Displaying 20 results from an estimated 20000 matches similar to: "[Bug 1975] Support for Match configuration directive to also include subsystems"
2020 Aug 31
2
[Bug 3207] New: Match blocks ignored in files processed by Include
https://bugzilla.mindrot.org/show_bug.cgi?id=3207
Bug ID: 3207
Summary: Match blocks ignored in files processed by Include
Product: Portable OpenSSH
Version: 8.3p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2015 Aug 02
2
Chrooted SFTP-only users along with normal SFTP
Hi!
I want to set a OpenSSH server which restricts some users to only
chrooted SFTP, while others have full/normal ssh, scp and sftp access.
Most or all guides on the web say that I should enable the config line
"Subsytem sftp internal-sftp" among other things, but I've found out
that this only causes non-restricted users to not be able use SFTP at
all, only the chrooted users.
2014 Jun 06
1
Patch: Ciphers, MACs and KexAlgorithms on Match
Hi all,
this is a patch to make Ciphers, MACs and KexAlgorithms available in
Match blocks. Now I can reach a -current machine with some Android
terminal app without changing the default ciphers for all clients:
Match Address 192.168.1.2
Ciphers aes128-cbc
MACs hmac-sha1
KexAlgorithms diffie-hellman-group-exchange-sha1
Index: servconf.c
2011 Feb 20
1
initlog is deprecated
Hello Centos,
I am getting an error that I am not familiar with when I restart ssh.
[root at virtcent01:~] #service sshd restart
Stopping sshd: [ OK ]
Starting sshd:WARNING: initlog is deprecated and will be removed in a
future release
[ OK ]
[root at virtcent01:~] #
I was just
2016 Jun 29
3
SSH Closes Immediately After Opening
Hello there,
I am having trouble connecting to a ssh server installed with openssh
recently. I have posted about the problem on Superuser, and I will repost a
description of the issue below. If anyone here is able to rescue me from my
deep well of ignorance, I will be very grateful.
http://superuser.com/questions/1094734/ssh-automatically-disconnects-after-login
I'm trying to set up an ssh
2010 Jul 14
1
SFTP Chroot
HI:
I tried to deploy a SFTP server with chroot but when i tried to connnect the
client send the next error:
Write failed: Broken pipe
Couldn't read packet: Connection reset by peer
The sshd_conf file is the next:
-------------------------------------------------------------------
# Package generated configuration file
# See the sshd_config(5) manpage for details
# What ports, IPs and
2015 Sep 15
0
rsyslog for chrooted sftp users has stopped working -- Centos 6.6
And no sooner do I send the email than I spot the problem. Oops! Sorry
about that.
The sshd_config needed to contain a different internal-sftp line:
Match User test-sftp-only
ChrootDirectory /home/sftp/mcsosftp
ForceCommand internal-sftp -f AUTHPRIV -l INFO
PasswordAuthentication no
AuthorizedKeysCommand /usr/local/bin/get_sftp_key
That's gotten
2008 Apr 03
1
Omission in sshd_config man page
[Not subscribed to this list, so please respond directly if you need to speak to me]
In man5/sshd_config.5, a permissible keyword in a 'Match' block is missing. It currently lists only:
AllowTcpForwarding, Banner, ForceCommand, GatewayPorts, GSSApiAuthentication, KbdInteractiveAuthentication, KerberosAuthentication, PasswordAuthentication, PermitOpen, PermitRootLogin,
2009 Oct 29
1
Match vs. ChallengeResponseAuthentication?
Hello,
We'd like to allow passwords only from the local network, and allow public key auth from on-campus or off-campus. The server runs SuSE Linux, and we might do the same on RHEL/CentOS & Mac OS X if we can get it to work.
Unfortunately, Match allows PasswordAuthentication but not ChallengeResponseAuthentication. Is there any reason ChallengeResponseAuthentication cannot be
2019 Dec 29
2
securing a hop
for the A nat B C connect back to A using -R 2222:localhost:22 pattern,
(see diagram at https://github.com/daradib/sidedoor)
I want to limit B's user to just what is needed to do the port forward.
I am hoping this is documented, but I can't find much more than "you should
future out how to secre it."
I setup an ansible playbook to instal and configure sidedoor on A. I have
2010 Apr 09
0
[Bug 1169] Enhancement request to support subnet configurations for Host configuration directive
https://bugzilla.mindrot.org/show_bug.cgi?id=1169
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |djm at mindrot.org
--- Comment #1 from Damien Miller <djm at mindrot.org> 2010-04-09 15:02:32 EST ---
I'd
2020 Sep 26
2
Debian client/workstation pam_mount
Without trying your suggestions, I know that a domain user cannot login via
ssh.
Neither of these work:
> [bob at dn-pc ~]$ ssh tuser16 at 192.168.16.220
> tuser16 at 192.168.16.220's password:
> Permission denied, please try again.
> tuser16 at 192.168.16.220's password:
> Permission denied, please try again.
> tuser16 at 192.168.16.220's password:
> tuser16 at
2010 Aug 27
0
[Bug 1169] Enhancement request to support subnet configurations for Host configuration directive
https://bugzilla.mindrot.org/show_bug.cgi?id=1169
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks| |1803
--- Comment #2 from Damien Miller <djm at mindrot.org> ---
This might well turn out to be too confusing
2011 Sep 06
2
[Bug 1169] Enhancement request to support subnet configurations for Host configuration directive
https://bugzilla.mindrot.org/show_bug.cgi?id=1169
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks| |1930
--- Comment #3 from Damien Miller <djm at mindrot.org> 2011-09-06 10:34:08 EST ---
Retarget unresolved
2013 Jul 25
1
[Bug 1169] Enhancement request to support subnet configurations for Host configuration directive
https://bugzilla.mindrot.org/show_bug.cgi?id=1169
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks| |2130
--- Comment #12 from Damien Miller <djm at mindrot.org> ---
Retarget to openssh-6.4
--
You are
2013 Sep 19
0
[Bug 1169] Enhancement request to support subnet configurations for Host configuration directive
https://bugzilla.mindrot.org/show_bug.cgi?id=1169
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks|2130 |
--- Comment #14 from Damien Miller <djm at mindrot.org> ---
This won't be in the 6.4 release. I'd
2016 Dec 01
0
[Bug 1169] Enhancement request to support subnet configurations for Host configuration directive
https://bugzilla.mindrot.org/show_bug.cgi?id=1169
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |mmendez534 at gmail.com
--- Comment #19 from Damien Miller <djm at mindrot.org> ---
*** Bug 2645 has been
2008 Aug 22
0
Enhance Match Blocks to Test Server Port.
Hi,
We'd like sshd to listen on port 22 with PasswordAuthentication = no and
port 2222 with PasswordAuthentication = yes. At the moment, it seems
the only way to do this is to run two sshds, one per port.
Since Match blocks already allow PasswordAuthentication to be set, if
the Match keyword itself allowed testing of the server port to which the
incoming connection was made then we could do
2016 Aug 03
2
Configure option '--with-ssh1' breaks openssh-7.3p1
On 08/03/16 03:19, Darren Tucker wrote:
>
> Yes. Debugging something on a system you can't interact with is hard
> enough without having information withheld.
>
I'll run again and add the relevant unedited texts as attachments.
There is nothing in /var/log/secure.
Also a diff between the config.h 's without and with --with-ssh1 is
attached.
I have a centos-6.7 under
2023 Apr 03
0
sftp and utmp
On 30.03.23 22:43, Fran?ois Ouellet wrote:
> We need to limit concurrent sftp logins to one per user (because of bad
> client behaviour). Is there any way to achieve this I have overlooked?
What authentication method(s) do your users use?
On our Internet-facing SFTP server, by default (few exceptions), we
accept only pubkey auth and require users to (un)install pubkeys through
us. In