similar to: Status of SCP vulnerability

Displaying 20 results from an estimated 100 matches similar to: "Status of SCP vulnerability"

2004 Aug 31
1
[PATCH] supporting a remote scp path option in scp
Hi there, I've written some enhancements to scp.c and pathnames.h to enable the scp to arbitrarily set the remote scp path. (eg $ scp -e /usr/bin/scp foo user at bar:foo) I did read the "scp: command not found" FAQ entry but I'm not quite sure why we can't do this, unless it's because enhancements to scp are no longer a priority. Any other reason why it "is the
2010 Nov 19
3
File Offsets for SCP (patch)
I don't know if anyone would be interested in this but I'm including a patch to allow for offsets when transferring files with SCP. It's pretty simple and assumes the user knows what they are doing (for example, if transferring with a wild card the offset would apply to all files). -A is the number of bytes offset from the beginning of the files. -Z is the number of bytes inset
2006 Jan 25
14
[Bug 1094] Local to local copy (and also remote to remote) uses shell expansion twice
http://bugzilla.mindrot.org/show_bug.cgi?id=1094 vapier at gentoo.org changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |vapier at gentoo.org ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the
2017 Aug 04
4
Filter files received on scp server
Hey, So, I would be looking at type A. Forgive me if my understanding of how OpenSSH operates is not reflective of reality. I am assuming that, the file transfer is happening somewhat logically, with a name being known, content written, blah blah. >From reading scp.c, it appears that, the client end at least knows the file name so I must assume the server end must be given it. I am hoping to
2019 Feb 08
12
[Bug 2966] New: scp rev 1.202 fix doesn't quite hit the mark
https://bugzilla.mindrot.org/show_bug.cgi?id=2966 Bug ID: 2966 Summary: scp rev 1.202 fix doesn't quite hit the mark Product: Portable OpenSSH Version: 7.9p1 Hardware: Other OS: All Status: NEW Severity: enhancement Priority: P5 Component: scp Assignee: unassigned-bugs at
2019 Feb 08
12
[Bug 2966] New: scp rev 1.202 fix doesn't quite hit the mark
https://bugzilla.mindrot.org/show_bug.cgi?id=2966 Bug ID: 2966 Summary: scp rev 1.202 fix doesn't quite hit the mark Product: Portable OpenSSH Version: 7.9p1 Hardware: Other OS: All Status: NEW Severity: enhancement Priority: P5 Component: scp Assignee: unassigned-bugs at
2000 Dec 18
2
scp remote path specification
Hello, in order to use "scp", the scp binary has to be in the compile-time default path on the remote host. For some users (like root), we try to avoid this since scp may be on a network file system (AFS/NFS), and we don't want to hang root's session on network outages. Would a patch to scp be acceptable in the main tree that allows to set the path to remote scp explicity,
2006 Apr 20
8
Whats the best way to do this?
I have an archive that can have 0 or more extra files associated with it. I would like to be able to edit the associated files info on the same page as the archive info. Listing the extra files info to the edit form is simple enough, but How do I form the text input fields for easy (or automatic) pick-up in the update? Or am I barking up the wrong tree here? -- Posted via
2001 May 12
4
Erase the source file open; specify a tempfile name option
I'm curious how to go about submitting a suggestion that affects both the original BSD version and the portable release. A few days ago I sent off a BSD-relative patch to openssh at openssh.com. Is this the right thing to do? I didn't hear anything back, but it's only been 3 days, so I'm probably just being too antsy. In the meantime, maybe someone else out there would like to
2001 Apr 02
1
[PATCH]: scp could hang in Cygwin
Hi, attached is a patch which solves the following problem: Sometimes scp could hang in Cygwin when used as remote end using the -t option. This is due to a binmode/textmode problem which could be raised by the login shell which is used by the user and it's setting of textmode on stdin. The patch solves that problem by explicitly setting binmode on stdin. Besides solving the hanging
2001 Jul 22
1
[patch] add -1 and -2 options to scp
Hi, Several people have asked that scp support the -1 and -2 options, so I wrote this patch. Cheers, Matthew -------------- next part -------------- An embedded and charset-unspecified text was scrubbed... Name: scp.diff Url: http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20010722/7e096fab/attachment.ksh -------------- next part -------------- -- "At least you know
2002 Jul 13
0
[PATCH]: scp program improved
Hi, I have made a patch which improves scp utility. It adds two new features: rate limit and resume support. With rate limit it's possible to limit transfer speed. Resume allows to continue file transfer where it was last interrupted. Also the progress meter was improved. Here is my patch, please send comments about it and what I can do better if there is something to fix. ---
2002 Jan 27
5
[PATCH] Add scp -1 and -2 options to OpenSSH-3.0.2p1
Here is a patch to add the missing scp -1 and -2 options to eliminate confusion for users familiar with the commercial version of SSH. This patch and others are maintained on the secure nfs (SNFS) web page: http://www.math.ualberta.ca/imaging/snfs/ -- John Bowman University of Alberta diff -ur openssh-3.0.2p1/scp.c openssh-3.0.2p1J2/scp.c --- openssh-3.0.2p1/scp.c Sun Oct 21 18:53:59 2001 +++
2006 May 14
1
scp patch to delete source files after copy
At work we have a large collection of scripts to move log and config files around. These depend on commercial (F-Secure) ssh/scp, as it supports the -u option to delete the source file after (successful) copying. That is the sole reason we can't run openssh on our 150+ unix boxes. I have attached a patch below, which adds the -u option to delete the source file after copying, provided there
2012 Aug 19
3
Bug Report and patch fix
Hi I found this issue in scp in the following blog link http://oldpapyrus.wordpress.com/2012/08/08/scp-a-funny-error/ when the wrong local file name is specified in local to remote transfer mode, scp first tries to establish the connection rather than to check first whether the file is proper or not. However I could not find a reported bug for this. I am attaching the fix as patch for this
2008 Jan 15
2
Feature Request: Options to limit --one-file-system at the source or destination.
Greetings. Currently, the --one-file-system applies to both the source and destination and this is a problem. In my source, I have a symlink pointing to a directory on another device which I would like to have copied. I thus use --copy-unsafe-links. I also use --delete. This is dangerous because if there is a bug in my script, I would not like the destination to become suddenly
2000 Jul 20
3
scp over 2 hosts
Hi folks, I have the that I must copy some through a Plag-Gateway of a Firewall over 2 host. A secure connection via "ssh - t hosta ssh -t hostb" works fine, but does this work with scp too? Icould not realize it either with scp (1.2.27 of ssh.com) or scp from openssh. Do you have any ideas? Thanks Stephan
2009 Feb 04
2
lua assist
Hello, For Lua inclusion in Syslinux an idea to ship with an com32/lua/assist directory and an com32/lua/patches directory. In the patches directory patches against a pristine lua tarball and the assist dir contains scripts for further tayloring. This is what I have in mind: | milleune at inertia:~ | $ git clone http://www.stappers.it/tracking/syslinux/.git syslinux-lua-stappers | milleune at
2003 Sep 10
3
[PATCH] No extern declarations of optarg & co if getopt.h is available
Hi, I have a problem with the extern declarations of optarg, optind, etc. We're currently moving getopt from being a statically linked function to a dynamically linked function as part of the Cygwin DLL. On Windows, this requires to generate special symbols (__imp__optarg, etc.), which is done by marking the exported variables in the corresponding header. Instead of extern char *optarg;
2001 Feb 06
4
argv[0] => host feature considered harmful
OpenSSH still has this feature, SSH-1.2.27 no longer has it. Admittedly it can be useful sometimes, even though I'd prefer this to be done using a trivial shell wrapper, which would be the UNIX way of doing things. Not being able to call OpenSSH's ssh by another name (say ``ssh1'') can get in the way when having to maintain two versions of ssh in parallel because the ``ssh ->