Displaying 20 results from an estimated 900 matches similar to: "[Bug 2503] New: The sshd log files are insufficient to detect sessions"
2015 Oct 12
4
[Bug 2479] New: ssh-keyscan non-standard port broken
https://bugzilla.mindrot.org/show_bug.cgi?id=2479
Bug ID: 2479
Summary: ssh-keyscan non-standard port broken
Product: Portable OpenSSH
Version: 6.9p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: ssh-keyscan
Assignee: unassigned-bugs at
2016 Jan 01
3
removing keys from ssh-agent without having key file
ssh-agent does not allow you to remove individual keys without having the
key file that was added. To remove these keys the user must remove all keys
with ssh-add -D.
Would a patch to make ssh-add skip the existence check for the file be
considered?
The specific use case is that a USB drive is mounted with the key, the key
is added to the agent then the USB drive is unmounted.
2015 Feb 20
2
Call for testing: OpenSSH 6.8
On Fri, 20 Feb 2015, ?smail D?nmez wrote:
> Hi,
>
> On Fri, Feb 20, 2015 at 12:21 AM, Damien Miller <djm at mindrot.org> wrote:
> > Hi,
> >
> > OpenSSH 6.8 is almost ready for release, so we would appreciate testing
> > on as many platforms and systems as possible. This release contains
> > some substantial new features and a number of bugfixes.
>
2015 Jan 23
5
[Bug 2342] New: ssh-keygen gives wrong error loading public key message
https://bugzilla.mindrot.org/show_bug.cgi?id=2342
Bug ID: 2342
Summary: ssh-keygen gives wrong error loading public key
message
Product: Portable OpenSSH
Version: 6.7p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh-keygen
2009 Jan 22
8
[Bug 1550] New: Move from 3DES to AES-256 for private key encryption
https://bugzilla.mindrot.org/show_bug.cgi?id=1550
Summary: Move from 3DES to AES-256 for private key encryption
Product: Portable OpenSSH
Version: 5.1p1
Platform: All
OS/Version: All
Status: NEW
Keywords: patch
Severity: enhancement
Priority: P2
Component: ssh-keygen
AssignedTo:
2012 Sep 09
2
Patch for ssh-keygen to allow conversion of public key to openssh format
Hi,
I needed to convert a public RSA key to autorized_keys format and found
ssh-keygen lacking this feature.
I made the option -Q publicfile to allow an conversion like
ssh-keygen -Q pubrsa.pem -y
The patch is produced using unified diff and made on latest release.
If you like it and can make a patch for the man-page also!
Regards,
/Lars
-------------- next part --------------
diff -u
2008 Aug 29
7
[Bug 69] Generalize SSH_ASKPASS
https://bugzilla.mindrot.org/show_bug.cgi?id=69
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |djm at mindrot.org
Alias| |generalised-askpass
--
Configure bugmail:
2008 Sep 05
2
[Bug 1523] New: Log public key identifier on pubkey login
https://bugzilla.mindrot.org/show_bug.cgi?id=1523
Summary: Log public key identifier on pubkey login
Product: Portable OpenSSH
Version: 5.1p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy:
2015 Jul 30
3
Feature Request: Invalid sshd port fallback
I see your point and that makes valid sense;I even change default port.
"It would be better to let you know the port is wrong and fail to start
until you fixed the problem and selected a valid non-standard port."
Is there any reason something like this isn't implemented already? Could it
be implemented?
On Thu, Jul 30, 2015 at 2:02 PM Ron Frederick <ronf at timeheart.net>
2009 Apr 30
2
ChrootDirectory %h
Hi,
many people are having problems using SFTP with ChrootDirectory when the
jail directory (or the path above) is not owned by root. The question is
if chroot'ing to usual home directories can be allowed, even though they
are owned by regular users.
I know that this topic has been discussed on the list several times now,
so I searched the list archives for posts that invalidate the
2009 Apr 07
11
[Bug 1588] New: sftp client produces
https://bugzilla.mindrot.org/show_bug.cgi?id=1588
Summary: sftp client produces
Product: Portable OpenSSH
Version: 5.2p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sftp
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy: gsocsftp at v6shell.org
2015 Jun 18
7
[Bug 2415] New: Public key failures are not counted and therefore not logged into syslog
https://bugzilla.mindrot.org/show_bug.cgi?id=2415
Bug ID: 2415
Summary: Public key failures are not counted and therefore not
logged into syslog
Product: Portable OpenSSH
Version: 6.8p1
Hardware: Other
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component:
2008 Aug 29
2
[Bug 17347] New: NV34M (12" powerbook G4) LVDS not supported
http://bugs.freedesktop.org/show_bug.cgi?id=17347
Summary: NV34M (12" powerbook G4) LVDS not supported
Product: xorg
Version: git
Platform: PowerPC
OS/Version: Linux (All)
Status: NEW
Severity: major
Priority: medium
Component: Driver/nouveau
AssignedTo: nouveau at lists.freedesktop.org
2015 Feb 19
34
Call for testing: OpenSSH 6.8
Hi,
OpenSSH 6.8 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This release contains
some substantial new features and a number of bugfixes.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is
2003 Dec 22
1
?? memory leak in 3des1
Hello,
quoted patch free's cipher_data malloc'd in calls to EVP_CipherInit() in
ssh1_3des_init(), at least linked with openssl >= 0.9.7. It does not
appear to me (superficial scan) that there is any harm in calling the
_cleanup routine with earlier openssl.
fwiw
:laird
--- openssh-3.7.1p2/cipher-3des1.c Tue Sep 23 05:24:21 2003
+++ src37m/cipher-3des1.c Mon Dec 15
2017 Aug 23
0
CEBA-2017:2503 CentOS 6 samba BugFix Update
CentOS Errata and Bugfix Advisory 2017:2503
Upstream details at : https://access.redhat.com/errata/RHBA-2017:2503
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
i386:
87269f714a65dd129fca8497dd8b037337fb99868de85c4a429b42d9f13bd0d2 libsmbclient-3.6.23-44.el6_9.i686.rpm
2011 Jan 12
1
[openssh-commits] CVS: fuyu.mindrot.org: openssh
This commit message was supposed to be:
- (djm) [configure.ac] Turn on -Wno-unused-result for gcc >= 4.4 to avoid
silly warnings on write() calls we don't care succeed or not.
I fixed the CVS log retrospectively
On Wed, 12 Jan 2011, Damien Miller wrote:
> CVSROOT: /var/cvs
> Module name: openssh
> Changes by: djm at fuyu.mindrot.org 11/01/12 13:34:04
>
2003 Jan 29
1
The function 'any' (PR#2503)
Full_Name: Paul Louisell
Version: 1.6.2
OS: Windows NT
Submission from: (NULL) (192.249.47.9)
There is a slight bug in the function 'any'. Given a logical vector (possibly
including values of 'NA'), the default action of any should be as follows:
(i) at least one value = T should return T
(ii) NO values = T
(a) at least one value = 'NA' should return 'NA'
2015 Aug 21
124
[Bug 2451] New: Bugs intended to be fixed in 7.2
https://bugzilla.mindrot.org/show_bug.cgi?id=2451
Bug ID: 2451
Summary: Bugs intended to be fixed in 7.2
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: trivial
Priority: P5
Component: Miscellaneous
Assignee: unassigned-bugs at
2017 Aug 25
6
[Bug 2765] New: ssh-copy-id appears to hang indefinitely when the target user has no password
https://bugzilla.mindrot.org/show_bug.cgi?id=2765
Bug ID: 2765
Summary: ssh-copy-id appears to hang indefinitely when the
target user has no password
Product: Portable OpenSSH
Version: 6.6p1
Hardware: All
OS: Linux
Status: NEW
Severity: trivial
Priority: P5