Displaying 20 results from an estimated 10000 matches similar to: "openssh-bugs mailing list archives"
2015 Mar 26
2
FYI: SSH1 now disabled at compile-time by default
No, I just think 15 years or so is more than enough time to have
addressed the issue.
On Thu, Mar 26, 2015 at 14:05:08 -0700, Dan Kaminsky wrote:
> So, this isn't your problem and you don't respect the people's whose
> problem it is.
>
> On Thu, Mar 26, 2015 at 12:43 PM, Iain Morgan <imorgan at nas.nasa.gov> wrote:
>
> > On Thu, Mar 26, 2015 at 11:55:18
2010 Sep 01
2
anoncvs.mindrot.org
Hi,
Is anyone else having problems with anoncvs.mindrot.org? I do a cvs
update on a semi-regular basis and it has been failing for the past few
days.
$ cvs up
Connection closed by 116.66.166.109
cvs [update aborted]: end of file from server (consult above messages if any)
$
It looks like ssh gets to the point of receiving SSH2_MSG_SERVICE_ACCEPT
and then the connection is closed.
I'm
2015 Mar 26
4
FYI: SSH1 now disabled at compile-time by default
On Thu, Mar 26, 2015 at 11:55:18 -0700, Dan Kaminsky wrote:
> You're right. My argument the is the next build of OpenSSH should be
> OpenSSH 7, and the one after that 8, then 9, then 10. No minor releases?
> Sure, go ahead. Deprecate the point,
>
> Do you manage any machines running SSHv1?
>
If by "running" you mean accepting SSH1, of course not. From a
2018 Nov 02
2
[BUG?] sftp is echoing back prompt and commands in batch mode
Thanks, Iain.
I am willing to hear from other users whether anyone else sees this as a
bug before filing it.
--
Vincenzo Romano
Il giorno ven 2 nov 2018, 20:03 Iain Morgan <imorgan at nas.nasa.gov> ha
scritto:
> If you truly intend this as a bug report, you should file it at
> bugzilla.mindrot.org.
>
> On Fri, Nov 02, 2018 at 12:25:22 +0100, Vincenzo Romano wrote:
> >
2014 Nov 05
17
[Bug 2305] New: sshd does not accept @cert-authority when doing host based authentication.
https://bugzilla.mindrot.org/show_bug.cgi?id=2305
Bug ID: 2305
Summary: sshd does not accept @cert-authority when doing host
based authentication.
Product: Portable OpenSSH
Version: 6.5p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component:
2011 Nov 27
3
Server moved
Hi,
The server move was completed over the weekend. Please let me know if
anything is broken.
-d
2013 Jan 14
3
Inconsisten declaration of ssh_aes_ctr_iv()
Hi,
The 20130110 snapshot fails to build against OpenSSL 0.9.8 and 1.0.0
with the following error:
gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wno-pointer-sign -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -fno-builtin-memset -fstack-protector-all -I. -I. -DSSHDIR=\"/tmp/foo/etc\" -D_PATH_SSH_PROGRAM=\"/tmp/foo/bin/ssh\"
2010 Jun 07
3
X509 based certificate authentication in OpenSSH
Hello,
I would like to know whether OpenSSH supports x509 certificate based
authentication.
It looks like OpenSSH has dependency on OpenSSL so does this mean that
OpeSSH also supports x509 certificate based authentication.
If it does support, can you please point me to the necessary
documentation.
Thanks
Naitik
2017 Sep 29
3
Call for testing: OpenSSH 7.6
On Fri, 29 Sep 2017, Iain Morgan wrote:
> Actually, according to OpenBSD's printenv(1) man page, it first appeared
> in 2BSD. The man page on OS X claims it was BSD 3.0. However, it doesn't
> appear to be part of any standard.
>
> Your suggestion ran into the same issue as the original test, but
> escaping the evaluation by the user's shell appears to work:
>
2013 Oct 30
1
Lazy evaluation of exec clause in ssh Match statement
Hello,
At present, if a ssh Match block contains an exec clause, the specified
command is executed regardless of whether any preceding clauses are
true. Thus,
Match host !*.* exec "some_command %h"
...
would always execute some_command regardless of whether the host matches
the preceding pattern. That seems undesirable, particularly as the
user-specified command may do name lookups
2015 Nov 17
2
[PATCH] Skip RSA1 host key when using hostbased auth
Hello,
The following patch avoids a warnign message when using hostbased
authentication as root and protocol v1 support has been disabled. The
case for non-root users has already been addressed, but root follows a
different code path.
--
Iain Morgan
diff --git a/ssh.c b/ssh.c
index cceb36e..e32aa0a 100644
--- a/ssh.c
+++ b/ssh.c
@@ -1242,8 +1242,10 @@ main(int ac, char **av)
2015 Nov 10
3
OpenSSH-7.1p1 fails configure check with LibreSSL-2.2.4
On Mon, Nov 9, 2015 at 5:35 PM, Darren Tucker <dtucker at zip.com.au> wrote:
> On Tue, Nov 10, 2015 at 9:22 AM, Austin English <austinenglish at gmail.com> wrote:
>> Howdy,
>>
>> I'm attempting to compile openssh-7.1p1 using libressl-2.2.4 for the
>> ssl implementation. Unfortunately, this fails to work (tested on
>> Debian Unstable and Gentoo):
2017 Sep 29
2
Call for testing: OpenSSH 7.6
On 29 September 2017 at 11:05, Iain Morgan <imorgan+openssh at nas.nasa.gov> wrote:
[...]
> This is due to my shell being csh, which is pickier about undefined
> variables than the Bourne-style shells. The attached patch fixes the
> issue.
Thanks for figuring this out.
> - 'test -z "$SSH_USER_AUTH"' || fail "SSH_USER_AUTH present"
> +
2018 Nov 02
2
[BUG?] sftp is echoing back prompt and commands in batch mode
Short description: All comands sent to server in batch mode are being
echoed back along with prompt.
Software Version: "OpenSSH_7.9p1, OpenSSL 1.1.1 11 Sep 2018" (as
printed by ssh -V)
Server and client systems: ArchLinux x86_64 fully updated as of 2018-11-02.
## How to reproduce
Provided that you have proper SSH key authentication in place, from
command line run:
echo "dir
2005 Dec 19
2
arcfour test fails on HP-UX 11.23 Itanium
Building OpenSSH 4.2p1 with the hpn11-none patch, HP-UX 11.23 64-bits
ia64, using openssl-0.9.7g compiled from source.
Using gcc 4.0.2 from the HP software depot, compilation is uneventful
(but fast!) once configuration is set up, but
make tests fail with Disconnected messages:
Disconnected: bad packet length ... (varying)
Write failed: Broken pipe
ssh -2 failed with mac hmac-sja1 cipher
2017 Jan 03
2
DEFAULT_PKCS11_WHITELIST on 64-bit Linux systems
On 12/30/2016 02:40 AM, Damien Miller wrote:
> On Wed, 28 Dec 2016, Iain Morgan wrote:
>
>> Hello,
>>
>> On RHEL 6/amd64, the stock value for DEFAULT_PKCS11_WHITELIST is not
>> very useful. On such systems, /usr/lib64/* would need to be added to the
>> pattern list. Although users can specify the -P option every time they
>> launch ssh-agent, it might be
2011 Jan 06
25
Call for testing: OpenSSH-5.7
Hi,
OpenSSH 5.7 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This release contains a
couple of large and intrusive features and changes and quite a number of
bug fixes.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
2015 Mar 26
2
FYI: SSH1 now disabled at compile-time by default
On Thu, Mar 26, 2015 at 10:19:05 -0700, Dan Kaminsky wrote:
> Communication is a two way street. If OpenSSH wants to go down the route
> of single releases, like the browsers did, it can remove its minor numbers,
> like the browsers did.
>
There's no question of "going down the route." This has been the
practice with OpenSSH for many years -- if not from the beginning.
2008 Mar 13
11
Testing wanted: OpenSSH 4.8
Hi,
We are preparing to make the release of OpenSSH 4.8 soon, so we would
greatly appreciate testing of snapshot releases in as many environments
and on as many operating systems as possible.
The highlights of this release are:
* Added chroot(2) support for sshd(8), controlled by a new option
"ChrootDirectory". Please refer to sshd_config(5) for details, and
please use this
2010 Mar 16
9
openssh-5.5p1
Hi,
We will probably do an openssh-5.5p1 release soon, mainly for the
sshd_config:AuthorizedKeysFile bug, but containing a few other small
patches too. If you have any portability fixes that need to go in then