Displaying 20 results from an estimated 1100 matches similar to: "[Bug 2095] New: ssh client not respecting IdentitiesOnly=yes option"
2019 Oct 09
3
[Bug 3080] New: Document IdentityFile=none and clarify interaction of defaults with IdentitiesOnly
https://bugzilla.mindrot.org/show_bug.cgi?id=3080
Bug ID: 3080
Summary: Document IdentityFile=none and clarify interaction of
defaults with IdentitiesOnly
Product: Portable OpenSSH
Version: 8.0p1
Hardware: Other
OS: All
Status: NEW
Severity: normal
Priority: P5
2024 Apr 19
2
[Bug 3681] New: SSH Agent Certificate Not Recognized with 'IdentitiesOnly' Configured
https://bugzilla.mindrot.org/show_bug.cgi?id=3681
Bug ID: 3681
Summary: SSH Agent Certificate Not Recognized with
'IdentitiesOnly' Configured
Product: Portable OpenSSH
Version: 9.7p1
Hardware: All
OS: All
Status: NEW
Severity: trivial
Priority: P5
Component:
2019 Apr 01
2
IdentityFile vs IdentitiesOnly
Hi folks,
I've got a moderate number of keys in my ssh config file.
Problem: Very often I get an error message like
Received disconnect from 2001:db8::8077 port 999:2: Too many authentication failures
Authentication failed.
AFAIU the ssh-agent is to blame here, trying out all keys
he has ever seen. This conflicts with MaxAuthTries 6, set by
default on the peer.
The solution seems to be to
2019 Apr 02
2
IdentityFile vs IdentitiesOnly
Hi Darren,
On 4/1/19 10:41 AM, Darren Tucker wrote:
> On Mon, 1 Apr 2019 at 08:12, Harald Dunkel <harald.dunkel at aixigo.de> wrote:
>> I've got a moderate number of keys in my ssh config file.
>> Problem: Very often I get an error message like
> [...]
>> The solution seems to be to set IdentitiesOnly, e.g.:
> [...]
>> Shouldn't an explicit
2016 Nov 21
11
[Bug 2642] New: [sshconnect2] publickey authentication only properly works if used first: pubkey_prepare doesn't work after pubkey_cleanup
https://bugzilla.mindrot.org/show_bug.cgi?id=2642
Bug ID: 2642
Summary: [sshconnect2] publickey authentication only properly
works if used first: pubkey_prepare doesn't work after
pubkey_cleanup
Product: Portable OpenSSH
Version: 7.3p1
Hardware: amd64
OS: Linux
Status:
2014 Mar 20
1
[Bug 2214] New: Key is detected as existing if LogLevel=QUIET
https://bugzilla.mindrot.org/show_bug.cgi?id=2214
Bug ID: 2214
Summary: Key is detected as existing if LogLevel=QUIET
Product: Portable OpenSSH
Version: 6.2p1
Hardware: All
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: ssh-copy-id
Assignee: unassigned-bugs at
2020 Apr 23
6
[Bug 3153] New: Prefer user specified keys to avoid the agent overloading MaxAuthTries before even trying the key that was specified
https://bugzilla.mindrot.org/show_bug.cgi?id=3153
Bug ID: 3153
Summary: Prefer user specified keys to avoid the agent
overloading MaxAuthTries before even trying the key
that was specified
Product: Portable OpenSSH
Version: 8.2p1
Hardware: Other
OS: Linux
Status: NEW
2013 Apr 01
1
"no such identity"
With an OpenSSH 6.2p1 client with stock ssh_config and one of the
following cases:
- I don't have any client keys
- I have one or more client keys, but not one of each type
- I don't have an authorized_keys on the server
- I have an authorized_keys on the server, but it does not list any of
the keys I have
- One of my client keys is listed, but I don't have an agent and
2014 Aug 04
1
Password authentication problem with 6.4p1 (and later) clients: An analysis
I have been looking into this over the weekend, and what I have found
might be of interest to OpenSSH developers.
First, the bug that triggers the problem is in the embedded system.
Second, such as things were changed in 6.4p1, the OpenSSH client seems
to be open to a potential DoS attack.
The infinite loop described in my previous post is embodied in the
last four messages of the 6.4p1 traces.
2013 May 09
3
[Bug 2100] New: Missing dereference when bzeroing unused identities
https://bugzilla.mindrot.org/show_bug.cgi?id=2100
Bug ID: 2100
Summary: Missing dereference when bzeroing unused identities
Classification: Unclassified
Product: Portable OpenSSH
Version: 6.2p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
2014 Jan 21
1
Keys from -i should have precedence over agent keys
Hi,
I believe it would make more sense if,
when specifying a key with -i, that key (or keys) should be tried prior to
the keys in the agent.
Otherwise, if I have many keys in my agent, the server will kick me out. I
can see no situation where one would like to use agent keys instead of the
ones explicitly stated.
Do you agree?
The workaround is of course to set the IdentitiesOnly option.
Best
2009 Jan 22
0
Unintended key info disclosure via ForwardAgent?
It seems that users may be disclosing unintended public key info
when logging into remote hosts.
Use of the words keypair/keyid/etc have been bastardized. Signature
is likely better. Note also, the author may be without clue.
Setup:
[g] - refers to an administrative group of hosts
[n] - refers to a host within that group
ws[g][n] - management workstations [trusted]
User ssh-add's keys for
2015 Jul 29
2
[PATCH] ssh: Add option to present certificates on command line
Allow users to specify certificates to be used for authentication on
the command line with the '-z' argument when running ssh. For
successful authentication, the key pair associated with the certificate
must also be presented during the ssh.
Certificates may also be specified in ssh_config as a
CertificateFile.
This option is meant the address the issue mentioned in the following
2024 Aug 10
1
'Too many authentication failures' nuisance
On 8/10/24 17:13, Chris Green wrote:
> I have several ssh keys in the ~/.ssh directory of my desktop machine.
> As a result whenever I try to connect to a system which uses password
> authentication I get the "Too many authentication failures" error.
>
> Yes, I know I can get round this by setting PreferredAuthentications
> but this is rather a nuisance to have to do
2024 Oct 01
1
ssh while ssh-agent is running
> ssh should do this already
Hi Damien,
Let's discuss what it does already... For example, if ssh-agent already has
six keys, will it append the "-i key" as the seventh choice?
Apparently there is a "six-key authentication limit on most servers". A
seventh key will fail. If ssh is adding the new key to the end of the list
it would be expected to fail.
This limit is
2014 Jan 09
1
OSX - SSH agent functionality differing based upon CLI arguments
Trying to get SSH agent forwarding working for a popular open source configuration management system called Ansible.
I?ve had some unexpected behaviour, the only cause of which I can find is how I express the command line arguments.
http://stackoverflow.com/questions/20952689/vagrant-ssh-agent-forwarding-how-is-it-working?noredirect=1#comment31511341_20952689
In summarise:
In the first
2013 Mar 22
0
Announce: OpenSSH 6.2 released
Changes since OpenSSH 6.1
=========================
This release introduces a number of new features:
Features:
* ssh(1)/sshd(8): Added support for AES-GCM authenticated encryption in
SSH protocol 2. The new cipher is available as aes128-gcm at openssh.com
and aes256-gcm at openssh.com. It uses an identical packet format to the
AES-GCM mode specified in RFC 5647, but uses simpler and
2004 Mar 30
0
[Bug 448] ssh ignores key specified with -i if agent is running
http://bugzilla.mindrot.org/show_bug.cgi?id=448
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |FIXED
------- Additional Comments From djm at mindrot.org 2004-03-30 16:12
2016 Mar 11
2
Forward only specific identities
Hi OpenSSH peeps!
I have looked around a few man pages and the usual sources of
information but I can't seem to find a way to only forward specific
identities to some hosts. What I would really like to have is a way to
only forward the identity that gave me a successful auth:
% ls ~/.ssh | grep .pub
id_ecdsa.pub
id_ed25519.pub
id_rsa.pub
% cat .ssh/config
Host example.com:
2016 Mar 12
3
Problem with ssh-copy-id when home folder contains spaces
Hi,
some guy on the Cygwin mailing list found that ssh-copy-id chokes
on directories with spaces, which are quite common on Windows.
He also provided an easy fix, basically just adding quotes, which I
attached to this mail. Would that be ok to apply upstream?
Thanks,
Corinna
--
Corinna Vinschen
Cygwin Maintainer
Red Hat
-------------- next part --------------
diff --git