Displaying 20 results from an estimated 20000 matches similar to: "[Bug 1844] Explicit file permissions enhancement to sftp-server"
2015 Feb 12
0
[Bug 1844] Explicit file permissions enhancement to sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1844
Jakub Jelen <jjelen at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |jjelen at redhat.com
--- Comment #3 from Jakub Jelen <jjelen at redhat.com> ---
Created attachment 2547
2017 Dec 18
2
[SFTP] Possibility for Adding "ForceFilePermission" option
Hi Jakub,
Sorry for the late reply. I was off from work for a few days.
I?ve tried to add the noexec, nosuid and nodev mount options but it seems to have some difficulties to do so with kubernetes nfs-mount. I?ll keep trying to resolve it anyway.
The patch you pasted is exactly the thing I wanna have. I think it?s super useful and I definitely vote yes for merging it to master. I was actually
2020 Jun 20
0
[Bug 1844] Explicit file permissions enhancement to sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1844
eb <email.bug at arcor.de> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |email.bug at arcor.de
--- Comment #10 from eb <email.bug at arcor.de> ---
Instead of patching in yet another
2010 Dec 09
3
[Bug 1844] New: Explicit file permissions enhancement to sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1844
Summary: Explicit file permissions enhancement to sftp-server
Product: Portable OpenSSH
Version: 5.6p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: sftp-server
AssignedTo: unassigned-bugs at mindrot.org
2020 Jul 15
2
Deprecation of scp protocol and improving sftp client
On Tue, 2020-06-23 at 08:06 +0200, Markus Friedl wrote:
> I had something in mind like this for years, but with slightly
> different steps:
> My naive approach would be to keep the scp user interface and switch
> to the sftp protocol internally. We could add a -M [scp|sftp] option
> to scp and select the internal protocol. Later we switch the default
> from scp to sftp.
> No
2016 Oct 18
0
[Bug 1844] Explicit file permissions enhancement to sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1844
drzraf <raphael.droz+floss at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |raphael.droz+floss at gmail.co
| |m
--
You are receiving this
2020 May 13
0
[Bug 1844] Explicit file permissions enhancement to sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1844
leon at heess.me changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |leon at heess.me
--- Comment #8 from leon at heess.me ---
Please do add this feature!
--
You are receiving this mail because:
You are
2020 Jun 18
0
[Bug 1844] Explicit file permissions enhancement to sftp-server
https://bugzilla.mindrot.org/show_bug.cgi?id=1844
Gabriel <redimido at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |redimido at gmail.com
--- Comment #9 from Gabriel <redimido at gmail.com> ---
It is 2020 and this is still
2016 Mar 04
0
[Bug 1402] Support auditing through Linux Audit subsystem
https://bugzilla.mindrot.org/show_bug.cgi?id=1402
Jakub Jelen <jjelen at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #2085|0 |1
is obsolete| |
Attachment #2086|0 |1
is
2020 Aug 03
6
Deprecation of scp protocol and improving sftp client
I conjecture that only few of the existing use cases rely on remote expansion.
In any case (no pun intended), IMHO it would be better to break a few of the current use cases but leave the majority functional - than kill scp for all.
Regards,
Uri
> On Aug 3, 2020, at 02:50, Jakub Jelen <jjelen at redhat.com> wrote:
>
> ?On Sat, 2020-08-01 at 00:17 +0000, Blumenthal, Uri - 0553
2016 Jun 03
0
[Bug 1644] Allow ip options except source routing
https://bugzilla.mindrot.org/show_bug.cgi?id=1644
Jakub Jelen <jjelen at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #1693|0 |1
is obsolete| |
CC| |jjelen at
2017 Dec 14
4
[SFTP] Possibility for Adding "ForceFilePermission" option
Hi,
I understand that if I specify `ForceCommand internal-sftp -u <umask>`, the permission of any files uploaded via sftp will be calculated by `<original permission> & ~umask`. However, this can be bypassed by the `-P` option of `put` command. We are developing a shared hosting platform, therefore we definitely don?t want our users being able to upload any executable files. We
2015 Jan 12
0
[Bug 1768] scp: wrong error message when destination directory ends with a slash and is missing
https://bugzilla.mindrot.org/show_bug.cgi?id=1768
Jakub Jelen <jjelen at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #2523|0 |1
is obsolete| |
--- Comment #4 from Jakub Jelen <jjelen at redhat.com> ---
2015 Jan 08
0
[Bug 1768] scp: wrong error message when destination directory ends with a slash and is missing
https://bugzilla.mindrot.org/show_bug.cgi?id=1768
Jakub Jelen <jjelen at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |jjelen at redhat.com
--- Comment #2 from Jakub Jelen <jjelen at redhat.com> ---
Created attachment 2523
2015 Mar 26
0
[Bug 1878] error message in key_perm_ok should be firmer
https://bugzilla.mindrot.org/show_bug.cgi?id=1878
Jakub Jelen <jjelen at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|CLOSED |REOPENED
CC| |jjelen at redhat.com
Resolution|FIXED
2015 Jun 10
0
[Bug 1585] Allow an `Include' option which reads another config file in place and does not error out when `Include' file not readable
https://bugzilla.mindrot.org/show_bug.cgi?id=1585
Jakub Jelen <jjelen at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |jjelen at redhat.com
--- Comment #20 from Jakub Jelen <jjelen at redhat.com> ---
Created attachment 2647
2015 Jul 15
0
[Bug 1278] CYGWIN controlMaster connections don't work.
https://bugzilla.mindrot.org/show_bug.cgi?id=1278
Jakub Jelen <jjelen at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|WONTFIX |---
Status|CLOSED |REOPENED
CC| |jjelen
2015 Sep 23
0
[Bug 1773] PKCS#11 authentication fails with "xmalloc: zero size" for some certificates.
https://bugzilla.mindrot.org/show_bug.cgi?id=1773
Jakub Jelen <jjelen at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |jjelen at redhat.com
--- Comment #5 from Jakub Jelen <jjelen at redhat.com> ---
This is related to the bug
2015 Oct 22
0
[Bug 1940] Selinux based sandbox
https://bugzilla.mindrot.org/show_bug.cgi?id=1940
Jakub Jelen <jjelen at redhat.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |jjelen at redhat.com
--- Comment #18 from Jakub Jelen <jjelen at redhat.com> ---
(In reply to Damien Miller
2015 Dec 04
2
OpenSSH FIPS 140-2 support using OpenSSL FIPS modules?
Thanks Jakub.
How does this patch match the OpenSSH source version? Does the patch only
applicable to OpenSSH version 6.6.1, or does other version available as
well?
Thanks.
On Fri, Dec 4, 2015 at 4:26 AM, Jakub Jelen <jjelen at redhat.com> wrote:
>
> On 12/04/2015 03:26 AM, security veteran wrote:
>
>> 3. Is there a way to re-compile OpenSSH by turning on/off some flags