Displaying 20 results from an estimated 20000 matches similar to: "why compact.c needed ?"
2000 Sep 13
2
Can't connect to server using protocol v2?
Is this really caused by a buggy server, or is this an interoperability
problem? It seems to work ok when I specify -o "protocol 1" on the command
line. Thanks,
Greg
[gleblanc at grego1 gleblanc]$ ssh -v login.metalab.unc.edu
SSH Version OpenSSH_2.2.0p1, protocol versions 1.5/2.0.
Compiled with SSL (0x0090581f).
debug: Reading configuration data /etc/ssh/ssh_config
debug: Applying
2001 Nov 05
3
OpenSSH 2.3
Dear Gentlemen:
a couple of months ago we ported OpenSSH 2.3 to an IBM OS/390 Mainframe machine: It ran very well until we tried to connect to an SSH server using SSH2 protocol. On the OS/390 (which is the client) it comes up with the following error messages:
>ssh -v -2 somehost
.
.
.
debug: bits set: 504/1024
debug: len 55 datafellows 0
debug:
2000 Sep 18
1
ssh-agent and ssh2 servers...
I'm not on the mailing list, so I'd appreciate it if you could cc: me,
though I will keep an eye on the archives.
I am running openssh 2.2.0p1 on Debian GNU/Linux. I was pleased to
see that 2.2.0p1 had support for DSA keys in the agent, and I have
successfully used the v2 protocol to another openssh server with the
agent providing authentication.
I am also able to successfully connect
2002 Jan 31
7
x509 for hostkeys.
This (very quick) patch allows you to connect with the commercial
ssh.com windows client and use x509 certs for hostkeys. You have
to import your CA cert (ca.crt) in the windows client and certify
your hostkey:
$ cat << 'EOF' > x509v3.cnf
CERTPATHLEN = 1
CERTUSAGE = digitalSignature,keyCertSign
CERTIP = 0.0.0.0
[x509v3_CA]
2000 Sep 16
15
Snapshot
Quite a few changes here, please test.
http://www.mindrot.org/misc/openssh/openssh-SNAP-20000916.tar.gz
-d
20000916
- (djm) New SuSE spec from Corinna Vinschen <corinna at vinschen.de>
- (djm) Update CygWin support from Corinna Vinschen <vinschen at cygnus.com>
- (djm) Use a real struct sockaddr inside the fake struct sockaddr_storage.
Patch from Larry Jones <larry.jones at
2001 Oct 29
5
HostbasedAuthentication problem
I'm trying to use HostbasedAuthentication. Running ssh -v -v -v user at host
the following error occurs:
debug3: authmethod_is_enabled hostbased
debug1: next auth method to try is hostbased
debug2: userauth_hostbased: chost <host>
debug2: we did not send a packet, disable method
What does this mean ? I enabled HostbasedAuthentication in
/etc/ssh/ssh_config and as it looks, this setting
2002 Feb 12
3
Problem with ssh-keyscan: no hostkey alg
Hi,
I am using ssh-keyscan with a list of hosts, such as:
ssh-keyscan -t rsa -f hosts_for_keyscan
Some of the hosts in the list have dsa, but no rsa keys. For such
hosts, the command displays:
no hostkey alg
When this is the case for 2 hosts, this message appears twice AND
SSH-KEYSCAN STOPS QUERYING, which means that no keys at all are
returned for the following hosts.
Here is the part of the
2002 May 16
5
OpenSSH 3.2.2 released
OpenSSH 3.2.2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support and encouragement.
Security Changes:
=================
- fixed buffer overflow
2004 Jul 13
10
vulnerability with ssh-agent
Hi
I have written a small introduction to newbies in Danish on ssh and
friends. Now some people are questioning my advice and I think they have
a point.
I am advocating people to use DSA-keys and a config file with this:
Protocol 2
ForwardAgent yes
ForwardX11 yes
Compression yes
CompressionLevel 9
and running ssh-agent and ssh-add, and then loggin in without giving
keys.
One
2000 Jun 12
2
problems with scp
I have an openssh server running on solaris 7 and the client running on
a clean RH linux 6.1 box. I am using the latest release (2.1.1p1 -- i
had the known solaris utmp problem and the read_key problem when using
2.1.0p2 so i upgraded).
scp from the linux machine to solaris machine gives a "lost connection"
message
[root at dog /root]# scp foo.bar solmachine:/tmp/
lost connection
the
2000 Aug 23
14
Test snapshot
I have just tarred up a snapshot and uploaded it to:
http://www.mindrot.org/misc/openssh/openssh-SNAP-20000823.tar.gz
The snapshot incorporates the last month's fixes and enhancements from
the openssh-unix-dev mailing list and from the OpenBSD developers.
In particular:
- ssh-agent and ssh-add now handle DSA keys. NB. this does not interop
with ssh.com's ssh-agent. (Markus Friedl)
2002 Mar 07
3
OpenSSH 3.1 released
OpenSSH 3.1 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support and encouragement.
Important Changes:
==================
- /etc/ssh/ now default
2002 Mar 07
3
OpenSSH 3.1 released
OpenSSH 3.1 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support and encouragement.
Important Changes:
==================
- /etc/ssh/ now default
2001 Sep 04
3
2.9p2 behaves different from 2.5.2p2 on tunneling issue
Hi,
I have a problem with a Linux box which I updated from 2.5.2p2
to 2.9p2 recently. It's running a tunnel started via inittab
using a script which starts
ssh -2 -N -o 'ConnectionAttempts 3600' -L <tunnel> $host
This has run reliable with 2.5.2 over the last months. Now, after
I have upgraded to 2.9p2, the tunnel is closed right after each
attempt of an application to use
2000 Dec 05
1
SSH_BUG_SIGBLOB?
Here are the details of my connection attempt:
my computer:
[jgrady at blarg jgrady]$ ssh -V
SSH Version OpenSSH_2.3.0p1, protocol versions 1.5/2.0.
Compiled with SSL (0x0090581f).
university server:
bash$ ssh -V
ssh: SSH Secure Shell 2.3.0 (non-commercial version) on mips-sgi-irix6.5
and the verbose output of my connection attempt:
[jgrady at blarg jgrady]$ ssh -v xxxxxx.xxx.xxx.xxx
SSH
2024 Mar 05
6
Call for testing: OpenSSH 9.7
Hi,
OpenSSH 9.7p1 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This is a bugfix release.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is also available via git using the
instructions at
2001 Jul 05
1
Patch to workaround host key size mismatch bug in old SSH sshd
Below is a patch against the current OpenBSD OpenSSH CVS to workaround a
behavior I have observed when converting from SSH 1.2.27 to OpenSSH while
using the same old RSA1 host key for protocol 1. In several cases I saw
that old SSH sshd reported a host key size of 1024 bits when OpenSSH saw it
as 1023 bits. Without the patch, when OpenSSH's ssh client connects to an
old SSH sshd it warns
2001 Nov 06
13
OpenSSH 3.0
OpenSSH 3.0 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
This release contains many portability bug-fixes (listed in the
ChangeLog) as well as several new features (listed below).
We would like to thank the
2001 Mar 15
3
Support for here documents with sftp client in OpenSSH 2.5.1p 1-1 (RH Linux 6.2 [2.2.x kernel])
Damien,
I was going down the path of public key authentication when I encountered
problems. I've been discussing it off-line using the simple example of
creating a key pair with no passphrase for an account on "myserver", then
trying to connect to myserver using the "ssh -i id_dsa myserver" command.
It's not working, so we're debugging now (see below). If you
2003 Jul 02
7
Fw: Problem/bug report for "bad decrypted len" error in OpenSSH
Markus and Damien,
here is a more detailed explanation about BUG report at
"http://bugzilla.mindrot.org/show_bug.cgi?id=592" concerning
"bad decrypted len" error in OpenSSH:
If anyone wants to do a private key sign, and the key is located in a device
or the Microsoft certificate store in which the private key cannot be
accessed directly ( you cannot access the private key