Correct, default SSH port is not open on the corporate firewall. I am sure
there are workarounds, however having contractual obligations not sure I should
try hard to be unorthodox.
SSH + SVN is my favourite and will stay with it as the primary access method.
If I could top it with HTTP access
Config:
OS: Windows 2012 Server 64bit
1TB SSD
8GiB RAM
Software version4.0.2-3732.117
Subversion version 1.8.3-3732.117
Running since
Gatting Apache to run suid processes and spawn mod_dav_svn processes
has never worked for me, but it's been a long time since I tried it.
It's also unnecessary in most setups: if the svn+ssh is owned by a
single designated user, such as an "svn" user, with SSH heys stored
for to apply the "ForceCo
sbre...@hotmail.com wrote on Mon, Nov 25, 2013 at 10:24:16 +:
> Correct, default SSH port is not open on the corporate firewall. I am
> sure there are workarounds, however having contractual obligations not
> sure I should try hard to be unorthodox.
I still suggest that you try to run sshd. I
If you go to alternative SSH port, which is not that unusualy, write
and show them the restricted sshd_config to restrict access to only
that specified service for only that specified user. No password
logins, no normal shells, use the authorized_keys ForceCommand access
only for that alternative s
Hi,
After upgrading the version of our svn server from 1.7 to 1.8, I'm not able
to access from command line, for example, if I run* svn co* followed by the
project svn URL here is what I get:
[root@FPROD ~]# svn list https://svn-repo/svn/repos/project/trunk
Error validating server certificate for
I'm happy to announce the release of Apache Subversion 1.7.14.
Please choose the mirror closest to you by visiting:
http://subversion.apache.org/download/#recommended-release
This release addresses two security issues:
CVE-2013-4505: mod_dontdothat does not restrict requests from serf clients.
CV
I'm happy to announce the release of Apache Subversion 1.8.5.
Please choose the mirror closest to you by visiting:
http://subversion.apache.org/download/#recommended-release
This release addresses two security issues:
CVE-2013-4505: mod_dontdothat does not restrict requests from serf clie
Nico Kadel-Garcia wrote on Mon, Nov 25, 2013 at 05:56:14 -0500:
> use the authorized_keys ForceCommand access
Minor correction: ForceCommand is a sshd_config(5) directive; the
authorized_keys variant is spelled 'command="..."'.
Mehdi Hayani wrote on Mon, Nov 25, 2013 at 11:25:24 +:
> - Fingerprint: XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX
> (R)eject, accept (t)emporarily or accept (p)ermanently? p
>
> After accepting certificate, nothing shows and it remains planted until I
> tape* 'Ctrl + C"* to
On Mon, Nov 25, 2013 at 3:50 PM, Daniel Shahaf wrote:
> Mehdi Hayani wrote on Mon, Nov 25, 2013 at 11:25:24 +:
>> - Fingerprint: XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX
>> (R)eject, accept (t)emporarily or accept (p)ermanently? p
>>
>> After accepting certificate, nothing
[Forwarding back to the list]
Mehdi Hayani wrote on Mon, Nov 25, 2013 at 21:05:42 +:
> >When you upgraded the server, did you also upgrade mod_dav_svn only? Or
> >did you also upgrade httpd and/or openssl at the same time?
>
> I don't know what was done exactly during the update, because the
Good point, thank you!
On Mon, Nov 25, 2013 at 3:41 PM, Daniel Shahaf wrote:
> Nico Kadel-Garcia wrote on Mon, Nov 25, 2013 at 05:56:14 -0500:
>> use the authorized_keys ForceCommand access
>
> Minor correction: ForceCommand is a sshd_config(5) directive; the
> authorized_keys variant is spelled
13 matches
Mail list logo