Displaying 20 results from an estimated 300000 matches similar to: "subsribe"
2018 Aug 29
2
OpenSSH 7.8p1 drops SSH connection with "Broken Pipe" IMMEDIATELY after successful login
Yes, thank you!
Now with the "Host *" line it works.
Thanks again.
Sent from BlueMail<http://www.bluemail.me/r?b=13569>
On Aug 29, 2018, at 08:15, Zach Cheung <kuroro.zhang at gmail.com<mailto:kuroro.zhang at gmail.com>> wrote:
Sorry, your problem is related to ssh client not sshd, try to add following config to /etc/ssh/ssh_config or ~/.ssh/config:
Host *
IPQoS
2013 Nov 25
2
Last http://hg.mindrot.org/openssh commit is from 2013-06-11
Hello,
well it''s
| Rev: || 11096:745a39c852ab tip 11094:e34042dabbd8
| Auth: dtucker
| Date: Tue, 11 Jun 2013 02:10:02 +0000
- (dtucker) [myproposal.h] Make the conditional algorithm support consistent
and add some comments so it''s clear what goes where.
Note it was still advertised in the 6.3 release notes.
Has it been replaced by a git(1) repository? :-))
2024 Jun 11
1
kerberos default_ccache_name with sssd
Thank you both for the replies and explanation!
@douglas
Can i set?KRB5CCNAME somewhere so that it uses /home? Where?
But even if i could set the env variable i have this odd behavior:
I now have 4 vms running.
2 are rocky8 and 2 are rocky9, with same settings and versions I stated on my first post.
From the 4 vms, when I ssh into them, 2 of them set a cache file in the users home and the
2023 Sep 08
1
Two big flaws in the `configure` script -- have located them, cannot fix
When you ran the configure script what options did you use?
If you are using --with-ssl-dir=[whatever] you usually need to append
"--with-rpath=-Wl,-rpath," so you get
./configure --with-ssl-dir=[whatever] --with-rpath=-Wl,-rpath,
This trips me up a lot.
On Fri, Sep 8, 2023 at 2:23?AM Gordon Steemson <gsteemso at gmail.com> wrote:
> Hello all,
>
> On 06/09/2023, Darren
2013 Sep 10
0
[Bug 1647] Implement FIPS 186-3 for DSA keys
<bugzilla-daemon at mindrot.org> writes:
> https://bugzilla.mindrot.org/show_bug.cgi?id=1647
>
> mackyle at gmail.com changed:
>
> What |Removed |Added
> ----------------------------------------------------------------------------
> CC| |mackyle at gmail.com
>
> --- Comment #2 from
2011 Jun 30
2
Limit SSH access for users from defined source address
Hi all,
let me describe my environment and problem.
System is RHEL 5.6 with latest stable OpenSSH.
In sshd_config is defined "AllowGroups sshusers" but I need limitation
to some of users in group to have access only from defined IP address.
As I know this can be setup in sshd_config only for AllowUsers, but
users in group are changed so I must use allowgroups instead of
allowusers.
2024 Nov 12
3
[PATCH 0/2] Specify signature algorithm during server hostkeys prove
From: Maxime Rey <maximejeanrey at gmail.com>
Hello,
I've discovered an issue with sshd when it's configured to use the SSH agent
alongside multiple host keys. Specifically, this problem happens during the
hostkeys-prove-00 at openssh.com request, when the server attempts to
demonstrate ownership of the host keys by calling the agent.
The issue occurs because, while processing the
2014 Sep 04
1
Fwd: making the passphrase prompt more clear
This got me thinking, shouldn't this go through PAM so that password
strength restrictions can be set as well? Obviously most ssh keys are
created locally. But, if this were implemented, I think most distros
would adopt the same strength criteria on this as they do with passwd
and the like.
---------- Forwarded message ----------
From: Daniel Kahn Gillmor <dkg at fifthhorseman.net>
2024 Jun 12
1
kerberos default_ccache_name with sssd
Just to show what i mean when i ssh into my vms, 2 vms save the cache in /tmp and the other 2 in /home. See what happens when i run the loop below:
> for i in rocky8client rocky9client rocky9server rocky8server; do /usr/bin/sshpass -p password /usr/bin/ssh -l jdoe $i "hostname; klist"; done
rocky8client.domain.net
Ticket cache: FILE:/tmp/krb5cc_2000_WP04h8h0sa
Default
2024 Jun 11
1
kerberos default_ccache_name with sssd
On 6/6/2024 8:26 AM, Dave Macias wrote:
> *I wanted to see if I could make the cache file user-specific, instead of
> the default location (/tmp/krb5cc-blabla).*
SSH is creating a separate ticket cache file for each login session and owned by the user.
This has been the preferred way to do this for decades.
https://kerberos.mit.narkive.com/YJB4Hshz/krb5ccname-and-sshd
Your: "Ticket
2024 Jun 13
1
kerberos default_ccache_name with sssd
I have not looked at Kerberos is years. But it looks like KRB5CCNAME comes from:
https://github.com/openssh/openssh-portable/blob/master/gss-serv-krb5.c#L134-L197
But it depends on which version of Kerberos you have, and if you are also use PAM.
Google for: heimdal kerberos cache name
It looks like there is now a SSSD Kerberos Cache Manager rather then storing in individual file.
On 6/11/2024
2017 Nov 02
2
Is it good for agent forwarding to creates socket in /tmp/
Hi Alexander Wuerstlein
Thank for the information.
Now I agree that it's better to save the socket in /tmp/
I checked the source code and found that it is hard-coded.
/* Allocate a buffer for the socket name, and format the name. */
auth_sock_dir = xstrdup("/tmp/ssh-XXXXXXXXXX");
It would be nice if openssh provides an option to overwrite this default.
Regards
Tran
2012 Feb 10
1
openssh client on Windows 7 key auth issue
Dear All,
could anybody be so kind and explain me such situation:
I set up OpenSSH client on Windows 7.
Then I generated keys pair by 'ssh-keygen -t dsa' and with empty (no)
passphrase.
Then I inserted appropriate info into authorized_keys file on my Unix host.
But when I try to connect to my Unix host 'ssh' asks for passphrase
for 'id_dsa' and than wants to authenticate
2019 Feb 20
2
[Bug 2971] New: Prevent OpenSSH from advertising its version number
Also, a lot of measurement/research on deployment of OpenSSH rely on
version advertising for their statistics. It's going to be harder to know
impact of deprecation of certain legacy features without statistics.
I also agree with Mark here.
On Wed, Feb 20, 2019 at 10:57 AM Mark D. Baushke <mdb at juniper.net> wrote:
> Nagesh writes:
>
> > Cyber security team has
2017 Apr 07
2
Any interest in a patch for setting the syslog facility for the ssh client?
To revive this thread - I filed a bug in bugzilla.mindrot.org ( Bug 2705 -
https://bugzilla.mindrot.org/show_bug.cgi?id=2705 ).
I have a patch attached to the email that implements this as well. I wasn't
able to find a list of coding standards or contribution guidelines for
OpenSSH, so please correct me if I'm wrong. I'd also like to thank Jakuje
for helping me out with some info on
2020 Oct 30
1
Where to find OpenSSH patch for CVE-2020-14145
On 10/30/20 4:51 PM, Pawel Winogrodzki wrote:
> Hello,
>
> We are currently trying to apply a patch to our 8.0p1 version of OpenSSH for CVE-2020-14145<https://nvd.nist.gov/vuln/detail/CVE-2020-14145>. The "patch" tag from NIST's web page links to the 8.3p1 vs 8.4p1 comparison<https://github.com/openssh/openssh-portable/compare/V_8_3_P1...V_8_4_P1> on GitHub. Is
2023 Aug 02
1
"Subsystem 'sftp' already defined" error in openssh-9 when using Include
Am Mi., 2. Aug. 2023 um 23:27 Uhr schrieb Artem Russakovskii
<archon810 at gmail.com>:
> For the last several releases (perhaps with the release of openssh 9?),
> upgrading each version of openssh started wiping the current sshd_config
> and replacing it with the default config, at least on OpenSUSE 15.4 via
> zypper/yast.
Where do you get your sshd from? The default
2015 May 21
2
[PATCH] build: ssh-agent: condition util.h include
Signed-off-by: Alon Bar-Lev <alon.barlev at gmail.com>
---
ssh-agent.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/ssh-agent.c b/ssh-agent.c
index 9e2a37f..415a5ea 100644
--- a/ssh-agent.c
+++ b/ssh-agent.c
@@ -68,7 +68,9 @@
#include <time.h>
#include <string.h>
#include <unistd.h>
+#ifdef HAVE_UTIL_H
#include <util.h>
+#endif
#include
2003 Apr 30
2
Portable OpenSSH 3.6.1p2
OpenSSH 3.6.1p2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly. This is a release
of the Portable version only.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support and encouragement.
Changes
2003 Apr 30
2
Portable OpenSSH 3.6.1p2
OpenSSH 3.6.1p2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly. This is a release
of the Portable version only.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support and encouragement.
Changes