Displaying 20 results from an estimated 600 matches similar to: "Match Principal enhancement"
2023 Nov 12
1
Match Principal enhancement
AFAIK everything you described here could be done using the
AuthorizedKeysCommand or AuthorizedPrincipalsCommand directives. These
can emit authorized_keys options (inc. permitopen) as well as the allowed
keys/principals.
On Sun, 12 Nov 2023, Bret Giddings wrote:
> Hi OpenSSH devs,
>
> I?m wondering if the following has any merit and can be done securely ...
>
> If you could
2000 Oct 07
2
[PATCH]: Add tcp_wrappers protection to port forwarding
Hi,
attached is a patch by Chris Faylor <cgf at cygnus.com> relative to
2.2.0p1.
Description:
OpenSSH does not allow port gatewaying by default. This means that only
the local host can access forwarded ports. Adding "GatewayPorts yes" to
.ssh/config usually does this job.
Unfortunately, OpenSSH does not recognize the same hosts.allow/
hosts.deny options as ssh.com's sshd
2002 May 07
0
tunnel connection like a service with cygwin orotherproducts?
Stephan Hendl wrote:
>Darren Tucker wrote:
>> The first part should be easy: use cygwin openssh client using some kind
>> of passwordless authentication (eg RSA).
>>
>> To make it run entirely in the background, run it from cygrunsrv (part
>> of Cygwin) or SRVANY (NT resource kit). Neither of these work on W95,
>> only NT or W2K.
>
> How does the
2008 Aug 27
18
[Bug 1513] New: CIDR address/masklen matching support for permitopen=
https://bugzilla.mindrot.org/show_bug.cgi?id=1513
Summary: CIDR address/masklen matching support for permitopen=
Product: Portable OpenSSH
Version: 5.1p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
2007 Mar 21
1
[RFC]: OpenSSH vpn lists
I've got an idea for using OpenSSH to establish a sort of internal
secure network, where everything going back and forth between certain
services (i.e. MySQL, how horrid) is encrypted even if the
application/server doesn't support launching the service over SSL. This
has some issues; so I'm probing for ideas on a new feature that would
resolve them and make this easier.
Let's
2011 Nov 06
13
[Bug 1949] New: PermitOpen none option
https://bugzilla.mindrot.org/show_bug.cgi?id=1949
Bug #: 1949
Summary: PermitOpen none option
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.9p1
Platform: All
OS/Version: OpenBSD
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo:
2006 Dec 05
3
[Bug 1267] PermitOpen - Multiple forwards don't works
http://bugzilla.mindrot.org/show_bug.cgi?id=1267
Summary: PermitOpen - Multiple forwards don't works
Product: Portable OpenSSH
Version: v4.5p1
Platform: ix86
OS/Version: Cygwin on NT/2k
Status: NEW
Severity: security
Priority: P2
Component: sshd
AssignedTo: bitbucket at mindrot.org
2017 May 08
2
[PATCH] / permitgwports / permitlisten
Hi Phillipp, developers;
I likewise just submitted a patch for similar. It i buried under the thread named OpenSSH contract development / patch.
At the request of the OpenSSH dev team, I submitted our patch in the mindrot Bugzilla
https://bugzilla.mindrot.org/show_bug.cgi?id=2711
Your patch, I see is available there too
https://bugzilla.mindrot.org/show_bug.cgi?id=2716
Anyhow, just drawing
2006 Jan 31
1
External port forwarding control mechanism
Hi,
I'm looking for the best way to include an external decision mechanism into
OpenSSH, which allows it to restrict port forwarding only to destination
ports which are defined in a special external control file for the
authenticated session. The authenticated ssh user should only be allowed to
connect to this dedicated port to tunnel a VNC session through ssh. So the
server side has to
2009 Aug 12
2
Restrict a client port-forward to 1 port
Hi,
Is it possible to restrict a client port-forwarding to one port?
For example i want client X to open only port 1037 on server through
port-forwarding, client Y only port 1038 and so on...
How can this be possible?
I use private/public keys authentication.
Client version is openssh3.8p1, is windows client, and server version
is latest openssh on a linux machine.
Can anyone help please?
Thank
2017 May 04
5
OpenSSH contract development / patch
On Thu, May 04, 2017 at 09:37:59AM +1000, Adam Eijdenberg wrote:
> Hi Devin, have you looked at using openssh certificates to help manage
[...]
> While the feature has been around for a while now (and is really
> useful), there doesn't seem to be huge amount of documentation around
> it. I found the following useful when getting a client of my running
Yeah, when I wrote about it
2012 Aug 29
39
[Bug 2038] New: permitopen functionality but for remote forwards
https://bugzilla.mindrot.org/show_bug.cgi?id=2038
Priority: P5
Bug ID: 2038
Assignee: unassigned-bugs at mindrot.org
Summary: permitopen functionality but for remote forwards
Severity: enhancement
Classification: Unclassified
OS: Other
Reporter: damonswirled at gmail.com
Hardware: Other
2002 Aug 13
1
[PATCH] global port forwarding restriction
Here's another patch for people providing ssh access to restricted
environments.
We allow our users to use port forwarding when logging into our mail
servers so that they can use it to fetch mail over an encrypted channel
using clients that don't support TLS, for example fetchmail. (In fact,
fetchmail has built-in ssh support.) However we don't want them connecting
to other places
2011 Feb 10
6
[Bug 1857] New: [RFE] restrict port forwarding to localhost
https://bugzilla.mindrot.org/show_bug.cgi?id=1857
Summary: [RFE] restrict port forwarding to localhost
Product: Portable OpenSSH
Version: 5.8p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy:
2009 Jun 12
2
Restrict port forwarding on server
Hi,
Is there a way to restrict port forwarding on the server?
I want only port 8080 on the server to be available to clients.
Example when i give this command clients should be able to connect:
ssh -L 30300:localhost:8080 ....
When i give this for example clients should not be able to connect:
ssh -L 30300:localhost:4040 ....
I tried this option in config file of server:
PermitOpen
2008 Aug 22
1
CIDR address/masklen matching support for permitopen="host:port" restrictions?
Dear openssh-unix-dev list,
in OpenSSH 5.1 you introduced CIDR address/masklen matching for "Match address" blocks in sshd_config as well as supporting CIDR matching in ~/.ssh/authorized_keys from="..." restrictions in sshd.
I wonder whether CIDR address/masklen matching will be implemented for permitopen="host:port" restrictions in sshd as well, that would be quite
2001 Aug 27
1
permitopen flag in authorized_keys file
I've just discovered the permitopen flag. We need such a feature for
our poor man's VPN services, but this flag seems to be usable only if
you generate your authorized_keys file from a database or something
like that: keeping a long list of host/port combinations up to date
for several users and keys is no fun.
As announced before, we have developed a far more powerful mechanism
for
2003 Aug 29
2
authorized_keys options for remote forwarding
Hi,
I've recently run into a situation where it I want clients (or certain
keys) to connect to an OpenSSH server and set up a remote port
forwarding channel (-R) without allowing them to do anything else.
It seems that current OpenSSH doesn't support this. I would like to
suggest the following changes to the options for authorized_keys:
* add a no-local-forwarding option that denies
2001 Jun 25
1
ServerSide ACLs for -L type port forwarding
I have a need to add some server-side ACL functionality to the way ssh
handles port forwarding. For a first pass, I want to be able to
restrict -L port forwarding to localhost on the server only and I want
to be able to specify the ports on Server.
I was wondering if there would be any desire to incorporate said changes
back into the main development tree? If so, are there coding guildlines
2009 Feb 25
2
Disabling specific port-forwarding
Hi all,
I have a server where I allow some people to do SSH port forwarding for SVN,
GIT, since I need to do that to access these services in certain locations.
I can't access SVN ports in some work locations.
Thing is, I also give specific access to some user accounts, mainly git and
svn user, to some people I don't fully trust to have access to my VNC
server, which is without password