similar to: [Bug 2317] New: sshd_config man page not clear on PermitUserEnvironment

Displaying 20 results from an estimated 7000 matches similar to: "[Bug 2317] New: sshd_config man page not clear on PermitUserEnvironment"

2009 Aug 25
5
PermitUserEnvironment in sshd match block?
Hello, Our campus environment would find it very useful to pass user- environment variables for certain login ssh connections, but of course want to avoid the security problems with LD_PRELOAD and PermitUserEnvironment as described in sshd_config manpages. Would the best answer be a patch that adds PermitUserEnvironment support inside match blocks? Are there technical or other reasons
2010 Jul 18
20
[Bug 1800] New: PermitUserEnvironment accepting pattern of allowed userenv variables
https://bugzilla.mindrot.org/show_bug.cgi?id=1800 Summary: PermitUserEnvironment accepting pattern of allowed userenv variables Product: Portable OpenSSH Version: 5.5p1 Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P2 Component: sshd AssignedTo:
2017 Jul 07
0
[Bug 1800] PermitUserEnvironment accepting pattern of allowed userenv variables
https://bugzilla.mindrot.org/show_bug.cgi?id=1800 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #2113|0 |1 is obsolete| | CC| |dtucker at
2002 Jul 25
3
[PATCH] prevent users from changing their environment
We have a system on which users are given a very restricted environment (their shell is a menu) where they should not be able to run arbitrary commands. However, because their shell is not statically linked, ld.so provides a nice clutch of holes for them to exploit. The patch below adds a new configuration option to sshd which quashes their attempts to set LD_PRELOAD etc. using ~/.ssh/environment
2008 Apr 03
1
Omission in sshd_config man page
[Not subscribed to this list, so please respond directly if you need to speak to me] In man5/sshd_config.5, a permissible keyword in a 'Match' block is missing. It currently lists only: AllowTcpForwarding, Banner, ForceCommand, GatewayPorts, GSSApiAuthentication, KbdInteractiveAuthentication, KerberosAuthentication, PasswordAuthentication, PermitOpen, PermitRootLogin,
2006 Feb 23
1
Questions about sshd_config man page and comments in the file
Hi , I have two problems when i went through a) the man page of sshd_config and b) the comments quoted in sshd_config file itself. They are given below. a) >From the man page of sshd_config: "If UsePAM is enabled, you will not be able to run sshd(8) as a non-privileged user." I changed the permission of the hostkeys to a non-privileged user and tried to run sshd alongwith
2020 May 17
2
[Bug 3165] New: man sshd_config does not define order of includes when using globbing
https://bugzilla.mindrot.org/show_bug.cgi?id=3165 Bug ID: 3165 Summary: man sshd_config does not define order of includes when using globbing Product: Portable OpenSSH Version: 8.2p1 Hardware: amd64 OS: Linux Status: NEW Severity: trivial Priority: P5 Component: sshd
2009 Apr 06
2
[Bug 1587] New: [man] sshd_config(5) provide examples of keyword 'Match'
https://bugzilla.mindrot.org/show_bug.cgi?id=1587 Summary: [man] sshd_config(5) provide examples of keyword 'Match' Product: Portable OpenSSH Version: 5.2p1 Platform: Other OS/Version: Other Status: NEW Severity: enhancement Priority: P2 Component: Documentation
2020 Jul 18
2
[Bug 3193] New: Add separate section in sshd_config man page on Access Control
https://bugzilla.mindrot.org/show_bug.cgi?id=3193 Bug ID: 3193 Summary: Add separate section in sshd_config man page on Access Control Product: Portable OpenSSH Version: 8.3p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component:
2017 Jan 09
2
[Bug 2663] New: [man] sshd_config(5) AuthenticationMethods segment clarification, proposal and questions
https://bugzilla.mindrot.org/show_bug.cgi?id=2663 Bug ID: 2663 Summary: [man] sshd_config(5) AuthenticationMethods segment clarification, proposal and questions Product: Portable OpenSSH Version: 7.2p2 Hardware: Other OS: Linux Status: NEW Keywords: low-hanging-fruit
2007 Dec 21
8
[Bug 1408] New: Remove references to login. conf from sshd_config man page on Mac OS X.
https://bugzilla.mindrot.org/show_bug.cgi?id=1408 Summary: Remove references to login.conf from sshd_config man page on Mac OS X. Classification: Unclassified Product: Portable OpenSSH Version: 4.7p1 Platform: Other OS/Version: Mac OS X Status: NEW Severity: normal Priority: P2
2015 Feb 03
0
Another Fedora decision
On 3 February 2015 at 12:09, Always Learning <centos at u64.u22.net> wrote: > As for security, the cess pit is weak security not on Linux, BSDs and > others etc. but on M$. It seems to be incredibly easy for one malicious > person to launch attacks from machines they control all over the world - > and those machines just happen to be running M$. Breaking into M$ > machines
2015 Feb 03
2
Another Fedora decision
On Tue, 2015-02-03 at 12:20 +1100, Kahlil Hodgson wrote: > On 3 February 2015 at 12:09, Always Learning <centos at u64.u22.net> wrote: > > As for security, the cess pit is weak security not on Linux, BSDs and > > others etc. but on M$. It seems to be incredibly easy for one malicious > > person to launch attacks from machines they control all over the world - > >
2013 Jul 25
1
[Bug 1800] PermitUserEnvironment accepting pattern of allowed userenv variables
https://bugzilla.mindrot.org/show_bug.cgi?id=1800 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks| |2130 --- Comment #20 from Damien Miller <djm at mindrot.org> --- Retarget to openssh-6.4 -- You are
2014 Feb 05
0
[Bug 1800] PermitUserEnvironment accepting pattern of allowed userenv variables
https://bugzilla.mindrot.org/show_bug.cgi?id=1800 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks| |2188 --- Comment #22 from Damien Miller <djm at mindrot.org> --- Retarget incomplete bugs / feature requests
2014 Apr 12
0
[Bug 1800] PermitUserEnvironment accepting pattern of allowed userenv variables
https://bugzilla.mindrot.org/show_bug.cgi?id=1800 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks| |2226 --- Comment #24 from Damien Miller <djm at mindrot.org> --- Retarget to 6.7 release, since 6.6 was mostly
2014 Aug 29
0
[Bug 1800] PermitUserEnvironment accepting pattern of allowed userenv variables
https://bugzilla.mindrot.org/show_bug.cgi?id=1800 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks| |2266 --- Comment #26 from Damien Miller <djm at mindrot.org> --- Retarget incomplete bugs to 6.8 release. --
2015 Mar 02
0
[Bug 1800] PermitUserEnvironment accepting pattern of allowed userenv variables
https://bugzilla.mindrot.org/show_bug.cgi?id=1800 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks|2266 | --- Comment #28 from Damien Miller <djm at mindrot.org> --- OpenSSH 6.8 is approaching release and closed for
2015 Mar 02
0
[Bug 1800] PermitUserEnvironment accepting pattern of allowed userenv variables
https://bugzilla.mindrot.org/show_bug.cgi?id=1800 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks| |2360 --- Comment #29 from Damien Miller <djm at mindrot.org> --- Retarget to 6.9 -- You are receiving this
2015 May 25
0
[Bug 1800] PermitUserEnvironment accepting pattern of allowed userenv variables
https://bugzilla.mindrot.org/show_bug.cgi?id=1800 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks|2360 |2403 -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching