Displaying 20 results from an estimated 29 matches for "mm_answer_pti".
Did you mean:
mm_answer_pty
2004 Aug 27
0
Terminal modes
Hi,
I'm trying to use connect to an openssh server, setting some terminal
modes, and they don't seem to do what I want. Specifically, I'm trying to
disable echo from the server - hence the four modes in the sshd trace below
(53 for example is ECHO).
I've looked at the code. 0 would indicate that the option is negated in
the c_lflag field. And it seems like the modes are
2004 Aug 31
0
Terminal mode (repost)
Hi,
I posted this before (I thought) but I'll give it another try (looks like
it arrived on the list on Saturday). :-(
I'm trying to connect to an openssh server, and setting some terminal
modes. However, they don't seem to do what I want. Specifically, I'm trying
to disable echo from the server - hence the four modes in the sshd trace
below (53 for example is ECHO).
2010 Mar 09
1
sshd version OpenSSH_5.4p1 fails on OpenBSD 4.2 GENERIC macppc
Because OpenSSH_5.4 doesn't build on my OpenBSD 4.2 box, I tried
OpenSSH_5.4p1 which builds and installs fine.
After starting server with sudo /opt/sbin/sshd -p 2222 -d, my ssh
client can connect, but the session is closed by server as soon as it is
started:
[...]
User child is on pid 10318
debug1: Entering interactive session for SSH2.
debug1: server_init_dispatch_20
debug1:
2002 Jun 29
0
Privsep for osf/1 .. still need a bit of help
This privsepifies OSF/1 SIA, but I'm still being told the same error
occurs. I'm stumped.
Without an OSF/1 box near me I can't do too much more help unless someone
can either tell me what is wrong or show me why SIA is failing in their
logs.
(And tell me if it's different w/ or w/out this patch)
- Ben
Index: auth-sia.c
2002 Aug 01
0
Tru64 and OSF/1 Privsep patch
Ok.. I need wider testing for this. I'm getting reports back it works
mostly. 'ssh site ls' fails, but they can login with Privsep enbled.
Can I get those who are using Tru64 or OSF/1 that have SIA enabled to
test? This should apple to either -cvs or the current snapshot (I would
perfer not to use 3.4p1 due to bugs).
I'm going on a trip next week and will be around very spotty
2002 Dec 21
6
[PATCH] PAM chauthtok + Privsep
Hello All.
Attached is an update to my previous patch to make do_pam_chauthtok and
privsep play nicely together.
First, a question: does anybody care about these or the password
expiration patches?
Anyway, the "PRIVSEP(do_pam_hauthtok())" has been moved to just after
the pty has been allocated but before it's made the controlling tty.
This allows the child running chauthtok to
2003 Jan 21
3
X11 forwarding problem -- openssh-3.5p1 -- redhat 8.0 -- linux 2.4.18
All,
I'm working on upgrading a machine from RH 6.2 to RH 8.0. I've
encountered one major (for me) snag in that I cannot get X11 forwarding to
work anymore.
I've been google-ing the error messages all morning, with no luck.
Here is debugging output from the server (client debugging output sent
upon request... I don't feel it is relevant). What I feel is interesting
is at the
2018 Apr 11
9
[Bug 2856] New: key-options.sh fails when pty /dev/ttyp1 is not owned by testing user
https://bugzilla.mindrot.org/show_bug.cgi?id=2856
Bug ID: 2856
Summary: key-options.sh fails when pty /dev/ttyp1 is not owned
by testing user
Product: Portable OpenSSH
Version: 7.6p1
Hardware: ix86
OS: NetBSD
Status: NEW
Severity: minor
Priority: P5
Component:
2003 Jul 06
10
[Bug 585] sshd core dumping on IRIX 6.5.18 with VerifyReverseMapping enabled
http://bugzilla.mindrot.org/show_bug.cgi?id=585
------- Additional Comments From dtucker at zip.com.au 2003-07-07 00:32 -------
dmalloc (http://dmalloc.com/) claims to work on IRIX. It's likely to increase
the CPU and memory load, though.
I've built with dmalloc on Linux thusly:
LDFLAGS=-ldmalloc ./configure && make
eval `dmalloc -l /path/to/log high`
./sshd [options]
2002 Dec 10
5
[PATCH] Password expiry with Privsep and PAM
Hi All.
Attached is a patch that implements password expiry with PAM and
privsep. It works by passing a descriptor to the tty to the monitor,
which sets up a child with that tty as stdin/stdout/stderr, then runs
chauthtok(). No setuid helpers.
I used some parts of Michael Steffens' patch (bugid #423) to make it
work on HP-UX.
It's still rough but it works. Tested on Solaris 8 and
2002 Aug 11
4
OSF/1 or Tru64 patch for Privsep
Either this never made it to the list or no one cares about Tru64. This
is the last time I'll send this patch to the list. If no one steps up and
finishes it or provides me with enough information to fix any remaining
bugs (one being complaint that 'ssh site cmd' does not work right).
If there is no activity on this for a week. I'll post it to bugzilla and
will ignore any
2003 Apr 19
4
[Bug 544] sshd w/privsep fails on Linux 2.0, mm_receive_fd: expected type 1 got 1074276337
http://bugzilla.mindrot.org/show_bug.cgi?id=544
Summary: sshd w/privsep fails on Linux 2.0, mm_receive_fd:
expected type 1 got 1074276337
Product: Portable OpenSSH
Version: -current
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
2003 May 22
1
sshd crashing on IRIX (3.6.1p1)
Occasionally, we're noticing that sshd is core dumping on our IRIX
6.5.18f machine.
The only time we've really noticed it is when users are logging in with
putty from offsite (although I'm not really sure it's a client issue).
The user manages to log in, sshd apparently core dumps, but the user is
not logged out, the privilege separated user is still running their own
2003 Apr 17
0
pam_mkhomedir and priv separation
Hello,
I'm not sure if this has already been addressed, I looked through the
archives and can't seem to find anything. I also did some Usenet
searching and only found one article mentioning this, and it was
in French.
Anyway, the problem is that it appears as though when using privsep
opensshd doesn't execute pam_session as root, and this causes
pam_mkhomedir to fail.
2009 Feb 04
1
SSH PAM authentication/login with a new user DB (through NSS)
Hello,
I'm a novice system programmer and I need some knowledge about how
sshd/PAM/NSS work together. The email may be long and unclear, but I
would greatly appreciate if any one could give me some info. TIA.
I'm developing a new authentication module for Linux login service. I'm
like a novice developer in this area, so I had to study this and that. I
started with PAM naively,
2002 Aug 28
5
Tru64 privsep patch testing
OK, I got a chance to try out the Tru64 patch for privsep. I applied the patch
to 3.4p1. Partial success, in that it now works for me for logins to "root".
Logins to ordinary accounts fail after authentication, when trying to set tty
characteristics. See the excerpt from the debug messages below. This is for
Tru64 V4.0F (with enhanced_security turned on, obviously.) I guess it's time
2002 Jul 03
3
[Bug 333] X11 forwarding not working in OpenSSH 3.4p1
http://bugzilla.mindrot.org/show_bug.cgi?id=333
------- Additional Comments From stevesk at pobox.com 2002-07-04 05:41 -------
i will guess configure did not find an xauth when
it was built ($PATH is irrelevant here). please
verify.
see $HOME/.ssh/rc example in sshd.8 which can be used
as a workaround in this case.
djm: autoconf-2.53 exposes a bug for xauth path detection.
------- You
2009 Jun 05
2
ssh trouble checklist
Hi.
There should be a checklist of everything that can go wrong with
making an ssh connection.
Here's one entry for the list, which I didn't know before, and
* I couldn't see the problem from the -ddd and -vvv output, and
* there were no /var/log/* file entries to give hints.
Here's what I did
sudo kill <pid-of-sshd>
/usr/sbin/sshd
No good.
Usually I did kill
2015 Dec 16
2
Running sshd with Privilege Seperation drops connection on password change
Hi Darren/Damien,
Sorry for responding so late. Still hope we can get this sorted out.
Yes I am indeed using PAM for ssh authentication and disabling priv seperation is a no-go for us since it opens up a security loophole.
From what I can see in ptree and auth logs, when the child passwd process returns with SIGCHLD, the parent sshd process terminates.
Sshd logs are as follows as requested at
2002 Aug 28
0
patch almost works on 5.1A openssh 3.4p1 - get in, but get kicked out (fwd)
Hi-
I applied the privsep patch to Tru64 5.1A openssh 3.4p1 and it
*almost* works.
I get in from the client side and xauth is run, but in the meantime
the server side disconnects. Running sshd in debug mode level 3 gives
the following output:
.
.
.
debug1: session_input_channel_req: session 0 req shell
debug1: fd 5 setting TCP_NODELAY
debug1: channel 0: rfd 13