Displaying 20 results from an estimated 10000 matches similar to: "[Bug 2726] New: Uploading of large files (1GB+) fails when using SFTP in chrooted configuration"
2009 Feb 11
1
Configure re-keying in sftp server
Hello,
I'm trying to configure the openssh sftp server to perform re-keying. On the client side I've found the RekeyLimit parameter. But I am unable to find an equivalent for the server side. Is it currently not possible to configure the sftp server to perform re-keying? Or have I overlooked something.
--
R
_________________________________________________________________
Snygga till
2013 Jul 25
11
Call for testing: OpenSSH-6.3
Hi,
OpenSSH 6.3 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This release contains
some substantial new features and a number of bugfixes.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is
2013 Sep 13
0
Announce: OpenSSH 6.3 released
Changes since OpenSSH 6.2
=========================
This release is predominantly a bugfix release:
Features:
* sshd(8): add ssh-agent(1) support to sshd(8); allows encrypted hostkeys,
or hostkeys on smartcards.
* ssh(1)/sshd(8): allow optional time-based rekeying via a second argument
to the existing RekeyLimit option. RekeyLimit is now supported in
sshd_config as well as on the
2013 Sep 13
0
Announce: OpenSSH 6.3 released
Changes since OpenSSH 6.2
=========================
This release is predominantly a bugfix release:
Features:
* sshd(8): add ssh-agent(1) support to sshd(8); allows encrypted hostkeys,
or hostkeys on smartcards.
* ssh(1)/sshd(8): allow optional time-based rekeying via a second argument
to the existing RekeyLimit option. RekeyLimit is now supported in
sshd_config as well as on the
2016 Jan 05
14
[Bug 2521] New: subtract buffer size from computed rekey limit to avoid exceeding it
https://bugzilla.mindrot.org/show_bug.cgi?id=2521
Bug ID: 2521
Summary: subtract buffer size from computed rekey limit to
avoid exceeding it
Product: Portable OpenSSH
Version: 6.8p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: minor
Priority: P5
Component: sshd
2014 Jan 03
1
VisualHostKey vs. RekeyLimit vs. VerifyHostKeyDNS
Hello list, I'm not sure whether this is bug worthy or just my own
insanity. I'm using 6.4p1 packages from Debian jessie and
wheezy-backports.
I like VisualHostKey, although it may not add any protection (other than
not trusting ones own known_hosts file?), I've become accustomed to it
as it seems that extra neurons fire when I log into a host and get a
visual cue of what looks like
2015 Jul 20
2
WinSCP 5.7.5 will support the RFC 4419 revision to Diffie-Hellman group exchange
Hello,
I'd like to inform you that the next release of WinSCP SFTP client (version 5.7.5) will support Diffie-Hellman group exchange as specified by RFC 4419.
http://winscp.net/tracker/show_bug.cgi?id=1345
So I'd like to ask you to kindly update the check in
compat_datafellows() to
WinSCP_release_4*
WinSCP_release_5.0*
WinSCP_release_5.1*
WinSCP_release_5.2*
WinSCP_release_5.5*
2004 Oct 28
2
Problem copying directories using sftp
Hello!
A couple of days ago I submitted the problem report shown below to the
support forum for WinSCP.
I got a reply (shown at the end of this e-mail) saying that this in part
was a WinSCP problem, but also that there appeared to be something wrong
with the replies from OpenSSH-3.9p1 under AIX 4.3.3.
The full dialog including the reply can be seen at
2017 Sep 23
3
Call for testing: OpenSSH 7.6
> Portable OpenSSH is also available via [...] Github:
https://github.com/openssh/openssh-portable
>
> Running the regression tests supplied with Portable OpenSSH does not
require installation and is a simply:
>
> $ ./configure && make tests
I was going to try this on Kali Linux (latest version), but ran into
trouble right away. No "configure" script exists
2023 Jul 06
1
Subsystem sftp invoked even though forced command created
On 05.07.23 18:01, MCMANUS, MICHAEL P wrote:
> It appears the forced command either does not run or runs to completion
> and exits immediately, as there is no process named "receive.ksh" in
> the process tree.
FWIW, two cents of mine:
-- The script *exiting* should *not* prompt sshd to execute the
requested subsystem "as a second thought", or else it'd happen
2007 Nov 17
2
mount sftp or ftp+ssl drive on windows
Hello guys,
I would like to mount a sftp or a ftp with ssl (vsftp with ssl) on to a
Windows machine as an X: drive. So far I found SftpDrive witch costs
only $39 :) and I don't want it.
Do any of you have a positive experience with something like this?
I need it cause I will install a very important software on that drive,
witch doesn't need to be on the local disk of the windows
2023 Sep 19
1
Subsystem sftp invoked even though forced command created
This is a new branch of an old thread, made necessary because the email system here purges sent messages after a period of time so I can't reply to the last message in the thread. The operative portion of that last message (retrieved from the archives and dated July 3, 2023) follows:
/*****/
So I set up a fresh key to use for this test, and gave it similar parameters.
I wasn't aware of
2015 Aug 02
2
Chrooted SFTP-only users along with normal SFTP
Hi!
I want to set a OpenSSH server which restricts some users to only
chrooted SFTP, while others have full/normal ssh, scp and sftp access.
Most or all guides on the web say that I should enable the config line
"Subsytem sftp internal-sftp" among other things, but I've found out
that this only causes non-restricted users to not be able use SFTP at
all, only the chrooted users.
2015 Sep 15
0
rsyslog for chrooted sftp users has stopped working -- Centos 6.6
And no sooner do I send the email than I spot the problem. Oops! Sorry
about that.
The sshd_config needed to contain a different internal-sftp line:
Match User test-sftp-only
ChrootDirectory /home/sftp/mcsosftp
ForceCommand internal-sftp -f AUTHPRIV -l INFO
PasswordAuthentication no
AuthorizedKeysCommand /usr/local/bin/get_sftp_key
That's gotten
2014 Jul 06
15
[Bug 2252] New: RekeyLimit breaks ClientAlive
https://bugzilla.mindrot.org/show_bug.cgi?id=2252
Bug ID: 2252
Summary: RekeyLimit breaks ClientAlive
Product: Portable OpenSSH
Version: 6.6p1
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
2020 Aug 05
2
Deprecation of scp protocol and improving sftp client
On 2020/08/05 16:17, raf wrote:
> The problem is when, for example, you only have
> scp/sftp access to a remote server, such as your bank,
> and you use WinSCP to transfer transaction files to
> them to be actioned (people do this where I work), and
> the bank hasn't properly protected themselves from this
> "vulnerability". I really hope all banks do take this
>
2009 Aug 11
19
[Bug 1632] New: [PATCH] UTF-8 hint sftp-server extension
https://bugzilla.mindrot.org/show_bug.cgi?id=1632
Summary: [PATCH] UTF-8 hint sftp-server extension
Product: Portable OpenSSH
Version: 5.2p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: enhancement
Priority: P2
Component: sftp-server
AssignedTo: unassigned-bugs at mindrot.org
2016 May 26
19
[Bug 2573] New: dead sessions cannot be closed with ~.
https://bugzilla.mindrot.org/show_bug.cgi?id=2573
Bug ID: 2573
Summary: dead sessions cannot be closed with ~.
Product: Portable OpenSSH
Version: 3.7.1p2
Hardware: Other
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
2015 Sep 15
2
rsyslog for chrooted sftp users has stopped working -- Centos 6.6
Hello everyone,
We have some chrooted sftp-only users on a CentOS release 6.6 server. The
server had been logging their actions, but after recent updates the logs
have stopped.
The server correctly logs non-chrooted users:
Sep 14 17:47:24 vsecure4 sshd[1981]: Accepted publickey for jcours from
192.168.10.166 port 42545 ssh2
Sep 14 17:47:24 vsecure4 sshd[1981]: pam_unix(sshd:session):
2017 Jan 11
0
Trouble removing files in chrooted sftp
I just did a bit of testing on OpenBSD and there the above setup seems to
work and I can remove the files just fine over sftp.
So this thing should work but there's still something causing it to fail on
CentOS's side.
One difference between our CentOS and OpenBSD is that OpenBSD uses newer
openssh server. I looked through the release notes and didn't see any
changes related to