Displaying 20 results from an estimated 10000 matches similar to: "(no subject)"
2002 Aug 07
0
Subject: RE: so called hang-on-exit bug
My apologies Nico, I overlooked the fact that your post was not to the
list since most I receive are cc'd to me. You have my sincere apology for
the public re-posting of your private comments.
>
> I expect private e-mail to stay private. Particularly if I'm
> helping someone who I'm not required to help. It seems that you
> think that I'm obligated to you.
>
I have
2002 Aug 07
2
so called hang-on-exit bug
>
> Yes, you can "police" these things as a sysadmin. How? Use
> /usr/proc/bin/ptree, ps, lsof and what not to find all sshd
> processes and their associated ptys - the sshds that have no
> children processes but whose master pty's slave pty still has
> processes associated with said pty, those are the sshds that must be
> killed in order to clean up (or you
2001 Oct 07
3
socks and misc patch to 2.9.9p2
Attached is a very small patch that allows the ssh clients to use the
socks5 library. It should work with socks4 but is untested.
Tested on linux only
configure --with-socks
configure --with-socks5
Also included is a configure option to disable scp statistics
--disable-scp-stats
modified files
openssh-2.9.9p2/acconfig.h
openssh-2.9.9p2/channels.c
openssh-2.9.9p2/configure.in
2001 Oct 26
2
SSHv2 sshd exit criteria
When should sshd disconnect an SSHv2 connection?
Markus Friedl says "for protocol v2 the client decides when to close the
connection."
In principle, I agree, because SSHv2 supports multiple sessions over the
same connection, with the client able to launch new sessions anytime
then it should be upto the client.
But this would be a major cultural change for most users, and would
break
2002 May 17
1
[Fwd: Re: X-windows security in Gnome]
What else can possibly be done to integrate SSH and apps? I mean, it works, doesn't it?
Jim's message was unclear - I was left with the impression that Jim was not aware of the existing X11 forwarding in SSH.
Cheers,
Nico
--
> -----Original Message-----
> From: Gregory Leblanc [mailto:gleblanc at linuxweasel.com]
> Sent: Friday, May 17, 2002 5:33 PM
> To: OpenSSH Devel
2002 May 17
2
[Fwd: Re: X-windows security in Gnome]
The "integration" of SSH with apps is already there.
Read the OpenSSH [or other SSH implementation's] man pages and the SSHv2 specs. RTFM!
Essentially SSH supports tunneling of X11 traffic. The SSH daemon is responsible for creating a local X11 display endpoint and setting the DISPLAY environment variable appropriately, then the apps you run in SSH sessions with X11 forwarding do
2002 Nov 22
4
smbd weirdness
I have two identical installations of samba v2.25 on linux boxes. On one
system everything works fine but on the other, copies of smbd start but
never terminate. The result is that the winduhs boxes that are trying to
access the samba share get locked out and never find the samba server. The
configurations of the two systems are identical and I am unable to
determine why one works and the other
2002 Jun 11
0
[Bug 271] New: SSHD should unblock SIGCHLD - POSIX signal blocks survive exec()
http://bugzilla.mindrot.org/show_bug.cgi?id=271
Summary: SSHD should unblock SIGCHLD - POSIX signal blocks
survive exec()
Product: Portable OpenSSH
Version: -current
Platform: Other
OS/Version: other
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo:
2005 Jan 31
0
(no subject)
Sender: EMBROIDERED <tsl2u.c0shr@myweb.cn>
Reply-To: meilung1931@yahoo.com.tw
Date: Thu, 16 Dec 2004 12:08:13 +0800
X-Mailer:Dynamailer V 8.4
X-MimeOLE:Produced By Mircosoft MimeOLE V6.00.2600.0000
Return-Path:meilung1931@yahoo.com.tw
[r-devel@stat.math.ethz.ch ]
EMBROIDERED PATCHES CUSTOM POLICE , FIRE, SPORTS , CLUBS
2002 Jan 15
1
Channels API and ~& question
When processing ~& with SSHv2 OpenSSH sends \004 (EOT) and does not
bother sending SSH2_MSG_CHANNEL_EOF.
Why is that?
Why is there no direct way to get SSH2_MSG_CHANNEL_EOF or
SSH2_MSG_CHANNEL_CLOSE sent? Or is there and I'm just missing it?
Thanks,
Nico
--
-DISCLAIMER: an automatically appended disclaimer may follow. By posting-
-to a public e-mail mailing list I hereby grant
2002 Feb 05
0
New forkoff() and chan_wont_read/write() API
Markus,
How's this patch?
- a chan_wont_read()/chan_wont_write() API is added that is very much
like chan_read_failed()/chan_write_failed(), but for the debug
messages and chan_wont_*() don't ever call error()
The 3.0.2p1 channel_pre_x11_open() uses chan_*_failed() but looks
like it ought to use chan_wont_*() instead :)
- forkoff() no longer fakes EOF for SSHv2 (still
2015 Mar 27
2
FYI: SSH1 now disabled at compile-time by default
Hi,
On Fri, Mar 27, 2015 at 02:36:50PM +0100, Hubert Kario wrote:
> > Same thing with needing sshv1 to access old network gear where even sshv1
> > was an achievement. "Throw away gear that does its job perfectly well,
> > but has no sshv2 for *management*" or "keep around an ssh v1 capable
> > client"?
>
> If you depend on hardware like this,
2024 Sep 22
0
Announce: OpenSSH 9.9 released
OpenSSH 9.9 has just been released. It will be available from the
mirrors listed at https://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested
2024 Sep 20
0
Announce: OpenSSH 9.9 released
OpenSSH 9.9 has just been released. It will be available from the
mirrors listed at https://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested
2024 Sep 20
0
Announce: OpenSSH 9.9 released
OpenSSH 9.9 has just been released. It will be available from the
mirrors listed at https://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested
2024 Sep 22
0
Announce: OpenSSH 9.9 released
OpenSSH 9.9 has just been released. It will be available from the
mirrors listed at https://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested
2002 Jul 12
0
[Bug 273] sshd hangs on shell exit if user spawned child with/bin/nohup
Perhaps the man page should be fixed then, because neither
rsh nor rlogin provide any kind of port forwarding, or X11
forwarding, etc...
Also, the comparison between ssh and rsh is more appropriate
if you're talking about SSHv1 and much less so if you're
talking about SSHv2.
Nico
--
> -----Original Message-----
> From: Eric Garff [mailto:egarff at omniture.com]
> Sent:
2024 Mar 11
0
Announce: OpenSSH 9.7 released
OpenSSH 9.7 has just been released. It will be available from the
mirrors listed at https://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested
2024 Jan 11
0
Announce: timeline to remove DSA support in OpenSSH
Hi,
OpenSSH plans to remove support for DSA keys in the near future. This
message describes our rationale, process and proposed timeline.
Rationale
---------
DSA, as specified in the SSHv2 protocol, is inherently weak - being
limited to a 160 bit private key and use of the SHA1 digest. Its
estimated security level is <=80 bits symmetric equivalent[1][2].
OpenSSH has disabled DSA keys by
2024 Jan 11
0
Announce: timeline to remove DSA support in OpenSSH
Hi,
OpenSSH plans to remove support for DSA keys in the near future. This
message describes our rationale, process and proposed timeline.
Rationale
---------
DSA, as specified in the SSHv2 protocol, is inherently weak - being
limited to a 160 bit private key and use of the SHA1 digest. Its
estimated security level is <=80 bits symmetric equivalent[1][2].
OpenSSH has disabled DSA keys by