Displaying 20 results from an estimated 5000 matches similar to: "[Bug 2382] New: option to disable pid file with sshd"
2015 Apr 15
6
[Bug 2381] New: foreground mode for ssh-agent
https://bugzilla.mindrot.org/show_bug.cgi?id=2381
            Bug ID: 2381
           Summary: foreground mode for ssh-agent
           Product: Portable OpenSSH
           Version: 6.9p1
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: ssh-agent
          Assignee: unassigned-bugs at mindrot.org
2015 Jul 01
0
Announce: OpenSSH 6.9 released
OpenSSH 6.9 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches,
2020 Jun 01
2
would it be possible to extend TrustedUserCAKeys so that certain keys could not be used to authenticate a particular user?
Wondering if it would make sense to have more granular control of
trustedUserCAkeys?  I have 1 key used to sign root certs, the key is
shortlived, and is rotated daily.  And I have a 2nd key to sign non-
privileged user certs.  The non-privileged certs have a longer validity
period, and the signing keys are not rotated as frequently.  It would
be nice to ensure this second signing key's
2010 Apr 27
2
ssh certificate usage
I am trying to find out how I can use the new self-signed certificates
So what I read in the man pages, it should be something like:
client:
1) ssh-keygen -f ca_rsa	  # generate a ssh keypair for use as a certificate
Server(s):
2) make sure your /etc/ssh/sshd_config has TrustedUserCAKeys assigned
TrustedUserCAKeys  /etc/ssh/sshcakeys       # or whatever name or
location you like
3) edit
2020 Jan 30
3
SSH certificates - restricting to host groups
On Thu, Jan 30, 2020 at 7:11 AM Christian, Mark
<mark.christian at intel.com> wrote:
>
> On Thu, 2020-01-30 at 12:27 +0000, Brian Candler wrote:
> > As a concrete example: I want Alice to be able to login as "alice"
> > and
> > "www" to machines in group "webserver" (only). Also, I want Bob to
> > be
> > able to login as
2015 Jul 23
1
[Bug 2435] New: allow to pass socket to the agent over stdin
https://bugzilla.mindrot.org/show_bug.cgi?id=2435
            Bug ID: 2435
           Summary: allow to pass socket to the agent over stdin
           Product: Portable OpenSSH
           Version: 6.9p1
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: ssh-agent
          Assignee: unassigned-bugs
2005 Mar 28
17
[Bug 1004] X11 forwarding not working with ssh3.9p1 (Error: Can't open display)
http://bugzilla.mindrot.org/show_bug.cgi?id=1004
           Summary: X11 forwarding not working with ssh3.9p1 (Error: Can't
                    open display)
           Product: Portable OpenSSH
           Version: 3.9p1
          Platform: All
        OS/Version: Linux
            Status: NEW
          Severity: major
          Priority: P2
         Component: Miscellaneous
       
2006 Apr 08
1
[Bug 1180] Add finer-grained controls to sshd
http://bugzilla.mindrot.org/show_bug.cgi?id=1180
           Summary: Add finer-grained controls to sshd
           Product: Portable OpenSSH
           Version: -current
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: enhancement
          Priority: P2
         Component: sshd
        AssignedTo: bitbucket at mindrot.org
        ReportedBy: dtucker at
2015 Apr 13
4
[Bug 2379] New: [RFE] sshd Match based on my IP address
https://bugzilla.mindrot.org/show_bug.cgi?id=2379
            Bug ID: 2379
           Summary: [RFE] sshd Match based on my IP address
           Product: Portable OpenSSH
           Version: 6.9p1
          Hardware: All
                OS: Linux
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: sshd
          Assignee: unassigned-bugs at
2015 Jul 01
5
Announce: OpenSSH 6.9 released
OpenSSH 6.9 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches,
2008 Mar 02
1
Rsync sending complete file?
its installed and working but i have no idea what im doing wrong.
The command i'm using:
#rsync -rv /media/mir1/ /media/mir2/
Now this works, recursive and verbose.  However it takes approx 2 minutes
and the output at the end is:
sent 734973140 bytes  received 42 bytes   10888491.59 bytes/sec
forgive me if im wrong but that means its sent 734973140 bytes... I thought
rsync only sent the
2010 Mar 04
1
Minor tweak to sshd_config(5)
Hi,
There are a few minor tweaks I would like to suggest regrading the recently added
TrustedUserCAKeys section in sshd_config(5).
     TrustedUserCAKeys
             Specifies a file containing public keys of certificate authorities that are
             trusted sign user certificates for authentication.  Keys are listed one per
             line, empty lines and comments starting with
2020 Aug 28
3
[Bug 3204] New: Enable user-relative revoked keys files
https://bugzilla.mindrot.org/show_bug.cgi?id=3204
            Bug ID: 3204
           Summary: Enable user-relative revoked keys files
           Product: Portable OpenSSH
           Version: 8.1p1
          Hardware: All
                OS: All
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: sshd
          Assignee: unassigned-bugs at
2002 Jul 06
5
[Bug 338] X11 forwarding no longer works after upgrading from 2.9.9p2 to 3.4p1
http://bugzilla.mindrot.org/show_bug.cgi?id=338
------- Additional Comments From stevesk at pobox.com  2002-07-07 04:00 -------
will look into this
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2020 Jan 30
6
SSH certificates - restricting to host groups
On 30/01/2020 15:02, Christian, Mark wrote:
> On Thu, 2020-01-30 at 12:27 +0000, Brian Candler wrote:
>> As a concrete example: I want Alice to be able to login as "alice"
>> and
>> "www" to machines in group "webserver" (only). Also, I want Bob to
>> be
>> able to login as "bob" and "www" to machines in group
2020 Jun 17
3
client host certificates and receiving host configuration
On 17/06/20, Damien Miller (djm at mindrot.org) wrote:
> > Firstly, given a host CA signing key on the sshagentca server, would an
> > appropriately constructed host certificate added to a forwarded agent
> > replace the necessity for a '@cert-authority' line in a user's known_hosts
> > file?
> 
> I'm not sure I want to add yet another path (the agent)
2013 Sep 05
1
Using multiple certificates for a given private key
Hi,
I'm experimenting with certificates for users, giving access via the
TrustedUserCAKeys mechanism. Unfortunately, there seems to be a limit of
one certificate per SSH key on the user's side, which prevents using the
same key for hosts using different TrustedUserCAKeys. Is there a clean
way around this?
To make the above clearer, consider the following situation:
A collection of hosts
2020 Jun 16
2
client host certificates and receiving host configuration
I'm working on a small server written in Go to add short-lived user
certificates to the forwarded agents of authorized users.
    https://github.com/rorycl/sshagentca
This seems to work quite well for accessing sshd servers with the
appropriately configured "TrustedUserCAKeys" directive.
I have been in a debate about how similarly adding host certificates to
forwarded agents could
2003 Jun 26
7
[Bug 606] sshd [-t] should warn when cannot create pid file
http://bugzilla.mindrot.org/show_bug.cgi?id=606
           Summary: sshd [-t] should warn when cannot create pid file
           Product: Portable OpenSSH
           Version: -current
          Platform: All
        OS/Version: Linux
            Status: NEW
          Severity: enhancement
          Priority: P2
         Component: sshd
        AssignedTo: openssh-bugs at mindrot.org
       
2019 May 20
4
Authenticate against key files before AuthorizedKeysCommand
Hello,
Currently OpenSSH has a fixed order on how the key authenticates the
user: at first it tries to authenticate against TrustedUserCAKeys,
afterwards it does it against the output keys from the
AuthorizedKeysCommand and finally against the files as set in
AuthorizedKeysFile. I have an use-case where this order is not ideal.
This is because in my case the command fetches keys from the cloud