View | Details | Raw Unified | Return to bug 745 | Differences between
and this patch

Collapse All | Expand All

(-)ssh_config (-37 / +18 lines)
Lines 1-37 Link Here
1
#	$OpenBSD: ssh_config,v 1.19 2003/08/13 08:46:31 markus Exp $
1
Host *
2
2
	Hostname		127.0.0.1
3
# This is the ssh client system-wide configuration file.  See
3
	HostKeyAlias		localhost-with-alias
4
# ssh_config(5) for more information.  This file provides defaults for
4
	Port			4242
5
# users, and the values can be changed in per-user configuration files
5
	User			dtucker
6
# or on the command line.
6
	GlobalKnownHostsFile	/home/dtucker/openssh/openssh-regress//known_hosts
7
7
	UserKnownHostsFile	/home/dtucker/openssh/openssh-regress//known_hosts
8
# Configuration data is parsed as follows:
8
	RSAAuthentication	yes
9
#  1. command line options
9
	PubkeyAuthentication	yes
10
#  2. user-specific file
10
	ChallengeResponseAuthentication	no
11
#  3. system-wide file
11
	HostbasedAuthentication	no
12
# Any configuration value is only changed the first time it is set.
12
	PasswordAuthentication	no
13
# Thus, host-specific definitions should be at the beginning of the
13
	RhostsAuthentication	no
14
# configuration file, and defaults at the end.
14
	RhostsRSAAuthentication	no
15
15
	BatchMode		yes
16
# Site-wide defaults for various options
16
	StrictHostKeyChecking	yes
17
17
IdentityFile /home/dtucker/openssh/openssh-regress//rsa
18
# Host *
18
IdentityFile /home/dtucker/openssh/openssh-regress//rsa1
19
#   ForwardAgent no
20
#   ForwardX11 no
21
#   RhostsRSAAuthentication no
22
#   RSAAuthentication yes
23
#   PasswordAuthentication yes
24
#   HostbasedAuthentication no
25
#   BatchMode no
26
#   CheckHostIP yes
27
#   AddressFamily any
28
#   ConnectTimeout 0
29
#   StrictHostKeyChecking ask
30
#   IdentityFile ~/.ssh/identity
31
#   IdentityFile ~/.ssh/id_rsa
32
#   IdentityFile ~/.ssh/id_dsa
33
#   Port 22
34
#   Protocol 2,1
35
#   Cipher 3des
36
#   Ciphers aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour,aes192-cbc,aes256-cbc
37
#   EscapeChar ~
(-)sshd_config (-96 / +9 lines)
Lines 1-96 Link Here
1
#	$OpenBSD: sshd_config,v 1.66 2003/09/29 20:19:57 markus Exp $
1
	Port			4242
2
2
	ListenAddress		127.0.0.1
3
# This is the sshd server system-wide configuration file.  See
3
	#ListenAddress		::1
4
# sshd_config(5) for more information.
4
	PidFile			/home/dtucker/openssh/openssh-regress//pidfile
5
5
	AuthorizedKeysFile	/home/dtucker/openssh/openssh-regress//authorized_keys_dtucker
6
# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
6
	KeepAlive		no
7
7
	LogLevel		VERBOSE
8
# The strategy used for options in the default sshd_config shipped with
8
HostKey /home/dtucker/openssh/openssh-regress//host.rsa
9
# OpenSSH is to specify options with their default value where
9
HostKey /home/dtucker/openssh/openssh-regress//host.rsa1
10
# possible, but leave them commented.  Uncommented options change a
11
# default value.
12
13
#Port 22
14
#Protocol 2,1
15
#ListenAddress 0.0.0.0
16
#ListenAddress ::
17
18
# HostKey for protocol version 1
19
#HostKey /etc/ssh/ssh_host_key
20
# HostKeys for protocol version 2
21
#HostKey /etc/ssh/ssh_host_rsa_key
22
#HostKey /etc/ssh/ssh_host_dsa_key
23
24
# Lifetime and size of ephemeral version 1 server key
25
#KeyRegenerationInterval 1h
26
#ServerKeyBits 768
27
28
# Logging
29
#obsoletes QuietMode and FascistLogging
30
#SyslogFacility AUTH
31
#LogLevel INFO
32
33
# Authentication:
34
35
#LoginGraceTime 2m
36
#PermitRootLogin yes
37
#StrictModes yes
38
39
#RSAAuthentication yes
40
#PubkeyAuthentication yes
41
#AuthorizedKeysFile	.ssh/authorized_keys
42
43
# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts
44
#RhostsRSAAuthentication no
45
# similar for protocol version 2
46
#HostbasedAuthentication no
47
# Change to yes if you don't trust ~/.ssh/known_hosts for
48
# RhostsRSAAuthentication and HostbasedAuthentication
49
#IgnoreUserKnownHosts no
50
# Don't read the user's ~/.rhosts and ~/.shosts files
51
#IgnoreRhosts yes
52
53
# To disable tunneled clear text passwords, change to no here!
54
#PasswordAuthentication yes
55
#PermitEmptyPasswords no
56
57
# Change to no to disable s/key passwords
58
#ChallengeResponseAuthentication yes
59
60
# Kerberos options
61
#KerberosAuthentication no
62
#KerberosOrLocalPasswd yes
63
#KerberosTicketCleanup yes
64
65
# GSSAPI options
66
#GSSAPIAuthentication no
67
#GSSAPICleanupCredentials yes
68
69
# Set this to 'yes' to enable PAM authentication (via challenge-response)
70
# and session processing. Depending on your PAM configuration, this may
71
# bypass the setting of 'PasswordAuthentication'
72
#UsePAM no
73
74
#AllowTcpForwarding yes
75
#GatewayPorts no
76
#X11Forwarding no
77
#X11DisplayOffset 10
78
#X11UseLocalhost yes
79
#PrintMotd yes
80
#PrintLastLog yes
81
#KeepAlive yes
82
#UseLogin no
83
#UsePrivilegeSeparation yes
84
#PermitUserEnvironment no
85
#Compression yes
86
#ClientAliveInterval 0
87
#ClientAliveCountMax 3
88
#UseDNS yes
89
#PidFile /var/run/sshd.pid
90
#MaxStartups 10
91
92
# no default banner path
93
#Banner /some/path
94
95
# override default of no subsystems
96
Subsystem	sftp	/usr/libexec/sftp-server
(-)regress/agent-ptrace.sh (-1 / +10 lines)
Lines 5-11 tid="disallow agent ptrace attach" Link Here
5
5
6
if have_prog uname ; then
6
if have_prog uname ; then
7
	case `uname` in
7
	case `uname` in
8
	Linux|HP-UX|SunOS|NetBSD|AIX|CYGWIN*)
8
	CYGWIN*)
9
		echo "skipped (not supported on this platform)"
9
		echo "skipped (not supported on this platform)"
10
		exit 0
10
		exit 0
11
		;;
11
		;;
Lines 17-22 if have_prog gdb ; then Link Here
17
else
17
else
18
	echo "skipped (gdb not found)"
18
	echo "skipped (gdb not found)"
19
	exit 0
19
	exit 0
20
fi
21
22
if test -z "$SUDO" ; then
23
	echo "skipped (SUDO not set)"
24
	exit 0
25
else
26
	$SUDO chown root ${OBJ}${SSHAGENT}
27
	$SUDO chgrp root ${OBJ}${SSHAGENT}
28
	$SUDO chmod 2755 ${OBJ}${SSHAGENT}
20
fi
29
fi
21
30
22
trace "start agent"
31
trace "start agent"

Return to bug 745