Displaying 20 results from an estimated 7000 matches similar to: "[Bug 2305] New: sshd does not accept @cert-authority when doing host based authentication."
2014 Mar 14
7
[Bug 2211] New: Too many hostbased authentication attempts
https://bugzilla.mindrot.org/show_bug.cgi?id=2211
Bug ID: 2211
Summary: Too many hostbased authentication attempts
Product: Portable OpenSSH
Version: 6.5p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee: unassigned-bugs at
2010 May 26
2
hostbase authentication of hostcertificate
Dear All,
I am trying to use the hostcertificate to do the hostbaed authentication with the steps in the regress/cert-hostkey.sh
But it seems that it can not login with the hostcertificate.:
Here is debug message from the ssh client :
ssh -2 -oUserKnownHostsFile=/opt/ssh/etc/known_hosts-cert \
> -oGlobalKnownHostsFile=/opt/ssh/etc/known_hosts-cert sshia3 -p 1111 -vvv
debug1: checking
2010 Mar 26
3
[Bug 1745] New: Matching @cert-authority entries when using unqualified hostnames
https://bugzilla.mindrot.org/show_bug.cgi?id=1745
Summary: Matching @cert-authority entries when using
unqualified hostnames
Product: Portable OpenSSH
Version: -current
Platform: Other
OS/Version: Other
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo:
2013 Apr 17
1
[Bug 1039] Incomplete application of HostKeyAlias in ssh
https://bugzilla.mindrot.org/show_bug.cgi?id=1039
Iain Morgan <imorgan at nas.nasa.gov> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |imorgan at nas.nasa.gov
--- Comment #13 from Iain Morgan <imorgan at nas.nasa.gov> ---
My apologies for
2015 Mar 26
2
FYI: SSH1 now disabled at compile-time by default
No, I just think 15 years or so is more than enough time to have
addressed the issue.
On Thu, Mar 26, 2015 at 14:05:08 -0700, Dan Kaminsky wrote:
> So, this isn't your problem and you don't respect the people's whose
> problem it is.
>
> On Thu, Mar 26, 2015 at 12:43 PM, Iain Morgan <imorgan at nas.nasa.gov> wrote:
>
> > On Thu, Mar 26, 2015 at 11:55:18
2013 Sep 18
12
[Bug 2154] New: Avoid key lookup overhead when re-keying
https://bugzilla.mindrot.org/show_bug.cgi?id=2154
Bug ID: 2154
Summary: Avoid key lookup overhead when re-keying
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2015 Mar 26
4
FYI: SSH1 now disabled at compile-time by default
On Thu, Mar 26, 2015 at 11:55:18 -0700, Dan Kaminsky wrote:
> You're right. My argument the is the next build of OpenSSH should be
> OpenSSH 7, and the one after that 8, then 9, then 10. No minor releases?
> Sure, go ahead. Deprecate the point,
>
> Do you manage any machines running SSHv1?
>
If by "running" you mean accepting SSH1, of course not. From a
2010 Jul 15
13
[Bug 1798] New: Add fsync() support to sftp/sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1798
Summary: Add fsync() support to sftp/sftp-server
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: sftp-server
AssignedTo: unassigned-bugs at mindrot.org
2018 Nov 02
2
[BUG?] sftp is echoing back prompt and commands in batch mode
Thanks, Iain.
I am willing to hear from other users whether anyone else sees this as a
bug before filing it.
--
Vincenzo Romano
Il giorno ven 2 nov 2018, 20:03 Iain Morgan <imorgan at nas.nasa.gov> ha
scritto:
> If you truly intend this as a bug report, you should file it at
> bugzilla.mindrot.org.
>
> On Fri, Nov 02, 2018 at 12:25:22 +0100, Vincenzo Romano wrote:
> >
2013 Aug 01
5
[Bug 2137] New: progress meter shows wrong speed during resume
https://bugzilla.mindrot.org/show_bug.cgi?id=2137
Bug ID: 2137
Summary: progress meter shows wrong speed during resume
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: minor
Priority: P5
Component: sftp
Assignee: unassigned-bugs at
2013 Jul 31
1
openssh-unix-dev Digest, Vol 123, Issue 13
>
> Message: 8
> Date: Tue, 30 Jul 2013 12:46:50 -0700
> From: Iain Morgan <imorgan at nas.nasa.gov>
> To: Damien Miller <djm at mindrot.org>
> Cc: "openssh-unix-dev at mindrot.org" <openssh-unix-dev at mindrot.org>
> Subject: Re: Call for testing: OpenSSH-6.3
> Message-ID: <20130730194649.GC18047 at linux124.nas.nasa.gov>
>
2015 Jan 23
4
Usability issue when forced to change password when logging in to a system
Hi,
What I am about to describe is something that has existed for a very
long time, but it is still a usability issue. :)
When logging in to a system and the system detects that the password has
expired and needs to change this happens
Login As: Foobar
Password:
Your password has expired. Choose a new password.
Old Pasword:
Now the user has just read the text
"Your password has
2013 Jan 14
2
[Bug 2062] New: Add support for a ForceShell sshd option
https://bugzilla.mindrot.org/show_bug.cgi?id=2062
Bug ID: 2062
Summary: Add support for a ForceShell sshd option
Classification: Unclassified
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
2010 Jun 07
3
X509 based certificate authentication in OpenSSH
Hello,
I would like to know whether OpenSSH supports x509 certificate based
authentication.
It looks like OpenSSH has dependency on OpenSSL so does this mean that
OpeSSH also supports x509 certificate based authentication.
If it does support, can you please point me to the necessary
documentation.
Thanks
Naitik
2008 May 09
4
[Bug 1462] New: Unaligned access warnings on IA64 when using umac-64
https://bugzilla.mindrot.org/show_bug.cgi?id=1462
Summary: Unaligned access warnings on IA64 when using umac-64
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.0p1
Platform: Itanium2
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo:
2017 Sep 29
2
Call for testing: OpenSSH 7.6
On 29 September 2017 at 11:05, Iain Morgan <imorgan+openssh at nas.nasa.gov> wrote:
[...]
> This is due to my shell being csh, which is pickier about undefined
> variables than the Bourne-style shells. The attached patch fixes the
> issue.
Thanks for figuring this out.
> - 'test -z "$SSH_USER_AUTH"' || fail "SSH_USER_AUTH present"
> +
2013 Sep 10
6
[Bug 2150] New: Recursive upload expects target directory to already exist
https://bugzilla.mindrot.org/show_bug.cgi?id=2150
Bug ID: 2150
Summary: Recursive upload expects target directory to already
exist
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: sftp
2001 Oct 31
2
REQ: Minor change ton handling of without-password
Hi,
OpenSSH 2.9p2 behaves differently with 'PermitRootLogin without-password'
than does SSH 2.2.27 with 'PermitRootLogin nopwd':
nopython.imorgan 153> ssh root at sun523
root at sun523's password:
ROOT LOGIN REFUSED FROM nopython.nas.nasa.gov
nopython.imorgan 154> ssh root at sun566
root at sun566's password:
Permission denied.
In the case of OpenSSH, you simply
2018 Nov 02
2
[BUG?] sftp is echoing back prompt and commands in batch mode
Short description: All comands sent to server in batch mode are being
echoed back along with prompt.
Software Version: "OpenSSH_7.9p1, OpenSSL 1.1.1 11 Sep 2018" (as
printed by ssh -V)
Server and client systems: ArchLinux x86_64 fully updated as of 2018-11-02.
## How to reproduce
Provided that you have proper SSH key authentication in place, from
command line run:
echo "dir
2015 Jan 09
5
OpenSSH_6.7p1 hostbased authentication failing on linux->linux connection. what's wrong with my config?
Hi,
On Fri, Jan 9, 2015, at 10:48 AM, Tim Rice wrote:
> My ssh_config has
> Host *
> HostbasedAuthentication yes
> EnableSSHKeysign yes
> NoHostAuthenticationForLocalhost yes
>
> NoHostAuthenticationForLocalhost is not necessary.
> The one you are missing is EnableSSHKeysign.
>
> Additionally, you made no mention of your ssh_known_hosts files. Make
> sure