Displaying 20 results from an estimated 600 matches similar to: "openSSH 5.8p2 BindPort patch"
2009 Jul 09
0
[PATCH] Allow binding to a local port (OpenSSH 5.2)
OpenSSH supports the -b bind_address argument for binding to a local
IP address when connecting to a remote host.
It's however currently not possible to specify a local port to bind
to, something I've found useful at several occasions.
Below is an unified diff that introduces the [-B bind_port] option to
ssh(1) and a ssh_config(5) style option "BindPort bind_port".
This allows
2012 Feb 12
0
PATCH: multiple BindAddress
Hello all,
I recently have a problem with multiple addresses and address
families. Problem is simple, i have some hosts with IPv4 access only
and some with IPv6 access. This wouldn't be big problem if I had a
stable IP addresses. But sometimes I move to another network with
complete different addresses. So I created patch which on option
BindAddress accept list of addresses. With ip I solved
2014 Feb 10
0
[PATCH] Basic SCTP support for OpenSSH client and server
This patch allows the OpenSSH client to make connections over SCTP,
and allows the OpenSSH server to listen for connections over SCTP.
SCTP is a robust transport-layer protocol which supports, amongst other things,
the changing of endpoint IPs without breaking the connection.
To connect via SCTP, pass -H or set "ConnectViaSCTP yes".
To listen via SCTP as well as TCP, set
2013 Nov 23
2
[Bug 2174] New: no-pty in authorized_keys does not prevent and interactive shell
https://bugzilla.mindrot.org/show_bug.cgi?id=2174
Bug ID: 2174
Summary: no-pty in authorized_keys does not prevent and
interactive shell
Product: Portable OpenSSH
Version: 6.4p1
Hardware: All
OS: Linux
Status: NEW
Severity: security
Priority: P5
Component: sshd
2014 Jun 23
1
-h, --help option
Hi,
tmux author refuses to add -h, --help option, because OpenSSH
does not have it [1]. I don't see why convenience features of tmux
should depend on OpenSSH, but because I have no other choice
(and got curious) I ask here - why OpenSSH doesn't provide -h or
--help option?
I use PuTTY as my client, which processes --help option, and for
`ssh` binary I usually use Google + StackOverflow.
2007 Aug 22
0
Patch to allow checking of v1 keys on remote host.
The attached patch for 4.6p1 adds a feature (-u) that will check to
see if a key exists on a remote host. I use this for auditing my
users transition to v2 keys very useful. If there is any interest
I'll provide a patch for v2 ssh keys also.
http://vapid.dhs.org/dokuwiki/doku.php?id=vapidlabs:openssh_check_key_patch
-- Thanks
Larry
--- orig/openssh-4.6p1/sshconnect1.c 2006-11-07
2017 Mar 07
4
[Bug 2690] New: Add command line "ssh --version"
https://bugzilla.mindrot.org/show_bug.cgi?id=2690
Bug ID: 2690
Summary: Add command line "ssh --version"
Product: Portable OpenSSH
Version: 7.2p2
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee: unassigned-bugs at
2009 Dec 05
2
Setting up skype
As I have no friends and no life I thought that I would set up my
asterisk server with Skype.
1) Paid the $, got the licence, built and installed
2) create a business skype account (called company "foo")
3) created a member of the business called "bar"
4) updated the skype conf file
5) restarted asterisk
=> skype show settings
Skype For Asterisk Settings:
2013 Aug 12
1
openssh 6.2
To the openssh community;
I have installed openssh 6.2 on my mac book pro and tried to ssh to a server and the ssh session hangs. The host
server shows that a connection was established but I cannot return a prompt to indicate that I am connected
to the server. Can someone advise?
Thanks in advance
======>HOST SERVER
[ALLOC133 /export/home/tinker] netstat -a |grep msp9022.XX.XXX.COM.ssh
2015 Oct 21
7
[Bug 2481] New: Tilde expansion in -i option inconsistent
https://bugzilla.mindrot.org/show_bug.cgi?id=2481
Bug ID: 2481
Summary: Tilde expansion in -i option inconsistent
Product: Portable OpenSSH
Version: 6.6p1
Hardware: All
OS: Linux
Status: NEW
Severity: trivial
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
2020 Jan 26
1
[Bug 3115] New: Add --help
https://bugzilla.mindrot.org/show_bug.cgi?id=3115
Bug ID: 3115
Summary: Add --help
Product: Portable OpenSSH
Version: 8.1p1
Hardware: Other
OS: Linux
Status: NEW
Severity: trivial
Priority: P5
Component: Documentation
Assignee: unassigned-bugs at mindrot.org
2004 Nov 20
1
[Bug 955] ssh -h " Displayed as illegal options " in SSH 3.9
http://bugzilla.mindrot.org/show_bug.cgi?id=955
Summary: ssh -h " Displayed as illegal options " in SSH 3.9
Product: Portable OpenSSH
Version: 3.9p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: openssh-bugs at mindrot.org
2004 Sep 08
0
[PATCH]Extending user@host syntax
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
the following patch extends the user at host syntax on the ssh command line to
allow an additional HostKeyAlias and Port to be given as a single argument, eg:
ssh user at localhost%8022,www.tdl.com
is equivalent to
ssh -o 'HostKeyAlias www.tdl.com' -p 8022 user at localhost
The patch is particularly useful when ssh is called from
2004 Apr 30
1
Code question (canohost.c)
On Fri, 30 Apr 2004, YOSHIFUJI Hideaki / [iso-2022-jp] $B5HF#1QL@(B wrote:
> In article <Pine.BSO.4.44.0404292059520.953-100000 at etoh.eviladmin.org> (at Thu, 29 Apr 2004 21:00:26 -0500 (CDT)), Ben Lindstrom <mouring at etoh.eviladmin.org> says:
>
> > Be that true.. then one should review the usage of it in sshconnect.c
> > which is the other place we do it.
>
2017 Apr 14
0
Test error: net_connect_ip(127.0.0.1:0) failed: Can't assign requested address
macOS 10.12.4
clang 4.0.0 (official, non apple version)
libressl 2.5.3
...
0 / 11 tests failed
/Applications/Xcode.app/Contents/Developer/usr/bin/make check-am
make[3]: Nothing to be done for `check-am'.
Making check in lib-imap-client
for bin in test-imapc-client; do \
if ! ./$bin; then exit 1; fi; \
done
Error: net_connect_ip(127.0.0.1:0) failed: Can't assign requested address
2013 Jan 31
2
OpenSSH NoPty patch
Hey everyone,
I wanted to add support for denying PTY allocation through OpenSSH. I'm
not certain if this is quite thorough enough for all cases, but for me
it might work for the moment.
I know that you can currently do this through authorized_keys, but as
far as I know that only works for an actual key. In my use case, I
wanted a user with no password which is forced to run a specific
2011 May 18
2
Might a patch to ssh-agent to allow relaxing of peer euid check be accepted?
Hi everyone. I have a system where I'd like to give certain users
time-limited access to the use of certain SSH private keys without actually
exposing the keys. I have the idea of using ssh-agent to do this. The agent
would run as a "keyholder" user, and group permissions on the UNIX-domain
socket would allow read-write by both that account and the actual ssh user.
Right now,
2007 Jan 16
0
patch to enable ssh use sock fd 3,4
Hi all
I was thinking maybe other ppl need this small hack :)
So ssh supports ProxyCommand which use a separate proccess
for in/out chans to remote sshd. But sometimes this extra proc
is not desired but ssh should use a specific socket (in
below patch is fd 3 and 4) for same thing.. For example a reverse ssh
connection where sshd connects back to ssh(which is executed by a
a script that binds to
2012 Apr 17
0
Minor bug: plot.table and Axis.table (partially) ignore graphical parameters (patch included)
Dear developers,
currently (rev 59060), plot.table and Axis.table do not forward their
'...' argument to their calls to axis(). Thus, some graphical parameters
(such as col.axis, cex.axis, font.axis) in '...' are ignored (for
plot.table: partially ignored [for the x-axis]), which seems to be a
minor bug. As a minimal reproducible example, see e.g.:
2011 Sep 02
1
[Bug 1928] New: Allow cancellation of forwardings in multiplexing
https://bugzilla.mindrot.org/show_bug.cgi?id=1928
Bug #: 1928
Summary: Allow cancellation of forwardings in multiplexing
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.8p2
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh