Displaying 20 results from an estimated 7000 matches similar to: "Distribution of openssh once compiled"
2001 Jan 22
3
CVS source tree from 22 Jan 2001
Makefile.in is not fixed !
in old ssh.h
# define SSH_ASKPASS_DEFAULT "/usr/X11R6/bin/ssh-askpass"
in new pathnames.h
#define _PATH_SSH_ASKPASS_DEFAULT "/usr/X11R6/bin/ssh-askpass"
but in Makefile.in
PATHS=...-DSSH_ASKPASS_DEFAULT=\"$(ASKPASS_PROGRAM)\"
-----------------------------------------------------------
about patch:
- remove unused defines:
2002 Sep 05
7
sshd and SIGKILL
On command:
#kill -9 `cat /var/run/sshd.pid`
sshd leave pid file !
sshd.c code:
===============
....
/*
* Arrange to restart on SIGHUP. The handler needs
* listen_sock.
*/
signal(SIGHUP, sighup_handler);
signal(SIGTERM, sigterm_handler);
signal(SIGQUIT, sigterm_handler);
....
===============
Missing line is :
signal(SIGKILL, sigterm_handler);
2000 Dec 21
2
Réf. : configure.in: Someone please show me a better way :)
If I remove all the export and change all the ' in ", it does work on SCO
3.2v5.0.4
|--------+----------------------------->
| | Roumen Petrov |
| | <Roumen.Petrov at skal|
| | asoft.com> |
| | |
| | 21/12/00 13:10 |
| | |
2001 Feb 06
16
sftp client
As of Sunday evening, OpenSSH has an interactive sftp client. It should
be in the more recent snapshots.
It would be appreciated if you could test new client and find all the
bugs :) Please also have a read of the manpage and ensure that it
matches what is implemented.
I am working on fixing the ones that I know about, so please try to
stay up to date with the snapshots.
Thanks,
Damien
2001 Jan 23
11
cc & no 64bit int patches
Here are a couple of patches against the CVS (Jan 22 18:41 PST)
Some C++ comments found their way into ssh.h
The no64.patch puts ifdefs around buffer_get_int64()
now in bufaux.[c,h]
--
Tim Rice Multitalents (707) 887-1469
tim at multitalents.net
-------------- next part --------------
--- ssh.h.old Mon Jan 22 18:40:58 2001
+++ ssh.h Mon Jan 22 19:02:02 2001
@@ -25,8 +25,10 @@
# include
2001 Jan 18
4
GNU autoconf/automake in OpenSSH
I make changes in open source tree to implement autoconf/automake.
What's new ?
- new acinclude.m4 ( based on old aclocal.m4 + new macros OSSH_EXPAND_PATHS and
OSSH_SHOW_OPTIONS
- new configure option --with-askpass=PATH
- updated acconfig.h ( based on old acconfig.h with removed USE_EXTERNAL_ASKPASS and new
ASKPASS_PATH + new config.h.top and config.h.bot )
!!! in this file has two lines
2011 Sep 08
2
Announce: X.509 certificates support v7.0 for OpenSSH version 5.9p1
Hi All,
Version 7.0 of "X.509 certificates support in OpenSSH" is ready for
immediate download.
This version allow client to use certificates and keys stored into
external devices. The implementation is based on openssl dynamic engines.
For instance E_NSS engine ( http://developer.berlios.de/projects/enss )
will allow you to
use certificates and keys from Firefox, SeaMonkey,
2015 Mar 03
2
configure and have crypt or DES_crypt
Hello,
With current portable master source tree HAVE_CRYPT and HAVE_DES_CRYPT
are not defined.
It seems to me this is regression introduced with implementation of
configure options --with-openssl.
Impacted code is in xcrypt.c:
...
# if defined(WITH_OPENSSL) && !defined(HAVE_CRYPT) &&
defined(HAVE_DES_CRYPT)
# include <openssl/des.h>
# define crypt DES_crypt
# endif
...
2008 Dec 16
3
Patch for OpenSSH for Windows to allow authentication through certificates
Hi all,
Does anyone know if it exists a patch for OpenSSH for Windows to allow
authentication through certificates?
Is it possible to make one if it doesn't exists?
Using OpenSSH for Windows 3.8p1-1 20040709 Build.
I know there is Roumen Petrov patch, but is for unix machines if i'm
not mistaken.
I need a similar one for Windows that work with the Roumen Petrov
patch so i can have
2002 Jul 22
9
[Patch] Improve portability of regression tests
Hello All.
As promised, here is what I needed to do to get the regression tests to
work on AIX & HPUX. It goes into a bit of detail in the hope that others
might be able to get them running on their platforms. I've run these
mods on AIX 4.3.3, HP-UX 11.00, Solaris 8, Redhat 7.3 and OpenBSD 3.0.
The problems I encountered:
* prereqs (pmake, md5sum)
* bad directory owner/mode causing auth
2007 Jul 29
38
[Bug 1346] New: PAM environment takes precedence over SendEnv
http://bugzilla.mindrot.org/show_bug.cgi?id=1346
Summary: PAM environment takes precedence over SendEnv
Product: Portable OpenSSH
Version: 4.6p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: bitbucket at mindrot.org
ReportedBy:
2000 Oct 28
11
Another shapshot
I have just uploaded another snapshot to:
http://www.mindrot.org/misc/openssh/openssh-SNAP-20001028.tar.gz
Please test this one extra hard, it is likely to become 2.3.0p1 early
next week.
Regards,
Damien Miller
--
| ``We've all heard that a million monkeys banging on | Damien Miller -
| a million typewriters will eventually reproduce the | <djm at mindrot.org>
| works of
2006 Sep 30
1
Announce: X.509 certificates support version 5.5.1 in OpenSSH 4.4p1
Hi All,
The version 5.5.1 of "X.509 certificates support in OpenSSH" is ready for download.
On download page http://roumenpetrov.info.localhost/openssh/download.html#get_-5.5.1
you can found diff for OpenSSH versions 4.4p1.
What's new:
* specific diff of 5.5 for OpenSSH 4.4p1
Because of OpenSSH source code changes, like include statements and new server
option
2006 Jan 16
1
man pages (20060116)
Hi all,
The file ~/.ssh/environment is used by ssh daemon.
Since sshd sets up basic environment I guess that sentences
in ssh(1) that reference the file ~/.ssh/environment and
environment variables should be moved to sshd(8).
Wim,
could you check why anonymous CVS require password, please?
Regards,
Roumen Petrov
2023 Mar 10
1
OpenSSH FIPS support
Hi Joel,
Joel GUITTET wrote:
> Hi,
> We currently work on a project that require SSH server with FIPS and using OpenSSL v3.
There is no way to work with OpenSSL v3 due to many reasons.
If you like to get FIPS capable secsh implementation compatible with OpenSSL FIPS validated modules 1.2 and 2.0 , RedHat ES, or Oracle Solaris you could use PKIX-SSH.
Regards,
Roumen Petrov
--
Advanced
2000 Dec 21
1
configure.in: Someone please show me a better way :)
Q: What platform don't run this script:
----------------------------------------
#!/bin/sh
export X0='x0'
export X1a="$X0/1"
export X1b='$X0/1'
export X2a="$X1a/2"
export X2b='$X1b/2'
$SHELL <<EOF_2
$SHELL <<EOF_1
cat <<EOF
#define a "$X2a/aa"
#define b "$X2b/bb"
EOF
EOF_1
EOF_2
2010 Jun 07
3
X509 based certificate authentication in OpenSSH
Hello,
I would like to know whether OpenSSH supports x509 certificate based
authentication.
It looks like OpenSSH has dependency on OpenSSL so does this mean that
OpeSSH also supports x509 certificate based authentication.
If it does support, can you please point me to the necessary
documentation.
Thanks
Naitik
2008 Jan 16
4
x509 patch for SSH
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi guys,
been trying the x509 patch for ssh from Roumen, it works great.
However, I can't figure out couple of things, and been trying to solve
it for couple of days already.
I'am using OpenSSH_4.7p1-hpn12v19, OpenSSL 0.9.8g
with 6.1 version of your patch.
The serverside hostkey is configured correctly, to present x509v3-sign-rsa
dynowork
2015 Dec 07
2
OpenSSH FIPS 140-2 support using OpenSSL FIPS modules?
Thanks Roumen.
I have few more questions below:
1. What version of OpenSSH can the patch be applied to? What branch should
I check out the patch?
2.
>Impact is not only for source code. Build process has to be updated as
well. Red Hat is based on "fipscheck".
What build process should be changed? What is fipscheck?
3. My understanding any application (such as OpenSSH) which need
2015 Dec 07
2
OpenSSH FIPS 140-2 support using OpenSSL FIPS modules?
Thanks Roumen.
>Lets assume that application use OpenSSL FIPS validated module. FIPS mode
is activated in openssl command if environment variable OPENSSL_FIPS is
set. Similarly I use OPENSSL_FIPS environment variable to activate FIPS
mode. Code will call FIPS_mode_set(1) if crypto module is not FIPS mode.
Did you mean the FIPS patched OpenSSH server and client (such as
ssh-keygen) always