Displaying 20 results from an estimated 5000 matches similar to: "OpenSSH 4.0 released"
2005 Mar 09
0
[djm@cvs.openbsd.org: OpenSSH 4.0 released]
----- Forwarded message from Damien Miller <djm@cvs.openbsd.org> -----
Subject: OpenSSH 4.0 released
From: Damien Miller <djm@cvs.openbsd.org>
Date: Wed, 9 Mar 2005 02:54:13 -0700 (MST)
To: announce@openbsd.org
X-Original-To: jeremie@le-hen.org
Delivered-To: tataz@tataz.chchile.org
X-Loop: announce@openbsd.org
Precedence: list
OpenSSH 4.0 has just been released. It will be available
2005 May 26
1
OpenSSH 4.1 released
OpenSSH 4.1 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support to the project, especially those who contributed source and
bought T-shirts or
2005 Mar 09
7
OpenSSH 4.0 released
OpenSSH 4.0 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support to the project, especially those who contributed source and
bought T-shirts or
2005 May 26
4
OpenSSH 4.1 released
OpenSSH 4.1 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support to the project, especially those who contributed source and
bought T-shirts or
2005 Mar 02
12
Call for release testing
Hi,
We are preparing to release another stable OpenSSH soon, so once
again we are asking for your help in testing CVS snapshots.
Changes include:
* ssh(1) now allows the optional specification of an address to bind to
in port forwarding connections (local, remote and dynamic). See the
-L, -R options in the ssh(1) man page as well as LocalForward and
RemoteForward options in
2010 Aug 14
1
bind_address ignored? as in "ssh -R [bind_address]:12491:127.0.0.1:500"
No answers on secureshell at securityfocus.com
I must be doing something wrong or the server seems to ignore my bind request.
Port forwarding is working it just bind to all ips and ignores my bind
request. I've also tried this with an rfc1918 address opposed to a
loopback and had the same results.
Google and the archive haven't helped.
Thanks in advance for your time and consideration.
2015 Sep 26
5
[Bug 2473] New: sshd and -R port forwardings on 127.0.0.0/8
https://bugzilla.mindrot.org/show_bug.cgi?id=2473
Bug ID: 2473
Summary: sshd and -R port forwardings on 127.0.0.0/8
Product: Portable OpenSSH
Version: 6.6p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2005 Sep 01
0
Announce: OpenSSH 4.2 released
OpenSSH 4.2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support of the project, especially those who contributed source,
reported bugs, tested
2005 Sep 01
0
Announce: OpenSSH 4.2 released
OpenSSH 4.2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support of the project, especially those who contributed source,
reported bugs, tested
2005 Nov 30
0
sshd 4.2p1 LocalForward interface binding
There seems to be a change in the logic that sshd
uses in selecting interface to bind for LocalForward
requests from the client.
I have the following setup:
ssh client (10.0.0.1) configured with
"LocalForward 1080 127.0.0.1:1080"
is connecting to sshd server (192.168.0.1).
Before installing openssh-4.2p1 sshd would successfully
establish a forwarding connection for the client:
2013 Dec 19
3
[Bug 2189] New: Client fails to consider hostname when matching rfwd channel opens
https://bugzilla.mindrot.org/show_bug.cgi?id=2189
Bug ID: 2189
Summary: Client fails to consider hostname when matching rfwd
channel opens
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: All
Status: NEW
Severity: minor
Priority: P5
Component: ssh
2010 Aug 07
7
[Bug 1804] New: ssh option -R 127.0.0.2:10443:<dest ip>:443 does not work
https://bugzilla.mindrot.org/show_bug.cgi?id=1804
Summary: ssh option -R 127.0.0.2:10443:<dest ip>:443 does not
work
Product: Portable OpenSSH
Version: 5.5p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo:
2004 Mar 18
1
3.8p1 password expiry, Solaris 8
I can't seem to get the /etc/shadow password expiry working on
3.8p1 on Solaris 8. It works fine with 3.7.1p2 and pwexp26.
Logins aren't affected after a 'passwd -df' or 'passwd -f'.
Here's the configure, using gcc 3.2:
--prefix=/usr --sysconfdir=/etc/ssh --with-tcp-wrappers \
--without-pam --libexecdir=/usr/sbin --mandir=/usr/share/man \
--with-shadow
'uname
2020 Oct 04
3
UpdateHostkeys now enabled by default
On Sun, Oct 04, 2020 at 10:50:32PM +1100, Damien Miller wrote:
> On Sun, 4 Oct 2020, Matthieu Herrb wrote:
>
> > On Sun, Oct 04, 2020 at 09:24:12PM +1100, Damien Miller wrote:
> > > On Sun, 4 Oct 2020, Damien Miller wrote:
> > >
> > > > No - I think you've stumbled on a corner case I hadn't anticipated.
> > > > Does your configuration
2020 Oct 04
2
UpdateHostkeys now enabled by default
On Sun, Oct 04, 2020 at 09:24:12PM +1100, Damien Miller wrote:
> On Sun, 4 Oct 2020, Damien Miller wrote:
>
> > No - I think you've stumbled on a corner case I hadn't anticipated.
> > Does your configuration override CheckHostIP at all?
No.
> >
> > What are the known_hosts entries for the hostname and IP?
>
> Also, do you use HashKnownHosts? or do
2006 May 03
1
BUG: opens all interfaces.
Summary: the newish fourth forwarding argument does not correctly
specify the interface on the remote machine for a tunnel in -R
On OpenSSH_4.3p2 OpenSSL 0.9.7g 11 Apr 2005,
on Kanotix 2.9 kernel 2.6.16.2
and Cygwin 1.5.19(0.150/4/2)
and (old) FreeBSD 4.6-RELEASE
sshd_config file:
AllowTcpForwarding yes
GatewayPorts yes
Set up a forwarding tunnel:
From a Kanotix box inside my firewall:
2016 Aug 01
0
Announce: OpenSSH 7.3 released
OpenSSH 7.3 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support. OpenSSH also includes
transitional support for the legacy SSH 1.3 and 1.5 protocols
that may be enabled at compile-time.
Once again, we would like to thank the OpenSSH community
2000 Nov 27
0
/var/log/btmp logging ?
Hi,
Openssh doesn't log failed logins to /var/log/btmp like login does
(if btmp exists). This is on RH6.2.
Is there a specific reason for not logging to btmp ?
I think that logging to btmp would be a 'good thing'(tm). What about
other unices ? Do they have /var/log/btmp or something similar (AIX has
something like that and I think openssh already logs the failed attempts).
AFAIK
2008 Apr 01
1
OpenSSH_4.7p1, reverse shell
Greetings,
I am using OpenSSH 4.7 and trying to use a middle machine to do reverse
shell. The error I run into is the destination says getsockopt TCP_NODELAY:
Connection reset by peer.
The setup:
3 machines (we can call them A,B,C) with QNX Neutrino
I would like machine C to be the destination. So we have A can talk to B,
and B can talk to C, but A can not talk to C directly.
What I am
2010 Jun 29
2
[Bug 1788] New: simple option to ignore known_hosts
https://bugzilla.mindrot.org/show_bug.cgi?id=1788
Summary: simple option to ignore known_hosts
Product: Portable OpenSSH
Version: 5.5p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy: avalon at