Displaying 20 results from an estimated 800 matches similar to: "PermitOpen none option diff"
2012 Jun 27
1
sftp resume support (client side)
Hi,
I implemented something because I get sick of resuming large downloads
from scratch.
Any interest upstream-wise ?
https://bugzilla.mindrot.org/show_bug.cgi?id=2021
--
Brightest day,
Blackest night,
No bug shall escape my sight,
And those who worship evil's mind,
be wary of my powers,
puffy lantern's light !
2012 Jan 26
0
PermitOpen None diff
Hi,
I was wondering if this diff would make it into the next release:
https://bugzilla.mindrot.org/show_bug.cgi?id=1949
Thanks,
//Logan
C-x-C-c
--
Brightest day,
Blackest night,
No bug shall escape my sight,
And those who worship evil's mind,
be wary of my powers,
puffy lantern's light !
2012 Feb 16
0
Pending enhancement (permitOpen none)
The tree is now unlocked, and the diff got 1 ok:
https://bugzilla.mindrot.org/show_bug.cgi?id=1949 :-)
--
Brightest day,
Blackest night,
No bug shall escape my sight,
And those who worship evil's mind,
be wary of my powers,
puffy lantern's light !
2012 Dec 04
2
OpenSSH warnings on FreeBSD
on FreeBSD, gcc complains that %d is used for sig_atomic_t
Casting to (int) as a solution ?
Index: serverloop.c
===================================================================
RCS file: /cvs/openssh/serverloop.c,v
retrieving revision 1.172
diff -u -p -r1.172 serverloop.c
--- serverloop.c 2 Dec 2012 22:50:55 -0000 1.172
+++ serverloop.c 4 Dec 2012 11:46:33 -0000
@@ -708,7 +708,7 @@
2011 Nov 06
13
[Bug 1949] New: PermitOpen none option
https://bugzilla.mindrot.org/show_bug.cgi?id=1949
Bug #: 1949
Summary: PermitOpen none option
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.9p1
Platform: All
OS/Version: OpenBSD
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo:
2012 Apr 28
2
[Bug 2001] New: Document PermitOpen none in man page
https://bugzilla.mindrot.org/show_bug.cgi?id=2001
Bug #: 2001
Summary: Document PermitOpen none in man page
Classification: Unclassified
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: OpenBSD
Status: NEW
Severity: trivial
Priority: P2
Component: Documentation
2008 Apr 10
4
GETQUOTAROOT?
All over a sudden the getquota plugin in SquirrelMail doesn't work
anymore. I activated debugging an got:
IMAP command sent: a001 GETQUOTAROOT "INBOX"
IMAP response received:
Array
(
[0] => * QUOTAROOT "INBOX" ""
[1] => * QUOTA "" ()
)
A manual test results in:
. GETQUOTAROOT "INBOX"
* QUOTAROOT "INBOX"
2007 Jan 16
2
Somes patchs
Here two patch:
A patch for switcher to disable window list. All was already present in code,
just missing an option :)
A patch for place, it's my old patch, i just fix a stupid segfault!
Will try to add some others placement modes...
http://puffy.homelinux.org/%7Egnumdk/compiz/patch/switcher.patch
http://puffy.homelinux.org/%7Egnumdk/compiz/patch/place.patch
Cedric
2006 Dec 05
3
[Bug 1267] PermitOpen - Multiple forwards don't works
http://bugzilla.mindrot.org/show_bug.cgi?id=1267
Summary: PermitOpen - Multiple forwards don't works
Product: Portable OpenSSH
Version: v4.5p1
Platform: ix86
OS/Version: Cygwin on NT/2k
Status: NEW
Severity: security
Priority: P2
Component: sshd
AssignedTo: bitbucket at mindrot.org
2017 May 05
3
[Bug 2711] New: Patch to add permitgwport and restrict permitopen to be a default deny
https://bugzilla.mindrot.org/show_bug.cgi?id=2711
Bug ID: 2711
Summary: Patch to add permitgwport and restrict permitopen to
be a default deny
Product: Portable OpenSSH
Version: 7.2p2
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component:
2015 Feb 01
7
[Bug 2347] New: permitopen doesn't work with unix domain sockets
https://bugzilla.mindrot.org/show_bug.cgi?id=2347
Bug ID: 2347
Summary: permitopen doesn't work with unix domain sockets
Product: Portable OpenSSH
Version: 6.7p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs
2020 Feb 19
2
[Bug 3123] New: PermitOpen does not allow wildcards for hosts despite what docs say
https://bugzilla.mindrot.org/show_bug.cgi?id=3123
Bug ID: 3123
Summary: PermitOpen does not allow wildcards for hosts despite
what docs say
Product: Portable OpenSSH
Version: 7.2p2
Hardware: Other
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: sshd
2008 Aug 22
1
CIDR address/masklen matching support for permitopen="host:port" restrictions?
Dear openssh-unix-dev list,
in OpenSSH 5.1 you introduced CIDR address/masklen matching for "Match address" blocks in sshd_config as well as supporting CIDR matching in ~/.ssh/authorized_keys from="..." restrictions in sshd.
I wonder whether CIDR address/masklen matching will be implemented for permitopen="host:port" restrictions in sshd as well, that would be quite
2011 Sep 30
0
openssh remote port forwarding and permitopen
I have an application where a lot of end user CPE devices ssh in
automatically to a central server, and are authenticated
by public key, to do remote (-R) port forwarding, so we can open
a connection back to a particular port on the remote device whether
it's behind some NAT or firewall or whatever. I want to be certain,
however, that if I open port 12345, it is connected to the correct
end
2001 Aug 27
1
permitopen flag in authorized_keys file
I've just discovered the permitopen flag. We need such a feature for
our poor man's VPN services, but this flag seems to be usable only if
you generate your authorized_keys file from a database or something
like that: keeping a long list of host/port combinations up to date
for several users and keys is no fun.
As announced before, we have developed a far more powerful mechanism
for
2001 Dec 05
1
permitopen for -R connections?
It looks like there is good support for limiting connections on the
server side when the client uses the -L flag. What about support for
server side connections (listens) when the client uses the -R flag?
I am looking for an equivalent to permitopen that says what ports are
valid for the remote host when using the -R flag. As it sits now, an
unscrupulous ssh user can bind to any port above 1024
2004 Apr 02
0
permitopen= IPv6 format
Hi
one question about the IPv6 format in permitopen=.
Is this ":::/port" used anywhere else?
The only documented format for literal IPv6 addresses I found
was RFC 2732 as it's used in web-browsers.
They specify the address as "[:::]:port"
In OpenSSH this would be matched by changing
"%255[^/]/%5[0-9]" to "%*[[]%255[^]]%*[]]:%5[0-9]" in
the
2008 Aug 27
0
CIDR address/masklen matching support for permitopen="host:port"
On Wed, 27 Aug 2008, Damien Miller wrote:
> On Tue, 26 Aug 2008, Peter Stuge wrote:
> > On Fri, Aug 22, 2008 at 11:22:34AM +0200, Bert Courtin wrote:
> > > I wonder whether CIDR address/masklen matching will be implemented
> > > for permitopen="host:port" restrictions in sshd as well, that would
> > > be quite beneficially (at least for me, maybe
2016 Jun 05
5
[Bug 2582] New: Allow PermitOpen to use a wildcard hostname with a fixed port
https://bugzilla.mindrot.org/show_bug.cgi?id=2582
Bug ID: 2582
Summary: Allow PermitOpen to use a wildcard hostname with a
fixed port
Product: Portable OpenSSH
Version: 7.2p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
2011 Jul 06
1
gradient generation
Dear R-help subscribers;
I have a question regarding making gradients in R. I've searched on the
web, but was only able to find functions that make a gradient between
color X and Y, which is not what I want.
I want to 'pick out' individual, smaller pieces of a gradient based on a
range of numbers. Say that I have a range of numbers, leading from 0 to
1. Then I want 0 to refer to