https://bugzilla.mindrot.org/show_bug.cgi?id=3421
Dmitry Belyavskiy changed:
What|Removed |Added
CC||dbely...@redhat.com
--- Comment #1 fr
https://bugzilla.mindrot.org/show_bug.cgi?id=3800
suryalegend89 changed:
What|Removed |Added
CC||suryalegen...@gmail.com
--
You are recei
https://bugzilla.mindrot.org/show_bug.cgi?id=3800
Bug ID: 3800
Summary: OpenSSH 9.9p2 Minor Version Detection Issue in
Qualys/Tenable for CVE-2025-26465 & CVE-2025-26466
Product: Portable OpenSSH
Version: 9.9p2
Hardware: Al
https://bugzilla.mindrot.org/show_bug.cgi?id=3801
Bug ID: 3801
Summary: Expand TOKENS available in ProxyCommand to support
port forwarding
Product: Portable OpenSSH
Version: 9.9p2
Hardware: Other
OS: Linux
https://bugzilla.mindrot.org/show_bug.cgi?id=3801
Darren Tucker changed:
What|Removed |Added
CC||dtuc...@dtucker.net
--- Comment #1 from D
https://bugzilla.mindrot.org/show_bug.cgi?id=3800
--- Comment #2 from suryalegend89 ---
Hi Damien Miller ,
Thank you for your response.
I am seeking clarification on how OpenSSH reports its software version.
As per the RFC Protocol Version Exchange, the identification string
format is:
https://bugzilla.mindrot.org/show_bug.cgi?id=3801
--- Comment #3 from Darren Tucker ---
Oh, and one more reason to add to comment#1 about why IMO this is not
feasible: each forwarding flag can be invoked multiple times.
--
You are receiving this mail because:
You are watching someone on the CC
https://bugzilla.mindrot.org/show_bug.cgi?id=3799
sign...@svenstaro.org changed:
What|Removed |Added
CC||sign...@svenstaro.org
--
You are
https://bugzilla.mindrot.org/show_bug.cgi?id=3801
--- Comment #2 from Darren Tucker ---
It's a bit icky, but given you specified you're running on Linux, the
ProxyCommand can fish the parent ssh's command line out of
/proc/$PPID/cmdline and do whatever it likes with it, eg:
$ cat proxycommand
#