similar to: undocumented scp server-side arguments -dft

Displaying 20 results from an estimated 1000 matches similar to: "undocumented scp server-side arguments -dft"

2004 Aug 31
1
[PATCH] supporting a remote scp path option in scp
Hi there, I've written some enhancements to scp.c and pathnames.h to enable the scp to arbitrarily set the remote scp path. (eg $ scp -e /usr/bin/scp foo user at bar:foo) I did read the "scp: command not found" FAQ entry but I'm not quite sure why we can't do this, unless it's because enhancements to scp are no longer a priority. Any other reason why it "is the
2000 Aug 24
0
patch for a few things
This isn't related to the snapshot, but mention of it reminded me to submit these changes. I added a few things, and made a couple small changes; here's a list of what the patch includes: - adds a "-1" argument to ssh and ssh.1 to force protocol1, similar to the existing "-2" argument. - adds "-1" and "-2" to scp and scp.1 as well. - adds
2010 Nov 19
3
File Offsets for SCP (patch)
I don't know if anyone would be interested in this but I'm including a patch to allow for offsets when transferring files with SCP. It's pretty simple and assumes the user knows what they are doing (for example, if transferring with a wild card the offset would apply to all files). -A is the number of bytes offset from the beginning of the files. -Z is the number of bytes inset
2006 May 14
1
scp patch to delete source files after copy
At work we have a large collection of scripts to move log and config files around. These depend on commercial (F-Secure) ssh/scp, as it supports the -u option to delete the source file after (successful) copying. That is the sole reason we can't run openssh on our 150+ unix boxes. I have attached a patch below, which adds the -u option to delete the source file after copying, provided there
2001 May 12
4
Erase the source file open; specify a tempfile name option
I'm curious how to go about submitting a suggestion that affects both the original BSD version and the portable release. A few days ago I sent off a BSD-relative patch to openssh at openssh.com. Is this the right thing to do? I didn't hear anything back, but it's only been 3 days, so I'm probably just being too antsy. In the meantime, maybe someone else out there would like to
2002 Jul 13
0
[PATCH]: scp program improved
Hi, I have made a patch which improves scp utility. It adds two new features: rate limit and resume support. With rate limit it's possible to limit transfer speed. Resume allows to continue file transfer where it was last interrupted. Also the progress meter was improved. Here is my patch, please send comments about it and what I can do better if there is something to fix. ---
2003 Aug 05
1
a problem in snapshot generation?
Hi, It appears the openssh snapshots and the ChangeLog file have not been updated in about a week in ftp.openbsd.org. Could this problem be fixed? Thanks. -- Pekka Savola "You each name yourselves king, yet the Netcore Oy kingdom bleeds." Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
2003 Aug 14
1
setres[gu]id implicit decl warning on Linux glibc
Hi, With recent snapshots, I noted a warning in compilation on Red Hat Linux 7.3 system with glibc 2.2.5: uidswap.c: In function `permanently_set_uid': uidswap.c:155: warning: implicit declaration of function `setresgid' uidswap.c:168: warning: implicit declaration of function `setresuid' The problem appears to be that these should be prototyped in unistd.h, but aren't. There
2000 Aug 18
0
[PATCH] Support symlinks in scp of openssh 2
I'm fond of the "-a" (archive) option of cp, and I'm a heavy user of scp, so I guess it's inevitable that I would eventually add support for "-a" to scp. :-) Actually, it's a "-L" flag for preserving symlinks, and a "-a" flag that is shorthand for "-Lpr". Please let me know if I'm not doing this right.... I made a great
2006 Jan 17
0
openssh@anoncvs.at.openbsd.org asks for password
Hi, The portable R/O CVS repository, openssh at anoncvs.at.openbsd.org, has started asking for password, and this has lasted for about 3-5 days at least. Is something wrong there? -- Pekka Savola "You each name yourselves king, yet the Netcore Oy kingdom bleeds." Systems. Networks. Security. -- George R.R. Martin: A Clash of Kings
2007 Aug 29
0
reverse mapping check; authentication methods
Hello all, My logs get filled with bogus SSH connection attemps which I'd expect should have been denied without logging, so a couple of observations. Syslog has lots of entries like: Aug 29 02:23:31 otso sshd[21000]: reverse mapping checking getaddrinfo for powered.by.e-leven.be [78.110.207.104] failed - POSSIBLE BREAK-IN ATTEMPT! Aug 29 02:23:31 otso sshd[21000]: Invalid user upload from
2007 Apr 22
1
Centos5: RAID1 on root/boot? [+lilo mkinitrd issues]
Hi, I did a command-line upgrade of a RHL73 server to Centos 5. It was a bit rocky road, but in the end it was successful. There's one thing that bugged me. I'm using software RAID1 consisting of /dev/hd{a,c}. No LVM or anything fancy, a number of /dev/mdX partitions, including the root (+/boot). I'd have preferred to continue using lilo as it works more easily with RAID1
2008 Jun 30
3
Server power loss and "Dovecot is already running with PID xxx"
Hi, I'm running Dovecot 1.0.7 (with various patches) on CentOS 5.2. The server has suffered a couple of power loss events. Dovecot is run as a standalone server. The problem is that dovecot refuses to start up at boot because the PID file from before the power loss is left behind. The message is as follows: $ /sbin/service dovecot start Starting Dovecot Imap: Error: Dovecot is already
2000 Aug 12
0
[PATCH] scp -S support
[Please Cc: me, I'm not on the list] fsh (http://www.lysator.liu.se/fsh/) is a program that keeps an ssh tunnel open and multiplexes multiple batch sessions through that single connection, avoiding slower public key crypto for things like cvs. fsh includes an utility called fcp that can multiplex file copies through this single connection. It relies on scp for the actual file copying,
2003 Jul 13
1
sys/dev/ie/if_ie.c warnigns in yesterdays CVSup
Hi, I'm not sure if this has been brought up in the past yet, but when building the kernel from yesterdays 4_RELENG CVSup, I got a lot of complilation warnings (it seems if_ie.c hasn't been updated in 3 months, so changes have happened elsewhere, it seems.) HTH, /usr/src/sys/dev/ie/if_ie.c: In function `ieget': /usr/src/sys/dev/ie/if_ie.c:1178: warning: passing arg 1 of
2003 Jan 08
2
OPENSSH REMOTE ROOT COMPROMISE ALL VERSIONS (fwd)
There has not been any mention of this, so.. I'm having hard time trying to figure out whether this is for real or just a joke. (Anyway, I don't use those possibly vulnerable features myself.) Any analysis yet? -- Pekka Savola "You each name yourselves king, yet the Netcore Oy kingdom bleeds." Systems. Networks. Security. -- George R.R.
2000 Oct 11
2
scp -L option
Hi there, I have a need to have scp pass the -P option to ssh to "bypass" the packetfilters that doesn't allow connections to return to arbitary "priviledged" ports, ie. ports <1024. See attached context sensitive diffs against 2.2.0p1 to please integrate. Thanx Hendrik Visage -------------- next part -------------- *** 1.1 2000/10/11 13:31:45 --- scp.c 2000/10/11
2000 Dec 18
2
scp remote path specification
Hello, in order to use "scp", the scp binary has to be in the compile-time default path on the remote host. For some users (like root), we try to avoid this since scp may be on a network file system (AFS/NFS), and we don't want to hang root's session on network outages. Would a patch to scp be acceptable in the main tree that allows to set the path to remote scp explicity,
2001 Apr 02
1
[PATCH]: scp could hang in Cygwin
Hi, attached is a patch which solves the following problem: Sometimes scp could hang in Cygwin when used as remote end using the -t option. This is due to a binmode/textmode problem which could be raised by the login shell which is used by the user and it's setting of textmode on stdin. The patch solves that problem by explicitly setting binmode on stdin. Besides solving the hanging
2019 Jan 19
2
Status of SCP vulnerability
Hello, I would like to request an update of the progress regarding fixes for the recently disclosed SCP vulnerability (CVE-2018-20685, CVE-2019-6111, CVE-2019-6109, CVE-2019-6110) It has been stated that CVE-2018-20685 has been patched in november but there are currently no information available on the progress of patches regarding the other CVEs. Will there be a patched release any time soon?