similar to: dovecot patch for TCB auth

Displaying 20 results from an estimated 400 matches similar to: "dovecot patch for TCB auth"

2000 Feb 26
1
OpenSSH on HP-UX 11 with TCB
Hi, an updated and more civilized post (to my one and only previous one) on getting OpenSSH to work on HP-UX 11 using the TCB. I used the HP ANSI C compiler. Firstly, I needed to download, compile and install OpenSSL, EGD and ZLib. Specific issues: configure did not handle hpux 11 login.c did not compile makefile did not use $(CFLAGS) sshd did not compile (pam issues), I wanted to use
2015 Apr 08
3
syslinux.efi with QEMU/OVMF
On Tue, 7 Apr 2015, Laszlo Ersek wrote: > Whereas syslinux.efi apparently uses the embedded gpxe/ tree, and that > one uses TCP timestamps. See tcp_xmit() in gpxe/src/net/tcp.c: Actually syslinux.efi seems to be using the implementation calling into UEFI via these functions:
2000 Apr 24
2
OpenSSH 1.2.3, HPUX 10.20 [TCB]
Hello, already checked the Mailinglist archive for HPUX Problems, but havent found exact this: ./configure --prefix=/opt --without-pam --with-ssl-dir=/opt/OpenSSL --with-lastlog=/var/adm/wtmp --with-egd-pool=/dev/entropy --with-tcp-wrappers --with-pid-dir=/var/run --sysconfdir=/etc/ssh and get after a make: gcc -O2 -Wall
2002 Dec 19
1
OpenUsePrivilegeSeparation on Compaq V5.1A with C2/SIA Security
I'm using OpenSSH_3.5p1 (server protocol 2.0 ) on a Compaq device V5.1A with C2 Security (SIA) configured. I must set UsePrivilegeSeparation to no to get this working. Does anyone have PrivilegeSeparation working on a Compaq device with C2 Security configured? Source device: ssh user at destination ( produces these errors) sshd: /var/tcb/files/__db_lock.share: Permission
2016 Jan 25
5
[PPC] Linker fails on -fstack-protector
When -fstack-protector is turned on, linker fails to find the symbol "__stack_chk_guard" because at least for powerpc64le, glibc doesn't provide this symbol. Instead, they put the stack guard into TCB. x86 fixed this issue by injecting a special address space (which is later translated to TCB register access) and hard code the offset of stack_guard, but I don't see a easy way to
2016 Feb 22
4
[PPC] Linker fails on -fstack-protector
I found a bit weird to use address space for this, since the offset of getting stack_guard in TCB is, unfortunately, negative: https://github.com/gcc-mirror/gcc/blob/master/gcc/config/rs6000/linux64.h#L610 In my understanding an address space is referring to a segment register (-on powerpc 32bit; or SLB entry on powerpc 64bit?) with a non-negative offset
2016 Feb 20
2
[PPC] Linker fails on -fstack-protector
I'll come up with a address-space-based proof of concept. On Wed, Feb 10, 2016, 17:05 Eric Christopher <echristo at gmail.com> wrote: > On Wed, Feb 10, 2016 at 5:04 PM Hal Finkel <hfinkel at anl.gov> wrote: > >> >> ------------------------------ >> >> *From: *"Eric Christopher" <echristo at gmail.com> >> *To: *"Tim
2016 Feb 11
2
[PPC] Linker fails on -fstack-protector
----- Original Message ----- > From: "Eric Christopher" <echristo at gmail.com> > To: "Tim Shen" <timshen at google.com>, llvm-dev at lists.llvm.org, "Hal > Finkel" <hfinkel at anl.gov>, "Kit Barton" <kbarton at ca.ibm.com> > Sent: Wednesday, February 10, 2016 6:59:50 PM > Subject: Re: [llvm-dev] [PPC] Linker fails on
2015 Nov 24
3
Why isn't it possible to lower TCP values of running SSH session?
On Tue, Nov 24, 2015 at 12:57 AM, Damien Miller <djm at mindrot.org> wrote: > TCP is the kernel's responsibility. I guess that these values get > copied into each TCB from the copy managed via proc at connection > start time, but never updated afterwards. > This had to happen but the question is why is it possible to increase a timeout but not to decrease it. --
2006 Sep 14
3
[PATCH] PermitRootLogin woes
Hi all, among other things, we provide shell access to various unix based platforms for our students and university staff. Recently, there has been increasing number of root login attacks on one particular Tru64 machine running OpenSSH. The host is configured with "PermitRootLogin no" but every once in a while SIA auth with TCB enhanced security locks the root account. I suppose
1999 Jul 05
1
smbtar/smbclient and backups of NT
I've looked at samba archives (mailing lists), I've looked at altavista, and deja.com. No help. I want to do a backup of NT machine using smbclient. I call it like: # smbclient //MACHINE/Share Pass -U Administrator -E -c tarmode full -D usr -d0 -Tc test.tar It starts fine, but after some time thing like this happen: ... Error reading file \usr\mail\Vanja\Attach\att11.eml.
2015 Apr 07
3
syslinux.efi with QEMU/OVMF
Hello, I'm trying to find out how to pxe boot with syslinux.efi on QEMU with OVMF. After getting through the initial hurdle caused by the iPXE based option ROM included with QEMU having a problem as described in these threads: http://www.syslinux.org/archives/2014-November/022804.html
2006 Mar 15
0
HPUX - Trusted mode - Successful login time
We run HP-UX 11.00 in "Trusted Mode". This creates and mananges a tcb database for all the users on the system. I have created the attached patch, for openssh-4.3p2, to update the date/time of a successful login. I have tested this patch on several systems here, but I am sure there is a cleaner way to implement the updates into openssh. In a perfect world I would like to update the
2005 Apr 28
0
Windows Server 2003 SP1 Issues (3.0.15pre2)
Hi All, I'm running into some issues accessing a Samba server that's in turn authenticating against a Win2k3-SP1 domain controller (security=ads). I understand there were some known issues corrected in a patch, and I'm currently running 3.0.15pre2, which I understand includes that patch. (http://samba.org/~jerry/patches/post-3.0.13/winbindd_2k3sp1.patch)
2016 Feb 23
2
[PPC] Linker fails on -fstack-protector
On Mon, Feb 22, 2016 at 3:32 PM Joerg Sonnenberger via llvm-dev < llvm-dev at lists.llvm.org> wrote: > On Mon, Jan 25, 2016 at 07:57:43PM +0000, Tim Shen via llvm-dev wrote: > > A cleaner solution could be adding an IR intrinsic llvm.get_tcb_address() > > and hard code the offset of stack_guard member, since they aren't > supposed > > to change. > > It
2015 Nov 23
2
Why isn't it possible to lower TCP values of running SSH session?
I am running OpenSSH_6.7p1 on Slackware 14.1 x64. I haven't modified a stock config. On Linux TCP timeouts are controlled by these 3 files: $ cat /proc/sys/net/ipv4/tcp_keepalive_time \ > /proc/sys/net/ipv4/tcp_keepalive_intvl \ > /proc/sys/net/ipv4/tcp_keepalive_probes 7200 75 9 These are their default values. I modified
2003 Sep 02
12
[Bug 633] Password authentication fails in HP-UX trusted mode due to DISABLE_SHADOW
http://bugzilla.mindrot.org/show_bug.cgi?id=633 Summary: Password authentication fails in HP-UX trusted mode due to DISABLE_SHADOW Product: Portable OpenSSH Version: -current Platform: HPPA OS/Version: HP-UX Status: NEW Severity: normal Priority: P2 Component: sshd
2006 Sep 22
1
[RFC][PATCH][UPDATED] Intel(R) LaGrande Technology support
This patch adds SMP support to the previous version. Since that has not been merged I have included it in this patch. This should apply cleanly to the tip. Below is the text of the original submittal, slightly updated. Attached is a preliminary patch that adds Intel(R) LaGrande Technology (LT) (Safer Mode Extensions - SMX) support to Xen. While there are still several enhancements needed for
2001 Nov 08
1
401 server error Swat Access
Hi all, I've upgraded from 2.0.x to 2.2.2 on a Tru64 5.1 box. I try to start SWAT with root and roots password and get a : 401 Bad Authorization username or password incorrect With a non root account I can access, but not manage the server. What' wrong? Thanks in advance Roman
2004 Dec 02
1
Bug Report
To Whom It May Concern: I am running OpenSSH_3.7.1p2 on an HPUX 10.10 operating system. I recently converted my OS to a trusted system, which, among other things, shadows passwords in the /etc/passwd file. In order to shadow the user passwords, a '*' character is used. Unfortunately, the documentation for sshd states that, for HP operating systems, a '*' character in