Displaying 20 results from an estimated 6000 matches similar to: "OpenSSH Feature Requests"
2018 Dec 12
3
SFTP - Private/Public Authentication Keysets Beyond The First Set
On 12/12/2018 03:32 PM, Steve Clark wrote:
> On 12/12/2018 03:28 PM, Gary Braatz wrote:
>> Thanks for responding so quickly! No but I will try. Are you saying the
>> first vendor connection worked because id_rsa and id_rsa.pub are the
>> defaults if not specified? (I didn't use the -i flag for the first vendor.)
>>
>>
>> -----Original Message-----
2018 Dec 12
2
SFTP - Private/Public Authentication Keysets Beyond The First Set
Thanks for responding so quickly! No but I will try. Are you saying the
first vendor connection worked because id_rsa and id_rsa.pub are the
defaults if not specified? (I didn't use the -i flag for the first vendor.)
-----Original Message-----
From: CentOS [mailto:centos-bounces at centos.org] On Behalf Of Steve Clark
Sent: Wednesday, December 12, 2018 2:23 PM
To: CentOS mailing list
2018 Dec 12
0
SFTP - Private/Public Authentication Keysets Beyond The First Set
Inclusion of the -i flag and the location of the private key solved the
problem.
Thanks Steve!
-----Original Message-----
From: CentOS [mailto:centos-bounces at centos.org] On Behalf Of Steve Clark
Sent: Wednesday, December 12, 2018 2:38 PM
To: CentOS mailing list
Subject: Re: [CentOS] SFTP - Private/Public Authentication Keysets Beyond
The First Set
On 12/12/2018 03:32 PM, Steve Clark wrote:
2003 Sep 18
11
[Bug 684] ssh cannot access keys stored in agent
http://bugzilla.mindrot.org/show_bug.cgi?id=684
Summary: ssh cannot access keys stored in agent
Product: Portable OpenSSH
Version: 3.7.1p1
Platform: UltraSparc
OS/Version: Solaris
Status: NEW
Severity: major
Priority: P2
Component: ssh
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2009 Mar 29
2
ssh & rsync equivalence?
Hello Folks
Can anyone help with why I can use ssh like so:
[root@morgansoldmachine ~]# ssh -t rsync@192.168.1.40 sudo ssh -i
/home/rsync/.ssh/id_dsa root@192.168.1.100
Last login: Tue Mar 24
21:32:51 2009 from morgansmachine.lan
[root@morgansoldmachine ~]# logout
Connection to 192.168.1.100 closed.
Connection to 192.168.1.40 closed.
[root@morgansoldmachine ~]#
But, when I use the same
2006 Dec 14
1
Problems using gssapi authentication from FreeBSD to Linux machines
Hi all,
I'm really struggling with getting Kerberos authentication to work
between a FreeBSD host and a Linux host. I'm using the latest 6-
STABLE code on the FreeBSD box, I've got forwardable Kerberos tokens
(verified with "klist -f") and Kerberos and ssh are working fine in
all other ways, but I can't get the Linux box to accept the Kerberos
ticket as
2019 Apr 02
2
IdentityFile vs IdentitiesOnly
Hi Darren,
On 4/1/19 10:41 AM, Darren Tucker wrote:
> On Mon, 1 Apr 2019 at 08:12, Harald Dunkel <harald.dunkel at aixigo.de> wrote:
>> I've got a moderate number of keys in my ssh config file.
>> Problem: Very often I get an error message like
> [...]
>> The solution seems to be to set IdentitiesOnly, e.g.:
> [...]
>> Shouldn't an explicit
2024 Mar 08
3
PrivateKeyCommand config idea
G'day,
In our infrastructure we're trying to be more diligent about switching to sk keys (and/or certs backed by sk keys.) However, there are some services like Gerrit and Jenkins which are written in java and I guess they will never support sk keys, or at least, it seems like it won't happen any time soon.
For such services, typical practices at the moment include putting
2018 Dec 12
2
SFTP - Private/Public Authentication Keysets Beyond The First Set
I'm new to SFTP and using this mailing list was able to successfully create
my first Private/Public keyset for a vendor hosting the SFTP server (I'm the
client). I created the keyset by typing this:
# ssh-keygen -t rsa
When asked for the password/passphrase I hit <Enter> and afterwards "id_rsa"
and "id_rsa.pub" were created in "/root/.ssh/". I
2018 Dec 12
0
SFTP - Private/Public Authentication Keysets Beyond The First Set
On 12/12/2018 03:13 PM, Gary Braatz wrote:
> I'm new to SFTP and using this mailing list was able to successfully create
> my first Private/Public keyset for a vendor hosting the SFTP server (I'm the
> client). I created the keyset by typing this:
>
>
>
> # ssh-keygen -t rsa
>
>
>
> When asked for the password/passphrase I hit <Enter> and
2011 May 02
12
[Bug 1898] New: possible unreasonable behaviour when using ProxyCommand with multiple IdentityFile(s)
https://bugzilla.mindrot.org/show_bug.cgi?id=1898
Summary: possible unreasonable behaviour when using
ProxyCommand with multiple IdentityFile(s)
Product: Portable OpenSSH
Version: 5.8p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: Miscellaneous
2018 Dec 12
0
SFTP - Private/Public Authentication Keysets Beyond The First Set
On 12/12/2018 03:28 PM, Gary Braatz wrote:
> Thanks for responding so quickly! No but I will try. Are you saying the
> first vendor connection worked because id_rsa and id_rsa.pub are the
> defaults if not specified? (I didn't use the -i flag for the first vendor.)
>
>
> -----Original Message-----
> From: CentOS [mailto:centos-bounces at centos.org] On Behalf Of Steve
2006 Feb 22
8
[Bug 1159] %u and %h not handled in IdentityFile
http://bugzilla.mindrot.org/show_bug.cgi?id=1159
Summary: %u and %h not handled in IdentityFile
Product: Portable OpenSSH
Version: 4.3p2
Platform: All
URL: http://www.math.ualberta.ca/imaging/snfs/openssh.html
OS/Version: Linux
Status: NEW
Keywords: patch
Severity: normal
Priority: P2
2002 Jan 15
1
User-Dependent Identity File
On Tue, Jan 15, 2002 at 06:00:50PM -0000, John Bowman wrote:
> > Date: Tue, 15 Jan 2002 17:29:44 +0100
> > From: Markus Friedl <markus at openbsd.org>
> > Cc: openssh at openbsd.org
> > Content-Type: text/plain; charset=us-ascii
> > Content-Disposition: inline
> > User-Agent: Mutt/1.3.25i
> >
> > On Tue, Jan 15, 2002 at 03:46:15PM -0000, John
2002 Jan 27
1
[PATCH] Add user-dependent IdentityFile to OpenSSH-3.0.2p1
Here is a patch to allow private key files to be placed system wide (for
all users) in a secure (non-NFS) mounted location on systems where home
directories are NFS mounted. This is especially important for users who use
blank passphrases rather than ssh-agent (a good example of where this is
necessary is for tunnelling lpd through ssh on systems that run lpd as user
lp).
IdentityFile now accepts
2006 Nov 18
1
cannot get fuse-ssh to operate from a batch script - but does from cmd line
Hi there
I am wanting to call sshfs (auth via DSA keys) via a rsync pre-xfer bash
script, and cannot get something right. If I run it from the cmdline line:
env - sshfs usern@server:/share /dir/path -o -o IdentityFile=/tmp/id_dsa
it mounts it just fine. (note the "env -" - I specifically tested with
no environment to try to make the two situations identical). If I put
that sole line
2004 Jun 20
0
key management with ssh-agent, IdentityFile and info leakage
editors note: just now found something about IdentitiesOnly that might do the
trick. there's some other stuff in here too.
about preventing info leakage [keys for other sites] from appearing in the
client<-->server key negotiation with ssh-agent and IdentityFile.
ssh/config:IdentityFile - seems to indicate that only the specified key will
be tried, and if that key fails, no other keys
2004 Mar 18
2
ssh only with password
Hello,
I must relogin on the same machine in my shell with ssh and without password.
For this I tried the procedure
ssh-keygen -t dsa and ssh-keygen -t rsa.
I copied the entries in /.ssh/id_dsa.pub and /.ssh/id_rsa.pub in
/.ssh/authorized_keys
When I open a shell I type exec ssh-agent $SHELL and then ssh-add and give my
passphrases.
When I now type ssh machinename my PC wants my password.
I
2001 Apr 06
3
SFTP client script broken after OpenSSH 2.5.1p1 to 2.5.2p2-1
Hello friends,
I have a script that uses the sftp client to transfer a file to another
server using PK authentication. It was working until I upgraded from
OpenSSH 2.5.1p1 to 2.5.2p2-1 yesterday (on a RH Linux 6.2 system). The sftp
command is:
sftp -o "IdentityFile ~/.ssh/id_dsa" \
$PUSERNAME@$PSERVER >$TEMPFILE 2>&1 <<-!
cd $PDIR
put $DOC_ARCHIVE
ls
quit
!
2024 Mar 10
3
PrivateKeyCommand config idea
On Fri, 8 Mar 2024, openssh at tr.id.au wrote:
> G'day,
>
> In our infrastructure we're trying to be more diligent about switching
> to sk keys (and/or certs backed by sk keys.) However, there are some
> services like Gerrit and Jenkins which are written in java and I guess
> they will never support sk keys, or at least, it seems like it won't
> happen any time