Public bug reported:
ssh-add -D seems to NOT remove my identities, even though it says it
did.
Also, why are all possible identities auto-added right away (on start?)
ra...@lcwood(22:11:48)~$ ssh-add -l
8192 d1:50:43:64:52:7d:a0:61:ad:e2:bb:17:35:0d:7f:7d rafal1-ra...@lcwood (RSA)
8192 d8:f9:52
** Attachment added: "XsessionErrors.txt"
http://launchpadlibrarian.net/37658272/XsessionErrors.txt
--
ssh-add -D deleting all identities does not work. Also, why are all identities
auto-added?
https://bugs.launchpad.net/bugs/505278
You received this bug notification because you are a member
Public bug reported:
Client: Ubuntu 9.10
Server: Debian Lenny
This may be a bug in ubuntu client or in debian server.
SSH pubkey was working normally.
I today tried to passwd -l one of the users. After that time I noticed ssh
pubkey login stoped working.
New account was crated on server (new u
** Attachment added: "XsessionErrors.txt"
http://launchpadlibrarian.net/37660051/XsessionErrors.txt
--
pubkey login stoped working
https://bugs.launchpad.net/bugs/505301
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in ubuntu
after chmod 700 /home/userfoo/.ssh/ ; /etc/init.d/ssh restart still
identical problem
--
pubkey login stoped working
https://bugs.launchpad.net/bugs/505301
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh in ubuntu.
--
Ubuntu-
Solved, /home perms where wrong.
It would be nice to have openssh say a bit more about this problem in
logs on DEBUG3, then just
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: trying public key file
/home/userfoo/.ssh/authorized_keys
Jan 10 00:54:16 vz1947 sshd[32763]: debug1: restore_uid: 0/0
--
Indeed this kind of error does not have a distinctive message for noone
** Summary changed:
- pubkey login stoped working
+ openssh server should warn that .ssh/authorized_keys is not accessible
(causing ssh pubkey authentication to fail silently)
** Changed in: openssh (Ubuntu)
Status:
The attached trivial patch applies the wish I described above,
it informs more why authorized_keys is not being used.
The patch is tested for all error conditions it should report, both with
default LogLevel INFO, as well as with DEBUG3.
Below detaild explanation what it does - and results of tes
Created new upstream bug because bugzilla 1554 was for something a bit
different
** Bug watch added: OpenSSH Portable Bugzilla #1694
https://bugzilla.mindrot.org/show_bug.cgi?id=1694
--
openssh server should warn that .ssh/authorized_keys is not accessible (causing
ssh pubkey authentication
Upstream applied such patch (less verbose version of it, but still providing
needed information in the log).
So what's next, lets get in applied to 10.04?
--
openssh server should warn that .ssh/authorized_keys is not accessible (causing
ssh pubkey authentication to fail silently)
https://bug
Reported to upstream as
https://bugzilla.mindrot.org/show_bug.cgi?id=1695
** Bug watch added: OpenSSH Portable Bugzilla #1695
https://bugzilla.mindrot.org/show_bug.cgi?id=1695
** Also affects: openssh via
https://bugzilla.mindrot.org/show_bug.cgi?id=1695
Importance: Unknown
Status
Upstream says that this is security vulnerability.
I agree.
An important one too!
User can have action (like shortcut, screensaver, timeout, whatever) that does
ssh-key -D,
and he expect that his SSH keys are now secure... while they are still
accessible!
Upstream also says its most likely a pr
* typo, I ment of course ssh-add -D not ssh-key
--
ssh-add -D deleting all identities does not work. Also, why are all identities
auto-added?
https://bugs.launchpad.net/bugs/505278
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to openssh i
Public bug reported:
Binary package hint: apache2
Apache2, part of LAMP server crashes on many DB operations.
Nothing in logs, just all apache processes die after some requests to php
sites, including requests to phpmyadmin.
It was working fine before.
Jumpi server (64 bit dualcore with Ubuntu
*** This bug is a security vulnerability ***
Public security bug reported:
Not all keys can be checked with ssh-vulnkey, and users forget that they need
to take care of servers used by them that did accept the weak keys.
I think we should at least warn about that.
Details:
1) ssh-vulnkey can
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-0166
--
ssh-vulnkey doesnt check all keys. Also, it would be nice to extend the warning
message.
https://bugs.launchpad.net/bugs/230632
You received this bug notification because you are a member of Ubuntu
Server Team, which i
There are already scripts to exploits servers that where used via pubkey by
ubuntu/debian users (
http://packetstormsecurity.org/0805-exploits/debian-sploit.txt )
I really think now would be a time to at least extend the warning
message to inform briefly about this problem.
--
ssh-vulnkey d
Intrepid version seems to work fine for me as well.
--
PHP Startup: Unable to load dynamic library '/usr/lib/php5/20060613/imagick.so'
- libWand.so.9
https://bugs.launchpad.net/bugs/203023
You received this bug notification because you are a member of Ubuntu
Server Team, which is a bug assignee.
Public bug reported:
Binary package hint: php5
When PHP script does following: lock EXclusive, read, truncate, write -
then if you execute such script quickly, then sometimes it "goes crazy"
- then the file grows infinatelly it seems (to using all disc space).
ProblemType: Bug
Architecture: amd
** Attachment added: "Dependencies.txt"
http://launchpadlibrarian.net/35747902/Dependencies.txt
** Attachment added: "XsessionErrors.txt"
http://launchpadlibrarian.net/35747903/XsessionErrors.txt
--
ftruncate on a flock'ed file makes the php go crazy and create huge file (and
use all dis
20 matches
Mail list logo