Displaying 20 results from an estimated 10000 matches similar to: "[Bug 2081] New: extend the parameters to the AuthorizedKeysCommand"
2015 Jan 09
6
[Bug 2336] New: Expose dynamic port for -R 0:... via environment
https://bugzilla.mindrot.org/show_bug.cgi?id=2336
            Bug ID: 2336
           Summary: Expose dynamic port for -R 0:... via environment
           Product: Portable OpenSSH
           Version: 6.7p1
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: sshd
          Assignee: unassigned-bugs
2014 Sep 09
9
[Bug 2272] New: Global "PermitTunnel Yes" required to connect to a tunnel
https://bugzilla.mindrot.org/show_bug.cgi?id=2272
            Bug ID: 2272
           Summary: Global "PermitTunnel Yes" required to connect to a
                    tunnel
           Product: Portable OpenSSH
           Version: 6.6p1
          Hardware: amd64
                OS: Linux
            Status: NEW
          Severity: major
          Priority: P5
         Component: sshd
   
2014 Sep 16
13
[Bug 2276] New: AuthorizedKeysCommand: add an option for alternate owner
https://bugzilla.mindrot.org/show_bug.cgi?id=2276
            Bug ID: 2276
           Summary: AuthorizedKeysCommand: add an option for alternate
                    owner
           Product: Portable OpenSSH
           Version: 6.6p1
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: sshd
        
2014 Dec 04
4
[Bug 2324] New: remote port forward w/ empty bind_address via multiplexed connection: doc violation
https://bugzilla.mindrot.org/show_bug.cgi?id=2324
            Bug ID: 2324
           Summary: remote port forward w/ empty bind_address via
                    multiplexed connection: doc violation
           Product: Portable OpenSSH
           Version: 6.7p1
          Hardware: amd64
                OS: Linux
            Status: NEW
          Severity: trivial
          Priority: P5
        
2014 Jun 27
1
Using AuthorizedKeysCommand in unprivileged sshd mode
Hi,
I have a setup in which I run sshd as unprivileged user at dedicated port
to serve specific application.
It is working perfectly!
One tweak I had to do, since the AuthorizedKeysCommand feature requires
file to be owned by root, I had to use root owned command at root owned
directory, although it does not add a security value.
At auth2-pubkey.c::user_key_command_allowed2(), we have the
2014 Sep 16
8
[Bug 2277] New: config: add option to customize moduli file location
https://bugzilla.mindrot.org/show_bug.cgi?id=2277
            Bug ID: 2277
           Summary: config: add option to customize moduli file location
           Product: Portable OpenSSH
           Version: 6.6p1
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: sshd
          Assignee:
2007 Sep 29
64
[Bug 1371] New: Add PKCS#11 (Smartcards) support into OpenSSH
http://bugzilla.mindrot.org/show_bug.cgi?id=1371
           Summary: Add PKCS#11 (Smartcards) support into OpenSSH
           Product: Portable OpenSSH
           Version: 4.7p1
          Platform: All
               URL: http://alon.barlev.googlepages.com/openssh-pkcs11
        OS/Version: All
            Status: NEW
          Severity: enhancement
          Priority: P2
         Component:
2015 May 21
2
[PATCH] build: ssh-agent: condition util.h include
Signed-off-by: Alon Bar-Lev <alon.barlev at gmail.com>
---
 ssh-agent.c | 2 ++
 1 file changed, 2 insertions(+)
diff --git a/ssh-agent.c b/ssh-agent.c
index 9e2a37f..415a5ea 100644
--- a/ssh-agent.c
+++ b/ssh-agent.c
@@ -68,7 +68,9 @@
 #include <time.h>
 #include <string.h>
 #include <unistd.h>
+#ifdef HAVE_UTIL_H
 #include <util.h>
+#endif
 
 #include
2014 Jun 03
1
patch to send incoming key to AuthorizedKeysCommand via stdin
Hi,
Are there any news on this? We are currently setting up a service that
uses Git over SSH and a single UNIX account with public key
authentication. We already have 25000 users (~10000 of which will be
regularly using the service) and in order to avoid linear search on each
login, it would be great to have support for looking up keys in a
database.
What is the status of the patch (using
2016 Jul 25
3
ssh-pkcs11.c
Hi Alon,
I confirmed with pkcs11-tool (from OpenSC) and I can confirm that
pressing return when asked for the pin causes the login to stop (and
not to try a empty pin).
Can you confirm if a empty pin is actually a valid pin, and if not,
can the patch be accepted?
Once again, the problem is that from a user experience, *some/most*
users would expect they can skip pkcs11 token authentication just
2016 Jun 17
3
ssh-pkcs11.c
On Fri, Jun 17, 2016 at 7:57 PM, Alon Bar-Lev <alon.barlev at gmail.com> wrote:
> On 17 June 2016 at 20:58, Nuno Gon?alves <nunojpg at gmail.com> wrote:
>> Hi,
>>
>> It seems there is a bug with the pkcs11 feature where a zero-length
>> PIN is accepted. I believe this is a bug, since the user might want to
>> press return when asked for the PIN to
2007 Sep 25
9
OpenSSH PKCS#11merge
[[Sending again, as for some strange reason it is not accepted]]
Hello OpenSSH developers,
I maintain external patch for PKCS#11 smartcard support into
OpenSSH[1] , many users already apply and use this patch.
I wish to know if anyone is interesting in working toward merging this
into mainline.
I had some discussion with Damien Miller, but then he disappeared.
Having standard smartcard
2013 Oct 17
10
[Bug 2161] New: AuthorizedKeysCommand is not executed when defined inside Match block
https://bugzilla.mindrot.org/show_bug.cgi?id=2161
            Bug ID: 2161
           Summary: AuthorizedKeysCommand is not executed when defined
                    inside Match block
           Product: Portable OpenSSH
           Version: -current
          Hardware: All
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P5
         Component: sshd
2014 Oct 10
12
[Bug 2287] New: AuthorizedKeysCommandUser should have it's default documented
https://bugzilla.mindrot.org/show_bug.cgi?id=2287
            Bug ID: 2287
           Summary: AuthorizedKeysCommandUser should have it's default
                    documented
           Product: Portable OpenSSH
           Version: 6.2p1
          Hardware: All
                OS: All
            Status: NEW
          Severity: trivial
          Priority: P5
         Component:
2015 Feb 06
3
Re: Creating users "on - the - fly"
>> However - as I got into that - I realized that I have no way to "find"
>> just the keys for a single user.  Since the only argument to that ssh 
>> keys command, is the username.  It's not HTTP so I couldn't point at a 
>> subdomain and use that to look up the information.
>You may be interested in the bug report "extend the parameters to the
2013 Apr 15
7
[Bug 2092] New: AuthorizedKeysCommand: bad ownership or modes for file
https://bugzilla.mindrot.org/show_bug.cgi?id=2092
            Bug ID: 2092
           Summary: AuthorizedKeysCommand: bad ownership or modes for file
    Classification: Unclassified
           Product: Portable OpenSSH
           Version: 6.2p1
          Hardware: amd64
                OS: Linux
            Status: NEW
          Severity: minor
          Priority: P5
         Component: sshd
   
2015 Nov 15
2
~/.ssh/config permissions
Hi,
Working with apache-sshd I found that it forces ~/.ssh/config to be
owned by user without group/others permissions. It failed for me
within my valid openssh environment.
Within sources (readconf.c::read_config_file), I found that openssh
only enforces ownership by user and not group/others write.
When I opened an issue, I was referred to this[1] wiki page (not sure
who maintain it) claiming
2023 May 22
6
[Bug 3574] New: ssh ignores AuthorizedPrincipalsCommand if AuthorizedKeysCommand is also set
https://bugzilla.mindrot.org/show_bug.cgi?id=3574
            Bug ID: 3574
           Summary: ssh ignores AuthorizedPrincipalsCommand if
                    AuthorizedKeysCommand is also set
           Product: Portable OpenSSH
           Version: 9.3p1
          Hardware: All
                OS: All
            Status: NEW
          Severity: normal
          Priority: P5
         Component:
2015 Feb 22
3
PKI host based principal
Hello,
Maybe I did not understand correctly the PKI trust, so forgive me if I am wrong.
For example, I have multiple hosts that all serves as monitoring
server, I would like to trust only these hosts, so I enrol a
certificate for these using "monitoring" principal, so I can connect
only to these.
At first I thought we can do Match statement at ssh_config, however,
the Match is being
2015 Mar 16
2
[Bug 2367] New: AuthorizedKeysCommand add key fingerprint as second argument
https://bugzilla.mindrot.org/show_bug.cgi?id=2367
            Bug ID: 2367
           Summary: AuthorizedKeysCommand add key fingerprint as second
                    argument
           Product: Portable OpenSSH
           Version: 6.7p1
          Hardware: Other
                OS: FreeBSD
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: sshd