search for: unpermitted

Displaying 15 results from an estimated 15 matches for "unpermitted".

Did you mean: unpermietted
2014 Apr 21
0
Unpermitted Parameters - Rails 4
...quot;", "mobile"=>"0987654", "email"=>"joao.miguel-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org", "password"=>"[FILTERED]", "password_confirmation"=>"[FILTERED]"}, "commit"=>"Sign up"} Unpermitted parameters: first_name, last_name, birthday, mobile and my users table is updated but first_name, last_name, birthday, mobile are null. Does anyone has any idea how can I solve this issue? thanks in advance -- Posted via http://www.ruby-forum.com/. -- You received this message because you are...
2013 Oct 23
3
Rails 4 and HABTM Checkboxes: Unpermitted parameters error
...=>"1"} Practitioner Load (0.2ms) SELECT "practitioners".* FROM "practitioners" WHERE "practitioners"."id" = ? ORDER BY "practitioners".last_name ASC, "practitioners".first_name ASC LIMIT 1 [["id", "1"]] Unpermitted parameters: practice_ids when I try to update. If I comment out the practitioner_params method, like this: def practitioner_params params.require(:practitioner).permit!#(:first_name, :last_name, :degree, :accepting_new_patients, :specialty, :secondary_specialty, :c_v, :practice_ids)...
2006 Sep 14
6
sshd audit not happy with ssh1 and scp
..., after updating to a recent FreeBSD 6.x with audit support, I'm getting log messages like these when using scp over ssh1: Sep 12 14:13:16 <auth.info> bm55 sshd[12335]: Accepted rsa for xxx from A.B.C.D port 2981 Sep 12 14:13:16 <auth.crit> bm55 sshd[12335]: fatal: monitor_read: unpermitted request 57 Sep 12 14:13:16 <console.info> bm55 kernel: Sep 12 14:13:16 <auth.crit> bm55 sshd[12335]: fatal: monitor_read: unpermitted request 57 Sep 12 14:13:16 <auth.crit> bm55 sshd[12337]: fatal: mm_request_send: write: Broken pipe Sep 12 14:13:16 <console.info> bm55 ke...
2005 Feb 25
7
[Bug 125] add BSM audit support
http://bugzilla.mindrot.org/show_bug.cgi?id=125 ------- Additional Comments From phil at usc.edu 2005-02-25 13:09 ------- So we've done some internal testing with the latest snapshot over the last two days, and things look good. It's not a thorough test, but the logging is as we would expect, and everything else looks as expected. A huge thanks to all the people who helped with
2008 Jul 10
1
Race condition in sshd
...I am working on a new KEX algorithm whose primary feature is performance. It is fast enough that do_authentication2() runs _before_ the monitor has a chance to permit the necessary requests (MONITOR_REQ_PWNAM in particular), and therefore authentication fails on the server with: monitor_read: unpermitted request 6 Could someone more experienced please look at this? Thanks! -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: This is a digitally signed message part. Url : http://lists.mindrot.org/pip...
2008 Jul 12
2
[Bug 1487] New: Race condition between monitor and unprivileged child in sshd
...n. The unprivileged child runs do_ssh2_kex() followed by do_authentication2(). If KEX is fast enough, do_authentication2() runs before the monitor has a chance to permit the necessary requests (MONITOR_REQ_PWNAM in articular), and therefore authentication fails on the server with: monitor_read: unpermitted request 6 Damien Miller proposed setting up a pipe shared between the monitor and child, and making the child wait until the monitor end closes, which it should do after permitting the monitor calls. I believe the pipe close (granting permission to continue) should be at the end of monitor.c:mm_a...
2005 Mar 03
2
Question/concern about bsm auditing option on solaris
Hello, I downloaded and compiled the Mar 2, 2005 snapshot and compiled it with bsm auditing for solaris turned on. I've been noticing about a dozen or so of the following messages per day now. Not sure exactly what it is, or if it is a big issue. Mar 3 13:46:10 machine_name sshd[15298]: [ID 800047 auth.crit] fatal: mm_request_send: write If it matters it is running on solaris 8
2020 Sep 04
0
[libnbd PATCH 1/2] api: Add nbd_set_strict_mode
...-side */ + strict |= LIBNBD_STRICT_COMMANDS; + if (nbd_set_strict_mode (nbd, strict) == -1) { + fprintf (stderr, "%s\n", nbd_get_error ()); + exit (EXIT_FAILURE); + } + if (nbd_trim (nbd, 512, 0, 0) != -1) { + fprintf (stderr, "%s: test failed: " + "unpermitted nbd_trim did not fail\n", + argv[0]); + exit (EXIT_FAILURE); + } + check (EINVAL, "nbd_trim: "); + /* Use unadvertised command, server-side */ + strict &= ~LIBNBD_STRICT_COMMANDS; + if (nbd_set_strict_mode (nbd, strict) == -1) { + fprintf (stderr, "%s\...
2006 Sep 22
1
[RFC][PATCH][UPDATED] Intel(R) LaGrande Technology support
...It doesn''t cap (extend with invalid value) the dynamic TPM PCRs when the LT environment is torn down. Instead it disables the BIOS reboot option so that any shutdown/reboot will have to reset the platform and the TPM. o TPM locality 2 is not protected. The defined behavior for access to unpermitted localities is for reads to return 0xff''s and writes to be dropped. This will require mapping pages from locality 3 or 4 into the locality 2 range. o No DMA protection has been implemented in this patch. SDP3 only supports the NoDMA table for DMA protection and this will be superseded by...
2020 Sep 11
0
[libnbd PATCH v2 3/5] api: Add nbd_set_strict_mode
...t_strict_mode (nbd) | LIBNBD_STRICT_COMMANDS; + if (nbd_set_strict_mode (nbd, strict) == -1) { + fprintf (stderr, "%s\n", nbd_get_error ()); + exit (EXIT_FAILURE); + } + if (nbd_trim (nbd, 512, 0, 0) != -1) { + fprintf (stderr, "%s: test failed: " + "unpermitted nbd_trim did not fail\n", + argv[0]); + exit (EXIT_FAILURE); + } + check (EINVAL, "nbd_trim: "); + /* Use unadvertised command, server-side */ + strict &= ~LIBNBD_STRICT_COMMANDS; + if (nbd_set_strict_mode (nbd, strict) == -1) { + fprintf (stderr, "%s\...
2002 Jun 25
10
[Bug 296] Priv separation does not work on OSF/1
http://bugzilla.mindrot.org/show_bug.cgi?id=296 ------- Additional Comments From bugzilla-openssh at thewrittenword.com 2002-06-26 01:20 ------- Are you sure? I have 3.3p1 running on 4.0D and 5.1 and I can connect as non-root. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2020 Sep 04
4
[RFC libnbd PATCH 0/2] Add knobs for client- vs. server-side validation
We have been inconsistent on how much we reject client-side without even consulting the server, vs. how much we depend on the server to detect failure (even if our request can be deemed undefined per NBD protocol). I'd like to change it so that by default, we reject as much as we can client-side for less traffic, but where the user can also change things on the fly for server-side integration
2020 Sep 08
23
[Bug 3210] New: Confusing errors when pam_acct_mgmt() fails
https://bugzilla.mindrot.org/show_bug.cgi?id=3210 Bug ID: 3210 Summary: Confusing errors when pam_acct_mgmt() fails Product: Portable OpenSSH Version: 8.3p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: PAM support Assignee:
2007 Apr 12
4
Re: [Xense-devel] [RFC][PATCH][UPDATED] Intel(R) LaGrande Technology support
...It doesn''t cap (extend with invalid value) the dynamic TPM PCRs when the LT environment is torn down. Instead it disables the BIOS reboot option so that any shutdown/reboot will have to reset the platform and the TPM. o TPM locality 2 is not protected. The defined behavior for access to unpermitted localities is for reads to return 0xff''s and writes to be dropped. This will require mapping pages from locality 3 or 4 into the locality 2 range. o No DMA protection has been implemented in this patch. SDP3 only supports the NoDMA table for DMA protection and this will be superseded by...
2020 Sep 11
10
[libnbd PATCH v2 0/5] Add knobs for client- vs. server-side validation
In v2: - now based on my proposal to add LIBNBD_SHUTDOWN_IMMEDIATE - four flags instead of two: STRICT_FLAGS is new (patch 4), and STRICT_BOUNDS is separate from STRICT_ZERO_SIZE (patch 5) - various refactorings for more shared code and less duplication Eric Blake (5): api: Add xxx_MASK constant for each Flags type generator: Refactor filtering of accepted OFlags api: Add