Displaying 20 results from an estimated 400 matches similar to: "[PATCH v2] Permit %L and %l percent escapes in Include"
2023 Nov 14
1
[PATCH v3 1/2] Permit %L and %l percent escapes in ssh Include
This allows the localhost percent-style escapes in arguments to the
Include directive. These are useful for including host-specific ssh
configuration.
---
readconf.c | 16 +++++++++++++---
1 file changed, 13 insertions(+), 3 deletions(-)
diff --git a/readconf.c b/readconf.c
index a2282b562df0..ad47d0e9730a 100644
--- a/readconf.c
+++ b/readconf.c
@@ -1030,7 +1030,8 @@
2024 Jul 01
1
[PATCH RESEND 1/2] Permit %L and %l percent escapes in Include
This allows the localhost percent-style escapes in arguments to the
Include directive. These are useful for including host-specific ssh
configuration.
---
readconf.c | 16 +++++++++++++---
1 file changed, 13 insertions(+), 3 deletions(-)
diff --git a/readconf.c b/readconf.c
index 4e3791cb7cc6..6d99d2efae92 100644
--- a/readconf.c
+++ b/readconf.c
@@ -1044,7 +1044,8 @@
2024 Jul 01
1
[PATCH RESEND 1/2] Permit %L and %l percent escapes in Include
On Monday, July 1, 2024 4:50 PM, Ronan Pigott wrote:
>This allows the localhost percent-style escapes in arguments to the Include
>directive. These are useful for including host-specific ssh configuration.
>---
> readconf.c | 16 +++++++++++++---
> 1 file changed, 13 insertions(+), 3 deletions(-)
>
>diff --git a/readconf.c b/readconf.c
>index 4e3791cb7cc6..6d99d2efae92
2023 Dec 20
2
[PATCH RESEND 0/2] Permit %L and %l percent escapes in Include
Using these escapes, the include directive can be crafted to include
differing, host-specific configuration.
Ronan Pigott (2):
Permit %L and %l percent escapes in ssh Include
Permit %L and %l percent escapes in sshd Include
readconf.c | 16 +++++++++++++---
servconf.c | 17 ++++++++++++++---
2 files changed, 27 insertions(+), 6 deletions(-)
base-commit:
2023 Nov 14
0
[PATCH v3 2/2] Permit %L and %l percent escapes in sshd Include
This allows the localhost percent-style escapes in arguments to the
Include directive. These are useful for including host-specific sshd
configuration.
---
servconf.c | 17 ++++++++++++++---
1 file changed, 14 insertions(+), 3 deletions(-)
diff --git a/servconf.c b/servconf.c
index 86c2979360c5..daf8f2df15a2 100644
--- a/servconf.c
+++ b/servconf.c
@@ -1297,7 +1297,8 @@
2024 Jul 01
0
[PATCH RESEND 2/2] Permit %L and %l percent escapes in server Include
This allows the localhost percent-style escapes in arguments to the
Include directive. These are useful for including host-specific sshd
configuration.
---
servconf.c | 21 ++++++++++++++++-----
1 file changed, 16 insertions(+), 5 deletions(-)
diff --git a/servconf.c b/servconf.c
index 5b32f0bfc8db..0bc281784b73 100644
--- a/servconf.c
+++ b/servconf.c
@@ -1254,9 +1254,10 @@
2024 Jul 01
2
[PATCH RESEND 0/2] Permit %L and %L percent escapes in Include
Using these escapes, the include directive can be crafted to include
differing, host-specific configuration.
Ronan Pigott (2):
Permit %L and %l percent escapes in Include
Permit %L and %l percent escapes in server Include
readconf.c | 16 +++++++++++++---
servconf.c | 21 ++++++++++++++++-----
2 files changed, 29 insertions(+), 8 deletions(-)
base-commit:
2015 Aug 05
2
[PATCH 1/1] uid for expansion in ControlPath
From: Christian Hesse <mail at eworm.de>
Modern Linux systems create a private directory in /run/user/ for each
user, named by user id. This adds a new character sequence '%i' for
expansion in ControlPath to match thisi directory.
Signed-off-by: Christian Hesse <mail at eworm.de>
---
ssh.c | 5 ++++-
ssh_config.5 | 4 +++-
2 files changed, 7 insertions(+), 2
2024 May 06
1
Feature request/EOI: Match interactive config?
On Mon, 6 May 2024, openssh at tr.id.au wrote:
> ... and I guess your next question will be about compilation environment, so:
>
> ```
> $ gcc --version
> gcc (Gentoo 13.2.1_p20240210 p14) 13.2.1 20240210
> Copyright (C) 2023 Free Software Foundation, Inc.
> This is free software; see the source for copying conditions. There is NO
> warranty; not even for MERCHANTABILITY
2024 May 06
1
Feature request/EOI: Match interactive config?
On Sat, 4 May 2024, openssh at tr.id.au wrote:
> Hey there,
>
> I often want different behavior in my ssh client depending on
> whether I'm logging into an interactive session or running
> a remote non-interactive command. We can see at, say,
> https://unix.stackexchange.com/a/499562/305714 that this isn't a
> unique wish, and existing solutions are kind of baroque.
2024 Apr 25
1
[PATCH] Enable ssh_config to set LogPath option (-E)
ssh client has the ability to set the destination of debug logs via the `-E` flag. ssh_config lacks an equivalent keyword to set the same option via configs.
This patch follows the same semantics of other `*Path` type keywords and creates a new ssh_config keyword `LogPath`.
[0] Bugzilla: https://bugzilla.mindrot.org/show_bug.cgi?id=3683
[1] GitHub PR:
2012 Mar 29
1
percent_expand for QoS in ControlPath
Hi,
Not sure if this anyone else is interested in this but to me it seems to make
sense to use different control session multiplexer sockets for bulk and
interactive workloads.
Index: auth.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/auth.c,v
retrieving revision 1.94
diff -u -p -r1.94 auth.c
--- auth.c 23 May 2011 03:33:38 -0000 1.94
+++
2024 Jul 01
1
[PATCH RESEND 1/2] Permit %L and %l percent escapes in Include
July 1, 2024 at 2:47 PM, rsbecker at nexbridge.com wrote:
> Would you be able to document that "thisHost" may be ambiguous, depending on
> the DNS and host resolver configuration? gethostname() is not entirely
> predictable if the localhost has multiple values.
Hm? On linux/glibc, gethostname just uses uname(2). It does not use dns or the
name service switch.
2024 Jul 01
1
[PATCH RESEND 1/2] Permit %L and %l percent escapes in Include
On Monday, July 1, 2024 6:37 PM, Ronan Pigott wrote:
>July 1, 2024 at 2:47 PM, rsbecker at nexbridge.com wrote:
>
>> Would you be able to document that "thisHost" may be ambiguous,
>> depending on the DNS and host resolver configuration? gethostname() is
>> not entirely predictable if the localhost has multiple values.
>
>Hm? On linux/glibc, gethostname just
2004 Oct 03
0
[patch] tell user about hosts with same key
The attached patch implements a feature that would make my interaction
with ssh somewhat more secure. When connecting to a host whose key is
not in the known_hosts file, this patch makes ssh tell the user about any
other hosts in the known_hosts file that have the same key.
For example, if I have host A in my known_hosts file, and try to connect
to host B which is an alias for A, ssh will tell
2009 Sep 26
1
rsync finds files to sync which don't exist and then crashes
Hello,
I'm running the following script for backup:
SHORTHOST=`hostname | awk 'BEGIN { FS="." } { print $1 }'`
cd $HOME || exit 1
rsync --ignore-errors --max-size=50m -v --delete --delete-excluded
--log-file=/tmp/backup.log --exclude-from=$HOME/.rsync/exclude \
--timeout=3 -az \
$HOME atticserve:/mnt/store/backup/$SHORTHOST
At some point it tries to sync the following
2001 Sep 26
1
[PATCH] random SSH_MSG_IGNORE packets
Hi!
The following patch adds ability to configure the ssh client to
send SSH[2]_MSG_IGNORE packets of random length at random times
whithin a user-specified interval. The function is configured by
setting the config-file options BogusTrafficIntervalMax and
BogusTrafficIntervalMin, which defines the interval in seconds in
which the packets are randomly sent. It is disabled by default. It
suffices
2007 Oct 17
2
[patch] ssh.c load_public_identity_files calls getpwuid twice without copy
Hi,
getpwuid is called as seen in the patch, and is then called again
indirectly by tilde_expand_filename without first copying off the
results from the first call.
This is fatal on MacOSX (and it would seem it should be fatal elsewhere, too).
Please CC me in replies; I'm not a subscriber.
--- openssh-4.4p1/ssh.c 2006-09-01 22:32:40.000000000 -0700
+++ openssh-4.4p1-fix/ssh.c
2009 Apr 23
2
--filter, missing in action.
I must be seriously misunderstanding the man page coverage of --filter.
If I have a dir 'foo/' in the reciver with content 'bar' that I must
keep and a 'foo/' on the sender side empty what could possibly be the
best way to get the job done?
Till now the filter option gone ignored..
Not to mention that at the moment (may be because my bad english,
sorry!) I can not find the
2017 Oct 10
3
tunnel device name acquisition?
Numerous how-tos all over the Internet show how one would set up
a tunnel using ssh, e.g.:
ssh -f -o Tunnel=ethernet <server_ip> true
I was wondering if there's a way to subsequently acquire the names
of the local and remote tun/tap interfaces (e.g., using the default
"-w any:any") for subsequent automatic tunnel configuration, e.g.:
ip link set $TapDev up
ip link set