Displaying 20 results from an estimated 4000 matches similar to: "sshd fails to close open file descriptors when forking"
2001 Nov 08
2
sshd can't change expired password on Sol8 with Openssh3.0p1 + PAM
The reason I ask about the patches is because I think the problem you're
seeing might actually be a bug in pam_unix.so.1 - it's something to try at
least. We don't use password aging and we don't use the "passwd" command
to change passwords, so we haven't run into this at our site even though
we probably don't have pam_unix.so patched up. Also, the passwd
2001 Oct 31
2
Problem compiling 2.9.9p2 on Sol 2.6
It appears that "fixpaths" has "/usr/bin/perl" hard-coded in. This causes
make to fail immediately after running configure.
Ed
Ed Phillips <ed at udel.edu> University of Delaware (302) 831-6082
Systems Programmer III, Network and Systems Services
finger -l ed at polycut.nss.udel.edu for PGP public key
2001 Nov 08
5
OpenSSH3.0p1/PAM/Sol8
Hi there,
I just tried out OpenSSH3.0p1 running on Solaris 8 with PAM (--with-PAM).
The problem was mentioned some time ago and is still there :-(
When a password is expired you are prompted to change it now, enter your
login password and after doing so you are instantly disconnected. I think
this is a problem with PAM and not SSH, but how can I get a solution on this
?
sshd is running without
2001 Nov 06
1
Solaris 7 changing password via PAM reply
Hi,
Sorry no core dumps, the sshd programme is perfectly happy just fails to
consider changing the password.
Cheers,
Martyn
-----Original Message-----
From: Ed Phillips [mailto:ed at UDel.Edu]
Sent: 06 November 2001 18:38
To: Roberts,M,Martyn,IVLH4 C
Cc: openssh-unix-dev
Subject: Re: Solaris 7 changing password via PAM
On Tue, 6 Nov 2001 martyn.a.roberts at bt.com wrote:
> Date: Tue, 6
2002 Feb 18
3
Problem with Sol8 and LDAP
Hi, i am experiencing a problem with ssh 3.0.2.p1 running on Solaris 2.8.
Everything works fine with local users (i.e. with local passwd and shadow
entries). With LDAP authenticated users, i obtain:
treno at tao[!] -> ssh -v
Segmentation Fault (core dumped)
The probem is the same with 2.x releases.
Thank you,
Roberto Bertucci
2001 Oct 08
1
FAQ 3.10
I'm having trouble getting any sort of work-around for 3.10 on Solaris 8
with Sun's tcsh. I've tried using "hup" to correct it but to no avail.
This problem wasn't present with ssh version 1 - it just seem to work.
Now we get all kinds of abandoned ssh processes lying around that have to
be manually killed. Does anyone know if there is going to be a fix for
this problem
2001 Oct 26
1
PAM session cleanup on Sol8 with v2.9.9p2
In do_pam_cleanup_proc(), there are 3 calls to PAM:
1) pam_close_session() - do lastlog stuff
2) pam_setcred(PAM_DELETE_CRED) - delete credentials
3) pam_end() - close PAM
It appears that pam_setcred() always fails with the error PAM_PERM_DENIED.
This is due to a check done pam_unix.so to not allow a caller with euid 0
to even try to delete their SECURE_RPC credentials. When sshd calls
2001 Oct 22
2
sshd dumps core in pam_sm_open_session
(I vaguely remember talk about PAM session stuff recently... please excuse
me if this is the same problem.)
I compiled v2.9.9p2 on Solaris 8 with the following configuration and the
Sun Workshop v5 compiler:
OpenSSH has been configured with the following options:
User binaries: /opt/openssh-2.9.9p2/bin
System binaries: /opt/openssh-2.9.9p2/sbin
2001 Oct 08
1
Hanging ssh session...
Hi All,
I am not sure if this is the same thing as the hang on exit bug, so sorry if
this is a duplication of previous stuff.
Essetntially I am experiencing ssh hangs with about .5% - 1% of my
connections. I am running 2.9p2, on Solaris 7. I actually have empirical
data on the hangings, as I wrote a script to create these connections
in an endless loop, setting an alarm so I could recover
2001 Oct 22
2
[Bug 3] sshd fails to close open file descriptors when forking
http://bugzilla.mindrot.org/show_bug.cgi?id=3
markus at openbsd.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |INVALID
------- Additional Comments From markus at openbsd.org 2001-10-23
2001 Nov 15
2
X11 cookies and forwarding
I'm guess I wasn't following the whole cookies discussion completely
(putting cookies in /tmp to avoid putting them on NFS, etc.), but I
noticed today that with 2.9.9p2, if I use "ssh -X" to start a shell on the
server, in that shell XAUTHORITY is set to /tmp/ssh-XXXXXXXX/cookies and
there are cookies placed there there. These are the "fake" cookies for
the
2001 Oct 19
1
TCP wrappers and 2.9.9p2
I don't know if this is still a problem in the latest snapshot, but with
2.9.9p2, if you do a "./configure ... --with-tcp-wrappers", there's no way
to specify a location for tcpd.h and libwrap.a. This is troublesome on
Solaris where you might install stuff like that in /opt/lib or
/usr/local/lib or something that is not searched by default.
Ed
Ed Phillips <ed at
2001 Oct 26
1
Makefiles in v2.9.9p2
If I change openbsd-compt/readpassphrase.c and type "make" from the
top-level, nothing happens. I have to remove
openbsd-compat/libopenbsd-compat.a to get "make" to do its thing.
Ed Phillips <ed at udel.edu> University of Delaware (302) 831-6082
Systems Programmer III, Network and Systems Services
finger -l ed at polycut.nss.udel.edu for PGP public key
2002 Apr 05
1
Quick question: /dev/random on Solaris 8
Can someone tell be briefly how to get OpenSSH3.1p1 configured and
compiled to use /dev/random? Can OpenSSH use /dev/random directly now?
Thanks,
Ed
Ed Phillips <ed at udel.edu> University of Delaware (302) 831-6082
Systems Programmer III, Network and Systems Services
finger -l ed at polycut.nss.udel.edu for PGP public key
2002 Jan 31
7
x509 for hostkeys.
This (very quick) patch allows you to connect with the commercial
ssh.com windows client and use x509 certs for hostkeys. You have
to import your CA cert (ca.crt) in the windows client and certify
your hostkey:
$ cat << 'EOF' > x509v3.cnf
CERTPATHLEN = 1
CERTUSAGE = digitalSignature,keyCertSign
CERTIP = 0.0.0.0
[x509v3_CA]
2005 Feb 07
1
treat output of sshrc as environment assignment lines?
Currently, ~/.ssh/environment can set static environment variables,
and ~/.ssh/rc can run initialization routines. But there is no way
for sshrc to propagate changes to the environment to the user's shell
or command.
There is, however, a possible way to do this. If the
PermitUserEnvironment option is set, sshd could treat the stdout of
sshrc as additional assignment lines of the form
2001 Oct 26
2
Expired passwords on Solaris with PAM
I've been doing so more tests with 2.9.9p2 on Sol8. Here are my
finding so far:
When a user needs to change his password and trys to run a command in
non-interactive mode, it just succeeds without even trying to prompt the
user for a new password. Damien submitted a fix - it works for me (is it
going into CVS?).
When a user needs to change his password and trys to login in interactive
2001 Oct 26
1
MAXHOSTNAMELEN and Solaris 2.5
Solaris 2.5 does not seem to define MAXHOSTNAMELEN, and a compilation
of vanilla OpenSSH 2.9.9p2 fails:
> gcc -g -O2 -Wall -Wpointer-arith -Wno-uninitialized -I. -I.
> -I/usr/local/ssl/include -I/usr/local/include
> -DETCDIR=\"/usr/local/etc\" -D_PATH_SSH_PROGRAM=\"/usr/local/bin/ssh\"
> -D_PATH_SSH_ASKPASS_DEFAULT=\"/usr/local/libexec/ssh-askpass\"
>
2002 Jun 25
1
/dev/urandom|random and Solaris
Hello,
Being new to the list i hope this question has not been asked before....
As you might know Solaris 9 supportes /dev/random and /dev/urandom bij
default and earlier version need to install a patch to have these
devices....
But the configuration script under Solaris (Sparc/X86) does not test the
existing of the devices... is this to be known as a error/bug? and is
there a patch?
thanks
--
2001 Nov 06
1
Solaris 7 changing password via PAM
Hi,
I am having a problem with the issue of changing the password for an expired
user (passed -f <user>).
The version of Openssh is 2.9.9p3 compiled with gcc 2.95.3, configured
--with-pam.
The user can login fine when the password is not expired. Once the password
is expired the user is connected and told the password has expired and is
asked to change it. The user is prompted for the old