Displaying 20 results from an estimated 10000 matches similar to: "Syntax Errors on the wiki"
2004 May 18
1
Problem with X tunneling, su, and xauth
Hi all.
I'm trying to use ssh to connect from a PC (using TerraTerm with the
ssh add-in) to a Solaris 8 or Solaris 9 box (both running OpenSSH
3.7.1p2) to establish a session for X-forwarding. Everything works
great, until I use "su" to change to another account (such as root).
The su'd user doesn't seem to be able to authenticate properly to use
the X-tunnel.
I did a
2005 Mar 01
1
Allow remote hosts for remote forwarded ports
Hi all,
I just wanted to temporarily make some new CMS I set up available to the
public for testing on port 8080 of our web server forwarded via ssh to
to my local, firewalled workstation:
ssh me at some-host.tld -R 8080:localhost:80
However I had to notice that this only binds to the loopback interface
and not to all. For -L there is the -g option to low connects to locally
forwarded ports
2005 Dec 05
1
Remote command
Hi all,
I'm new on this list, I tried to find the solution or ideas about my doubt
but I didn't know what look for.
I was thinking to develope a system that is a "Basic Administration" of a
Linux Server, the "idea" is: an application in Java running on a worksation,
to consult how much space has on disk of server, the application send a
command to the server using
2006 Jan 11
1
OpenSSH Installation in Win2k Platform
Hi,
How can I install the OpenSSH in Windows. When I downloaded the file, there is no .exe.
Thanks for your advance help.
--
___________________________________________________
Play 100s of games for FREE! http://games.mail.com/
2009 Jan 30
1
Patch to log tunnel information
First, all credit to Vladimir Parkhaev as this is his code. He may have
submitted this before for all I know, but I for one definitely would like
to see this end up in the codebase, so I'm submitting it.
*** openssh-5.1p1/serverloop.c Fri Jul 4 09:10:49 2008
--- openssh-5.1p1-RCFHACKS/serverloop.c Thu Jan 29 08:56:11 2009
***************
*** 957,962 ****
--- 957,968 ----
c =
2007 Apr 24
1
Logging enhancement
I would like to suggest a logging enhancement that would contribute
greatly to access auditing.
Currently nothing is logged when a user connects to another server as a
different user.
The auditing trail is broken for tracing access.
userA> ssh userB at hostB
A simple syslog addition (for example) to ssh.c closes that gap.
/* Log into the remote system. This never
2008 Feb 20
1
alignment problem in monitor_fdpass.c
Hi,
After FreeBSD changed from using -O2 to using -O on their ARM port, I
found that sshd stopped working. (gcc version 4.2.1 20070719 [FreeBSD])
I have downloaded openssh-SNAP-20080220.tar.gz and the code still look
the same.
Anyway looking into it, I found that the problem is in monitor_fdpass.c
in the functions mm_send_fd and mm_receive_fd. Using -O2 used to align
the tmp array on a 4 byte
2008 Sep 02
2
Queries on ssh_askpass
Hi,
I had developed a program which spawns a shell where i am trying to use ssh
commands to log into a linux server.
There is a pop up dialog window which is prompting me for key-ing the
password.
Actually i want to get rid of this pop up dialog box, as i don't want this
to be visible in my program/code execution.
Could you please let me know is there any way to resolve and stop this
2008 Mar 07
1
Command-based ssh_config declarations
How difficult would it be to enhance the client ssh_config file to allow
command-based declarations similar to that provided by the "Host" keyword?
The main reason I need something like this is when ssh is used via CVS and
Subversion. I want all CVS/Subversion traffic to use a different SSH port
and different authentication options.
So... you might have an ssh_config file that
2000 Jun 28
1
New version of chron
A new version of the chron add-on package is now available from CRAN.
The previous version introduced code to ensure that chron would work
correctly in the 21st century. Of course, the main issue is how to deal
with 2-digit dates. To this end, the original author of chron, David
James, indicated that the `y' format specifier was always meant to
specify the year without the century (i.e.,
2000 Jun 28
1
New version of chron
A new version of the chron add-on package is now available from CRAN.
The previous version introduced code to ensure that chron would work
correctly in the 21st century. Of course, the main issue is how to deal
with 2-digit dates. To this end, the original author of chron, David
James, indicated that the `y' format specifier was always meant to
specify the year without the century (i.e.,
2009 Mar 23
7
ANNOUNCE: Puppet 0.24.8 now available!
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Puppet 0.24.8 is now available!
This is a maintenance release for the 0.24.x branch but contains a small
number of new features including some significant performance
enhancements for large installations and stored configurations.
The tarball is available at:
http://reductivelabs.com/downloads/puppet/puppet-0.24.8.tgz
MD5 hash:
2012 Jul 12
2
A simple simulation question
Hi!
I would like to post the following question:
I was trying to figure out how to do the simulation shown in Fig 10.6 of
John Verzani's book 'Using R for Intro Statistics'. It is on page 290, with
a description on the previous page. It seems like a simple thing... Just
needing to duplicate a procedure. (Perhaps I need to do it with a loop?)
This is what I was trying:
2008 Dec 16
2
Request change to file match.c, function match_pattern_list
Greetings,
This request is in the grey area between a bug report and an
enhancement request.
Request
-------
Please apply the following diff (or something functionally similar) to
file ``match.c'' in OpenSSH-5.1p1:
161a162,164
> } else {
> if (negated)
> got_positive = 1; /* Negative match, negated = Positive */
In case the lines above wrapped in the email
2008 Oct 03
1
Bug#391935: The answer from Citrix & Xen.org
Hi,
I simply asked to upstream for a clarification on the use of the Xen
trademark, and received two unambiguous answers.
From Citrix:
Actually, for the community, you can do whatever you like. The
FIT test only applies to commercially distributed Xen products -
and is about ensuring compatibility between vendors.
Do you need more detail than that?
2006 May 10
2
Patch to add resume feature to scp
Dear all,
I have enhanced scp to do the following.
1) Check the SHA1 checksums of the file fragments at the source and
destination and resume file transfer from where it left off last time
2) If the file checksums match and size also matches, then the file is
assumed to be identical and skipped, the user is also informed of the
same
3) If the destination file size is larger than the source,
2007 Dec 26
1
sshd's -e doesn't work as expected
Hello,
I'm running a sshd server using the -e flag so that I can capture its
whole output and later send it to the user. I'm also setting LogLevel
to DEBUG1 in the configuration file and I don't want to disturb syslogd.
But the problem is that it doesn't work as expected (or as I expect,
which I think should be the correct behavior). The log file ends up
being empty because the
2011 May 28
5
Segmentation fault again
Hi,
I have the following report after a cron job again?
/root/tools/expunge: Zeile 3: 4869 Speicherzugriffsfehler doveadm
expunge -A mailbox Spam savedbefore 5d
/root/tools/expunge: Zeile 5: 4915 Speicherzugriffsfehler doveadm
expunge -A mailbox Papierkorb savedbefore 4d
See the attachment.
Any ideas greatly appreciated. Thanks
--
Mit freundlichen Gr??en,
with kind regards,
Jim Knuth
2008 Dec 09
2
Feature request: AlwaysDenyLogin, LoginDelayTime
Please consider adding the following features to sshd:
1. AlwaysDenyLogin - a setting that will result in always denying
login regardless of the credentials given by the client.
2. LoginDelayTime - to specify a delay in milliseconds before the
server responds to a client's login attempt.
These would help to employ brute force bots.
Regards
2008 Jul 15
2
Risk of StrictMode (but read only)
Is there a risk associated with having authorized_keys files set to readable but "StrictMode no"?
I am thinking particularly in the case of having public keys all centralized in a directory in /etc or something.
Is it really a potential hack vector if someone can read a public key, or is the only real danger if they were writable?
---
Don Hoover
dxh at yahoo.com