Displaying 20 results from an estimated 2000 matches similar to: "Call for testers."
2001 Sep 12
0
AES update..
I've done a decent size update of the OpenSSH portable from the upstream
tree. There is an AES upgrade that needs to take place, but I need people
to test and tell me what endedness changes need to be applied (if any).
Attached is the patch. It is geared towards the latter snapshots..Unsure
how it will patch (if at all) against 2.9pX series.
Thanks.
- Ben
"This is dark day in
2002 Mar 08
1
Problems with Solaris 8 and OpenSSH 3.1p1
When compiling the software it breaks with an error on the cipher.c file.
Lot's of warnings and error of undeclared stuff.
Snippet follows:
gcc -g -O2 -Wall -Wpointer-arith -Wno-uninitialized -I. -I.
-I/usr/local/ssl/include -Iyes -I/usr/local/include -DSSHDIR=\"/etc\"
-D_PATH_SSH_PROGRAM=\"/usr/bin/ssh\"
2004 Sep 08
1
Problems loading Lapack library
I have just installed R 1.9.1 on an old Sun Sparc
with the following specs:
version
Machine hardware: sun4u
OS version: 5.6
Processor type: sparc
Hardware: SUNW,Ultra-4
The following components are installed on your system:
Sun Visual WorkShop C++ 3.0
Sun WorkShop Compiler C 4.2
Sun WorkShop Compiler C++ 4.2
Sun WorkShop Tools.h++ 7.0
2001 Sep 27
3
sftp error on LynxOs
I am trying to initiate an sftp session from a Linux (Redhat) to a LynxOs
machine (where i have ported opnessh-2.9p1) and configured without PAM
support (as I was not able to find PAM version for LynxOS operating system)
I get the following error:
$ sftp -P /home/telica -l telica -v ben
select: Bad file descriptor
read: Input/output error
sftp>
Can somebody help me asap on this?
2002 Apr 24
1
Fwd: need help in ssh client: key exchange
This is debugs seen on server, whose keys are
not accepted by the client:
debug1: Seeding random number generator
debug1: sshd version OpenSSH_2.5.2p2
debug1: load_private_key_autodetect: type 0 RSA1
debug1: read SSH2 private key done: name rsa w/o
comment success 1
debug1: load_private_key_autodetect: type 1 RSA
debug1: read SSH2 private key done: name dsa w/o
comment success 1
debug1:
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi,
I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with
FIPS 140-2 OpenSSL.
These are based on previously reported patches by Steve Marquess
<marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>,
for ver. OpenSSH 3.8.
Note that these patches are NOT OFFICIAL, and MAY be used freely by
anyone.
Issues [partially] handled:
SSL FIPS Self test.
RC4,
2001 Feb 18
1
OpenSSH 2.3.0p1 protocol 2 problem with AIX
Hi,
Connecting from RHL7 with OpenSSH 2.3.0p1 or 2.5.0p1 to OpenSSH 2.3.0p1 on
AIX 4.3.1. Protocol 2 doesn't work if you specify 'Ciphers
rijndael128-cbc' or Ciphers 'aes128-cbc'.
sshd -d -d -d on the server shows _nothing_ about these connections.
I'm not sure if rijndael has been left out from sshd somehow, but
shouldn't the error message be a little more
2004 Feb 04
3
[PATCH] Adding ocfs support to blkid
The following patch adds ocfs support to blkid.
--rusty
# This is a BitKeeper generated patch for the following project:
# Project Name: Ext2 filesystem utilities
# This patch format is intended for GNU patch command version 2.5 or higher.
# This patch includes the following deltas:
# ChangeSet 1.1327 -> 1.1328
# lib/blkid/probe.c 1.15 -> 1.16
#
2018 Jun 08
4
vanilla build of 7.7p1 release on linux/4.17 fails with gcc8 @ "/usr/bin/ld: unrecognized option '-Wl,-z,retpolineplt'"
On 8 June 2018 at 11:21, PGNet Dev <pgnet.dev at gmail.com> wrote:
> fyi
>
> add'l -- and looks unrelated -- issue
> /usr/include/pthread.h:251:12: note: previous declaration of ?pthread_join? was here
> extern int pthread_join (pthread_t __th, void **__thread_return);
What included pthread.h? That's explicitly not supported by sshd:
$ grep THREAD
2001 Feb 19
1
FreeBSD 4.2 OpenSSH2.3.0 client vs Red Hat 6.2 OpenSSH2.5.1p1 sshd
mdb-bsd is a FreeBSD 4.2-STABLE box morpheus is a Red Hat Linux 6.2
box with openssl 0.9.6 on it.
Attempts to use SSHv2 fail. Using SSHv1 succeeds.
sshd from OpenSSH2.5.1p1 is getting a
fatal: xfree: NULL pointer given as argument
Full client and server interaction given below.
-- Mark
Script started on Mon Feb 19 10:47:01 2001
1:mdb at mdb-bsd$ ssh -v -v -v -2 -x morpheus date
SSH Version
2000 Oct 14
1
Compile error rijndael on Solaris 2.6 (and fix)
When compiling openssh-SNAP-20001014 on Solaris 2.6 with
gcc 2.95.2 I get:
In file included from rijndael.c:42:
rijndael.h:6: parse error before `u1byte'
and a lot more warnings and errors...
Solved by adding
#include "config.h"
in rijndael.c
Lasse Holmqvist
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string
client_version_string.
These are used just in a few functions and can easily be passed as
parameters.
Also, there is a strange construct, where their memory is allocated to
the global pointers, then copies of these pointers are assigned to the
kex structure. The kex_free finally frees them via cleanup of the kex
2013 Jan 14
3
Inconsisten declaration of ssh_aes_ctr_iv()
Hi,
The 20130110 snapshot fails to build against OpenSSL 0.9.8 and 1.0.0
with the following error:
gcc -g -O2 -Wall -Wpointer-arith -Wuninitialized -Wsign-compare -Wformat-security -Wno-pointer-sign -fno-strict-aliasing -D_FORTIFY_SOURCE=2 -fno-builtin-memset -fstack-protector-all -I. -I. -DSSHDIR=\"/tmp/foo/etc\" -D_PATH_SSH_PROGRAM=\"/tmp/foo/bin/ssh\"
2013 May 15
2
Support for "ssh-rsa-sha256" and "ssh-dss-sha256" ?
Functionality request for supporting Digital Signatures for RSA and DSS
Public Key Algorithms in alignment with NIST SP800-131A.
I
assume this has been asked before, but I could not find in the
archives. Support of "ssh-rsa-sha256" and "ssh-dss-sha256" public key
algorithms for OpenSSH? I know Suite B Algorithms and x509 SSH
Extension Algorithms are supported, but not a
2001 Feb 27
4
Bad packet length in 2.5.1 with rijndael
it seems that this check does not work on solaris
#if BYTE_ORDER != LITTLE_ENDIAN
#define BYTE_SWAP
#endif
could you please check that BYTE_SWAP is defined
in rijndael.c
-m
2001 Mar 07
0
Compiling openssh-2.5.1p1 on IRIX in o32 mode
I get this error:
cc -o32 -g -I/usr/local/include -I/var/tmp/openssl-o32/include
-I/var/tmp/openssl-o32/include
-I. -I./openbsd-compat -I. -DETCDIR=\"/usr/local/ssh/etc\"
-D_PATH_SSH_PROGRAM=\"/usr/local/ssh/bin/ssh\"
-D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/ssh/libexec/ssh-askpass\"
-D_PATH_SFTP_SERVER=\"/usr/local/ssh/libexec/sftp-server\" -DHAVE_CONFIG_H
2004 Aug 06
2
ices2 + pid-file (was: ices2 + stdin + metadata)
Ok, so i have to know the PID of ices to send the update-signal. I've added
this to my ices.xml:
<pidfile>/home/www/bin/ices.pid</pidfile> (directly under the node <ices>)
I thought i've seen this somewhere in the manual.
However, when i start ices, no pid-file is created :-/ Is this the right
way?
<p>----- Original Message -----
From: "Karl Heyes"
2020 Jan 16
3
[patch 1/2] use chacha20 from openssl (1.1.0+) when possible
On Fri, 2019-07-12 at 15:54 +1000, Damien Miller wrote:
> On Thu, 17 Jan 2019, Yuriy M. Kaminskiy wrote:
>
> > On some cpu's optimized chacha implementation in openssl (1.1.0+)
> > is
> > notably faster (and on others it is just faster) than generic C
> > implementation in openssh.
> >
> > Sadly, openssl's chacha20-poly1305
2015 Mar 17
2
[patch] Updated patch for pkcs#11 smartcard readers that have a protected PIN path
Some smartcard readers have keypad to enter the PIN securely (i.e. such that it cannot be intercepted by a rogue (ssh) binary.
PKCS#11 allows for enforcing this in hardware. Below patch allows for SSH to make use of this; against head/master as of today.
Dw.
commit 7f0250a8ae6c639a19d4e1e24fc112d5e2e1249a
Author: Dirk-Willem van Gulik <dirkx at webweaving.org>
Date: Tue Mar 17
2001 Jun 28
1
`_POSIX_VDISABLE' undeclared
Dear developpers,
I'm using OpenSSH_2.9p1 with prngd on my Sony NEWS-OS 4.2.1R.
NEWS-OS 4.x is based on 4.3BSD and lack of many POSIX and ANSI features.
Today I tried to make the latest openssh_cvs and got the following error,
gcc -g -O2 -Wall -O -I. -I.. -I. -I./.. -I/usr/local/ssl/include -DHAVE_CONFIG_H -c readpassphrase.c
readpassphrase.c: In function `readpassphrase':