Displaying 20 results from an estimated 9000 matches similar to: "[RFE] Multiple ssh-agent support"
2015 Sep 19
2
[RFE] Multiple ssh-agent support
On Fri, Sep 18, 2015 at 7:07 PM, Peter Stuge <peter at stuge.se> wrote:
> Fabiano Fid?ncio wrote:
>> A few possible solutions for this would involve a way to support more
>> than one agent, talking to both (the local one and the spice one),
>> merging then their responses and returning it to any application who
>> sent the request. Note that would be really nice if
2015 Sep 19
2
[RFE] Multiple ssh-agent support
On Fri, Sep 18, 2015 at 10:58 PM, ?ngel Gonz?lez <keisial at gmail.com> wrote:
> On 18/09/15 15:47, Fabiano Fid?ncio wrote:
>>
>> Howdy!
>>
>> I've been working on a prototype that allows to do ssh-agent forward
>> between a guest, using SPICE, and a spice client
>> (remote-viewer/virt-viewer/spicy)
>> The whole idea is to have something
2015 Oct 13
6
[Bug 2480] New: Support a list of sockets on SSH_AUTH_SOCK
https://bugzilla.mindrot.org/show_bug.cgi?id=2480
Bug ID: 2480
Summary: Support a list of sockets on SSH_AUTH_SOCK
Product: Portable OpenSSH
Version: 7.1p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh-agent
Assignee: unassigned-bugs
2015 Sep 26
5
[RFC][PATCH v2] Support a list of sockets on SSH_AUTH_SOCK
The idea behind this change is to add support for different "ssh-agents"
being able to run at the same time. It does not change the current
behaviour of the ssh-agent (which will set SSH_AUTH_SOCK just for
itself). Neither does it change the behaviour of SSH_AGENT_PID (which
still supports only one pid).
The new implementation will go through the list of sockets (which are
separated by a
2018 Sep 18
2
[CentOS-devel] Authorization to use CentOS logo in GNOME Boxes
Thanks Rich for drawing this forward, I had missed it. (I generally
handle all the trademark usage queries.)
The key reference is this one, the trademark guidelines:
https://www.centos.org/legal/trademarks/
That document should give the GNOME project all of the authorization and
guidelines on how to use and not use the CentOS marks.
Fabiano -- if you have any further questions, you may also
2016 Jan 15
3
wolfSSL meet/greet with OpenSSH Devs at FOSDEM
Hello OpenSSH,
wolfSSL will be at FOSDEM 2016 in Brussels on the 30th and 31st of January.
We are interested in getting together in person with any developers from
OpenSSH to talk about the recent port of wolfSSL to OpenSSH.
Please contact us at info at wolfssl.com if you are interested in setting up a
meeting.
Thank you all for your time.
Best Regards,
wolfSSL
2018 Sep 18
4
[CentOS-devel] Authorization to use CentOS logo in GNOME Boxes
On 09/18/2018 11:03 AM, Fabiano Fid?ncio wrote:
> My understanding is that we can use all the CentOS marks provided here[0].
> However, those unfortunately are not looking good enough on Boxes and
> we'd like to use, if possible, just the logo as in here[1]
>
> Would that be possible? As far as I could understand that would be a
> violation of the trademark.
>
> [0]:
2018 Jun 19
2
Authorization to use CentOS logo in GNOME Boxes
People,
Firstly, sorry for the cross-list post (centos-devel and centos-docs).
I'd like to reach you in order to ask for a formal authorization to
use CentOS logo on GNOME Boxes[0]. GNOME Boxes already shows a few
other distro's logos as you can check here[1].
Would be possible to get the explicit confirmation that we could use
CentOS logo as well?
[0]:
2018 Oct 31
1
[CentOS-devel] Authorization to use CentOS logo in GNOME Boxes
Karsten,
On Wed, Oct 31, 2018 at 10:06 PM Karsten Wade <kwade at redhat.com> wrote:
>
> Hi all,
>
> There is now a draft permission letter working it's way through the
> CentOS Board. It is intended to cover permission for just the GNOME
> Project's use with GNOME Boxes.
This is *really* good news!
>
> I am still pursuing resolving this within the
2013 Jan 29
16
[Bug 2066] New: ssh tries the keys proposed by the agent before those passed with -i
https://bugzilla.mindrot.org/show_bug.cgi?id=2066
Bug ID: 2066
Summary: ssh tries the keys proposed by the agent before those
passed with -i
Classification: Unclassified
Product: Portable OpenSSH
Version: 6.0p1
Hardware: All
OS: Linux
Status: NEW
Severity: normal
2013 Jun 05
6
KVM console?
I finally got access to some machines with more resources than the
free VMware ESXi license allows which pushed me into trying kvm
instead. Seems capable enough for what I need and can even import and
run the existing vmdk images I already have. But, I have some
questions about accessing the virt-manager console remotely for
initial configuration, etc.. Normally I use freenx for remote GUI
2003 Mar 31
1
[Bug 496] add a timeout function to ssh-agent
http://bugzilla.mindrot.org/show_bug.cgi?id=496
------- Additional Comments From hauser at acm.org 2003-03-31 16:56 -------
Created an attachment (id=266)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=266&action=view)
Readme.txt
for the japanese win-ssh-agent.exe/win-ssh-askpass.exe proofread by Nayuta
------- You are receiving this mail because: -------
You are the assignee
2020 Aug 07
3
ssh-agent does not accept all forwarded RSA keys on later versions.
Hello,
I've got a problem with newer versions of ssh-agent not accepting all keys
being forwarded to them.
Example:
LOCAL-WORKSTATION
ssh-add -l
4096 SHA256:HFSzrozPapudofYJi8QvXQdA1/vNpFc2iPWH8CGVsEg (none) (RSA)
2048 SHA256:lbjpmHAYtUO+zaLaKvWVxGNYkXRkOumcoOpLdRSVX/U
/home/matt/.ssh/id_rsa_embedded (RSA)
ssh -V
OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n 7 Dec 2017
BROKEN-REMOTE
ssh
2011 Jan 15
1
keychain problem
hello centos.. I am having a very annoying problem on my network right
now. it looks like every time I try to add my ssh key to keychain I
have to issue a command just to get my ssh subsystem communicating
with the ssh-agent:
I have this line in my .bashrc file
$(keychain --eval --quick --quiet private_key1 private_key2 private_key3)
If I try to perform ssh-add I get the message:
[bluethundr
2008 Jun 18
2
SSH connection hang after upgrade
I recently had to upgrade my version of OpenSSH from 4.7 to 5.0p1 on my
MacBook (Darwin). I installed the latest 'portable' tarball and
removed the system version:
$ ssh -V
OpenSSH_5.0p1, OpenSSL 0.9.7l 28 Sep 2006
$ which ssh
/usr/bin/ssh
sshd is the same version, installed in /usr/sbin/sshd. Now, things are
a bit broken: I am able to ssh from another machine into my MacBook,
so the
2000 Oct 30
3
ssh-agent and ssh-add with openssh-2.2.0p1 on Redhat 7
Hi all,
i'm trying to figure out if i'm being silly or if there is a genuine problem.
Running on the notorious Redhat 7, 2.2.16-22 #1, X86.
[user at host]$ ssh-agent -s
SSH_AUTH_SOCK=/tmp/ssh-XXYFcFR6/agent.2101; export SSH_AUTH_SOCK;
SSH_AGENT_PID=2102; export SSH_AGENT_PID;
echo Agent pid 2102;
[user at host]$ echo $SSH_AUTH_SOCK
[user at host]$ echo $SSH_AGENT_PID
[user at host]$
2003 Feb 24
9
[Bug 500] show how to start-up ssh-agent by default...
http://bugzilla.mindrot.org/show_bug.cgi?id=500
------- Additional Comments From djm at mindrot.org 2003-02-24 12:43 -------
I think that:
[ -z "$SSH_AUTH_SOCK" ] && eval `ssh-agent -s`
[ -z "$SSH_AGENT_PID" ] || ssh-add -l >/dev/null 2>&1 || ssh-add
Is as effective and a lot more concise.
On the other hand, fragile heuristics like:
> export
2018 Sep 18
0
[CentOS-devel] Authorization to use CentOS logo in GNOME Boxes
Karsten,
On Tue, Sep 18, 2018 at 7:45 PM, Karsten Wade <kwade at redhat.com> wrote:
> Thanks Rich for drawing this forward, I had missed it. (I generally
> handle all the trademark usage queries.)
>
> The key reference is this one, the trademark guidelines:
>
> https://www.centos.org/legal/trademarks/
>
> That document should give the GNOME project all of the
2001 Feb 20
1
2.5.1p1 ssh-agent path problem in Solaris
I'm having a path problem with OpenSSH 2.5.1p1 in Solaris (7). When
ssh-agent is run, environment variables aren't being passed to the
spawned shell.
sol# env | wc -l
23
sol# env | grep -i ssh
SSH_CLIENT=10.0.1.146 1047 22
SSH_TTY=/dev/pts/0
sol#
sol# ssh-agent sh
sol# env | wc -l
1
sol# env
SSH_AGENT_PID=12032
sol#
If I
2011 Jul 22
3
MacOSX & ssh-agent -l
Folks,
MacOSX 10.6.x (Snow Leopard) runs { ssh-agent -l }; that's not an
s/ssh-add/ssh-agent/ typo. It appears to be an undocumented addition
(the man-pages were not updated).
I *suspect* that it just tells the agent to honour whatever pre-existing
value of $SSH_AUTH_SOCK it inherits and to try to listen to that. I
don't know for sure.
Does anyone have details on what exactly it does,