Displaying 20 results from an estimated 3000 matches similar to: "Open SSH question"
2003 Oct 01
2
documentation update?
The INSTALL file in the current distribution has the passphrase request
at
http://www.ntrnet.net/~jmknoble/software/x11-ssh-askpass/index.html
maybe this should be changed to
http://www.liquidmeme.net/software/x11-ssh-askpass
??
--
Antonino Iannella
Santos Ltd
91 King William St ADELAIDE SA 5000
Ph +618 8224 7712
Fax +618 8224 7577
Mobile +61408 800007
Email antonino.iannella at
2003 Oct 17
1
ssh-agent and rdist
Hi,
I'm having a real difficulty here, and I'll keep this very short; ask
for needed details. I've got two nearly identically configured RedHat 8
systems, call them A and B. I've generated keys with passphrases on
both, added the public key for B to ~/.ssh/authorized_hosts on A and
vice versa.
On either machine, I can use ssh-agent with no problems. In particular,
if I run
2003 Jul 22
1
ssh-askpass keyboard grab problems
We're developing a security application (http://iscs.sourceforge.net)
that uses SSH for out-of-band management. Sometimes we want to use rsa
keys and other times we want to use user ids and passwords. We noticed
that there was not an OpenSSH API that we could use to pass the user's
password and that we could not give it via stdin. We did notice that we
could set SSH_ASKPASS and launch
2003 Nov 13
1
corrupt client keys question
summary: I have a situation in which a private RSA key has been
corrupted, but it's still possible to log into a SSH server using that
file. This is with OpenSSH 3.6.1p2 Debian.
I have a SSH public/private key pair generated with "ssh-keygen -t
rsa". I can use the private key to successfully log into a SSH server
which has the public key in it's the authorized_keys file.
I
2001 Apr 10
2
LBX Support : Where to start
I would like to put a patch in OpenSSH start lbxproxy on the server if
both ends of the connection support LBX. I'm having difficulty figuring
out where to put this code, specifically I can't seem to find where the
X11 handshaking happens. Could someone help me out on this??
-Carl
2001 Jul 24
2
Small buglet trying to recompile SRPM
I've got RedHat 7.1 and when I downloaded the SRPM for
openssh-2.9p2-1.src.rpm and tried to rpm --recompile it bombed.
Here's the error message that it generated:
+ pushd x11-ssh-askpass-1.2.0
/usr/src/redhat/BUILD/openssh-2.9p2/x11-ssh-askpass-1.2.0
/usr/src/redhat/BUILD/openssh-2.9p2
+ xmkmf -a
imake -DUseInstalled -I/usr/X11R6/lib/X11/config
make Makefiles
Makefile:1052: *** target
2003 Sep 16
3
OpenBSD 3.3 x86 Build Problem
I'm seeing this on a clean build after downloading 3.7 to my
OpenBSD source tree...
bash-2.05b# make
[...]
===> lib
===> ssh
===> sshd
cc -o sshd sshd.o auth-rhosts.o auth-passwd.o auth-rsa.o
auth-rh-rsa.o sshpty.o sshlogin.o servconf.o serverloop.o
uidswap.o auth.o auth1.o auth2.o auth-options.o session.o
auth-chall.o auth2-chall.o groupaccess.o auth-skey.o
2001 Aug 08
4
build problem with 2.9p1 & p2
Greetings -
I don't think this is a bug; just something I don't understand.
I'm using RedHat Linux v7.0 with an i686 processor.
I've been using openssl v0.9.5a with openssh v2.2.1
I've upgraded to openssl v0.9.6b and openssh v2.9.p2
I've built both packages with the '--prefix=/usr' option.
During the openssh 'make install' at 'host-key' I get
2001 Sep 17
2
ANNOUNCE: x11-ssh-askpass v1.2.4
x11-ssh-askpass version 1.2.4 (code name: Boudin) is now available from
the following locations:
http://www.poboxc.com/~jmknoble/software/x11-ssh-askpass/
http://www.ntrnet.net/~jmknoble/software/x11-ssh-askpass/
x11-ssh-askpass is a passphrase dialog for use with OpenSSH
<http://www.openssh.com/> under the X Window System.
Significant changes since version 1.2.2 include:
- Minor
2001 Sep 17
2
ANNOUNCE: x11-ssh-askpass v1.2.4
x11-ssh-askpass version 1.2.4 (code name: Boudin) is now available from
the following locations:
http://www.poboxc.com/~jmknoble/software/x11-ssh-askpass/
http://www.ntrnet.net/~jmknoble/software/x11-ssh-askpass/
x11-ssh-askpass is a passphrase dialog for use with OpenSSH
<http://www.openssh.com/> under the X Window System.
Significant changes since version 1.2.2 include:
- Minor
2009 Jan 22
8
[Bug 1550] New: Move from 3DES to AES-256 for private key encryption
https://bugzilla.mindrot.org/show_bug.cgi?id=1550
Summary: Move from 3DES to AES-256 for private key encryption
Product: Portable OpenSSH
Version: 5.1p1
Platform: All
OS/Version: All
Status: NEW
Keywords: patch
Severity: enhancement
Priority: P2
Component: ssh-keygen
AssignedTo:
2001 Jan 22
3
CVS source tree from 22 Jan 2001
Makefile.in is not fixed !
in old ssh.h
# define SSH_ASKPASS_DEFAULT "/usr/X11R6/bin/ssh-askpass"
in new pathnames.h
#define _PATH_SSH_ASKPASS_DEFAULT "/usr/X11R6/bin/ssh-askpass"
but in Makefile.in
PATHS=...-DSSH_ASKPASS_DEFAULT=\"$(ASKPASS_PROGRAM)\"
-----------------------------------------------------------
about patch:
- remove unused defines:
2001 Apr 02
1
ANNOUNCE: x11-ssh-askpass v1.2.1
x11-ssh-askpass version 1.2.1 (code name: Fatoomsh) is now available
from the following locations:
http://www.jmknoble.cx/software/x11-ssh-askpass/
http://www.ntrnet.net/~jmknoble/software/x11-ssh-askpass/
x11-ssh-askpass is a passphrase dialog for use with OpenSSH
(www.openssh.com) under the X Window System.
The important changes since version 1.2.1 are as follows:
- Added a
2002 Mar 29
2
scp : Problems with pathing
Hi,
I'm sure I'll get a few "RTFM", but I hope I'll allay those feelings.
I'm getting the "scp: command not found". I've read the FAQ. I've
read bugs 42 and 82 in bugzilla. Hopefully, I didn't overlook something.
At a minimum, defines.h has :
#ifdef USER_PATH
# ifdef _PATH_STDPATH
# undef _PATH_STDPATH
# endif
# define _PATH_STDPATH
2008 Jul 15
2
Risk of StrictMode (but read only)
Is there a risk associated with having authorized_keys files set to readable but "StrictMode no"?
I am thinking particularly in the case of having public keys all centralized in a directory in /etc or something.
Is it really a potential hack vector if someone can read a public key, or is the only real danger if they were writable?
---
Don Hoover
dxh at yahoo.com
2001 Feb 27
1
scp hardwires location to ssh?
hello,
i'm building a solaris package of openssh 2.5.1 for my employer. my
configure string is this:
./configure --prefix=/usr/share/jon
--with-xauth=/usr/openwin/bin/xauth --with-ipv4-default
--with-tcp-wrappers --with-pid-dir=/etc --sysconfdir=/etc
i use a prefix of /usr/share/jon , then build the system V package
from there. most things work great, but somehow scp does not. it
seems
2000 Sep 10
1
X11 forwarding under Linux
Hello, I have been having issues with x11 forwarding using my
linux-mandrake based servers. I checked my XAUTHORITY variable and it was
set to ~/.Xauthority ... After reading the mail archives, I found the
/tmp/ssh* directory created during my ssh session, and did this:
export XAUTHORITY="/tmp/ssh-hzuA1805/cookies"
xeyes
...and the X11 forwarding worked!
I'm using the
2000 Oct 30
1
SSH-askpass - timeout possible?
Hello,
On my home PC, whch runs openssh with Jim Knoble's x11-ssh-askpass, I have
configured my Bash shell login script to prompt me for the passphrase. No
problem, however it waits during the login process for me to 'do something'
- i.e. enter a passphrase, cancel it or whatever. Is it possible to set a
timeout so that if, say, nothing occurs within a minute then it assumes no
2001 Feb 12
1
openssh bugs in snapshot for nextstep (fwd)
I was sent this from Mark Miller. Should we be using MAXPATHLEN
instead of PATH_MAX in the upstream tree? Not all systems define
PATH_MAX.
- Ben
--- sftp-int.c.orig Sat Feb 10 13:56:08 2001
+++ sftp-int.c Sun Feb 11 23:33:26 2001
@@ -435,5 +435,5 @@
unsigned long n_arg;
Attrib a, *aa;
- char path_buf[PATH_MAX];
+ char path_buf[MAXPATHLEN];
path1 =
2001 Apr 19
3
Why we can't login ? (fwd)
hints?
-------------- next part --------------
An embedded message was scrubbed...
From: Markus Friedl <msfriedl at cip.informatik.uni-erlangen.de>
Subject: Why we can't login ?
Date: Thu, 19 Apr 2001 09:18:02 +0200 (MET DST)
Size: 4357
Url: http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20010419/b433827e/attachment.mht