Displaying 20 results from an estimated 10000 matches similar to: "[openssh-unix-announce] Call for release testing"
2005 Aug 22
12
Call for release testing
Hi,
We would like to make one of our periodic releases shortly, so once
again we are asking for readers of this list (or anyone else) to
download and test a CVS snapshot of OpenSSH on your favourite
platforms.
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable snapshots are available the mirrors listed at
http://www.openssh.com/portable.html#ftp in the
2005 Aug 22
12
Call for release testing
Hi,
We would like to make one of our periodic releases shortly, so once
again we are asking for readers of this list (or anyone else) to
download and test a CVS snapshot of OpenSSH on your favourite
platforms.
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable snapshots are available the mirrors listed at
http://www.openssh.com/portable.html#ftp in the
2017 Nov 03
2
ControlPath versus ProxyCommand
TL;DR: I expect ProxyCommand to have effect in preference to ControlPath.
I've just tripped over this one. I have an ssh Host (let us call it "MAIN")
with a ControlPath and with ControlMaster=no, from the .ssh/config file.
I also have a shell script whose purpose is to hop to a remote host through a
port forward, which uses the ProxyCommand option like this:
ProxyCommand ssh
2005 Nov 11
1
Can't get LocalForward to work when using ControlPath
Hello All--
First, thanks for ControlPath/ControlMaster. It's very handy, and
ControlMaster=autoask is just what i wanted!
I'm having difficulty with a common use case, however. I want to
LocalForward on secondary connections using an already-established
ControlPath. From what i can tell, the second ssh connection doesn't
report any errors, but silently ignores the supplied
2012 Jul 06
1
[Bug 1997] Add QoS to ControlPath escapes
https://bugzilla.mindrot.org/show_bug.cgi?id=1997
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |djm at mindrot.org
--- Comment #1 from Damien Miller <djm at mindrot.org> ---
The problem with this is that
2005 Sep 01
0
Announce: OpenSSH 4.2 released
OpenSSH 4.2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support of the project, especially those who contributed source,
reported bugs, tested
2005 Sep 01
0
Announce: OpenSSH 4.2 released
OpenSSH 4.2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support of the project, especially those who contributed source,
reported bugs, tested
2005 Jun 12
2
%h,%p,%u expansion for ControlPath
This allows me to set 'ControlPath ~/.ssh/sockets/%h.%p.%u' for example.
Have I missed a good reason why ssh_connect finds the default port
number for itself instead of just having it in options.port (like we do
for the the default in options.user)?
--- openssh-4.1p1/ssh.c~ 2005-06-12 09:47:18.000000000 +0100
+++ openssh-4.1p1/ssh.c 2005-06-12 09:40:53.000000000 +0100
@@ -604,6 +604,17
2005 Mar 31
1
X11 forwarding and session multiplexing
Hi,
A user has noticed that X11 forwarding does not appear to work when using session
multiplexing. It seems that the DISPLAY environment variable is not getting
set in the slave sessions.
Any thought? The ~/.ssh/config ib below.
Host somehost-master
ControlMaster yes
ControlPath ~/.ssh/somehost.sock
HostbasedAuthentication no
HostName somehost
Host somehost-slave
ControlPath
2005 Mar 02
12
Call for release testing
Hi,
We are preparing to release another stable OpenSSH soon, so once
again we are asking for your help in testing CVS snapshots.
Changes include:
* ssh(1) now allows the optional specification of an address to bind to
in port forwarding connections (local, remote and dynamic). See the
-L, -R options in the ssh(1) man page as well as LocalForward and
RemoteForward options in
2015 Aug 10
2
sftp and ControlPath
Hi guys,
I've check that when using sftp with -o ControlPath=... the first attempt
just hangs. Can someone point me to appropriate lines in code where can I
check whats going on?
Maybe it's known issue? I'm using 5.3p1.
cheers,
marcin
2006 Jan 11
2
why not option to automatically add pub key?
One of the annoyances of ssh is the need to transfer the public key from
client machine to server machine, and append to authorized_keys. Although
it's simple to do, it's annoying to have to do this manually. Why can't
this be automated? ssh offers to add new machine to known_hosts. Why
doesn't it offer to add the public key to authorized_keys?
2014 Jul 25
2
Does openssh supports multi-channeling ?
Hi All,
In openssh, do we support multi-channeling?
Rather than opening a new TCP socket for each SSH connection, all the SSH
connections are multiplexed into one TCP connection.
If so, from which version , do openssh supports it?
Thanks
Ravi Pratap
2005 Jul 11
2
Feature suggestion: sftp over ssh client in a single connection
It has always bugged me that if I want to use a shell and perform some
file transfers in a single host I have to take two SSH connections:
one for the shell via ssh(1) and one for the file transfer via
sftp(1). Some graphical SSH clients can perform sftp operations and
ssh shell access in a single connection by using SSH2 protocol's
support for multiple channels.
So I hacked my openssh client
2010 Oct 14
1
about testing SSH5.6 new feature.
Hi, all
Congratulations for the latest OpenSSH release!
Currently I'm writing the cases for testing the new feature. But this new feature is very complex for me:
Ssh(1) connection multiplexing now supports remote forwarding with dynamic port allocation and can report the allocated port back to the user:
LPORT=`ssh -S muxsocket -R0:localhost:25 -O forward somehost
Can you tell me the way
2016 Oct 04
8
[Bug 2621] New: ControlMaster started by scp (non-ssh?) doesn't forward agent
https://bugzilla.mindrot.org/show_bug.cgi?id=2621
Bug ID: 2621
Summary: ControlMaster started by scp (non-ssh?) doesn't
forward agent
Product: Portable OpenSSH
Version: 7.3p1
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: Miscellaneous
2011 Sep 06
2
Announce: OpenSSH 5.9 released
OpenSSH 5.9 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches,
2011 Sep 06
2
Announce: OpenSSH 5.9 released
OpenSSH 5.9 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches,
2006 Jun 09
15
[RFC][PATCH] Secure XML-RPC for Xend
Hi,
The following patch implements a secure XML-RPC protocol for Xend.
Instead of using HTTPS with basic authentication and dealing with all
that nasty OpenSSL/PAM integration, it just uses SSH. This gives you
all the properties you want (great security and PAM integration) with
very little code.
There are some minor issues so I''d rather it not be applied
immediately.
2008 Nov 21
3
OpenSSH security advisory: cbc.adv
OpenSSH Security Advisory: cbc.adv
Regarding the "Plaintext Recovery Attack Against SSH" reported as
CPNI-957037[1]:
The OpenSSH team has been made aware of an attack against the SSH
protocol version 2 by researchers at the University of London.
Unfortunately, due to the report lacking any detailed technical
description of the attack and CPNI's unwillingness to share necessary