Displaying 20 results from an estimated 40000 matches similar to: "SSH keys different"
2002 Apr 12
3
Chrooted sftp, did you getting it working?
Le Jeudi 11 Avril 2002 21:09, m.ibarra at cdcixis-na.com a ?crit :
> I was curious to know if you had any luck in getting openssh's sftp
> server properly configured to allow chrooted sftp logins? I have had
> no success and need something quickly.
Dear Mike,
Unfortunately, I did not succeed to have it work.
I got in contact with James Dennis <jdennis at law.harvard.edu>, who
2003 Feb 06
2
kex guess methods incorrect?
Hey guys,
My second post in the last few days (boy I'm active! ;)). We've had a
few issues with SSH Secure Shell version 3.2.0 (build 267) and sftp and
while trying to figure it out I noticed something in the debug output
that I think should be brought to OpenSSH's attention.
Ssh2Transport/trcommon.c:1518: All versions of OpenSSH handle kex
guesses incorrectly.
Does anyone know
2003 Feb 10
0
PC based SSH question
Why would you ever do that? Use public key auth.
-James
Tim Tominna wrote:
> Is there a SSH implementation for the PC (windows) that allows you to
> pass a password for a user along with a command like the rsh utility does?
>
>
>
> **Thanks,**
>
> **Tim Tominna**
>
> **(760)930-5971**
>
> **timt at callawaygolf.com**
>
>
>
--
James Dennis
2003 Feb 05
2
MAX_ALLOW_USERS
Hey everyone,
I have been using sftp for quite some time now and we have just hit 256
sftp users. Line 21 of servconf.h reads:
#define MAX_ALLOW_USERS 256 /* Max # users on allow list. */
I am curious why this is in a header file and not something that is in
sshd_config that can be changed without recompile?
Thanks in advance!
--
James Dennis
Harvard Law School
"Not
2003 Jan 23
1
patched tarballs
Hello everyone,
As some of you may know, I maintain a patch that puts a '.' chroot hack
into OpenSSH. Unfortunately users seem to have had trouble applying the
patch. This is because I use gnu's patch and diff and many systems come
with a patch and diff that doesn't seem to understand -u or -N.
Anyway... the point of this email is to ask if anyone had any objections
to me
2003 Feb 10
0
Chroot with pam
Hey everyone,
As many of you may know, I maintain a patch to OpenSSH to chroot users
(http://chrootssh.sourceforge.net). It has been decided by the OpenSSH
developer's that such a patch should not be in the source because chroot
should occur outside of OpenSSH (which I agree with, but still need to
chroot users). Pam is capable of chrooting users and I am planning to
experiment with it
2003 Feb 10
0
Possible Allow* bug?
Hey,
After discussing the limit of MAX_ALLOW_USERS I've been trying to use
AllowGroups instead. In the config file I have the AllowUsers lines
before the AllowGroups lines (I have tried both ways) and it appears
that the presence on the AllowGroups directives seems to blow away any
Allow* directives I have set. I'm not sure how to check further for bugs
so I figured I'd contact
2002 Apr 01
1
chroot.diff
Hello,
I'm not sure if this is the list to mail, but I have updated chroot.diff for openssh 3.1. I thought more people are most likely using this and figured some people may lack the ability to update it themselves as certain functions were modified enough to require new function prototypes etc... I'd be happy to modify this again for future releases if you'd like.
As I'm not on
2003 Mar 10
0
This letter can change your life
This sounds good, should it be integrated into OpenSSH? :P
A little monday humor for you..
-James
Adolph Gorman wrote:
> This letter can change your life. In fact, I guarantee it.
>
> If you had one opportunity to have everything you ever wanted,
> would you grab it, or simply walk away?
>
> I have such an opportunity. One that can change your life forever.
>
>
2001 Sep 10
1
Help with exporting keys
Hi,
In our department's setup we have a unfortunate situation where we have to
use both OpenSSH and SSH (ssh.com's version). I have managed to export keys
from OpenSSH to SSH's format. I also managed to export SSH's public key to
OpenSSH's format. Now I would like to add the private key of SSH to the
agent. Now when I try to add it simply by using
ssh-add
2006 Mar 03
0
Important Statement to Review for Signing
(Seems to me that Icecast folks would be particularly concerned
about this. Please consider the following, lend your signatures,
and also *send it on* to appropriate interested parties. If you
are a blogger or know clueful bloggers, please try to have it
posted in a highly visible forum. -- Seth Johnson)
Hello folks,
Please review the important joint statement below, related to the
WIPO
2002 May 17
0
One last thing
I also forgot to mention. If anyone has any questions please cc jdennis at law.harvard.edu as I'm not on the openssh developer mailing list (I'm not an openssh developer :).
-James
2002 May 21
0
Chroot (theres that word again...)
Hey everyone,
It appears my last patch doesn't work entirely. Looks like I forgot to edit sshd.c for the priv seperation scheme (which is really cool by the way). Heres the new patch for chrooting system users (does not attempt to chroot the priv seperation user as ssh does that on it's own already).
-James
PS. Once again, I'm not on the openssh mailing list so if you have any
2001 Apr 19
5
Converting keys from commercial ssh
I'm not sure if this is useful to anyone else, but around here people are
insisting we use key-ed authentication with windows clients and Unix servers
over SSH protocol version 2.
I couldn't find a free windows client that would meet those requirements.
The closest was PuTTY, but it would only use password authentication with
SSH2. In the end, this means we will probably have to go with
2014 Dec 03
4
[Bug 2323] New: Two factor authentication with two different SSH keys
https://bugzilla.mindrot.org/show_bug.cgi?id=2323
Bug ID: 2323
Summary: Two factor authentication with two different SSH keys
Product: Portable OpenSSH
Version: 6.7p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs
2006 May 24
0
ASC/NZSA 2006 - Detailed Program Available via the Website
Australian Statistical Conference / New Zealand Statistical
Association Conference
'Statistical Connections'
SKYCITY, Auckland, New Zealand
3 - 6 July 2006
LESS THAN TWO MONTHS TO GO
Register Online Now!
Register now for ASCNZ06 - an international conference with a full and
varied scientific program.
For up to date and detailed information on the 2006 Program visit:
2003 Mar 11
0
different file types
You might look at "eval" and "parse".
Reid Huntsinger
-----Original Message-----
From: Spencer Graves [mailto:spencer.graves at pdf.com]
Sent: Tuesday, March 11, 2003 4:03 PM
To: janet rosenbaum
Cc: r-help
Subject: Re: [R] different file types
The command "'source' causes R to accept its input from the named file".
I don't know what you mean by
1999 Dec 10
2
[David Huggins-Daines <dhd@plcom.on.ca>] Bug#52414: ssh-add uses ssh-askpass, but ssh doesn't
Damien,
Here's a forwarded bug for you.
Cheers, Phil.
--[[message/rfc822]]
Subject: Bug#52414: ssh-add uses ssh-askpass, but ssh doesn't
Reply-To: David Huggins-Daines <dhd at plcom.on.ca>, 52414 at bugs.debian.org
Resent-From: David Huggins-Daines <dhd at plcom.on.ca>
Resent-To: debian-bugs-dist at lists.debian.org
Resent-CC: Philip Hands <phil at hands.com>
2003 Apr 16
0
third virtual conference on genomics and bioinformatics
Hello All
The third virtual conference on genomics and bioinformatics will host by
North Dakota State University September 16-19, 2003
More details http://www.ndsu.edu/virtual-genomics/conference_2003.htm
Call for papers and 2002 accepted papers
http://www.ndsu.edu/virtual-genomics/papers_2003.htm
Third Virtual Conference on Genomics and Bioinformatics: September 16-19,
2003
Advances in
2002 Jun 05
3
ssh-add: local private keys added to forwarded agents
Hi,
This may or may not cause concern for some people (considering a lot of
people store all of their keys on a single client system).
Snippet from draft-ietf-secsh-agent-00.txt:
2. Security Considerations
This protocol is designed only to run as a channel of the SSH
protocol.
The goal of this extension is to ensure that the users private keys
never leave the machine they are