similar to: [Bug 2645] New: allow cidr matching of host in ssh_config

Displaying 20 results from an estimated 4000 matches similar to: "[Bug 2645] New: allow cidr matching of host in ssh_config"

2023 Feb 27
3
[Bug 3544] New: Support CIDR notation for host pattern matching
https://bugzilla.mindrot.org/show_bug.cgi?id=3544 Bug ID: 3544 Summary: Support CIDR notation for host pattern matching Product: Portable OpenSSH Version: 9.1p1 Hardware: All OS: All Status: NEW Severity: enhancement Priority: P5 Component: Miscellaneous Assignee:
2011 Feb 13
15
[Bug 34220] New: Detects Load on output and blinks screen ~30secs
https://bugs.freedesktop.org/show_bug.cgi?id=34220 Summary: Detects Load on output and blinks screen ~30secs Product: xorg Version: unspecified Platform: Other OS/Version: Linux (All) Status: NEW Severity: normal Priority: medium Component: Driver/nouveau AssignedTo: nouveau at
2008 Aug 22
1
CIDR address/masklen matching support for permitopen="host:port" restrictions?
Dear openssh-unix-dev list, in OpenSSH 5.1 you introduced CIDR address/masklen matching for "Match address" blocks in sshd_config as well as supporting CIDR matching in ~/.ssh/authorized_keys from="..." restrictions in sshd. I wonder whether CIDR address/masklen matching will be implemented for permitopen="host:port" restrictions in sshd as well, that would be quite
2008 Aug 27
0
CIDR address/masklen matching support for permitopen="host:port"
On Wed, 27 Aug 2008, Damien Miller wrote: > On Tue, 26 Aug 2008, Peter Stuge wrote: > > On Fri, Aug 22, 2008 at 11:22:34AM +0200, Bert Courtin wrote: > > > I wonder whether CIDR address/masklen matching will be implemented > > > for permitopen="host:port" restrictions in sshd as well, that would > > > be quite beneficially (at least for me, maybe
2013 Mar 22
1
[PATCH] Allow matching HostName against Host entries
It would be useful to allow matching HostName entries against Host entries. That's to say, I would find it very convenient to have an ssh_config like: Host zeus HostName zeus.greek.gods User hades Host hera HostName hera.greek.gods # [ ... ] Host *.greek.gods User poseidon UserKnownHostsFile ~/.ssh/known_hosts.d/athens # [ Default settings for *.greek.gods ] where I
2006 Feb 10
0
OpenSSH ControlAllowUsers, et al Patch
Attached (and inline) is a patch to add the following config options: ControlBindMask ControlAllowUsers ControlAllowGroups ControlDenyUsers ControlDenyGroups It pulls the peer credential check from client_process_control() in ssh.c, and expounds upon it in a new function, client_control_grant(). Supplemental groups are not checked in this patch. I didn't feel comfortable taking a shot
2011 Jan 27
9
CIDR-matching in puppet manifests?
I have a few settings that change based on the network that a system is in, and I have a heterogeneous collection of networks (a few /24s, some /25s, a /29 and a couple /27s, and hey look a /16 in rfc1918 space and...). So I can''t do simple regex matches on dotted-quad IP notation and expect to get a complete story. What I''d like is something like, I dunno... $nameserver =
2008 Aug 27
18
[Bug 1513] New: CIDR address/masklen matching support for permitopen=
https://bugzilla.mindrot.org/show_bug.cgi?id=1513 Summary: CIDR address/masklen matching support for permitopen= Product: Portable OpenSSH Version: 5.1p1 Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P2 Component: sshd AssignedTo: unassigned-bugs at mindrot.org
2006 Oct 20
1
CIDR prefix with a non-multiple of 8
First off, I apologize for reporting a problem with a "historical" version of Samba, but this is what we use in our production environment due to some integration issues with the 3.0 series. I've been experiencing a problem with Samba 2.2.x when trying to use a CIDR notation for hosts allow/deny when that CIDR prefix is not one of ( /8, /16, /24, or /32). When I included a
2009 Jun 07
2
[Bug 597] New: ip6tables connlimit - cannot set CIDR greater than 32 (includes fix)
http://bugzilla.netfilter.org/show_bug.cgi?id=597 Summary: ip6tables connlimit - cannot set CIDR greater than 32 (includes fix) Product: iptables Version: unspecified Platform: All OS/Version: All Status: NEW Severity: major Priority: P1 Component: ip6tables AssignedTo: laforge
2015 Jan 08
1
[Bug 994] New: Named sets with type "ipv4_addr" do not allow adding CIDR elements
https://bugzilla.netfilter.org/show_bug.cgi?id=994 Bug ID: 994 Summary: Named sets with type "ipv4_addr" do not allow adding CIDR elements Product: nftables Version: unspecified Hardware: x86_64 OS: other Status: NEW Severity: enhancement Priority: P5
2008 Oct 24
0
Name lookup failures and CIDR regression under cygwin ( patch attached )
Just updated to 3.0.4 under cygwin and I'm now getting lookup failures in the log. 2008/10/24 00:13:23 [1984] name lookup failed for X.X.X.X: Unknown server error Looking at the code it seems the call will never succeed? /* reverse lookup */ name_err = getnameinfo((struct sockaddr *) ss, ss_len, name_buf, name_buf_size, port_buf, port_buf_size,
2008 Oct 24
5
DO NOT REPLY [Bug 5851] New: Name lookup failures and CIDR regression
https://bugzilla.samba.org/show_bug.cgi?id=5851 Summary: Name lookup failures and CIDR regression Product: rsync Version: 3.0.4 Platform: All OS/Version: Windows XP Status: NEW Severity: major Priority: P3 Component: core AssignedTo: wayned@samba.org ReportedBy:
2013 Aug 12
2
[Bug 840] New: Specifying CIDR when adding to a hash:ip entry is silently ignored
https://bugzilla.netfilter.org/show_bug.cgi?id=840 Summary: Specifying CIDR when adding to a hash:ip entry is silently ignored Product: ipset Version: unspecified Platform: All OS/Version: All Status: NEW Severity: minor Priority: P5 Component: default AssignedTo:
2009 Dec 25
3
ip range cidr calculator
I found a command-line program that did this once before, used it for a while and then forgot about it until right now and I'll be damned if I can find it again. A command line IP calculator that takes an address range and give it back in cidr format. I found an online one that does this here: http://www.ipaddresslocation.org/subnet-mask-calculator.php But I would prefer to have the
2006 Oct 31
0
6249405 CIDR support does not work for logical interface
Author: kcpoon Repository: /hg/zfs-crypto/gate Revision: f244f36ccf8f500f22f5245345455c0fa68f4533 Log message: 6249405 CIDR support does not work for logical interface Files: update: usr/src/cmd/cmd-inet/usr.sbin/ifconfig/ifconfig.c
2016 Apr 21
0
[Bug 1009] Ability to use CIDR notation in IPV4/IPV6 named sets
https://bugzilla.netfilter.org/show_bug.cgi?id=1009 Vadim A. Misbakh-Soloviov (mva) <netfilter at mva.name> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |netfilter at mva.name --- Comment #1 from Vadim A. Misbakh-Soloviov (mva) <netfilter at
2016 Dec 01
0
[Bug 1169] Enhancement request to support subnet configurations for Host configuration directive
https://bugzilla.mindrot.org/show_bug.cgi?id=1169 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |mmendez534 at gmail.com --- Comment #19 from Damien Miller <djm at mindrot.org> --- *** Bug 2645 has been
2001 Jun 04
0
[patch] user@host in AllowUsers
This is a port of a patch I contributed to ssh 1.2.23 in May 1998. I have missed the functionality after moving to OpenSSH so I have updated the patch and hope OpenSSH might accept it. The patch allows sshd_config to have lines like: AllowUsers root at localhost AllowUsers tridge@* AllowUsers guest at 192.168.2.* DenyUsers badguy@* etc. I found this useful for restricting users to only login
2005 Apr 24
3
[Bug 2645] --one-file-system semantics changed with 2.6.4 (bug?)
https://bugzilla.samba.org/show_bug.cgi?id=2645 ------- Additional Comments From dalgoda@ix.netcom.com 2005-04-24 11:36 ------- It looks like the culprit is the change for receiver.c 1.130. It pulled the call to send_file_list(-1,...), which is what handled the one_file_system code. It's not like we can easily go back either, since flist.c 1.267 removed support for f=-1. Bummer. --