similar to: [ossh patch] principal name/patterns in authorized_keys2

Displaying 20 results from an estimated 700 matches similar to: "[ossh patch] principal name/patterns in authorized_keys2"

2002 Jan 24
1
PATCH: krb4/krb5/... names/patterns in auth_keys entries
This patch (to OpenSSH 3.0.2p1) adds support for using krb4, krb5 and other principal names in authorized_keys entries. It's a sort of replacement for .klogin and .k5login, but it's much more general than .k*login as it applies to any authentication mechanism where a name is associated with the ssh client and it supports name patterns and all the normal authorized_keys entry options
2001 Jun 28
1
Adding 'name' key types
Playing around with the [wonderful] GSS-API patches for OpenSSH [1] I noticed that there is a bit of functionality missing from OpenSSH/GSS-API, namely that authorized_keys2 has no meaning when using GSS authentication. Yes, ~/.k5login can be used to grant access to an account for applications that support Kerberos, as does OpenSSH with those GSS patches, but .k5login does not and cannot provide
2001 Oct 25
2
SIGCHLD race *trivial* patch
Yes, this is a patch against an older version of OpenSSH with other stuff anyways, BUT, it's so TRIVIAL(*), that you can see how it would apply to newer versions (which I've not tried). Here's the gist: server_loop2() has a race condition with respect to reception of SIGCHLD and checking/setting child_terminated. This patch does two things: wait_until_can_do_something() adds a 1
2002 Feb 05
0
New forkoff() and chan_wont_read/write() API
Markus, How's this patch? - a chan_wont_read()/chan_wont_write() API is added that is very much like chan_read_failed()/chan_write_failed(), but for the debug messages and chan_wont_*() don't ever call error() The 3.0.2p1 channel_pre_x11_open() uses chan_*_failed() but looks like it ought to use chan_wont_*() instead :) - forkoff() no longer fakes EOF for SSHv2 (still
2010 Dec 07
0
[PATCH]: A daemon to support HyperV KVP functionality
From: K. Y. Srinivasan <ksrinivasan at novell.com> Subject: An implementation of key/value pair feature (KVP) for Linux on HyperV. Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com> Index: linux.trees.git/drivers/staging/hv/tools/hv_kvp_daemon.c =================================================================== --- /dev/null 1970-01-01 00:00:00.000000000 +0000 +++
2010 Dec 07
0
[PATCH]: A daemon to support HyperV KVP functionality
From: K. Y. Srinivasan <ksrinivasan at novell.com> Subject: An implementation of key/value pair feature (KVP) for Linux on HyperV. Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com> Index: linux.trees.git/drivers/staging/hv/tools/hv_kvp_daemon.c =================================================================== --- /dev/null 1970-01-01 00:00:00.000000000 +0000 +++
2010 Dec 08
0
No subject
This daemon gathers all the guest specific information needed to support = the HyperV KVP functionality. This daemon communicates with the kernel component via a netlink channel. Signed-off-by: ksrinivasan <ksrinivasan at novell.com> --- drivers/staging/hv/tools/hv_kvp_daemon.c | 470 ++++++++++++++++++++++++++= ++++ 1 files changed, 470 insertions(+), 0 deletions(-) create mode 100644
2010 Dec 08
0
No subject
This daemon gathers all the guest specific information needed to support = the HyperV KVP functionality. This daemon communicates with the kernel component via a netlink channel. Signed-off-by: ksrinivasan <ksrinivasan at novell.com> --- drivers/staging/hv/tools/hv_kvp_daemon.c | 470 ++++++++++++++++++++++++++= ++++ 1 files changed, 470 insertions(+), 0 deletions(-) create mode 100644
2010 Dec 17
0
[PATCH 4/4] Staging: hv: Add a user-space daemon to support key/value pair (KVP)
All guest specific data gathering is implemented in a user-mode daemon. The kernel component of KVP passes the "key" to this daemon and the daemon is responsible for passing back the corresponding value. This daemon communicates with the kernel component via a netlink channel. Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com> --- drivers/staging/hv/tools/hv_kvp_daemon.c
2010 Dec 17
0
[PATCH 4/4] Staging: hv: Add a user-space daemon to support key/value pair (KVP)
All guest specific data gathering is implemented in a user-mode daemon. The kernel component of KVP passes the "key" to this daemon and the daemon is responsible for passing back the corresponding value. This daemon communicates with the kernel component via a netlink channel. Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com> --- drivers/staging/hv/tools/hv_kvp_daemon.c
2018 Nov 01
4
Kodi crashes when trying to browse network
Hi, I maintain Kodi[1] in RPMFusion[2] and the latest version of Kodi, 18.0, is crashing when trying to browse the SMB network. The previous version, 17.x, worked fine. The backtrace shows that Samba was not able to open /dev/urandom, which can't be true and must be masking another issue. The issue occurs on any Fedora 28 or 29 system (multiple user reports[3]). SELinux is disabled and
2017 Jun 21
6
RFC: Cleaning up the Itanium demangler
Hello all, The itanium demangler in libcxxabi (and also, llvm/lib/Demangle) is really slow. This is largely because the textual representation of the symbol that is being demangled is held in a std::string, and manipulations done during parsing are done on that string. The demangler is always concatenating strings and inserting into the middle of strings, which is terrible. The fact that the
2001 Jul 05
1
OpenSSH Logging Madness
Feature request: - Please add a new LogLevel corresponding to the LOG_NOTICE syslog level. - Then modify OpenSSH to log to LOG_NOTICE only these events: - login failures - login successes Specifically, please: - add a new element to the LogLevel enum, say, 'SYSLOG_LEVEL_NOTICE', between 'SYSLOG_LEVEL_INFO' and 'SYSLOG_LEVEL_ERROR', in log.h -
2001 Dec 04
0
PATCH: log key fingerprint upon successful login
This patch is against 3.0.2p1. It produces output like the first line in the example below for both v1 and v2 logins. Logging is turned on by sticking ``LogFingerprint yes'' in sshd_conf. It would be nice if something like this would make it into OpenSSH. Dec 4 14:21:09 lizzy.bugworks.com sshd[7774]: [ID 800047 auth.info] Found matching RSA1 key:
1998 Oct 19
1
domain_master_node_status_fail: ... Cannot sync browser lists.
This looks like a bug to me, except . . . no one else seems to have encountered it, and it's in a pretty basic area, so there must be something wrong at our site. When the Unix server becomes a local master browser, Samba is unable to sync its browse list w/that of the DMB. None of our NT machines are having any trouble, and our tech. support guy says the DMB is in good health. Rebooting
2003 Sep 27
0
Samba 3(PDC) + winbind, anyone has it working ?
Hi, I have reported this(and seen similar problems by others) before. I took the plunge today and trace into the source to see what happened. The result seems to be that winbind(or the nsswitch part) would never work in a PDC/BDC situation, only for other trusted domain(probably). Below is my analysis. I have setup nsswitch.conf and pam.d/login properly so libnss_winbind and pam_winbind are
2015 Nov 17
0
[PATCH 2/3] v2v: windows: Add a Windows '*.inf' file parser.
This simple parser has (limited) understanding of the Windows '*.inf' file format. This is a Windows config file with some peculiarities. This commit also has a unit test. --- po/POTFILES-ml | 1 + v2v/Makefile.am | 5 +- v2v/v2v_unit_tests.ml | 104 +++++++++++++++++++++++++++++++++++- v2v/windows_inf.ml | 143 ++++++++++++++++++++++++++++++++++++++++++++++++++
2001 Nov 20
0
Patch: 3.0.1p1: rename a conflicting variable
These patches are against 3.0.1p1. I need them because I have a local mod which needs access to the ServerOptions struct named ``options'', hence the rename. --- auth-rsa.c.orig Mon Nov 19 16:54:01 2001 +++ auth-rsa.c Mon Nov 19 16:56:18 2001 @@ -180,8 +180,7 @@ * user really has the corresponding private key. */ while (fgets(line, sizeof(line), f)) { - char *cp; - char
2008 Jun 24
1
[RFC][PATCH] btrfs orphan code
Hello, I want to throw this out here now that I''ve got most of the heavy lifting done for this code to make sure what I''m doing is ok for now. I''ve added an ORPHAN_DIR item key to have a hidden dir per root. Right now it just does it for whatever the default root is on mount, but I''m going to fix that to do the orphan dir check/creation on lookup of a
2018 Nov 03
2
Kodi crashes when trying to browse network
On Sat, 3 Nov 2018 09:30:08 -0500 Michael Cronenworth via samba <samba at lists.samba.org> wrote: > On 11/2/18 4:29 PM, Michael Cronenworth via samba wrote: > > > > A compiler bug is also possible. When I have time I'll try to > > rebuild Samba with -O0 to make sure it isn't an optimization issue. > > When I built with -O0 the backtrace changed. >