Displaying 20 results from an estimated 100 matches similar to: "Status of SCP vulnerability"
2004 Aug 31
1
[PATCH] supporting a remote scp path option in scp
Hi there,
I've written some enhancements to scp.c and pathnames.h to enable the scp
to arbitrarily set the remote scp path.
(eg $ scp -e /usr/bin/scp foo user at bar:foo)
I did read the "scp: command not found" FAQ entry but I'm not quite sure
why we can't do this, unless it's because enhancements to scp are no
longer a priority. Any other reason why it "is the
2010 Nov 19
3
File Offsets for SCP (patch)
I don't know if anyone would be interested in this but I'm including a
patch to allow for offsets when transferring files with SCP.
It's pretty simple and assumes the user knows what they are doing (for
example, if transferring with a wild card the offset would apply to all
files). -A is the number of bytes offset from the beginning of the
files. -Z is the number of bytes inset
2006 Jan 25
14
[Bug 1094] Local to local copy (and also remote to remote) uses shell expansion twice
http://bugzilla.mindrot.org/show_bug.cgi?id=1094
vapier at gentoo.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |vapier at gentoo.org
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the
2017 Aug 04
4
Filter files received on scp server
Hey,
So, I would be looking at type A. Forgive me if my understanding of how OpenSSH operates is not reflective of reality. I am assuming that, the file transfer is happening somewhat logically, with a name being known, content written, blah blah.
>From reading scp.c, it appears that, the client end at least knows the file name so I must assume the server end must be given it.
I am hoping to
2019 Feb 08
12
[Bug 2966] New: scp rev 1.202 fix doesn't quite hit the mark
https://bugzilla.mindrot.org/show_bug.cgi?id=2966
Bug ID: 2966
Summary: scp rev 1.202 fix doesn't quite hit the mark
Product: Portable OpenSSH
Version: 7.9p1
Hardware: Other
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: scp
Assignee: unassigned-bugs at
2019 Feb 08
12
[Bug 2966] New: scp rev 1.202 fix doesn't quite hit the mark
https://bugzilla.mindrot.org/show_bug.cgi?id=2966
Bug ID: 2966
Summary: scp rev 1.202 fix doesn't quite hit the mark
Product: Portable OpenSSH
Version: 7.9p1
Hardware: Other
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: scp
Assignee: unassigned-bugs at
2000 Dec 18
2
scp remote path specification
Hello,
in order to use "scp", the scp binary has to be in the compile-time
default path on the remote host. For some users (like root), we try to
avoid this since scp may be on a network file system (AFS/NFS), and we
don't want to hang root's session on network outages.
Would a patch to scp be acceptable in the main tree that allows to set
the path to remote scp explicity,
2006 Apr 20
8
Whats the best way to do this?
I have an archive that can have 0 or more extra files associated with
it.
I would like to be able to edit the associated files info on the same
page as the archive info.
Listing the extra files info to the edit form is simple enough, but How
do I form the text input fields for easy (or automatic) pick-up in the
update?
Or am I barking up the wrong tree here?
--
Posted via
2001 May 12
4
Erase the source file open; specify a tempfile name option
I'm curious how to go about submitting a suggestion that affects both
the original BSD version and the portable release. A few days ago I
sent off a BSD-relative patch to openssh at openssh.com. Is this the right
thing to do? I didn't hear anything back, but it's only been 3 days, so
I'm probably just being too antsy.
In the meantime, maybe someone else out there would like to
2001 Apr 02
1
[PATCH]: scp could hang in Cygwin
Hi,
attached is a patch which solves the following problem:
Sometimes scp could hang in Cygwin when used as remote end using
the -t option. This is due to a binmode/textmode problem which
could be raised by the login shell which is used by the user and
it's setting of textmode on stdin. The patch solves that problem
by explicitly setting binmode on stdin.
Besides solving the hanging
2001 Jul 22
1
[patch] add -1 and -2 options to scp
Hi,
Several people have asked that scp support the -1 and -2 options, so I
wrote this patch.
Cheers,
Matthew
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: scp.diff
Url: http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20010722/7e096fab/attachment.ksh
-------------- next part --------------
--
"At least you know
2002 Jul 13
0
[PATCH]: scp program improved
Hi,
I have made a patch which improves scp utility. It adds two new features:
rate limit and resume support. With rate limit it's possible to limit
transfer speed. Resume allows to continue file transfer where it was last
interrupted. Also the progress meter was improved.
Here is my patch, please send comments about it and what I can do better
if there is something to fix.
---
2002 Jan 27
5
[PATCH] Add scp -1 and -2 options to OpenSSH-3.0.2p1
Here is a patch to add the missing scp -1 and -2 options to eliminate
confusion for users familiar with the commercial version of SSH.
This patch and others are maintained on the secure nfs (SNFS) web page:
http://www.math.ualberta.ca/imaging/snfs/
-- John Bowman
University of Alberta
diff -ur openssh-3.0.2p1/scp.c openssh-3.0.2p1J2/scp.c
--- openssh-3.0.2p1/scp.c Sun Oct 21 18:53:59 2001
+++
2006 May 14
1
scp patch to delete source files after copy
At work we have a large collection of scripts to move log
and config files around. These depend on commercial (F-Secure)
ssh/scp, as it supports the -u option to delete the source file
after (successful) copying. That is the sole reason we can't
run openssh on our 150+ unix boxes.
I have attached a patch below, which adds the -u option to
delete the source file after copying, provided there
2012 Aug 19
3
Bug Report and patch fix
Hi
I found this issue in scp in the following blog link
http://oldpapyrus.wordpress.com/2012/08/08/scp-a-funny-error/
when the wrong local file name is specified in local to remote transfer
mode, scp first tries to establish the connection rather than to check
first whether the file is proper or not.
However I could not find a reported bug for this. I am attaching the fix as
patch for this
2008 Jan 15
2
Feature Request: Options to limit --one-file-system at the source or destination.
Greetings.
Currently, the --one-file-system applies to both the source and
destination and this is a problem.
In my source, I have a symlink pointing to a directory on another
device which I would like to have copied. I thus use
--copy-unsafe-links.
I also use --delete. This is dangerous because if there is a bug in
my script, I would not like the destination to become suddenly
2000 Jul 20
3
scp over 2 hosts
Hi folks,
I have the that I must copy some through a Plag-Gateway of a Firewall over 2 host. A secure connection via "ssh - t hosta ssh -t hostb" works fine, but does this work with scp too? Icould not realize it either with scp (1.2.27 of ssh.com) or scp from openssh. Do you have any ideas?
Thanks
Stephan
2009 Feb 04
2
lua assist
Hello,
For Lua inclusion in Syslinux an idea to ship with an com32/lua/assist
directory and an com32/lua/patches directory.
In the patches directory patches against a pristine lua tarball
and the assist dir contains scripts for further tayloring.
This is what I have in mind:
| milleune at inertia:~
| $ git clone http://www.stappers.it/tracking/syslinux/.git syslinux-lua-stappers
| milleune at
2003 Sep 10
3
[PATCH] No extern declarations of optarg & co if getopt.h is available
Hi,
I have a problem with the extern declarations of optarg, optind, etc.
We're currently moving getopt from being a statically linked function
to a dynamically linked function as part of the Cygwin DLL. On Windows,
this requires to generate special symbols (__imp__optarg, etc.), which
is done by marking the exported variables in the corresponding header.
Instead of
extern char *optarg;
2001 Feb 06
4
argv[0] => host feature considered harmful
OpenSSH still has this feature, SSH-1.2.27 no longer has it. Admittedly it
can be useful sometimes, even though I'd prefer this to be done using a
trivial shell wrapper, which would be the UNIX way of doing things.
Not being able to call OpenSSH's ssh by another name (say ``ssh1'') can get in
the way when having to maintain two versions of ssh in parallel because the
``ssh ->