Displaying 20 results from an estimated 300 matches similar to: "Patch to log tunnel information"
2009 Jan 30
12
[Bug 1552] New: Patch to log tunnel information
https://bugzilla.mindrot.org/show_bug.cgi?id=1552
Summary: Patch to log tunnel information
Product: Portable OpenSSH
Version: 5.1p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy: jblaine at
2005 Feb 22
0
TR: 3.8.1p1 option "permitopennet" added
Patch is below :
diff -nru openssh-3.8.1p1/auth-options.c openssh-3.8.1p1-devs//auth-options.c
--- openssh-3.8.1p1/auth-options.c Tue Jun 3 02:25:48 2003
+++ openssh-3.8.1p1-devs//auth-options.c Mon Feb 21 16:56:49 2005
@@ -265,6 +265,81 @@
xfree(patterns);
goto next_option;
}
+
+/* e.g: permitopenned="158.156.0.0/255.255.255.0:25[-1024]"
+ * note that part between [] is
2009 Apr 02
2
Method to permit ssh while denying sftp
Is there a way to permit ssh sessions while denying sftp with openssh
3.8?
In openssh 4.4+ this is possible using the Match directive with Force
Command but I don't know how to configure this in older versions.
Thanks in advance for any guidance.
Brenda
2010 Feb 25
1
secure Xapps tunnel
hi,
eventually newbie:
i want to show remote X-apps on my desktop.
now, i know from google that xhost and xauth is not the way to
so that very secure.
now, i have a ssh_config with X forwarding enabled and a server with
forwarding enabled, too.
now when i connect to server i read that ssh creates automaticaly a
Xauthory file.
So i know that this is the xauth way with supercookies etc.
but i
2008 Sep 02
2
Queries on ssh_askpass
Hi,
I had developed a program which spawns a shell where i am trying to use ssh
commands to log into a linux server.
There is a pop up dialog window which is prompting me for key-ing the
password.
Actually i want to get rid of this pop up dialog box, as i don't want this
to be visible in my program/code execution.
Could you please let me know is there any way to resolve and stop this
2008 Dec 16
2
Request change to file match.c, function match_pattern_list
Greetings,
This request is in the grey area between a bug report and an
enhancement request.
Request
-------
Please apply the following diff (or something functionally similar) to
file ``match.c'' in OpenSSH-5.1p1:
161a162,164
> } else {
> if (negated)
> got_positive = 1; /* Negative match, negated = Positive */
In case the lines above wrapped in the email
2008 Dec 09
2
Feature request: AlwaysDenyLogin, LoginDelayTime
Please consider adding the following features to sshd:
1. AlwaysDenyLogin - a setting that will result in always denying
login regardless of the credentials given by the client.
2. LoginDelayTime - to specify a delay in milliseconds before the
server responds to a client's login attempt.
These would help to employ brute force bots.
Regards
2008 Jul 15
2
Risk of StrictMode (but read only)
Is there a risk associated with having authorized_keys files set to readable but "StrictMode no"?
I am thinking particularly in the case of having public keys all centralized in a directory in /etc or something.
Is it really a potential hack vector if someone can read a public key, or is the only real danger if they were writable?
---
Don Hoover
dxh at yahoo.com
2008 Aug 20
1
using ssh-add unattended on dubious files -- how can i avoid a hang?
I need ssh-add to fail cleanly if it tries and fails to read a key,
rather than prompting the user. I can't seem to figure out how to do
that.
This is on a Linux 2.6.26 system, running OpenSSH 5.1p1 (as built on
debian lenny/sid)
First, the things i've tried:
* i've unset the DISPLAY and SSH_ASKPASS environment variables, so no
X11-style prompting should happen.
* i've
2008 Nov 11
2
Fwd: Permissions in chroot SFTP
Hi,
I configured openssh 5.1p1 for sftp server.
Here the specifications in sshd_config file:
Subsystem sftp internal-sftp
Match Group sftp
ForceCommand internal-sftp
ChrootDirectory /home/%u
AllowTcpForwarding no
When a user is logged in, he can't upload his document and he receives
this message:
carlo at Music:~$ sftp user at 213.217.147.123
Connecting to
2004 Sep 07
0
Please review openssh patch for selinux
As posted, here is an updated patch which allows openssh to be built
with non-selinux config.
(Hi openssh guys, forwarding this to you incase you interested including
it into the devel version of openssh. Please let us know if you have any
suggestions or changes that need to be made)
Regards
Nigel Kukard
On Thu, Sep 02, 2004 at 04:11:54PM -0400, Daniel J Walsh wrote:
> New SSH patch.
>
2008 Nov 21
3
OpenSSH security advisory: cbc.adv
OpenSSH Security Advisory: cbc.adv
Regarding the "Plaintext Recovery Attack Against SSH" reported as
CPNI-957037[1]:
The OpenSSH team has been made aware of an attack against the SSH
protocol version 2 by researchers at the University of London.
Unfortunately, due to the report lacking any detailed technical
description of the attack and CPNI's unwillingness to share necessary
2009 Dec 23
3
Question on SSH_ASKPASS
Hi everybody,
I have asked a question a long time ago regarding SSH_ASKPASS, but with the
latest version of OpenSSH I am not able to get the desired result.
My goal is to launch a script on a remote server via SSH without having to
type a password, because it is locally executed from a script. This should
not be too complicated, but somehow I am not able to figure this out myself.
I have
2003 Jan 29
0
[PATCH] features for restricted shell environments
The patch below implements a couple of features which are useful
in an environment where users do not have a regular shell login.
It allows you to selectively disable certain features on a
system-wide level for users with a certain shell; it also allows
you to control and audit TCP forwarding in more detail.
Our system is an email server with a menu for the login shell;
we selectively allow port
2006 Jan 08
3
Allow --without-privsep build.
I've been trying to cut down the size of openssh so I can run it on my
Nokia 770. One thing which helps a fair amount (and will help even more
when I get '-ffunction-sections -fdata-sections --gc-sections' working)
is to have the option of compiling out privilege separation...
Is it worth me tidying this up and trying to make it apply properly to
the OpenBSD version? Does the openbsd
2009 Sep 14
2
[PATCH node-image] add livecd-iso-to-iscsi script to support iscsi root booting setup
This enables the ability to take the ovirt-node-image iso and deploy it to an iscsi disk. It also provides a sample pxe configuration for booting based on the iscsi root device. Includes support for user/password as well as reverse chap user/password.
---
Makefile.am | 1 +
livecd-iso-to-iscsi | 201 ++++++++++++++++++++++++++++++++++++++++++++++
ovirt-node-image.spec.in |
2001 Jun 20
1
openssh and port forwarding as root
Hi,
Openssh sshd opens the socket that forwards users requested port
forwards as root, so the connection seems to come from root. Is it
enough to open the socket as normal user so the connection would appear
to come from that user ? (On Linux this seems to work, but what about
other OS's ?)
I tested this briefly by wrapping the
channel_connect_to(target,target_port);
(in
2003 Sep 26
0
(no subject)
Hi,
I'm not on the openss-unix-dev mailing list, but I want to ask about a feature
that I've put into my local implementation of OpenSSH the past year or so, and I
wanted to know if it was worthwile to add it to the sources so that I don't have
to add it myself each time I upgrade...
About a year ago I was working for a company that wanted to use OpenSSH as a
server (on a Linux
2004 Jul 14
1
New dynamic window patch (with limits)
As before, it is described on our website. This should apply fairly
cleanly to both portable and openbsd ssh.
http://www.psc.edu/networking/hpn-ssh/
Only in openssh-3.8.1p1-dynwindow: Makefile
diff -u openssh-3.8.1p1/buffer.c openssh-3.8.1p1-dynwindow/buffer.c
--- openssh-3.8.1p1/buffer.c 2003-11-21 07:56:47.000000000 -0500
+++ openssh-3.8.1p1-dynwindow/buffer.c 2004-07-12 07:49:29.000000000
2000 Aug 13
1
Patches for openssh port forwarding
Hi !
I hacked together a couple of patches for Openssh 2.1.1p4 port forwarding.
It is a one patch file that does the following two things:
First:
If the server is configured not to allow port forwardings it sends
SSH_SMSG_FAILURE (protocol 1) while openssh client expects SSH_SMSG_SUCCESS.
When the client gets the failure it exists with protocol error message.
This patch will accept both failure