Displaying 20 results from an estimated 21 matches for "forster".
Did you mean:
foerster
2020 Jul 09
2
RFC: Adding a staging branch (temporarily) to facilitate upstreaming
...0 PM Duncan Exon Smith via llvm-dev <
llvm-dev at lists.llvm.org> wrote:
> Okay, a separate repo called "llvm-project-staging" (and a branch called
> "staging/apple") seems to be the consensus. We'll move ahead with that!
>
> On 2020-Jul-08, at 05:38, Mike Forster <forster at google.com> wrote:
>
> The downsides of an additional project are small. I can see:
> 1) It's not possible to do pull requests from there, because GitHub won't
> treat it as a fork.
> 2) It's still visible to people (
> http://lists.llvm.org/pipermail...
2009 Jan 24
1
Patch to always install libupsclient-config
...ig' and once using `libupsclient-config'.
Please consider the attached patch, which changes the behavior of
`lib/Makefile.am' to install `libupsclient-config' regardless of whether
`libupsclient.pc' is installed or not.
Please CC me on replies.
Regards,
-octo
--
Florian octo Forster
Hacker in training
GnuPG: 0x91523C3D
http://verplant.org/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: nut-2.2.2-libconfig.patch
Type: text/x-diff
Size: 390 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/nut-upsdev/attachments/2009012...
2020 Jul 08
2
RFC: Adding a staging branch (temporarily) to facilitate upstreaming
The downsides of an additional project are small. I can see:
1) It's not possible to do pull requests from there, because GitHub won't
treat it as a fork.
2) It's still visible to people (
http://lists.llvm.org/pipermail/llvm-dev/2020-June/142559.html)
In the end I don't have a strong opinion on whether this is a branch or a
repository, as long as we move ahead soon.
On Thu, Jul
2018 Nov 13
2
Re: [collectd] collectd leaks SIGCHLD == SIG_IGN into plugins
...cesses in any other
way. The only plugin doing that, the exec plugin, has had enough issues over
the years for me to feel justified in that decision. ;-)
As mentioned before, a Github issue would be appreciated so we can properly
track this problem.
Thanks and best regards,
—octo
--
Florian octo Forster
Hacker in training
GnuPG: 0x0C705A15
http://octo.it/
2007 Sep 11
2
Bug#439986: Renaming `UPSCONN' to `UPSCONN_t' causes problems when upgrading.
tags 439986 upstream
thanks
Hi Florian,
2007/8/29, Florian Forster <octo at verplant.org>:
> Package: nut-dev
> Version: 2.2.0-1
> Severity: minor
>
> After upgrading from version 2.0.something to version 2.2.0-1 the type
> `UPSCONN' had been renamed to `UPSCONN_t'. This is a problem for
> software that is supposed to work with d...
2018 Nov 13
2
Re: [collectd] collectd leaks SIGCHLD == SIG_IGN into plugins
...some hoops to link libguestfs correctly to collectd.
Is it okay to just include fork(), waitpid() example? It does reproduce the
issue.
Best Regards,
Peter
On Tue, Nov 13, 2018 at 1:34 PM Richard W.M. Jones <rjones@redhat.com>
wrote:
> On Tue, Nov 13, 2018 at 12:00:19PM +0100, Florian Forster wrote:
> > Hi,
> >
> > thank you very much for reporting this! Sounds like a bug in the exec
> plugin –
> > it never ceases to amaze me how many issues a single plugin can have ;)
> >
> > > > > This means that any plugin that does the usual pattern of...
2007 Sep 04
2
Unresolved variable in `libupsclient-config'
...n configuring nut 2.2.0 the variable/symbol `@SSL_LDFLAGS@' is not
resolved by the libupsclient-config script. The attached patch changes
`@SSL_CFLAGS@' to `@LIBSSL_CFLAGS@'
`@SSL_LDFLAGS@' to `@LIBSSL_LDFLAGS@'
which should solve this issue.
Regards,
-octo
--
Florian octo Forster
Hacker in training
GnuPG: 0x91523C3D
http://verplant.org/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: nut-2.2.0-sslflags.patch
Type: text/x-diff
Size: 508 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/nut-upsdev/attachments/20070904...
2018 Nov 13
4
Re: collectd leaks SIGCHLD == SIG_IGN into plugins
On Tue, Nov 13, 2018 at 10:04:33AM +0000, Daniel P. Berrangé wrote:
> On Fri, Nov 09, 2018 at 12:19:30PM +0000, Richard W.M. Jones wrote:
> > Peter Dimitrov and myself were debugging a very peculiar bug when
> > libguestfs is run as a plugin from collectd:
> >
> > https://www.redhat.com/archives/libguestfs/2018-November/thread.html#00023
> >
> > The long
2009 May 26
1
BindToAddress: TCP connections originate from random source address.
...uggestions, or objections? Otherwise I'd write
a quick patch..
Regards,
-octo
P. S.: Of course I know how to influence the OS and make it pick some
specific address, and I know about NAT and the like, too. I don't
think these are ?solutions? to this problem.
--
Florian octo Forster
Hacker in training
GnuPG: 0x91523C3D
http://verplant.org/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://www.tinc-vpn.org/pipermail/tinc-devel/attachments/20090526...
2003 Nov 03
1
Problems with PAM and PermitRootLogin without-password
...: session_exit_message: release channel 0
debug1: session_close: session 0 pid 17636
debug1: session_pty_cleanup: session 0 release /dev/pts/1
debug1: channel 0: free: server-session, nchannels 1
Connection closed by x.x.x.x
Closing connection to x.x.x.x
debug1: PAM: cleanup
Thanks for the help.
Forster
2018 Nov 13
0
Re: [collectd] collectd leaks SIGCHLD == SIG_IGN into plugins
A quick glance shows that the exec plugin actually is clearing the signal mask:
https://github.com/collectd/collectd/blob/master/src/exec.c#L526
Can you give some more context when this problem comes up? Ideally in a Github
issue (hint, hint ;).
--
Florian octo Forster
Hacker in training
GnuPG: 0x0C705A15
http://octo.it/
2018 Nov 13
0
Re: [collectd] collectd leaks SIGCHLD == SIG_IGN into plugins
On Tue, Nov 13, 2018 at 12:00:19PM +0100, Florian Forster wrote:
> Hi,
>
> thank you very much for reporting this! Sounds like a bug in the exec plugin –
> it never ceases to amaze me how many issues a single plugin can have ;)
>
> > > > This means that any plugin that does the usual pattern of:
> > > >
> >...
2018 Nov 13
0
Re: [collectd] collectd leaks SIGCHLD == SIG_IGN into plugins
...t does reproduce the
> issue.
Yes, I think a small example/reproducer is a fine idea.
Rich.
> Best Regards,
> Peter
>
>
> On Tue, Nov 13, 2018 at 1:34 PM Richard W.M. Jones <rjones@redhat.com>
> wrote:
>
> > On Tue, Nov 13, 2018 at 12:00:19PM +0100, Florian Forster wrote:
> > > Hi,
> > >
> > > thank you very much for reporting this! Sounds like a bug in the exec
> > plugin –
> > > it never ceases to amaze me how many issues a single plugin can have ;)
> > >
> > > > > > This means that any pl...
2000 Apr 10
0
problem with password authentication
...lient protocol version 1.5; client software version OpenSSH-1.2.3
debug: Sent 768 bit public key and 1024 bit host key.
debug: Encryption type: blowfish
debug: Received session key; encryption turned on.
debug: Installing crc compensation attack detector.
debug: Starting up PAM with username "aforster"
debug: Attempting authentication for aforster.
Failed rsa for aforster from 127.0.0.1 port 868
debug: PAM Password authentication for "aforster" failed: Authentication failure
Failed password for aforster from 127.0.0.1 port 868
debug: PAM Password authentication for "aforster&...
2000 Apr 28
4
problem need help
I've installed the openss* rpm's from
metalab.unc.edu/pub/Linux/distributions/redhat/contrib/libc6/i386
on a redhat 6.2 system.
sshd is running but refuses all connections from all hosts including
localhost. The client reports debug: Connection established.
ssh_exchange_identification: Connection closed by remote host
debug: Calling cleanup 0x8056160(0x0)
2009 May 27
0
[PATCH] src/linux/device.c: Fix segfault when running without `--net'.
...k () at net_setup.c:536
#6 0x0805b27f in main (argc=Cannot access memory at address 0x0) at tincd.c:580
This patch fixes this by checking `netname' in `setup_device'. An alternative
would be to check for NULL-pointers in `xstrdup' and return NULL in this case.
Signed-off-by: Florian Forster <octo at verplant.org>
---
src/linux/device.c | 3 ++-
1 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/src/linux/device.c b/src/linux/device.c
index 2e44755..4e9591c 100644
--- a/src/linux/device.c
+++ b/src/linux/device.c
@@ -63,7 +63,8 @@ bool setup_device(void)
if(!g...
2009 Oct 18
0
[Announcement] Version 1.0.10 released
...adapter more
efficient.
* Code cleanups: tinc now follows the C99 standard, copyright headers have
been updated to include patch authors, checkpoint tracing and localisation
features have been removed.
* Support for (jailbroken) iPhone and iPod Touch has been added.
Thanks to Florian Forster, Grzegorz Dymarek and especially Michael Tokarev for
their contributions to this version of tinc.
This version of tinc is compatible with 1.0pre8, 1.0 and later, but not
with earlier version of tinc.
The Windows installer for 1.0.10 is now compatible with XP and later, but not
with 2000. It does...
2009 Oct 18
0
[Announcement] Version 1.0.10 released
...adapter more
efficient.
* Code cleanups: tinc now follows the C99 standard, copyright headers have
been updated to include patch authors, checkpoint tracing and localisation
features have been removed.
* Support for (jailbroken) iPhone and iPod Touch has been added.
Thanks to Florian Forster, Grzegorz Dymarek and especially Michael Tokarev for
their contributions to this version of tinc.
This version of tinc is compatible with 1.0pre8, 1.0 and later, but not
with earlier version of tinc.
The Windows installer for 1.0.10 is now compatible with XP and later, but not
with 2000. It does...
2015 Sep 15
36
[Bug 2468] New: Option to include external files to sshd_config
https://bugzilla.mindrot.org/show_bug.cgi?id=2468
Bug ID: 2468
Summary: Option to include external files to sshd_config
Product: Portable OpenSSH
Version: 7.1p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs
2003 Aug 28
0
[louisk@bend.com: snort, postgres, bridge]
...distribution.
#
# Credits:
# Ron Gula <rgula@securitywizards.com> of Network Security Wizards
# Max Vision <vision@whitehats.com>
# Martin Markgraf <martin@mail.du.gtn.com>
# Fyodor Yarochkin <fygrave@tigerteam.net>
# Nick Rogness <nick@rapidnet.com>
# Jim Forster <jforster@rapidnet.com>
# Scott McIntyre <scott@whoi.edu>
# Tom Vandepoel <Tom.Vandepoel@ubizen.com>
# Brian Caswell <bmc@snort.org>
# Zeno <admin@cgisecurity.com>
# Ryan Russell <ryan@securityfocus.com>
#
#=========================================
# In...