Displaying 20 results from an estimated 10000 matches similar to: "Test snapshot"
2000 Sep 16
15
Snapshot
Quite a few changes here, please test.
http://www.mindrot.org/misc/openssh/openssh-SNAP-20000916.tar.gz
-d
20000916
- (djm) New SuSE spec from Corinna Vinschen <corinna at vinschen.de>
- (djm) Update CygWin support from Corinna Vinschen <vinschen at cygnus.com>
- (djm) Use a real struct sockaddr inside the fake struct sockaddr_storage.
Patch from Larry Jones <larry.jones at
2000 Nov 14
14
New snapshot
I have just uploaded a new snapshot to:
http://www.mindrot.org/misc/openssh/openssh-SNAP-20001114.tar.gz
This snapshot includes Markus Friedl's new SSH2 RSA authentication work
and -R portforwarding for SSH2. Please give these a good test.
The new RSA authentications works similar to the current SSH2 DSA keys,
but requires a little modification to config files. Currently RSA
key cannot be
2016 Feb 01
2
[Bug 2535] New: Undefined behaviour of *printf in DISPLAY handling code
https://bugzilla.mindrot.org/show_bug.cgi?id=2535
Bug ID: 2535
Summary: Undefined behaviour of *printf in DISPLAY handling
code
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
2001 Feb 19
7
Packet integrity error. (34)
Hi,
I am using Van Dyke SecureCRT 3.2.1 to access an AIX server running
OpenSSH-2.5.0p1. Using ssh1 with X11 forwarding enabled, the server
reports the following error (in the client session):
Packet integrity error. (34)
This problem was not evident in 2.3.0p1. Running sshd in debug gives the
output:
debug1: sshd version OpenSSH_2.5.1p1
debug1: load_private_key_autodetect: type 0 RSA1
2005 Mar 04
4
Fwd: FreeBSD hiding security stuff
FYI
>To: misc@openbsd.org
>Subject: FreeBSD hiding security stuff
>Date: Fri, 04 Mar 2005 03:51:42 -0700
>From: Theo de Raadt <deraadt@cvs.openbsd.org>
>
>A few FreeBSD developers apparently have found some security issue
>of some sort affecting i386 operating systems in some cases.
>
>They have refused to give us real details.
>
>A promise is now being
2020 Jul 30
2
Seeding non-R RNG with numbers from R's RNG stream
Hi,
I am constructing a function that does sampling in C++ using a non-R RNG
stream for thread safety reasons. This C++ function is wrapped by an R
function, which is user facing. The R wrapper does some sampling itself to
initialize some variables before passing them off to C++. So that my users
do not have to manage two mechanisms to set random seeds, I've constructed
a solution (shown
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi,
I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with
FIPS 140-2 OpenSSL.
These are based on previously reported patches by Steve Marquess
<marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>,
for ver. OpenSSH 3.8.
Note that these patches are NOT OFFICIAL, and MAY be used freely by
anyone.
Issues [partially] handled:
SSL FIPS Self test.
RC4,
2020 Jul 30
3
Seeding non-R RNG with numbers from R's RNG stream
Thank you for this. I'd like to be sure I understand the
intuition correctly. Is the following true from what you said?
I can just fix the seed at the C++ level and the results will still be
(pseudo) random because the initialization at the R level is (pseudo)
random.
On Thu, Jul 30, 2020 at 3:36 PM Duncan Murdoch <murdoch.duncan at gmail.com>
wrote:
> I wouldn't trust the C++
2001 Mar 07
3
protocol 2 performance gain?
has anyone noticed a performance gain with protocol 2?
-David Higdon
2000 Jul 27
1
Permission Denied
Solaris 8
Openssh 2.1.1p4
Openssl-0.9.5a
Zlib 1.1.3
Anyone know why one would get the permission denied error?
It seems to be failing on the "Doing passwd authentication" phase
after the "Received encrypted confirmation" phase. I have included
the output of ssh -v.
Thanks,
David
# ssh -v hostname
SSH Version OpenSSH_2.1.1, protocol versions 1.5/2.0.
Compiled with SSL
2001 Feb 05
1
I have an odd OpenSSH compatablity issue
I am on Solaris 2.8 with openssh 2.3.0p1 and openssl 0.9.6.
The remote machine is running ssh.com 1.2.20 and Solaris 2.6.
I think the problem has to do with the 1.2.20 KeyRegeneration, because in
the next hour I will beable to get into the machine ok with openssh and
then later in the day I will not beable to ssh in again for another hour.
ssh -v -v sa at myhost.com
SSH Version OpenSSH_2.3.0p1,
2000 Jul 20
3
fatal: Not enough entropy in RNG
Hi,
I'm running openssh 2.1.1p4 on Solaris 7 (sparc). Occationally, when I
boot up the server, the startup script I wrote to start sshd fails to start
sshd with the following error:
fatal: Not enough entropy in RNG
What am I doing wrong??
Is there anything I can do to prevent this from happening?
Is just restarting sshd a valid thing to do??
Thanks for any thoughts,
David
2001 Feb 16
7
OpenSSH 2.5.0p1
Known issues:
1) Linux 'sleep 20' -- Unfixable before 2.5.0 (known work around)
2) HP/UX signal issue -- Patched and HP/UX 11 works in v2
3) SCO 2/ Native Compiler -- Unfixable before 2.5.0 (known work around)
4) NeXTStep -- Resynced, MAX_GROUPS vs NGROUPS unresolved (not major)
5) DG/UX regcomp/regexec -- Fixed.
6) Cray signal issues -- ???
7) Solaris '$PATH' issue -- ??
2000 Jul 17
0
patch for getting 2.1.1p4 to compile on SunOS 4
Hi.
SunOS 4 is one system that relies on the strerror() in bsd-misc.[ch].
However, that replacement function does not have the right prototype.
This is fixed in the patch below. There was also an error with
sys_errlist not being explicitely declared. Also fixed.
There was another weird link-time problem with bsd-misc.o being at the
same time used by some *.o in libssh.a and using itself
2000 Sep 02
0
ANNOUNCE: portable OpenSSH 2.2.0p1
Version 2.2.0p1 of portable OpenSSH has just been uploaded to the
master site and should be making its way to the mirrors in due
course.
http://www.openssh.com/portable.html
This release contains several new features and bugfixes relative to
the previous 2.1.1p4 release. In particular:
- DSA key support in ssh-agent. Please not that this will not
interop with ssh.com's ssh-agent (Markus
2000 Sep 02
0
ANNOUNCE: portable OpenSSH 2.2.0p1
Version 2.2.0p1 of portable OpenSSH has just been uploaded to the
master site and should be making its way to the mirrors in due
course.
http://www.openssh.com/portable.html
This release contains several new features and bugfixes relative to
the previous 2.1.1p4 release. In particular:
- DSA key support in ssh-agent. Please not that this will not
interop with ssh.com's ssh-agent (Markus
2004 May 02
2
[Bug 859] getaddrinfo(host, "0", &hints, &res) may take extra cycles
http://bugzilla.mindrot.org/show_bug.cgi?id=859
Summary: getaddrinfo(host, "0", &hints, &res) may take extra
cycles
Product: Portable OpenSSH
Version: 3.8p1
Platform: All
OS/Version: other
Status: NEW
Severity: normal
Priority: P2
Component: Miscellaneous
2000 Sep 18
1
ssh-agent and ssh2 servers...
I'm not on the mailing list, so I'd appreciate it if you could cc: me,
though I will keep an eye on the archives.
I am running openssh 2.2.0p1 on Debian GNU/Linux. I was pleased to
see that 2.2.0p1 had support for DSA keys in the agent, and I have
successfully used the v2 protocol to another openssh server with the
agent providing authentication.
I am also able to successfully connect
2000 Jul 12
0
Announce: portable OpenSSH 2.1.1p3
The 2.1.1p3 release of portable OpenSSH has been uploaded to the
OpenBSD ftp master site. In a few hours it will be available from one
of the many mirrors listed at:
http://www.openssh.com/portable.html
This release fixes several bugs reported since the previous release
and extends portability to NeXT and Reliant Unix.
As usual, the OpenBSD team has been hard at work further polishing and
2000 Jul 12
0
Announce: portable OpenSSH 2.1.1p3
The 2.1.1p3 release of portable OpenSSH has been uploaded to the
OpenBSD ftp master site. In a few hours it will be available from one
of the many mirrors listed at:
http://www.openssh.com/portable.html
This release fixes several bugs reported since the previous release
and extends portability to NeXT and Reliant Unix.
As usual, the OpenBSD team has been hard at work further polishing and