Displaying 20 results from an estimated 9000 matches similar to: "[PATCH] document scp -r better"
2001 Sep 10
4
scp doesn't work with large (>2GB) files
Hi,
A bug I've had reported is that scp doesn't work with large files
(Debian bug number 106809). The problem seems to be scp.c:504:
if ((fd = open(name, O_RDONLY, 0)) < 0)
Is there some reason why making that
if ((fd = open(name, O_RDONLY|O_LARGEFILE, 0)) < 0)
would break things? It seems a simple fix to me...
Thanks,
Matthew
--
"At least you know where you are
2001 Jul 22
1
[patch] add -1 and -2 options to scp
Hi,
Several people have asked that scp support the -1 and -2 options, so I
wrote this patch.
Cheers,
Matthew
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: scp.diff
Url: http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20010722/7e096fab/attachment.ksh
-------------- next part --------------
--
"At least you know
2001 Jul 22
1
[patch] document location of identity files
Hi,
Quick change to ssh.1 to document ~/.ssh/identity_rsa and _dsa.
Cheers,
Matthew
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: sshman.diff
Url: http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20010722/a6d628e2/attachment.ksh
-------------- next part --------------
--
"At least you know where you are with
2001 Jul 21
2
ChallengeResponseAuthentication - typos and inconsistancies?
Hi,
It seems from the source code that there are a couple of quirks
with this option:
firstly, in the code it's mis-spelt as
"challenge_reponse_authentication"
and secondly, the default for the client (in readconf.c) seems to be
off, whereas for the server (servconf.c) seems to be on:
readconf.c: if (options->challenge_reponse_authentication == -1)
readconf.c:
2001 Jul 22
1
[patch] ignore SSH2_MSG_IGNORE packets
Hi,
protocolkeepalives sends ssh_msg_ignore, which the ssh2 server handles
incorrectly (i.e. it produces some output to syslog, instead of
ignoring the packet):
Jul 9 11:58:07 ren sshd[16580]: error: Hm, dispatch protocol error:
type 32 plen 4
This patch implements a highly advanced function to ignore these
packets ;)
Matthew
-------------- next part --------------
An embedded and
2001 Sep 27
1
Purpose of check_openssl_version?
Hi,
Debian have #defined out this function in entropy.c for some time
(since it causes things to break too often, given I don't maintain
openssl). Does it serve a useful function security-wise?
Thanks,
Matthew
--
"At least you know where you are with Microsoft."
"True. I just wish I'd brought a paddle."
http://www.debian.org
2001 Sep 06
1
PAM overrides PermitEmptyPasswords
I noticed while investigating Debian Bug #93200
(http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=93200&repeatmerged=yes)
that sshd refuses a login if /etc/pam.d/ssh doesn't specify "nullok" after
the pam_unix.so module -- is there any way to resolve this problem? It seems
that OpenSSH should override PAM in this case, someone posted a patch on 6/19
that appears to address this
2013 Oct 04
1
Questions...
Hi there,
The radio station I program at just got an airtime computer that has the possibility of remote broadcast. I wanted to figure out this technology for future remote broadcasts. I have a laptop with ubuntu linux on it and I was told to download ices to help me connect to the airtime computer. I went to your website www.icecast.org/ices.php
And downloaded both files for the ices2.
I am
2001 Jul 22
1
[patch] GNU/Hurd compatibility patches
Hi,
These patches are from Robert Bihlmeyer to make ssh build on Hurd. If
you have queries about them, I suggest contacting
debian-hurd at lists.debian.org.
Cheers,
Matthew
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: openssh-2.9-hurd.diff
Url:
2001 Jul 21
1
Defaults for protocol and ssh-keygen (and an introduction)
Hi,
I have recently taken over as Debian maintainer for ssh. This
means you're going to be getting lots of mail from me in the near
future :-) I'm aiming to be a little more active than the last
maintainer, but the Debian packages were really out of date, so I've
quite a lot of work (and probably some old bugs) to deal with.
Anyhow, onto the first question. ssh these days uses
2001 Jul 22
1
[patch] VPN enhancements
Hi,
This patch (mostly my work, except for protocolkeepalives, which
rjk at greenend.org.uk wrote for 2.5, and I forward-ported) came out our
usage for VPN tunnels of ssh, where it was useful for ssh to notice if
the server went away. It includes documentation, and is pretty
self-explanatory.
Matthew
-------------- next part --------------
An embedded and charset-unspecified text was
2001 Aug 23
1
-q option doesn't do what it says in the man page?
Hi,
Man page:
-q Quiet mode. Causes all warning and diagnostic messages
to be suppressed. Only fatal errors are displayed.
But in log.h:
typedef enum {
SYSLOG_LEVEL_QUIET,
SYSLOG_LEVEL_FATAL,
so in log.c:
void
do_log(LogLevel level, const char *fmt, va_list args)
{
char msgbuf[MSGBUFSIZ];
char fmtbuf[MSGBUFSIZ];
char *txt = NULL;
int pri = LOG_INFO;
if (level
2001 Dec 01
1
mips/mipsel problem
Hi,
There seems to be a problem with the arc4random code on mips/mipsel,
producing the following error message:
Couldn't obtain random bytes (error 604389476)
To quote the bug submitter:
"On mips and mipsel, the above error message is frequently seen when
calling
ssh with a command, usually several times in rapid succession,
although that
is not always the case. The error appears to
2001 Sep 27
3
[PATCH] ssh-copy-id should do chmod go-w
Hi,
quick patch to ssh-copy-id to make it set the file modes more
correctly.
Thanks,
Matthew
--- contrib/ssh-copy-id.orig Thu Sep 27 21:47:44 2001
+++ contrib/ssh-copy-id Thu Sep 27 21:47:52 2001
@@ -33,7 +33,7 @@
exit 1
fi
-{ eval "$GET_ID" ; } | ssh $1 "test -d .ssh || mkdir .ssh ; cat >>
.ssh/authori
zed_keys ; chmod g-w . .ssh .ssh/authorized_keys"
+{ eval
2001 Jul 21
5
Failed X11 authentication does the wrong thing
Hi,
if I do the following:
ssh -X localhost
su - another_user
xterm
I get:
X connection to ming:10.0 broken (explicit kill or server shutdown).
Where what is really wanted was something like:
Xlib: connection to ":0.0" refused by server
Xlib: Client is not authorized to connect to Server
xterm Xt error: Can't open display: :0.0
'tis easy to reproduce the bug, but the debug
2013 Jul 14
0
[LLVMdev] [PATCH] x86/asm: avoid mnemonics without type suffix
(resent without HTML)
On 07/14/2013 05:56 AM, Ramkumar Ramachandra wrote:
> 1c54d77 (x86: partial unification of asm-x86/bitops.h, 2008-01-30)
> changed a bunch of btrl/btsl instructions to btr/bts, with the following
> justification:
>
> The inline assembly for the bit operations has been changed to remove
> explicit sizing hints on the instructions, so the assembler will
2013 Jul 14
9
[LLVMdev] [PATCH] x86/asm: avoid mnemonics without type suffix
1c54d77 (x86: partial unification of asm-x86/bitops.h, 2008-01-30)
changed a bunch of btrl/btsl instructions to btr/bts, with the following
justification:
The inline assembly for the bit operations has been changed to remove
explicit sizing hints on the instructions, so the assembler will pick
the appropriate instruction forms depending on the architecture and
the context.
Unfortunately,
2001 Sep 04
0
Suggestion: Man page clarification
scp, when copying directories with the "-r" flag, uses the same "trailing
slash" syntax as rsync, i.e., if a trailing slash is given on the source
directory, it will copy the contents of that directory to the destination,
instead of the directory itself.
rsync has a special section in the man page that points out that this is
actually expected behavior, it would be nice if
2013 Jul 10
3
[LLVMdev] [PATCH] x86: disambiguate unqualified btr, bts
On Wed, Jul 10, 2013 at 12:29 PM, Ramkumar Ramachandra
<artagnon at gmail.com> wrote:
> The instructions btr and bts are perfectly valid, and have existed since
> Intel 386. GNU as supports them fine. Unfortunately, LLVM does not
> support them, and barfs with:
>
> error: ambiguous instructions require an explicit suffix
>
> Fix this problem by disambiguating it
2009 Oct 18
2
BTS
Anyone on this list have extensive experience with BTS?
http://deancollinsblog.blogspot.com/2009/03/open-bts.html
Please email me, particularly if you have experience in deploying over
multiple cells covering large geographical areas (200k's sq).
Regards,
Dean Collins
Cognation Inc
dean at cognation.net
<mailto:dean at cognation.net> +1-212-203-4357 New York