Displaying 10 results from an estimated 10 matches for "openssh3.5p1".
Did you mean:
openssh_3.5p1
2002 Dec 08
1
Password expiry related clarification in OpenSSH3.5p1
fyi (i'm behind in following the passord expire efforts).
----- Forwarded message from Logu <logsnaath at gmx.net> -----
Date: Sat, 7 Dec 2002 02:42:52 +0530
From: "Logu" <logsnaath at gmx.net>
To: <stevesk at cvs.openbsd.org>
Cc: <kumaresh_ind at gmx.net>
Subject: Password expiry related clarification in OpenSSH3.5p1
Hello Stevesk,
We are using
2003 Jan 07
0
Confirm OpenSSH3.5p1 for Irix
Platform: Irix 6.5.16
OpenSSH 3.5p1 built with MIT Kerb5 v. 1.2.6, OpenSSL 0.9.6g
Everything (privsep, ticket forwarding, etc) so far works like a charm.
You guys do great work.
--
*******************************************************
Quellyn L. Snead
CCN-2 Enterprise Software Management Team
Los Alamos National Laboratory
Schedule B
(505) 667-4185
2003 May 12
1
[Ans.]openssh3.5p1 version ... Password aging problem???
Our server is only opened 22 sshd port...
We wants our server secuirty is more higher, so decide to password aging policy...
Linux command is "chage" is very useful, but openssh3.3 higher version is not effected...
[root at radius ~]# chage -l test
Minimum: 0
Maximum: 2
Warning: 2
Inactive: 2
Last Change: May 09, 2003
Password Expires: May
2002 Dec 18
2
patch for openssh3.5p1 - adds logging option
this patch adds a LogFile option to sshd_config. it just logs messages
directly to a file instead of stderr or syslog. the largest change
is an additional argument to log_init() in log.c for the log file name
(and then changes to the rest of the tools to add a NULL arg).
galt
-------------- next part --------------
diff -urN openssh-3.5p1-orig/log.c openssh-3.5p1/log.c
---
2003 Mar 17
1
RAND_bytes return value
Hello,
I have been doing some looking at openssl 0.9.7 and
openssh3.5p1 and found a minor descrepancy. RAND_bytes() is
called around line 69 of openbsd-compat/bsd-arc4random.c.
It checks to see if the return is not zero. The RAND_bytes
function can also return -1, too. All the code in openssl
uses <=0 for the test rather than !.
Best Regards,
Steve Grubb
2003 Apr 25
1
error report for transfer
I'm seeing broken transfers when attempting large amounts of data.
I have read the issues.html file about the transfer dying issues,
which claims,
" Sometimes fatal error messages from the remote machine can be lost on the
way to the client; you should investigate on the server for something
stopping the transmission. The most common cause is that the destination
disk is full."
2010 Jan 27
5
sshd killed due to dos attack
Hi,
I am not sure to report this as a bug. so mailing to the list.
I have sshd(openssh3.5p1) server running on my router and when i run tcpjunk
to that port, sshd gets killed after some time
192.168.71.1 is my sshd server and 192.168.71.4 is my client from where i
send my dos attack
This is the tcpjunk command i gave to the ssh server
#tcpjunk -s 192.168.71.1 -p 22 -c req -i 100
req session
2002 Dec 10
1
Problems with the tty's in openssh + AIX
Hi everybody.
I posted this also to comp.sec...ssh, so excuse me for multiple emails.
I downloaded openssh-3.5p1 and compiled under AIX.
Now,
if I run that program, Sandor W. Sklar in bugzilla #124 suggested (see
below),
it works in linux, not in AIX 5.1.
in AIX it produces the same "hang" as the original problems Ihave with
"tclsh"-command. sshd hangs with this output:
2003 Jan 25
0
[Bug 474] New: sftp should provide logging
http://bugzilla.mindrot.org/show_bug.cgi?id=474
Summary: sftp should provide logging
Product: Portable OpenSSH
Version: 3.5p1
Platform: All
OS/Version: Solaris
Status: NEW
Severity: enhancement
Priority: P2
Component: sftp
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: kodis at
2003 Jan 07
0
Bug in Ossh3.5p1
We use OpenSSH 3.5p1 on an embedded system.
OpenSSH is configured to not permit password logins, /etc/ssh/sshd_config:
...
PasswordAuthentication no
...
At the same time, since there is no console and no way to "log in" other
than by ssh, /etc/passwd has an "open" root account:
root::0:0:root:/root:/bin/sh
nobody:x:65534:65534:nobody:/tmp:/usr/bin/bash
Apparently