Displaying 20 results from an estimated 130 matches similar to: "key management with ssh-agent, IdentityFile and info leakage"
2010 May 19
0
Hi - Regarding xend - xm create Error
Hi,
I am able to get Xend running on Fedora 8 but when I try to create any
VM it fails.
The xm create osc.cfg throws following error -
[root@asds174 vm_images]# xm create osc.cfg
Modified
arg=osc.cfg
stop3
Using config file "./osc.cfg".
group_id=None
[''create'', ''osc.cfg'']
Stop 1
None
[''vm'', [''name'',
2002 Oct 03
0
[Bug 410] New: when -i or IdentityFile is specified, agent keys are still tried first
http://bugzilla.mindrot.org/show_bug.cgi?id=410
Summary: when -i or IdentityFile is specified, agent keys are
still tried first
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: minor
Priority: P2
Component: ssh-agent
AssignedTo:
2002 Oct 04
1
[Bug 410] when -i or IdentityFile is specified, agent keys are still tried first
http://bugzilla.mindrot.org/show_bug.cgi?id=410
------- Additional Comments From markus at openbsd.org 2002-10-04 17:34 -------
it's not documented that -i or IdentityFile overwrite
the agent and it's to late to even consider this change.
if you don't want to use the agent, unset SSH_AUTH_SOCK
------- You are receiving this mail because: -------
You are the assignee for the
2013 Jul 12
0
[Bug 1898] possible unreasonable behaviour when using ProxyCommand with multiple IdentityFile(s)
https://bugzilla.mindrot.org/show_bug.cgi?id=1898
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|REOPENED |RESOLVED
Resolution|--- |FIXED
--- Comment #15 from Damien Miller <djm at
2015 Aug 11
0
[Bug 1898] possible unreasonable behaviour when using ProxyCommand with multiple IdentityFile(s)
https://bugzilla.mindrot.org/show_bug.cgi?id=1898
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
--- Comment #16 from Damien Miller <djm at mindrot.org> ---
Set all RESOLVED bugs to CLOSED with
2020 Jun 24
2
[Bug 3186] New: ProxyJump should include IdentityFile when specified
https://bugzilla.mindrot.org/show_bug.cgi?id=3186
Bug ID: 3186
Summary: ProxyJump should include IdentityFile when specified
Product: Portable OpenSSH
Version: 8.3p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee:
2017 May 31
1
[PATCH 0/1] Process the IdentityFile option from the included files
Hello,
This change is to get the IdentityFile option processed
from the included configuration files.
Regards,
Oleg
Oleg Zhurakivskyy (1):
Process the IdentityFile option from the included files
readconf.c | 14 ++++++--------
1 file changed, 6 insertions(+), 8 deletions(-)
--
2.9.3
2023 May 12
0
[Bug 3570] New: Add substitution token for explicitly selected IdentityFile for ControlPath selection
https://bugzilla.mindrot.org/show_bug.cgi?id=3570
Bug ID: 3570
Summary: Add substitution token for explicitly selected
IdentityFile for ControlPath selection
Product: Portable OpenSSH
Version: 9.3p1
Hardware: All
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
2019 Oct 09
3
[Bug 3080] New: Document IdentityFile=none and clarify interaction of defaults with IdentitiesOnly
https://bugzilla.mindrot.org/show_bug.cgi?id=3080
Bug ID: 3080
Summary: Document IdentityFile=none and clarify interaction of
defaults with IdentitiesOnly
Product: Portable OpenSSH
Version: 8.0p1
Hardware: Other
OS: All
Status: NEW
Severity: normal
Priority: P5
2019 Apr 01
2
IdentityFile vs IdentitiesOnly
Hi folks,
I've got a moderate number of keys in my ssh config file.
Problem: Very often I get an error message like
Received disconnect from 2001:db8::8077 port 999:2: Too many authentication failures
Authentication failed.
AFAIU the ssh-agent is to blame here, trying out all keys
he has ever seen. This conflicts with MaxAuthTries 6, set by
default on the peer.
The solution seems to be to
2006 Apr 27
1
IdentityFile option escape sequences
Hello,
I'm using openssh-4.3p2 compiled for sparc-sun-solaris2.8. I'm trying
to use the IdentityFile option with the escape sequences for the remote
host name (%h) and remote user name (%r) as documented in ssh-config
<http://www.openbsd.org/cgi-bin/man.cgi?query=ssh_config&sektion=5&arch=&apropos=0&manpath=OpenBSD+Current>.
It seems the escape sequences do not
2019 Apr 02
2
IdentityFile vs IdentitiesOnly
Hi Darren,
On 4/1/19 10:41 AM, Darren Tucker wrote:
> On Mon, 1 Apr 2019 at 08:12, Harald Dunkel <harald.dunkel at aixigo.de> wrote:
>> I've got a moderate number of keys in my ssh config file.
>> Problem: Very often I get an error message like
> [...]
>> The solution seems to be to set IdentitiesOnly, e.g.:
> [...]
>> Shouldn't an explicit
2012 Feb 06
0
xend memory leakage
When I repeated restarting VM or define and undefined VM during my recently test, memory leakage of xend is detected. Our elementary conclusion is that the python memory management mechanism causes this problem, but I do not know how to further locate the exact lines. Can anybody here give me any suggestions? Thx.
Yong an Liu
2017 Jul 27
1
Memory Leakage in Gluster 3.10.2-1
Are you still facing the problem ? If so, Can you please provide the
workload , cmd_log_history file, log files , etc ?
Regards
Rafi KC
On 06/23/2017 02:06 PM, shridhar s n wrote:
> Hi All,
>
> We are using GlusterFS 3.10.2 (upgraded from 3.7.0 last week) on
> CentOS 7.x .
>
> We continue to see memory utilization going up once every 3 days. The
> memory utilization of
2017 Jun 23
1
Memory Leakage in Gluster 3.10.2-1
Hi All,
We are using GlusterFS 3.10.2 (upgraded from 3.7.0 last week) on CentOS 7.x .
We continue to see memory utilization going up once every 3 days. The memory utilization of the server demon(glusterd) in ?server is keep on increasing. In about 30+ hours the Memory utilization of glusterd service alone will reach 70% of memory available. Since we have alarms for this threshold, we get notified
2005 Dec 15
0
Packets Sizes and Information Leakage
So one of my coworkers is doing a little research on SSH usage in the
wild using netflow data. One of the things he's trying to do is
determine a way to differentiate between data transfers and interactive
sessions. We thought of a couple of ways but we wanted to float them
here and see if there are methods incorporated to defeat thi sort of
traffic analysis.
The first idea is to look at
2020 Nov 03
0
[PATCH v3 2/2] vhost-vdpa: fix page pinning leakage in error path
On 10/29/2020 2:53 PM, Michael S. Tsirkin wrote:
> On Thu, Oct 15, 2020 at 01:17:14PM -0700, si-wei liu wrote:
>> On 10/15/2020 6:11 AM, Michael S. Tsirkin wrote:
>>> On Thu, Oct 15, 2020 at 02:15:32PM +0800, Jason Wang wrote:
>>>> On 2020/10/14 ??7:42, si-wei liu wrote:
>>>>>> So what I suggest is to fix the pinning leakage first and do the
2018 Jul 17
0
Memory leakage from large lists
This looks like a case of FAQ 7.42:
https://cran.r-project.org/doc/FAQ/R-FAQ.html#Why-is-R-apparently-not-releasing-memory_003f
On Mon, Jul 16, 2018 at 2:32 PM, Daniel Raduta <datudar at gmail.com> wrote:
> Hello,
>
> I am experiencing a very noticeable memory leak when using large lists of
> large data. The code below creates a list of matrices, yet the memory does
> not
2011 Dec 13
3
ssh-agent and IdentityFile
I've noticed that the ssh-agent applies any keys it already has
passwords for (via ssh-add) first, overriding the ssh config files for
preferred identity file from .ssh/config and -i. This seems a
documented behavior.
However, this causes problems with some tool chains that use the
authorized_keys command directive to change behavior based on which
key is used.
In my case, I use gitolite for
2000 Mar 09
1
[Galen Hancock <galen@veribox.net>] Information leakage in sshd
Hi,
Thought I'd just forward this here, because I don't have time to look
into it right now, and am off skiing next week.
I'd guess that we should be checking for username = ``root'' before
going off to do password checks, and rejecting it on that basis first.
Cheers, Phil.
--
Mind-numbingly stupid UK law alert!
Act now to stop it! http://www.stand.org.uk/
--------------