Displaying 20 results from an estimated 10000 matches similar to: ".ssh_config forwarding"
2011 Nov 06
13
[Bug 1949] New: PermitOpen none option
https://bugzilla.mindrot.org/show_bug.cgi?id=1949
Bug #: 1949
Summary: PermitOpen none option
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.9p1
Platform: All
OS/Version: OpenBSD
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo:
2013 Jul 31
1
openssh-unix-dev Digest, Vol 123, Issue 13
>
> Message: 8
> Date: Tue, 30 Jul 2013 12:46:50 -0700
> From: Iain Morgan <imorgan at nas.nasa.gov>
> To: Damien Miller <djm at mindrot.org>
> Cc: "openssh-unix-dev at mindrot.org" <openssh-unix-dev at mindrot.org>
> Subject: Re: Call for testing: OpenSSH-6.3
> Message-ID: <20130730194649.GC18047 at linux124.nas.nasa.gov>
>
2013 Aug 07
29
[Bug 2140] New: Capsicum support for FreeBSD 10 (-current)
https://bugzilla.mindrot.org/show_bug.cgi?id=2140
Bug ID: 2140
Summary: Capsicum support for FreeBSD 10 (-current)
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: FreeBSD
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2011 Jul 30
3
[Bug 1921] New: [Patch] memory leak in sftp-client.c
https://bugzilla.mindrot.org/show_bug.cgi?id=1921
Bug #: 1921
Summary: [Patch] memory leak in sftp-client.c
Classification: Unclassified
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: trivial
Priority: P2
Component: sftp
AssignedTo:
2013 Oct 20
29
[Bug 2163] New: unchecked returned value from pam_get_item()
https://bugzilla.mindrot.org/show_bug.cgi?id=2163
Bug ID: 2163
Summary: unchecked returned value from pam_get_item()
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: minor
Priority: P5
Component: PAM support
Assignee: unassigned-bugs at
2013 Jun 19
9
[Bug 2021] sftp resume support (using size and offset)
https://bugzilla.mindrot.org/show_bug.cgi?id=2021
Loganaden Velvindron <loganaden at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #2199|0 |1
is obsolete| |
--- Comment #12 from Loganaden Velvindron
2011 Dec 17
3
[Bug 1961] New: ECDSA memory leak
https://bugzilla.mindrot.org/show_bug.cgi?id=1961
Bug #: 1961
Summary: ECDSA memory leak
Classification: Unclassified
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at
2011 Dec 07
3
[Bug 1956] New: sftp segfaults in parse_args() when argv[0] is NULL
https://bugzilla.mindrot.org/show_bug.cgi?id=1956
Bug #: 1956
Summary: sftp segfaults in parse_args() when argv[0] is NULL
Classification: Unclassified
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sftp
2013 Nov 12
7
[Bug 2170] New: Potential integer overflow
https://bugzilla.mindrot.org/show_bug.cgi?id=2170
Bug ID: 2170
Summary: Potential integer overflow
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
2014 Jan 18
9
[Bug 2197] New: Add ED25519 support to SSHFP dns record
https://bugzilla.mindrot.org/show_bug.cgi?id=2197
Bug ID: 2197
Summary: Add ED25519 support to SSHFP dns record
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee: unassigned-bugs at
2012 Sep 02
3
[Bug 2021] sftp resume support (using size and offset)
https://bugzilla.mindrot.org/show_bug.cgi?id=2021
--- Comment #3 from Loganaden Velvindron <loganaden at gmail.com> ---
ping :-) ?
--
You are receiving this mail because:
You are watching the assignee of the bug.
2016 Aug 10
3
Feature request for ssh-add
Ajay Ramjatan asks if it would be ok to have:
A config file that contains list of DSA/RSA/ED25519 entries to be
added, when run by default.
Currently According to the man page:
"
Alternative file names can be given on the command line. If any file
requires a passphrase, ssh-add asks for the passphrase from the user.
"
Instead of specifying each key file, a single file such as .config
2013 Aug 24
12
[Bug 2143] New: X11 forwarding for ipv4 is broken when ipv6 is disabled on the loopback interface
https://bugzilla.mindrot.org/show_bug.cgi?id=2143
Bug ID: 2143
Summary: X11 forwarding for ipv4 is broken when ipv6 is
disabled on the loopback interface
Product: Portable OpenSSH
Version: 5.3p1
Hardware: All
OS: Linux
Status: NEW
Severity: minor
Priority: P5
2012 Jun 25
1
[Bug 2021] New: sftp resume support (using size and offset)
https://bugzilla.mindrot.org/show_bug.cgi?id=2021
Bug #: 2021
Summary: sftp resume support (using size and offset)
Classification: Unclassified
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: sftp
2017 Sep 24
3
DH Group Exchange Fallback
On 09/24/2017 12:21 AM, Mark D. Baushke wrote:
> I suggest you upgrade to a more recent edition of the OpenSSH software.
> The most recent release is OpenSSH 7.5 and OpenSSH 7.6 will be released
> very soon.
This problem is in v7.5 and v7.6. See dh.c:436.
> OpenSSH 6.6 was first released on October 6, 2014.
I brought up v6.6 to give an example that older clients wouldn't be
2012 Dec 04
2
OpenSSH warnings on FreeBSD
on FreeBSD, gcc complains that %d is used for sig_atomic_t
Casting to (int) as a solution ?
Index: serverloop.c
===================================================================
RCS file: /cvs/openssh/serverloop.c,v
retrieving revision 1.172
diff -u -p -r1.172 serverloop.c
--- serverloop.c 2 Dec 2012 22:50:55 -0000 1.172
+++ serverloop.c 4 Dec 2012 11:46:33 -0000
@@ -708,7 +708,7 @@
2014 Apr 09
2
ED25519 SSHFP in OpenSSH & IETF
Hi All,
I've been working on a diff to get SSHFP support for ed25519 in OpenSSH.
SM has been working through the IETF process to obtain the SSHFP RR Type
number.
Despite getting "rough consensus", we still haven't heard anything from the
IETF Security Directors for the draft. SM sent a mail asking why it is taking
so long, and it appears that his mail was ignored.
Please see:
2011 Sep 16
2
weird make errors on portable snapshots
When doing a make with the portable developer version,
I came across this error:
ssh/ssh_host_ecdsa_key|/opt/etc/ssh_host_ecdsa_key|g' -e
's|/etc/ssh/ssh_host_dsa_key|/opt/etc/ssh_host_dsa_key|g' -e
's|/etc/ssh/ssh_host_rsa_key|/opt/etc/ssh_host_rsa_key|g' -e
's|/var/run/sshd.pid|/var/run/sshd.pid|g' -e
's|/etc/moduli|/opt/etc/moduli|g' -e
2014 Apr 11
1
OpenSSH Match directive
In the latest release of OpenSSH,
when you use only "Match" in sshd_config, all by itself, it causes sshd to stop.
/usr/local/sbin/sshd -d
One or more attributes required for Match
/usr/local/etc/sshd_config line 134: Bad Match condition
This wasn't the case in the older releases, and some Mauritian users
are complaining as they preferred the old behaviour, which gave a
warning.
2014 Jan 09
3
[Bug 884] New: the rule of TEE target with '--oif' option cannot be deleted.
https://bugzilla.netfilter.org/show_bug.cgi?id=884
Summary: the rule of TEE target with '--oif' option cannot be
deleted.
Product: iptables
Version: 1.4.x
Platform: i386
OS/Version: Fedora
Status: NEW
Severity: minor
Priority: P5
Component: iptables
AssignedTo: