similar to: Determining Local IP Address within .profile

Displaying 20 results from an estimated 500 matches similar to: "Determining Local IP Address within .profile"

2002 Aug 13
3
[Bug 384] OpenSSH should store an SSH_SERVER variable for cluster hosts
http://cvs-mirror.mozilla.org/webtools/bugzilla/show_bug.cgi?id=384 ------- Additional Comments From thomas+openssh at stromberg.org 2002-08-14 05:43 ------- Created an attachment (id=137) --> (http://cvs-mirror.mozilla.org/webtools/bugzilla/attachment.cgi?id=137&action=view) 2 line patch for SSH_SERVER variable with incoming IP & port This patch adds an SSH_SERVER variable as a
2007 Apr 04
5
sshkey
Hello all, How are you using the sshkey type? Are you using it to list hosts and keys in a class that nodes include in order to manage /etc/ssh/ssh_known_hosts or something else? How does any of this relate to the sshrsakey and sshdsakey facts on the host? I read some stuff about this on the Virtual Resources page but it''s too vague for my simple mind and I''d be reluctant to use
2012 Oct 10
2
ssh over udp (or: -L option listening for traffic with a UDP service?)
All, A bit of background: I work on a QA API on a network that is very choppy (a lot of network interrupts), and we use ssh to do a large part of this automation. This leads to some problems: ssh connections seem to be sensitive to network state, becoming unusable if the choppiness reaches a certain threshold, and either timing out or disconnecting if this happens. Anyways, I stumbled across
2000 Sep 24
4
SSH_CLIENT _not_ set when doing a command
Hi, I'm trying to create an dynamic dns system by using the nsupdate (or Net::DNS) trough a non-passphrase protected ssh session. I've keygen'ed an extra key, with no passphrase and using it, i execute a litte script on the server, which updates te DNS records. (something like this: ssh pickup /usr/local/bin/updatedns 10.1.2.3) This al works fine and dandy. I would like to protect
2002 Sep 21
4
OpenSSH -current fails regression on Solaris 8, sshd dumps core
Hi All. While working on something I noticed a regression failure on Solaris 8. It turned out to be present in -cvs and wasn't due to my changes. One of the tests that fail is basically: ssh -2 -F $build/regress/ssh_proxy 999.999.999.999 true The server reports: sshd[20529]: Disconnecting: Command terminated on signal 11. The culprit seems to be session.c line 1019 or so: snprintf(buf,
2011 Oct 14
1
Determining the port assigned by -R 0
It's difficult to programmatically determine the port dynamically assigned by -R 0. The port is output in plain (and presumably localized) text, but I've found that by far the most common use of this is for scripts. Is there currently any sane way to get this information? For the short term I'll probably just parse the plaintext "Allocated port..." message, but that's
2001 Feb 20
1
2.5.1p1 ssh-agent path problem in Solaris
I'm having a path problem with OpenSSH 2.5.1p1 in Solaris (7). When ssh-agent is run, environment variables aren't being passed to the spawned shell. sol# env | wc -l 23 sol# env | grep -i ssh SSH_CLIENT=10.0.1.146 1047 22 SSH_TTY=/dev/pts/0 sol# sol# ssh-agent sh sol# env | wc -l 1 sol# env SSH_AGENT_PID=12032 sol# If I
2002 Aug 13
0
[Bug 384] New: OpenSSH should store an SSH_SERVER variable for cluster hosts
http://cvs-mirror.mozilla.org/webtools/bugzilla/show_bug.cgi?id=384 Summary: OpenSSH should store an SSH_SERVER variable for cluster hosts Product: Portable OpenSSH Version: -current Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P4 Component: ssh
2013 Jun 08
4
"Virtual hosts" for ssh
It'd be very cool if ssh supported something like Apache "virtual hosts". This would make it much more viable to host multiple installs of git on the same server, for example. More details: On the remote server, ssh already sets some environment variables: > printenv | grep SSH SSH_CLIENT=192.168.1.18 50945 22 SSH_TTY=/dev/pts/1 SSH_CONNECTION=192.168.1.18 50945 192.168.1.1 22
2017 Apr 26
2
sshd: SSH_CLIENT_CERT and SSH_CLIENT_PUBKEY env variables
Hello, There are environment variables SSH_CLIENT and SSH_CONNECTION with information about client of current session. I want to implement new variables with info about credentials used for session authentication. Such as: SSH_CLIENT_CERT SSH_CLIENT_CERT_ID SSH_CLIENT_CERT_PRINCIPALS SSH_CLIENT_PUBKEY SSH_CLIENT_PUBKEY_FINGERPRINT Some of that information available in logs but not inside the
2001 Oct 13
0
local IP in environment
I'm not sure if this is useful to anyone, but I made a small patch to include the local IP address that the user connected to in the environment (the opposite of SSH_CLIENT). The variable is called SSH_LOCAL. -Eric -------------- next part -------------- *** openssh-2.9.9p2/canohost.c.bak Sun Jun 24 22:01:24 2001 --- openssh-2.9.9p2/canohost.c Fri Oct 12 16:52:09 2001 *************** ***
2003 Oct 07
0
FW: Environment passing in Solaris 8 with later versions of SSH a nd UseLogin=yes
Hi, I'm still hoping that some-one can offer a solution to this issue.... Anyone? > I've got the following issue, which I'm unable to resolve by > myself. Hopefully, someone on the list will be able to guide > me, or provide more information towards resolving this. > > We've compiled OpenSSH v3.7.1p1 (which I know is not the most > recent version) on
2009 Dec 01
3
How to modify environment variables before executing a command
Hi, I'd like to access and modify shell environment variables before executing a command on a remote host via ssh. Unfortenatly, I can't figure out the proper way to do this... It seems, standard shell configuration files (e.g. ~/.bash_profile) are not sourced before ssh executes a command. Of course I could explicitly source them, e.g. ssh user at host 'source ~/.bash_profile;
2006 Aug 25
2
RFC: non-root ssh tun access
The attached patch is against openssh-4.3_p2 to allow non-root users to vpn in over ssh. root access is still needed on client side (or an sudo solution). Currently, I have it working with an sudo command to configure a tap interface on the server side. eg to ssh into my gentoo server: # ssh -fw any:any user at ssh_server.box "sudo /etc/init.d/net.tap0 restart" Then, configure the
2003 Sep 29
1
Environment passing in Solaris 8 with later versions of SSH and U seLogin=yes
Hi, I've got the following issue, which I'm unable to resolve by myself. Hopefully, someone on the list will be able to guide me, or provide more information towards resolving this. We've compiled OpenSSH v3.7.1p1 (which I know is not the most recent version) on Solaris 8 SPARC, and have noticed that when the "UseLogin=yes" parameter is set in the sshd_config file, the
2006 Feb 17
3
Switchtower (0.10.0), ssh and environment confusion
Seems like my day for Rails posts... :) OK. I''ve started using Swtichtower to help with deploying changes to my production rails apps. Unfortunately I''ve come accros an inconsistency that I can''t quite figure out. It''s about the PATH env var under Bash. I''ve created a task that just does a: run "env", to show what I''m seeing:
2004 Apr 06
2
[Bug 834] timezone settings on irix lost
http://bugzilla.mindrot.org/show_bug.cgi?id=834 Summary: timezone settings on irix lost Product: Portable OpenSSH Version: 3.8p1 Platform: All OS/Version: IRIX Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: openssh-bugs at mindrot.org ReportedBy: ktaylor at
2003 Aug 22
5
No interest in partial auth?
Hi, I don't mean to be annoying, but it seems like there isn't any interest in partial authentication. Is this true? It's not a future plan for OpenSSH to have this feature? I'd just like to know if I'm on my own or not. Thanks Erik.
2001 Jun 23
1
pam session
On Tue, Jun 19, 2001 at 03:11:02AM +0200, Christian Kraemer wrote: > This is espacially anoying if you > use pam_limits.so to set rlimits. Every user could > cirrcumvent them easily by calling ssh in this way: > ssh user at server /bin/sh Interestingly, Debian 2.2's openssh (1:1.2.3-9.3) does enforce rlimits somehow, not sure if it was specifically patched to do this or perhaps
2017 Jun 01
2
Get remote address when using direct-streamlocal@openssh.com.
I've a server where clients can connect to using direct-streamlocal at openssh.com. I want that the server "knows" the address of the client. I've tried using the peercredentials of the process connecting my server (which is a sshd process) and check the environment. I thought that in the environment the var SSH_CLIENT would be set, but that did not work. This sshd process has