Displaying 20 results from an estimated 3000 matches similar to: "Warning: No xauth data; using fake authentication data for X11 forwarding."
2003 Apr 27
0
Warning: No xauth data; using fake authentication data for X11 forwarding.
what's with this?
randy
2003 Dec 04
0
Samba 3, winbind, AD, and pam_mount ... xauth problem
I have 2 labs I have to maintain. The first is a Windows-based lab, and
the second is a Linux-based lab. I'm trying to combine the user accounts
to make everything easier... here's what I have so far:
The Linux test machine has Samba 3 installed on Fedora Core 1, with
winbind and pam_mount. Pam_mount automatically maps the home directory,
and everything works perfectly when I log in
2003 Oct 07
0
[Bug 733] ssh doing xauth stuff even when it can't access local .Xauthority file
http://bugzilla.mindrot.org/show_bug.cgi?id=733
Summary: ssh doing xauth stuff even when it can't access local
.Xauthority file
Product: Portable OpenSSH
Version: -current
Platform: UltraSparc
OS/Version: Solaris
Status: NEW
Severity: normal
Priority: P2
Component: ssh
2004 May 18
1
Problem with X tunneling, su, and xauth
Hi all.
I'm trying to use ssh to connect from a PC (using TerraTerm with the
ssh add-in) to a Solaris 8 or Solaris 9 box (both running OpenSSH
3.7.1p2) to establish a session for X-forwarding. Everything works
great, until I use "su" to change to another account (such as root).
The su'd user doesn't seem to be able to authenticate properly to use
the X-tunnel.
I did a
2012 Jan 13
1
SELinux and rsh+xauth
Hello,
I have a strange (for me) problem with these two machines :
- Client, a CentOS-5.7 workstation ;
- Server, a CentOS-6.2 headless, up-to-date server.
From Client, I want to use xauth on Server with the help of rsh (yes, I
know, ssh and all this sort of things... another time.)
When SELinux is in permissive mode on Server, all these commands
perform as expected :
rsh Server
2008 Nov 10
4
[Bug 1536] New: SSH modifies line endings when using command in authorized_keys
https://bugzilla.mindrot.org/show_bug.cgi?id=1536
Summary: SSH modifies line endings when using command in
authorized_keys
Product: Portable OpenSSH
Version: 5.1p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo:
2007 Jul 05
0
tripwire / .xauth$$$$ problem on Centos5
Dear All,
I'm using Centos5 to run a firewall, and as part of the intrusion detection
apparatus, I use tripwire (tripwire-2.4.1.1-1.fc6.x86_64.rpm - as made for
fedora core 6, and then tweaked with my own twpol.txt).
My problem, is that when I su to root, a .xauth file is created with a random
tail name - i.e. /root/.xauthyN4aHS or /root/.xauth1sGdFh and this causes
tripwire to
2009 Mar 10
6
[Bug 1570] New: Incorrect return code if mux master has completed
https://bugzilla.mindrot.org/show_bug.cgi?id=1570
Summary: Incorrect return code if mux master has completed
Product: Portable OpenSSH
Version: 5.2p1
Platform: All
OS/Version: All
Status: NEW
Severity: minor
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy:
2005 Feb 09
0
[Bug 733] ssh doing xauth stuff even when it can't access local .Xauthority file
http://bugzilla.mindrot.org/show_bug.cgi?id=733
dtucker at zip.com.au changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |WORKSFORME
------- Additional Comments From dtucker at zip.com.au
2017 May 02
4
playing around with removing algos
On 05/01/2017 04:48 PM, Cristian Ionescu-Idbohrn wrote:
> On Mon, 1 May 2017, Cristian Ionescu-Idbohrn wrote:
>>
>> Example, 'Macs'.
>>
>> On the man page I read:
>>
>> "Multiple algorithms must be comma-separated.
>> ...
>> If the specified value begins with a '-' character, then the
>> specified algorithms (including
2017 May 08
3
[Bug 2715] New: for more flexibility, please support a comma ',' separated list of patterns to add to/remove from the defaults
https://bugzilla.mindrot.org/show_bug.cgi?id=2715
Bug ID: 2715
Summary: for more flexibility, please support a comma ','
separated list of patterns to add to/remove from the
defaults
Product: Portable OpenSSH
Version: 7.5p1
Hardware: Other
OS: Linux
Status: NEW
2009 Apr 21
3
ssh localhost yes | true
Referring to "CLOSED FIXED" Bug 85:
https://bugzilla.mindrot.org/show_bug.cgi?id=85
Assuming that you have your machine setup so that
the following commands run without prompting:
ssh -2 localhost pwd
ssh -1 localhost pwd
Then this command:
ssh -1 localhost yes | true
always produces this output:
Write failed flushing stdout buffer.
write stdout: Broken pipe
Yet
2017 May 02
2
playing around with removing algos
On Tue, May 02, 2017 at 06:17:47PM +0200, Cristian Ionescu-Idbohrn wrote:
> $ ssh -vvv -oMacs=umac-64 at openssh.com localhost : 2>&1 | egrep -i 'macs|umac'
> debug2: MACs ctos: umac-64 at openssh.com
> debug2: MACs stoc: umac-64 at openssh.com
> debug2: MACs ctos: umac-128-etm at openssh.com,hmac-sha2-256-etm at openssh.com,hmac-sha2-512-etm at openssh.com,hmac-sha1-etm
2016 Apr 14
2
(rfc) too many keys, usecase?
On Thu, 14 Apr 2016, Jakub Jelen wrote:
> On 04/14/2016 01:19 PM, Cristian Ionescu-Idbohrn wrote:
> > There is no /root/.ssh/authorized_keys on remote host, so I have to
> > authenticate with password.
> >
> > On the remote host:
> >
> > # /usr/sbin/sshd -T | egrep permitroot
> > permitrootlogin yes
> >
> > Attempting:
> >
> >
2017 May 01
2
playing around with removing algos
Example, 'Macs'.
On the man page I read:
"Multiple algorithms must be comma-separated.
...
If the specified value begins with a '-' character, then the
specified algorithms (including wildcards) will be removed"
It seems that just one algo name is supported on such a line, example:
Macs -umac-64*
But this form is not supported:
Macs -umac-64*,-hmac-sha1*
nor is
2012 Jan 27
1
Bug#657641: /usr/sbin/logcheck: line 100: kill: (31667) - No such process
Package: logcheck
Version: 1.3.14
Severity: normal
Tags: patch
I keep getting these messages logged, when under high load.
This patch should clean that up.
commit 72661acccafa519fcb48a6a756e5c35d96e7511d
Author: Cristian Ionescu-Idbohrn <cristian.ionescu-idbohrn at axis.com>
Date: Fri Jan 27 16:08:33 2012 +0100
Workaround for error:
/usr/sbin/logcheck: line 100: kill: (31667)
2009 Apr 17
2
Issues with ssh-agent connecting to a large number of hosts at once
Hi,
I'm having problems with ssh-agent when I am connecting to a large (several
hundred) hosts at once. I'm using a kanif (
http://taktuk.gforge.inria.fr/kanif/) which is a very nice package that
distributes ssh connections across the hosts you are connecting to (a
fan-out sort of approach, so all connections are not coming from one host).
However, all hosts have to authenticate, so all
2017 Jan 29
3
[Bug 2671] New: make possible to remove default ciphers/kexalgorithms/mac algorithms
https://bugzilla.mindrot.org/show_bug.cgi?id=2671
Bug ID: 2671
Summary: make possible to remove default
ciphers/kexalgorithms/mac algorithms
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component:
2008 Dec 13
0
[Bug 396] sshd orphans processes when no pty allocated
https://bugzilla.mindrot.org/show_bug.cgi?id=396
Martin d'Anjou <point14 at magma.ca> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |point14 at magma.ca
--- Comment #13 from Martin d'Anjou <point14 at magma.ca> 2008-12-13
2008 Sep 03
1
Problem connecting with openssh-5.1-client to Juniper Eseries
After upgrading to 5.1, connections to our Juniper E-Series routers
fail with:
$ ssh -v eseries
OpenSSH_5.1p1, OpenSSL 0.9.8g 19 Oct 2007
debug1: Reading configuration data /etc/ssh_config
debug1: Applying options for *-lns*
debug1: Applying options for *
debug1: Connecting to eseries [1.2.3.4] port 22.
debug1: fd 3 clearing O_NONBLOCK
debug1: Connection established.
debug1: identity file