Displaying 20 results from an estimated 10000 matches similar to: "[Bug 1663] sshd_config: AuthorizedKeysCommand"
2012 Aug 20
2
[Bug 1663] sshd_config: AuthorizedKeysCommand
https://bugzilla.mindrot.org/show_bug.cgi?id=1663
Jason Riedy <jason.riedy at cc.gatech.edu> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |jason.riedy at cc.gatech.edu
--- Comment #30 from Jason Riedy <jason.riedy at cc.gatech.edu> ---
2013 Mar 22
4
[Bug 1663] sshd_config: AuthorizedKeysCommand
https://bugzilla.mindrot.org/show_bug.cgi?id=1663
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
--- Comment #33 from Damien Miller <djm at mindrot.org> ---
mark bugs closed by openssh-6.2 release as
2013 Feb 05
5
[Bug 2011] sandbox selection needs some kind of fallback mechanism
https://bugzilla.mindrot.org/show_bug.cgi?id=2011
--- Comment #8 from Petr Lautrbach <plautrba at redhat.com> ---
Created attachment 2214
--> https://bugzilla.mindrot.org/attachment.cgi?id=2214&action=edit
don't probe seccomp capability of running kernel in configure
I'd like to add also possibility to build seccomp_filter sandbox on
system with older kernel, E.g. Fedora
2011 Dec 15
3
Retrieving authorized_keys via remote script
Here's a simple patch which retrieves authorized_keys via exec'ing a
program, rather than reading a flat file.
I added a simple option, AuthorizedKeysExec, to sshd_config which simply
executes the respective file, passing the username as argv[1].
Keys are returned via stdout.
Notes:
If AuthorizedKeysExec is set and an authorized_keys file exists,
checking the existing authorized_keys
2013 May 13
6
[Bug 2102] New: [PATCH] Specify PAM Service name in sshd_config
https://bugzilla.mindrot.org/show_bug.cgi?id=2102
Bug ID: 2102
Summary: [PATCH] Specify PAM Service name in sshd_config
Classification: Unclassified
Product: Portable OpenSSH
Version: 6.2p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: PAM support
2012 Aug 02
1
[Bug 983] Required authentication
https://bugzilla.mindrot.org/show_bug.cgi?id=983
Petr Lautrbach <plautrba at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #2138|0 |1
is obsolete| |
--- Comment #54 from Petr Lautrbach <plautrba at
2014 Sep 04
3
[Bug 2270] New: AuthenticationMethods - partial success is considered as failure
https://bugzilla.mindrot.org/show_bug.cgi?id=2270
Bug ID: 2270
Summary: AuthenticationMethods - partial success is considered
as failure
Product: Portable OpenSSH
Version: 6.6p1
Hardware: Other
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: sshd
2012 Mar 27
2
[Bug 983] Required authentication
https://bugzilla.mindrot.org/show_bug.cgi?id=983
--- Comment #51 from Petr Lautrbach <plautrba at redhat.com> 2012-03-28 02:35:54 EST ---
Created attachment 2138
--> https://bugzilla.mindrot.org/attachment.cgi?id=2138
fixes of original patch
(In reply to comment #46)
> Created attachment 2096 [details]
> Updated version of original patch.
Fix missing braces around block in
2014 Aug 22
7
[Bug 2263] New: sshd privsep monitor process doesn't handle SIGXFSZ signal
https://bugzilla.mindrot.org/show_bug.cgi?id=2263
Bug ID: 2263
Summary: sshd privsep monitor process doesn't handle SIGXFSZ
signal
Product: Portable OpenSSH
Version: 6.6p1
Hardware: All
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: sshd
2013 Jul 29
5
[Bug 2133] New: scp failes between two ends using password authentication
https://bugzilla.mindrot.org/show_bug.cgi?id=2133
Bug ID: 2133
Summary: scp failes between two ends using password
authentication
Product: Portable OpenSSH
Version: 6.2p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: scp
2012 Oct 31
5
AuthorizedKeysCommand support added
Hi,
I just commited the patch on https://bugzilla.mindrot.org/b/1663 It adds
an AuthorizedKeysCommand option to sshd_config to use helper program to
fetch a user's authorized keys. Quite a few people have asked for this
to allow storage of public keys in LDAP or other databases.
The program is executed (directly, not via the shell) with a single
argument of the user being logged in. It
2023 May 22
6
[Bug 3574] New: ssh ignores AuthorizedPrincipalsCommand if AuthorizedKeysCommand is also set
https://bugzilla.mindrot.org/show_bug.cgi?id=3574
Bug ID: 3574
Summary: ssh ignores AuthorizedPrincipalsCommand if
AuthorizedKeysCommand is also set
Product: Portable OpenSSH
Version: 9.3p1
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component:
2013 Oct 17
10
[Bug 2161] New: AuthorizedKeysCommand is not executed when defined inside Match block
https://bugzilla.mindrot.org/show_bug.cgi?id=2161
Bug ID: 2161
Summary: AuthorizedKeysCommand is not executed when defined
inside Match block
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: sshd
2016 Dec 31
2
[Bug 2656] New: Documentation does not mention "%k" as a supported token for AuthorizedKeysCommand
https://bugzilla.mindrot.org/show_bug.cgi?id=2656
Bug ID: 2656
Summary: Documentation does not mention "%k" as a supported
token for AuthorizedKeysCommand
Product: Portable OpenSSH
Version: 7.4p1
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
2011 Dec 20
3
ssh-copy-id -p port option
Hi.
I would like to add an option [-p port] to ssh-copy-id.
If this option is given then ssh-copy-id calls ssh with -p port to connect to
non-standard port.
The patch [1] adds this option to ssh-copy-id and documents it in ssh-copy-id(1) man page
[1] http://plautrba.fedorapeople.org/openssh/718674/ssh-copy-id-p-port.patch
Thanks,
Petr
diff --git a/contrib/ssh-copy-id
2012 Nov 05
2
[Bug 2047] New: Definition of Sophie Germain primes is wrong in manual moduli.5
https://bugzilla.mindrot.org/show_bug.cgi?id=2047
Priority: P5
Bug ID: 2047
Assignee: unassigned-bugs at mindrot.org
Summary: Definition of Sophie Germain primes is wrong in manual
moduli.5
Severity: normal
Classification: Unclassified
OS: Linux
Reporter: plautrba at redhat.com
2013 Mar 22
52
[Bug 2081] New: extend the parameters to the AuthorizedKeysCommand
https://bugzilla.mindrot.org/show_bug.cgi?id=2081
Bug ID: 2081
Summary: extend the parameters to the AuthorizedKeysCommand
Classification: Unclassified
Product: Portable OpenSSH
Version: 6.2p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
2012 Aug 17
90
[Bug 2035] New: Bugs intended to be fixed in 6.2
https://bugzilla.mindrot.org/show_bug.cgi?id=2035
Priority: P5
Bug ID: 2035
Assignee: unassigned-bugs at mindrot.org
Summary: Bugs intended to be fixed in 6.2
Severity: normal
Classification: Unclassified
OS: All
Reporter: dtucker at zip.com.au
Hardware: All
Status: NEW
Version:
2014 Jul 18
6
[Bug 2257] New: ssh - Connection closed by UNKNOWN
https://bugzilla.mindrot.org/show_bug.cgi?id=2257
Bug ID: 2257
Summary: ssh - Connection closed by UNKNOWN
Product: Portable OpenSSH
Version: 6.6p1
Hardware: All
OS: Linux
Status: NEW
Severity: minor
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
2014 Dec 17
0
[Bug 1872] Support better hash algorithms for key fingerprints (FIPS compat)
https://bugzilla.mindrot.org/show_bug.cgi?id=1872
--- Comment #21 from Petr Lautrbach <plautrba at redhat.com> ---
It could be probably useful to add -E option to ssh-keygen usage
message too:
--- a/ssh-keygen.c
+++ b/ssh-keygen.c
@@ -2196,7 +2196,7 @@ usage(void)
" ssh-keygen -e [-m key_format] [-f input_keyfile]\n"
" ssh-keygen -y [-f