Displaying 20 results from an estimated 10000 matches similar to: "secureshell@securityfocus.com list dead?"
2008 May 22
0
secureshell@securityfocus.com mailing list down?
I joined the secureshell at securityfocus.com mailing list yesterday, and
posted a message, but it doesn't seem like it ever made it to the list.
Anyone know if it's down?
Tnx,
DR
2013 Sep 20
1
Key preference
Hello everybody,
I have a problem specifying identities with the -i option.
For easier ssh invocations, I have setup my ssh_config files with entries like
the following:
Host *.domain.name
Port 23457
StrictHostKeyChecking yes
UserKnownHostsFile /dev/null
GlobalKnownHostsFile /etc/ssh/known-hosts/domain.name
IdentityFile ~/.ssh/%h-dsa
IdentityFile ~/.ssh/%h-rsa
IdentityFile
2004 Feb 17
0
OpenSSH 3.7 released (fwd)
Since there never was an answer on the secureshell at securityfocus.com list
to this question, I thought I'd ask you guys on your own list and maybe
I'll even get an answer.
If the answer involves PAM in any way, then the most obvious question
becomes "what about IRIX, Tru64, or any other platforms whose login
procedure does not have PAM?".
----- Forwarded message from Atro
2002 Mar 22
1
Is OpenSSH vulnerable to the ZLIB problem or isn't it?
SSH.COM says their SSH2 is not vulnerable to the ZLIB problem even though
they use the library (details below). Can OpenSSH say the same thing?
In either case, it seems like there ought to be an openssh-unix-announce
message about what the situation is. I may have missed it, but I don't
believe there was one. Yes, openssh doesn't have its own copy of zlib
source but it would still be
2017 Oct 12
5
Convert from mbox to Maildir
Hello everybody,
I am in the process to install dovecot as an IMAP server.
Currently, this system runs postfix and uses procmail for local (mbox
style) delivery.
Procmail ist started by postfix like this:
/etc/postfix/main.cf:
mailbox_command = /usr/bin/procmail
~/.forward:
"|IFS=' ' && exec /usr/bin/procmail -f- || exit 75 # jw"
Before going
2005 Dec 19
1
OpenSSH traffic accounting ...
Since i/we didn't receive any answer on secureshell at securityfocus.com I
like to ask this question to you.
What's your opinion on this topic?
Thanks! Miro
+-------------------------------+ +-------------------------------+
| Miro Dietiker | | MD Systems Miro Dietiker |
+-------------------------------+ +-------------------------------+
-----Urspr?ngliche
2002 Feb 12
1
SSH Client Hangs after logging in to SSHD
I'm not a ssh expert and I don't know if the log is good or bad, but I too am
running OpenSHH under OpenServer. I find that after I connect, the return key
has no effect unless I first type:
stty sane <Ctrl>j
If you've hit <ENTER> before that you must first press <Ctrl>j a couple of times
to clean out the buffer. After I type the above command, everything
[da@securityfocus.com: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd)]
2003 Sep 23
2
[da@securityfocus.com: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd)]
Recent proftpd security vulnerability release FYI. Ports has latest
patched proftpd distribution.
--
Jez
http://www.munk.nu/
-------------- next part --------------
An embedded message was scrubbed...
From: Dave Ahmad <da@securityfocus.com>
Subject: ISS Security Brief: ProFTPD ASCII File Remote Compromise
Vulnerability (fwd)
Date: Tue, 23 Sep 2003 10:25:54 -0600 (MDT)
Size: 4588
Url:
2001 Aug 03
0
Trying to get Openssh with AFS on HP 10.20 to work
Robert,
[OpenSSH with AFS not compiling on HP-UX 10.20]
I'm using OpenSSH 2.9p2, OpenSSL 0.9.6a, KTH KerberosIV 1.0.8, and AFS
3.4 5.81.
> cc: "auth-passwd.c", line 188: error 1530: Undefined struct or union.
> cc: "auth-passwd.c", line 188: error 1529: Cannot select field of non-structure.
I had exactly the same problem compiling SSH Inc. ssh-1.2.27 with AFS
for
2001 Oct 01
0
Couldn't obtain random bytes
I am trying to generate a ssh_known_hosts2 file, 2.9.9p2,
using:
ssh-keyscan -f list_of_hosts -t rsa > ssh_known_hosts.rsa
and
ssh-keyscan -f list_of_hosts -t dsa > ssh_known_hosts.dsa
but both commands fail almost immidiately with:
Couldn't obtain random bytes (error 604389476)
What could that mean?
Servers that I am aware of that I query is:
OpenSSH_2.5.1p2
OpenSSH_2.5.2p2
2001 Oct 29
0
Hello Supporters
I've seen others working on a vxWorks port for OpenSSH. I'll CC: this to
the OpenSSH dev list. Maybe they can provide you with the help you need.
- Ben
On Mon, 29 Oct 2001, Manoj Jaitly wrote:
> I need a vxWorks port for openSSH. Can you send me some info on this topic.
> If it is not available, then which is the best version to start porting and
> what all I need to port
2001 Nov 08
0
openssh-3.0p1 + Tru64 4.0G: sia_ses_authent() always returns 0 (failure)
Hi-
I built openssh-3.0p1 on a Tru64 4.0G without any problem. The system uses
enhanced security, so the sia_* routines are used by sshd.
Unfortunately, password authentication fails because sia_ses_authent() returns 0
in auth-sia.c. The thing is, the password is CORRECT; I verified this by
inserting debugging statements before the call to sia_ses_authent().
The call to sia_ses_init()
2001 Dec 18
0
openssh, pam and cryptocard's cryptoadmin / easyradius
Hi,
this is merely FYI, but i would appreciate if someone had any comments
or further information on the topic.
We were using the following setup :
cryptocard easyradius with RB-1 hardware tokens (hex or decimal display,
synchronous (quicklog) mode)
f-secure ssh with pam radius authentication
This worked fine until we updated to openssh 2.9p2. Then all
authentications where the response
2001 Dec 28
1
openssh reveals existing accounts?
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=57859
There's a method to see if an account exists or not: if it does exist,
and the password fails, there's a small delay before getting the prompt
again. But if it doesn't, the password prompt returns immediately.
Looks like a bug... :o)
--
Florin Andrei
Linux Is Not "gnU linuX"
2002 Feb 07
0
openssh never cleans out Xauthority
Why doesn't openssh bother to clean out the entries it places
in .Xauthority? The file just keeps growing and growing...
--
Karl Amrhein, <ksa at SLAC.Stanford.EDU> | www.slac.stanford.edu/~ksa
SLAC Computing Services, Systems Group | 650.926.5083 Bldg 50, 364
---------------------------------------------------------------------
To unsubscribe, e-mail: secureshell-unsubscribe at
2001 Sep 28
0
Not enough entropy in RNG
I have been experiencing problems with remote data collection systems
reporting not enough entropy in RNG. It mostly seems to be self correcting
since a retry of the data transport succeeds. One system however shows
the following everytime an ssh connection is attempted. Interactive
commands do not seem to be affected. I have perused the code but the
entropy gatherer seems to be fairly simple and
2017 Oct 14
0
Convert from mbox to Maildir
Zitat von Josef Wolf <jw at raven.inka.de>:
> Any thougths?
Deliver IMHO should be run directly by the MTA, if possible, because
being run by procmail you loose the capability of using SIEVE.
The dovecot way to convert mailbox formats is the dsync (doveadm sync)
command, which is the Swiss army knife for this kind of purpose.
And if you are in need of converting a bunch of
2004 Aug 01
1
SSH login attempts: tcpdump packet capture
I got a packet capture of one of the SSH2 sessions trying to log in as a
couple of illegal usernames. The contents of one packet suggests an
attempt to buffer overflow the SSH server; ethereal's SSH decoding says
"overly large value".
It didn't seem to work against my system (I see no strange processes
running; all files changed in past ten days look normal).
I am
2002 Feb 20
0
purpose of scp -B?
Batch mode does not require ssh-agent.
Useful in non-interactive scripts (you don't want a any questions blocking your script).
It also supresses the "host key not found, are you sure you want to continue connecting?" question. (basically fails instead unless some conf variable is set to ignore it).
-rchit
-----Original Message-----
From: woods at weird.com [mailto:woods at
2002 Mar 18
0
SSH and root access from limited hosts
This is blanket access for root from any host with valid keys (and password)
- I want to limit that access to 4 hosts no matter what keys or passwords
are provided/used. I have looked at shosts.equiv but this doesn't stop
other hosts being allowed.
I have also looked at "AllowUsers root at host1 root at host2 ..." but this also
means including every user we have for all other