Displaying 20 results from an estimated 400 matches similar to: "AddKeysToAgent break local forwarding (and possibly more)"
2017 Jan 27
7
[Bug 2670] New: Add ssh_config option that sets the lifetime of the key if added via AddKeysToAgent
https://bugzilla.mindrot.org/show_bug.cgi?id=2670
Bug ID: 2670
Summary: Add ssh_config option that sets the lifetime of the
key if added via AddKeysToAgent
Product: Portable OpenSSH
Version: 7.2p2
Hardware: amd64
OS: All
Status: NEW
Severity: enhancement
Priority: P5
2016 Apr 17
6
[Bug 2564] New: ssh_config AddKeysToAgent doesn't set key name/path
https://bugzilla.mindrot.org/show_bug.cgi?id=2564
Bug ID: 2564
Summary: ssh_config AddKeysToAgent doesn't set key name/path
Product: Portable OpenSSH
Version: 7.2p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee:
2024 Jul 22
1
[Bug 3712] New: ssh-add should respect AddKeysToAgent default in ~/.ssh/config
https://bugzilla.mindrot.org/show_bug.cgi?id=3712
Bug ID: 3712
Summary: ssh-add should respect AddKeysToAgent default in
~/.ssh/config
Product: Portable OpenSSH
Version: 9.8p1
Hardware: 68k
OS: Mac OS X
Status: NEW
Severity: enhancement
Priority: P5
Component:
2016 Oct 03
6
[Bug 2620] New: Option AddKeysToAgent doesnt work with keys provided by PKCS11 libraries.
https://bugzilla.mindrot.org/show_bug.cgi?id=2620
Bug ID: 2620
Summary: Option AddKeysToAgent doesnt work with keys provided
by PKCS11 libraries.
Product: Portable OpenSSH
Version: 7.3p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
2013 Oct 24
5
Boot iPXE from syslinux/isolinux
Christian Hesse <list at eworm.de> on Tue, 2013/10/22 13:14:
> Christian Hesse <list at eworm.de> on Tue, 2013/10/22 12:56:
> > Gene Cumm <gene.cumm at gmail.com> on Tue, 2013/10/22 06:35:
> > > On Tue, Oct 22, 2013 at 5:41 AM, Christian Hesse <list at eworm.de> wrote:
> > > > Hello everybody,
> > > >
> > > > iPXE builds
2013 Oct 22
2
Boot iPXE from syslinux/isolinux
Gene Cumm <gene.cumm at gmail.com> on Tue, 2013/10/22 06:35:
> On Tue, Oct 22, 2013 at 5:41 AM, Christian Hesse <list at eworm.de> wrote:
> > Hello everybody,
> >
> > iPXE builds an ISO image by default. (The build system has to be updated
> > for new paths and to integrate ldlinux.c32, but that's not my problem.)
> >
> > With the binary
2015 Jul 01
4
[PATCH 1/1] update error messages about moduli and primes files
From: Christian Hesse <mail at eworm.de>
Both files can be used, so mention both in error messages.
Signed-off-by: Christian Hesse <mail at eworm.de>
---
dh.c | 7 ++++---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/dh.c b/dh.c
index 4c639ac..450f5c4 100644
--- a/dh.c
+++ b/dh.c
@@ -153,8 +153,8 @@ choose_dh(int min, int wantbits, int max)
if ((f =
2001 Apr 05
2
New type of copy-protected audio CDs are coming...
>From the article:
"The record business wants to lock down songs on a new breed of CDs. Is this
the end of rip, mix and burn? We visit the labels' laboratories to learn
more about what 'stickiness' means to music."
Read the full article here:
http://www.inside.com/jcs/Story?article_id=26900&pod_id=9
Oh, and CDparanoia is mentioned in the article :-)
Greetings,
2020 Mar 02
4
Question about host key algorithms
$ ssh -Q HostKeyAlgorithms
Unsupported query "HostKeyAlgorithms"
$ ssh -V
OpenSSH_7.4p1, OpenSSL 1.0.2u 20 Dec 2019
On Mon, Mar 2, 2020 at 2:24 PM Christian Hesse <list at eworm.de> wrote:
> Luveh Keraph <1.41421 at gmail.com> on Mon, 2020/03/02 14:07:
> > When I do ssh -Q key, where ssh is the OpenSSH 7.4p1 client, I get the
> > following output:
> >
2013 Dec 03
1
Boot iPXE from syslinux/isolinux
Christian Hesse <list at eworm.de> on Mon, 2013/11/11 18:41:
> "H. Peter Anvin" <hpa at zytor.com> on Mon, 2013/11/11 08:09:
> > On 11/11/2013 04:09 AM, Christian Hesse wrote:
> > >>
> > >> Let be know if you need any more info.
> > >
> > > Is anybody working on this? Is there a bug tracker I should report
> > >
2013 Oct 22
2
Boot iPXE from syslinux/isolinux
Hello everybody,
iPXE builds an ISO image by default. (The build system has to be updated for
new paths and to integrate ldlinux.c32, but that's not my problem.)
With the binary syslinux files from kernel.org booting fails with
latest version 6.02:
Loading ipxe.krn... ok
Booting kernel failed: Invalid argument
It does work with version 6.01, though. Any hints how to fix this regression?
--
2015 Aug 05
2
[PATCH 1/1] document all hash algorithms available for key fingerprint display
From: Christian Hesse <mail at eworm.de>
Signed-off-by: Christian Hesse <mail at eworm.de>
---
ssh_config.5 | 8 ++++++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/ssh_config.5 b/ssh_config.5
index 5b0975f..28f7714 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -649,9 +649,13 @@ The default is
.It Cm FingerprintHash
Specifies the hash algorithm used when
2014 Jan 28
2
[PATCH 1/1] rework printing for visual host key upper border
Key types are getting longer and the current implementation of visual
host key breaks with ED25519, resulting in (note the missing bracket):
+--[ED25519 256--+
This reworks the calculation of visual host key upper border. Please be
aware that this may change the output for other key types as well.
---
key.c | 12 ++++++++----
1 file changed, 8 insertions(+), 4 deletions(-)
diff --git a/key.c
2019 Sep 06
2
[PATCH 1/1] log: do not print carriage return
From: Christian Hesse <mail at eworm.de>
Logging to stderr results in line endings being terminated with carriage
return (\r) and new line (\n). While this is fine for terminals it may
have undesired effects when running from crond and logging to syslog
or similar.
I run ssh from cron on an recent linux host. Viewing logs with
journalctl I see:
Sep 06 16:50:01 linux CROND[152575]: [96B
2013 Nov 11
2
Boot iPXE from syslinux/isolinux
On 11/11/2013 04:09 AM, Christian Hesse wrote:
>>
>> Let be know if you need any more info.
>
> Is anybody working on this? Is there a bug tracker I should report
> this to so it does not get forgotten? Could not find one for
> syslinux.
>
Hm... it is odd that 03dda0f1 etc. didn't fix this.
Since this is extremely likely to be dependent on the memory map, this
2015 Jul 06
7
[PATCH 1/1] paint visual host key with unicode box-drawing characters
From: Christian Hesse <mail at eworm.de>
Signed-off-by: Christian Hesse <mail at eworm.de>
---
sshkey.c | 47 ++++++++++++++++++++++++++++++++++++-----------
1 file changed, 36 insertions(+), 11 deletions(-)
diff --git a/sshkey.c b/sshkey.c
index cfe5980..47511c2 100644
--- a/sshkey.c
+++ b/sshkey.c
@@ -44,6 +44,9 @@
#include <stdio.h>
#include <string.h>
#include
2015 Jul 06
2
[PATCH 1/1] paint visual host key with unicode box-drawing characters
Le 06/07/15 12:33, Alex Bligh a ?crit :
> On 6 Jul 2015, at 11:05, Christian Hesse <list at eworm.de> wrote:
>
>> +#ifdef HAVE_LOCALE_H
>> + char *locale;
>> + char *border_utf8[] = { "?", "?", "?", "?", "?", "?" };
>> +#endif
>> + char *border_ascii[] = { "+", "-",
2015 Jul 06
3
[PATCH v2 1/1] paint visual host key with unicode box-drawing characters
From: Christian Hesse <mail at eworm.de>
Signed-off-by: Christian Hesse <mail at eworm.de>
---
log.c | 2 +-
sshkey.c | 77 +++++++++++++++++++++++++++++++++++++++++++++++-----------------
2 files changed, 58 insertions(+), 21 deletions(-)
diff --git a/log.c b/log.c
index 32e1d2e..90c1232 100644
--- a/log.c
+++ b/log.c
@@ -444,7 +444,7 @@ do_log(LogLevel level, const char *fmt,
2014 Jan 29
2
tests: multiplex.sh fails on i686
Hello everybody,
compiled openssh git master (6f917ad) on i686 without problems, but tests
fail:
[...]
run test multiplex.sh ...
test connection multiplexing: envpass
test connection multiplexing: transfer
scp: failed copy /tmp/openssh-git/src/openssh/regress/data
cmp: /tmp/openssh-git/src/openssh/regress/copy: No such file or directory
scp: corrupted copy of
2015 Nov 15
0
[Bug 1699] [patch] Enhance SSH to automatically add keys to ssh-agent
https://bugzilla.mindrot.org/show_bug.cgi?id=1699
joshua stein <jcs at openbsd.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |jcs at openbsd.org
Status|NEW |RESOLVED
Resolution|---