Secure Shell Mode:
(Page 3 of 223)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
Two Factor Authentication with openssh 5.8p1 2011-02-28
Konrad Bucheli (kb open ch)
Hi

Is it possible to configure the openssh (5.8p1) daemon to check both
PubkeyAuthentication and PasswordAuthentication before accepting the user?
Another possibility would be to do the password authentication within
the ssh daemon and then use ForcedCommand to start a script which first
checks the

[ more ]  [ reply ]
OpenSSH Wikibook draft 2011-02-27
Lars Nooden (lars nooden gmail com)
I've posted a draft of a book on using OpenSSH on Wikibooks:
http://en.wikibooks.org/wiki/OpenSSH

Regards
/Lars Nooden

[ more ]  [ reply ]
Chroot: sshd bug ? user redirects to root folder. 2011-02-27
Riccardo Castellani (ric castellani alice it)
I installed openssh-5.6p1 into my Fedora server and I run this service into
chroot mode.
I think to have found out a BUG into this package, specifically into sshd
service:

if remote user tries to connect to this service, where its home directory is
unaccessible because it doesn't respect right p

[ more ]  [ reply ]
Logging in unprivileged child not happening 2011-02-17
akshar kanak (akshar kanak1 gmail com)
Dear Team
       I am using privilege separation in openssh . I am to get the logs
generated by monitor process , but not able to get the logs generated by
unprivileged child process .
I am using "openssh-3.9p1"  .  I have the following configuration in
/etc/sshd/sshd_config

SyslogFacility AU

[ more ]  [ reply ]
automation for creating zone files with SSHFPs 2011-02-10
travis+ml-openssh-users subspacefield org
Hey all,

I'm wondering if anyone has any links or scripts for generating zone
files with the appropriate SSHFPs.

In fact, I'm kinda curious what the best way to GET these FPs is.

I'm also wondering if I'm just better off using certificates and signing
keys that way, because there seems to be a ch

[ more ]  [ reply ]
Re: How do I use ProxyCommand to connect to remote host using shared session enabled by ControMaster? 2011-02-09
Igor Bukanov (igor mir2 org)
For your hosts where you want to connect conditionally over jumphost
your can use a proxy command that points to a shell script like:

ProxyCommand my-proxy-script %h %p

Then the proxy script would contain something like:

if grep -q ad.work.com /etc/resolve; then
#direct cionnection
exec nc $1

[ more ]  [ reply ]
Re: How do I use ProxyCommand to connect to remote host using shared session enabled by ControMaster? 2011-02-08
Igor Bukanov (igor mir2 org) (2 replies)
On 8 February 2011 04:20, Asif Iqbal <vadud3 (at) gmail (dot) com [email concealed]> wrote:
> Is it possible to make it work as default for all hosts except the jumphost?
>
> I tried to replace the remotehost with `*' and then tried to fresh
> start, like below

I suppose you cannot do that since host * provides defaults for al

[ more ]  [ reply ]
How do I use ProxyCommand to connect to remote host using shared session enabled by ControMaster? 2011-02-05
Asif Iqbal (vadud3 gmail com) (1 replies)
Hi,

I am trying to connect to remote host using the session that is
enabled my control master. It works fine if I run it from command
line.

# cat ~/.ssh/config
host jumphost
hostname jumphost.example.net
ForwardX11 yes
ControlMaster auto
ControlPath ~/.ssh/%r@%h:%p

On terminal1

# ssh jumphos

[ more ]  [ reply ]
logging the public key 2011-02-04
Anthony R Fletcher (arif mail nih gov) (1 replies)
We are running OpenSSH versions 4.3 and 5.5 on a mixture of CentOS 5,
Debian and Fedora 14 systems.

Can OpenSSH log which public key, as listed in the authorized keys
file, was used to log in? If so, how? This would be useful for
auditing purposes.

I don't see a config option, so I'm currently usi

[ more ]  [ reply ]
Re: logging the public key 2011-02-07
Maria Iano (maria iano org)
Re: Weird SSH issue. 2011-02-04
Alex John (alex archeleus com) (1 replies)
Hello,

On 3 February 2011 07:48, Darren Tucker <dtucker (at) zip.com (dot) au [email concealed]> wrote:
> On 3/02/11 12:20 AM, Alex John wrote:
>>
>> Hello, I'm having trouble connecting to any server outside my local
>> network since like a week. I could do it without any problems before
>> that.
>
> Sounds like a network pro

[ more ]  [ reply ]
Re: Weird SSH issue. 2011-02-05
Richard Conto (richard conto gmail com)
Re: Multiple forced commands being executed 2011-02-03
Mark Aufflick (mark-secure aufflick com)
FYI - ssh version is:

OpenSSH_5.4p1 FreeBSD-20100308, OpenSSL 0.9.8n 24 Mar 2010

And now I am using my own smtp not Gmail's blacklisted ones hopefully this message will actually make it to the list...

On 03/02/2011, at 1:44 PM, Mark Aufflick wrote:

> FYI I am seeing exactly the same issue. The

[ more ]  [ reply ]
Weird SSH issue. 2011-02-02
Alex John (alex archeleus com) (4 replies)
Hello, I'm having trouble connecting to any server outside my local
network since like a week. I could do it without any problems before
that.

Here's the log

#2.6.35-22-generic x86_64 GNU/Linux
OpenSSH_5.5p1, OpenSSL 0.9.8o 01 Jun 2010
debug1: Reading configuration data /etc/ssh/ssh_config
debug1:

[ more ]  [ reply ]
Re: Weird SSH issue. 2011-02-02
Darren Tucker (dtucker zip com au)
RE: Weird SSH issue. 2011-02-02
Perry B. Whelan (perry commercev3 com)
Re: Weird SSH issue. 2011-02-02
Dennis Nasarov (nasarov gmail com)
Re: Weird SSH issue. 2011-02-02
Wolf (crate live com)
ssh -g -L => bind: Address already in use, but it works anyway 2011-01-28
Robert Dodier (robert infotility com) (1 replies)
Hi,

I'm trying to use ssh for port forwarding.
So far ssh -L has worked just fine for that purpose.
Now I want to bind the port to all interfaces,
so I tried ssh -g -L. The SSH session seems to launch
successfully, and the port is forwarded as expected,
and it is bound to all interfaces. However,
I

[ more ]  [ reply ]
Re: ssh -g -L => bind: Address already in use, but it works anyway 2011-02-07
Robert Dodier (robert infotility com)
Re: Multiple forced commands being executed 2011-01-22
Oliver Beattie (oliver obeattie com)
Hi Dominik,

Thanks for your reply, but I'm not sure I've properly explained what I
mean. In essence, from what I can see, it isn't just executing the
forced command for the key that is being used, it executes the
commands for *every* RSA key in the authorized_keys file, meaning I
get hundreds of co

[ more ]  [ reply ]
(Page 3 of 223)  < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus