similar to: Trying to get Openssh with AFS on HP 10.20 to work

Displaying 20 results from an estimated 1300 matches similar to: "Trying to get Openssh with AFS on HP 10.20 to work"

2004 Feb 17
0
OpenSSH 3.7 released (fwd)
Since there never was an answer on the secureshell at securityfocus.com list to this question, I thought I'd ask you guys on your own list and maybe I'll even get an answer. If the answer involves PAM in any way, then the most obvious question becomes "what about IRIX, Tru64, or any other platforms whose login procedure does not have PAM?". ----- Forwarded message from Atro
2009 Apr 20
3
Problems building R 2.9.0... on SGI and Sun once again
I've successfully built R 2.9.0 on Linux (amd64, i386 and ppc), but am having a bit of trouble with legacy boxen. What should have gone into the variable that is empty at the time it is used in "for f in $SOMETHING" and why does it end up being empty? Solaris 8 with Sun Studio 11 compilers: building package 'methods' gmake[4]: Entering directory
2006 Feb 08
2
R 2.2.1 installation trouble on SGI/Sun (PR#8575)
Hi, I'm upgrading to R 2.2.1 and have bumped into some problems. I have been successful with installing on x86 and PPC Linux, but am unable to install R on Solaris 7 and on IRIX 6.5. Configuration and compilation go through just fine, but "make install" fails: gmake[1]: Entering directory `/scratch/atossava/R-2.2.1/doc' installing doc ... ../tools/install-sh: no destination
2002 Jan 18
0
KTH krb4 and OpenSSL conflict building OpenSSH 3.0.2p1
Hi, I configured OpenSSH 3.0.2p1 with ./configure --disable-suid-ssh --with-pam --with-kerberos4=/usr/athena \ --with-afs=/usr/afsws --with-ipaddr-display \ --with-ssl-dir=/afs/bi/v/@sys/libraries/openssl/latest My "latest" OpenSSL is 0.9.6a. KTH krb4 is 1.1. When linking the binaries, the KTH krb4 libdes conflicts with the OpenSSL libdes. It seems to be possible to get around
2001 Jun 06
2
Failure to compile OpenSSH.
Hello guys. Following Dug's withdrawal of the SSH1 AFS patches, I'm trying to give OpenSSH installation another shot. It fails. The setting: * Platforms: Linux (Immunix 6.2), Solaris 7, IRIX 6.5, OSF1 4.0F, HP-UX 10.20. * Compilers: StackGuard egcs on Linux, vendor-supplied native on others (Workshop 5.0 Sun; MIPSpro 7.3 SGI; OSFCMPLRS440 package; HP ANSI C compiler B3899BA
2007 Jan 18
1
Building R 2.4.1 on IRIX
Hi, I've got the latest MIPS compilers that are C99 aware (7.4.4). "configure" finishes with: R is now configured for mips-sgi-irix6.5 Source directory: . Installation directory: /afs/bi/v/@sys/apps/stats/R/2.4.1 C compiler: cc -c99 -OPT:IEEE_NaN_inf=ON -g Fortran 77 compiler: f77 -OPT:IEEE_NaN_inf=ON -g C++ compiler: CC
2002 Mar 22
1
Is OpenSSH vulnerable to the ZLIB problem or isn't it?
SSH.COM says their SSH2 is not vulnerable to the ZLIB problem even though they use the library (details below). Can OpenSSH say the same thing? In either case, it seems like there ought to be an openssh-unix-announce message about what the situation is. I may have missed it, but I don't believe there was one. Yes, openssh doesn't have its own copy of zlib source but it would still be
2005 Dec 19
1
OpenSSH traffic accounting ...
Since i/we didn't receive any answer on secureshell at securityfocus.com I like to ask this question to you. What's your opinion on this topic? Thanks! Miro +-------------------------------+ +-------------------------------+ | Miro Dietiker | | MD Systems Miro Dietiker | +-------------------------------+ +-------------------------------+ -----Urspr?ngliche
2002 Feb 12
1
SSH Client Hangs after logging in to SSHD
I'm not a ssh expert and I don't know if the log is good or bad, but I too am running OpenSHH under OpenServer. I find that after I connect, the return key has no effect unless I first type: stty sane <Ctrl>j If you've hit <ENTER> before that you must first press <Ctrl>j a couple of times to clean out the buffer. After I type the above command, everything
2001 Oct 01
0
Couldn't obtain random bytes
I am trying to generate a ssh_known_hosts2 file, 2.9.9p2, using: ssh-keyscan -f list_of_hosts -t rsa > ssh_known_hosts.rsa and ssh-keyscan -f list_of_hosts -t dsa > ssh_known_hosts.dsa but both commands fail almost immidiately with: Couldn't obtain random bytes (error 604389476) What could that mean? Servers that I am aware of that I query is: OpenSSH_2.5.1p2 OpenSSH_2.5.2p2
2001 Oct 29
0
Hello Supporters
I've seen others working on a vxWorks port for OpenSSH. I'll CC: this to the OpenSSH dev list. Maybe they can provide you with the help you need. - Ben On Mon, 29 Oct 2001, Manoj Jaitly wrote: > I need a vxWorks port for openSSH. Can you send me some info on this topic. > If it is not available, then which is the best version to start porting and > what all I need to port
2001 Nov 08
0
openssh-3.0p1 + Tru64 4.0G: sia_ses_authent() always returns 0 (failure)
Hi- I built openssh-3.0p1 on a Tru64 4.0G without any problem. The system uses enhanced security, so the sia_* routines are used by sshd. Unfortunately, password authentication fails because sia_ses_authent() returns 0 in auth-sia.c. The thing is, the password is CORRECT; I verified this by inserting debugging statements before the call to sia_ses_authent(). The call to sia_ses_init()
2001 Dec 18
0
openssh, pam and cryptocard's cryptoadmin / easyradius
Hi, this is merely FYI, but i would appreciate if someone had any comments or further information on the topic. We were using the following setup : cryptocard easyradius with RB-1 hardware tokens (hex or decimal display, synchronous (quicklog) mode) f-secure ssh with pam radius authentication This worked fine until we updated to openssh 2.9p2. Then all authentications where the response
2001 Dec 28
1
openssh reveals existing accounts?
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=57859 There's a method to see if an account exists or not: if it does exist, and the password fails, there's a small delay before getting the prompt again. But if it doesn't, the password prompt returns immediately. Looks like a bug... :o) -- Florin Andrei Linux Is Not "gnU linuX"
2002 Feb 07
0
openssh never cleans out Xauthority
Why doesn't openssh bother to clean out the entries it places in .Xauthority? The file just keeps growing and growing... -- Karl Amrhein, <ksa at SLAC.Stanford.EDU> | www.slac.stanford.edu/~ksa SLAC Computing Services, Systems Group | 650.926.5083 Bldg 50, 364 --------------------------------------------------------------------- To unsubscribe, e-mail: secureshell-unsubscribe at
2001 Sep 28
0
Not enough entropy in RNG
I have been experiencing problems with remote data collection systems reporting not enough entropy in RNG. It mostly seems to be self correcting since a retry of the data transport succeeds. One system however shows the following everytime an ssh connection is attempted. Interactive commands do not seem to be affected. I have perused the code but the entropy gatherer seems to be fairly simple and
2008 May 22
0
secureshell@securityfocus.com mailing list down?
I joined the secureshell at securityfocus.com mailing list yesterday, and posted a message, but it doesn't seem like it ever made it to the list. Anyone know if it's down? Tnx, DR
2011 Aug 18
0
secureshell@securityfocus.com list dead?
Hello, anybody knows what happened to the ssh user mailing list on secureshell at securityfocus.com? it seems to be dead for more than two months now. I tried to post, but my postings never appeared on the list. Unfortunately, there's no administrative contact given on the subscription page, so I post to the dev list in the hope that somebody knows what's going on. Sorry for being OT.
2013 Sep 20
1
Key preference
Hello everybody, I have a problem specifying identities with the -i option. For easier ssh invocations, I have setup my ssh_config files with entries like the following: Host *.domain.name Port 23457 StrictHostKeyChecking yes UserKnownHostsFile /dev/null GlobalKnownHostsFile /etc/ssh/known-hosts/domain.name IdentityFile ~/.ssh/%h-dsa IdentityFile ~/.ssh/%h-rsa IdentityFile
2004 Aug 01
1
SSH login attempts: tcpdump packet capture
I got a packet capture of one of the SSH2 sessions trying to log in as a couple of illegal usernames. The contents of one packet suggests an attempt to buffer overflow the SSH server; ethereal's SSH decoding says "overly large value". It didn't seem to work against my system (I see no strange processes running; all files changed in past ten days look normal). I am