Displaying 20 results from an estimated 300 matches similar to: "Question about adding another parameter for OpenSSH"
2019 Aug 06
2
[PATCH v2] Remove sshkey_load_private()
Remove sshkey_load_private(), as this function's role
is similar to sshkey_load_private_type().
---
Dependency:
This change depends over recently merged change in openbsd:
https://github.com/openbsd/src/commit/b0c328c8f066f6689874bef7f338179145ce58d0
Change log:
v1->v2
- Remove declaration of sshkey_load_private() in authfile.h
authfile.c | 38
2020 Apr 25
2
[PATCH 1/3] Add private key protection information extraction to ssh-keygen
Add private key protection information extraction to shh-keygen using -v
option on top of -y option which is already parsing the private key.
Technically, the passphrase isn't necessary to do this, but it is the
most logical thing to do for me.
Adding this to -l option is not appropriate because fingerprinting is
using the .pub file when available.
An other idea is to add a new option, I
2012 Sep 09
2
Patch for ssh-keygen to allow conversion of public key to openssh format
Hi,
I needed to convert a public RSA key to autorized_keys format and found
ssh-keygen lacking this feature.
I made the option -Q publicfile to allow an conversion like
ssh-keygen -Q pubrsa.pem -y
The patch is produced using unified diff and made on latest release.
If you like it and can make a patch for the man-page also!
Regards,
/Lars
-------------- next part --------------
diff -u
2005 May 19
1
ssh-keygen private keys export - new feature
Hello,
I had some difficulties in order to convert private keys between different
implementations of SSH.
So, I wrote the following patch to allow export of SSH2 RSA and DSA private
keys into IETF SECSH format.
Note that I also slightly revised the IETF SECSH key import code.
Usage: use of the "-e" option on a private key file generates an unencrypted
private key file in IETF SECSH
2008 Sep 15
0
No subject
hello..
i am running openssh-3.7.1p2. on linux.It is working successfully..and daemon is running &client also connecting.But the problem is with the mips architecture when i connecting this server from remote syytem.?i got an error of buufer_get:trying to get more bytes 1 than buffer0.And client is not connecting from remote system.My out is as follows on my server
?in sshd main
before
2008 Sep 18
2
SSHD_PROBLEM
hello..
i am running openssh-3.7.1p2. on linux.It is working
successfully.and daemon is running &client also connecting.But the
problem is with the mips architecture when i connecting this server
from remote syytem. i got an error of buufer_get:trying to get more
bytes 1 than buffer0.And client is not connecting from remote system.My
out is as follows on my server
in sshd main
before
2010 Jan 12
1
[patch] Make keys work again
This patch makes keys work again. This bug was introduced in r1.78:
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/authfile.c.diff?r1=1.77;r2=1.78.
Joachim
Index: authfile.c
===================================================================
RCS file: /usr/obsd-repos/src/usr.bin/ssh/authfile.c,v
retrieving revision 1.78
diff -u -N -p authfile.c
--- authfile.c 11 Jan 2010 04:46:45 -0000
2012 Jan 28
1
PATCH: Support for encrypted host keys
Hello all,
I recently found myself wanting to run sshd with passphrase-protected host keys rather than the usual unencrypted format, and was somewhat surprised to discover that sshd did not support this. I'm not sure if there's any particular reason for that, but I've developed the below patch (relative to current CVS at time of writing) that implements this. It prompts for the
2015 Dec 11
1
[Bug 2504] New: key_load_private_type: unknown or unsupported key type
https://bugzilla.mindrot.org/show_bug.cgi?id=2504
Bug ID: 2504
Summary: key_load_private_type: unknown or unsupported key type
Product: Portable OpenSSH
Version: 7.1p1
Hardware: All
OS: All
Status: RESOLVED
Severity: minor
Priority: P5
Component: ssh
Assignee: unassigned-bugs
2015 Nov 17
2
[PATCH] Skip RSA1 host key when using hostbased auth
Hello,
The following patch avoids a warnign message when using hostbased
authentication as root and protocol v1 support has been disabled. The
case for non-root users has already been addressed, but root follows a
different code path.
--
Iain Morgan
diff --git a/ssh.c b/ssh.c
index cceb36e..e32aa0a 100644
--- a/ssh.c
+++ b/ssh.c
@@ -1242,8 +1242,10 @@ main(int ac, char **av)
2001 Nov 25
2
displaying identity key comment string in passphrase prompt
A Feature Request for OpenSSH 3.x:
In version 2.x, when prompting for the passphrase ssh would print
a prompt including the comment string from an RSA key, like:
Enter passphrase for RSA key 'Your Dog's Name':
The comment string was a useful way to remind the user what the
passphrase was (i didn't use hints quite this easy :-).
In Openssh 3.0, ssh prompts using the filename:
2013 Jun 25
1
RFC: encrypted hostkeys patch
Hi,
About a year and a half ago I brought up the topic of encrypted hostkeys
and posted a patch
(http://marc.info/?l=openssh-unix-dev&m=132774431906364&w=2), and while the
general reaction seemed receptive to the idea, a few problems were pointed
out with the implementation (UI issues, ssh-keysign breakage).
I've finally had some spare time in which to get back to this, and I've
2011 Mar 14
2
[Bug 1878] New: error message in key_perm_ok should be firmer
https://bugzilla.mindrot.org/show_bug.cgi?id=1878
Summary: error message in key_perm_ok should be firmer
Product: Portable OpenSSH
Version: 5.8p1
Platform: All
URL: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug
/663455
OS/Version: All
Status: NEW
Severity: minor
Priority:
2015 Nov 21
3
[Bug 2505] New: key_load_private_type: unknown or unsupported key type
https://bugzilla.mindrot.org/show_bug.cgi?id=2505
Bug ID: 2505
Summary: key_load_private_type: unknown or unsupported key type
Product: Portable OpenSSH
Version: 7.1p1
Hardware: All
OS: All
Status: NEW
Severity: minor
Priority: P5
Component: ssh
Assignee: unassigned-bugs at
2010 Nov 27
0
[patch] Make passphrase-protected SSHv1 keys work again
ssh-add on OpenBSD current (with malloc -S enabled) crashes ("chunk is
already free") when loading my password-protected SSHv1 key (used only
for testing). "ssh-add ~/.ssh/identity" also fails to format the prompt
properly ("Enter passphrase for :").
The issue is as follows:
Starting at ssh-add.c:158 in add_file(ac, filename = "~/.ssh/identity"),
we call
2009 Sep 14
1
Fwd: NUT and removed allowfrom/ACCEPT/REJECT support
I don't reply to messages send to me in private.
Best regards, Arjen
--
Please keep list traffic on the list
-------------- next part --------------
An embedded message was scrubbed...
From: Rudolf Cejka <cejkar op fit.vutbr.cz>
Subject: NUT and removed allowfrom/ACCEPT/REJECT support
Date: Mon, 14 Sep 2009 19:23:17 +0200
Size: 3148
URL:
2007 Aug 22
0
Patch to allow checking of v1 keys on remote host.
The attached patch for 4.6p1 adds a feature (-u) that will check to
see if a key exists on a remote host. I use this for auditing my
users transition to v2 keys very useful. If there is any interest
I'll provide a patch for v2 ssh keys also.
http://vapid.dhs.org/dokuwiki/doku.php?id=vapidlabs:openssh_check_key_patch
-- Thanks
Larry
--- orig/openssh-4.6p1/sshconnect1.c 2006-11-07
2010 Jan 12
2
[patch] Automatically add keys to agent
My keys are secured with a passphrase. That's good for security, but
having to type the passphrase either at every login or at every
invocation of ssh(1) is annoying.
I know I could invoke ssh-add(1) just before invoking ssh(1), if I keep
track of whether I invoked it already, or write some hacky scripts; but
the rest of OpenSSH is wonderfully usable without any hacks.
Hence, this patch.
2010 Jan 07
6
[Bug 1693] New: ssh prompts for passphrase even when identity file is unreadable
https://bugzilla.mindrot.org/show_bug.cgi?id=1693
Summary: ssh prompts for passphrase even when identity file is
unreadable
Product: Portable OpenSSH
Version: 5.3p1
Platform: All
OS/Version: All
Status: NEW
Severity: minor
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs
2001 Sep 28
1
openssh-2.9.9p2 assumes pid_t, uid_t, etc. are not 'long'
openssh-2.9.9p2 assumes that pid_t, uid_t, gid_t, and mode_t are no
wider than int. GCC complains about this assumption on 32-bit Solaris
8 sparc, where these types are 'long', not 'int'. This isn't an
actual problem at runtime on this host, as long and int are the same
width, but it is a problem on other hosts where pid_t is wider than
int. E.g., I've heard that 64-bit