Displaying 20 results from an estimated 600 matches similar to: "Increasing log levels in sshd via sshd_config(5)"
2025 Apr 05
1
Increasing log levels in sshd via sshd_config(5)
On 05/04/2025 10:12, Lars Nood?n via openssh-unix-dev wrote:
> Instead of more verbose logging in /var/log/authlog
https://github.com/openbsd/src/blob/master/etc/syslog.conf
auth.info??? ??? ??? ??? ??? ??? /var/log/authlog
If you've not changed that, then any 'debug' level messages will be
discarded by your syslog server.
2025 Apr 05
1
LogLevel INFO shows few details for Certificate invalid: not yet valid / expired
I notice that when using log level INFO it seems sshd(8) provides very
little information about failed SSH certificate log in attempts:
Apr 5 14:44:41 server sshd-session[51695]: error: Certificate invalid:
not yet valid
Apr 5 14:45:31 server sshd-session[88953]: error: Certificate invalid:
expired
Likewise for invalid principals:
Apr 5 14:46:56 server sshd-session[66692]: error:
2006 Aug 31
2
R-Project logo in SVG format
Hi,
I'm looking for a version of the R-Project logo in SVG format. I've found
the bitmapped versions,
http://developer.r-project.org/Logo/
but would prefer a scalable version as it usually looks better when
printed.
Where may I find one?
-Lars
Lars Nooden (lars at umich.edu)
On the Internet, nobody knows you're a dog ...
... until you start barking.
2025 Apr 17
2
[Bug 3814] New: incorrect signature when ssh'ing to an AIX server (Big Endian) from amd64 (Little endian)
https://bugzilla.mindrot.org/show_bug.cgi?id=3814
Bug ID: 3814
Summary: incorrect signature when ssh'ing to an AIX server (Big
Endian) from amd64 (Little endian)
Product: Portable OpenSSH
Version: 10.0p1
Hardware: PPC64
OS: AIX
Status: NEW
Severity: major
Priority: P5
2024 Dec 08
0
[Bug 3763] New: Clarify Match criteria in sshd_config(5)
https://bugzilla.mindrot.org/show_bug.cgi?id=3763
Bug ID: 3763
Summary: Clarify Match criteria in sshd_config(5)
Product: Portable OpenSSH
Version: 9.9p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: Documentation
Assignee: unassigned-bugs at
2008 Jun 15
7
[Bug 1477] New: ssh-keygen not reading stdin as expected
https://bugzilla.mindrot.org/show_bug.cgi?id=1477
Summary: ssh-keygen not reading stdin as expected
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.7p1
Platform: ix86
OS/Version: OpenBSD
Status: NEW
Severity: normal
Priority: P2
Component: ssh-keygen
AssignedTo:
2025 May 21
1
LogLevel INFO shows few details for Certificate invalid: not yet valid / expired
On 4/5/25 15:01, Lars Nood?n wrote:
> I notice that when using log level INFO it seems sshd(8) provides very
> little information about failed SSH certificate log in attempts:
>
> Apr? 5 14:44:41 server sshd-session[51695]: error: Certificate invalid:
> not yet valid
>
> Apr? 5 14:45:31 server sshd-session[88953]: error: Certificate invalid:
> expired
>
>
2025 Apr 04
0
Call for testing: OpenSSH 10.0
Tested on Gentoo Linux x86.
gcc (Gentoo Hardened 14.2.1_p20241221 p7) 14.2.1 20241221
my configure command and the summary at the end are here: https://bpa.st/2VPA
emerge --info available here: https://bpa.st/LF7Q
make tests returned all tests passed.
It can talk to itself fine.
It can talk to Gentoo's net-misc/openssh-9.9_p2 fine (client and server)
It can login to both of the oldest
2020 Oct 04
6
ability to select which identity to forward when using "ForwardAgent" ?
Hi,
I usually have around 10 identities loaded in my local ssh-agent and when I
use the "ForwardAgent" option all them are forwarded to the remote server,
which is not ideal. I usually only need to forward one (or two) of the
identities and I would like to be able to choose which one(s) to forward.
Looking for solutions it seems that the only option is to create a new
ssh-agent, add
2024 Aug 10
1
'Too many authentication failures' nuisance
On 8/10/24 17:13, Chris Green wrote:
> I have several ssh keys in the ~/.ssh directory of my desktop machine.
> As a result whenever I try to connect to a system which uses password
> authentication I get the "Too many authentication failures" error.
>
> Yes, I know I can get round this by setting PreferredAuthentications
> but this is rather a nuisance to have to do
2005 Apr 06
2
10 Gigabit Ethernet and Samba
Do anyone have any experience using 10 Gigabit Ethernet connections with
Samba? Specifically, if you have had such an experience, can you share what
sorts of optimizations you made to get the maximum data transfer between server
and workstation?
I am just experimenting with this kind of setup myself and I see a huge GULF
between the raw TCP/IP transfers that I can make between two
2008 Jun 15
3
[Bug 1478] New: ssh -V sends output to stderr instead of stdout
https://bugzilla.mindrot.org/show_bug.cgi?id=1478
Summary: ssh -V sends output to stderr instead of stdout
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.0p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Documentation
AssignedTo:
2024 Jul 14
1
Splitting of sshd binaries in 9.8?
I realize that the splitting of the sshd binaries is a work in progress.
Nonetheless I am trying to make a diagram of the situation as of 9.8.
How close have I gotten?
Is it correct that currently for a basic session, binaries are run four
ways?
1. A privileged binary to listen for incoming connections (66717 below)
2. A privileged session monitor to track the session, for the duration
of the
2009 Jan 02
6
internet registering through wine
I have installed a CAD/CAM program call eCabinets (its a free program for woodworking and cabinet shops). When it starts, its asks for its registration code which I have. It then tries to open the default internet connections to register but eventually times out. By the looks of things, it its acting like a firewall is blocking it. I do not have a wirewall installed yet. I am running Ubuntu 8.10
2008 Jan 04
1
Unable to forward call on SIP channel after SIP response 302 Moved Temporarily
Hi,
I have the following problem that when asterisk receives SIP response 302 it
cannot forward the call
I get such debug:
[Jan 4 10:43:27] WARNING[18671]: channel.c:3281 ast_request: No channel
type registered for 'Local'
[Jan 4 10:43:27] NOTICE[18671]: app_dial.c:505 wait_for_answer: Unable to
create local channel for call forward to 'Local/poczta at routing-sip' (cause =
66)
2006 Nov 20
7
Snom 360 Multiple calls on hold help
Hi everyone,
Ive just installed a bunch of Snom 360s, and now having a NIGHTMARE of
problems! Ive got a receponist phone with a extra sidecar on it. And when
she gets 2+ calls and puts them on hold, when she goes to transfer them out
the calls on hold get merged together. Somehow the calls on hold get merged
and not to the extension needed!! Any help on this would be great guys, that
would be
2010 Mar 29
6
AD Auth Trusted Domain issues
I have been killing myself on this issue over the last 2 weeks. I have
setup pam AD authentication using winbind on our companies email
servers. That part is currently working. I have been trying to add an
existing "Trusted" child domain and allow authentication from that
domain as well. I am part of the way there, but not quite to the
functional point as of yet. Our primary domain
2001 Nov 08
2
logging of root logins
On Thu, Nov 08, 2001 at 01:59:25PM +0100, Arthur de Jong wrote:
> root and warthur both have user id 0. Sorry, I should have made that
> clearer. They both have different passwords and rsa keys and I would like
> to be able to make the distinction in the logs. Currently ssh only logs
> that a ROOT user has logged in, not which one.
hm, i don't think uid sharing is a standard unix
1997 Sep 26
1
tty chowning
About a year ago I outlined a scheme for arranging chowning of the tty
end of ptys without needing root privileges. Since then, I haven''t had
time to actually implement it.
I was thinking about the problem again today, and, having learned a
bit about sessions and controlling ttys and stuff, was able to come up
with a simpler mechanism.
First, observe that the POSIX session mechanism, if
2010 Oct 06
4
Logging Login Attempts
I have passwords turned off, and require keys to match. The zombie armies swarming outside are trying brute force attacks that in part involve guessing login NAMES. If they guess the wrong NAME, this is logged in syslog. If they guess a working user name, then the attack has PARTIALLY SUCCEEDED, but this information is IGNORED. That is, it is not logged. If the zombie army has tell when it