Displaying 20 results from an estimated 300 matches similar to: "Version string"
2014 Jun 20
1
malformed DNS query
On CoreOS, runnng openssh sshd version "OpenSSH_6.6p1-hpn14v4, OpenSSL
1.0.1g", when connecting the following query is sent to the DNS server:
query[A] 2.2.0.10.in-addr.arpa
Which makes no sense, it's an "A" request for a reverse record.
Adding "UseDNS no", prevent the request (proving that the request does come
from sshd).
When connecting to machines
2015 Mar 14
3
[Bug 2365] New: openssh client ignores -o Tunnel=ethernet option, creating an IP tunnel device instead of an ethernet tap device
https://bugzilla.mindrot.org/show_bug.cgi?id=2365
Bug ID: 2365
Summary: openssh client ignores -o Tunnel=ethernet option,
creating an IP tunnel device instead of an ethernet
tap device
Product: Portable OpenSSH
Version: 6.6p1
Hardware: amd64
OS: Linux
Status: NEW
2011 Dec 27
2
maximum password age question
Hello List
I am working on upgrading a older Samba 3.0.16 setup that uses
openldap as its back-end for passwords and users.
I built a clone of our setup using CentOS 5.6 and Openldap 2.4.20 ,
with Samba 3.6.1 .
My issue.
After successfully building and install Samba users can not
authenticate to the server. They are prompted with errors about
Needing to change their password.
Looking at my
2018 Jan 03
2
SSHD and PAM
Hi I am trying to write pam_radius module which talks to RADIUS server for
aaa.
I see sshd checks /etc/passwd for user list. Since RADIUS server has user
list, can sshd ignore this check for RADIUS/TACACS+ authentication, Please
suggest if there are any flags to control it.
I am using the following versions.
OpenSSH_6.6p1, OpenSSL 1.0.2n 7 Dec 2017
I see sssd (NAS) being used for such use
2017 Jan 16
2
^C doesnt work on ssh session
Hi ,
when i connect to sshd , the session doesnt allow me to issue ^C ^Z, it
doesnt work. Please let me know if there are any settings to control it.
telnet works fine.
my settings, version:
OpenSSH_6.6p1, OpenSSL 1.0.1h 5 Jun 2014
stty -a
speed 38400 baud; rows 24; columns 80; line = 0;
intr = ^C; quit = ^\; erase = ^?; kill = ^U; eof = ^D; eol = <undef>;
eol2 = <undef>; swtch =
2018 Jan 03
3
SSHD and PAM
On Wed, 2018-01-03 at 13:50 +0530, Sudarshan Soma wrote:
> HI, I do see some refernce on it: but seems not closed
> https://marc.info/?l=secure-shell&m=115513863409952&w=2
>
> http://bugzilla.mindrot.org/show_bug.cgi?id=1215
>
>
> Is this patch available in latest versions, 7.6?
No. It never was.
The SSSD is using NSS (Name Service Switch) [1] way of getting
2018 Oct 22
2
[PATCH] openssl-compat: Add version compatibility for SSLeay and friends
Building OpenSSH without deprecated APIs compiled causes it to fail.
Signed-off-by: Rosen Penev <rosenp at gmail.com>
---
openbsd-compat/openssl-compat.h | 7 +++++++
1 file changed, 7 insertions(+)
diff --git a/openbsd-compat/openssl-compat.h b/openbsd-compat/openssl-compat.h
index 9e0264c0..b4f0908f 100644
--- a/openbsd-compat/openssl-compat.h
+++ b/openbsd-compat/openssl-compat.h
@@
2014 May 28
1
sftp session disconnects right after passwd enter
Greetings All,
I have a ssh server which allows sftp connections from the Internet
while ssh connections from within the local net, here is the config:
Code:
Port 11111
Port 11113
Protocol 2
LogLevel DEBUG
2014 May 08
1
Match directive can't recognize capital letters
Hi,
There seems to be an issue when using `Match` and `Hostname`
directives including capital letters.
e.g.
# .ssh/config
#
# Match host remotehost
# User alice
# Host remotehost
# User bob
#
ssh remotehost
#=> Apply "User alice"
# .ssh/config
#
# Match host RemoteHost
# User alice
# Host RemoteHost
# User bob
#
ssh RemoteHost
# =>
2016 Nov 08
2
one host only: ssh_dispatch_run_fatal
Darren Tucker <dtucker at zip.com.au> writes:
> On Tue, Nov 8, 2016 at 3:30 PM, Harry Putnam <reader at newsguy.com> wrote:
> [...]
>> After having 7.3p1 & 6.8p1 fail with same wording... I tried 6.7p1 and
>> find it fails with what looks like the same problem but has slightly
>> different wording.
>
> I set up the same versions (server:OpenSSH_6.6p1,
2003 Mar 08
6
[Bug 505] ssh -V could print a human readable openssl version string
http://bugzilla.mindrot.org/show_bug.cgi?id=505
------- Additional Comments From mindrot at ee.lbl.gov 2003-03-08 15:19 -------
Created an attachment (id=241)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=241&action=view)
patch to ssh.c
This patch makes ssh use SSLeay_version(SSLEAY_VERSION) to generate a human
readable version string.
------- You are receiving this mail
2016 Nov 08
4
one host only: ssh_dispatch_run_fatal
Darren Tucker <dtucker at zip.com.au> writes:
> On Tue, Nov 8, 2016 at 2:43 PM, Harry Putnam <reader at newsguy.com> wrote:
>> Darren Tucker <dtucker at zip.com.au> writes:
>>
>>> On Tue, Nov 8, 2016 at 1:02 PM, Harry Putnam <reader at newsguy.com> wrote:
>>> [...]
>>>> gv harry> ssh -vv 2x
>>>>
>>>>
2014 Feb 03
1
ssh config Host case insensitive
Hi,
There seems to be an issue where a case sensitive Host entry is no
longer working after update to openssh 6.5
example entry: (was working before update)
Host MyHost
Hostname 192.168.0.1
Port 1234
User root
IdentityFile ~/.ssh/id_rsa
When issuing "ssh MyHost" the outcome is now:
ssh: Could not resolve hostname myhost: Name or service not known
When the above entry is changed
2016 Jan 04
2
OPenssl and dependencies such as openssh
This might be a croosmail, but necessary.
I did us openssl-SNAP-20160104 minorss erros and installed.
I tried openssh-SNAP-20160105 and the OpenSSL libraries cannot be found
In the openssh configuration file I see
# Determine OpenSSL library version
{ $as_echo "$as_me:${as_lineno-$LINENO}: checking OpenSSL library versi
on" >&5
$as_echo_n "checking
2014 Sep 22
8
[Bug 2280] New: openssh-6.6p1 compression throwing Segmentation fault
https://bugzilla.mindrot.org/show_bug.cgi?id=2280
Bug ID: 2280
Summary: openssh-6.6p1 compression throwing Segmentation fault
Product: Portable OpenSSH
Version: 6.6p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee:
2016 Mar 08
4
Need Help to Fix CVE-2008-1483, CVE-2008-5161, CVE-2015-5600 and CVE-2015-6565
Hi All,
Actually I am working with the OpenSSH version 6.2p which is vulnerable to
above mentioned vulnerabilities.
So am looking for some help how I can fix these vulnerabilities in my
version. I need to fix it in the OpenSSH code.
Regards
Abhishek
2014 May 06
6
[Bug 2239] New: ssh-keygen cannot handle Linux with 64 char long hostname
https://bugzilla.mindrot.org/show_bug.cgi?id=2239
Bug ID: 2239
Summary: ssh-keygen cannot handle Linux with 64 char long
hostname
Product: Portable OpenSSH
Version: 6.6p1
Hardware: All
OS: Linux
Status: NEW
Severity: minor
Priority: P5
Component: ssh-keygen
2012 Apr 30
1
FreeBSD 9 "gptboot: invalid backup GPT header" error (boots fine though)
I've been deploying FreeBSD 9 without issue on a number of
near-identical servers for a client, but have run into an interesting
annoyance when I hit the two DB servers.
These DB servers have an LSI 3ware 9750-8i (running a 6 disk RAID 10 in
a single 3TB virtual volume) which puts them apart from the other two
servers in this cluster (which don't show either issue I am about to
2017 Jan 17
2
^C doesnt work on ssh session
Thanks Ben. i am checking in linux.
I do have this command working:
ssh localhost -o password=abc123
SSH started with password
Could not create directory '/root/.ssh'.
Permission denied, please try again.
Permission denied, please try again.
Permission denied (publickey,password,keyboard-interactive).
will try to getback on openssh used. But is it possible to show some
pointers for
my
2012 Nov 02
6
FreeBSD 9.1 stability/robustness?
I need to build up a few servers and routers, and am wondering how
FreeBSD 9.1 is shaping up. Will it be likely to be more stable and
robust than 9.0-RELEASE? Are there issues that will have to wait
until 9.2-RELEASE to be fixed? Opinions welcome.
--Brett Glass