similar to: Differentiating between ssh connection failures and ssh command failures

Displaying 20 results from an estimated 30000 matches similar to: "Differentiating between ssh connection failures and ssh command failures"

2015 Sep 12
3
Differentiating between ssh connection failures and ssh command failures
On Sat, Sep 12, 2015 at 11:14:07AM +1000, Damien Miller wrote: > ssh server.example.com /usr/bin/do/something > r=$? > if [ $r -eq 0 ] ; then > echo success > elif [ $r -eq 255 ] ; then > echo ssh failed > else > echo command failed > fi ssh remoteserver exit 255 Hmm :-) exit(-1) aka exit(255) is a pretty standard "generic failure code" for many
2016 Aug 05
4
Fwd: Re: Encrypt /decrypta file with ssh keys.
As per Alex's suggestion, attached is the proof of concept "sfile" script. If there is anyone out there with great C skills who can recreate this functionality "out of the box", I think there would be a few happy campers (at least two, anyways). -------- Forwarded Message -------- Subject: Re: Encrypt /decrypta file with ssh keys. Date: Fri, 5 Aug 2016 17:24:35
2016 Mar 20
3
ssh-copy-id no newline bug
On 20 Mar 2016, at 19:15, Philip Hands <phil at hands.com> wrote: > Is anyone going to be upset by the resulting blank lines being added by > ssh-copy-id when the file was not missing a terminating newline? Well it would be at least mildly annoying my previously nice looking file now has a pile of blank lines in just because someone didn't know how to use their editor ... --
2016 Aug 05
3
Encrypt /decrypta file with ssh keys.
> On 5 Aug 2016, at 18:09, James Murphy <james.murphy.debian at gmail.com> wrote: > > The more mainstream thing to do is just use gpg, which has this > functionality already built in. Is this not suitable for your use case? The advantage of Colin's approach is that gpg requires out of band exchange of gpg keys separately from ssh keys. If you already have ssh keys
2010 Apr 06
2
rsync over ssh, multiple private keys sharing same UID, chroot
I am thinking of configuring a service where multiple users have their own private keys to do rsync over ssh. I don't want each of these users to have their own UID. I want them each to share a UID, but to have space on the ssh server isolated from any other user. Let us assume that I also wish to prevent them from using any service other than rsync. Is this possible? Is a sensible approach
2010 Apr 16
2
rsync over ssh - possible attack vectors
Hello everybody! First my setup: I connect from Debian Lenny to Ubuntu Karmic with a command like: user1 at localserver:$ rsync -rtcve ssh user1 at remoteserver:/.../ /local/.../ (using default versions of ssh and rsync in the vendor repos, ssh with password authentication) As far as I understand if localserver got compromised an attacker could read the password and then get full access to
2010 Apr 09
5
SSH Through R Script
Hi, I am trying to SSH to a remote server through R script. In other words, I would like to know how I can get a SSH connection to the remote server and then execute commands on that server with the R script. So in bash, I would normally type ssh -lusername remoteserver.com; press enter and then wait for the password prompt to key in my password. I have tried system("ssh
2014 May 15
1
[patch/cygwin] contrib/cygwin/ssh-host-config
Hi, would you mind to apply the below patch? It fixes Cygwin's ssh-host-config script in various ways: - Remove old code to remove the "sshd/22" entry from /etc/services. This code fixes a problem which only existed in installations which are more than 10 years old. - Handle the StrictMode setting interactively. - Fix regular expressions looking for white spaces. - Make the
2005 Oct 22
4
Differentiating between http downloads and interactive traffic
Hi, I''ve been wondering if anyone has thought of a way to differentiate between an established http download and interactive http traffic? I would like to give interactive http traffic priority over someone downloading large files. Has anyone any ideas how to detect packets that are part of a download like this? Thanks. _______________________________________________
2007 Jan 19
10
DGD patch not detecting dead gateway
Hello all! I applied http://www.ssi.bg/~ja/routes-2.6.8-10.diff patch to kernel 2.6.8.1 and it works fine, or almost fine. It does the load balancing well, but when one link is dropped it continues to try it. At the end of http://www.ssi.bg/~ja/nano.txt it is said to ping gateway 1 and gateway 2, for the kernel to know if that route is working, but since my linux is connected to the links
2017 Jan 24
2
Need information to bypass the preauth in openssh
> On 24 Jan 2017, at 06:01, Darren Tucker <dtucker at zip.com.au> wrote: > > On Tue, Jan 24, 2017 at 4:54 PM, Vishwanath KC <vicchi.cit at gmail.com> wrote: > [...] >> Distributor ID: Debian >> Description: Debian GNU/Linux 8.2 (jessie) > > As you've seen, sshd requires that the system's getpwnam() function > knows the user, without which
2004 Aug 08
2
Question on Differentiating Two Populations in R
Hello All, Forgive me if this a blatantly newbie question or not germane to the list, but i was wondering if my current approach to my problem is the best way in R. I have two experimental datasets (positive and negative) of differing lengths and a large number of ways of numerically expressing the data by using various scales to represent each data point. I am looking for a scale that will
2016 Oct 05
1
Differentiating Disk access from different VMs
All, I have a specific use case where I want to be ale look at vfs or blk_io requests on the host machine and differentiate which VMs the access is originating from. I am assuming a Disk backend, and looking for virsh command or libvirt API that can help me do so. I have tried quite a bit to Google-fu this problem; no such luck. Would love to know if there is some cute trick to do so. Thanks.
2013 Apr 05
2
Flush provider - Differentiating between new resource and modification?
Morning all I''m working on converting some of my NetApp providers to prefetch/flush style to try and optimize performance. I''ve hit an issue on my Netapp_user provider, around handling resource creation versus resource modification? What''s the easiest way to differentiate? Current code is here:
2003 May 06
2
Recursive ssh
Hi all, I want to copy files from a remote server to a local directory with ssh. I've some difficulties with that because on the Remoteserver I have a directory "/www/ftp" with a lot of subdirectories with each of them 4 other subdirectories. I want to sync only */data/* to the local machine without */images/* or */doc/* or */movies/* Any solution would be appreciated. regardsMac
2016 Jan 15
2
[Patch] TCP MD5SIG for OpenSSH
On Fri, Jan 15, 2016 at 1:07 PM, Alex Bligh <alex at alex.org.uk> wrote: > On 15 Jan 2016, at 11:44, Thomas ? Habets <habets at google.com> wrote: >> On 15 January 2016 at 08:48, Alex Bligh <alex at alex.org.uk> wrote: [snip] > 3. Server compares supplied address/port pair with what it sees > (to detect DNAT like Amazon elastic IPs), and if they are the >
2011 Nov 23
3
Minimum python version for xen-4.1.1
Does xen-4.1.1 really require python 2.7 (as per Ubuntu packaging) or will it actually work on python 2.6? I am trying to backport it to an Ubuntu LTS version and would rather not have to bring in Python 2.7 if possible. -- Alex Bligh
2012 May 15
7
Xen 3.3.x on recent dom0 kernels
Odd question I know. I am looking for source for as recent a kernel as possible running the old style xenlinux/xenified kernel (i.e. capable of running the xen3.3.x hypervisor). Any ideas where I can get this - preferably in git form? I think Stefano Stabellini had something that worked up to 2.6.36 (from memory). And yes, we would all prefer all our customers moved to xen4 but this is difficult
2015 Jan 29
3
SSH over websockets
On 29/01/15 21:15, Alex Bligh wrote: > Be frightened: > https://chrome.google.com/webstore/detail/secure-shell/pnhechapfaindjhompbnflcldabbghjo?hl=en > That's a ssh client implemented in chromium, not a web server acting as sshd. However... ?Secure Shell also knows how to connect to an HTTP-to-ssh relay that was built inside Google. Unfortunately that relay isn't open source,
2006 Feb 04
2
Differentiating between normal site content and accounts with subdomains
I''m using the subdomains as accounts method fine on a project, but I''m wondering what is the best way to differentiate between account subdomains to access the app using an account, and www.domain.com and domain.com in order to show normal site content. I''ve noticed that on Backpack, it seems that when you leave the information pages and start using the app,