Displaying 20 results from an estimated 3000 matches similar to: "[Bug 2218] New: ProxyCommand as both a resolver and connector"
2014 Mar 23
1
ProxyCommand as both a resolver and connector
I see that the hostname canonicalization configuration options is still
rather limited. As that works on DNS level they are of not use if one has
to use ProxyCommand to connect over a proxy connection or through a common
gateway name where one uses different port numbers to connect to different
intranet names.
What would be ideal is to extend the ProxyCommand to both return the
resolved universal
2017 Nov 10
3
ProxyCommand that creates identity file
Hi there,
I'm working on a project to write a ProxyCommand that reaches out to an SSH
CA to receive an SSH certificate prior to the connection. The ProxyCommand
also creates a tunnel to the upstream SSH server.
When using ProxyCommand alone, the issue is that the identity files are
loaded as soon as SSH has fork/exec'd the process. It does not wait for a
valid server negotiation.
I
2013 Jun 20
1
ProxyCommand that returns a socket
Hello,
My usage of ProxyCommand just calls the nc utility with various
parameters. That in turn after the initial setup just copies copies
the data from the network socket to stdin/stdout. This useless coping
can be avoided if ssh has an option to receive the socket from the
proxy command. I suppose it can improve network error reporting as ssh
would talk directly to the network socket rather
2014 Jan 30
0
Announce: OpenSSH 6.5 released
Changes since OpenSSH 6.4
=========================
This is a feature-focused release.
New features:
* ssh(1), sshd(8): Add support for key exchange using elliptic-curve
Diffie Hellman in Daniel Bernstein's Curve25519. This key exchange
method is the default when both the client and server support it.
* ssh(1), sshd(8): Add support for Ed25519 as a public key type.
Ed25519 is a
2015 Sep 10
1
[Bug 2462] New: Option to try connectiing to multiple DNS names
https://bugzilla.mindrot.org/show_bug.cgi?id=2462
Bug ID: 2462
Summary: Option to try connectiing to multiple DNS names
Product: Portable OpenSSH
Version: 6.9p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee: unassigned-bugs at
2017 Nov 03
2
ControlPath versus ProxyCommand
TL;DR: I expect ProxyCommand to have effect in preference to ControlPath.
I've just tripped over this one. I have an ssh Host (let us call it "MAIN")
with a ControlPath and with ControlMaster=no, from the .ssh/config file.
I also have a shell script whose purpose is to hop to a remote host through a
port forward, which uses the ProxyCommand option like this:
ProxyCommand ssh
2014 Jan 30
1
Announce: OpenSSH 6.5 released
Changes since OpenSSH 6.4
=========================
This is a feature-focused release.
New features:
* ssh(1), sshd(8): Add support for key exchange using elliptic-curve
Diffie Hellman in Daniel Bernstein's Curve25519. This key exchange
method is the default when both the client and server support it.
* ssh(1), sshd(8): Add support for Ed25519 as a public key type.
Ed25519 is a
2017 Nov 03
2
ControlPath versus ProxyCommand
On 03Nov2017 13:07, Damien Miller <djm at mindrot.org> wrote:
>On Fri, 3 Nov 2017, Cameron Simpson wrote:
>> TL;DR: I expect ProxyCommand to have effect in preference to
>> ControlPath.
[...]
>> On reflection, of course these are distinct options and that side of
>> things isn't, of itself, a bug. However, is there a sane use case for
>> using
2002 Sep 26
1
Question regarding patch for ProxyCommand setting
Hi!
I recently started using ProxyCommand and noticed that it's not
possible to specify a "none" value for it. I've already written a
patch for that, but wanted to discuss the issue before posting the
patch.
The problem is the following: I'd like to use a ProxyCommand by
default, but exclude some hosts. But as soon as I have
Host *
ProxyCommand /some/proxy/command %h %p
2010 Nov 08
1
How to explicitly define the default setting for ProxyCommand for a particular host
I would like to create an ssh_config file with two basic groups of settings:
A default "Host *" settings group with:
Proxycommand=/my/helper/binary
%h %p
And another specific "Host specialServer" settings group with
ProxyCommand=
or
ProxyCommand=''
And yes, my current ssh_config file is setup in the correct order with the "Host *" declaration last.
Host
2020 Jun 01
2
[Bug 3175] New: ssh_config(5) - ProxyCommand should explain semantics
https://bugzilla.mindrot.org/show_bug.cgi?id=3175
Bug ID: 3175
Summary: ssh_config(5) - ProxyCommand should explain semantics
Product: Portable OpenSSH
Version: 8.3p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee:
2017 Apr 07
2
[Bug 2706] New: remote code execution via ProxyCommand+browser exploit
https://bugzilla.mindrot.org/show_bug.cgi?id=2706
Bug ID: 2706
Summary: remote code execution via ProxyCommand+browser exploit
Product: Portable OpenSSH
Version: 7.4p1
Hardware: All
OS: Mac OS X
Status: NEW
Severity: security
Priority: P5
Component: ssh
Assignee:
2009 Sep 11
1
ProxyCommand not working if $SHELL not defined
#ssh -V
OpenSSH_5.1p1, OpenSSL 0.9.8i 15 Sep 2008
Probably is not a real issue, because everyone should have its SHELL var
defined,
but as said above, when it's not, ssh with ProxyCommand will fail.
I use connect.c, but with no SHELL var defined is not executed, ssh -v
will give "No such file", and I'm pretty sure it refers to the shell,
I read in ChangeLog that now ProxyCommand
2005 Nov 11
2
[Bug 1118] Annoying "Killed by signal 1" message with ProxyCommand
http://bugzilla.mindrot.org/show_bug.cgi?id=1118
Summary: Annoying "Killed by signal 1" message with ProxyCommand
Product: Portable OpenSSH
Version: 4.2p1
Platform: Other
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: bitbucket at mindrot.org
2004 May 12
1
ssh-keyscan not using ProxyCommand?
I have a network without a network connection to other networks. But
a socks server is dual homed between it and other networks. I can use
socks to ssh to other networks. I use ProxyCommand with the socks
aware connect.c program to connect out. All works great.
I discovered while trying to use the ssh-keyscan program that it does
not use the ProxyCommand configuration. At least in my testing
2008 Aug 13
0
ProxyCommand and ExitOnForwardFailure = leftover process
Hi,
I'm having a small problem when using ProxyCommand and
ExitOnForwardFailure in combination with OpenSSH 5.1 under Ubuntu
8.04.
In order to enable multihop scp and port forwarding, I have enabled
automatic public key authenticated tunneling from hostA to hostC via
hostB using ProxyCommand in my private .ssh/config file on hostA.
<end of .ssh/config>:
host hostB
user X
hostC
2002 Nov 11
0
[Bug 433] New: Allow "ProxyCommand none" in ssh_config
http://bugzilla.mindrot.org/show_bug.cgi?id=433
Summary: Allow "ProxyCommand none" in ssh_config
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: minor
Priority: P2
Component: Miscellaneous
AssignedTo: openssh-unix-dev at mindrot.org
2003 May 20
1
[Bug 572] No Effect "ProxyCommand none" in ssh_config
http://bugzilla.mindrot.org/show_bug.cgi?id=572
Summary: No Effect "ProxyCommand none" in ssh_config
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: trivial
Priority: P2
Component: ssh
AssignedTo: openssh-bugs at mindrot.org
2003 Jul 12
0
[Bug 616] proxycommand breaks hostbased authentication.
http://bugzilla.mindrot.org/show_bug.cgi?id=616
Summary: proxycommand breaks hostbased authentication.
Product: Portable OpenSSH
Version: 3.6.1p2
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: openssh-bugs at mindrot.org
ReportedBy: stuart
2013 Aug 28
3
[Bug 2145] New: ssh-keygen -R doesn't work when there are entries for "proxycommand" keys
https://bugzilla.mindrot.org/show_bug.cgi?id=2145
Bug ID: 2145
Summary: ssh-keygen -R doesn't work when there are entries for
"proxycommand" keys
Product: Portable OpenSSH
Version: 6.2p1
Hardware: Other
OS: Linux
Status: NEW
Severity: trivial
Priority: P5