory and using ACLs. We are enforcing
quotas on this machine, but when specifying the home directory, the
directory is owned by the person who created it. Using Windows and going
into the security permissions, there doesn't seem to be a way to remove
the owning user/group. When you hit
2015 Jun 30
2
gssproxy items...
Hi,
I've been working on some systems trying to get kerberized nfsv4 and
kerberized web services going on 7. Kerberized nfsv4 was working with
7.0, but with the 7.1 release it stopped working, the key difference
between the two setups is that gssproxy wasn't being used with 7.0, but
seems to be key with 7.1.
The problem I am encountering with Kerberized NFSv4 is that the
directory will
2001 Nov 04
4
Slow connection performance with ssh2
Hi,
since I switched from SSH 1 to OpenSSH 2.9p2/2.9.9p2/3.0p1 Snapshot I suffer from
awfully slow connection performance. Once the connection is established, performance
is perfectly ok.
Client Server (protocol 2 only)
# time ssh -p 22222 xx id # time sshd -d -p 22222
real 0m13.340s real 0m13.900s
user 0m7.860s
2006 Jan 10
0
OSCON 2006 Call for Participation
The call for participation for this year''s O''Reilly Open Source
Convention has been posted. It''s included below, and you can find it
online here:
http://conferences.oreillynet.com/os2006/
The conference is July 24-28, and the deadline for submissions is
February 13. Early submissions help!
In 2005, Ruby built huge momentum at OSCON; all of the Ruby tutorials
2024 Mar 11
0
Announce: OpenSSH 9.7 released
OpenSSH 9.7 has just been released. It will be available from the
mirrors listed at https://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested