similar to: subsribe

Displaying 20 results from an estimated 300000 matches similar to: "subsribe"

2018 Aug 29
2
OpenSSH 7.8p1 drops SSH connection with "Broken Pipe" IMMEDIATELY after successful login
Yes, thank you! Now with the "Host *" line it works. Thanks again. Sent from BlueMail<http://www.bluemail.me/r?b=13569> On Aug 29, 2018, at 08:15, Zach Cheung <kuroro.zhang at gmail.com<mailto:kuroro.zhang at gmail.com>> wrote: Sorry, your problem is related to ssh client not sshd, try to add following config to /etc/ssh/ssh_config or ~/.ssh/config: Host * IPQoS
2013 Nov 25
2
Last http://hg.mindrot.org/openssh commit is from 2013-06-11
Hello, well it''s | Rev: || 11096:745a39c852ab tip 11094:e34042dabbd8 | Auth: dtucker | Date: Tue, 11 Jun 2013 02:10:02 +0000 - (dtucker) [myproposal.h] Make the conditional algorithm support consistent and add some comments so it''s clear what goes where. Note it was still advertised in the 6.3 release notes. Has it been replaced by a git(1) repository? :-))
2023 Sep 08
1
Two big flaws in the `configure` script -- have located them, cannot fix
When you ran the configure script what options did you use? If you are using --with-ssl-dir=[whatever] you usually need to append "--with-rpath=-Wl,-rpath," so you get ./configure --with-ssl-dir=[whatever] --with-rpath=-Wl,-rpath, This trips me up a lot. On Fri, Sep 8, 2023 at 2:23?AM Gordon Steemson <gsteemso at gmail.com> wrote: > Hello all, > > On 06/09/2023, Darren
2013 Sep 10
0
[Bug 1647] Implement FIPS 186-3 for DSA keys
<bugzilla-daemon at mindrot.org> writes: > https://bugzilla.mindrot.org/show_bug.cgi?id=1647 > > mackyle at gmail.com changed: > > What |Removed |Added > ---------------------------------------------------------------------------- > CC| |mackyle at gmail.com > > --- Comment #2 from
2011 Jun 30
2
Limit SSH access for users from defined source address
Hi all, let me describe my environment and problem. System is RHEL 5.6 with latest stable OpenSSH. In sshd_config is defined "AllowGroups sshusers" but I need limitation to some of users in group to have access only from defined IP address. As I know this can be setup in sshd_config only for AllowUsers, but users in group are changed so I must use allowgroups instead of allowusers.
2014 Sep 04
1
Fwd: making the passphrase prompt more clear
This got me thinking, shouldn't this go through PAM so that password strength restrictions can be set as well? Obviously most ssh keys are created locally. But, if this were implemented, I think most distros would adopt the same strength criteria on this as they do with passwd and the like. ---------- Forwarded message ---------- From: Daniel Kahn Gillmor <dkg at fifthhorseman.net>
2017 Nov 02
2
Is it good for agent forwarding to creates socket in /tmp/
Hi Alexander Wuerstlein Thank for the information. Now I agree that it's better to save the socket in /tmp/ I checked the source code and found that it is hard-coded. /* Allocate a buffer for the socket name, and format the name. */ auth_sock_dir = xstrdup("/tmp/ssh-XXXXXXXXXX"); It would be nice if openssh provides an option to overwrite this default. Regards Tran
2012 Feb 10
1
openssh client on Windows 7 key auth issue
Dear All, could anybody be so kind and explain me such situation: I set up OpenSSH client on Windows 7. Then I generated keys pair by 'ssh-keygen -t dsa' and with empty (no) passphrase. Then I inserted appropriate info into authorized_keys file on my Unix host. But when I try to connect to my Unix host 'ssh' asks for passphrase for 'id_dsa' and than wants to authenticate
2019 Feb 20
2
[Bug 2971] New: Prevent OpenSSH from advertising its version number
Also, a lot of measurement/research on deployment of OpenSSH rely on version advertising for their statistics. It's going to be harder to know impact of deprecation of certain legacy features without statistics. I also agree with Mark here. On Wed, Feb 20, 2019 at 10:57 AM Mark D. Baushke <mdb at juniper.net> wrote: > Nagesh writes: > > > Cyber security team has
2017 Apr 07
2
Any interest in a patch for setting the syslog facility for the ssh client?
To revive this thread - I filed a bug in bugzilla.mindrot.org ( Bug 2705 - https://bugzilla.mindrot.org/show_bug.cgi?id=2705 ). I have a patch attached to the email that implements this as well. I wasn't able to find a list of coding standards or contribution guidelines for OpenSSH, so please correct me if I'm wrong. I'd also like to thank Jakuje for helping me out with some info on
2020 Oct 30
1
Where to find OpenSSH patch for CVE-2020-14145
On 10/30/20 4:51 PM, Pawel Winogrodzki wrote: > Hello, > > We are currently trying to apply a patch to our 8.0p1 version of OpenSSH for CVE-2020-14145<https://nvd.nist.gov/vuln/detail/CVE-2020-14145>. The "patch" tag from NIST's web page links to the 8.3p1 vs 8.4p1 comparison<https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1> on GitHub. Is
2023 Aug 02
1
"Subsystem 'sftp' already defined" error in openssh-9 when using Include
Am Mi., 2. Aug. 2023 um 23:27 Uhr schrieb Artem Russakovskii <archon810 at gmail.com>: > For the last several releases (perhaps with the release of openssh 9?), > upgrading each version of openssh started wiping the current sshd_config > and replacing it with the default config, at least on OpenSUSE 15.4 via > zypper/yast. Where do you get your sshd from? The default
2015 May 21
2
[PATCH] build: ssh-agent: condition util.h include
Signed-off-by: Alon Bar-Lev <alon.barlev at gmail.com> --- ssh-agent.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/ssh-agent.c b/ssh-agent.c index 9e2a37f..415a5ea 100644 --- a/ssh-agent.c +++ b/ssh-agent.c @@ -68,7 +68,9 @@ #include <time.h> #include <string.h> #include <unistd.h> +#ifdef HAVE_UTIL_H #include <util.h> +#endif #include
2003 Apr 30
2
Portable OpenSSH 3.6.1p2
OpenSSH 3.6.1p2 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. This is a release of the Portable version only. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. We would like to thank the OpenSSH community for their continued support and encouragement. Changes
2003 Apr 30
2
Portable OpenSSH 3.6.1p2
OpenSSH 3.6.1p2 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly. This is a release of the Portable version only. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. We would like to thank the OpenSSH community for their continued support and encouragement. Changes
2018 Aug 27
2
sshd 7.8p1 close connection from VMware Fusion NAT Port Forwarding
On 2018-08-27, Stuart Henderson <stu at spacehopper.org> wrote: > On 2018-08-27, Zach Cheung <kuroro.zhang at gmail.com> wrote: >> After upgrading my VMware Fusion (10.1.3) Arch Guest to the latest with >> OpenSSH upgraded from 7.7p1 to 7.8p1, found that ssh from macOS Sierra >> (10.12.6) host to Arch guest via local NAT port forwarding failed, but via >>
2010 Apr 18
4
OpenSSH with "resumable" functionality
Dear All: I was wondering if it might at all be possible to have the following functionality in OpenSSH: (i) upon "timeout" of connection (say 2-5 seconds) disconnect (ii) keep trying to reconnect (iii) upon reconnection, resume session exactly where started I realize GNU screen solves (iii), although I am interested in a slightly different purpose (nxssh vs openssh). However, I am
2016 Jan 25
2
Version of SFTP
The link http://www.greenend.org.uk/rjk/sftp/sftpversions.html On Mon, Jan 25, 2016 at 11:07 AM, Maria Shalet <mshalet at gmail.com> wrote: > Dear Developers, > In the Open SSH package, we have only V3 of sftp. Here the > mode of transfer is only binary. > > According to the below link I find there are later versions > of the SFTP protocol that
2002 May 23
1
SCO Unix
I am trying to find ssh_os504.tar.Z for SCO Unix version 5.0.4 This was originally part of the OpenSsh 2.2.0p1 package compiled for different SCO's OSes. Please advise if there is an archive version or where I might get obtain this. Thank you, Ed Hilovsky
2018 Apr 09
2
OpenSSH-Client without reverse tunnel ability
Am 05.04.2018 um 14:11 schrieb Alexander Wuerstlein: > On 2018-04-05T14:07, Nico Kadel-Garcia <nkadel at gmail.com> wrote: >> How difficult would it be to leave a scheduled security check to >> look for "ssh[ \t].*-R.*" expressions with "pgrep", and file a >> security abuse report if such processes are seen? It could be >> worked around, but