search for: forster

Displaying 20 results from an estimated 21 matches for "forster".

Did you mean: foerster
2020 Jul 09
2
RFC: Adding a staging branch (temporarily) to facilitate upstreaming
...0 PM Duncan Exon Smith via llvm-dev < llvm-dev at lists.llvm.org> wrote: > Okay, a separate repo called "llvm-project-staging" (and a branch called > "staging/apple") seems to be the consensus. We'll move ahead with that! > > On 2020-Jul-08, at 05:38, Mike Forster <forster at google.com> wrote: > > The downsides of an additional project are small. I can see: > 1) It's not possible to do pull requests from there, because GitHub won't > treat it as a fork. > 2) It's still visible to people ( > http://lists.llvm.org/pipermail...
2009 Jan 24
1
Patch to always install libupsclient-config
...ig' and once using `libupsclient-config'. Please consider the attached patch, which changes the behavior of `lib/Makefile.am' to install `libupsclient-config' regardless of whether `libupsclient.pc' is installed or not. Please CC me on replies. Regards, -octo -- Florian octo Forster Hacker in training GnuPG: 0x91523C3D http://verplant.org/ -------------- next part -------------- A non-text attachment was scrubbed... Name: nut-2.2.2-libconfig.patch Type: text/x-diff Size: 390 bytes Desc: not available Url : http://lists.alioth.debian.org/pipermail/nut-upsdev/attachments/2009012...
2020 Jul 08
2
RFC: Adding a staging branch (temporarily) to facilitate upstreaming
The downsides of an additional project are small. I can see: 1) It's not possible to do pull requests from there, because GitHub won't treat it as a fork. 2) It's still visible to people ( http://lists.llvm.org/pipermail/llvm-dev/2020-June/142559.html) In the end I don't have a strong opinion on whether this is a branch or a repository, as long as we move ahead soon. On Thu, Jul
2018 Nov 13
2
Re: [collectd] collectd leaks SIGCHLD == SIG_IGN into plugins
...cesses in any other way. The only plugin doing that, the exec plugin, has had enough issues over the years for me to feel justified in that decision. ;-) As mentioned before, a Github issue would be appreciated so we can properly track this problem. Thanks and best regards, —octo -- Florian octo Forster Hacker in training GnuPG: 0x0C705A15 http://octo.it/
2007 Sep 11
2
Bug#439986: Renaming `UPSCONN' to `UPSCONN_t' causes problems when upgrading.
tags 439986 upstream thanks Hi Florian, 2007/8/29, Florian Forster <octo at verplant.org>: > Package: nut-dev > Version: 2.2.0-1 > Severity: minor > > After upgrading from version 2.0.something to version 2.2.0-1 the type > `UPSCONN' had been renamed to `UPSCONN_t'. This is a problem for > software that is supposed to work with d...
2018 Nov 13
2
Re: [collectd] collectd leaks SIGCHLD == SIG_IGN into plugins
...some hoops to link libguestfs correctly to collectd. Is it okay to just include fork(), waitpid() example? It does reproduce the issue. Best Regards, Peter On Tue, Nov 13, 2018 at 1:34 PM Richard W.M. Jones <rjones@redhat.com> wrote: > On Tue, Nov 13, 2018 at 12:00:19PM +0100, Florian Forster wrote: > > Hi, > > > > thank you very much for reporting this! Sounds like a bug in the exec > plugin – > > it never ceases to amaze me how many issues a single plugin can have ;) > > > > > > > This means that any plugin that does the usual pattern of...
2007 Sep 04
2
Unresolved variable in `libupsclient-config'
...n configuring nut 2.2.0 the variable/symbol `@SSL_LDFLAGS@' is not resolved by the libupsclient-config script. The attached patch changes `@SSL_CFLAGS@' to `@LIBSSL_CFLAGS@' `@SSL_LDFLAGS@' to `@LIBSSL_LDFLAGS@' which should solve this issue. Regards, -octo -- Florian octo Forster Hacker in training GnuPG: 0x91523C3D http://verplant.org/ -------------- next part -------------- A non-text attachment was scrubbed... Name: nut-2.2.0-sslflags.patch Type: text/x-diff Size: 508 bytes Desc: not available Url : http://lists.alioth.debian.org/pipermail/nut-upsdev/attachments/20070904...
2018 Nov 13
4
Re: collectd leaks SIGCHLD == SIG_IGN into plugins
On Tue, Nov 13, 2018 at 10:04:33AM +0000, Daniel P. Berrangé wrote: > On Fri, Nov 09, 2018 at 12:19:30PM +0000, Richard W.M. Jones wrote: > > Peter Dimitrov and myself were debugging a very peculiar bug when > > libguestfs is run as a plugin from collectd: > > > > https://www.redhat.com/archives/libguestfs/2018-November/thread.html#00023 > > > > The long
2009 May 26
1
BindToAddress: TCP connections originate from random source address.
...uggestions, or objections? Otherwise I'd write a quick patch.. Regards, -octo P. S.: Of course I know how to influence the OS and make it pick some specific address, and I know about NAT and the like, too. I don't think these are ?solutions? to this problem. -- Florian octo Forster Hacker in training GnuPG: 0x91523C3D http://verplant.org/ -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: Digital signature Url : http://www.tinc-vpn.org/pipermail/tinc-devel/attachments/20090526...
2003 Nov 03
1
Problems with PAM and PermitRootLogin without-password
...: session_exit_message: release channel 0 debug1: session_close: session 0 pid 17636 debug1: session_pty_cleanup: session 0 release /dev/pts/1 debug1: channel 0: free: server-session, nchannels 1 Connection closed by x.x.x.x Closing connection to x.x.x.x debug1: PAM: cleanup Thanks for the help. Forster
2018 Nov 13
0
Re: [collectd] collectd leaks SIGCHLD == SIG_IGN into plugins
A quick glance shows that the exec plugin actually is clearing the signal mask: https://github.com/collectd/collectd/blob/master/src/exec.c#L526 Can you give some more context when this problem comes up? Ideally in a Github issue (hint, hint ;). -- Florian octo Forster Hacker in training GnuPG: 0x0C705A15 http://octo.it/
2018 Nov 13
0
Re: [collectd] collectd leaks SIGCHLD == SIG_IGN into plugins
On Tue, Nov 13, 2018 at 12:00:19PM +0100, Florian Forster wrote: > Hi, > > thank you very much for reporting this! Sounds like a bug in the exec plugin – > it never ceases to amaze me how many issues a single plugin can have ;) > > > > > This means that any plugin that does the usual pattern of: > > > > > >...
2018 Nov 13
0
Re: [collectd] collectd leaks SIGCHLD == SIG_IGN into plugins
...t does reproduce the > issue. Yes, I think a small example/reproducer is a fine idea. Rich. > Best Regards, > Peter > > > On Tue, Nov 13, 2018 at 1:34 PM Richard W.M. Jones <rjones@redhat.com> > wrote: > > > On Tue, Nov 13, 2018 at 12:00:19PM +0100, Florian Forster wrote: > > > Hi, > > > > > > thank you very much for reporting this! Sounds like a bug in the exec > > plugin – > > > it never ceases to amaze me how many issues a single plugin can have ;) > > > > > > > > > This means that any pl...
2000 Apr 10
0
problem with password authentication
...lient protocol version 1.5; client software version OpenSSH-1.2.3 debug: Sent 768 bit public key and 1024 bit host key. debug: Encryption type: blowfish debug: Received session key; encryption turned on. debug: Installing crc compensation attack detector. debug: Starting up PAM with username "aforster" debug: Attempting authentication for aforster. Failed rsa for aforster from 127.0.0.1 port 868 debug: PAM Password authentication for "aforster" failed: Authentication failure Failed password for aforster from 127.0.0.1 port 868 debug: PAM Password authentication for "aforster&...
2000 Apr 28
4
problem need help
I've installed the openss* rpm's from metalab.unc.edu/pub/Linux/distributions/redhat/contrib/libc6/i386 on a redhat 6.2 system. sshd is running but refuses all connections from all hosts including localhost. The client reports debug: Connection established. ssh_exchange_identification: Connection closed by remote host debug: Calling cleanup 0x8056160(0x0)
2009 May 27
0
[PATCH] src/linux/device.c: Fix segfault when running without `--net'.
...k () at net_setup.c:536 #6 0x0805b27f in main (argc=Cannot access memory at address 0x0) at tincd.c:580 This patch fixes this by checking `netname' in `setup_device'. An alternative would be to check for NULL-pointers in `xstrdup' and return NULL in this case. Signed-off-by: Florian Forster <octo at verplant.org> --- src/linux/device.c | 3 ++- 1 files changed, 2 insertions(+), 1 deletions(-) diff --git a/src/linux/device.c b/src/linux/device.c index 2e44755..4e9591c 100644 --- a/src/linux/device.c +++ b/src/linux/device.c @@ -63,7 +63,8 @@ bool setup_device(void) if(!g...
2009 Oct 18
0
[Announcement] Version 1.0.10 released
...adapter more efficient. * Code cleanups: tinc now follows the C99 standard, copyright headers have been updated to include patch authors, checkpoint tracing and localisation features have been removed. * Support for (jailbroken) iPhone and iPod Touch has been added. Thanks to Florian Forster, Grzegorz Dymarek and especially Michael Tokarev for their contributions to this version of tinc. This version of tinc is compatible with 1.0pre8, 1.0 and later, but not with earlier version of tinc. The Windows installer for 1.0.10 is now compatible with XP and later, but not with 2000. It does...
2009 Oct 18
0
[Announcement] Version 1.0.10 released
...adapter more efficient. * Code cleanups: tinc now follows the C99 standard, copyright headers have been updated to include patch authors, checkpoint tracing and localisation features have been removed. * Support for (jailbroken) iPhone and iPod Touch has been added. Thanks to Florian Forster, Grzegorz Dymarek and especially Michael Tokarev for their contributions to this version of tinc. This version of tinc is compatible with 1.0pre8, 1.0 and later, but not with earlier version of tinc. The Windows installer for 1.0.10 is now compatible with XP and later, but not with 2000. It does...
2015 Sep 15
36
[Bug 2468] New: Option to include external files to sshd_config
https://bugzilla.mindrot.org/show_bug.cgi?id=2468 Bug ID: 2468 Summary: Option to include external files to sshd_config Product: Portable OpenSSH Version: 7.1p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: sshd Assignee: unassigned-bugs
2003 Aug 28
0
[louisk@bend.com: snort, postgres, bridge]
...distribution. # # Credits: # Ron Gula <rgula@securitywizards.com> of Network Security Wizards # Max Vision <vision@whitehats.com> # Martin Markgraf <martin@mail.du.gtn.com> # Fyodor Yarochkin <fygrave@tigerteam.net> # Nick Rogness <nick@rapidnet.com> # Jim Forster <jforster@rapidnet.com> # Scott McIntyre <scott@whoi.edu> # Tom Vandepoel <Tom.Vandepoel@ubizen.com> # Brian Caswell <bmc@snort.org> # Zeno <admin@cgisecurity.com> # Ryan Russell <ryan@securityfocus.com> # #========================================= # In...