Displaying 20 results from an estimated 10000 matches similar to: "authorized_keys[2]"
2002 Jan 14
0
[Bug 66] New: $HOME/authorized_keys not read by sshd
http://bugzilla.mindrot.org/show_bug.cgi?id=66
Summary: $HOME/authorized_keys not read by sshd
Product: Portable OpenSSH
Version: -current
Platform: ix86
OS/Version: Linux
Status: RESOLVED
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy:
2009 Oct 31
2
authorized_keys command=""
Hello,
as I have read manual, if I use in file authorized_keys option
command="" with some command, no other commands will be permitted. I
have tried it, created authorized_keys2 for root and added there
command="rdiff-backup --server" and after that tried to login. Thit
command was executed, but I was normally able to supply other comand
as root. Can you tell me why?
Thank
2003 Aug 19
3
splitting big authorized_keys files
Hello everybody,
I have a problem. You may have the answer :-)
I'd like to use openssh for an authentication service.
But that gives me a user, whose ~/.ssh/authorized_keys file has about 15000
entries.
With about 300 characters per line I'd get 4,5 MB of data.
I believe that this length of file could lead to performance issues; so I'm
looking for solutions.
I already saw the
2001 Jan 18
1
New configuration scripts for Cygwin
Hi,
I have attached two new shell scripts `ssh-host-config' and
`ssh-user-config' which will replace the script `ssh-config'
in the next Cygwin OpenSSH release.
Could somebody with write access please remove
contrib/cygwin/ssh-config
from the OpenSSH repository and add these two attached files
instead?
The third attached file is the diff for contrib/cygwin/README.
Thanks in
2002 Jan 17
0
[Bug 72] New: sshd 3.0.2p1 assumes authorized_keys2 unless configured otherwise.
http://bugzilla.mindrot.org/show_bug.cgi?id=72
Summary: sshd 3.0.2p1 assumes authorized_keys2 unless configured
otherwise.
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo:
2005 Mar 15
1
Segmentation fault on public key authentification
Hello list,
after some weeks of operation and updates one server of mine needed a
reboot.
Now authentification with public key causes a segfault.
System information:
2.6.8-gentoo-r4 x86_64 AMD Dual Opteron(tm) Processor 242 AuthenticAMD
Debugging information:
// ssh fom node2 to node1
# ssh -vvv node1
OpenSSH_3.9p1, OpenSSL 0.9.7d 17 Mar 2004
debug1: Reading configuration data
2003 Aug 22
0
[PATCH] Small tweak to contrib/cygwin/ssh-user-config
Hi,
could somebody with checkin rights please apply the following patch
to contrib/cygwin/ssh-user-config? It just appends the RSA2 and DSA
keys to .ssh/authorized_keys instead of .ssh/authorized_keys2.
TIA,
Corinna
Index: contrib/cygwin/ssh-user-config
===================================================================
RCS file: /cvs/openssh_cvs/contrib/cygwin/ssh-user-config,v
retrieving
2001 Sep 26
3
OpenSSH 2.9.9
OpenSSH 2.9.9 has just been uploaded. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH 2.9.9 fixes a weakness in the key file option handling,
including source IP based access control.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
This release contains many portability
2002 Mar 11
0
Password-Authentication with openssh-3.1p1 fails
Hallo out there,
I've got a strange problem after updating my openssh-installation
from 2.9.9p2 (SuSE-package) to openssh-3.1p1 (Installation from the
source with a modified src.rpm). I will give you as much information
as possible and I hope there is anybody who can help me. I asked in
detail in usenet-groups but nobody had any idea to fix my problem by
configuration.
My system is a
2002 Mar 12
0
[Bug 159] New: Password-Authentication with openssh-3.1p1 fails
http://bugzilla.mindrot.org/show_bug.cgi?id=159
Summary: Password-Authentication with openssh-3.1p1 fails
Product: Portable OpenSSH
Version: 3.1p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
2003 Oct 09
1
Key-based auth fails - OpenSSH 3.7.1p2 (cygwin)
Hey all, Maybe someone has seen my problem before with OpenSSH under
cygwin. I'm trying to use key-based authentication and it's failing.
Configuration, permissions and -ddd information is provided in this email.
Thanks,
Brian Hayward
---------- Forwarded message ----------
Date: Thu, 9 Oct 2003 10:12:47 -0500 (CDT)
From: hayward at slothmud.org
To: cygwin at cygwin.com
Subject: Re:
2002 Apr 18
2
AuthorizedKeysFile
OpenSSH 3.1
Not really a bug, but an "undocumented feature".
The default sshd_config file show the default setting for AuthorizedKeysFile
as being:
AuthorizedKeysFile .ssh/authorized_keys
If you uncomment that default, it changes the "undocumented" setting for
"AuthorizedKeysFile2", which is by default:
AuthorizedKeysFile2 .ssh/authorized_keys2
2013 Sep 25
0
CA Signed Public Key User Authentication does not honor ~/.ssh/authorized_keys
Greetings,
I am using OpenSSH Signed Public Key authentication for servers ssh login.
All of the servers are setup with below sshd_config options:
TrustedUserCAKeys /etc/ssh/ca.pub # CA Public Keys
RevokedKeys /etc/ssh/revoke.pub # User Public Keys
When i started working on it, for ssh authentication i had to have CA
Public Key in User ~/.ssh/authorized_keys, like:
cert-authority ssh-rsa
2011 Dec 15
3
Retrieving authorized_keys via remote script
Here's a simple patch which retrieves authorized_keys via exec'ing a
program, rather than reading a flat file.
I added a simple option, AuthorizedKeysExec, to sshd_config which simply
executes the respective file, passing the username as argv[1].
Keys are returned via stdout.
Notes:
If AuthorizedKeysExec is set and an authorized_keys file exists,
checking the existing authorized_keys
2003 Feb 24
1
[Bug 502] New: sshd fails when "Compression yes" set on HPUX
http://bugzilla.mindrot.org/show_bug.cgi?id=502
Summary: sshd fails when "Compression yes" set on HPUX
Product: Portable OpenSSH
Version: 3.5p1
Platform: HPPA
OS/Version: HP-UX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
2002 Aug 08
0
Bugzilla bug entry #342
I may have found a similar issue with plain old RSAAuthentication. After
upgrading to 3.4p1 on Solaris 8, I am no longer able to use RSAAuthentication
with
PermitRootLogin forced-commands-only
Following is output from sshd -d -d:
Connection from 10.100.100.8 port 39955
debug1: Client protocol version 2.0; client software version OpenSSH_3.4p1
debug1: match: OpenSSH_3.4p1 pat OpenSSH*
Enabling
2014 Dec 22
4
[Bug 2328] New: Per-user certificate revocation list (CRL) in authorized_keys
https://bugzilla.mindrot.org/show_bug.cgi?id=2328
Bug ID: 2328
Summary: Per-user certificate revocation list (CRL) in
authorized_keys
Product: Portable OpenSSH
Version: 6.7p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
2006 Jan 19
3
ownership of authorized_keys
Hi,
I would like to make it impossible for users to change the
contents of the authorized_keys-file.
I just found out about the sshd_config setting:
AuthorizedKeysFile /etc/ssh/authorized_keys/%u
But even in that case that file has to be owned by the user,
unless I set ``StrictModes no'' which would allow other
nastyness. I would like to request that that file could also be
owned by
2016 Aug 03
2
Configure option '--with-ssh1' breaks openssh-7.3p1
On 08/03/16 03:19, Darren Tucker wrote:
>
> Yes. Debugging something on a system you can't interact with is hard
> enough without having information withheld.
>
I'll run again and add the relevant unedited texts as attachments.
There is nothing in /var/log/secure.
Also a diff between the config.h 's without and with --with-ssh1 is
attached.
I have a centos-6.7 under
2011 May 09
2
backdoor by authorized_keys2 leftovers
Hi devs,
recently I had to replace authorized_keys on several systems to
enforce an access policy change.
I was badly surprised that authorized_keys2(!) was still processed,
which allowed some old keys to enter the systems again, because I
wasn't aware of the file's existance on the server and use by sshd,
since this "backward compatibility" isn't documented, not even a