Displaying 20 results from an estimated 10000 matches similar to: "[Bug 2405] New: Description of UseDNS option is not accurate"
2016 Mar 17
2
[Bug 2554] New: UseDNS documentation is misleading
https://bugzilla.mindrot.org/show_bug.cgi?id=2554
            Bug ID: 2554
           Summary: UseDNS documentation is misleading
           Product: Portable OpenSSH
           Version: -current
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: Documentation
          Assignee: unassigned-bugs at
2011 Feb 17
5
[Bug 1860] New: UseDNS option ignored
https://bugzilla.mindrot.org/show_bug.cgi?id=1860
           Summary: UseDNS option ignored
           Product: Portable OpenSSH
           Version: 5.6p1
          Platform: All
        OS/Version: Other
            Status: NEW
          Severity: normal
          Priority: P2
         Component: sshd
        AssignedTo: unassigned-bugs at mindrot.org
        ReportedBy: pavel.krejci at
2003 Sep 26
2
[Bug 720] "UseDNS no" breaks public key login
http://bugzilla.mindrot.org/show_bug.cgi?id=720
           Summary: "UseDNS no" breaks public key login
           Product: Portable OpenSSH
           Version: -current
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: normal
          Priority: P2
         Component: sshd
        AssignedTo: openssh-bugs at mindrot.org
        ReportedBy:
2010 Aug 21
2
What's the point of UseDNS?
According to the manpage:
UseDNS Specifies whether sshd should look up the remote host name and 
check that the resolved host name for the remote IP address maps back to 
the very same IP address.  The default is ``yes''.
Thing is, while sshd *checks*, this doesn't actually control whether or 
not the client is allowed to connect, it seems at most to be an option 
that causes
2016 Feb 26
3
[Bug 2545] New: reverse DNS lookups shouldn't block login
https://bugzilla.mindrot.org/show_bug.cgi?id=2545
            Bug ID: 2545
           Summary: reverse DNS lookups shouldn't block login
           Product: Portable OpenSSH
           Version: 6.6p1
          Hardware: All
                OS: All
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: sshd
          Assignee: unassigned-bugs at
2009 Oct 26
17
[Bug 1667] New: sshd slow connect with 'UseDNS yes'
https://bugzilla.mindrot.org/show_bug.cgi?id=1667
           Summary: sshd slow connect with 'UseDNS yes'
           Product: Portable OpenSSH
           Version: 5.2p1
          Platform: All
        OS/Version: Linux
            Status: NEW
          Severity: major
          Priority: P2
         Component: sshd
        AssignedTo: unassigned-bugs at mindrot.org
        ReportedBy:
2015 May 22
47
[Bug 2403] New: Bugs intended to be fixed in 7.0
https://bugzilla.mindrot.org/show_bug.cgi?id=2403
            Bug ID: 2403
           Summary: Bugs intended to be fixed in 7.0
           Product: Portable OpenSSH
           Version: -current
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: Miscellaneous
          Assignee: unassigned-bugs at
2015 Feb 26
2
Samba4 SSH SSSD-AD Problem
Hi,
I'm having a problem with ssh and sssd in a samba4 ad environment. 
If I logon a linux client everything works fine. When entering klist I'm able 
to see my ticket. When I try to connect/logon to another linux client with ssh 
it is possible, but klist shows:
klist: Credentials cache file '/run/user/$UID$/krb5cc/tkt' not found.
So the ticket cache is not created during
2016 Apr 01
4
[Bug 2560] New: sshd: Description of hashed known_hosts file does not make sense and format is outdated
https://bugzilla.mindrot.org/show_bug.cgi?id=2560
            Bug ID: 2560
           Summary: sshd: Description of hashed known_hosts file does not
                    make sense and format is outdated
           Product: Portable OpenSSH
           Version: -current
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: enhancement
          Priority: P5
2015 Jun 29
3
[Bug 2419] New: SECCOMP filter does not accept getpgid syscall
https://bugzilla.mindrot.org/show_bug.cgi?id=2419
            Bug ID: 2419
           Summary: SECCOMP filter does not accept getpgid syscall
           Product: Portable OpenSSH
           Version: 6.8p1
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: sshd
          Assignee: unassigned-bugs at
2014 Dec 05
3
[Bug 2326] New: INFO logging fails client with mis-configured DNS
https://bugzilla.mindrot.org/show_bug.cgi?id=2326
            Bug ID: 2326
           Summary: INFO logging fails client with mis-configured DNS
           Product: Portable OpenSSH
           Version: 5.3p1
          Hardware: amd64
                OS: Linux
            Status: NEW
          Severity: security
          Priority: P5
         Component: sftp-server
          Assignee:
2008 Jul 23
10
[Bug 1490] New: sshd -T reports a string of UNKNOWNs
https://bugzilla.mindrot.org/show_bug.cgi?id=1490
           Summary: sshd -T reports a string of UNKNOWNs
    Classification: Unclassified
           Product: Portable OpenSSH
           Version: 5.1p1
          Platform: ix86
        OS/Version: Linux
            Status: NEW
          Severity: minor
          Priority: P2
         Component: sshd
        AssignedTo: unassigned-bugs at
2008 Jul 23
10
[Bug 1490] New: sshd -T reports a string of UNKNOWNs
https://bugzilla.mindrot.org/show_bug.cgi?id=1490
           Summary: sshd -T reports a string of UNKNOWNs
    Classification: Unclassified
           Product: Portable OpenSSH
           Version: 5.1p1
          Platform: ix86
        OS/Version: Linux
            Status: NEW
          Severity: minor
          Priority: P2
         Component: sshd
        AssignedTo: unassigned-bugs at
2017 Jan 30
4
[Bug 2674] New: [CONFIRMED] channel 4: open failed: administratively prohibited: open failed
https://bugzilla.mindrot.org/show_bug.cgi?id=2674
            Bug ID: 2674
           Summary: [CONFIRMED] channel 4: open failed: administratively
                    prohibited: open failed
           Product: Portable OpenSSH
           Version: 7.4p1
          Hardware: Other
                OS: OpenBSD
            Status: NEW
          Severity: minor
          Priority: P5
        
2003 Sep 13
2
CVS is missing documentation for HostbasedUsesNameFromPacketOnly
I'm attaching a simple doc patch against current CVS - feel free to re-word 
it as you see fit. I also noticed that if UseDNS is no, 
HostbasedUsesNameFromPacketOnly _must_ be yes if you want 
HostbasedAuthentication to work.
-- 
Carson
-------------- next part --------------
--- sshd_config.5.DIST	2003-09-13 02:25:18.365707000 -0400+++ sshd_config.5	2003-09-13 02:46:29.430974000 -0400@@
2011 Nov 03
1
Help with CA Certificates for user authentication?
As background, I read:
http://therowes.net/~greg/2011/03/23/ssh-trusted-ca-key/
http://www.ibm.com/developerworks/aix/library/au-sshsecurity/
http://bryanhinton.com/blog/openssh-security
http://www.linuxhowtos.org/manpages/5/sshd_config.htm
2006 Jun 20
1
unable to login with LDAP when set Uselogin to yes
Hi,
I am not sure this is a bug in Openssh or not.
I am running Openssh 4.1p1. with openssl 0.9.7g
Scenario:
Due to audit enabled on the system, I will need to set Uselogin to yes so
that audit will track system call.
But when try to login to system with a LDAP user. I get the following.
eg:
[n113839 at r3ent15pc ~]$ ssh tfstst1 -l ntesting1
ntesting1 at tfstst1's password:
Login incorrect
2015 May 13
11
[Bug 2398] New: AuthenticationMethods doesn't have default value (inconsistency) and it accept empty value
https://bugzilla.mindrot.org/show_bug.cgi?id=2398
            Bug ID: 2398
           Summary: AuthenticationMethods doesn't have default value
                    (inconsistency) and it accept empty value
           Product: Portable OpenSSH
           Version: 6.8p1
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: enhancement
         
2015 Mar 18
0
Announce: OpenSSH 6.8 released
OpenSSH 6.8 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches,
2015 Jun 18
7
[Bug 2415] New: Public key failures are not counted and therefore not logged into syslog
https://bugzilla.mindrot.org/show_bug.cgi?id=2415
            Bug ID: 2415
           Summary: Public key failures are not counted and therefore not
                    logged into syslog
           Product: Portable OpenSSH
           Version: 6.8p1
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P5
         Component: