Displaying 20 results from an estimated 7000 matches similar to: "agenda"
2002 Jul 10
2
[protois@ensea.fr: NVIDIA and Privilege Separation]
Does someone understand this? I do not.
Niels.
----- Forwarded message from laurent Protois <protois at ensea.fr> -----
Subject: NVIDIA and Privilege Separation
From: laurent Protois <protois at ensea.fr>
To: provos at citi.umich.edu
X-Mailer: Ximian Evolution 1.0.7-1mdk
Date: 10 Jul 2002 09:29:45 +0200
Hi Niels,
i have a little problem with openssh 3.4 and Nvidia kernel driver:
2002 Jul 05
1
[jlevine@utcnist.colorado.edu: Privilege separation]
Is this a known problem?
Niels.
----- Forwarded message from Judah Levine <jlevine at utcnist.colorado.edu> -----
Date: Fri, 5 Jul 2002 08:58:46 -0600 (MDT)
From: Judah Levine <jlevine at utcnist.colorado.edu>
To: provos at citi.umich.edu
Subject: Privilege separation
Hello,
I have just installed openssh-3.4p1 on a COMPAQ/DEC/HP Alpha running
True64 UNIX v4.0F. The privilege
1999 Dec 04
2
confusion over RSAref vul w/OpenSS[HL]
Howdy,
The string of notices on BugTraq about RSAref being vulnerable to
overflows has me concerned. After trying to sort through all the
messages, I can't figure out whether I need to update OpenSSL (a
check of their website indicates no new patches), OpenSSH, both, or
neither. I am aware there is no known exploit for it yet.
I could be a bad boy and just run all
2002 Apr 21
3
OpenSSH Security Advisory (adv.token)
A buffer overflow exists in OpenSSH's sshd if sshd has been compiled
with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing
has been enabled in the sshd_config file. Ticket and token passing
is not enabled by default.
1. Systems affected:
All Versions of OpenSSH compiled with AFS/Kerberos support
and ticket/token passing enabled contain a buffer overflow.
2002 Apr 21
3
OpenSSH Security Advisory (adv.token)
A buffer overflow exists in OpenSSH's sshd if sshd has been compiled
with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing
has been enabled in the sshd_config file. Ticket and token passing
is not enabled by default.
1. Systems affected:
All Versions of OpenSSH compiled with AFS/Kerberos support
and ticket/token passing enabled contain a buffer overflow.
2002 Jun 21
6
OpenSSH 3.3 released
OpenSSH 3.3 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support and encouragement.
Changes since OpenSSH 3.2.3:
============================
2001 Feb 08
2
Authentication By-Pass Vulnerability in OpenSSH 2.3.1 (devel snapshot) (fwd)
fyi for those running snapshots. the latest portable cvs has the fix
and the version is 2.3.2p1.
Kevin
---------- Forwarded message ----------
Date: Thu, 08 Feb 2001 18:15:00 -0500
From: Niels Provos <provos at citi.umich.edu>
To: security-announce at openbsd.org
Subject: Authentication By-Pass Vulnerability in OpenSSH 2.3.1 (devel
snapshot)
2014 May 19
3
Call for agenda items for tomorrow's VIRT SIG meeting
Hi all,
please reply to this thread of you have any agenda items that you would
like to add. Meeting minutes of past minutes are under
* http://wiki.centos.org/SpecialInterestGroup/Virtualization "Meetings"
* The TODO list is under
http://wiki.centos.org/SpecialInterestGroup/Virtualization/Status (just
updated it)
* Draft roadmap is under "Roadmap" and probably needs
2020 Jul 13
2
Loop Opt WG Meeting Agenda for July 15, 2020
Agenda for the meeting of July 15 @ 11:00 am (EST):
- Loop-Hierachical IR Representation Design (Michael Kruse)
- Status Updates
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-dev/attachments/20200713/44b826a0/attachment.html>
2002 May 16
5
OpenSSH 3.2.2 released
OpenSSH 3.2.2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support and encouragement.
Security Changes:
=================
- fixed buffer overflow
2001 Mar 07
3
protocol 2 performance gain?
has anyone noticed a performance gain with protocol 2?
-David Higdon
1999 Nov 22
3
status of openssh for solaris?
In message <19991122110826.A23851 at wdawson-sun.sbs.siemens.com>, Willard Dawson
writes:
>I just tried to compile, this time with openssh-1.2pre14, openssl-0.9.4
>and egd-0.6. I get considerably further along, but still not completely
>compiled. Here are the last bits:
>
>gcc -g -O2 -Wall -I/usr/local/ssl/include -DETCDIR=\"/usr/local/etc\" -DSSH_PR
2000 Jan 27
6
EGD requirement a show stopper for me
On Thu, Jan 13, 2000 at 17:34:10, Andre Lucas wrote:
> Subject: /dev/urandom
> On Thu, Jan 13, 2000 at 09:24:01AM -0700, SysProg - Nathan Paul Simons wrote:
> > On Thu, 13 Jan 2000, Ben Taylor wrote:
> >
> > > On Thu, 13 Jan 2000, Max Shaposhnikov wrote:
> > > > why ssh1.27 doesn't requre /dev/urandom on solaris?
> >
> > i think the
2001 Apr 03
2
the "primes" file
In message <Pine.LNX.4.30.0104031615270.8678-100000 at holly.crl.go.jp>, Tom Holro
yd writes:
>SRP has different requirements from Diffie-Hellman. In particular,
>for SRP the generator must be primitive. It turns out that the "primes"
>file contains only safe primes with primitive generators, and is thus
>ideal for SRP, but so far in OpenSSH it has only been used for
2003 Jul 25
3
systrace for FreeBSD 5.1
I'm porting the most recent version of Neil Provos' systrace to FreeBSD 5.1.
I'm sending him the diffs to integrate into his distribution. I'd also like
to submit them to someone with FreeBSD for consideration, and hopefully
inclusion as a port or whatever you prefer.
Who could I send them to, or what would you prefer me to do with regard to
FreeBSD?
Thanks,
Rich Murphey
2002 Feb 12
4
SRP Patch Integration?
>Simply stated, SRP is a strong password authentication protocol that
>resists passive/active network attack, and when used in conjunction with
>OpenSSH, solves the "unknown host key" problem without requiring host
>key fingerprint verification or PKI deployment (e.g. X.509 certs). Put
>another way, is there any good reason *not* to fold these patches into
>OpenSSH
2013 Sep 25
1
Nuevo ítem de la agenda
Reunión de usuarios Barcelona
---
El próximo 9 de octubre a las 19h retomamos las sesiones del grupo de usuarios de Barcelona, [http://rugbcn.wordpress.com/|RugBcn]. La reunión será en la empresa aceleradora de startups, [http://itnig.net/|itnig] (Calle Álaba 61, 5-2, Barcelona) y para la discusión final, Moritz nos invita a unas cervezas. Las charlas serán:
Juan Galeano: ?Visualizando datos:
2016 Jan 19
1
Glass backend freeze agenda
Hi
What is the agenda concerning the Glass backend? Any chance to have it
frozen in the next months? We love it and are in waiting position to use
it in production.
Regards
Kelson
--
Kiwix - Wikipedia Offline & more
* Web: http://www.kiwix.org
* Twitter: https://twitter.com/KiwixOffline
* more: http://www.kiwix.org/wiki/Communication
-------------- next part --------------
A non-text
2015 Aug 21
4
Announce: OpenSSH 7.1 released
OpenSSH 7.1 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support. OpenSSH also includes
transitional support for the legacy SSH 1.3 and 1.5 protocols
that may be enabled at compile-time.
Once again, we would like to thank the OpenSSH community
2002 May 01
4
Using openssh 3.1p1 on Solaris with tcp wrappers 7.6
Dear Open SSH and TCP Wrappers Colleagues,
We are trying to use open ssh 3.1p1 on SPARC platforms
under Solaris 2.8 using gcc 2.95.2, in conjunction with
tcp wrappers 7.6 (IPv6 version). The wrapping of open ssh
is not too well documented but I think we have figured
most of this out (hearty thanks to Wietse Venema, Jim
Mintha & Niels Provos for their helpful email exchanges) --
but have one