Displaying 20 results from an estimated 1000 matches similar to: "[Bug 2062] New: Add support for a ForceShell sshd option"
2015 Jan 21
4
way to set shell used for remote commands?
On Wed, Jan 21, 2015 at 17:29:00 +0000, Alex Bligh wrote:
>
> On 21 Jan 2015, at 15:36, Jason Vas Dias <jason.vas.dias at gmail.com> wrote:
>
> > Please can OpenSSH provide some way of specifying which shell to use to
> > execute commands on a host.
>
> Using dash as an example of another shell:
>
> ssh 127.0.0.1 -t dash
>
> and
>
>
2001 Oct 04
1
patch - forceshell
Attached is a simple patch which allows an auth param 'shell=' like
'command='
When specified, sshd will use this shell instead of the one in
/etc/passwd or the default shell.
This patch allows you can have some chrooted shell (actually any shell)
associated with a specific key.
You could do this with command=, but then the command given to ssh will
be ignored, and scp will not
2013 Jul 31
1
openssh-unix-dev Digest, Vol 123, Issue 13
>
> Message: 8
> Date: Tue, 30 Jul 2013 12:46:50 -0700
> From: Iain Morgan <imorgan at nas.nasa.gov>
> To: Damien Miller <djm at mindrot.org>
> Cc: "openssh-unix-dev at mindrot.org" <openssh-unix-dev at mindrot.org>
> Subject: Re: Call for testing: OpenSSH-6.3
> Message-ID: <20130730194649.GC18047 at linux124.nas.nasa.gov>
>
2013 Apr 17
1
[Bug 1039] Incomplete application of HostKeyAlias in ssh
https://bugzilla.mindrot.org/show_bug.cgi?id=1039
Iain Morgan <imorgan at nas.nasa.gov> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |imorgan at nas.nasa.gov
--- Comment #13 from Iain Morgan <imorgan at nas.nasa.gov> ---
My apologies for
2001 Oct 31
2
REQ: Minor change ton handling of without-password
Hi,
OpenSSH 2.9p2 behaves differently with 'PermitRootLogin without-password'
than does SSH 2.2.27 with 'PermitRootLogin nopwd':
nopython.imorgan 153> ssh root at sun523
root at sun523's password:
ROOT LOGIN REFUSED FROM nopython.nas.nasa.gov
nopython.imorgan 154> ssh root at sun566
root at sun566's password:
Permission denied.
In the case of OpenSSH, you simply
2013 Sep 10
6
[Bug 2150] New: Recursive upload expects target directory to already exist
https://bugzilla.mindrot.org/show_bug.cgi?id=2150
Bug ID: 2150
Summary: Recursive upload expects target directory to already
exist
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: sftp
2015 Mar 26
2
FYI: SSH1 now disabled at compile-time by default
No, I just think 15 years or so is more than enough time to have
addressed the issue.
On Thu, Mar 26, 2015 at 14:05:08 -0700, Dan Kaminsky wrote:
> So, this isn't your problem and you don't respect the people's whose
> problem it is.
>
> On Thu, Mar 26, 2015 at 12:43 PM, Iain Morgan <imorgan at nas.nasa.gov> wrote:
>
> > On Thu, Mar 26, 2015 at 11:55:18
2013 Jul 05
2
Trouble with -W
I want to ssh from a client to a machine on a closed network via a
jumphost; let's call them {client,internal,jumphost}.example.com. I
have authpf set up on the jumphost so that when logged in, I am allowed
to open TCP connections from the jumphost to port 22 on internal nodes.
This works well with port forwarding:
des at client ~% ssh -L2222:internal.example.com:22 jumphost.example.com
2005 Jun 13
5
[Bug 1055] Problem with arcfour cipher and OpenSSL 0.9.7g
http://bugzilla.mindrot.org/show_bug.cgi?id=1055
Summary: Problem with arcfour cipher and OpenSSL 0.9.7g
Product: Portable OpenSSH
Version: 4.1p1
Platform: Itanium2
OS/Version: Linux
Status: NEW
Severity: major
Priority: P2
Component: sshd
AssignedTo: bitbucket at mindrot.org
ReportedBy:
2006 Apr 28
5
DO NOT REPLY [Bug 3740] New: --delete with -a failes with warning (though -a is supposed to imply -r)
https://bugzilla.samba.org/show_bug.cgi?id=3740
Summary: --delete with -a failes with warning (though -a is
supposed to imply -r)
Product: rsync
Version: 2.6.8
Platform: x86
OS/Version: Linux
Status: NEW
Severity: major
Priority: P3
Component: core
AssignedTo: wayned@samba.org
2014 Mar 14
7
[Bug 2211] New: Too many hostbased authentication attempts
https://bugzilla.mindrot.org/show_bug.cgi?id=2211
Bug ID: 2211
Summary: Too many hostbased authentication attempts
Product: Portable OpenSSH
Version: 6.5p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee: unassigned-bugs at
2005 Oct 26
4
[Bug 1106] Updated .spec file and startup for SuSE
http://bugzilla.mindrot.org/show_bug.cgi?id=1106
Summary: Updated .spec file and startup for SuSE
Product: Portable OpenSSH
Version: 4.2p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: enhancement
Priority: P2
Component: Build system
AssignedTo: bitbucket at mindrot.org
ReportedBy:
2008 May 09
4
[Bug 1462] New: Unaligned access warnings on IA64 when using umac-64
https://bugzilla.mindrot.org/show_bug.cgi?id=1462
Summary: Unaligned access warnings on IA64 when using umac-64
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.0p1
Platform: Itanium2
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo:
2010 Jul 15
13
[Bug 1798] New: Add fsync() support to sftp/sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1798
Summary: Add fsync() support to sftp/sftp-server
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: sftp-server
AssignedTo: unassigned-bugs at mindrot.org
2015 Nov 26
2
How disable forwarding-only connections (i.e. non-shell/command non-sftp connections)? (Maybe this is a feature request!)
On 2015-11-26 13:33, Darren Tucker wrote:
> On Thu, Nov 26, 2015 at 4:11 PM, Tinker <tinkr at openmailbox.org> wrote:
>> The goal is to get a script invoked *at login time*,
>
> This part I follow, but having a script run is just a means to an end
> not the end itself. What is the script going to do?
>
>> so that the authentication only is known to the client
2015 Nov 26
2
How disable forwarding-only connections (i.e. non-shell/command non-sftp connections)? (Maybe this is a feature request!)
On 2015-11-26 14:16, Darren Tucker wrote:
> On Thu, Nov 26, 2015 at 4:49 PM, Tinker <tinkr at openmailbox.org> wrote:
>> On 2015-11-26 13:33, Darren Tucker wrote:
> [...]
>>> What is the script going to do?
>
> You didn't answer this.
Register the login to the group's login database.
>> How would you do it using bsdauth?
>>
>> (PAM
2018 Nov 02
2
[BUG?] sftp is echoing back prompt and commands in batch mode
Thanks, Iain.
I am willing to hear from other users whether anyone else sees this as a
bug before filing it.
--
Vincenzo Romano
Il giorno ven 2 nov 2018, 20:03 Iain Morgan <imorgan at nas.nasa.gov> ha
scritto:
> If you truly intend this as a bug report, you should file it at
> bugzilla.mindrot.org.
>
> On Fri, Nov 02, 2018 at 12:25:22 +0100, Vincenzo Romano wrote:
> >
2004 Dec 03
1
[BUGTRAQ] rssh and scponly arbitrary command execution
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[This came over BUGTRAQ this morning. Note the call for volunteers
vis-a-vis rssh.]
- ----- Forwarded message from Jason Wies <jason at xc.net> -----
List-Id: <bugtraq.list-id.securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe at securityfocus.com>
To: bugtraq at securityfocus.com
Cc: rssh-discuss at
2013 Sep 18
12
[Bug 2154] New: Avoid key lookup overhead when re-keying
https://bugzilla.mindrot.org/show_bug.cgi?id=2154
Bug ID: 2154
Summary: Avoid key lookup overhead when re-keying
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2010 Apr 13
3
[Bug 1755] New: Broken pipe with scponly with debuglevel
https://bugzilla.mindrot.org/show_bug.cgi?id=1755
Summary: Broken pipe with scponly with debuglevel
Product: Portable OpenSSH
Version: 5.4p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sftp-server
AssignedTo: unassigned-bugs at mindrot.org