Displaying 20 results from an estimated 11000 matches similar to: "DEFAULT_PKCS11_WHITELIST on 64-bit Linux systems"
2017 Jan 03
2
DEFAULT_PKCS11_WHITELIST on 64-bit Linux systems
On 12/30/2016 02:40 AM, Damien Miller wrote:
> On Wed, 28 Dec 2016, Iain Morgan wrote:
>
>> Hello,
>>
>> On RHEL 6/amd64, the stock value for DEFAULT_PKCS11_WHITELIST is not
>> very useful. On such systems, /usr/lib64/* would need to be added to the
>> pattern list. Although users can specify the -P option every time they
>> launch ssh-agent, it might be
2017 Oct 26
3
[RFC 0/2] add engine based keys
Engine keys are private key files which are only understood by openssl
external engines. ?The problem is they can't be loaded with the usual
openssl methods, they have to be loaded via ENGINE_load_private_key().
?Because they're files, they fit well into openssh pub/private file
structure, so they're not very appropriately handled by the pkcs11
interface because it assumes the private
2007 Sep 25
9
OpenSSH PKCS#11merge
[[Sending again, as for some strange reason it is not accepted]]
Hello OpenSSH developers,
I maintain external patch for PKCS#11 smartcard support into
OpenSSH[1] , many users already apply and use this patch.
I wish to know if anyone is interesting in working toward merging this
into mainline.
I had some discussion with Damien Miller, but then he disappeared.
Having standard smartcard
2015 Mar 26
2
FYI: SSH1 now disabled at compile-time by default
No, I just think 15 years or so is more than enough time to have
addressed the issue.
On Thu, Mar 26, 2015 at 14:05:08 -0700, Dan Kaminsky wrote:
> So, this isn't your problem and you don't respect the people's whose
> problem it is.
>
> On Thu, Mar 26, 2015 at 12:43 PM, Iain Morgan <imorgan at nas.nasa.gov> wrote:
>
> > On Thu, Mar 26, 2015 at 11:55:18
2014 Nov 05
17
[Bug 2305] New: sshd does not accept @cert-authority when doing host based authentication.
https://bugzilla.mindrot.org/show_bug.cgi?id=2305
Bug ID: 2305
Summary: sshd does not accept @cert-authority when doing host
based authentication.
Product: Portable OpenSSH
Version: 6.5p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component:
2008 May 09
4
[Bug 1462] New: Unaligned access warnings on IA64 when using umac-64
https://bugzilla.mindrot.org/show_bug.cgi?id=1462
Summary: Unaligned access warnings on IA64 when using umac-64
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.0p1
Platform: Itanium2
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo:
2015 Mar 26
4
FYI: SSH1 now disabled at compile-time by default
On Thu, Mar 26, 2015 at 11:55:18 -0700, Dan Kaminsky wrote:
> You're right. My argument the is the next build of OpenSSH should be
> OpenSSH 7, and the one after that 8, then 9, then 10. No minor releases?
> Sure, go ahead. Deprecate the point,
>
> Do you manage any machines running SSHv1?
>
If by "running" you mean accepting SSH1, of course not. From a
2018 Nov 02
2
[BUG?] sftp is echoing back prompt and commands in batch mode
Thanks, Iain.
I am willing to hear from other users whether anyone else sees this as a
bug before filing it.
--
Vincenzo Romano
Il giorno ven 2 nov 2018, 20:03 Iain Morgan <imorgan at nas.nasa.gov> ha
scritto:
> If you truly intend this as a bug report, you should file it at
> bugzilla.mindrot.org.
>
> On Fri, Nov 02, 2018 at 12:25:22 +0100, Vincenzo Romano wrote:
> >
2018 Jul 05
3
trying to resurrect discussion about "Cannot signal a process over a channel (rfc 4254, section 6.9)"
> At one point, I had wondered about separating out the client and server
> support as well. At first glance, that would seem to help move things
> forward and would address most of the reported use cases. However, I
> have some users who would need the client support as well.
>
> I suspect that adding the server support first might be a problem for
> the developers. Such a
2013 Apr 17
1
[Bug 1039] Incomplete application of HostKeyAlias in ssh
https://bugzilla.mindrot.org/show_bug.cgi?id=1039
Iain Morgan <imorgan at nas.nasa.gov> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |imorgan at nas.nasa.gov
--- Comment #13 from Iain Morgan <imorgan at nas.nasa.gov> ---
My apologies for
2002 May 24
1
whitelist
I looked at the 1.3 whitelist documentation and realized that the ops
example, while interesting in and of itself, did not do what I think a
whitelist does. Back to symmetry, if a blacklist is a list of sites not
allowed to connect in through the fire wall, maybe to a web server, for
example, then a whitelist should be a list of machines that are allowed to
access a service or services, again,
2014 Mar 14
7
[Bug 2211] New: Too many hostbased authentication attempts
https://bugzilla.mindrot.org/show_bug.cgi?id=2211
Bug ID: 2211
Summary: Too many hostbased authentication attempts
Product: Portable OpenSSH
Version: 6.5p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee: unassigned-bugs at
2013 Jul 31
1
openssh-unix-dev Digest, Vol 123, Issue 13
>
> Message: 8
> Date: Tue, 30 Jul 2013 12:46:50 -0700
> From: Iain Morgan <imorgan at nas.nasa.gov>
> To: Damien Miller <djm at mindrot.org>
> Cc: "openssh-unix-dev at mindrot.org" <openssh-unix-dev at mindrot.org>
> Subject: Re: Call for testing: OpenSSH-6.3
> Message-ID: <20130730194649.GC18047 at linux124.nas.nasa.gov>
>
2015 Jun 13
6
C5 : Firefox 38 bug
On 06/12/2015 12:18 PM, Jonathan Billings wrote:
> On Sat, Jun 13, 2015 at 12:05:16PM -0600, jd1008 wrote:
>> Mark, please be aware that noscript has also a whitelist
>> that is not viewable by the user.
>> The whitelist tab does NOT list the hidden white listed
>> entries.
> You mean the noscript.mandatory about:config entry? I looked at it on
> my computer and
2006 Nov 21
1
QMAIL - RBLSMTP - HOW to WHITELIST
Dear Friend,
I done configuration using RBLSMTPD with WHITELIST, but I don't know it
is correct.
Please check files below are corrects.
Thanks
Adriano
=== FILE WHITELIST.DOMINIO.RBL. ====
$ttl 900
whitelist.dominio.rbl. IN SOA host1.xxxxxx.com. root.xxxxx.com. (
2006112002 ; serial;
3600 ; refresh period (1 hora);
900 ; retry time (15 minutos);
1800 ; expire tiem (30 minutos);
900 ;
2010 Jul 15
13
[Bug 1798] New: Add fsync() support to sftp/sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1798
Summary: Add fsync() support to sftp/sftp-server
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: sftp-server
AssignedTo: unassigned-bugs at mindrot.org
2017 Sep 29
2
Call for testing: OpenSSH 7.6
On 29 September 2017 at 11:05, Iain Morgan <imorgan+openssh at nas.nasa.gov> wrote:
[...]
> This is due to my shell being csh, which is pickier about undefined
> variables than the Bourne-style shells. The attached patch fixes the
> issue.
Thanks for figuring this out.
> - 'test -z "$SSH_USER_AUTH"' || fail "SSH_USER_AUTH present"
> +
2010 Jun 07
3
X509 based certificate authentication in OpenSSH
Hello,
I would like to know whether OpenSSH supports x509 certificate based
authentication.
It looks like OpenSSH has dependency on OpenSSL so does this mean that
OpeSSH also supports x509 certificate based authentication.
If it does support, can you please point me to the necessary
documentation.
Thanks
Naitik
2015 Jun 13
5
C5 : Firefox 38 bug
On 06/12/2015 12:27 PM, Valeri Galtsev wrote:
> On Sat, June 13, 2015 1:22 pm, jd1008 wrote:
>>
>> On 06/12/2015 12:18 PM, Jonathan Billings wrote:
>>> On Sat, Jun 13, 2015 at 12:05:16PM -0600, jd1008 wrote:
>>>> Mark, please be aware that noscript has also a whitelist
>>>> that is not viewable by the user.
>>>> The whitelist tab does NOT
2013 Aug 01
5
[Bug 2137] New: progress meter shows wrong speed during resume
https://bugzilla.mindrot.org/show_bug.cgi?id=2137
Bug ID: 2137
Summary: progress meter shows wrong speed during resume
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: minor
Priority: P5
Component: sftp
Assignee: unassigned-bugs at