Displaying 20 results from an estimated 200 matches similar to: "[patch] Automatically add keys to agent"
2010 Jan 07
6
[Bug 1693] New: ssh prompts for passphrase even when identity file is unreadable
https://bugzilla.mindrot.org/show_bug.cgi?id=1693
Summary: ssh prompts for passphrase even when identity file is
unreadable
Product: Portable OpenSSH
Version: 5.3p1
Platform: All
OS/Version: All
Status: NEW
Severity: minor
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs
2001 Nov 25
2
displaying identity key comment string in passphrase prompt
A Feature Request for OpenSSH 3.x:
In version 2.x, when prompting for the passphrase ssh would print
a prompt including the comment string from an RSA key, like:
Enter passphrase for RSA key 'Your Dog's Name':
The comment string was a useful way to remind the user what the
passphrase was (i didn't use hints quite this easy :-).
In Openssh 3.0, ssh prompts using the filename:
2015 Jun 05
0
[Bug 1967] Potential memory leak in ssh [detected by melton]
https://bugzilla.mindrot.org/show_bug.cgi?id=1967
--- Comment #17 from Damien Miller <djm at mindrot.org> ---
Comment on attachment 2124
--> https://bugzilla.mindrot.org/attachment.cgi?id=2124
fix memory leaks
I think there is nothing left to do here:
>--- mux.c 18 Dec 2011 23:52:21 -0000 1.35
>+++ mux.c 30 Dec 2011 09:19:51 -0000
All committed
>Index: readconf.c
2020 Jul 08
2
[PATCH] Add syscall wrappers required by libkeyutils
libkeyutils is used by the keyctl command which is required for loading
keys into the kernel (e.g. for mounting an authenticated UBIFS as root
file system).
libkeyutils usually invokes syscall() directly. As syscall() is not
provided by klibc, libkeyutils has to be slightly modified for using the
klibc wrappers.
Signed-off-by: Christian Eggers <ceggers at arri.de>
---
2005 Jul 26
1
Linux in-kernel keys support
Hi all,
I recently made a patch to openssh 4.1p1 to allow it to use the
in-kernel key management provided by 2.6.12 or later Linux kernels.
I've attached the patch (which is still only a proof-of-concept, for
instance its very verbose right now) to this mail.
Now, my question is, is this a completely insane idea and would (a later
version of) the patch have a chance of making it into the
2010 Feb 01
1
"phishing" (was: [patch] Automatically add keys to agent)
[ Sorry, I did not see the renamed thread until I'd already replied on
the old one. Calling this a phishing attack is exactly right. ]
On 2010-01-30, Joachim Schipper wrote:
> If I understand you correctly, you argue that connecting to malicious
> hosts is currently secure, and will remain secure, but that it will
> become easier to convince people to send the passphrase for
2011 Apr 07
6
new option ssh-add -v to verify if key is loaded into the agent
Dear openssh developers
In a shell script I need to verify if a key belonging to a given public
key file is already loaded into the agent. To achieve this, I added a
new option -v to ssh-add which does this verification.
The patch bases on openssh v5.8p1. The regression test agent.sh was
extended to test this new feature.
Is there any chance for inclusion of attached patch?
Cheers
Konrad
--
2020 Jul 27
3
[PATCH] Add syscall wrappers required by libkeyutils
On Saturday, 25 July 2020, 23:36:33 CEST, Ben Hutchings wrote:
> On Wed, 2020-07-08 at 08:37 +0200, Christian Eggers wrote:
> > ...
> > libkeyutils usually invokes syscall() directly. As syscall() is not
> > provided by klibc, libkeyutils has to be slightly modified for using the
> > klibc wrappers.
>
> Wouldn't it be more useful for klibc to implement
2020 Oct 06
2
Accessing SSH key path using SSH_ASKPASS and passwordstore
Hello,
With the introduction of SSH_ASKPASS_REQUIRE in version 8.4, I've set
up a script for SSH_ASKPASS to query my local passwordstore
(https://www.passwordstore.org/) vault to retrieve the password for a
given key. This works for ssh-add as well as ssh (configured with
AddKeysToAgent set to 'yes'). My workflow effectively transforms into
entering the password for the GPG key used
2001 Jul 29
1
add version 2 identities by default, too
[ I'm not subscribed to this list; please CC any followups to me as
well ]
When a user invokes "ssh-add" with no arguments, I think we should
default to adding both version 1 and version 2 keys. Here's a patch
against the source included with my Debian package of OpenSSH:
walters at space-ghost:/usr/src/ssh/openssh-2.9p2$ diff -u ssh-add.c~ ssh-add.c
--- ssh-add.c~ Thu Apr
2019 Jul 29
2
[PATCH] regress: Fix possible memleaks
Hello,
Could attached patch be reviewed. This patch provides a fix for bug:
https://bugzilla.mindrot.org/show_bug.cgi?id=3037
Thanks,
Jitendra
2011 Jun 16
0
libvir: QEMU error : cannot set ownership
Hello everybody,
I installed eucalyptus on ubuntu10, basic configuration . Everything is ok
untill I start the instances, the disk is being created but it terminates
soon.
Environment:
NFS , KVM, ubuntu10 x64, Euca on 2 machines (wc sc cc clc on one machine,
and nc on another).
libvirtd (libvirt) 0.7.5
QEMU PC emulator version 0.12.3 (qemu-kvm-0.12.3), Copyright (c) 2003-2008
Fabrice Bellard.
2013 Nov 30
2
[Bug 2175] New: possible use after free
https://bugzilla.mindrot.org/show_bug.cgi?id=2175
Bug ID: 2175
Summary: possible use after free
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
2020 Jul 25
0
[PATCH] Add syscall wrappers required by libkeyutils
On Wed, 2020-07-08 at 08:37 +0200, Christian Eggers wrote:
> libkeyutils is used by the keyctl command which is required for loading
> keys into the kernel (e.g. for mounting an authenticated UBIFS as root
> file system).
>
> libkeyutils usually invokes syscall() directly. As syscall() is not
> provided by klibc, libkeyutils has to be slightly modified for using the
> klibc
2004 Aug 05
0
No error when identity file not readable
Hi!
I was trying to start ssh from a scheduled task in Windows 2000.
I got the message "Enter passphrase for key '.ssh/identity':"
Well the passphrase I set was empty, so that should not have happen.
I traced this problem to the method
key_load_public_type(int type, const char *filename, char **commentp)
in authfile.c
If the file cannot be opened (in my case the
2013 Apr 01
1
"no such identity"
With an OpenSSH 6.2p1 client with stock ssh_config and one of the
following cases:
- I don't have any client keys
- I have one or more client keys, but not one of each type
- I don't have an authorized_keys on the server
- I have an authorized_keys on the server, but it does not list any of
the keys I have
- One of my client keys is listed, but I don't have an agent and
2020 Jul 27
0
[PATCH] Add syscall wrappers required by libkeyutils
On July 27, 2020 2:43:36 AM PDT, Christian Eggers <ceggers at arri.de> wrote:
>On Saturday, 25 July 2020, 23:36:33 CEST, Ben Hutchings wrote:
>> On Wed, 2020-07-08 at 08:37 +0200, Christian Eggers wrote:
>> > ...
>> > libkeyutils usually invokes syscall() directly. As syscall() is not
>> > provided by klibc, libkeyutils has to be slightly modified for
2016 Apr 22
2
Client-side public key causing mess
On Fri, Apr 22, 2016 at 3:41 AM, Damien Miller <djm at mindrot.org> wrote:
> On Tue, 19 Apr 2016, Elouan Keryell-Even wrote:
>
>> Hello,
>>
>> I have a client machine and a server machine. I generated a pair of
>> private-public rsa keys using ssh-keygen.
>>
>> On the client-machine, I uploaded my private key onto ~/.ssh/id_rsa
>>
>> On
2016 Jul 09
4
Option configure
Hello,
Am 09.07.2016 um 09:14 schrieb Rowland penny:
>> What is the purpose of the option
>> *
>> **--with-**systemd**
>> ****Enable****systemd****integration*
>>
>> To configure Samba (build).
>>
>
> It is there so that there is also the '--without-systemd' option.
>
> one turns on systemd integration, the other (thank your deity)
2016 Apr 19
4
Client-side public key causing mess
Hello,
I have a client machine and a server machine. I generated a pair of
private-public rsa keys using ssh-keygen.
On the client-machine, I uploaded my private key onto ~/.ssh/id_rsa
On the server machine, I appended the content of the public key to
.ssh/authorized_keys
I can successfully connect from the client to the server with that config.
However, on the client-side, if I add a