Displaying 20 results from an estimated 2000 matches similar to: "Using two agents"
2015 May 30
3
Using two agents
On 30/05/15 08.34, Nico Kadel-Garcia wrote:
> On Sat, May 30, 2015 at 8:00 AM, Kasper Dupont
> <kasperd at kdxdx.23.may.2015.kasperd.net> wrote:
> > As far as I can tell when the ssh command uses an agent to
> > authenticate to a server and then forwards an agent to that
> > server, it will always use the same agent for both purposes.
> >
> > Has there
2015 May 23
5
Name based SSH proxy
I am working on a proxy which can be hosted on a single
IP address and dispatch requests to different backends
depending on which hostname the client used to connect to
this IP address.
Currently such a proxy can be build to support HTTP, HTTPS,
SMTP, and DNS. However SSH support is impossible due to
the ssh client not sending the information such a proxy
would need.
I am not the first to want
2015 May 25
4
Name based SSH proxy
On 25/05/15 09.51, Damien Miller wrote:
> I'm not sure it should be part of the banner exchange, though there is
> no other trivial way to do it and maintain backwards compatibility.
Even if backwards compatibility wasn't a requirement,
I don't see any better way it could be done.
> I don't much like it because it reveals host identity information
> in the clear.
So
2015 May 27
2
Name based SSH proxy
On 27/05/15 11.07, Dirk-Willem van Gulik wrote:
> As a practical suggestion - we ran for a while with a hack where we abuse the version human readable string with a
> base64 string of a _salted_ hash of the server we where trying to get to.
>
> Sharing both salt and hash.
>
> This let the server figure out the right key to present without too much ado; but without leaking all
2015 May 26
6
Name based SSH proxy
On 26/05/15 15.50, Daniel Kahn Gillmor wrote:
> The argument that the DNS lookup leaks this metadata is a bad argument:
> if we followed this line of reasoning, then every problem that has
> multiple contributors could never be solved (A says "but my fixing
> things is useless if B does nothing", while B says "but my fixing things
> is useless if A does nothing"
2015 May 27
2
Name based SSH proxy
On 27/05/15 01.42, ?ngel Gonz?lez wrote:
> Why do you want the hostname being used to "be visible to the administrator
> of the SSH server"?
In case the AAAA record used by the proxy to find the
server for some reason points to the wrong IP address,
I want to ensure that the administrator of the server
has the opportunity to see the DNS record causing
connections to end up on
2015 May 26
2
Name based SSH proxy
On 26/05/15 18.29, Daniel Kahn Gillmor wrote:
> On Tue 2015-05-26 17:42:40 -0400, Kasper Dupont wrote:
> > But it does not address all my requirements. I have a
> > requirement that the hostname being used must be visible
> > to the administrator of the SSH server. And it must be
> > visible with minimal effort without requiring any software
> > changes on the
2013 Jan 18
5
reading multiple key=value pairs per line
Hi,
Thanks for a great environmentfor statistical computing :-)
I have some input data in a file ("input_kvpairs.csv") of the form
key1=23, key2=67, key3="hello there"
key1=7, key2=22, key3="how are you"
key1=2, key2=77, key3="nice day, thanks"
Now in my head I wish it was of the form ("input.csv")
#key1, key2, key3
23, 67, "hello
2012 Aug 14
1
Can we interlink these three if conditions?
key1.=c(1, 2, 3)
key2.=c(2)
if (identical(key1.,key2.) == "TRUE") {
cat("No Errors found")
}
if (length(setdiff(key1., key2.)) !=0) {
2009 Mar 04
3
Table Transformation
Dear R-experts,
recently, I started to discover the world of R. I came across a problem,
that I was unable to solve by myself (including searches in R-help, etc.)
I have a flat table similar to
key1 key2 value1
abcd_1 BP 10
abcd_1 BSMP 1A
abcd_1 PD 25
abcd_2 BP 20
abcd_3 BP 80
abcd_4 IA 30
abcd_4 PD 70
abcd_4 PS N
I wish to transform this table to obtain the following result:
key2
key1 BP
2011 May 02
2
INSERT OR UPDATE
I'm trying to insert rows of a data.frame into a database table, or update where the key fields of a record already exist in the table. I've come up with a possible solution below, but would like to hear if anyone has a better solution.
# The problem demonstrated:
# Create a data.frame with test values
library(RODBC)
tbl <- data.frame(
key1 = rep(1:3, each = 2),
key2 =
2016 Jan 15
4
Proposal: always handle keys in separate process
How about using the existing OpenSSH client's PKCS#11 support to
isolate keying material in a dedicated process?
A similar approach, "Practical key privilege separation using Caml
Crush", was discussed at FOSDEM'15 with a focus on
Heatbleed [1][2] but the ideas and principles are the same.
Now this is easily done using the following available components:
- SoftHSM to store
2009 Jul 08
1
[PATCH: host-browser replacement 0/3] replacement of host-browser on ovirt-server
The purpose of this patch is to replace the identify function in
host-browser.rb with a new script, host-register.rb.
host-register.rb is a qmf ruby console that interfaces with the newly
added matahari qmf agent on the ovirt node. While it stores node data
in the database with the same behavior as the original host-browser
implementation, it acquires the data using the amqp protocol (and
2005 Feb 24
1
Place more than one key with xyplot
Dear R-users
I have some trouble to generate more than one key with xyplot using the
legend argument.
I would like one key with rectangles:
library(lattice)
library(grid)
key1 <- list(rectangles = list(col= c(rev(heat.colors(5))[1:5],
rev(heat.colors(5))[4:1])),
title="Percentiles",
space="right",
2005 Aug 08
1
php_serialize-1.0.2.1.rb questions
Has anyone used this to get data out of PHP sessions?
I can get data out using the php_unserialize function however I am
getting a array of strings that looks like this:
["key1: data1","key2: data2"]
I would rather get RoR session style of associative arrays
["key1"=>"data", "key2"=>"data2"]
Am I just being dense and there is an
2009 May 22
3
Parsing Asterisk's .conf files from Perl, Java or PHP file
Hi,
To a large extend, Asterisk's /etc/asterisk/*.conf configuration files
conform to a format such as:
[section1]
key1=value1
key2=value2
[section2]
key1=value1
key2=value2
...
To increase coherence when running custom-made application in Perl, Java,
PHP, ...) and Asterisk on the same platform, I'm wondering if could extend a
bit Asterisk's config files instead of duplicating data
2018 Jul 02
3
subset con los casos presentes en otra df
Buenas, una vez más. Utilizo:
data <- subset(data,data$Key %in% data2$Key)
para quedarme con los casos de data que están también en data2, de
acuerdo a la variable Key.
¿Cómo sería si quiero que sean los que coinciden en Key1 y Key2? Pense
hacer un collapse con Key1 y key2, tanto en data como data2, y usarlo
como uso key en el ejemplo de arriba, pero debe haber una forma más
2010 Aug 23
1
Sort ordering
Using MultiValueSorter, I can sort by key1, key2, relevance; or relevance, key1, key2.
But AFAIK, I can't sort by key1, relevance, key2. Unless I spool out the entire result set or write some C++.
I wonder if we need a new 'sort by' function that accepts any combination of keys and relevance in any order? The function would make it's own optimisations (ie is relevance first or
2009 Jul 10
2
[PATCH: server 0/3] Add host-register.rb (replaces host-browser.rb in part)
Removes node identification functionality from host-browser.rb and adds a new script,
host-register.rb, that takes over that functionality.
The chief difference is that host-browser used a simple TCP server setup to get data
from the node, while host-register uses the qpid bus to do so. Specifically, it
communicates with the matahari qmf agent added to the node in two related patchsets to
node
2009 Jul 30
7
arrays, loops, etc
Inspired by the recent thread titled "Array input of dirs, ensuring
their existence" I thought I''d write up the problem I''m running into. I
was chatting on irc about it, I don''t think puppet has a clean solution.
Like the other poster, I''m defining an object that takes an array. In
my case, I''m defining gpg keystore, which can contain a