similar to: [RFE] Multiple ssh-agent support

Displaying 20 results from an estimated 9000 matches similar to: "[RFE] Multiple ssh-agent support"

2015 Sep 19
2
[RFE] Multiple ssh-agent support
On Fri, Sep 18, 2015 at 7:07 PM, Peter Stuge <peter at stuge.se> wrote: > Fabiano Fid?ncio wrote: >> A few possible solutions for this would involve a way to support more >> than one agent, talking to both (the local one and the spice one), >> merging then their responses and returning it to any application who >> sent the request. Note that would be really nice if
2015 Sep 19
2
[RFE] Multiple ssh-agent support
On Fri, Sep 18, 2015 at 10:58 PM, ?ngel Gonz?lez <keisial at gmail.com> wrote: > On 18/09/15 15:47, Fabiano Fid?ncio wrote: >> >> Howdy! >> >> I've been working on a prototype that allows to do ssh-agent forward >> between a guest, using SPICE, and a spice client >> (remote-viewer/virt-viewer/spicy) >> The whole idea is to have something
2015 Oct 13
6
[Bug 2480] New: Support a list of sockets on SSH_AUTH_SOCK
https://bugzilla.mindrot.org/show_bug.cgi?id=2480 Bug ID: 2480 Summary: Support a list of sockets on SSH_AUTH_SOCK Product: Portable OpenSSH Version: 7.1p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: ssh-agent Assignee: unassigned-bugs
2015 Sep 26
5
[RFC][PATCH v2] Support a list of sockets on SSH_AUTH_SOCK
The idea behind this change is to add support for different "ssh-agents" being able to run at the same time. It does not change the current behaviour of the ssh-agent (which will set SSH_AUTH_SOCK just for itself). Neither does it change the behaviour of SSH_AGENT_PID (which still supports only one pid). The new implementation will go through the list of sockets (which are separated by a
2018 Sep 18
2
[CentOS-devel] Authorization to use CentOS logo in GNOME Boxes
Thanks Rich for drawing this forward, I had missed it. (I generally handle all the trademark usage queries.) The key reference is this one, the trademark guidelines: https://www.centos.org/legal/trademarks/ That document should give the GNOME project all of the authorization and guidelines on how to use and not use the CentOS marks. Fabiano -- if you have any further questions, you may also
2016 Jan 15
3
wolfSSL meet/greet with OpenSSH Devs at FOSDEM
Hello OpenSSH, wolfSSL will be at FOSDEM 2016 in Brussels on the 30th and 31st of January. We are interested in getting together in person with any developers from OpenSSH to talk about the recent port of wolfSSL to OpenSSH. Please contact us at info at wolfssl.com if you are interested in setting up a meeting. Thank you all for your time. Best Regards, wolfSSL
2018 Sep 18
4
[CentOS-devel] Authorization to use CentOS logo in GNOME Boxes
On 09/18/2018 11:03 AM, Fabiano Fid?ncio wrote: > My understanding is that we can use all the CentOS marks provided here[0]. > However, those unfortunately are not looking good enough on Boxes and > we'd like to use, if possible, just the logo as in here[1] > > Would that be possible? As far as I could understand that would be a > violation of the trademark. > > [0]:
2018 Jun 19
2
Authorization to use CentOS logo in GNOME Boxes
People, Firstly, sorry for the cross-list post (centos-devel and centos-docs). I'd like to reach you in order to ask for a formal authorization to use CentOS logo on GNOME Boxes[0]. GNOME Boxes already shows a few other distro's logos as you can check here[1]. Would be possible to get the explicit confirmation that we could use CentOS logo as well? [0]:
2018 Oct 31
1
[CentOS-devel] Authorization to use CentOS logo in GNOME Boxes
Karsten, On Wed, Oct 31, 2018 at 10:06 PM Karsten Wade <kwade at redhat.com> wrote: > > Hi all, > > There is now a draft permission letter working it's way through the > CentOS Board. It is intended to cover permission for just the GNOME > Project's use with GNOME Boxes. This is *really* good news! > > I am still pursuing resolving this within the
2013 Jan 29
16
[Bug 2066] New: ssh tries the keys proposed by the agent before those passed with -i
https://bugzilla.mindrot.org/show_bug.cgi?id=2066 Bug ID: 2066 Summary: ssh tries the keys proposed by the agent before those passed with -i Classification: Unclassified Product: Portable OpenSSH Version: 6.0p1 Hardware: All OS: Linux Status: NEW Severity: normal
2013 Jun 05
6
KVM console?
I finally got access to some machines with more resources than the free VMware ESXi license allows which pushed me into trying kvm instead. Seems capable enough for what I need and can even import and run the existing vmdk images I already have. But, I have some questions about accessing the virt-manager console remotely for initial configuration, etc.. Normally I use freenx for remote GUI
2003 Mar 31
1
[Bug 496] add a timeout function to ssh-agent
http://bugzilla.mindrot.org/show_bug.cgi?id=496 ------- Additional Comments From hauser at acm.org 2003-03-31 16:56 ------- Created an attachment (id=266) --> (http://bugzilla.mindrot.org/attachment.cgi?id=266&action=view) Readme.txt for the japanese win-ssh-agent.exe/win-ssh-askpass.exe proofread by Nayuta ------- You are receiving this mail because: ------- You are the assignee
2020 Aug 07
3
ssh-agent does not accept all forwarded RSA keys on later versions.
Hello, I've got a problem with newer versions of ssh-agent not accepting all keys being forwarded to them. Example: LOCAL-WORKSTATION ssh-add -l 4096 SHA256:HFSzrozPapudofYJi8QvXQdA1/vNpFc2iPWH8CGVsEg (none) (RSA) 2048 SHA256:lbjpmHAYtUO+zaLaKvWVxGNYkXRkOumcoOpLdRSVX/U /home/matt/.ssh/id_rsa_embedded (RSA) ssh -V OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n 7 Dec 2017 BROKEN-REMOTE ssh
2011 Jan 15
1
keychain problem
hello centos.. I am having a very annoying problem on my network right now. it looks like every time I try to add my ssh key to keychain I have to issue a command just to get my ssh subsystem communicating with the ssh-agent: I have this line in my .bashrc file $(keychain --eval --quick --quiet private_key1 private_key2 private_key3) If I try to perform ssh-add I get the message: [bluethundr
2008 Jun 18
2
SSH connection hang after upgrade
I recently had to upgrade my version of OpenSSH from 4.7 to 5.0p1 on my MacBook (Darwin). I installed the latest 'portable' tarball and removed the system version: $ ssh -V OpenSSH_5.0p1, OpenSSL 0.9.7l 28 Sep 2006 $ which ssh /usr/bin/ssh sshd is the same version, installed in /usr/sbin/sshd. Now, things are a bit broken: I am able to ssh from another machine into my MacBook, so the
2000 Oct 30
3
ssh-agent and ssh-add with openssh-2.2.0p1 on Redhat 7
Hi all, i'm trying to figure out if i'm being silly or if there is a genuine problem. Running on the notorious Redhat 7, 2.2.16-22 #1, X86. [user at host]$ ssh-agent -s SSH_AUTH_SOCK=/tmp/ssh-XXYFcFR6/agent.2101; export SSH_AUTH_SOCK; SSH_AGENT_PID=2102; export SSH_AGENT_PID; echo Agent pid 2102; [user at host]$ echo $SSH_AUTH_SOCK [user at host]$ echo $SSH_AGENT_PID [user at host]$
2003 Feb 24
9
[Bug 500] show how to start-up ssh-agent by default...
http://bugzilla.mindrot.org/show_bug.cgi?id=500 ------- Additional Comments From djm at mindrot.org 2003-02-24 12:43 ------- I think that: [ -z "$SSH_AUTH_SOCK" ] && eval `ssh-agent -s` [ -z "$SSH_AGENT_PID" ] || ssh-add -l >/dev/null 2>&1 || ssh-add Is as effective and a lot more concise. On the other hand, fragile heuristics like: > export
2018 Sep 18
0
[CentOS-devel] Authorization to use CentOS logo in GNOME Boxes
Karsten, On Tue, Sep 18, 2018 at 7:45 PM, Karsten Wade <kwade at redhat.com> wrote: > Thanks Rich for drawing this forward, I had missed it. (I generally > handle all the trademark usage queries.) > > The key reference is this one, the trademark guidelines: > > https://www.centos.org/legal/trademarks/ > > That document should give the GNOME project all of the
2001 Feb 20
1
2.5.1p1 ssh-agent path problem in Solaris
I'm having a path problem with OpenSSH 2.5.1p1 in Solaris (7). When ssh-agent is run, environment variables aren't being passed to the spawned shell. sol# env | wc -l 23 sol# env | grep -i ssh SSH_CLIENT=10.0.1.146 1047 22 SSH_TTY=/dev/pts/0 sol# sol# ssh-agent sh sol# env | wc -l 1 sol# env SSH_AGENT_PID=12032 sol# If I
2011 Jul 22
3
MacOSX & ssh-agent -l
Folks, MacOSX 10.6.x (Snow Leopard) runs { ssh-agent -l }; that's not an s/ssh-add/ssh-agent/ typo. It appears to be an undocumented addition (the man-pages were not updated). I *suspect* that it just tells the agent to honour whatever pre-existing value of $SSH_AUTH_SOCK it inherits and to try to listen to that. I don't know for sure. Does anyone have details on what exactly it does,