Displaying 20 results from an estimated 3000 matches similar to: "deprecated options in sshd_config"
2018 Feb 23
2
deprecated options in sshd_config
Le 23/02/2018 ? 12:42, Colin Watson a ?crit?:
> On Fri, Feb 23, 2018 at 11:46:31AM +0100, mlrx wrote:
>> I jumped from an OS to an other since few days. On the new one,
>> openssh comes in a much newer version (good thing): 7.6p1
>> sshd lets me know that there are two depreciated options:
>> - KeyRegenerationInterval
>> - UsePrivilegeSeparation
>>
>> I
2008 Oct 16
2
5.1p on RHEL 3 and password expiration
[ Sorry for the length of this; I felt it better to provide potentially
too much info, rather than not enough. I've probably missed something
that's important, though! ]
I have an odd problem with 5.1p on RHEL3 if "UsePAM yes" and
"UsePrivilegeSeparation no" is set. The code detects that the user
password is aged (according to shadow) but then fails to let me
2003 Nov 13
1
SSHD password authentication issue in 4.9-RELEASE and 5.1-RELEASE
Wonder if you guys could help me out...have a security problem with sshd
wich enables a user to do a password login tough the sshd_config states
PasswordAuthentication no
My config works fine in both gentoo and openbsd 3.3 but users are able to
login with tunneled clear text passwords in both 4.9 and 5.1
Im lost.tried everything I can think of.
Here is the config:
2018 Apr 04
5
OpenSSH-Client without reverse tunnel ability
Good day!
A few weeks ago, we had a security breach in the company I'm working
for, because employees used "ssh -R" to expose systems from our internal
network to some SSH server in the outer world.
Of course, this is a breach of our internal security policy, but lead us
to wonder, whether there is a technical solution to prevent our users
from creating SSH-reverse-tunnels.
After
2006 Jun 20
1
unable to login with LDAP when set Uselogin to yes
Hi,
I am not sure this is a bug in Openssh or not.
I am running Openssh 4.1p1. with openssl 0.9.7g
Scenario:
Due to audit enabled on the system, I will need to set Uselogin to yes so
that audit will track system call.
But when try to login to system with a LDAP user. I get the following.
eg:
[n113839 at r3ent15pc ~]$ ssh tfstst1 -l ntesting1
ntesting1 at tfstst1's password:
Login incorrect
2020 Feb 25
2
Restrict SSH connections
Hi,
Is there a way to restrict the number of active SSH client connections to
an sshd server.
Thanks & Regards,
Amit
2006 Jan 20
1
openssh-4.2p1 + Pam question !
Hi there !
I have an issue with my OpenSSH + PAM configuration on a RedHat Advanced server 2..1
I want to authenticate users connecting to a server using ssh against a radius server. The radius client/server part works ok when I test it with some utilities.
I think I have a problem with my ssh which does not pass the username/password to my pam sshd module.
I have upgraded to openssh-4.2p1.
2011 Feb 20
1
initlog is deprecated
Hello Centos,
I am getting an error that I am not familiar with when I restart ssh.
[root at virtcent01:~] #service sshd restart
Stopping sshd: [ OK ]
Starting sshd:WARNING: initlog is deprecated and will be removed in a
future release
[ OK ]
[root at virtcent01:~] #
I was just
2002 Jul 03
1
[PATCH]: Change Cygwin contrib files to better support PrivSep
Hi,
the following patch patches the files in contrib/cygwin. The changes
are necessary to allow a better support of privilege separation.
On NT machines the script asks now if it should create a user called
"sshd" and all that. Additionally it creates the /etc/ssh_config
and /etc/sshd_config files follows the latest versions.
Would you mind to apply this to the official OpenSSH
2003 Sep 16
0
[PATCH] contrib/cygwin: ssh-host-config and README file update
Hi,
could anybody with check in privileges apply the following patch to the
contrib cygwin directory? It only updates ssh-host-config to create the
*_config files matching the latest versions in the top level dir and it
updates a version number in README.
Thanks in advance,
Corinna
Index: contrib/cygwin/README
===================================================================
RCS file:
2003 Feb 20
0
OpenSSH_3.5p1 server, PC clients cannot connect
I have setup an OpenSSH_3.5p1 ssh/sftp server on my
SunOS 4.1.4 box. I can ssh to it just fine. The problem
is SFTP from certain clients.
I can SFTP to it using my OpenSSH_3.5p1 sftp client. I
can SFTP to it from MacSFTP from MacSSH.org, version 1.0.5.
However, I have several clients that cannot connect. I have
had them try CuteFTP Pro v2, v3, WS_FTP Pro v7.62, PuTTy
pSFTP. None are able to
2003 Dec 16
11
[Bug 774] banner is displaying twice (/etc/issue)
http://bugzilla.mindrot.org/show_bug.cgi?id=774
Summary: banner is displaying twice (/etc/issue)
Product: Portable OpenSSH
Version: 3.7.1p1
Platform: All
OS/Version: Solaris
Status: NEW
Severity: security
Priority: P2
Component: sshd
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2011 Feb 15
1
[slightly OT] predict.randomForest and type=”prob”
Dear all ,
I would like to use the function randomForest to predict the probability
of relocation failure of a GPS collar as a function of several
environmental variables x (both factor and numeric: slope, vegetation,
etc.) on a given area. The response variable y is thus success
(0)/failure(1) of the relocation, and the sampling unit is the pixel of
a raster map. My aim is to build a map
2003 Jan 22
1
: Trellis plot
Hi all,
I would be grateful if anyone could help me with the following. I am using
nlme library and I am trying to do a trellis plot with an outer factor, but
I have an error message which I can't understand.
Here is the code :
> mydata <- groupedData(y ~ x | warren/rabbit, outer= ~ treatment,
data=mydata)
> plot(mydata)
# I obtain a plot with all rabbits displayed individually and
2017 Aug 06
3
deprecation of UsePrivilegeSeparation breaks container use cases
Hello,
there are emerging container services that restrict regular users to
launch containers under some random uid for security reasons. If such
user needs sshd in their container, they need to turn off
`UsePrivilegeSeparation` so that sshd is executed as the current uid
and not `root`.
I understand that privilege separation [1] is more than changing the
process uid. On the other hand, it is
2008 Dec 02
0
SSHD does not cleanup kerberos ticket while root logins
Hi all,
It looks like a bug for me, but I'd like to ask if someone has the same
problem. We are using OpenSSH 4.3p2 from Debian 4.0 (stable), but the
same problem is with original OpenSSH 4.3p2. When root logins with his
kerberos ticket and then logout, his ticket remains on the machine. I
found in source (sshd.c) in privsep_postauth function, that if root
logins then use_privsep is set to 0
2018 Apr 04
2
OpenSSH-Client without reverse tunnel ability
On 2018-04-04T17:27, mlrx <openssh-unix-dev at 18informatique.com> wrote:
> Le 04/04/2018 ? 13:32, Jan Bergner a ?crit?:
> > Good day!
> >
> > Is it possible to achieve this without nasty workarounds like wrapper
> > scripts monitoring the very-verbose output of SSH or doing DPI?
> > Alternatively, would it be possible to add a config option, allowing an
2014 May 15
1
[patch/cygwin] contrib/cygwin/ssh-host-config
Hi,
would you mind to apply the below patch? It fixes Cygwin's
ssh-host-config script in various ways:
- Remove old code to remove the "sshd/22" entry from /etc/services.
This code fixes a problem which only existed in installations which
are more than 10 years old.
- Handle the StrictMode setting interactively.
- Fix regular expressions looking for white spaces.
- Make the
2010 Jul 14
1
SFTP Chroot
HI:
I tried to deploy a SFTP server with chroot but when i tried to connnect the
client send the next error:
Write failed: Broken pipe
Couldn't read packet: Connection reset by peer
The sshd_conf file is the next:
-------------------------------------------------------------------
# Package generated configuration file
# See the sshd_config(5) manpage for details
# What ports, IPs and
2005 Oct 15
1
help with openssh
Can anybody help me with this : ?
I first generated rsa key with this :
ssh-keygen -t rsa -f /etc/ssh/ssh_host_rsa_key
then I went on to generate the DSA key too....(just incase my SSHD does not
like RSA).
ssh-keygen -t dsa -f /etc/ssh/ssh_host_dsa_key
and then I ran
root at 00_00_09_PECA_NP1:/usr/bin# sshd -d -d -d -d -d -d -d -d -d
debug3: RNG is ready, skipping seeding
debug2: