similar to: Patch for ssh-keygen to allow conversion of public key to openssh format

Displaying 20 results from an estimated 200 matches similar to: "Patch for ssh-keygen to allow conversion of public key to openssh format"

2016 Jan 01
3
removing keys from ssh-agent without having key file
ssh-agent does not allow you to remove individual keys without having the key file that was added. To remove these keys the user must remove all keys with ssh-add -D. Would a patch to make ssh-add skip the existence check for the file be considered? The specific use case is that a USB drive is mounted with the key, the key is added to the agent then the USB drive is unmounted.
2015 Feb 20
2
Call for testing: OpenSSH 6.8
On Fri, 20 Feb 2015, ?smail D?nmez wrote: > Hi, > > On Fri, Feb 20, 2015 at 12:21 AM, Damien Miller <djm at mindrot.org> wrote: > > Hi, > > > > OpenSSH 6.8 is almost ready for release, so we would appreciate testing > > on as many platforms and systems as possible. This release contains > > some substantial new features and a number of bugfixes. >
2015 Jan 23
5
[Bug 2342] New: ssh-keygen gives wrong error loading public key message
https://bugzilla.mindrot.org/show_bug.cgi?id=2342 Bug ID: 2342 Summary: ssh-keygen gives wrong error loading public key message Product: Portable OpenSSH Version: 6.7p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: ssh-keygen
2015 Nov 20
6
[Bug 2503] New: The sshd log files are insufficient to detect sessions
https://bugzilla.mindrot.org/show_bug.cgi?id=2503 Bug ID: 2503 Summary: The sshd log files are insufficient to detect sessions Product: Portable OpenSSH Version: 7.1p1 Hardware: All OS: All Status: NEW Severity: enhancement Priority: P5 Component: sshd Assignee:
2009 Jan 22
8
[Bug 1550] New: Move from 3DES to AES-256 for private key encryption
https://bugzilla.mindrot.org/show_bug.cgi?id=1550 Summary: Move from 3DES to AES-256 for private key encryption Product: Portable OpenSSH Version: 5.1p1 Platform: All OS/Version: All Status: NEW Keywords: patch Severity: enhancement Priority: P2 Component: ssh-keygen AssignedTo:
2008 Aug 29
7
[Bug 69] Generalize SSH_ASKPASS
https://bugzilla.mindrot.org/show_bug.cgi?id=69 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |djm at mindrot.org Alias| |generalised-askpass -- Configure bugmail:
2008 Sep 05
2
[Bug 1523] New: Log public key identifier on pubkey login
https://bugzilla.mindrot.org/show_bug.cgi?id=1523 Summary: Log public key identifier on pubkey login Product: Portable OpenSSH Version: 5.1p1 Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P2 Component: sshd AssignedTo: unassigned-bugs at mindrot.org ReportedBy:
2015 Jul 30
3
Feature Request: Invalid sshd port fallback
I see your point and that makes valid sense;I even change default port. "It would be better to let you know the port is wrong and fail to start until you fixed the problem and selected a valid non-standard port." Is there any reason something like this isn't implemented already? Could it be implemented? On Thu, Jul 30, 2015 at 2:02 PM Ron Frederick <ronf at timeheart.net>
2015 Oct 12
4
[Bug 2479] New: ssh-keyscan non-standard port broken
https://bugzilla.mindrot.org/show_bug.cgi?id=2479 Bug ID: 2479 Summary: ssh-keyscan non-standard port broken Product: Portable OpenSSH Version: 6.9p1 Hardware: amd64 OS: Linux Status: NEW Severity: normal Priority: P5 Component: ssh-keyscan Assignee: unassigned-bugs at
2006 Jan 31
1
Samba Question
Hi I got a quick question to ask is there any possible way to have only specific users to be able to access the folder for example. if i have folder called SHARE and inside the SHARE folder i have folder called confidential can i set the permission only management to access the share folder? if so how can i do that. oh and one more thing i have set up samba on my SUSE 9.3 and i can map the
2010 Nov 20
0
Fwd: Festival of Pacific Arts web cast
---------- Forwarded message ---------- From: Sean Linton <sean at lpnz.org> Date: 20 November 2010 18:33 Subject: Festival of Pacific Arts web cast To: Robert Loomans <robertl at apnic.net>, George Michaelson <ggm at apnic.net>, sylvia at apnic.net, Gaurab Raj Upadhaya <gaurab at lahai.com>, Ian Pringle < ipringle at col.org>, Martin Hadlow <m.hadlow at
2009 Apr 30
2
ChrootDirectory %h
Hi, many people are having problems using SFTP with ChrootDirectory when the jail directory (or the path above) is not owned by root. The question is if chroot'ing to usual home directories can be allowed, even though they are owned by regular users. I know that this topic has been discussed on the list several times now, so I searched the list archives for posts that invalidate the
2020 Apr 25
2
[PATCH 1/3] Add private key protection information extraction to ssh-keygen
Add private key protection information extraction to shh-keygen using -v option on top of -y option which is already parsing the private key. Technically, the passphrase isn't necessary to do this, but it is the most logical thing to do for me. Adding this to -l option is not appropriate because fingerprinting is using the .pub file when available. An other idea is to add a new option, I
2010 Nov 27
0
[patch] Make passphrase-protected SSHv1 keys work again
ssh-add on OpenBSD current (with malloc -S enabled) crashes ("chunk is already free") when loading my password-protected SSHv1 key (used only for testing). "ssh-add ~/.ssh/identity" also fails to format the prompt properly ("Enter passphrase for :"). The issue is as follows: Starting at ssh-add.c:158 in add_file(ac, filename = "~/.ssh/identity"), we call
2009 Apr 07
11
[Bug 1588] New: sftp client produces
https://bugzilla.mindrot.org/show_bug.cgi?id=1588 Summary: sftp client produces Product: Portable OpenSSH Version: 5.2p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: sftp AssignedTo: unassigned-bugs at mindrot.org ReportedBy: gsocsftp at v6shell.org
2015 Jun 18
7
[Bug 2415] New: Public key failures are not counted and therefore not logged into syslog
https://bugzilla.mindrot.org/show_bug.cgi?id=2415 Bug ID: 2415 Summary: Public key failures are not counted and therefore not logged into syslog Product: Portable OpenSSH Version: 6.8p1 Hardware: Other OS: Linux Status: NEW Severity: normal Priority: P5 Component:
2015 Feb 19
34
Call for testing: OpenSSH 6.8
Hi, OpenSSH 6.8 is almost ready for release, so we would appreciate testing on as many platforms and systems as possible. This release contains some substantial new features and a number of bugfixes. Snapshot releases for portable OpenSSH are available from http://www.mindrot.org/openssh_snap/ The OpenBSD version is available in CVS HEAD: http://www.openbsd.org/anoncvs.html Portable OpenSSH is
2011 Jan 12
1
[openssh-commits] CVS: fuyu.mindrot.org: openssh
This commit message was supposed to be: - (djm) [configure.ac] Turn on -Wno-unused-result for gcc >= 4.4 to avoid silly warnings on write() calls we don't care succeed or not. I fixed the CVS log retrospectively On Wed, 12 Jan 2011, Damien Miller wrote: > CVSROOT: /var/cvs > Module name: openssh > Changes by: djm at fuyu.mindrot.org 11/01/12 13:34:04 >
2013 Jan 31
2
OpenSSH NoPty patch
Hey everyone, I wanted to add support for denying PTY allocation through OpenSSH. I'm not certain if this is quite thorough enough for all cases, but for me it might work for the moment. I know that you can currently do this through authorized_keys, but as far as I know that only works for an actual key. In my use case, I wanted a user with no password which is forced to run a specific
2012 Nov 24
0
ssh-keyscan continuity patch --
I apologize, this patch should have been sent awhile ago. Between a lot of things that needed to be completed at work as a sysadmin for the Research Computing group at Purdue University and retiring from work after 38 years at the end of May (2012), I basically ignored it. This patch is from a clone of my workstation that I just activated at home. The patch was primarily written to fix the