Displaying 20 results from an estimated 3000 matches similar to: "[PATCH] AuthorizedKeysFile: tokens for type and fingerprint"
2010 Mar 30
3
[Bug 1747] New: AuthorizedKeysFile not working as advertised
https://bugzilla.mindrot.org/show_bug.cgi?id=1747
Summary: AuthorizedKeysFile not working as advertised
Product: Portable OpenSSH
Version: 5.4p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: major
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy:
2002 Apr 18
2
AuthorizedKeysFile
OpenSSH 3.1
Not really a bug, but an "undocumented feature".
The default sshd_config file show the default setting for AuthorizedKeysFile
as being:
AuthorizedKeysFile .ssh/authorized_keys
If you uncomment that default, it changes the "undocumented" setting for
"AuthorizedKeysFile2", which is by default:
AuthorizedKeysFile2 .ssh/authorized_keys2
2017 Aug 07
15
[Bug 2755] New: [PATCH] sshd_config: allow directories in AuthorizedKeysFile=
https://bugzilla.mindrot.org/show_bug.cgi?id=2755
Bug ID: 2755
Summary: [PATCH] sshd_config: allow directories in
AuthorizedKeysFile=
Product: Portable OpenSSH
Version: 7.5p1
Hardware: All
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
2015 Nov 03
2
[Bug 2490] New: allow to set AuthorizedKeysFile none
https://bugzilla.mindrot.org/show_bug.cgi?id=2490
Bug ID: 2490
Summary: allow to set AuthorizedKeysFile none
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2002 Oct 10
0
[Bug 412] New: AuthorizedKeysFile assumes home directory access upon authentication
http://bugzilla.mindrot.org/show_bug.cgi?id=412
Summary: AuthorizedKeysFile assumes home directory access upon
authentication
Product: Portable OpenSSH
Version: 3.1p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo:
2013 Oct 10
0
[Bug 1684] Support multiple AuthorizedKeysFile entries
https://bugzilla.mindrot.org/show_bug.cgi?id=1684
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |djm at mindrot.org
Status|NEW |RESOLVED
Resolution|---
2010 Apr 02
2
AuthorizedKeysFile with default value prevents Public/Private key authentication
Hi All,
I noticed that if I put:
AuthorizedKeysFile .ssh/authorized_keys in my sshd_config file,
pub/priv key authentication no longer worked.
I am using OpenSSH_5.4p1, OpenSSL 0.9.8n 24 Mar 2010
on Archlinux.
Sam
****************** Here is my WORKING config ******************
Port 22
ListenAddress 0.0.0.0
Protocol 2
PermitRootLogin no
PubkeyAuthentication yes
#AuthorizedKeysFile
2010 Apr 28
9
[Bug 1764] New: Allow AuthorizedKeysFile in Match
https://bugzilla.mindrot.org/show_bug.cgi?id=1764
Summary: Allow AuthorizedKeysFile in Match
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy: djm at
2013 Jun 09
1
pass fingerprint to authorizedkeyscommand
Hi guys,
It might be nice if AuthorizedKeysCommand would receive the fingerprint of
the offered key as an argument, so that programs like gitolite could
implement more refined key-based identity lookup that offers better
performance than AuthorizedKeysFile's linear scan.
The following patch is untested but is the basic idea:
diff -ru openssh-6.2p1/auth2-pubkey.c
2010 Sep 29
2
AuthorizedKeysFile in Match block causes seg. fault
OpenSSH 5.6p1 will attempt to free static storage and seg. fault if
AuthorizedKeysFile is used within a Match block without any global
specification of that option. A simple fix is to xstrdup the defined
pathnames as in the attached patch.
--
Rein Tollevik
Basefarm AS
-------------- next part --------------
A non-text attachment was scrubbed...
Name: openssh.patch
Type: text/x-patch
Size: 1102
2002 Oct 11
3
[Bug 412] AuthorizedKeysFile assumes home directory access upon authentication
http://bugzilla.mindrot.org/show_bug.cgi?id=412
markus at openbsd.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |WORKSFORME
------- Additional Comments From markus at openbsd.org 2002-10-12
2016 Oct 08
6
[Bug 2623] New: AuthorizedKeysFile split pub key and signature with tab `\t` not work.
https://bugzilla.mindrot.org/show_bug.cgi?id=2623
Bug ID: 2623
Summary: AuthorizedKeysFile split pub key and signature with
tab `\t` not work.
Product: Portable OpenSSH
Version: 7.3p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component:
2002 Jan 29
2
Key fingerprint logging
Hello there!
I have made a patch against OpenSSH 3.0.2p1 which allows the fingerprint of
the accepted key to be printed in the log message. It works with SSH1-RSA and
SSH2 pubkey (DSA+RSA) authentication.
This feature is controllable by the LogKeyFingerprint config option (turned
off by default).
Michal Kara
-------------- next part --------------
diff -u5
2011 Feb 01
2
Multiple forced commands being executed
Hi,
Sorry to post this here again, I already posted it in the users
mailing list but haven't got very far. I really need to get this
resolved ASAP, as it's causing a big security headache for us. If
anyone can help that would be wonderful. The original thread is here:
http://marc.info/?l=secure-shell&m=129562817820176&w=2
I am having a very strange problem with SSH. Essentially,
2020 Sep 05
2
Support for UserKnownHostsFile tokens?
Hi Damien/all,
Since github etc use a potentially large number of IP addresses (albeit with a small number of keys), I'd like more granular oversight over their entries in my known_hosts.
Eg, here is a simplified stanza from my current ssh config:
Host github gitlab
User git
Hostname %h.com
UserKnownHostsFile ~/.ssh/known_hosts.d/git
There doesn't seem to be a good way to filter only
2015 Mar 16
2
[Bug 2367] New: AuthorizedKeysCommand add key fingerprint as second argument
https://bugzilla.mindrot.org/show_bug.cgi?id=2367
Bug ID: 2367
Summary: AuthorizedKeysCommand add key fingerprint as second
argument
Product: Portable OpenSSH
Version: 6.7p1
Hardware: Other
OS: FreeBSD
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
2013 Mar 24
6
[Bug 2082] New: Please add pubkey fingerprint to authentication log message
https://bugzilla.mindrot.org/show_bug.cgi?id=2082
Bug ID: 2082
Summary: Please add pubkey fingerprint to authentication log
message
Classification: Unclassified
Product: Portable OpenSSH
Version: 6.2p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
2016 Aug 02
0
[Bug 1684] Support multiple AuthorizedKeysFile entries
https://bugzilla.mindrot.org/show_bug.cgi?id=1684
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
--- Comment #4 from Damien Miller <djm at mindrot.org> ---
Close all resolved bugs after 7.3p1 release
2001 Dec 04
0
PATCH: log key fingerprint upon successful login
This patch is against 3.0.2p1. It produces output like the first line in the
example below for both v1 and v2 logins. Logging is turned on by sticking
``LogFingerprint yes'' in sshd_conf. It would be nice if something like this
would make it into OpenSSH.
Dec 4 14:21:09 lizzy.bugworks.com sshd[7774]: [ID 800047 auth.info] Found
matching RSA1 key:
2023 Apr 03
0
sftp and utmp
On 30.03.23 22:43, Fran?ois Ouellet wrote:
> We need to limit concurrent sftp logins to one per user (because of bad
> client behaviour). Is there any way to achieve this I have overlooked?
What authentication method(s) do your users use?
On our Internet-facing SFTP server, by default (few exceptions), we
accept only pubkey auth and require users to (un)install pubkeys through
us. In