Displaying 20 results from an estimated 3000 matches similar to: "[Bug 3055] New: Need some high-probability logging re MaxStartups"
2001 Sep 21
1
MaxStartups Confusion
I would like some clarification regarding the use of MaxStartups. I have
always used the three colon separated value that enables the random drop
capabilities, but the documentation for sshd says that MaxStartups can also
take a single value which sets a max and leaves random drops off.
When I try this, sshd tells me that it got an illegal integer. Looking at
the code, in servconf.c it looks
2016 Sep 09
8
[Bug 2613] New: Log connections dropped when MaxStartups is reached
https://bugzilla.mindrot.org/show_bug.cgi?id=2613
Bug ID: 2613
Summary: Log connections dropped when MaxStartups is reached
Product: Portable OpenSSH
Version: 7.3p1
Hardware: Sparc
OS: Solaris
Status: NEW
Severity: trivial
Priority: P5
Component: sshd
Assignee: unassigned-bugs
2002 Jun 13
1
MaxStartups
Hello,
What is the effect of MaxStartups in the configuration file sshd_config?
How this keyword effects the working of sshd?
regards
Kumaresh
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20020613/8306c832/attachment.html
2020 May 08
79
[Bug 3162] New: Tracking bug for 8.4 release
https://bugzilla.mindrot.org/show_bug.cgi?id=3162
Bug ID: 3162
Summary: Tracking bug for 8.4 release
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: All
Status: NEW
Keywords: meta
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee:
2020 Jan 21
2
Instrumentation for metrics
Hi,
We serve a fairly substantial number[1] of ssh connections across our
fleet.? We have hit MaxStartups limits in the past and bumped it up a
few times (currently at 300), but we have no warning before the limit is
reached and connections start being dropped.? What I would love is some
sort of instrumentation that could let us see the highest number of
concurrent pre-auth connections the
2002 May 29
2
[PATCH] Add config option disabling drop_connection() behavior
The patch below (against openssh 3.2.3p1) adds a
CheckMaxStartups option, defaulting to yes, to determine whether sshd
calls drop_connection().
The motivation behind this is twofold. In our environment, our
timesharing machines get enough incoming connections that will trigger
spuriously with the default value (10 forked unauthenticated
connections) as well as some significantly higher values,
2019 Mar 15
35
[Bug 2982] New: gssapi_cleanup: supported mechs should be freed via gss_release_oid_set
https://bugzilla.mindrot.org/show_bug.cgi?id=2982
Bug ID: 2982
Summary: gssapi_cleanup: supported mechs should be freed via
gss_release_oid_set
Product: Portable OpenSSH
Version: 7.9p1
Hardware: All
OS: Windows 10
Status: NEW
Severity: normal
Priority: P5
Component:
2018 Aug 11
21
[Bug 2894] New: Set UpdateHostKeys for interactive sessions to 'ask' (or consider defaulting to 'yes')
https://bugzilla.mindrot.org/show_bug.cgi?id=2894
Bug ID: 2894
Summary: Set UpdateHostKeys for interactive sessions to 'ask'
(or consider defaulting to 'yes')
Product: Portable OpenSSH
Version: 7.7p1
Hardware: Other
OS: Other
Status: NEW
Severity: enhancement
2004 Jan 21
2
PAM auth stage rejection not working
Hi,
I have an auth module for PAM that I wrote a few years ago called
pam_vsd.so. The idea is that a user must have a certain privilege
before they can successfully authenticate. Without the privilege the
PAM module will return PAM_PERM_DENIED.
However I find that in OpenSSH 3.7.1p2, I can easily subvert this check
simply by hitting return 3 times on connection i.e.
[nick at localhost
2020 Sep 20
13
Call for testing: OpenSSH 8.4
Hi,
OpenSSH 8.4p1 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This is a bugfix release.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is also available via git using the
instructions at
2003 Nov 13
1
SSHD password authentication issue in 4.9-RELEASE and 5.1-RELEASE
Wonder if you guys could help me out...have a security problem with sshd
wich enables a user to do a password login tough the sshd_config states
PasswordAuthentication no
My config works fine in both gentoo and openbsd 3.3 but users are able to
login with tunneled clear text passwords in both 4.9 and 5.1
Im lost.tried everything I can think of.
Here is the config:
2010 Jan 27
5
sshd killed due to dos attack
Hi,
I am not sure to report this as a bug. so mailing to the list.
I have sshd(openssh3.5p1) server running on my router and when i run tcpjunk
to that port, sshd gets killed after some time
192.168.71.1 is my sshd server and 192.168.71.4 is my client from where i
send my dos attack
This is the tcpjunk command i gave to the ssh server
#tcpjunk -s 192.168.71.1 -p 22 -c req -i 100
req session
2004 Sep 17
3
sftp-server debug output
Help! I am trying to get debug output working with sftp-server, and
can''t seem to find the appropriate information to get it working. Yes,
I have recompiled sftp-server to include defining DEBUG_SFTP_SERVER. I
found that myself in the code before finding it in several postings as
the common answer to others having this problem.
In addition, I have set up the sshd_config file
2000 Jul 12
0
Announce: portable OpenSSH 2.1.1p3
The 2.1.1p3 release of portable OpenSSH has been uploaded to the
OpenBSD ftp master site. In a few hours it will be available from one
of the many mirrors listed at:
http://www.openssh.com/portable.html
This release fixes several bugs reported since the previous release
and extends portability to NeXT and Reliant Unix.
As usual, the OpenBSD team has been hard at work further polishing and
2000 Jul 12
0
Announce: portable OpenSSH 2.1.1p3
The 2.1.1p3 release of portable OpenSSH has been uploaded to the
OpenBSD ftp master site. In a few hours it will be available from one
of the many mirrors listed at:
http://www.openssh.com/portable.html
This release fixes several bugs reported since the previous release
and extends portability to NeXT and Reliant Unix.
As usual, the OpenBSD team has been hard at work further polishing and
2019 Oct 21
0
CESA-2019:3055 Important CentOS 7 kernel Security Update
CentOS Errata and Security Advisory 2019:3055 Important
Upstream details at : https://access.redhat.com/errata/RHSA-2019:3055
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
2a3a94849e0e15608a2417e8f62686d9a39f042b3be7d04dff92a117ef911eee bpftool-3.10.0-1062.4.1.el7.x86_64.rpm
2001 Feb 21
1
further problems with OpenSSH 2.5.1p1 on RH 6.2
I'm finding another problem with OpenSSH 2.5.1p1 on RH 6.2 (at least,
I think it's the linux box that is the problem).
I'm ssh'ing to a RH 6.2 box from a Solaris 7 server (scp also... seems
like the same problem).
I'm using authorized_keys and identity.pub files to do it automagically,
and all works well when it's from user to user, where the username is the
same, but if
2002 Jul 25
3
[PATCH] prevent users from changing their environment
We have a system on which users are given a very restricted environment
(their shell is a menu) where they should not be able to run arbitrary
commands. However, because their shell is not statically linked, ld.so
provides a nice clutch of holes for them to exploit. The patch below
adds a new configuration option to sshd which quashes their attempts
to set LD_PRELOAD etc. using ~/.ssh/environment
2006 Jun 20
1
unable to login with LDAP when set Uselogin to yes
Hi,
I am not sure this is a bug in Openssh or not.
I am running Openssh 4.1p1. with openssl 0.9.7g
Scenario:
Due to audit enabled on the system, I will need to set Uselogin to yes so
that audit will track system call.
But when try to login to system with a LDAP user. I get the following.
eg:
[n113839 at r3ent15pc ~]$ ssh tfstst1 -l ntesting1
ntesting1 at tfstst1's password:
Login incorrect
2020 Sep 09
5
[Bug 3211] New: A
https://bugzilla.mindrot.org/show_bug.cgi?id=3211
Bug ID: 3211
Summary: A
Product: Portable OpenSSH
Version: 8.3p1
Hardware: Other
OS: Linux
Status: NEW
Severity: security
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
Reporter: kircherlike at