On 27/08/2020 14:40, Grant Edwards wrote:
> I do _not_ want it to listen on 0.0.0.0.
>
> I want it to listen on 127.0.0.1 and on whatever IP addresses are
> assigned to two specified interfaces.
As far as I'm aware, I don't think OpenSSH allows for listening on a
specific interfa
a non-root user. See
below.
[i660][waltdnes][~] ssh thimk
[thimk][root][~]
[i660][waltdnes][~] ssh waltdnes@thimk
[thimk][waltdnes][~]
Is this a recent change?
Have you tried ssh -v, or even multiple -v's?
What versions? I've got openssh-8.3_p1-r2, and haven't seen any such
issues. I do
t; Everything on the net talks about how to generate key files of the
> appropriate type, but I'm don't want to generate a key file.
>
> Apparently, this is a gentoo configuration issue. USE flags of openssh
> on both machines are the same.
>
> There are two news items related to
On 2024-01-08, the...@sys-concept.com wrote:
> On 1/6/24 20:09, the...@sys-concept.com wrote:
>> I installed openssh server on Windows 11 and tried to ssh to it
>> using the id_rsa.pub key
>> but I didn't have luck. I copied the key to .ssh\authorized_keys file.
>> On
On 1/8/24 01:41, Nuno Silva wrote:
On 2024-01-08, the...@sys-concept.com wrote:
On 1/6/24 20:09, the...@sys-concept.com wrote:
I installed openssh server on Windows 11 and tried to ssh to it
using the id_rsa.pub key
but I didn't have luck. I copied the key to .ssh\authorized_keys file
from comments [1] it appears to be an undocumented legacy feature.
[1]
https://github.com/search?q=repo%3Aopenssh%2Fopenssh-portable+known_hosts2=commits
On 08.01.24 01:32, the...@sys-concept.com wrote:
On 1/6/24 20:09, the...@sys-concept.com wrote:
I installed openssh server on Windows 11
Hi,
when I try to log in with openssh, this happens:
ssh -v -v [EMAIL PROTECTED]
OpenSSH_4.2p1, OpenSSL 0.9.7i 14 Oct 2005
debug1: Reading configuration data /etc/ssh/ssh_config
debug2: ssh_connect: needpriv 0
debug1: Connecting to stud4.tuwien.ac.at [193.170.75.14] port 22.
debug1: Connection
Hi,
when I try to log in with openssh, this happens:
ssh -v -v [EMAIL PROTECTED]
OpenSSH_4.2p1, OpenSSL 0.9.7i 14 Oct 2005
debug1: Reading configuration data /etc/ssh/ssh_config
debug2: ssh_connect: needpriv 0
debug1: Connecting to stud4.tuwien.ac.at [193.170.75.14] port 22.
debug1: Connection
Hi,
when I try to log in with openssh, this happens:
ssh -v -v [EMAIL PROTECTED]
OpenSSH_4.2p1, OpenSSL 0.9.7i 14 Oct 2005
debug1: Reading configuration data /etc/ssh/ssh_config
debug2: ssh_connect: needpriv 0
debug1: Connecting to stud4.tuwien.ac.at
[193.170.75.14] port 22.
debug1: Connection
:
publickey
debug1: Offering public key: /home/michael/.ssh/id_dsa
debug1: Authentications that can continue:
publickey,gssapi-with-mic,password debug1: Next authentication method:
password
==
that's strange.
which version of openssh do you use in the server
which: no java in (/usr/local/bin:/usr/bin:/bin)
[EMAIL PROTECTED] ~ $ locate javac | grep bin
/opt/blackdown-jdk-1.4.2.02/bin/javac
[EMAIL PROTECTED] ~ $ echo $PATH
/usr/local/bin:/usr/bin:/bin
Hey, you're right! How'd that happen? I wonder does
this have something to do with an emerge -C openssh
with
the service?
I don't understand what you're arguing here. *THE INITSCRIPT IS OWNED
BY THE SERVICE PACKAGE*, not by the init package. E.g. net-misc/openssh,
not sys-apps/openrc.
waltdnes@d530 ~ $ equery b /etc/init.d/sshd
* Searching for /etc/init.d/sshd ...
net-misc/openssh-5.8_p1-r1
a PowerShell login session[1], and give it equal
privileges and security controls as they have for any other login
session.
How many years have they had? I'd given up on this years ago.
SFU is available in the Server Core configuration. I imagine you
could run OpenSSH under there. Or some
and security controls as they have for any other login
session.
How many years have they had? I'd given up on this years ago.
SFU is available in the Server Core configuration. I imagine you
could run OpenSSH under there. Or some commercial entity could come
along and provide an SSH+screen(ish
On Sun, Dec 21, 2014 at 1:17 AM, Harry Putnam rea...@newsguy.com wrote:
This properly belongs on the ssh group, but posting there has not gotten
any responses... and the list is quite slow to boot.
I like using ssh -X to other lan remotes but with new versions of openssh
or perhaps
It isn't good idea to mount nfs over openvpn. Both are highly unstable.
You should try openssh and it's simple tunnel and ftp over it or any other
networked file system. If you really need to use nfs set it to use tcp.
--
Morpheus: No, what happened, happened and couldn't have happened any
be
anything other than a Windows app and as such is restricted to how Windows
apps must behave. And therein is the problem - I'm way too used to openssh, I
want a command line to fire up my ssh client, I want to 'ssh m...@there' in a
console and it must work. I don't want to have to poke around in a vast
-misc/openssh-4.2_p1-r1
[ebuild R ] mail-filter/spamassassin-3.1.0
[ebuild R ] net-mail/fetchmail-6.2.5.2-r1
[ebuild R ] mail-mta/postfix-2.2.5
[ebuild R ] net-fs/samba-3.0.14a-r2
[ebuild R ] x11-libs/qt-3.3.4-r8
[ebuild R ] kde-base/kdelibs-3.4.3-r1
[ebuild R
userlocales
=dev-lang/php-5.0.5-r5 dba mysql
Calculating world dependencies ...done!
[ebuild R ] net-ftp/proftpd-1.2.10-r7
[ebuild R ] sys-devel/make-3.80-r3
[ebuild R ] net-misc/openssh-4.2_p1-r1
[ebuild R ] mail-filter/spamassassin-3.1.0
[ebuild R ] net-mail/fetchmail
that is secure and that is more
than likely to work out of box.
I'm not sure which Gentoo quickstart guide you are following, but it
is an out of date guide. I recommend emerge -1 openssh, then running
etc-update and applying the default configuration. Your goal is to get
a basic working ssh daemon
by that is next to zero, and on recent systems it is also impossible to
cause significant load with ssh-login-attempts.
Uh-huh. We all said that for many years. Then some bright spark actually
looked at the patches the debian openssh maintainer was applying and we all
had one of those special
should compile for 32 bits.
The applications are:
- Seamoneky/Firefox
- Java
- Flash
- Audacious
- mplayer
- VirtualBox/VMware
- Qemu
- Kerberos/OpenLDAP/OpenSSH (for these I think they are stable)
- X.org/fluxbox
- system suspending
With very very few exceptions, stability
! Where does the 62 come from?
# emerge -ept system | grep ebuild | grep -v '] '
[ebuild N] sys-devel/bin86-0.16.17
[ebuild N] sys-apps/hdparm-5.7-r1
[ebuild N] sys-libs/pwdb-0.62
[ebuild N] net-misc/openssh-3.9_p1-r2
[ebuild N] sys-apps/module-init-tools-3.0-r2
[ebuild N
they reported:
glibc 2.3.5 does not adhere to gcc4's strictness
wget won't compile
openssh won't compile
e2fsprogs won't compile
...and more
There's one gigantic gcc 4.0 thread in the forums, it began life as
gcc 3.4.0 thread, however, go a bit past half way before you hit the
4.0 stuff
For some reason, my SSH (openssh-4.5_p1-r1) refuses to remember any
hosts I connect to, and even if I keep connecting to the same machine
over and over, it still wants me to OK the RSA fingerprint manually.
Here's the verbose output when I try to connect to a known machine:
ssh -v
of security is
not concern for you. You'll be depending on the security of ssh. While
not completely spotless (e.g. the zlib vulnerability bit openssh) it was,
at least, designed with security in mind.
Also,
I'm the only user on all of my systems so it would be OK to use plain
ssh without
not completely spotless (e.g. the zlib vulnerability bit openssh) it was,
at least, designed with security in mind.
Nice.
Also,
I'm the only user on all of my systems so it would be OK to use plain
ssh without PKI right?
Unfortunately, no. Not because it's less secure (though, it might
to burn to a CD just so I can put it
on another machine 5 feet away.
Step 1 is to make sure that you can traceroute or ping from one
machine to the other. Once you know that you're connected, you can
emerge openssh. You can run with /etc/ssh/sshd_config left at default
values. But you'll want
nocommonslogging nocommonsnet nodrm nogg nogulm nojsch
nojython nolog4j nomac nooro nopri norhino noxalan noxerces nozaptel
nptl nsplugin offensive ogg opengl openssh pam_console pam_timestamp
passfile password patented pccts pcmcia pcre perl perlsuid pic player
png pnp pppd qt quicktime rar readline real
stuff has not changed since some time in 2004.
Moreover, equery belongs cannot locate any package that owns the sshd2 files.
The sshd files belong to net-misc/openssh-4.3_p2-r1.
AHAH! I've already solved part of the problem, because when I start sshd, I get this:
treat init.d # ./sshd start
email program and browser are SOCKS aware, you could
simply set them up to use your ssh connection as a SOCKS proxy. There's
specific support for this in OpenSSH, so that you don't have to open ports
individually, it can be done dynamically on-demand.
Cool! I'll check it out.
Never used
with my firewall down, I will have no way
to look up more information from the Internet). Does anyone know what
this error signifies in this context, or have any suggestions on how to
recover?
Thanks,
Rennie deGraaf
Hi,
Just reboot and try again.
IIRC the solution was to rebuild openssh
handed root privileges.
If you do go about setting it up that way... OpenSSH sets variables[1]
regarding the session (IP and such) and those can be used to identify
that. The `tty` command[2] can be used to tell you whether the access
is direct physical access to the system's virtual consoles
by ('installed', '/',
'net-misc/openssh-5.2_p1-r3', 'nomerge')
=sys-auth/pambase-20080219.1 required by ('installed', '/',
'sys-apps/shadow-4.1.2.2', 'nomerge')
(and 1 more)
It may be possible to solve this problem by using package.mask to
prevent one of those packages from being selected. However
by
('installed', '/', 'net-misc/openssh-5.2_p1-r3', 'nomerge')
=sys-auth/pambase-20080219.1 required by
('installed', '/', 'sys-apps/shadow-4.1.2.2', 'nomerge')
(and 1 more)
It may be possible to solve this problem by using package.mask to
prevent one of those packages from being selected. However
is
connected to the switch in the basement. The only problem I ever had
was when the dhcp address changed, then it needed to be added to the
PORT FORWARDING section of the switch with port 22.
Remember I can still log in remotely from Redhat and Suse boxes that
weren't updated with the new openssh
:
2011/3/1 Naira Kaieskina...@faccat.br:
Good afternoon,
Staff set up openssh to direct users to a certain group members to a chroot
environment and these users will have access only to the server using sftp
protocol.
Put in the sshd_config file:
Match Group customers
ChrootDirectory% h
clients are hitting it. If I'm working remotely, I don't want to
update openvpn, iptables, or even openssh. There's a long list of
packages that I just ain't gonna mess with during the day.
You have a production machine delivering valuable services to multiple
users.
Therefore you must
* try (and fail) to open /dev/ptyp0
Since I know that last bit is openssh trying to open an old-style
BSD
pty, I can only assume that something is going wrong trying to
allocate the pty the correct way.
For the time being I've added BSD pty support into my kernel and
everything seems
.
You use a .service unit file instead of a .socket unit file. That's it.
For OpenSSH, for example, you can enable sshd.service[1], and then the
SSH daemon works as it does in OpenRC. If you instead enable
sshd.socket[2], then the daemon will start on demand.
You don't have to *disable* anything; you
clients on remote servers. But, you still get all the
baggage.
I'm not familiar with the internals of pinentry, but this probably why
you're frustrated with it.
In any case, I suspect that gpg-agent is actually serving passwords to
openssh, so the file you want is ~/.gnupg/gpg-agent.conf - it probably
On Sat, Jul 5, 2014 at 11:42 PM, Chris Stankevitz
chrisstankev...@gmail.com wrote:
On Sat, Jul 5, 2014 at 7:57 PM, Rich Freeman ri...@gentoo.org wrote:
In any case, I suspect that gpg-agent is actually serving passwords to
openssh, so the file you want is ~/.gnupg/gpg-agent.conf - it probably
better
file /etc/fstab root:root 644
# Root password
file /etc/shadow root:root 640
# Logger
pkg app-admin/syslog-ng
# Network
pkg net-misc/dhcpcd
enable dhcpcd
# For remote access
pkg net-misc/openssh
file /etc/ssh/sshd_config root:root 600
file /etc
to quickly test this firewall from another local
> > workstation?
> nmap -A -T4 -P0 -vvv -p1-65535 XXX.XX.XXX.XX
Worked flawlessly. Very precise syntax (thanks). Here are the highlights::
Not shown: 65534 closed ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 5.9p1-hpn
-client/thunderbird-31.7.0 (=sys-devel/autoconf-2.1*)
net-libs/libnet-1.1.6 (sys-devel/autoconf)
net-misc/openssh-6.7_p1 (sys-devel/autoconf)
sys-apps/attr-2.4.47-r1 (sys-devel/autoconf)
www-client/firefox-31.7.0 (=sys-devel/autoconf-2.1*)
www-client/seamonkey-2.33.1-r1 (=sys-devel/autoconf-2.1
I have exactly the same problem mentioned in this thread. I think something
changed and broke the authentication during an update. i found this message by
Googling and just joined the mail list to ask for help. I have done everything
mentioned in the thread, and here's where I'm at: (it worked
I would need a magnifying glass to read this. Please don't use HTML on this
list.
On Wednesday 25 November 2015 18:50:14 Bill Damage wrote:
> I have exactly the same problem mentioned in this thread. I think
> something changed and broke the authentication during an update. i found
> this
n of:
1. A minimal set of bootstrap packages needed to build the rest of the distro.
2. Some useful tools that is hard to live without.
Openssh falls into #2, as does an editor (typically nano by default).
The reality is that you can can run a system without either, and you
can install either
tnetwork-5.6.2:5/5.6::gentoo, ebuild scheduled for merge)
>
>
:0[bindist=] required by
(dev-qt/qtnetwork-5.6.2:5/5.6::gentoo, ebuild scheduled for merge)
(dev-libs/openssl-1.0.2k:0/0::gentoo, installed) pulled in by
>=dev-l
0.2n -bindist
The following USE changes are necessary to proceed:
(see "package.use" in the portage(5) man page for more details)
# required by net-misc/openssh-7.6_p1-r1::gentoo[-libressl,ssl,-static]
# required by gnome-base/gvfs-1.32.1-r1::gentoo
# required by sci-geosciences/geoc
rnel devs are
secretive about kernel exploits, because they know there are literally millions
of systems out there on the internet with kernels months and years old.
You're right about the attack vectors, which is why I prioritise the apps and
servers I run - an attacker has to get past those
with a changing IP address. I would have been
much more likely to look at OpenVPN or Wireguard or OpenSSH.
Finally, there is SSTP encrypting PPP frames within TLS. I don't know
why one would use this instead of OpenVPN, except that it comes as part
of the MSWindows package, while OpenVPN has
stalls?
>>>>
>>> So far so good. The basic system is installed and booting. One
>>>
>>> question... can I just set the "bindist" USE flag globally. On a basic
>>> text install (Xorg not installed yet) in package.use I've already set.
gt; sleep 5
> > echo 'finished sleeping'
> > elif test "$CATEGORY/$PN" = "mail-mta/postfix"; then
> > /etc/init.d/postfix status && /etc/init.d/postfix restart
> > elif test "$CATEGORY/$PN" = "net-misc/o
joseph/.ssh/id_ed25519-cert type -1
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_7.5p1-hpn14v12lpk
debug1: Remote protocol version 2.0, remote software version OpenSSH_8.1
debug1: match: OpenSSH_8.1 pat OpenSSH* compat 0x0400
debug1: Remote is NON-
ncv no_tmpfs.conf
#net-libs/nodejs no_tmpfs.conf
#net-misc/openssh no_tmpfs.conf
#sci-libs/tensorflow no_tmpfs.conf
#sys-apps/iproute2 no_tmpfs.conf
#sys-devel/clang no_tmpfs.conf
#sys-devel/gcc no_tmpfs.conf
#www-client/chromium no_tmpfs.conf #throttle_make_emerge.conf
#www-cli
On 1/8/24 07:48, Andreas Fink wrote:
On Sat, 6 Jan 2024 20:09:37 -0700
the...@sys-concept.com wrote:
I installed openssh server on Windows 11 and tried to ssh to it using the
id_rsa.pub key
but I didn't have luck. I copied the key to .ssh\authorized_keys file.
On linux the last line ending
On Monday, 8 January 2024 13:45:16 GMT the...@sys-concept.com wrote:
> On 1/8/24 01:41, Nuno Silva wrote:
> > On 2024-01-08, the...@sys-concept.com wrote:
> >> On 1/6/24 20:09, the...@sys-concept.com wrote:
> >>> I installed openssh server on Windows 11 and
On 2024-01-08, the...@sys-concept.com wrote:
> On 1/8/24 01:41, Nuno Silva wrote:
>> On 2024-01-08, the...@sys-concept.com wrote:
>>
>>> On 1/6/24 20:09, the...@sys-concept.com wrote:
>>>> I installed openssh server on Windows 11 and tried to ssh to it
>
e may not be what
you think.
> Seems like that might expect X as well
> I expected to find a choice of `server' but don't see that.
>
>
> Even with the leg up you gave me, I'm still not real sure what the output
> is telling me:
>
> Like where it says something is requir
m listing quite a few non-X pkgs but saying:
(dependency required by "net-misc/openssh-7.3_p1-r8::gentoo[pam]" [ebuild])
What dependancy.. use use flag of X?
Also, I thought it might help to stick a use flag of `-gtk' in
make.conf. But when I did that just now as an ex
):
Not shown: 1708 closed ports
PORTSTATESERVICE VERSION
20/tcp filtered ftp-data
21/tcp filtered ftp
22/tcp open ssh OpenSSH 4.7 (protocol 2.0)
25/tcp open smtp Exim smtpd 4.69
80/tcp open http Apache httpd
143/tcp filtered imap
443/tcp filtered https
No OS
Hi All,
For some reason my Gentoo rsa public key is not liked by 3.9p1-11.el4_7 sshd,
which is running on a CentOS server. On the Gentoo machine I am running
net-misc/openssh-5.1_p1-r1. This is what it shows:
===
debug1: fd 3 clearing O_NONBLOCK
, move the private
key over to the client and then try to login - still no result! :-(
It has to be some sort of incompatibility between the two versions of
OpenSSH.
Don't know what else to assume with this problem.
It definitely looks like the server doesn't like your private key. Did
nozaptel nptl nsplugin offensive ogg opengl openssh pam_console pam_timestamp passfile password patented pccts pcmcia pcre perl perlsuid pic player png pnp pppd qt quicktime rar readline real recode reflection reiserfs sdl sendfile sensord session sftp sms spell spf spl sse sse2 ssl
startup
-0.4.1_pre20060122 USE=-mozilla*
[ebuild R ] net-misc/openssh-4.3_p2-r1 USE=-ldap*
[ebuild R ] media-sound/timidity++-2.13.2 USE=-nas*
[ebuild R ] net-www/apache-2.0.55-r1 USE=-ldap*
[ebuild R ] net-misc/curl-7.15.1-r1 USE=-idn* -ldap*
[ebuild R ] x11-libs/qt-3.3.6-r1 USE=-nas
for the service to be configured
and properly operate.
My point is that the startup, sanity-checking, and initialization code
has to go *SOMEWHERE*. Where do you propose moving it to?
Sure. But there's a difference between moving, e.g. sshd's first-time
code into the net-misc/openssh package
the
connecting user a PowerShell login session[1], and give it equal
privileges and security controls as they have for any other login
session.
How many years have they had? I'd given up on this years ago.
SFU is available in the Server Core configuration. I imagine you
could run OpenSSH under
-- public key auth to exchange a symmetric key, both of which use
tried-and-true algorithms/code.
So its completely as well-audited and secure as openssh was when
the Debian disaster happened. Also IIRC there are currently
some timing attacks against certain SSL modes, and who knows
when some
find
how.
You use a .service unit file instead of a .socket unit file. That's it.
thanks good to know that is all you need
For OpenSSH, for example, you can enable sshd.service[1], and then the
SSH daemon works as it does in OpenRC. If you instead enable
sshd.socket[2], then the daemon
(sys-devel/autoconf)
app-editors/vim-core-7.4.273 (sys-devel/autoconf)
mail-client/thunderbird-31.7.0 (=sys-devel/autoconf-2.1*)
net-libs/libnet-1.1.6 (sys-devel/autoconf)
net-misc/openssh-6.7_p1 (sys-devel/autoconf)
sys-apps/attr-2.4.47-r1 (sys-devel/autoconf)
www-client/firefox-31.7.0 (=sys
I meant the log for the SSH server, on the machine you are trying to
connect to, not the nx log. On the SSH server, run
grep sshd /var/log/messages
Here it is:
Nov 29 11:07:18 tiger kernel: audit: type=1109 audit(1448795238.479:95):
pid=12140 uid=0 auid=4294967295 ses=4294967295
I also read the link you sent which prompted me to run the query:
~]# ssh -G nx
user root
hostname nx
port 22
addressfamily any
batchmode no
canonicalizefallbacklocal yes
canonicalizehostname false
challengeresponseauthentication yes
checkhostip yes
compression no
controlmaster false
uired by "sys-auth/consolekit-1.1.0-r1::gentoo[policykit]"
>> [installed])
>> (dependency required by "sys-auth/pambase-20150213::gentoo[consolekit]"
>> [installed])
>> (dependency required by "net-misc/openssh-7.3_p1-r8::gentoo[pam]" [ebuild])
>&
ackage instances within a single package slot have been
> > pulled !!! into the dependency graph, resulting in a slot conflict:
> >
> > dev-libs/openssl:0
> >
> > (dev-libs/openssl-1.0.2k:0/0::gentoo, ebuild scheduled for merge)
> > pulled in by
> > dev-libs/openssl:0[bindist=] required by
> > (dev-
resume a suspended vagrant machine
snapshot manages snapshots: saving, restoring, etc.
ssh connects to machine via SSH
ssh-config outputs OpenSSH valid configuration to connect
to the machine
status outputs status of the vagrant
with the handshake,
> but eventually can't do the key exchange.
>
> I've just looked at the USE flags :
>
> root:528 ssh> eix net-misc/openssh
> Available versions: 7.5_p1-r4 7.7_p1-r9^t 7.9_p1-r4^t {X X509 audit
> bindist debug (+)hpn kerberos ldap ldns libedit libressl
same time on the same system.
(sys-apps/shadow-4.8.1-r2:0/0::gentoo, ebuild scheduled for merge)
pulled in by
sys-apps/shadow required by @system
sys-apps/shadow required by (net-misc/openssh-8.2_p1-r6:0/0::gentoo,
ebuild scheduled for merge) USE="X pam pie ssl -X509 -audit -bi
/etc/init.d/dovecot status && /etc/init.d/dovecot restart
> > > echo 'going to sleep'
> > > sleep 5
> > > echo 'finished sleeping'
> > > elif test "$CATEGORY/$PN" = "mail-mta/postfix"; then
> >
bird no_tmpfs.conf
#media-libs/opencv no_tmpfs.conf
#media-libs/opencv no_tmpfs.conf
#net-libs/nodejs no_tmpfs.conf
#net-misc/openssh no_tmpfs.conf
#sci-libs/tensorflow no_tmpfs.conf
#sys-apps/iproute2 no_tmpfs.conf
#sys-devel/clang no_tmpfs.conf
#sys-devel/gcc no_t
19 20:47:25 2007 net-misc/openssh-4.6_p1-r3
Sun Aug 19 20:55:39 2007 net-dns/libidn-0.6.9-r1
Sun Aug 19 21:04:32 2007 net-misc/curl-7.16.4
Sun Aug 19 21:04:37 2007 net-misc/netkit-talk-0.17-r4
Sun Aug 19 23:50:57 2007 dev-libs/apr-util-1.2.8
Mon Aug 20 00:03:20 2007
? =net-nds/openldap-2.0)
mail-client/claws-mail-3.7.1 (ldap? =net-nds/openldap-2.0.7)
net-firewall/ipsec-tools-0.7.1 (ldap? net-nds/openldap)
net-fs/samba-3.0.33 (ldap? net-nds/openldap)
net-misc/curl-7.19.4 (ldap? net-nds/openldap)
net-misc/openssh-5.1_p1-r2 (ldap? net-nds/openldap)
net-misc
I've three independent hosts - imaginatively called A, B and C.
Firewall rules dictate that A can be directly accessed from B, but not
from C... A and B run the openssh sshd, and C is a terminal with a
working X-Windows display. C has a ssh session opened with B which
tunnels port 22 on C to 22
>=sys-libs/zlib-1.1.3:0/0= required by
(dev-lang/python-2.7.12:2.7/2.7::gentoo, installed)
^
>=sys-libs/zlib-1.2.3:0/0= required by
(net-misc/openss
installed)
^
dev-libs/openssl:0/0= required by (app-text/mupdf-1.13.0:0/1.13.0::gentoo,
installed)
^
>=dev-libs/openssl-1.0.1h-r2:0/0=[abi_x86_64(-)] required by
(dev-libs/cyrus-sasl-2.1.26-r9:2/2::gentoo, installed)
debug1: inetd sockets after dupping: 3, 3
Connection from 192.168.1.2 port 57643
debug1: Client protocol version 2.0; client software version OpenSSH_4.7
debug1: match: OpenSSH_4.7 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_4.7
imap imlib ipv6 jabber java
jpeg junit kde kdeenablefinal kdexdeltas lcms ldap libcaca libg++ libwww mad
matroska mhash mikmod mmx mng motif mp3 mpeg mppe-mppc mssql mysql nas
ncurses network nls nowin nvidia ogg oggvorbis openal opengl openntpd openssh
oss pam pcre pdflib perl png python qt
bian-8.sarge.4
debug1: match: OpenSSH_3.8.1p1 Debian-8.sarge.4 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.8.1p1 Debian-8.sarge.4
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server
G77PnanroXRltQPbfSUao7E=
=NW2Q
-END PGP SIGNATURE-
app-shells/bash bashlogger
net-wireless/madwifi-ng injection
sys-devel/gcc gcj objc objc++ objc-gc
net-misc/openssh X509 chroot hpn libedit
# -- XGL --
dev-util/subversion -nowebdav
x11-libs/cairo glitz pdf png X
x11-libs/cairo newspr
x11-libs/libXft
-apps/less-394 [385_p4-r2] USE=unicode*
[ebuild U ] sys-libs/cracklib-2.8.9 [2.8.5]
[ebuild U ] sys-libs/pam-0.78-r5 [0.78-r3]
[ebuild R ] sys-apps/tcp-wrappers-7.6-r8 USE=ipv6*
[ebuild U ] net-misc/openssh-4.3_p2-r1 [4.2_p1-r1] USE=ipv6*
[ebuild U ] sys-apps/shadow-4.0.14-r2
tool which I use occasionally (remotely over SSH/X11) -
tinyca is the only GUI application I need to install.
In the past I've run emerge tinyca and all the dependencies were sorted
out for me... However, with the latest portage, and only
apache/zope/postfix/dovecot/openssh installed from it, when I
with the SSH portion of the brute
forcing problem, /. had an article about it a few weeks back. There
were MANY IDS systems posted in the comments that specifically works
with openssh.
HTH,
W
2005/8/3, Willie Wong [EMAIL PROTECTED]:
On Tue, Aug 02, 2005 at 09:43:17PM -0400, Colin wrote
nptlonly ntfs ogg opengl openssh openssl oracle
ospfapi oss pam pcre pdf pdflib perl png postfix pppd python qmail qt
quicktime readline realms reflection rrdcgi rrdtool sasl sdl sendmail
session spamassassin spell spl ssl stream tcp-zebra tcpd tcpmd5
truetype truetype-fonts type1-fonts udev unicode
-4.39-r2', 'merge')
('installed', '/', 'sys-auth/pambase-20090620.1-r1', 'nomerge') pulled in by
sys-auth/pambase required by world
=sys-auth/pambase-20081028 required by ('installed', '/',
'net-misc/openssh-5.2_p1-r3', 'nomerge')
=sys-auth/pambase-20080219.1 required by ('installed
by portage for openssh:/var/empty:/sbin/nologin
messagebus:x:101:199:added by portage for dbus:/dev/null:/sbin/nologin
avahi:x:102:197:added by portage for avahi:/dev/null:/sbin/nologin
mysql:x:60:60:added by portage for mysql:/dev/null:/sbin/nologin
ldap:x:439:439:added by portage for
openldap:/usr/lib64
arguing here. *THE INITSCRIPT IS OWNED
BY
THE SERVICE PACKAGE*, not by the init package. E.g. net-misc/openssh, not
sys-apps/openrc.
You are absolutely correct; the discussion of who owns the init script is
completely tangential to the system vs openrc argument; in both cases, the
required
Sep 8 23:11:19 2012 net-misc/openssh-6.1_p1
Sun Sep 9 17:15:50 2012 sys-apps/portage-2.1.11.14
Sun Sep 9 17:28:38 2012 dev-libs/mpc-1.0.1
Sun Sep 9 17:28:50 2012 media-sound/alsa-utils-1.0.26
Sun Sep 9 17:28:53 2012 dev-util/gdbus-codegen-2.32.4
Sun Sep 9 17:29:30 2012 dev-libs/libxml2
-sound/timidity++ -X
media-sound/mpg123 alsa
media-video/ffmpeg alsa faac faad
media-video/mplayer iconv
media-libs/libpng apng
media-libs/libtheora encode
media-video/avidemux x264
media-video/mplayer alsa ass encode i8x0 mmxext real ssse3 -joystick quicktime
rtmp -vorbis x264 xvmc
net-misc/openssh
multi-user.target
After=syslog.target network.target auditd.service
systemd-journald.socket basic.target system.slice
Description=OpenSSH server daemon
LoadState=loaded
For performance reasons, some things are passed or stored as data. Bu
everything works with text also. So, again, it passes your
501 - 600 of 680 matches
Mail list logo