Displaying 20 results from an estimated 900 matches similar to: "[patch] VPN enhancements"
2001 Jul 22
1
[patch] ignore SSH2_MSG_IGNORE packets
Hi,
protocolkeepalives sends ssh_msg_ignore, which the ssh2 server handles
incorrectly (i.e. it produces some output to syslog, instead of
ignoring the packet):
Jul 9 11:58:07 ren sshd[16580]: error: Hm, dispatch protocol error:
type 32 plen 4
This patch implements a highly advanced function to ignore these
packets ;)
Matthew
-------------- next part --------------
An embedded and
2001 Jul 22
1
[patch] add -1 and -2 options to scp
Hi,
Several people have asked that scp support the -1 and -2 options, so I
wrote this patch.
Cheers,
Matthew
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: scp.diff
Url: http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20010722/7e096fab/attachment.ksh
-------------- next part --------------
--
"At least you know
2001 Jul 22
1
[patch] GNU/Hurd compatibility patches
Hi,
These patches are from Robert Bihlmeyer to make ssh build on Hurd. If
you have queries about them, I suggest contacting
debian-hurd at lists.debian.org.
Cheers,
Matthew
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: openssh-2.9-hurd.diff
Url:
2001 Jul 22
1
[patch] document location of identity files
Hi,
Quick change to ssh.1 to document ~/.ssh/identity_rsa and _dsa.
Cheers,
Matthew
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: sshman.diff
Url: http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20010722/a6d628e2/attachment.ksh
-------------- next part --------------
--
"At least you know where you are with
2001 Sep 10
4
scp doesn't work with large (>2GB) files
Hi,
A bug I've had reported is that scp doesn't work with large files
(Debian bug number 106809). The problem seems to be scp.c:504:
if ((fd = open(name, O_RDONLY, 0)) < 0)
Is there some reason why making that
if ((fd = open(name, O_RDONLY|O_LARGEFILE, 0)) < 0)
would break things? It seems a simple fix to me...
Thanks,
Matthew
--
"At least you know where you are
2001 Jul 21
2
ChallengeResponseAuthentication - typos and inconsistancies?
Hi,
It seems from the source code that there are a couple of quirks
with this option:
firstly, in the code it's mis-spelt as
"challenge_reponse_authentication"
and secondly, the default for the client (in readconf.c) seems to be
off, whereas for the server (servconf.c) seems to be on:
readconf.c: if (options->challenge_reponse_authentication == -1)
readconf.c:
2001 Sep 27
1
Purpose of check_openssl_version?
Hi,
Debian have #defined out this function in entropy.c for some time
(since it causes things to break too often, given I don't maintain
openssl). Does it serve a useful function security-wise?
Thanks,
Matthew
--
"At least you know where you are with Microsoft."
"True. I just wish I'd brought a paddle."
http://www.debian.org
2016 Jan 25
2
Version of SFTP
The link
http://www.greenend.org.uk/rjk/sftp/sftpversions.html
On Mon, Jan 25, 2016 at 11:07 AM, Maria Shalet <mshalet at gmail.com> wrote:
> Dear Developers,
> In the Open SSH package, we have only V3 of sftp. Here the
> mode of transfer is only binary.
>
> According to the below link I find there are later versions
> of the SFTP protocol that
2001 Jul 21
1
Defaults for protocol and ssh-keygen (and an introduction)
Hi,
I have recently taken over as Debian maintainer for ssh. This
means you're going to be getting lots of mail from me in the near
future :-) I'm aiming to be a little more active than the last
maintainer, but the Debian packages were really out of date, so I've
quite a lot of work (and probably some old bugs) to deal with.
Anyhow, onto the first question. ssh these days uses
2001 Aug 23
1
-q option doesn't do what it says in the man page?
Hi,
Man page:
-q Quiet mode. Causes all warning and diagnostic messages
to be suppressed. Only fatal errors are displayed.
But in log.h:
typedef enum {
SYSLOG_LEVEL_QUIET,
SYSLOG_LEVEL_FATAL,
so in log.c:
void
do_log(LogLevel level, const char *fmt, va_list args)
{
char msgbuf[MSGBUFSIZ];
char fmtbuf[MSGBUFSIZ];
char *txt = NULL;
int pri = LOG_INFO;
if (level
2001 Sep 27
1
[PATCH] document scp -r better
Hi,
Patch from Adam McKenna (via Debian BTS) to improve how we document
scp -r:
--- scp.1.orig Thu Sep 27 21:28:12 2001
+++ scp.1 Thu Sep 27 21:29:22 2001
@@ -72,7 +72,9 @@
Preserves modification times, access times, and modes from the
original file.
.It Fl r
-Recursively copy entire directories.
+Recursively copy entire directories. A trailing slash (/) on a
source file
+name means
2001 Dec 01
1
mips/mipsel problem
Hi,
There seems to be a problem with the arc4random code on mips/mipsel,
producing the following error message:
Couldn't obtain random bytes (error 604389476)
To quote the bug submitter:
"On mips and mipsel, the above error message is frequently seen when
calling
ssh with a command, usually several times in rapid succession,
although that
is not always the case. The error appears to
2001 Sep 27
3
[PATCH] ssh-copy-id should do chmod go-w
Hi,
quick patch to ssh-copy-id to make it set the file modes more
correctly.
Thanks,
Matthew
--- contrib/ssh-copy-id.orig Thu Sep 27 21:47:44 2001
+++ contrib/ssh-copy-id Thu Sep 27 21:47:52 2001
@@ -33,7 +33,7 @@
exit 1
fi
-{ eval "$GET_ID" ; } | ssh $1 "test -d .ssh || mkdir .ssh ; cat >>
.ssh/authori
zed_keys ; chmod g-w . .ssh .ssh/authorized_keys"
+{ eval
2001 Jul 21
5
Failed X11 authentication does the wrong thing
Hi,
if I do the following:
ssh -X localhost
su - another_user
xterm
I get:
X connection to ming:10.0 broken (explicit kill or server shutdown).
Where what is really wanted was something like:
Xlib: connection to ":0.0" refused by server
Xlib: Client is not authorized to connect to Server
xterm Xt error: Can't open display: :0.0
'tis easy to reproduce the bug, but the debug
2009 Mar 15
0
Bug#477525: Suggested fix
vifnum appears to be entirely a figment of network-route's imagination;
I can see no evidence of it elsewhere in the Debian Xen packages.
Since network-route claims to default to eth0 and does not document
vifnum at all, the obvious fix would be to change:
netdev=${netdev:-eth${vifnum}}
to:
netdev=${netdev:-eth0}
ttfn/rjk
2013 Mar 09
0
[LLVMdev] Fw: message
http://tiroasegnopuglia.com/rjk/dlm/plpfixlfpfqnr=ocrh
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-dev/attachments/20130309/1942c982/attachment.html>
2005 Apr 07
0
R 2.1.0 (beta) on IRIX
I'm trying to compile R-beta on IRIX using the native MipsPro 7.4
compilers, without great satisfaction. A list of problems is given
below, and any advice on solving them is appreciated.
Martyn
Configuration:
-------------
Here are the configuration options I am using
./configure CC=cc CXX=CC F77=f77 CPPFLAGS="-I/usr/freeware/include"
LDFLAGS="-L/usr/freeware/lib32"
2010 Oct 20
0
Increased memory usage between 4.8 and 5.5
I'm running into a memory problem when trying to switch some web servers
that are running centos4.8/x86_64 to centos5.5/x86_64. The new servers
running centos5.5 are using a decent amount more memory than the
centos4.8 servers.
Here's an example from top:
--- centos 5.5 ---
$ uname -a
Linux ws51 2.6.18-194.17.1.el5 #1 SMP Wed Sep 29 12:50:31 EDT 2010 x86_64 x86_64 x86_64 GNU/Linux
2009 Mar 21
0
Bug#520641: Cannot create HVM domain
Package: xen-utils-3.2-1
Version: 3.2.1-2
If I try to create an HVM domain I get the following error message:
araminta:~# xm create -c heceptor.cfg
Using config file "/etc/xen/heceptor.cfg".
Error: Creating domain failed: name=heceptor
xend-log has a Python backtrace in it:
[2009-03-21 14:14:46 25927] DEBUG (XendDomainInfo:84)
XendDomainInfo.create(['vm', ['name',
2001 Sep 13
4
ssh argv[0] support
Right - I know you've had a discussion about the argv[0] stuff
already, but I've written this simple script to simulate the (now
missing) support for Debian, and was asked to send it to you...
--- ssh-argv0 ---
#! /bin/sh -e
if [ "${0##*/}" == "ssh-argv0" ]
then
echo 'ssh-argv0: This script should not be run like this, see
ssh-argv0(1) for details'