similar to: vulnerability with ssh-agent

Displaying 20 results from an estimated 4000 matches similar to: "vulnerability with ssh-agent"

2008 Jul 03
3
problem with lm and predict - no predictions made
Hi I have a problem with lm and predict I have us [1] 2789.53 3128.43 3255.03 3536.68 3933.18 4220.25 4462.83 4739.48 [9] 5103.75 5484.35 5803.08 5995.93 6337.75 6657.40 7072.23 7397.65 [17] 7816.83 8304.33 8746.98 9268.43 9816.98 10127.95 10469.60 10960.75 [25] 11685.93 12433.93 13194.70 13843.83 us.p [1] 227.62 229.92 232.13 234.25 236.31 238.42 240.59 242.75 244.97
2000 Dec 28
2
ssh-agent, protocol 2, openssh-2.3.0p1
Hi -- I saw an email on December 26th in the openssh-unix-dev mailing list archived on MARC, indicating that agent forwarding is indeed not working for 2.2, but that it is working for 2.3. That email referred to a user with 2.3 clients and 2.2 server. I am running the 2.3 client AND server and am having a similar problem. The only unusual aspect of my installation is that I'm using port 24
2008 Jul 04
3
problem with NA and if
Hi I would like to sum a number of time series, some of them having NA's Standard action is here that if I sum a value with a NA, then the result is NA. I would like it to just keep the value. I then try to: a = NA; if (a == NA) { a = 0} just to try it out, but it says Error in if (a == NA) { : missing value where TRUE/FALSE needed What is wrong, and can I do it smarter? I looked at
2006 Apr 21
2
EXT2-fs warning (device hda6): ext2_fill_super: mounting ext3 filesystem as ext2
I often get the message: EXT2-fs warning (device hda6): ext2_fill_super: mounting ext3 filesystem as ext2 I have googled for a reason and a way to solve this - but not found something I could use. Maybe somebody here konws what to do? best regards keld
2006 Apr 16
2
e2fsck dies with signal 11
Hi I got a strange error, happening on two of my ext3 partitions. What can be wrong? And why does e2fsck error out, instead of displaying an error message? Best regards keld fsck /dev/hda6 fsck 1.38 (30-Jun-2005) e2fsck 1.38 (30-Jun-2005) Warning... fsck.ext3 for device /dev/hda6 exited with signal 11. also From my dmesg: <1>general protection fault: e7a8 [#3] Modules linked in:
2006 Apr 21
1
problem with e2fsck not knowing xfs
Hi! I had problem yesterday with e2fsck. It reported a bad superblock. I then tried to use one of the other superblocks. To no avail. Then later I remembered that I had switched the fs type to xfs. Maybe e2fsck could recognize other common fs types, and report this instead? best regards keld
2004 Jun 03
2
rsync preserving symlinks on mirror
Hi! I am using rsync succesfully to maintain my mirrors. I have one problem, tho. To improve speeds of my filesystems, I have created a raid 0 of 4 disks, and I place the most heavily copied disks there. The fs has subdirectories, one for each set of typically .iso files, such as Mandrakelinux or fedora. I would like to be able to just do a symlink from the original tree to the directory on the
2006 Jun 19
5
Limited write bandwidth from ext3
We are running a benchmark that does single threaded 512 KB writes to a LUN on a CLARiiON storage array. The dual Xeon host (Dell 2650) with 4 GB of memory runs RHEL 4U3 We measured the write bandwidth for writes to the block device corresponding to the lun (e.g. /dev/sdb), a file in an ext2 filesystem and to a file in an ext3 file system. Write b/w for 512 KB writes Block device 312 MBps Ext2
2006 Jul 26
4
data recovering in EXT3
Hello, We have run and stopped by chance command "fsck -y" on one of our raid disks (with ext3 file system). After that we have found that SOME files disappeared (they are not seen in the directories where they have been before). The data are extremely important and contain a lot of programs, scripts for some data analysis and very hard to recover by hands. I have run ''fsck
2015 Feb 23
4
Using confirmation of key usage per-host?
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Dear all, bear with me, I know the SUBJECT sounds pretty unclear. I'll clarify in a minute. And please excuse that due to the keywords being unclear no usable help was found on google & Co... Assume there is a workstation, which connects to multiple machines, one of which is considered potentially unsafe. So, it would be nice to have agent
2008 Aug 30
1
logging rsync transfers in processable format
For my rsync daemon, I would like it to log in a format that I could run some stats on, eg by webalizer that I use for http and ftp transfers. Is that doable? best regards keld
2008 Aug 30
1
running rsync daemon as unpribileged
Hi I run a mirror service where for gentoo I run rsync as a daemon. Currently the daemon runs root to get the 873 port opened. And when transfers then run, they run as nobody. I would like the rsync daemon to connect to 873 (as root) then possibly do a chroot and then run always as something else than root (maybe nobody). It this advisable? Is it possible? best regards keld
2006 Jul 22
6
two factor authentication
Are there any plans on the table to add native support for two-factor authentication, such as password *and* public key? Visa PCI standards require two-factor authentication for remote access and if password+key was available in openssh it would be much easier to maintain and support than a full-blown vpn with all the cross-platform compatibility issues that come with one. Thanks! Jacob
2006 Sep 24
1
Retaining undelete data on ext3
Having just spent a day trying to recover a deleted ext3 file for a friend, I'm wondering about this way of maintining undelete information in ext3, like is done for ext2: The last step in the deletion process would be to put back the (previously zeroed) block pointers. Since it gets logged to the journal, I _think_ that this should be safe. The worst that would happen is that, if the plug
2004 May 02
7
Connection caching?
Hey all, on the distcc mailing list, a thread about load balancing got a bit out of hand, and we started thinking about moving fsh-like connection caching into ssh itself to get rid of the overhead of starting up the python interpreter to run rsh. (Interestingly, mit's "rex", described at http://www.lcs.mit.edu/publications/pubs/pdf/MIT-LCS-TR-884.pdf, considers connection caching
2006 Aug 14
14
ClockingIT Beta - It''s about time...
My wife and I have been working on our own task-listing, time-tracking web application, and we''re really interested in some feedback as we ourselves feel we''ve come a long way. If you have some minutes to kill (or just want to see how the Comet functionality provided by the Juggernaut plugin can work) have a look at http://www.clockingit.com and
2001 Mar 07
2
password authenticaton secure ?
My question is regarding the possibility of someone wiretapping the communication and repeat the action. What if an intruder notice that there's a secure session starting (by guessing at the dst IP address and unintelligible payload) and then start capturing all the packets on this session for the purpose of repeating the whole session again? The secure user could add/delete interfaces and
2015 Sep 26
5
[RFC][PATCH v2] Support a list of sockets on SSH_AUTH_SOCK
The idea behind this change is to add support for different "ssh-agents" being able to run at the same time. It does not change the current behaviour of the ssh-agent (which will set SSH_AUTH_SOCK just for itself). Neither does it change the behaviour of SSH_AGENT_PID (which still supports only one pid). The new implementation will go through the list of sockets (which are separated by a
2020 Oct 04
6
ability to select which identity to forward when using "ForwardAgent" ?
Hi, I usually have around 10 identities loaded in my local ssh-agent and when I use the "ForwardAgent" option all them are forwarded to the remote server, which is not ideal. I usually only need to forward one (or two) of the identities and I would like to be able to choose which one(s) to forward. Looking for solutions it seems that the only option is to create a new ssh-agent, add
2003 Sep 22
1
Updating a linear model
My google search for Plackett's Algorithm didn't return too much except that Plackett's algorithm appears to be useful in Control Theory - it is elaborated as "Plackett's algorithm for on-line recursive least squares estimation". Sounds something like what I want. I am looking at developing a user modelling type app (new data points coming in and wanting to dynamically