Displaying 20 results from an estimated 10000 matches similar to: "deny host and auth users not working over ssh"
2003 Feb 12
1
((AllowUsers || AllowGroups) && !(AllowUsers && AllowGroups))
Hey everyone,
After discussing the AllowGroups I think I've discovered a bug.
The system is a solaris 8 system and the problem is that when I use
AllowGroups with no AllowUsers args, the proper actions happen. Same
with AllowUsers and no AllowGroups. When I try to combine the two, none
of the Allow directives seem to take.
Is it just me or maybe a bug?
-James
2005 Jun 28
2
more flexible AllowUsers/DenyUsers syntax
Hi,
I hope this is the right place for a feature request.
I'd like to have more flexible AllowUsers/DenyUsers synax.
I am in a situation, where I have machines connected to three
networks (a private, high speed, a public, and a private vpn) and I'd
like to enable root logins only on the private networks. Currently I
see no way of doing this, because there is no way to specify a
2020 Jul 18
2
[Bug 3193] New: Add separate section in sshd_config man page on Access Control
https://bugzilla.mindrot.org/show_bug.cgi?id=3193
Bug ID: 3193
Summary: Add separate section in sshd_config man page on Access
Control
Product: Portable OpenSSH
Version: 8.3p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component:
2009 Dec 29
2
[Bug 1690] New: AllowUsers and DenyGroups directives are not parsed in the order specified
https://bugzilla.mindrot.org/show_bug.cgi?id=1690
Summary: AllowUsers and DenyGroups directives are not parsed in
the order specified
Product: Portable OpenSSH
Version: 5.3p1
Platform: ix86
OS/Version: Linux
Status: NEW
Keywords: patch
Severity: trivial
Priority: P2
Component:
2010 Apr 26
1
valgrind ipconfig work
this is just on the common path, need to checkout others too,
but a start:
commit 5501109f6597f2bbed17a264b247c36220362dfb
Author: maximilian attems <max at stro.at>
Date: Mon Apr 26 08:07:51 2010 +0200
[klibc] ipconfig: Fix valgrind errors
valgrind was rightfully complaining on ipconfig eth0:
ERROR SUMMARY: 5 errors from 4 contexts (suppressed: 0 from 0)
all
2004 Aug 09
1
Question about AllowUsers and AllowGroups
While testing some AllowUsers and AllowGroups combinations I was surprised
to find that one cannot be used to override the other. For example:
AllowGroups administrators
AllowUsers john
If john is *not* part of the administrators group, then access is being denied.
Is this the expected behaviour? This would force me to create another group just
for ssh, something like ssh-admins.
This other
2011 Mar 28
5
[PATCH 1/3] Only peek and discard packets from specified device.
This patch fixes a bug on systems with multiple connected network devices.
As packet_peek uses all devices to receive data instead of a specific
device. As the return value was never reset it was possible that packets
from other devices were returned by packet_peek. That means that the
ifindex did not match any ifindex of the specified devices the packet was
never removed and packets for the
2002 Feb 13
2
Problem with using both pam_listfile to deny logins and pubkey authentication
Hi,
I'm trying to use pam_listfile.so to deny logins from all others but few
users (names in /etc/loginusers). With password authentication it works
fine, but with public key authentication OpenSSH lets in users whose
names arent't in /etc/loginusers. AllowUsers in sshd_config does what
one would expect.
I'm using OpenSSH-3.0.2p1 on Debian testing (package version
1:3.0.2p1-6)
2005 Nov 17
2
AllowUsers not working under certain conditions
Hello,
I've trawled archives looking for changes in the "AllowUsers" option,
manuals, changes log, reported bugs and to my surprise I can't find anything
or anyone that has reported the issues that I am experiencing.
I am using the default installation sshd_config file as supplied by Redhat
and the only options I have changed are:
ListenAddress
AllowUsers
The first problem
2020 Apr 29
2
[PATCH 0/1] Add uvirtio for testing
> 3) Need to be verbose on how the vring processing work in the commit log of
> patch 1
Ecven better a file documenting the interface somewhere in
Documentation/
take care,
Gerd
2020 Apr 29
2
[PATCH 0/1] Add uvirtio for testing
> 3) Need to be verbose on how the vring processing work in the commit log of
> patch 1
Ecven better a file documenting the interface somewhere in
Documentation/
take care,
Gerd
2008 May 09
2
Problem, possibly bug with AllowUsers & DenyUsers
Hi there,
I have just compiled openssh-5.0 on Solaris 10, and am trying to set up
a certain pattern of user access control. Essentially, regular users
should be able to login from any network, while root should be able to
login only from a private network 192.168.88.0/22. Actually, for the
purpose of sshd_config, this is four networks, but that's another story...
Here is what I tried:
2017 Sep 14
2
Live Register Spilling
> On Sep 13, 2017, at 9:03 PM, jin chuan see via llvm-dev <llvm-dev at lists.llvm.org> wrote:
>
> Hi All,
>
> Thanks for the reply. I managed to identify and fixed a few errors in my implementation.
>
> However, there are a few errors that i am not sure what is it indicating.
> For starters, i think i should explain what i am trying to achieve.
>
> I am
2006 Nov 09
1
sshd_config question.
I want to allow a single host root access via ssh. If the order of processing
DenyUsers, AllowUsers were reversed this cold be done in a straight forward
manner.
My question, is would adding an Apache-like derective Order Deny,Allow violate
any standards or be a security problem?
_____
Douglas Denault
http://www.safeport.com
doug at safeport.com
2010 Nov 08
1
openssh question
The denyUsers / AllowUsers option in openSSH does not satisfy our needs.
We want to supply our own software to allow/deny sessions based on time
of day.
I do not know if PAM can do this, but in any case we can not use PAM.
? Did someone do such a change in openSSH code
2005 Mar 07
3
[Bug 995] PermitRootLogin by IP address block specification
http://bugzilla.mindrot.org/show_bug.cgi?id=995
Summary: PermitRootLogin by IP address block specification
Product: Portable OpenSSH
Version: 3.6.1p2
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P3
Component: sshd
AssignedTo: openssh-bugs at mindrot.org
2003 Sep 23
1
Portable OpenSSH 3.7.1p2 released
Portable OpenSSH 3.7.1p2 has just been released. It will be available
from the mirrors listed at http://www.openssh.com/portable.html shortly.
Please note that this is a release to address issues in the portable
version only. The items mentioned below do not affect the OpenBSD
version.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client
2003 Sep 23
1
Portable OpenSSH 3.7.1p2 released
Portable OpenSSH 3.7.1p2 has just been released. It will be available
from the mirrors listed at http://www.openssh.com/portable.html shortly.
Please note that this is a release to address issues in the portable
version only. The items mentioned below do not affect the OpenBSD
version.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client
2009 Jun 04
1
[LLVMdev] endian issue of llvm-gcc and llvm backend
Hi, all
As I'm a Chinese, be patient of my poor description below.
I compiled libgcc into llvm bitcode in both big endian and little endian.
and got 2 different version of function: _ashldi3, the following is the
fragment of this function:
little endian:
=============================================
......
target datalayout =
2010 Dec 10
1
Problem of updating openssh-4.4p1 to openssh-5.5p1 with MAX_ALLOW_USERS option
Hello!
We have the server with RHEL 5.5 (64-bit) and need to connect many parallel users over ssh (OpenSSH).
Usually we use openssh-4.4p1, builded from the sources with changed "servconf.h" file by this type:
???#define MAX_ALLOW_USERS ????????10000 ????/* Max # users on allow list. */
???#define MAX_DENY_USERS ???????????10000 ????/* Max # users on deny list. */
???#define