search for: paananen

Displaying 8 results from an estimated 8 matches for "paananen".

Did you mean: paalanen
2003 Sep 17
2
Weird behaviour
...s on the previous version: ssh host user at hosts's password: Permission denied, please try again. user at hosts's password: Permission denied, please try again. user at hosts's password: What might cause this? I compiled the same version for linux, it doesn't do this. -- Osmo Paananen
2001 Nov 14
5
X11 forwards and libwrap support
...of that by default. I think that the risk can be made (a bit) smaller if there were more controls available to restrict access to the forwarded ports. Another question: is it requirement that the forwarded X11 port is bound to * instead of specific interface? Comments, suggestions? -- Osmo Paananen
2002 Nov 12
1
Locked account and logging in with public key
...th Solaris 8 compiled with pam support enabled. It seems that if I use public key authentication I can log in to an account that is locked (/etc/shadow has *LK* as password). Login is also allowed even if the user does not have a valid shell. Is this a bug or am I missing something? -- Osmo Paananen
2002 Aug 20
2
scp with F-Secure SSH2
Hi! I was browsing through archives and found out that somebody else was having the same problem as I'm. http://bugzilla.mindrot.org/show_bug.cgi?id=248 from the client, when I run scp to the server, I get: scp: warning: Executing scp1 compatibility. scp: FATAL: Executing ssh1 in compatibility mode failed (Check that scp1 is in your PATH). There are more details about this problem here:
2001 Nov 27
1
[PATCH] tcp-wrappers support extended to x11 forwards
...applies to x11 forwarded ports. If the forwarded port can be bound to localhost and it doesn't cause any additional problems then this patch is obsolete. Since there is no working solution to the localhost display would you please consider this patch? All comments are wellcome. -- Osmo Paananen -------------- next part -------------- diff -u openssh-3.0.1p1/channels.c openssh-modified/channels.c --- openssh-3.0.1p1/channels.c Fri Oct 12 04:35:05 2001 +++ openssh-modified/channels.c Mon Nov 26 15:53:04 2001 @@ -55,6 +55,12 @@ #include "key.h" #include "authfd.h" +...
2009 Aug 24
4
[PATCH 1/2] man page: Fix the supported fb depths.
Signed-off-by: Francisco Jerez <currojerez at riseup.net> --- man/nouveau.man | 7 ++++--- 1 files changed, 4 insertions(+), 3 deletions(-) diff --git a/man/nouveau.man b/man/nouveau.man index 87f645a..5c4e4ae 100644 --- a/man/nouveau.man +++ b/man/nouveau.man @@ -13,9 +13,10 @@ nouveau \- NVIDIA video driver .fi .SH DESCRIPTION .B nouveau -is an __xservername__ driver for NVIDIA
2001 Dec 05
1
DISPLAY=localhost
hi, this can be applied to the latest portable CVS. by default bind sshd fake display to localhost. [stevesk at jenny stevesk]$ uname -sr HP-UX B.11.11 [stevesk at jenny stevesk]$ echo $DISPLAY localhost:14.0 [stevesk at jenny stevesk]$ netstat -an|grep 6014 tcp 0 0 127.0.0.1.6014 *.* LISTEN this is currently controlled with sshd_config gatewayports;
2002 Apr 20
0
Buffer overflow in OpenSSH 2.2.0-3.1.0
Hi! I just saw this on bugtraq. Does someone have more details about this? Subject: OpenSSH 2.2.0 - 3.1.0 server contains a locally exploitable buffer overflow From: Marcell Fodor <m.fodor at mail.datanet.hu> Date: 19 Apr 2002 22:42:51 -0000 (Sat 01:42 EEST) To: bugtraq at securityfocus.com effect: local root vulnerable services: -pass Kerberos IV TGT -pass AFS Token bug