Displaying 20 results from an estimated 90000 matches similar to: "List server move"
2024 Nov 06
2
[Bug 3749] New: RELEASE_KEY.asc at https://www.openssh.com/portable.html is expired
https://bugzilla.mindrot.org/show_bug.cgi?id=3749
Bug ID: 3749
Summary: RELEASE_KEY.asc at
https://www.openssh.com/portable.html is expired
Product: Portable OpenSSH
Version: 9.9p1
Hardware: Other
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component:
2000 May 09
5
ANNOUNCE: portable openssh-2.1.0
[The is an announcement to the developers list only, please give
the new version a try overnight and I will announce it to the wider
community tomorrow.]
This is to announce the release of openssh-2.1.0, the first stable
release of portable OpenSSH to incorporate support for the SSH2
protocol.
The SSH2 protocol offers a number of advantages over the SSH1 protocol
including standards compliance
2011 Sep 06
2
[Bug 1295] [PATCH] Transparent proxy support on Linux
https://bugzilla.mindrot.org/show_bug.cgi?id=1295
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks| |1930
--- Comment #12 from Damien Miller <djm at mindrot.org> 2011-09-06 10:34:21 EST ---
Retarget unresolved
2013 Jul 25
1
[Bug 1295] [PATCH] Transparent proxy support on Linux
https://bugzilla.mindrot.org/show_bug.cgi?id=1295
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks| |2130
--- Comment #21 from Damien Miller <djm at mindrot.org> ---
Retarget to openssh-6.4
--
You are
2010 Aug 09
0
[Bug 1295] [PATCH] Transparent proxy support on Linux
https://bugzilla.mindrot.org/show_bug.cgi?id=1295
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks|1708 |1803
--- Comment #10 from Damien Miller <djm at mindrot.org> ---
We'll look at this for the next release.
2013 Sep 19
0
[Bug 1295] [PATCH] Transparent proxy support on Linux
https://bugzilla.mindrot.org/show_bug.cgi?id=1295
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks|2130 |
--- Comment #23 from Damien Miller <djm at mindrot.org> ---
detargetting until this is rewritten as per
2016 Feb 11
0
[Bug 1295] [PATCH] Transparent proxy support on Linux
https://bugzilla.mindrot.org/show_bug.cgi?id=1295
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |joel.lehtonen at iki.fi
--- Comment #24 from Damien Miller <djm at mindrot.org> ---
*** Bug 2526 has been
2018 May 25
4
Suggestion: Deprecate SSH certificates and move to X.509 certificates
Zero matches in both.
https://linux.die.net/man/5/sshd_config
https://linux.die.net/man/5/ssh_config
On Fri, May 25, 2018 at 7:48 AM, Damien Miller <djm at mindrot.org> wrote:
> On Fri, 25 May 2018, Yegor Ievlev wrote:
>
>> Please tell me in technical details how current revocation support
>> works, or give links. Then I will be able to give an answer.
>
> Please
2018 May 25
3
Suggestion: Deprecate SSH certificates and move to X.509 certificates
Please tell me in technical details how current revocation support
works, or give links. Then I will be able to give an answer.
On Fri, May 25, 2018 at 7:16 AM, Damien Miller <djm at mindrot.org> wrote:
>
>
> On Fri, 25 May 2018, Yegor Ievlev wrote:
>
>> Can you implement revocation support?
>
> What do you want that the existing revocation support lacks?
2000 Sep 03
1
installing OpenSSH rpm on SuSE 6.2
I am taking the liberty of forwarding this message to the list. I am
not subscribed to it. If you want to reply to me, please send email to
faheem at email.unc.edu
Thanks, Faheem Mitha.
---------- Forwarded message ----------
From: Faheem Mitha <faheem at email.unc.edu>
Newsgroups: comp.security.ssh
Subject: installing OpenSSH rpm on SuSE 6.2
Dear people,
I tried
2000 Sep 03
0
[PATCH]: openssh.spec file for SuSE 6.4 & 7.0
Attached is a spec file for OpenSSH on SuSE 6.4 and 7.0 systems.
It differs from the current spec file in the following details:
- Only one rpm file is created containing client and server files.
- PreReq `openssl-devel' is changed to `openssl'.
- Path '/usr/libexec/ssh' is changed to '/usr/lib/ssh' for
ssh-askpass and gnome-ssh-askpass.
The resulting
2018 May 25
2
Suggestion: Deprecate SSH certificates and move to X.509 certificates
Can you implement revocation support?
On Fri, May 25, 2018 at 6:55 AM, Damien Miller <djm at mindrot.org> wrote:
> No way, sorry.
>
> The OpenSSH certificate format was significantly motivated by X.509's
> syntactic and semantic complexity, and the consequent attack surface in
> the sensitive pre-authentication paths of our code. We're very happy to
> be able to
2008 Jun 09
1
Problem in RSA Key authentication
Hello Damien,
I am using OpenSSH-5.0 on my ARM board. I want to perform RSA
authentication, but server is not accepting the key generated by the
client. I have copied the authorized_keys in the "$HOME/.ssh/" folder
and provided permission (755) to that folder. Please help me how to
solve this problem.
Following is the log from the client
OpenSSH_4.3p2, OpenSSL 0.9.8b 04 May 2006
2011 Aug 17
1
openssh-unix-dev Digest, Vol 100, Issue 3
Works on my netbsd tinkerbox.
NetBSD 5.0.2 NetBSD 5.0.2 (GENERIC)
It uses rlimit.
Privsep sandbox style: rlimit
I also get warnings during make.
fmt_scaled.c: In function 'scan_scaled':
fmt_scaled.c:84: warning: array subscript has type 'char'
fmt_scaled.c:111: warning: array subscript has type 'char'
fmt_scaled.c:155: warning: array subscript has type 'char'
2016 Jan 17
3
[Bug 2526] New: Support for transparent proxying
https://bugzilla.mindrot.org/show_bug.cgi?id=2526
Bug ID: 2526
Summary: Support for transparent proxying
Product: Portable OpenSSH
Version: 7.1p1
Hardware: Other
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
2004 Mar 25
0
openssh-unix-dev Digest, Vol 11, Issue 28
The shell that executes on the remote server takes input in the form of
shell commands before it issues a prompt. When you redirect commands
from ssh client to a shell on the remote server there is usually a
trailing EOF to tell the shell to exit. If the shell gets an EOF it
should not respond with a prompt. Also, some shells decide whether or
not to issue a prompt by TTY detection.
2012 Jul 20
0
[Bug 1295] [PATCH] Transparent proxy support on Linux
https://bugzilla.mindrot.org/show_bug.cgi?id=1295
--- Comment #17 from Damien Miller <djm at mindrot.org> ---
I'd like to get this done soon, but the current patch has bitrotted -
particularly in the pf department.
IMO this would be best as a helper program that:
1) accept()ed connections redirected to it by the packet filter
2) determined (by OS-specific means) the original address
2000 May 09
1
List opening
The mailing list is now open to outside posters again. We haven't been
spammed in the last month or so since the list was closed.
If anyone can suggest a way to use the MAPS RBL with Postfix and
Majordomo (without turning it on the whole server), it would be much
appreciated.
-d
--
| "Bombay is 250ms from New York in the new world order" - Alan Cox
| Damien Miller -
2009 May 15
0
Asterisk open source project servers have new names!
In order to more closely align the services that Digium provides to the
Asterisk open source community with the Asterisk project itself,
we've recently renamed many of the servers that provide these services.
Effective immediately:
1) http://bugs.digium.com has moved to https://issues.asterisk.org
There are no content or functional changes (except for the new site
being SSL/TLS enabled),
2009 May 15
0
Asterisk open source project servers have new names!
In order to more closely align the services that Digium provides to the
Asterisk open source community with the Asterisk project itself,
we've recently renamed many of the servers that provide these services.
Effective immediately:
1) http://bugs.digium.com has moved to https://issues.asterisk.org
There are no content or functional changes (except for the new site
being SSL/TLS enabled),