Displaying 20 results from an estimated 800 matches similar to: "MAX_ALLOW_USERS"
2010 Dec 10
1
Problem of updating openssh-4.4p1 to openssh-5.5p1 with MAX_ALLOW_USERS option
Hello!
We have the server with RHEL 5.5 (64-bit) and need to connect many parallel users over ssh (OpenSSH).
Usually we use openssh-4.4p1, builded from the sources with changed "servconf.h" file by this type:
???#define MAX_ALLOW_USERS ????????10000 ????/* Max # users on allow list. */
???#define MAX_DENY_USERS ???????????10000 ????/* Max # users on deny list. */
???#define
2002 Jul 04
4
Chroot patch (v3.4p1)
The following is a patch I've been working on to support a "ChrootUser"
option in the sshd_config file.
I was looking for a way to offer sftp access and at the same time restict
interactive shell access. This patch is a necessary first step (IMO).
It applies clean with 'patch -l'.
Also attached is a shell script that helps to build a chrooted home dir on
a RedHat 7.2
2010 Dec 10
0
Fwd: Problem of updating openssh-4.4p1 to openssh-5.5p1 with MAX_ALLOW_USERS option
Hello!
> Hello!
>
> We have the server with RHEL 5.5 (64-bit) and need to connect many
parallel users over ssh (OpenSSH).
> Usually we use openssh-4.4p1, builded from the sources with changed
"servconf.h" file by this type:
> #define MAX_ALLOW_USERS 10000 /* Max # users on
allow list. */
> #define MAX_DENY_USERS
2005 Jan 20
0
AllowUsers - proposal for useful variations on the theme
A short while ago, I looked at using the AllowUsers configuration option
in openssh (v3.8p1 , but I believe this to be unchanged in 3.9p1) to
restrict access such that only specific remote machines could access
specific local accounts.
I swiftly discovered that
a) specifying wildcarded IP numbers to try to allow a useful IP range
was pointless: if I specified
AllowUsers joe at
2003 Mar 01
12
encrypt authentication credentials with payload in the clear?
Is it possible to use encryption only for authenticate and
then switch to no encryption? I've looked at the code for
OpenSSH 3.5p1, cipher.c, and it looks like the answer is
no, at least for protocol 1. However, I cannot tell if that
is a deliberate design limitation of the implementation or
if it is inherent in ssh protocol 2.
My dilemma is a customer who wants to use their network IDS
2009 Dec 29
2
[Bug 1690] New: AllowUsers and DenyGroups directives are not parsed in the order specified
https://bugzilla.mindrot.org/show_bug.cgi?id=1690
Summary: AllowUsers and DenyGroups directives are not parsed in
the order specified
Product: Portable OpenSSH
Version: 5.3p1
Platform: ix86
OS/Version: Linux
Status: NEW
Keywords: patch
Severity: trivial
Priority: P2
Component:
2002 May 15
3
ssh3 with ssh1
On Solaris 8, I have ssh 3.1.0 and on other box Sol 7 I have 1.2.26 (min
version for comtable with ssh 3), I checked also /etc/ssh2/sshd2_config
file
## SSH1 compatibility
# Ssh1Compatibility <set by configure by default>
# Sshd1Path <set by configure by default
2) generate key for ssh3 # ssh-keygen2 -P /etc/ssh2/hostkey
2002 Mar 28
1
[PATCH] Feature addition: user access control per auth method
I added a few features to openssh for my local use that I think would
be more broadly useful. I basically added access control lists to
control who would be allowed public key authentication. I added four
config file entries for the server:
PubkeyAllowUsers
PubkeyDenyUsers
PubkeyAllowGroups
PubkeyDenyGroups
These follow the same sematics as the already existing entries for
2002 Feb 13
2
Problem with using both pam_listfile to deny logins and pubkey authentication
Hi,
I'm trying to use pam_listfile.so to deny logins from all others but few
users (names in /etc/loginusers). With password authentication it works
fine, but with public key authentication OpenSSH lets in users whose
names arent't in /etc/loginusers. AllowUsers in sshd_config does what
one would expect.
I'm using OpenSSH-3.0.2p1 on Debian testing (package version
1:3.0.2p1-6)
2001 Jun 19
1
FW: poor permissions on ssh binary
-----Original Message-----
From: Loomis, Rip
Sent: Tuesday, 19 June, 2001 09:10
To: 'geoff at raye.com'
Subject: RE: poor permissions on ssh binary
Geoff--
You stated that you consider it "a poor choice
of permissions" to install the ssh binary as
mode 0711. Since it will run perfectly with
even more restrictive permissions (we typically
install it mode 0511 here), what is
2017 Jun 07
2
Dovecot LDAP using custom field to allow users to connect
Hi all,
I'd like to know if it's possible to add a custom field when the
authentification is made by users.
My boolean custom field will be for example "AllowUser" (false/true).
I'm trying to do something like that but it's not working :
/user_filter =
(&(objectClass=posixAccount)(uid=%u)(objectClass=myclass)(AllowUser=TRUE))/
This is my dovecot/ldap
2003 Feb 12
1
((AllowUsers || AllowGroups) && !(AllowUsers && AllowGroups))
Hey everyone,
After discussing the AllowGroups I think I've discovered a bug.
The system is a solaris 8 system and the problem is that when I use
AllowGroups with no AllowUsers args, the proper actions happen. Same
with AllowUsers and no AllowGroups. When I try to combine the two, none
of the Allow directives seem to take.
Is it just me or maybe a bug?
-James
2017 Jun 07
1
Dovecot LDAP using custom field to allow users to connect
Hi Michael,
Just noticed you are using auth_bind_userdn which we don't.
I think you may need to use pass_filter rather than user_filter??
Best Regards
Martin
On 2017-06-07 10:59, Martin Wheldon wrote:
> Hi Michael,
>
> We do exactly that see example below:
>
> user_filter =
>
2004 Aug 17
1
Problems compiling OpenSSH [no version info] on HP-UX 10.20 was: (no subject)
Aloha Jiwen (I used to get kama'aina discounts, but
no longer)--
First, you didn't tell us what OpenSSH source code
version you're trying to compile. Without that info
there are any number of possible problems--so I'll
assume (for now) that you're using the latest
released portable version of OpenSSH. Please
reply with specific version info.
The fact that things are blowing
2003 Feb 10
0
Possible Allow* bug?
Hey,
After discussing the limit of MAX_ALLOW_USERS I've been trying to use
AllowGroups instead. In the config file I have the AllowUsers lines
before the AllowGroups lines (I have tried both ways) and it appears
that the presence on the AllowGroups directives seems to blow away any
Allow* directives I have set. I'm not sure how to check further for bugs
so I figured I'd contact
2005 Jun 28
2
more flexible AllowUsers/DenyUsers syntax
Hi,
I hope this is the right place for a feature request.
I'd like to have more flexible AllowUsers/DenyUsers synax.
I am in a situation, where I have machines connected to three
networks (a private, high speed, a public, and a private vpn) and I'd
like to enable root logins only on the private networks. Currently I
see no way of doing this, because there is no way to specify a
2020 Jul 18
2
[Bug 3193] New: Add separate section in sshd_config man page on Access Control
https://bugzilla.mindrot.org/show_bug.cgi?id=3193
Bug ID: 3193
Summary: Add separate section in sshd_config man page on Access
Control
Product: Portable OpenSSH
Version: 8.3p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component:
2023 Mar 02
2
Multiple AllowGroup lines in sshd_config?
Hi!
I'm experimenting with migrating the custom sshd_config settings for our
(Debian bullseye, openssh-server 8.4) server environment into fragments
under sshd_config.d/, and am wondering about sshd's behaviour when
encountering multiple AllowGroup lines.
The manual states "For each keyword, the first obtained value will be
used.", so that gives me the impression that any
2001 Jun 01
0
Disabling Password-based auth? (was RE: recent breakins)
Crap. I hit send too fast. Last sentence in
first paragraph should have read "no completely
secure way" for authentication to be passed--
because the agent-based forwarding program
could have been compromised as well--except for
the cases already mentioned such as SRP and
RSAAuth where the auth. information is better
protected.
Even if the SF server had been capable of forwarding
the
2004 Aug 09
1
Question about AllowUsers and AllowGroups
While testing some AllowUsers and AllowGroups combinations I was surprised
to find that one cannot be used to override the other. For example:
AllowGroups administrators
AllowUsers john
If john is *not* part of the administrators group, then access is being denied.
Is this the expected behaviour? This would force me to create another group just
for ssh, something like ssh-admins.
This other