Displaying 20 results from an estimated 700 matches similar to: "[ossh patch] principal name/patterns in authorized_keys2"
2002 Jan 24
1
PATCH: krb4/krb5/... names/patterns in auth_keys entries
This patch (to OpenSSH 3.0.2p1) adds support for using krb4, krb5 and
other principal names in authorized_keys entries.
It's a sort of replacement for .klogin and .k5login, but it's much more
general than .k*login as it applies to any authentication mechanism
where a name is associated with the ssh client and it supports name
patterns and all the normal authorized_keys entry options
2001 Jun 28
1
Adding 'name' key types
Playing around with the [wonderful] GSS-API patches for OpenSSH [1] I
noticed that there is a bit of functionality missing from
OpenSSH/GSS-API, namely that authorized_keys2 has no meaning when using
GSS authentication.
Yes, ~/.k5login can be used to grant access to an account for
applications that support Kerberos, as does OpenSSH with those GSS
patches, but .k5login does not and cannot provide
2001 Oct 25
2
SIGCHLD race *trivial* patch
Yes, this is a patch against an older version of OpenSSH with other
stuff anyways, BUT, it's so TRIVIAL(*), that you can see how it would
apply to newer versions (which I've not tried).
Here's the gist: server_loop2() has a race condition with respect to
reception of SIGCHLD and checking/setting child_terminated. This patch
does two things: wait_until_can_do_something() adds a 1
2002 Feb 05
0
New forkoff() and chan_wont_read/write() API
Markus,
How's this patch?
- a chan_wont_read()/chan_wont_write() API is added that is very much
like chan_read_failed()/chan_write_failed(), but for the debug
messages and chan_wont_*() don't ever call error()
The 3.0.2p1 channel_pre_x11_open() uses chan_*_failed() but looks
like it ought to use chan_wont_*() instead :)
- forkoff() no longer fakes EOF for SSHv2 (still
2010 Dec 07
0
[PATCH]: A daemon to support HyperV KVP functionality
From: K. Y. Srinivasan <ksrinivasan at novell.com>
Subject: An implementation of key/value pair feature (KVP) for Linux
on HyperV.
Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com>
Index: linux.trees.git/drivers/staging/hv/tools/hv_kvp_daemon.c
===================================================================
--- /dev/null 1970-01-01 00:00:00.000000000 +0000
+++
2010 Dec 07
0
[PATCH]: A daemon to support HyperV KVP functionality
From: K. Y. Srinivasan <ksrinivasan at novell.com>
Subject: An implementation of key/value pair feature (KVP) for Linux
on HyperV.
Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com>
Index: linux.trees.git/drivers/staging/hv/tools/hv_kvp_daemon.c
===================================================================
--- /dev/null 1970-01-01 00:00:00.000000000 +0000
+++
2010 Dec 08
0
No subject
This daemon gathers all the guest specific information needed to support =
the
HyperV KVP functionality. This daemon communicates with the kernel
component via a netlink channel.
Signed-off-by: ksrinivasan <ksrinivasan at novell.com>
---
drivers/staging/hv/tools/hv_kvp_daemon.c | 470 ++++++++++++++++++++++++++=
++++
1 files changed, 470 insertions(+), 0 deletions(-)
create mode 100644
2010 Dec 08
0
No subject
This daemon gathers all the guest specific information needed to support =
the
HyperV KVP functionality. This daemon communicates with the kernel
component via a netlink channel.
Signed-off-by: ksrinivasan <ksrinivasan at novell.com>
---
drivers/staging/hv/tools/hv_kvp_daemon.c | 470 ++++++++++++++++++++++++++=
++++
1 files changed, 470 insertions(+), 0 deletions(-)
create mode 100644
2010 Dec 17
0
[PATCH 4/4] Staging: hv: Add a user-space daemon to support key/value pair (KVP)
All guest specific data gathering is implemented in a user-mode daemon.
The kernel component of KVP passes the "key" to this daemon and
the daemon is responsible for passing back the corresponding
value. This daemon communicates with the kernel
component via a netlink channel.
Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com>
---
drivers/staging/hv/tools/hv_kvp_daemon.c
2010 Dec 17
0
[PATCH 4/4] Staging: hv: Add a user-space daemon to support key/value pair (KVP)
All guest specific data gathering is implemented in a user-mode daemon.
The kernel component of KVP passes the "key" to this daemon and
the daemon is responsible for passing back the corresponding
value. This daemon communicates with the kernel
component via a netlink channel.
Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com>
---
drivers/staging/hv/tools/hv_kvp_daemon.c
2018 Nov 01
4
Kodi crashes when trying to browse network
Hi,
I maintain Kodi[1] in RPMFusion[2] and the latest version of Kodi, 18.0, is crashing
when trying to browse the SMB network. The previous version, 17.x, worked fine.
The backtrace shows that Samba was not able to open /dev/urandom, which can't be
true and must be masking another issue. The issue occurs on any Fedora 28 or 29
system (multiple user reports[3]). SELinux is disabled and
2017 Jun 21
6
RFC: Cleaning up the Itanium demangler
Hello all,
The itanium demangler in libcxxabi (and also, llvm/lib/Demangle) is
really slow. This is largely because the textual representation of the
symbol that is being demangled is held in a std::string, and
manipulations done during parsing are done on that string. The demangler
is always concatenating strings and inserting into the middle of
strings, which is terrible. The fact that the
2001 Jul 05
1
OpenSSH Logging Madness
Feature request:
- Please add a new LogLevel corresponding to the LOG_NOTICE syslog level.
- Then modify OpenSSH to log to LOG_NOTICE only these events:
- login failures
- login successes
Specifically, please:
- add a new element to the LogLevel enum, say, 'SYSLOG_LEVEL_NOTICE',
between 'SYSLOG_LEVEL_INFO' and 'SYSLOG_LEVEL_ERROR', in log.h
-
2001 Dec 04
0
PATCH: log key fingerprint upon successful login
This patch is against 3.0.2p1. It produces output like the first line in the
example below for both v1 and v2 logins. Logging is turned on by sticking
``LogFingerprint yes'' in sshd_conf. It would be nice if something like this
would make it into OpenSSH.
Dec 4 14:21:09 lizzy.bugworks.com sshd[7774]: [ID 800047 auth.info] Found
matching RSA1 key:
1998 Oct 19
1
domain_master_node_status_fail: ... Cannot sync browser lists.
This looks like a bug to me, except . . . no one else seems to have
encountered it, and it's in a pretty basic area, so there must be
something wrong at our site.
When the Unix server becomes a local master browser, Samba is unable
to sync its browse list w/that of the DMB. None of our NT machines
are having any trouble, and our tech. support guy says the DMB is in
good health. Rebooting
2003 Sep 27
0
Samba 3(PDC) + winbind, anyone has it working ?
Hi,
I have reported this(and seen similar problems by
others) before. I took the plunge today and trace into
the source to see what happened. The result seems to
be that winbind(or the nsswitch part) would never work
in a PDC/BDC situation, only for other trusted
domain(probably). Below is my analysis.
I have setup nsswitch.conf and pam.d/login properly so
libnss_winbind and pam_winbind are
2015 Nov 17
0
[PATCH 2/3] v2v: windows: Add a Windows '*.inf' file parser.
This simple parser has (limited) understanding of the Windows '*.inf'
file format. This is a Windows config file with some peculiarities.
This commit also has a unit test.
---
po/POTFILES-ml | 1 +
v2v/Makefile.am | 5 +-
v2v/v2v_unit_tests.ml | 104 +++++++++++++++++++++++++++++++++++-
v2v/windows_inf.ml | 143 ++++++++++++++++++++++++++++++++++++++++++++++++++
2001 Nov 20
0
Patch: 3.0.1p1: rename a conflicting variable
These patches are against 3.0.1p1. I need them because I have a local mod
which needs access to the ServerOptions struct named ``options'', hence the
rename.
--- auth-rsa.c.orig Mon Nov 19 16:54:01 2001
+++ auth-rsa.c Mon Nov 19 16:56:18 2001
@@ -180,8 +180,7 @@
* user really has the corresponding private key.
*/
while (fgets(line, sizeof(line), f)) {
- char *cp;
- char
2008 Jun 24
1
[RFC][PATCH] btrfs orphan code
Hello,
I want to throw this out here now that I''ve got most of the heavy lifting done
for this code to make sure what I''m doing is ok for now. I''ve added an
ORPHAN_DIR item key to have a hidden dir per root. Right now it just does it
for whatever the default root is on mount, but I''m going to fix that to do the
orphan dir check/creation on lookup of a
2018 Nov 03
2
Kodi crashes when trying to browse network
On Sat, 3 Nov 2018 09:30:08 -0500
Michael Cronenworth via samba <samba at lists.samba.org> wrote:
> On 11/2/18 4:29 PM, Michael Cronenworth via samba wrote:
> >
> > A compiler bug is also possible. When I have time I'll try to
> > rebuild Samba with -O0 to make sure it isn't an optimization issue.
>
> When I built with -O0 the backtrace changed.
>