similar to: Disconnects from Cisco router ssh sessions.

Displaying 20 results from an estimated 120 matches similar to: "Disconnects from Cisco router ssh sessions."

2004 Jun 25
0
SSH_MSG_USERAUTH_PASSWD_CHANGEREQ and 3.1.0 F-SECURE SSH - Pr oces s Software SSH for OpenVMS
Darren, > -----Original Message----- > From: Darren Tucker [mailto:dtucker at zip.com.au] > Sent: Thursday, June 17, 2004 11:08 PM > To: Scott Rankin > Subject: Re: SSH_MSG_USERAUTH_PASSWD_CHANGEREQ and 3.1.0 > F-SECURE SSH - Pr oces s Software SSH for OpenVMS > > > Scott Rankin wrote: > >>That will depend on which versions exhibit the problems. Is it >
2002 Feb 12
1
SSH-1.0-SSH_Version_Mapper ?
Hi guys, Feb 12 22:46:24 fallen sshd[10026]: [ID 800047 auth.info] scanned from xxx.xxx.xxx.xxx with SSH-1.0-SSH_Version_Mapper. Don't panic. Just wondering whether anyone here has anymore information on this type of scan? Cheers, Damien
2008 Jun 09
0
[Bug 1475] New: Cisco routers drop protocol 1 connections when lots of input is sent.
https://bugzilla.mindrot.org/show_bug.cgi?id=1475 Summary: Cisco routers drop protocol 1 connections when lots of input is sent. Classification: Unclassified Product: Portable OpenSSH Version: 5.0p1 Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P5
2004 Jun 17
2
SSH_MSG_USERAUTH_PASSWD_CHANGEREQ and 3.1.0 F-SECURE SSH - Proces s Software SSH for OpenVMS
I have found that this server, <snip> debug1: Remote protocol version 1.99, remote software version 3.1.0 F-SECURE SSH - Process Software SSH for OpenVMS debug1: no match: 3.1.0 F-SECURE SSH - Process Software SSH for OpenVMS </snip> does not follow the IETF secsh draft [1] related to the SSH_MSG_USERAUTH_PASSWD_CHANGEREQ message. <snip> ... Normally, the server responds
2003 Aug 10
9
updated gssapi diff
this is the proposed gssapi diff against OpenSSH-current (non-portable). note: if this goes in, the old krb5 auth (ssh.com compatible) will be removed. please comment. jakob Index: auth.h =================================================================== RCS file: /home/hack/jakob/mycvs/sshgss/auth.h,v retrieving revision 1.1.1.2 retrieving revision 1.3 diff -u -r1.1.1.2 -r1.3 --- auth.h
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string client_version_string. These are used just in a few functions and can easily be passed as parameters. Also, there is a strange construct, where their memory is allocated to the global pointers, then copies of these pointers are assigned to the kex structure. The kex_free finally frees them via cleanup of the kex
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
Dear OpenSSH developers, I've worked this week on an alternative key exchange mechanism, in reaction to the whole NSA leaks and claims over cryptographic backdoors and/or cracking advances. The key exchange is in my opinion the most critical defense against passive eavesdropping attacks. I believe Curve25519 from DJB can give users a secure alternative to classical Diffie-Hellman (with fixed
2007 Aug 15
1
rsync 3 (cvs) segfault if $RSYNC_CONNECT_PROG is not set
$ ./rsync distrib-coffee.ipsl.jussieu.Fr:: Erreur de segmentation Easy to understand and fix (after 3 minutes inside a debugger): Index: socket.c =================================================================== RCS file: /cvsroot/rsync/socket.c,v retrieving revision 1.130 diff -u -b -B -w -p -p -u -r1.130 socket.c --- socket.c 11 Aug 2007 16:20:56 -0000 1.130 +++ socket.c 15 Aug
2008 Feb 28
0
problem with the ltm package - 3PL model
Hi Xavier, the reason you observe this feature is that in the 'constraint' argument you should specify the values under the additive parameterization, i.e., when in the second column of the matrix supplied in 'constraint' you specify 2, then you need to provide the easiness parameters (not the difficulty parameters) in the third column. Check the Details section of ?tpm() and
2015 May 23
5
Name based SSH proxy
I am working on a proxy which can be hosted on a single IP address and dispatch requests to different backends depending on which hostname the client used to connect to this IP address. Currently such a proxy can be build to support HTTP, HTTPS, SMTP, and DNS. However SSH support is impossible due to the ssh client not sending the information such a proxy would need. I am not the first to want
2003 Jul 03
0
AIX cleanups: includes and arguments
Hi All. First the questions: Is there anything objectionable in this patch? Is AUDIT_FAIL_AUTH appropriate for the "Reason" field? Now the details: attached is a patch that changes some of the #includes for AIX. It moves the AIX-specific includes to port-aix.h and adds includes that contain the prototypes for many of the authentication functions. The idea isto fix some warnings.
2015 Jul 20
2
WinSCP 5.7.5 will support the RFC 4419 revision to Diffie-Hellman group exchange
Hello, I'd like to inform you that the next release of WinSCP SFTP client (version 5.7.5) will support Diffie-Hellman group exchange as specified by RFC 4419. http://winscp.net/tracker/show_bug.cgi?id=1345 So I'd like to ask you to kindly update the check in compat_datafellows() to WinSCP_release_4* WinSCP_release_5.0* WinSCP_release_5.1* WinSCP_release_5.2* WinSCP_release_5.5*
2006 Feb 25
0
scp doesn't run in jail anymore
Hi *, in Slackware 10.2, under scponly 4.6 chrooted shell, scp from openssh 4.2p1 (scp.c,v 1.125 2005/07/27 10:39:03 dtucker) runs fine. scp from openssh 4.3p1 (scp.c,v 1.130 2006/01/31 10:35:43 djm), however, does not start (or maybe does, but doesn't report to my WinSCP client). Under bash, both versions run fine. Any idea / help ? I'm ready to do any further testing / experiments.
2015 Mar 09
1
Problem with ntp
On 03/09/2015 03:42 PM, Paul Heinlein wrote: > On Mon, 9 Mar 2015, C.L. Martinez wrote: > >> Hi all, >> >> I have a problem with ntpd daemon in my CentOS7 vm. When I try to list >> peers, command fails: [....] >> >> [root at c7tst ntpstats]# ntpq >> ntpq> pe >> ntpq: read: Connection refused >> ntpq> > > Does "ntpq -4 -c
2000 Aug 02
0
Fix for configure.in
Hello! The top-level configure.in in the CVS version of Samba uses "echo" instead of the standard AC_MSG_* macros provided by Autoconf. I could not find any reasons for not using AC_MSG_*. "cvs log configure.in" doesn't list any reasons. "cvs annotate configure.in" doesn't work for read-only CVS because the CVS server for Samba is too old! The attached
2000 Dec 22
0
patch to specify DSA host key on command line
--- openssh-2.3.0p1/sshd.c Sat Oct 14 01:23:13 2000 +++ openssh-2.3.0p1.new/sshd.c Tue Dec 19 11:26:51 2000 @@ -506,7 +506,7 @@ initialize_server_options(&options); /* Parse command-line arguments. */ - while ((opt = getopt(ac, av, "f:p:b:k:h:g:V:u:diqQ46")) != EOF) { + while ((opt = getopt(ac, av, "f:p:b:k:h:H:g:V:u:diqQ46")) != EOF) {
2012 Aug 29
1
second FIPS patch for openssh 6.0p1, fix pubkey
The patch to enable FIPS mode for openssh 6.0p1 missed two instances of the ssh client trying to use MD5. It causes pubkey-based authentication to fail in FIPS mode. I have copied the missing changes from auth2-pubkey.c into sshconnect2.c. Here is a patch: diff -cr openssh-6.0p1/sshconnect2.c openssh-6.0p1-patched/sshconnect2.c *** openssh-6.0p1/sshconnect2.c Sun May 29 07:42:34 2011 ---
2014 Jul 16
1
ssh - Connection closed by UNKNOWN
Hi, ssh clients shows "closed by UNKNOWN" message when a socket is closed by a remote side while ssh is waiting for user's password: $ ssh user at localhost user at localhost's password: Connection closed by UNKNOWN When the packet_read_seqnr() calls get_remote_ipaddr(), a connection's socket is already closed and there's not been any other call of this function yet
2002 Apr 23
0
[Bug 225] New: Supression of login warning banner for noninteractive commands
http://bugzilla.mindrot.org/show_bug.cgi?id=225 Summary: Supression of login warning banner for noninteractive commands Product: Portable OpenSSH Version: 3.0.2p1 Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P4 Component: ssh AssignedTo:
2002 Jan 31
2
configure --with-rsh=CMD and default blocking-IO support
A while back I argued for adding a --with-rsh=CMD option to configure and got some general agreement that it would be a good thing (especially for systems that don't have rsh at all). However, the changes were never integrated into rsync. This patch adds the --with-rsh=CMD option to configure and modifies main.c to improve the blocking-IO setting code. The old code would set blocking_io to