Displaying 20 results from an estimated 500 matches similar to: "patch to support hurd-i386."
2002 Apr 10
1
openssh-3.1p1 on GNU/Hurd
Hi,
I've gone and ported the latest version of openssh, 3.1p1, to GNU/Hurd.
I've tried to learn from the other threads on this topic, but I still had
to get rid of MAXHOSTNAMELEN where I could.
James A. Morrison
diff -urN openssh-3.1p1.old/Makefile.in openssh-3.1p1/Makefile.in
--- openssh-3.1p1.old/Makefile.in Tue Feb 26 14:24:22 2002
+++ openssh-3.1p1/Makefile.in Tue Apr 9 16:16:49
2000 Dec 27
2
patch to support hurd-i386
Hi,
here's a patch so that ssh also supports hurd-i386. Thanks for
incorporating. The patch comes from Robert Bihlmeyer <robbe at orcus.priv.at>.
> openssh 2.2.0p1-1.1 does not build on the Hurd. The appended patch
> fixes that. Changes in detail:
> * PAM is not (yet?) supported, so the PAM dependencies are only put into
> the control file on architectures != hurd-i386.
2008 Sep 24
0
utmp_len
In sshd.c:
/* record remote hostname or ip */
u_int utmp_len = MAXHOSTNAMELEN;
However, HOSTNAMELEN is almost certainly too long. Is there a reason
not to use UT_HOSTSIZE instead, as below?
Index: sshd.c
===================================================================
--- sshd.c (revision 182719)
+++ sshd.c (working copy)
@@ -72,6 +72,7 @@
#include <stdlib.h>
#include
2015 Feb 24
4
Call for testing: OpenSSH 6.8
On Tue, 24 Feb 2015, Tom G. Christensen wrote:
> I've switched to HEAD in the git repo and it now builds on Solaris
> 2.6, 7, 8 and 9 but the testsuite still cannot be built due to the
> missing <err.h>.
>
> I noticed one of the changes was about HOST_NAME_MAX but I don't
> think that change addresses the real issue on at least these old
> Solaris systems. It
2003 Oct 30
1
Patch to make sshd work on multihomed systems
As far as I know this patch has no security implications -- I don't
believe that allowing sshd to use get_local_name() (in canohost.c) on
a connected socket to determine it's own fqdn will allow a malicious
client (or router or dns server) to make it come to the wrong
conclusion. But please let me know if you think I'm wrong.
Please also let me know if you're just not interested
2015 Feb 23
2
Call for testing: OpenSSH 6.8
On Mon, 23 Feb 2015, Tom G. Christensen wrote:
> On 23/02/15 20:31, Damien Miller wrote:
> > Thanks - I just committed a fix:
> >
> <snip patch>
>
> Thanks, unfortunately you missed the one in packet.h.
>
> In file included from ssh_api.h:31:0,
> from ssh_api.c:21:
> packet.h:38:23: fatal error: sys/queue.h: No such file or directory
2001 Oct 26
1
MAXHOSTNAMELEN and Solaris 2.5
Solaris 2.5 does not seem to define MAXHOSTNAMELEN, and a compilation
of vanilla OpenSSH 2.9.9p2 fails:
> gcc -g -O2 -Wall -Wpointer-arith -Wno-uninitialized -I. -I.
> -I/usr/local/ssl/include -I/usr/local/include
> -DETCDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\"
> -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\"
>
2001 Jan 04
0
patch for the HURD
This is a small/trivial patch to get HURD to _compile_ (I haven't gotten
PRNG to work yet) openssh. All it does is define MAXHOSTNAMELEN in
defines.h if it isn't already defined (there may need to be a library
loaded first, or you may want to incorporate that patch into canohost.c
instead of defines.h). Anyway, small patch for canohost.c and defines.h
because HURD doesn't use
2000 Dec 30
1
MAXHOSTNAMELEN
ChangeLog
20001230
- (bal) if no MAXHOSTNAMELEN is defined. Default to 64 character defination.
Suggested by Christian Kurz <shorty at debain.org>
This change causes compiler warnings on UnixWare 7, Solaris 7, others?
...
gcc -g -O2 -Wall -I/usr/local/include -I/usr/local/ssl/include -I. -Isrc -DETCDI
R=\"/usr/local/etc\" -DSSH_PROGRAM=\"/usr/local/bin/ssh\"
2001 Aug 07
1
do_pre_login() used before declared
do_pre_login() in session.c is used (in do_exec_pty()) before
it's declared, which is causing some problems for me.
please move it up a couple hundred lines in the file.
patch included for 0807 snapshot.
thanks,
wendy
% diff -u session.c.orig session.c.mod
--- session.c.orig Tue Aug 7 13:11:51 2001
+++ session.c.mod Tue Aug 7 16:21:07 2001
@@ -397,6 +397,34 @@
}
}
2002 Apr 05
2
[Bug 96] bsd-cray.h modifications to allow correct UNICOS execution
http://bugzilla.mindrot.org/show_bug.cgi?id=96
------- Additional Comments From stevesk at pobox.com 2002-04-05 19:23 -------
the cray support is incomplete now, is that correct?
if so, what is needed to complete it?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2008 Jul 04
1
Samba 3.2.0 doesn't compile under Solaris8
Dear All,
Yesterday I downloaded the latest Samba release 3.2.0 and tried to compile
it against blastwave.org packages, as I always do. But it fails with error:
"/usr/include/sys/termios.h", line 38: warning: macro redefined: CTRL
"./librpc/gen_ndr/srvsvc.h", line 232: warning: enumerator value overflows
INT_M
AX (2147483647)
"./librpc/gen_ndr/srvsvc.h", line 235:
2003 Apr 26
10
[Bug 549] Login Delay / Remove unwanted reverse map check
http://bugzilla.mindrot.org/show_bug.cgi?id=549
Summary: Login Delay / Remove unwanted reverse map check
Product: Portable OpenSSH
Version: 3.5p1
Platform: PPC
OS/Version: AIX
Status: NEW
Severity: normal
Priority: P3
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy:
2002 Mar 24
1
FreeBSD 4.x
On FreeBSD 4.x with HAVE_LOGIN_CAP defined the OpenSSH daemon doesn't properly follow standards.
As stated in man 5 login.conf and the process followed by /usr/bin/login,
"The ttys.allow and ttys.deny entries contain a comma-separated list of
tty devices (without the /dev/ prefix) that a user in a class may use to
access the system, and/or a list of ttygroups (See getttyent(3)
2010 Oct 22
2
Interix Port
Hi!
I recently updated my now long-standing patches for openssh 5.5p1 on
interix, and wondered if i ever reported those here, and whether
there would be any interest in it anyway.
So just to make sure, i'm sending it here, so you may do with it
however you like. It would be cool to see the changes go upstream
though ;)
Regards,
markus
-------------- next part --------------
A non-text
2001 Jul 23
1
forwarded message from mouring@etoh.eviladmin.org
On Mon, Jul 23, 2001 at 12:49:14AM +0100, Matthew Vernon wrote:
> ------- start of forwarded message -------
> From: <mouring at etoh.eviladmin.org>
> To: Matthew Vernon <matthew at empire.ucam.org>
> cc: <openssh-unix-dev at mindrot.org>
> Subject: Re: [patch] GNU/Hurd compatibility patches
> Date: Sun, 22 Jul 2001 12:39:32 -0500 (CDT)
>
>
> We
2003 Oct 08
4
OS/390 openssh
Hello Steve, Hello OpenSSH-portable developers,
I am building OpenSSH for our (EBCDIC-based) BS2000 mainframe
operating system, and I noticed you do the same for OS/390.
Because my initial ssh port was based on IBM's OSS port (ssh-1.2.2
or some such), I thought it was fair enough to help with a little
co-operation; we might come up with a unified EBCDIC patch which could
be contributed to
2000 Oct 15
1
Patch for Digital Unix SIA authentication
A while back, I sent in a patch that added Digital Unix SIA
authentication to OpenSSH. Well, I just figured out that it didn't
handle everything correctly (locked accounts could still log in). I
thought I had checked that, but I guess I missed it.
Anyway, here is a patch against OpenSSH 2.2.0p1 that fixes this.
--
Chris Adams <cmadams at hiwaay.net>
Systems and Network Administrator
2004 Sep 13
4
Pending OpenSSH release, call for testing.
Darren,
We have systems which are multihomed for virtualisation, but run only one sshd.
You can connect to any IP-address and should be authenticated with
gssapi/kerberos. So the client will ask for a principal host/virt-ip-X and the
server has to have an entry for this in the keytab and has to select the right
key by determining the hostname from the connection IP-address. There is no other
way
2000 Dec 21
1
Patch to allow DSA as well as RSA identities to be specified on the command line
This patch allows DSA identities to be specified on the command
line. Previously, only RSA identities were allowed.
------------------------------------------------------------------------
diff -U2 openssh-2.2.0p1/ssh.0 openssh-2.2.0p1.nigelw/ssh.0
--- openssh-2.2.0p1/ssh.0 Sat Sep 2 10:08:46 2000
+++ openssh-2.2.0p1.nigelw/ssh.0 Thu Dec 21 10:53:07 2000
@@ -224,5 +224,5 @@
-g Allows