search for: koyl

Displaying 6 results from an estimated 6 matches for "koyl".

Did you mean: kohl
2013 Oct 01
2
sshd accepted fingerprint logging
...97:99:fb:e0:2a Oct 1 15:23:24 somehost sshd[18603]: Accepted publickey for someuser from 192.168.1.2 port 49331 ssh2 Oct 1 15:23:24 somehost sshd[18603]: pam_unix(sshd:session): session opened for user someuser by (uid=0) Oct 1 15:23:24 somehost sshd[18603]: User child is on pid 18610 -- Eldon Koyle -- Men often believe -- or pretend -- that the "Law" is something sacred, or at least a science -- an unfounded assumption very convenient to governments.
2008 Jun 09
1
Long call setup with non-PRI T1
...digits asterisk waits another 3 seconds before doing anything. In chan_zap.c, there is a 'matchdigittimeout' that is set to 3000 ms. This appears to be more or less a constant. Would it break anything if I shorten this to say 500 ms? Is there a better place to configure this? -- Eldon Koyle System Administration Operations Information Technology Utah State University -- A New York City ordinance prohibits the shooting of rabbits from the rear of a Third Avenue street car -- if the car is in motion.
2015 Jun 18
3
What does the socks function of openssh hide?
Salutations, I was recently using openssh 6.8p1-3 for socks tunelling with a public wifi hotspot. I attempted to watch youtube but was notified that it was not allowed in my area. The socks server I was connected to definitely had the ability to connect to youtube, so I concluded the issue was with the public wifi hotspot. How much does socks tunneling with openssh obscure? Command : ssh -ND
2014 Sep 08
1
possible deadcodes in sources
Hello, we've run a coverity scan on the openssh sources and it found several issues. Although the scan was run on patched rhel sources, some results are applicable to vanilla sources too. * servconf.c:1458:dead_error_line ? Execution cannot reach this statement "*intptr = *intptr + 1;" --- a/servconf.c +++ b/servconf.c @@ -1451,12 +1451,8 @@
2014 Apr 25
1
public key authentication -- log invalid keys
Hi guys, i was wondering if someone could point me in the right direction please. if someone connects using public keys, but uses the wrong keys to connect, openssh logs this kind of thing: Apr 21 23:50:04 [sshd] SSH: Server;Ltype: Version;Remote: 122.169.248.92-49232;Protocol: 2.0;Client: libssh-0.2 Apr 21 23:50:05 [sshd] SSH: Server;Ltype: Kex;Remote: 122.169.248.92-49232;Enc: aes128-cbc;MAC:
2015 May 26
8
Weak DH primes and openssh
On Tue 2015-05-26 14:02:07 -0400, Hubert Kario wrote: > On Tuesday 26 May 2015 13:43:13 Daniel Kahn Gillmor wrote: >> On Tue 2015-05-26 12:57:05 -0400, Hubert Kario wrote: >> > creating composites that will pass even 100000 rounds of Miller-Rabin is >> > relatively simple.... >> > (assuming the values for M-R tests are picked randomly) >> >> Can you