Displaying 20 results from an estimated 30000 matches similar to: "[Bug 934] Traverse-only directories (e.g. chmod 110) break the cd command in sftp"
2004 Dec 06
2
[Bug 934] Traverse-only directories (e.g. chmod 110) break the cd command in sftp
http://bugzilla.mindrot.org/show_bug.cgi?id=934
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Component|sftp-server |sftp
Version|3.6.1p2 |-current
------- Additional Comments From djm at mindrot.org 2004-12-06 17:13
2020 Jul 31
0
[Bug 934] Traverse-only directories (e.g. chmod 110) break the cd command in sftp
https://bugzilla.mindrot.org/show_bug.cgi?id=934
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |djm at mindrot.org
Status|REOPENED |RESOLVED
Resolution|---
2004 Sep 21
1
[Bug 934] Traverse-only directories (e.g. chmod 110) break the cd command in sftp
http://bugzilla.mindrot.org/show_bug.cgi?id=934
Summary: Traverse-only directories (e.g. chmod 110) break the cd
command in sftp
Product: Portable OpenSSH
Version: 3.6.1p2
Platform: PPC
OS/Version: AIX
Status: NEW
Severity: minor
Priority: P2
Component: sftp-server
AssignedTo:
2005 Jan 09
2
[Bug 934] Traverse-only directories (e.g. chmod 110) break the cd command in sftp
http://bugzilla.mindrot.org/show_bug.cgi?id=934
------- Additional Comments From opensshbugzilla at prikryl.cz 2005-01-10 03:38 -------
Hello,
I'm author of the metioned SFTP client (WinSCP).
I have been just experimenting with this issue.
For me realpath does succeed on OpenSSH server on Linux
(shell.sourceforge.net).
With OpenSSH client (sftp) I'm able to enter the
2014 Mar 26
0
[Bug 1902] persistent mux master should chdir away from the current directory
https://bugzilla.mindrot.org/show_bug.cgi?id=1902
Simon Deziel <simon at sdeziel.info> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |simon at sdeziel.info
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are
2014 Mar 26
0
[Bug 974] Record Badlogins for all supported Authentication methods
https://bugzilla.mindrot.org/show_bug.cgi?id=974
Simon Deziel <simon at sdeziel.info> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |simon at sdeziel.info
--
You are receiving this mail because:
You are the assignee for the bug.
2014 Mar 26
0
[Bug 1285] provide fallback options /etc/ssh/ssh_config
https://bugzilla.mindrot.org/show_bug.cgi?id=1285
Simon Deziel <simon at sdeziel.info> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |simon at sdeziel.info
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are
2014 Mar 26
0
[Bug 1608] Reverse DNS support for VerifyHostKeyDNS configuration option
https://bugzilla.mindrot.org/show_bug.cgi?id=1608
Simon Deziel <simon at sdeziel.info> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |simon at sdeziel.info
--
You are receiving this mail because:
You are watching the assignee of the bug.
2014 Mar 26
0
[Bug 1613] Add the ability to store configuration in various configuration files like in a conf-sub-dir
https://bugzilla.mindrot.org/show_bug.cgi?id=1613
Simon Deziel <simon at sdeziel.info> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |simon at sdeziel.info
--
You are receiving this mail because:
You are watching the assignee of the bug.
2014 Mar 26
0
[Bug 1775] RFE: Would like to use 'abstract' unix sockets for ControlPath
https://bugzilla.mindrot.org/show_bug.cgi?id=1775
Simon Deziel <simon at sdeziel.info> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |simon at sdeziel.info
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are
2014 Mar 26
0
[Bug 1654] ~/.ssh/known_hosts.d/*
https://bugzilla.mindrot.org/show_bug.cgi?id=1654
Simon Deziel <simon at sdeziel.info> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |simon at sdeziel.info
--
You are receiving this mail because:
You are watching the assignee of the bug.
2014 Mar 26
0
[Bug 1870] Do not show VisualHostKey unless attached to a terminal
https://bugzilla.mindrot.org/show_bug.cgi?id=1870
Simon Deziel <simon at sdeziel.info> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |simon at sdeziel.info
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are
2007 Apr 24
2
chmod sftp command and setgid/setuid bit
Hi OpenSSH developers,
I'm using OpenSSH on a daily basis and I'm very pleased
with the work you've done.
I am contributing to some Open Source software hosted at Savannah
https://savannah.nongnu.org/projects/tsp
and we recently hit some sftp unexpected behavior:
https://savannah.gnu.org/support/?105838
when using chmod sftp client command
it appears that setuid / setgid bits are
2008 Jun 12
1
[Bug 1310] chmod sftp command and setgid/setuid bit
https://bugzilla.mindrot.org/show_bug.cgi?id=1310
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |djm at mindrot.org
Blocks| |1452
--- Comment #3 from Damien Miller
2015 Nov 26
2
How disable forwarding-only connections (i.e. non-shell/command non-sftp connections)? (Maybe this is a feature request!)
Hi Peter,
What I am looking for is an SSHD configuration where every successfully
authenticated connection also guaranteedly will lead to a ForcedCommand
invocation.
Currently I understand this to be the case only for the connections that
open channel to deliver a terminal, command or SFTP (I don't know if you
have a collective name for such non-forwarding channels).
Is this possible?
2011 Dec 31
0
[PATCH] i.d.s/openvpn: support 'remote-cert-tls (server|client)'
From: Simon Deziel <simon.deziel at gmail.com>
Fixes LP: #806537
Signed-off-by: Simon Deziel <simon.deziel at gmail.com>
---
rulefiles/linux/ignore.d.server/openvpn | 7 ++++++-
1 files changed, 6 insertions(+), 1 deletions(-)
diff --git a/rulefiles/linux/ignore.d.server/openvpn b/rulefiles/linux/ignore.d.server/openvpn
index 2b4bfd6..d80f42f 100644
---
2015 Nov 26
2
How disable forwarding-only connections (i.e. non-shell/command non-sftp connections)? (Maybe this is a feature request!)
On 2015-11-26 13:03, Darren Tucker wrote:
> On Thu, Nov 26, 2015 at 3:41 PM, Tinker <tinkr at openmailbox.org> wrote:
>> What I am looking for is an SSHD configuration where every
>> successfully
>> authenticated connection also guaranteedly will lead to a
>> ForcedCommand
>> invocation.
> [...]
>> Is this possible?
>
> I don't think
2015 Nov 26
2
How disable forwarding-only connections (i.e. non-shell/command non-sftp connections)? (Maybe this is a feature request!)
On 2015-11-26 13:33, Darren Tucker wrote:
> On Thu, Nov 26, 2015 at 4:11 PM, Tinker <tinkr at openmailbox.org> wrote:
>> The goal is to get a script invoked *at login time*,
>
> This part I follow, but having a script run is just a means to an end
> not the end itself. What is the script going to do?
>
>> so that the authentication only is known to the client
2015 Nov 25
6
How disable forwarding-only connections (i.e. non-shell/command non-sftp connections)? (Maybe this is a feature request!)
Hi!
I tried with all available options to disable forwarding-only
connections, by:
"AllowAgentForwarding no
AllowTcpForwarding no"
This had no effect, so what I got in effect was dummy connections.
I would like to disable this "class" of connections altogether. The
outcome will be that all authenticated connections will lead to a
command, be it /usr/libexec/sftp-server
2015 Nov 26
2
How disable forwarding-only connections (i.e. non-shell/command non-sftp connections)? (Maybe this is a feature request!)
On 2015-11-26 14:16, Darren Tucker wrote:
> On Thu, Nov 26, 2015 at 4:49 PM, Tinker <tinkr at openmailbox.org> wrote:
>> On 2015-11-26 13:33, Darren Tucker wrote:
> [...]
>>> What is the script going to do?
>
> You didn't answer this.
Register the login to the group's login database.
>> How would you do it using bsdauth?
>>
>> (PAM