Displaying 20 results from an estimated 120 matches similar to: "Disconnects from Cisco router ssh sessions."
2004 Jun 25
0
SSH_MSG_USERAUTH_PASSWD_CHANGEREQ and 3.1.0 F-SECURE SSH - Pr oces s Software SSH for OpenVMS
Darren,
> -----Original Message-----
> From: Darren Tucker [mailto:dtucker at zip.com.au]
> Sent: Thursday, June 17, 2004 11:08 PM
> To: Scott Rankin
> Subject: Re: SSH_MSG_USERAUTH_PASSWD_CHANGEREQ and 3.1.0
> F-SECURE SSH - Pr oces s Software SSH for OpenVMS
>
>
> Scott Rankin wrote:
> >>That will depend on which versions exhibit the problems. Is it
>
2002 Feb 12
1
SSH-1.0-SSH_Version_Mapper ?
Hi guys,
Feb 12 22:46:24 fallen sshd[10026]: [ID 800047 auth.info] scanned from
xxx.xxx.xxx.xxx with SSH-1.0-SSH_Version_Mapper. Don't panic.
Just wondering whether anyone here has anymore information on this type of
scan?
Cheers,
Damien
2008 Jun 09
0
[Bug 1475] New: Cisco routers drop protocol 1 connections when lots of input is sent.
https://bugzilla.mindrot.org/show_bug.cgi?id=1475
Summary: Cisco routers drop protocol 1 connections when lots of
input is sent.
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.0p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P5
2004 Jun 17
2
SSH_MSG_USERAUTH_PASSWD_CHANGEREQ and 3.1.0 F-SECURE SSH - Proces s Software SSH for OpenVMS
I have found that this server,
<snip>
debug1: Remote protocol version 1.99, remote software version 3.1.0 F-SECURE
SSH - Process Software SSH for OpenVMS
debug1: no match: 3.1.0 F-SECURE SSH - Process Software SSH for OpenVMS
</snip>
does not follow the IETF secsh draft [1] related to the
SSH_MSG_USERAUTH_PASSWD_CHANGEREQ message.
<snip>
...
Normally, the server responds
2003 Aug 10
9
updated gssapi diff
this is the proposed gssapi diff against OpenSSH-current (non-portable).
note: if this goes in, the old krb5 auth (ssh.com compatible) will be
removed.
please comment.
jakob
Index: auth.h
===================================================================
RCS file: /home/hack/jakob/mycvs/sshgss/auth.h,v
retrieving revision 1.1.1.2
retrieving revision 1.3
diff -u -r1.1.1.2 -r1.3
--- auth.h
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string
client_version_string.
These are used just in a few functions and can easily be passed as
parameters.
Also, there is a strange construct, where their memory is allocated to
the global pointers, then copies of these pointers are assigned to the
kex structure. The kex_free finally frees them via cleanup of the kex
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
Dear OpenSSH developers,
I've worked this week on an alternative key exchange mechanism, in
reaction to the whole NSA leaks and claims over cryptographic backdoors
and/or cracking advances. The key exchange is in my opinion the most
critical defense against passive eavesdropping attacks.
I believe Curve25519 from DJB can give users a secure alternative to
classical Diffie-Hellman (with fixed
2007 Aug 15
1
rsync 3 (cvs) segfault if $RSYNC_CONNECT_PROG is not set
$ ./rsync distrib-coffee.ipsl.jussieu.Fr::
Erreur de segmentation
Easy to understand and fix (after 3 minutes inside a debugger):
Index: socket.c
===================================================================
RCS file: /cvsroot/rsync/socket.c,v
retrieving revision 1.130
diff -u -b -B -w -p -p -u -r1.130 socket.c
--- socket.c 11 Aug 2007 16:20:56 -0000 1.130
+++ socket.c 15 Aug
2008 Feb 28
0
problem with the ltm package - 3PL model
Hi Xavier,
the reason you observe this feature is that in the 'constraint'
argument you should specify the values under the additive
parameterization, i.e., when in the second column of the matrix
supplied in 'constraint' you specify 2, then you need to provide the
easiness parameters (not the difficulty parameters) in the third
column. Check the Details section of ?tpm() and
2015 May 23
5
Name based SSH proxy
I am working on a proxy which can be hosted on a single
IP address and dispatch requests to different backends
depending on which hostname the client used to connect to
this IP address.
Currently such a proxy can be build to support HTTP, HTTPS,
SMTP, and DNS. However SSH support is impossible due to
the ssh client not sending the information such a proxy
would need.
I am not the first to want
2003 Jul 03
0
AIX cleanups: includes and arguments
Hi All.
First the questions:
Is there anything objectionable in this patch?
Is AUDIT_FAIL_AUTH appropriate for the "Reason" field?
Now the details: attached is a patch that changes some of the #includes
for AIX. It moves the AIX-specific includes to port-aix.h and adds
includes that contain the prototypes for many of the authentication
functions. The idea isto fix some warnings.
2015 Jul 20
2
WinSCP 5.7.5 will support the RFC 4419 revision to Diffie-Hellman group exchange
Hello,
I'd like to inform you that the next release of WinSCP SFTP client (version 5.7.5) will support Diffie-Hellman group exchange as specified by RFC 4419.
http://winscp.net/tracker/show_bug.cgi?id=1345
So I'd like to ask you to kindly update the check in
compat_datafellows() to
WinSCP_release_4*
WinSCP_release_5.0*
WinSCP_release_5.1*
WinSCP_release_5.2*
WinSCP_release_5.5*
2006 Feb 25
0
scp doesn't run in jail anymore
Hi *,
in Slackware 10.2, under scponly 4.6 chrooted shell, scp from openssh
4.2p1 (scp.c,v 1.125 2005/07/27 10:39:03 dtucker) runs fine.
scp from openssh 4.3p1 (scp.c,v 1.130 2006/01/31 10:35:43 djm), however,
does not start (or maybe does, but doesn't report to my WinSCP client).
Under bash, both versions run fine.
Any idea / help ?
I'm ready to do any further testing / experiments.
2015 Mar 09
1
Problem with ntp
On 03/09/2015 03:42 PM, Paul Heinlein wrote:
> On Mon, 9 Mar 2015, C.L. Martinez wrote:
>
>> Hi all,
>>
>> I have a problem with ntpd daemon in my CentOS7 vm. When I try to list
>> peers, command fails: [....]
>>
>> [root at c7tst ntpstats]# ntpq
>> ntpq> pe
>> ntpq: read: Connection refused
>> ntpq>
>
> Does "ntpq -4 -c
2000 Aug 02
0
Fix for configure.in
Hello!
The top-level configure.in in the CVS version of Samba uses "echo" instead
of the standard AC_MSG_* macros provided by Autoconf.
I could not find any reasons for not using AC_MSG_*. "cvs log
configure.in" doesn't list any reasons.
"cvs annotate configure.in" doesn't work for read-only CVS because the CVS
server for Samba is too old!
The attached
2000 Dec 22
0
patch to specify DSA host key on command line
--- openssh-2.3.0p1/sshd.c Sat Oct 14 01:23:13 2000
+++ openssh-2.3.0p1.new/sshd.c Tue Dec 19 11:26:51 2000
@@ -506,7 +506,7 @@
initialize_server_options(&options);
/* Parse command-line arguments. */
- while ((opt = getopt(ac, av, "f:p:b:k:h:g:V:u:diqQ46")) != EOF) {
+ while ((opt = getopt(ac, av, "f:p:b:k:h:H:g:V:u:diqQ46")) != EOF) {
2012 Aug 29
1
second FIPS patch for openssh 6.0p1, fix pubkey
The patch to enable FIPS mode for openssh 6.0p1 missed two instances of
the ssh client trying to use MD5. It causes pubkey-based authentication
to fail in FIPS mode.
I have copied the missing changes from auth2-pubkey.c into sshconnect2.c.
Here is a patch:
diff -cr openssh-6.0p1/sshconnect2.c openssh-6.0p1-patched/sshconnect2.c
*** openssh-6.0p1/sshconnect2.c Sun May 29 07:42:34 2011
---
2014 Jul 16
1
ssh - Connection closed by UNKNOWN
Hi,
ssh clients shows "closed by UNKNOWN" message when a socket is closed by a
remote side while ssh is waiting for user's password:
$ ssh user at localhost
user at localhost's password:
Connection closed by UNKNOWN
When the packet_read_seqnr() calls get_remote_ipaddr(), a connection's
socket is already closed and there's not been any other call of this function
yet
2002 Apr 23
0
[Bug 225] New: Supression of login warning banner for noninteractive commands
http://bugzilla.mindrot.org/show_bug.cgi?id=225
Summary: Supression of login warning banner for noninteractive
commands
Product: Portable OpenSSH
Version: 3.0.2p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P4
Component: ssh
AssignedTo:
2002 Jan 31
2
configure --with-rsh=CMD and default blocking-IO support
A while back I argued for adding a --with-rsh=CMD option to configure
and got some general agreement that it would be a good thing (especially
for systems that don't have rsh at all). However, the changes were
never integrated into rsync.
This patch adds the --with-rsh=CMD option to configure and modifies
main.c to improve the blocking-IO setting code. The old code would set
blocking_io to