Displaying 20 results from an estimated 3000 matches similar to: "Explicit file permissions for sftp-server"
2010 Nov 04
0
SFTP subsystem and explicit file permissions
Hello again,
Now that umask is working (thanks very much!) I have found that I would
like to see more control over sftp-server/internal-sftp file
permissions.
Given that previous patches (sftp file control comes to mind) were
produced indicates there are other users that would also like more
control over file permissions.
My solution was to add yet another option to sftp-server/internal-sftp
2010 Dec 09
3
[Bug 1844] New: Explicit file permissions enhancement to sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1844
Summary: Explicit file permissions enhancement to sftp-server
Product: Portable OpenSSH
Version: 5.6p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: sftp-server
AssignedTo: unassigned-bugs at mindrot.org
2010 Nov 02
1
SFTP subsystem and umask
Hello,
I have noticed that the -u parameter to the sftp-server or internal-sftp subsystem is not working correctly. For openssh-5.6p1 I believe that the problem lies in this code, starting at line 1414 in sftp-server.c:
----------------------------------------------------------
case 'u':
mask = (mode_t)strtonum(optarg, 0, 0777, &errmsg);
if (errmsg != NULL)
2010 Dec 15
2
Building RPM for Openssh5.6p1 fails on RHEL 6.0
All,
I am trying to build openssh-5.6p1 using the SPEC file on RHEL 6 and I am
receiving this
error:
[root@**** SPECS]# rpmbuild -bb openssh.spec
error: line 47: Unknown tag: Copyright : BSD
Also,
I read that the umask functionality in this one has issues. Does it
work in the 5.5 source?
Any help would be appreciated.
2009 Apr 02
2
Method to permit ssh while denying sftp
Is there a way to permit ssh sessions while denying sftp with openssh
3.8?
In openssh 4.4+ this is possible using the Match directive with Force
Command but I don't know how to configure this in older versions.
Thanks in advance for any guidance.
Brenda
2008 Nov 11
2
Fwd: Permissions in chroot SFTP
Hi,
I configured openssh 5.1p1 for sftp server.
Here the specifications in sshd_config file:
Subsystem sftp internal-sftp
Match Group sftp
ForceCommand internal-sftp
ChrootDirectory /home/%u
AllowTcpForwarding no
When a user is logged in, he can't upload his document and he receives
this message:
carlo at Music:~$ sftp user at 213.217.147.123
Connecting to
2024 Aug 02
1
sftp can't preserve uploaded mtime: fsetstat: No such file or directory
> On Aug 2, 2024, at 00:32, ilya Basin <basinilya at gmail.com> wrote:
>
> Looks like EFT doesn't support SSH2_FXP_FSETSTAT (working with a file handle), but it does support SSH2_FXP_SETSTAT (working with a file path). OpenSSH sftp only uses SSH2_FXP_FSETSTAT for directories. It doesn't have a separate "touch" command to set mtime for a path and its
2015 Feb 12
0
[Bug 1844] Explicit file permissions enhancement to sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1844
Jakub Jelen <jjelen at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |jjelen at redhat.com
--- Comment #3 from Jakub Jelen <jjelen at redhat.com> ---
Created attachment 2547
2016 Sep 08
0
[Bug 1844] Explicit file permissions enhancement to sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1844
Jakub Jelen <jjelen at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #2547|0 |1
is obsolete| |
--- Comment #4 from Jakub Jelen <jjelen at redhat.com> ---
2016 Oct 18
0
[Bug 1844] Explicit file permissions enhancement to sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1844
drzraf <raphael.droz+floss at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |raphael.droz+floss at gmail.co
| |m
--
You are receiving this
2020 May 13
0
[Bug 1844] Explicit file permissions enhancement to sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1844
leon at heess.me changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |leon at heess.me
--- Comment #8 from leon at heess.me ---
Please do add this feature!
--
You are receiving this mail because:
You are
2020 Jun 18
0
[Bug 1844] Explicit file permissions enhancement to sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1844
Gabriel <redimido at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |redimido at gmail.com
--- Comment #9 from Gabriel <redimido at gmail.com> ---
It is 2020 and this is still
2020 Jun 20
0
[Bug 1844] Explicit file permissions enhancement to sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1844
eb <email.bug at arcor.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |email.bug at arcor.de
--- Comment #10 from eb <email.bug at arcor.de> ---
Instead of patching in yet another
2010 Dec 22
3
[Bug 1847] New: SFTP doen't work well with IPV6 address
https://bugzilla.mindrot.org/show_bug.cgi?id=1847
Summary: SFTP doen't work well with IPV6 address
Product: Portable OpenSSH
Version: 5.6p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sftp
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy:
2011 Sep 06
2
mac_int() does not call HMAC_CTX_init()
Last year I sent the email below describing a bug in openssh 5.6p1.
I just noticed this bug still exists in 5.9p1.
Probably my earlier email was treated as spam because it was in HTML format.
--
Robert Dugal Team Lead SSL & PKI Group
Certicom Corp. A Subsidiary of Research In Motion
4701 Tahoe Blvd., Building A
Mississauga, ON
L4W 0B5
2010 Nov 29
2
rpm dependencies
I have successfully created a packaged version of openssh that has
the LPK patch. LPK allows you to store your public keys in LDAP.
However when I go to install the package I created it complains about
dependencies:
[root at VIRTCENT13:/home/bluethundr/rpm]#rpm -Uvh openssh-5.6p1-1.i386.rpm
error: Failed dependencies:
openssh = 5.5p1-1.el5 is needed by (installed)
2011 Mar 04
2
remote DoS in sftp via crafted glob expressions (CVE-2010-4755)
Hi folks.
We were made aware of a MITRE CVE assignment on OpenSSH for a remote DoS
in sftp, described as:
The (1) remote_glob function in sftp-glob.c and the (2) process_put
function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3
and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote
authenticated users to cause a denial of service (CPU and memory
consumption) via
2010 Nov 08
3
[Bug 1835] New: sftp should fallback to sshv1 if server doesn't support sshv2
https://bugzilla.mindrot.org/show_bug.cgi?id=1835
Summary: sftp should fallback to sshv1 if server doesn't
support sshv2
Product: Portable OpenSSH
Version: 5.6p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sftp
AssignedTo:
2009 Jan 22
8
[Bug 1550] New: Move from 3DES to AES-256 for private key encryption
https://bugzilla.mindrot.org/show_bug.cgi?id=1550
Summary: Move from 3DES to AES-256 for private key encryption
Product: Portable OpenSSH
Version: 5.1p1
Platform: All
OS/Version: All
Status: NEW
Keywords: patch
Severity: enhancement
Priority: P2
Component: ssh-keygen
AssignedTo:
2006 Oct 02
5
Barplot
Hello,
I have used the following data to draw my barplot:
BL LR Q
36.35 1.00 1.92
36.91 4.00 0.00
25.70 6.00 0.00
34.38 3.00 1.92
05.32 0.50 0.00
BL<-c(36.35, 36.91, 25.70, 34.38, 05.32)
LR<-c(1.00, 4.00, 6.00, 3.00, 0.50)
Q<-<(1.92, 0.00, 0.00, 1.92, 0.00)
barplot(dt$LR, main='LR Value', col='orange', border='black',