similar to: Syntax Errors on the wiki

Displaying 20 results from an estimated 10000 matches similar to: "Syntax Errors on the wiki"

2004 May 18
1
Problem with X tunneling, su, and xauth
Hi all. I'm trying to use ssh to connect from a PC (using TerraTerm with the ssh add-in) to a Solaris 8 or Solaris 9 box (both running OpenSSH 3.7.1p2) to establish a session for X-forwarding. Everything works great, until I use "su" to change to another account (such as root). The su'd user doesn't seem to be able to authenticate properly to use the X-tunnel. I did a
2005 Mar 01
1
Allow remote hosts for remote forwarded ports
Hi all, I just wanted to temporarily make some new CMS I set up available to the public for testing on port 8080 of our web server forwarded via ssh to to my local, firewalled workstation: ssh me at some-host.tld -R 8080:localhost:80 However I had to notice that this only binds to the loopback interface and not to all. For -L there is the -g option to low connects to locally forwarded ports
2005 Dec 05
1
Remote command
Hi all, I'm new on this list, I tried to find the solution or ideas about my doubt but I didn't know what look for. I was thinking to develope a system that is a "Basic Administration" of a Linux Server, the "idea" is: an application in Java running on a worksation, to consult how much space has on disk of server, the application send a command to the server using
2006 Jan 11
1
OpenSSH Installation in Win2k Platform
Hi, How can I install the OpenSSH in Windows. When I downloaded the file, there is no .exe. Thanks for your advance help. -- ___________________________________________________ Play 100s of games for FREE! http://games.mail.com/
2009 Jan 30
1
Patch to log tunnel information
First, all credit to Vladimir Parkhaev as this is his code. He may have submitted this before for all I know, but I for one definitely would like to see this end up in the codebase, so I'm submitting it. *** openssh-5.1p1/serverloop.c Fri Jul 4 09:10:49 2008 --- openssh-5.1p1-RCFHACKS/serverloop.c Thu Jan 29 08:56:11 2009 *************** *** 957,962 **** --- 957,968 ---- c =
2007 Apr 24
1
Logging enhancement
I would like to suggest a logging enhancement that would contribute greatly to access auditing. Currently nothing is logged when a user connects to another server as a different user. The auditing trail is broken for tracing access. userA> ssh userB at hostB A simple syslog addition (for example) to ssh.c closes that gap. /* Log into the remote system. This never
2008 Feb 20
1
alignment problem in monitor_fdpass.c
Hi, After FreeBSD changed from using -O2 to using -O on their ARM port, I found that sshd stopped working. (gcc version 4.2.1 20070719 [FreeBSD]) I have downloaded openssh-SNAP-20080220.tar.gz and the code still look the same. Anyway looking into it, I found that the problem is in monitor_fdpass.c in the functions mm_send_fd and mm_receive_fd. Using -O2 used to align the tmp array on a 4 byte
2008 Sep 02
2
Queries on ssh_askpass
Hi, I had developed a program which spawns a shell where i am trying to use ssh commands to log into a linux server. There is a pop up dialog window which is prompting me for key-ing the password. Actually i want to get rid of this pop up dialog box, as i don't want this to be visible in my program/code execution. Could you please let me know is there any way to resolve and stop this
2008 Mar 07
1
Command-based ssh_config declarations
How difficult would it be to enhance the client ssh_config file to allow command-based declarations similar to that provided by the "Host" keyword? The main reason I need something like this is when ssh is used via CVS and Subversion. I want all CVS/Subversion traffic to use a different SSH port and different authentication options. So... you might have an ssh_config file that
2000 Jun 28
1
New version of chron
A new version of the chron add-on package is now available from CRAN. The previous version introduced code to ensure that chron would work correctly in the 21st century. Of course, the main issue is how to deal with 2-digit dates. To this end, the original author of chron, David James, indicated that the `y' format specifier was always meant to specify the year without the century (i.e.,
2000 Jun 28
1
New version of chron
A new version of the chron add-on package is now available from CRAN. The previous version introduced code to ensure that chron would work correctly in the 21st century. Of course, the main issue is how to deal with 2-digit dates. To this end, the original author of chron, David James, indicated that the `y' format specifier was always meant to specify the year without the century (i.e.,
2009 Mar 23
7
ANNOUNCE: Puppet 0.24.8 now available!
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Puppet 0.24.8 is now available! This is a maintenance release for the 0.24.x branch but contains a small number of new features including some significant performance enhancements for large installations and stored configurations. The tarball is available at: http://reductivelabs.com/downloads/puppet/puppet-0.24.8.tgz MD5 hash:
2012 Jul 12
2
A simple simulation question
Hi! I would like to post the following question: I was trying to figure out how to do the simulation shown in Fig 10.6 of John Verzani's book 'Using R for Intro Statistics'. It is on page 290, with a description on the previous page. It seems like a simple thing... Just needing to duplicate a procedure. (Perhaps I need to do it with a loop?) This is what I was trying:
2008 Dec 16
2
Request change to file match.c, function match_pattern_list
Greetings, This request is in the grey area between a bug report and an enhancement request. Request ------- Please apply the following diff (or something functionally similar) to file ``match.c'' in OpenSSH-5.1p1: 161a162,164 > } else { > if (negated) > got_positive = 1; /* Negative match, negated = Positive */ In case the lines above wrapped in the email
2008 Oct 03
1
Bug#391935: The answer from Citrix & Xen.org
Hi, I simply asked to upstream for a clarification on the use of the Xen trademark, and received two unambiguous answers. From Citrix: Actually, for the community, you can do whatever you like. The FIT test only applies to commercially distributed Xen products - and is about ensuring compatibility between vendors. Do you need more detail than that?
2006 May 10
2
Patch to add resume feature to scp
Dear all, I have enhanced scp to do the following. 1) Check the SHA1 checksums of the file fragments at the source and destination and resume file transfer from where it left off last time 2) If the file checksums match and size also matches, then the file is assumed to be identical and skipped, the user is also informed of the same 3) If the destination file size is larger than the source,
2007 Dec 26
1
sshd's -e doesn't work as expected
Hello, I'm running a sshd server using the -e flag so that I can capture its whole output and later send it to the user. I'm also setting LogLevel to DEBUG1 in the configuration file and I don't want to disturb syslogd. But the problem is that it doesn't work as expected (or as I expect, which I think should be the correct behavior). The log file ends up being empty because the
2011 May 28
5
Segmentation fault again
Hi, I have the following report after a cron job again? /root/tools/expunge: Zeile 3: 4869 Speicherzugriffsfehler doveadm expunge -A mailbox Spam savedbefore 5d /root/tools/expunge: Zeile 5: 4915 Speicherzugriffsfehler doveadm expunge -A mailbox Papierkorb savedbefore 4d See the attachment. Any ideas greatly appreciated. Thanks -- Mit freundlichen Gr??en, with kind regards, Jim Knuth
2008 Dec 09
2
Feature request: AlwaysDenyLogin, LoginDelayTime
Please consider adding the following features to sshd: 1. AlwaysDenyLogin - a setting that will result in always denying login regardless of the credentials given by the client. 2. LoginDelayTime - to specify a delay in milliseconds before the server responds to a client's login attempt. These would help to employ brute force bots. Regards
2008 Jul 15
2
Risk of StrictMode (but read only)
Is there a risk associated with having authorized_keys files set to readable but "StrictMode no"? I am thinking particularly in the case of having public keys all centralized in a directory in /etc or something. Is it really a potential hack vector if someone can read a public key, or is the only real danger if they were writable? --- Don Hoover dxh at yahoo.com