similar to: secureshell@securityfocus.com list dead?

Displaying 20 results from an estimated 10000 matches similar to: "secureshell@securityfocus.com list dead?"

2008 May 22
0
secureshell@securityfocus.com mailing list down?
I joined the secureshell at securityfocus.com mailing list yesterday, and posted a message, but it doesn't seem like it ever made it to the list. Anyone know if it's down? Tnx, DR
2013 Sep 20
1
Key preference
Hello everybody, I have a problem specifying identities with the -i option. For easier ssh invocations, I have setup my ssh_config files with entries like the following: Host *.domain.name Port 23457 StrictHostKeyChecking yes UserKnownHostsFile /dev/null GlobalKnownHostsFile /etc/ssh/known-hosts/domain.name IdentityFile ~/.ssh/%h-dsa IdentityFile ~/.ssh/%h-rsa IdentityFile
2004 Feb 17
0
OpenSSH 3.7 released (fwd)
Since there never was an answer on the secureshell at securityfocus.com list to this question, I thought I'd ask you guys on your own list and maybe I'll even get an answer. If the answer involves PAM in any way, then the most obvious question becomes "what about IRIX, Tru64, or any other platforms whose login procedure does not have PAM?". ----- Forwarded message from Atro
2002 Mar 22
1
Is OpenSSH vulnerable to the ZLIB problem or isn't it?
SSH.COM says their SSH2 is not vulnerable to the ZLIB problem even though they use the library (details below). Can OpenSSH say the same thing? In either case, it seems like there ought to be an openssh-unix-announce message about what the situation is. I may have missed it, but I don't believe there was one. Yes, openssh doesn't have its own copy of zlib source but it would still be
2017 Oct 12
5
Convert from mbox to Maildir
Hello everybody, I am in the process to install dovecot as an IMAP server. Currently, this system runs postfix and uses procmail for local (mbox style) delivery. Procmail ist started by postfix like this: /etc/postfix/main.cf: mailbox_command = /usr/bin/procmail ~/.forward: "|IFS=' ' && exec /usr/bin/procmail -f- || exit 75 # jw" Before going
2005 Dec 19
1
OpenSSH traffic accounting ...
Since i/we didn't receive any answer on secureshell at securityfocus.com I like to ask this question to you. What's your opinion on this topic? Thanks! Miro +-------------------------------+ +-------------------------------+ | Miro Dietiker | | MD Systems Miro Dietiker | +-------------------------------+ +-------------------------------+ -----Urspr?ngliche
2002 Feb 12
1
SSH Client Hangs after logging in to SSHD
I'm not a ssh expert and I don't know if the log is good or bad, but I too am running OpenSHH under OpenServer. I find that after I connect, the return key has no effect unless I first type: stty sane <Ctrl>j If you've hit <ENTER> before that you must first press <Ctrl>j a couple of times to clean out the buffer. After I type the above command, everything
2003 Sep 23
2
[da@securityfocus.com: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd)]
Recent proftpd security vulnerability release FYI. Ports has latest patched proftpd distribution. -- Jez http://www.munk.nu/ -------------- next part -------------- An embedded message was scrubbed... From: Dave Ahmad <da@securityfocus.com> Subject: ISS Security Brief: ProFTPD ASCII File Remote Compromise Vulnerability (fwd) Date: Tue, 23 Sep 2003 10:25:54 -0600 (MDT) Size: 4588 Url:
2001 Aug 03
0
Trying to get Openssh with AFS on HP 10.20 to work
Robert, [OpenSSH with AFS not compiling on HP-UX 10.20] I'm using OpenSSH 2.9p2, OpenSSL 0.9.6a, KTH KerberosIV 1.0.8, and AFS 3.4 5.81. > cc: "auth-passwd.c", line 188: error 1530: Undefined struct or union. > cc: "auth-passwd.c", line 188: error 1529: Cannot select field of non-structure. I had exactly the same problem compiling SSH Inc. ssh-1.2.27 with AFS for
2001 Oct 01
0
Couldn't obtain random bytes
I am trying to generate a ssh_known_hosts2 file, 2.9.9p2, using: ssh-keyscan -f list_of_hosts -t rsa > ssh_known_hosts.rsa and ssh-keyscan -f list_of_hosts -t dsa > ssh_known_hosts.dsa but both commands fail almost immidiately with: Couldn't obtain random bytes (error 604389476) What could that mean? Servers that I am aware of that I query is: OpenSSH_2.5.1p2 OpenSSH_2.5.2p2
2001 Oct 29
0
Hello Supporters
I've seen others working on a vxWorks port for OpenSSH. I'll CC: this to the OpenSSH dev list. Maybe they can provide you with the help you need. - Ben On Mon, 29 Oct 2001, Manoj Jaitly wrote: > I need a vxWorks port for openSSH. Can you send me some info on this topic. > If it is not available, then which is the best version to start porting and > what all I need to port
2001 Nov 08
0
openssh-3.0p1 + Tru64 4.0G: sia_ses_authent() always returns 0 (failure)
Hi- I built openssh-3.0p1 on a Tru64 4.0G without any problem. The system uses enhanced security, so the sia_* routines are used by sshd. Unfortunately, password authentication fails because sia_ses_authent() returns 0 in auth-sia.c. The thing is, the password is CORRECT; I verified this by inserting debugging statements before the call to sia_ses_authent(). The call to sia_ses_init()
2001 Dec 18
0
openssh, pam and cryptocard's cryptoadmin / easyradius
Hi, this is merely FYI, but i would appreciate if someone had any comments or further information on the topic. We were using the following setup : cryptocard easyradius with RB-1 hardware tokens (hex or decimal display, synchronous (quicklog) mode) f-secure ssh with pam radius authentication This worked fine until we updated to openssh 2.9p2. Then all authentications where the response
2001 Dec 28
1
openssh reveals existing accounts?
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=57859 There's a method to see if an account exists or not: if it does exist, and the password fails, there's a small delay before getting the prompt again. But if it doesn't, the password prompt returns immediately. Looks like a bug... :o) -- Florin Andrei Linux Is Not "gnU linuX"
2002 Feb 07
0
openssh never cleans out Xauthority
Why doesn't openssh bother to clean out the entries it places in .Xauthority? The file just keeps growing and growing... -- Karl Amrhein, <ksa at SLAC.Stanford.EDU> | www.slac.stanford.edu/~ksa SLAC Computing Services, Systems Group | 650.926.5083 Bldg 50, 364 --------------------------------------------------------------------- To unsubscribe, e-mail: secureshell-unsubscribe at
2001 Sep 28
0
Not enough entropy in RNG
I have been experiencing problems with remote data collection systems reporting not enough entropy in RNG. It mostly seems to be self correcting since a retry of the data transport succeeds. One system however shows the following everytime an ssh connection is attempted. Interactive commands do not seem to be affected. I have perused the code but the entropy gatherer seems to be fairly simple and
2017 Oct 14
0
Convert from mbox to Maildir
Zitat von Josef Wolf <jw at raven.inka.de>: > Any thougths? Deliver IMHO should be run directly by the MTA, if possible, because being run by procmail you loose the capability of using SIEVE. The dovecot way to convert mailbox formats is the dsync (doveadm sync) command, which is the Swiss army knife for this kind of purpose. And if you are in need of converting a bunch of
2004 Aug 01
1
SSH login attempts: tcpdump packet capture
I got a packet capture of one of the SSH2 sessions trying to log in as a couple of illegal usernames. The contents of one packet suggests an attempt to buffer overflow the SSH server; ethereal's SSH decoding says "overly large value". It didn't seem to work against my system (I see no strange processes running; all files changed in past ten days look normal). I am
2002 Feb 20
0
purpose of scp -B?
Batch mode does not require ssh-agent. Useful in non-interactive scripts (you don't want a any questions blocking your script). It also supresses the "host key not found, are you sure you want to continue connecting?" question. (basically fails instead unless some conf variable is set to ignore it). -rchit -----Original Message----- From: woods at weird.com [mailto:woods at
2002 Mar 18
0
SSH and root access from limited hosts
This is blanket access for root from any host with valid keys (and password) - I want to limit that access to 4 hosts no matter what keys or passwords are provided/used. I have looked at shosts.equiv but this doesn't stop other hosts being allowed. I have also looked at "AllowUsers root at host1 root at host2 ..." but this also means including every user we have for all other