Displaying 20 results from an estimated 30000 matches similar to: "[Bug 1555] add attribute extensions to sftp-server"
2023 Jan 16
0
[Bug 1555] add attribute extensions to sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1555
Steven Xu <stevenxxiu at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |stevenxxiu at gmail.com
--- Comment #11 from Steven Xu <stevenxxiu at gmail.com> ---
Coming here from
2014 Apr 09
0
[Bug 1555] add attribute extensions to sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1555
--- Comment #10 from Bert Haverkamp <bert at bertenselena.net> ---
IMO, this bug should be closed as resolved, as the patch was included
in version 5.7, right? Who is to do this?
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
2009 Feb 13
13
[Bug 1555] New: add hard link and attribute extensions to sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1555
Summary: add hard link and attribute extensions to sftp-server
Product: Portable OpenSSH
Version: 5.1p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: sftp-server
AssignedTo: unassigned-bugs at mindrot.org
2006 Aug 17
0
[RFC] proposed extensions for SFTP
I'd like to propose the following extensions to the SFTP protocol.
- statvfs operation
- atomic rename (just plain POSIX rename() without the existence check)
These are the most requested features in SSHFS, which need support in
sftp-server too.
They could be added to the current protocol with the SSH_FXP_EXTENDED
message type.
Here's a patch implementing the statvfs operation. It
2018 Feb 06
1
gdistance::shortestPath throws error "not a symmetric matrix"
Hi,
Calling
gdistance::shortestPath
gives me the error
Error in asMethod(object) :
not a symmetric matrix; consider forceSymmetric() or symmpart()
The output of dput(.traceback()) is
pairlist("stop(\"not a symmetric matrix; consider forceSymmetric() or symmpart()\")",
"asMethod(object)",
"as(Laplacian,\"symmetricMatrix\")",
2011 Dec 09
0
Proposal for SFTP extension to include user name and group name in file attributes
Hello,
I've gathered from searching Bugzilla[1][2] that a patch to update
OpenSSH's SFTP implementation to support version 4 or above of the
protocol is unlikely to be accepted.
However, I find myself wishing for the name-based owner and group
handling specified in version 4 of the spec[3]. As a possible
compromise, if I submitted a patch to add an OpenSSH-specific extension
to return
2009 Sep 20
1
Hardlink patches for sftp
Dear all,
I am looking for the status on the hardlink patches that were
published on this list last february by Miklos Szeredi?
I'd really like to have hardlink support in sftp. This would in turn
enable hardlinks in sshfs and make incremental rsync backups to remote
filesystems possible.
can someone tell me if these patches will be incorporated in openssh?
The patches can be found under
2009 Feb 12
2
[patch] hard link protocol extension for sftp
Here's a patch that adds support for the creation of hard links over
SFTP.
Hard links are not used very often nowdays, but they do still have
their uses and this is currently the most often requested improvement
for SSHFS.
To detect hard links the st_nlink, st_dev and st_ino attributes are
usually used. I'll also post patches adding extensions for these and
other attributes.
Please
2005 Aug 27
0
unhandled exception on 20050725 install from source on Fedora Core 4
I'm running FC4 with all the latest patches and kernel. I checked the basic
requirements for installation for all necessary packages.
Using the unpacked source, I installed by ./tools/wineinstall per the
readme. I got a long series of errors well into the process, posted below -
I've read the documentation and several help sites including this group and
the user list but can't seem to
2010 Dec 09
3
[Bug 1844] New: Explicit file permissions enhancement to sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1844
Summary: Explicit file permissions enhancement to sftp-server
Product: Portable OpenSSH
Version: 5.6p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: sftp-server
AssignedTo: unassigned-bugs at mindrot.org
2017 Feb 10
4
Disabling specific commands in sftp
Hi,
On CentOS 7 I?m trying to set up a chrooted SFTP server on which specific users can only read and write on specific folder. And I?d like to disable some commands, so the users can only do ?cd?, ?ls?, ?get? and ?put? (and disabling ?chgrp?, ?chmod?, ?chown?, ?df? etc ?). Is there a way to achieve it, natively or with using a third-party software ?
Alexandre MALDEME
Analyste d'exploitation
2014 Sep 29
0
[PATCH 1/7] fb/gddr3: Generate MR values
Signed-off-by: Roy Spliet <rspliet at eclipso.eu>
---
drivers/gpu/drm/nouveau/Makefile | 1 +
drivers/gpu/drm/nouveau/core/subdev/fb/gddr3.c | 117 +++++++++++++++++++++++++
drivers/gpu/drm/nouveau/core/subdev/fb/priv.h | 1 +
3 files changed, 119 insertions(+)
create mode 100644 drivers/gpu/drm/nouveau/core/subdev/fb/gddr3.c
diff --git
2010 Jun 18
0
OpenSSH - SFTP issue
Hello,
We are having issue with SFTP for Windows server. The OpenSSH reports
the "Exit Staus -1" upon exiting the sftp session ( Though the file is
successfully getting transferred!!). I have opened ticket with VanDyke
Software - vShell and reported this issue. Accordiong to VanDyke
Software, there is no issue with vShell configuration / its debug logs.
Would you
2003 Aug 04
1
hclust() and agnes() method="average" divergence (PR#3648)
This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.
------_=_NextPart_000_01C35A53.75780090
Content-Type: text/plain;
charset="iso-8859-1"
Anyone have a clue why hclust() and agnes() produce different results in the
example below when both use method="average"?? I'm not able to reproduce
2014 Sep 05
0
[PATCH] fb/sddr2: Generate MR values
V2: Always disable DLL reset
Signed-off-by: Roy Spliet <rspliet at eclipso.eu>
---
drivers/gpu/drm/nouveau/Makefile | 1 +
drivers/gpu/drm/nouveau/core/subdev/fb/priv.h | 1 +
drivers/gpu/drm/nouveau/core/subdev/fb/sddr2.c | 96 ++++++++++++++++++++++++++
3 files changed, 98 insertions(+)
create mode 100644 drivers/gpu/drm/nouveau/core/subdev/fb/sddr2.c
diff --git
2006 Aug 19
0
[PATCH] add atomic rename extension to sftp-server
This is needed to be able to support a rename() operation conforming
to POSIX in the SSH filesystem.
With the rename operation defined in the SFTP spec, this is
impossible, since in case the target exists it's not possible to
perform the rename+unlink atomically.
Miklos
Index: ssh/sftp-server.c
===================================================================
--- ssh.orig/sftp-server.c
2006 Aug 19
0
[PATCH] add statfs extension to sftp-server
This is needed to be able to support statfs operation on an SSH
filesystem (http://fuse.sourceforge.net/sshfs.html).
It uses and sends only those fields of struct statfs which are common
with struct statvfs as defined by POSIX, and which are shared among
most UNIX-like systems.
The SSH_FXP_EXTENDED message type is used, so this change is backward
compatible and conforms to the protocol
2007 Dec 07
2
[PATCH] add statfs extension to sftp-server
And while we are at it, can you please comment on these patches as
well, originally submitted around one year ago.
Oh, and I think we can agree, that the secsh-filexfer standardization
is dead, so there's not much point in trying to support newer protocol
versions, which don't have statfs anyway.
Thanks,
Miklos
-----
This is needed to be able to support statfs operation on an SSH
2009 May 18
6
[Bug 1599] New: "ForceCommand internal-sftp" not working as expected
https://bugzilla.mindrot.org/show_bug.cgi?id=1599
Summary: "ForceCommand internal-sftp" not working as expected
Product: Portable OpenSSH
Version: 5.2p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
2002 Jul 19
0
sftp / scp extension
We have a need to allow for encrypted file transfers around the
internet, but do not wish to expose our systems completely.
What
we would like to see is either an extension to the scp / sftp code to use an
sftp_config or scp_config type file that places restrictions on
directory movement, upload locations, download locations,
etc...
Essentially run the sftp-server or scp code within a