Displaying 20 results from an estimated 4000 matches similar to: "hacking attempt"
2011 Sep 30
2
Interop problem with old dropbear and new openssh
Hi,
I have a router running an old version of OpenWRT with an old version of
dropbear (Dropbear sshd v0.44test3). It has been working for many years and I
ssh in from my desktop systems (running Debian Testing) with no problem.
However, recently I upgraded one of my desktops and I can no longer connect to
the router. Dropbear on the router is exiting with:
exit before auth: bad
2012 Feb 08
1
Having issues with remote command execution - ssh -t host 'sudo command'
I've been trying to find an answer on other sites however I could not
resolve my problem.
spec:
os: ubuntu 10.0, OpenSSH_5.5p1 Debian-4ubuntu4, OpenSSL 0.9.8o
problem:
When trying to restart deamons on remote pcs having the same specs,
sometimes deamons are executed succesfully and sometimes not. I am using
the following command:
ssh -t -vvv "$host" 'sudo
2011 Nov 07
1
Strange behaviour of ssh
Hello together!
I've Debian 6.0.3 with OpenSSH_5.5p1 and problem with the execution of remote commands via ssh.
It seems as if the first command isn't looked up in all "$PATH" dirs.
Here normally I should get the version information of mpirun twice but the first one fails:
$ ssh cluster2 mpirun --version ; mpirun --version
bash: mpirun: command not found
mpirun (Open MPI) 1.4.3
2010 May 13
1
sshd dies if passed host key with relative path on command line
Hi all,
I noticed that openssh5.5 finally revised this bug, pls check the bugzilla
https://bugzilla.mindrot.org/show_bug.cgi?id=1290
but when i test it both on linux and hp-ux, it will still fails:
In hp-ux, server side:
root at sshia2# /opt/ssh/sbin/sshd -p 1234 -D -h ssh_host_dsa_key -ddd
..........
debug3: send_rexec_state: entering fd = 9 config len 322
debug3: ssh_msg_send: type
2012 Dec 04
1
iptables port forwarding
I have a simple requirement/test I'm trying to perform, but having difficulty.
I have a system with 2 interfaces, BoxA:
eth0? 172.26.50.102
eth1? 192.101.77.62
My goal is to have a tcp port built on BoxA such that hosts on the 192.101.77.0/24 network can reach a port on a different box on the 172.26.0.0/16 network.
The target system is 172.26.10.120?? tcp/22
The port I wish to build is
2003 Nov 18
4
3.7.1P2, PermitRootLogin and PAM with hidden NISplus passwor ds
It works for the "yes" case but not for the "without-password" case.
The function that checks (auth_root_allowed(auth_method) is special
cased for "password". The Pam case sends "keyboard-interactive/pam"
which like all other authentication methods except password succeeds.
Here is a patch to make it work for me. Please feel free to criticize
as
2008 Feb 07
1
"PermitRootLogin no" fails
I'm running version 4.7p1 of OpenSSH on a Linux system (it was
originally a RedHat system, but I've changed almost everything.) When
I originally built OpenSSH I used the config option --without-pam, and
installed the software in /usr/local. I explicitly forbade root login
with sshd (by setting the PermitRootLogin to "no" in the sshd_config
file), but found that I could login as
2016 Feb 17
3
centos7 :: ks.cfg :: customisation of sshd
Hi! I want to change the sshd port at install for centos7 but i am not sure
if i am on the good track (and it is time expensive to make many try-outs)..
So, i would be grateful if someone with experience can spot if i have problems
with my planning.. (the actual purpose is that after installation i have access
for my ansible provisioning)
first make sure ssh is started
services
2015 Jul 29
2
Fedora change that will probably affect RHEL
On 07/28/2015 04:29 PM, Warren Young wrote:
> They turned off "PermitRootLogin yes" and "Protocol 1" in EL6 or EL7, the previous low-hanging fruit. Do you think those were bad decisions, too?
As far as I know, PermitRootLogin has not been set to "no" by default.
At least, I've never seen that on a system I've installed. Am I missing
something?
2003 Nov 17
1
3.7.1P2, PermitRootLogin and PAM with hidden NISplus passwords
Greetings,
I know that part of the following has been discussed here before but
please bear with me.
We are running on Solaris versions 2.6 - 9 with a NISplus name service.
The permissions on the NISplus password map have been modified to
limit read access to the encrypted password field of the passwd table
to only the entry owner and the table administrators. See:
2006 Aug 09
4
[Bug 1216] Warn via Logwatch when sshd PermitRootLogin is in effect
http://bugzilla.mindrot.org/show_bug.cgi?id=1216
Summary: Warn via Logwatch when sshd PermitRootLogin is in effect
Product: Portable OpenSSH
Version: 4.3p2
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo: bitbucket at mindrot.org
2016 Feb 18
1
centos7 :: ks.cfg :: customisation of sshd
On 02/18/2016 10:27 AM, Mike - st257 wrote:
> ( You forgot to escape the space before 60000 in the first sed expression
> you provided. )
True, but you shouldn't need to escape spaces at all:
sed -i 's/#Port 22/Port 60000/; s/#PermitRootLogin yes/PermitRootLogin yes/'
> Though I will note there is some sort of syntax error with the
> PermitRootLogin sed expression
2006 Feb 13
2
PermitRootLogin proplem
Hi all,
I think that there is a security problem with the PermitRootLogin
option.
I asked an root ssh connection:
$ ssh root at machine
root at machine's password:
I typed no password, this prompt stayed in place.
In a second time, I changed the PermitRootLogin to no, and then restart
ssh server.
Third, I typed the password on the previous prompt, and the access was
allowed.
I then
2014 Nov 20
1
Re: virt-v2v: Died at /usr/bin/virt-p2v-server line 411
On Wed, Nov 19, 2014 at 11:47:11PM +0100, Nicolas Ecarnot wrote:
> OK, I'm progressing : the ssh issue seems to be gone.
> I changed some parameters but not sure which one are relevant.
> When comparing with a fresh install, here are the diffs :
>
> root:/etc# diff /etc/ssh/sshd_config /tmp/sshd_config
> 43a44
> > LogLevel DEBUG3
> 48c49
> < #PermitRootLogin
2004 Mar 22
1
PermitRootLogin issues
Hello,
I'm currently experiencing the issue laid out in this thread from last year:
http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=106908815129641&w=2
The discussion that ensued resulted in a number of ideas on how best to
'fix' this issue. The two that seemed most reasonable were:
1. implement a pubkey-only option to PermitRootLogin that would only
allow root to login
2009 Jun 01
2
ssh as root with and without private key
Hi.
I have a client machine using ssh as root via key authorization to a
server. The client uses rsync to send backup data to the server. I
use ForceCommand to allow only this activity when using key
authorization.
But I also want to be able to ssh as root with a required password to
do whatever I like.
So I thought that in addition to root, I'd make a rootback account:
2013 Oct 23
7
[Bug 2164] New: PermitRootLogin=without-password as default
https://bugzilla.mindrot.org/show_bug.cgi?id=2164
Bug ID: 2164
Summary: PermitRootLogin=without-password as default
Product: Portable OpenSSH
Version: 6.2p1
Hardware: Other
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2015 Feb 21
2
"PermitRootLogin no" should not proceed with root login
Steps to reproduce:
1) PermitRootLogin no in sshd_config
2) login with "root" user from other host
Present behaviour:
1) it asks for password 3 times and only then close the connection.
2) cpu consumption during bruteforce "attacks".
Expected behaviour:
Immediate disconnect/login fail
Workaround is to change ssh port, or ban IP after some login fails, or
limit IP that can
2003 Feb 06
2
[Bug 486] New: "PermitRootLogin no" can implicitly reveal root password
http://bugzilla.mindrot.org/show_bug.cgi?id=486
Summary: "PermitRootLogin no" can implicitly reveal root password
Product: Portable OpenSSH
Version: 3.5p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: security
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at
2005 Apr 07
1
PermitRootLogin and Tru64 SIA
I have "PermitRootLogin no" in my sshd_config, but under Tru64 and SIA,
the root login attempts still get passed to the SIA system (so I get
lots of warnings about failed root logins). On systems with a "max
failed attempts" setting, the root account can be locked out this way.
I started looking at the code, and I'm not sure I understand what I see.
In auth-passwd.c,