Displaying 20 results from an estimated 600 matches similar to: "Disallow some sftp commands"
2006 May 15
1
[PATCH 8/12] openssh-4.3p2 return code check bugs
The get_handle function can return a negative value. The variable that
value is assigned to is eventually passed to handle_close which uses the
value as an array index thus not being able to handle negative values.
This patch adds the return code check and provides an appropriate error
exit in the event of a negative return code. This entire set of patches
passed the regression tests on my
2001 Jun 20
1
SFTP Logging Redux.
Sorry to repost, but I finally have the code on a machine that has
diff -u, and I've updated it for 2.9p2. Attached is the unified
diff to add logging of SFTP activity to auth.info.
If there is a more proper way to contrib patches, please let me
know.
Cheers,
Jason
# "Jason A. Dour" <jason at dour.org> http://dour.org/
# Founder / Executive Producer - PJ
2002 Mar 15
4
PATCH: sftp-server logging.
This is another take on logging for sftp-server. Given the number
of private email requests I've received for this patch, I assume
there is signifigant enough interest to request it be reviewed for
inclusion into the release.
The patch is against 3.1p1, and is completely disabled by default.
To enable logging, one must use compile time directives
(-DSFTP_LOGGING). This was done due to prior
2007 Nov 11
1
ftp-server patch - restrict user to directory
Hi,
please find a patch against openssh-4.7p1
This patch:
1) Allows for an optional configuration file
2) Allows a user to be restricted to a directory and it's children.
Enjoy
--
Alain Williams
Linux Consultant - Mail systems, Web sites, Networking, Programmer, IT Lecturer.
+44 (0) 787 668 0256 http://www.phcomp.co.uk/
Parliament Hill Computers Ltd. Registration Information:
2003 Feb 05
2
Minor races in sftp-server.c
There are a couple of races in sftp-server as this patch shows:
--- sftp-server.c 28 Jan 2003 18:06:53 -0000 1.1.1.2
+++ sftp-server.c 5 Feb 2003 19:19:42 -0000
@@ -832,19 +832,22 @@
process_rename(void)
{
u_int32_t id;
- struct stat st;
char *oldpath, *newpath;
- int ret, status = SSH2_FX_FAILURE;
+ int status;
id = get_int();
oldpath = get_string(NULL);
newpath = get_string(NULL);
2002 Nov 05
0
[PATCH] Add readonly mode to scp, sftp_server
This patch adds a readonly mode to scp and sftp_server. This allows clients
to only read files from the server, but not to write them.
Patch is based on OpenSSH 3.4p1
*** scp.c@@\main\1 Tue Oct 1 17:25:16 2002
--- scp.c Wed Oct 2 06:05:14 2002
***************
*** 122,127 ****
--- 122,130 ----
/* This is set to zero if the progressmeter is not desired. */
int showprogress = 1;
+ /* deny
2002 Nov 05
0
[PATCH] Add getlink command to sftp
One of the features missing in sftp is the ability to transfer a symlink.
This patch adds a new command to sftp which performs this transfer. Note
that it uses messages that already exist in the protocol between client and
server.
This diff is based on OpenSSH 3.4p1.
*** sftp-client.c@@\main\1 Tue Oct 1 17:26:20 2002
--- sftp-client.c Wed Oct 23 15:57:34 2002
***************
*** 666,672 ****
2024 Aug 01
1
sftp can't preserve uploaded mtime: fsetstat: No such file or directory
On Wed, 31 Jul 2024, ilya Basin wrote:
> I've just tried that. It still fails.
>
> Is it possible to dump the decrypted sftp commands? I tried -vvv but found nothing interesting.
Try
Subsystem sftp /usr/libexec/sftp-server -l debug3
in sshd_config
> The Total Commander plugin calls:
>
> libssh2_sftp_setstat(ConnectSettings->sftpsession,
>
2009 Feb 12
2
[patch] hard link protocol extension for sftp
Here's a patch that adds support for the creation of hard links over
SFTP.
Hard links are not used very often nowdays, but they do still have
their uses and this is currently the most often requested improvement
for SSHFS.
To detect hard links the st_nlink, st_dev and st_ino attributes are
usually used. I'll also post patches adding extensions for these and
other attributes.
Please
2024 Jul 31
1
sftp can't preserve uploaded mtime: fsetstat: No such file or directory
On 31/07/2024 16:28, ilya Basin wrote:
> I use openssh-client 1:8.9p1-3ubuntu0.6 and I'm trying to upload files to EFT Server.
>
> Previously I was using Total Commander with SFTP plugin and it does preserve mtime.https://www.ghisler.com/plugins.htm
>
> When I try to do the same from command line it fails.
>
> $ sftp -p user at server <<< 'put
2024 Jul 31
1
sftp can't preserve uploaded mtime: fsetstat: No such file or directory
I've just tried that. It still fails.
Is it possible to dump the decrypted sftp commands? I tried -vvv but found nothing interesting.
The Total Commander plugin calls:
libssh2_sftp_setstat(ConnectSettings->sftpsession,
thename,&attr)
What does the command line client use?
-------- Original Message --------
From: Brian Candler [mailto:b.candler at pobox.com]
Sent:
2006 Aug 19
0
[PATCH] add atomic rename extension to sftp-server
This is needed to be able to support a rename() operation conforming
to POSIX in the SSH filesystem.
With the rename operation defined in the SFTP spec, this is
impossible, since in case the target exists it's not possible to
perform the rename+unlink atomically.
Miklos
Index: ssh/sftp-server.c
===================================================================
--- ssh.orig/sftp-server.c
2012 Oct 23
4
Disable rm on sftp
Hi,
Thanks a lot for this great software :)
I'm trying to do something to secure my server. I need to disable removing
file or removing directory using SFTP. In other words, the user can only
write, move but not delete the file. This will be used to store logs so, I
need to make sure once the logs written to my server the user cannot remove
it.
I tried doing this by changing the code of
2024 Jul 31
1
sftp can't preserve uploaded mtime: fsetstat: No such file or directory
Hi.
I use openssh-client 1:8.9p1-3ubuntu0.6 and I'm trying to upload files to EFT Server.
Previously I was using Total Commander with SFTP plugin and it does preserve mtime. https://www.ghisler.com/plugins.htm
When I try to do the same from command line it fails.
$ sftp -p user at server <<< 'put MRW_PM_Series_17146_PSSF_T1_HB.zip "/0_GLS to be
2024 Aug 02
1
sftp can't preserve uploaded mtime: fsetstat: No such file or directory
> On Aug 2, 2024, at 00:32, ilya Basin <basinilya at gmail.com> wrote:
>
> Looks like EFT doesn't support SSH2_FXP_FSETSTAT (working with a file handle), but it does support SSH2_FXP_SETSTAT (working with a file path). OpenSSH sftp only uses SSH2_FXP_FSETSTAT for directories. It doesn't have a separate "touch" command to set mtime for a path and its
2001 May 24
1
chroot sftp-server [PATCH]
I'm working on setting up a semi-trusted sftp service, and to get it
working, I need chroot capability.
I've taken the /./ wuftpd magic token code from contrib/chroot.diff and
put it into the sftp server. The main problem is that privileges have
been dropped by the time the subsystem is exec'ed, so my patch requires
that sftp-server be setuid root. Not ideal, I know, but I drop all
2002 Nov 05
2
[PATCH] fix sftp to preserve permissions and uid/gid
Sftp fails to correctly preserve permissions when fetching a file. It adds
write permission for the owner (presumably so it can write the file).
Sftp also fails to preserve the uid/gid. Added code so that if is running
as root, uid and gid are preserved.
patch is based on Openssh 3.4p1.
*** sftp-client.c@@\main\1 Tue Oct 1 17:26:20 2002
--- sftp-client.c Tue Nov 5 10:22:52 2002
2004 Oct 25
1
Bug in sftp's chmod
Hi,
I've discovered that on OpenSSH_3.6.1p1 (the latest SSH available on
OSX, but I've also tried a couple of different linux distributions),
when you 'sftp' to it, and try to 'chmod' some file or directory, only
last three octal digits do actually matter.
Example:
sftp sshtest at localhost
Connecting to localhost...
sshtest at localhost's password:
sftp> ls -l
2017 Dec 23
1
Question about disabling UFO on guest
Hello everyone,
I would like to ask a question regarding to disable UFO of virtio vNIC in
my guest. I have read the document at https://libvirt.org/formatdomain.html
*host*
The csum, gso, tso4, tso6, ecn and ufo attributes with possible
values on and off can be used to turn off host offloading options. By
default, the supported offloads are enabled by QEMU. *Since 1.2.9 (QEMU
only)* The
2015 Mar 06
2
Call for testing: OpenSSH 6.8
On Wed, 4 Mar 2015, mikep at noc.utoronto.ca wrote:
> Re-testing 'openssh-SNAP-20150305' on Solaris 10, with 'gcc':
>
> Configure, 'make' complete; 'make tests' fails at:
>
> postcondition check failed: setstat readonly
I couldn't reporoduce this on an illumos zone that I had access to,
will try installing solaris10 next.
-d