Displaying 20 results from an estimated 300 matches similar to: "Updated chroot patch"
2001 Aug 21
2
OpenSSH 2.9p2 / SSH3 vulnerability?
I have a few questions:
1) Is OpenSSH 2.9p2 (or any other version of OpenSSH) vulnerable to the same problem as SSH3.0.0?
(described here:
http://www.kb.cert.org/vuls/id/737451 )
2) There is a "SECURID" patch in the contrib section since 2.5.2p2. I am using it, but applying this
patch to each new version is growing more difficult as time goes on. Would you consider merging this
2001 Jan 03
1
chroot.diff
Hi there, everyone;
I've had a few requests for an updated version of my chroot patch. (the
version found in contrib is outdated)
So, here it goes, updated to 2.3.0p1; "chroot.diff" is a plain diff for
session.c (apply, compile and go). "chroot+configure.diff" is the same
patch, plus an option to "configure" for enabling/disabling chroot support
(./configure
2003 Dec 26
1
[Bug 779] Chroot environment for sftp client crazy
http://bugzilla.mindrot.org/show_bug.cgi?id=779
Summary: Chroot environment for sftp client crazy
Product: Portable OpenSSH
Version: 3.7.1p2
Platform: Other
URL: http://aixpanish.com
OS/Version: AIX
Status: NEW
Severity: normal
Priority: P2
Component: sftp-server
AssignedTo:
2001 Dec 18
1
chroot howto for sftp-server
Using OpenSSH SFTP with chroot
==============================
Several people have been asking now for some kind of documentation on how to
use the chroot-patch for the sftp-server. So here it comes. I hope nobody minds
that i post this in the developer list.
The patch has been provided to the list some time ago. I'm sorry not giving
credit to the author, but I really don't know who
2001 Jul 20
0
Updated chroot patch
This is the patch part of contrib/chroot.diff updated to be appliable
against openssh-2.9p2. Tested on FreeBSD (various 3.x and 4.x) without
PAM or UseLogin.
Also, as part of deployment (replacing emergency-withdrawal of Telnet
access) I've chosen to get sftp on the relevant boxes. The deployment
had a scriptlet doing the config/make/etc and after the "make install"
would change
2000 Dec 22
3
SecurID patch.
What are the chances of getting the SecurID patch integrated into OpenSSH? I
think I asked before and was told that it could be done with PAM, but I (and
others) are not satisfied with the PAM support.
This "tight" integration seems to work much better.
If not, I'll just sit on my rogue patches :-(
--
Theo Schlossnagle
1024D/A8EBCF8F/13BD 8C08 6BE2 629A 527E 2DC2 72C2 AD05 A8EB
2001 Apr 22
1
relaxing access rights verifications
Hello,
I was trying to build a chrooted sftp account when I faced a problem. The
chroot is done with the patch present in the contrib subdirectory in the
portable version (I'm under linux slackware current).
My problem is that verifying access rights on directories and files are too
tight and then I couldn't have the following things :
The user sftp, with primary group sftp, is chrooted
2000 Nov 16
2
OpenSSH-2.2.0p1 + SecurID.
Hello Theo,
> > > Could you let me know where this test patch would be available.
> >
> > Try:
> > http://www.omniti.com/~jesus/SecurID/
> >
> > --
Regarding your patch, did you continue the integration (mainly: Handle PIN
creation and changing ...)?
Do you foreseen to transport it in new release 2.3.0p1?
Kind regards,
Joel
2001 Mar 19
4
SecurID
When comparing SSH 1.2.27 with OpenSSH 2.5.1 I see that the SecurID
code/patch is not in OpenSSH 2.5.1.
I'm not sure how or why that happened.
Upon looking through the OpenSSH 2.5.1 source, I think I could fairly
easily provide a 'SecurID Authentication Method' patch (which would
rely on -DHAVE_SECURID, -I/blah/securid/include, and
-L/blah/securid/lib... /blah/securid being a
2002 Jul 02
0
OpenSSH 3.4p1 and SecurID
I have received many queries as to the status of the SecurID patch for
openssh 3.4. I finally found some time in my schedule to port and test.
The integrated SecurID patches for OpenSSH version 3.4p1 are now
available at the same old place:
http://www.omniti.com/~jesus/projects/
The porting effort included moving all auth code to the new privilege
separation model. Enjoy.
--
Theo
2000 Aug 26
0
New chroot patch, for 2.1.1p4
Hi there, everybody;
As promised, here's the new version for my chroot patch.
It applies cleanly over OpenSSH 2.1.1p4, and I'm attaching 2 versions:
- openssh-2.1.1p4-chroot.patch-wc, is the chroot patch plus
a "--with-chroot" patch for the "configure" script.
- openssh-2.1.1p4-chroot.patch, is the same without the
"--with-chroot" part.
Have fun,
2001 Apr 20
2
scp with files > 2gb
A while back someone posted a patch for scp that updates it to deal with
files > 2gb by using 64 bit offsets as defined by LFS (Large File Sumit).
I belive the patch was tested on Linux but maybe not on other systems
that support largefiles.
I've tried this under Solaris and scp fails with a broken pipe on only the
second write to the pipe between scp and ssh if the file is over 2gb.
If
2000 Sep 21
1
OpenSSH-2.2.0p1 + SecurID.
Hello all,
I looked long and hard for SecurID support for OpenSSH and I have not found
it. So, I spent a few hours today and added SecurID authentication support
into OpenSSH. Specifically the 2.2.0p1 portability release. I have beat on
it for several hours and it seems to work just fine.
I don't know if anyone would find these patches useful or not... I also don't
know if the
2000 Oct 04
0
2.2.0p1 chroot patch
Hi there, everyone;
Attached to this mail is the 2.2.0p1 version of my chroot patch.
For those of you interested, my usual warning: This is NOT plug&pray.
You'll have to build a whole binaries/libs/conf files tree within the new
root. (it's just like the "classic" anonymous ftp behaviour)
Configure with "configure --with-chroot" to use.
Regards;
RC
--
2007 Aug 02
1
Chmod Explaination
Howdy list,
I can't seem to find any doc's explaining what's really going on behind
this scenario:
A user home directory had been reset to :
d--- --- --- user group user_dir
As root i tried to :
chmod -R 750 user_dir
got permission denied, my friend tried with as user that owns the directory
to:
chmod -R 750 user_dir and voila it works.
My question is how come did it work,
2001 May 24
1
chroot sftp-server [PATCH]
I'm working on setting up a semi-trusted sftp service, and to get it
working, I need chroot capability.
I've taken the /./ wuftpd magic token code from contrib/chroot.diff and
put it into the sftp server. The main problem is that privileges have
been dropped by the time the subsystem is exec'ed, so my patch requires
that sftp-server be setuid root. Not ideal, I know, but I drop all
2010 Oct 30
0
[PATCH] Use ERR_CAST inlined function instead of ERR_PTR(PTR_ERR(...)) - generated by Coccinelle
This patch was generated using the Coccinelle scripts and btrfs
code in v2.6.36-9657-g7a3f8fe.
Use ERR_CAST inlined function instead of ERR_PTR(PTR_ERR(...))
The semantic patch that makes this change is available
in scripts/coccinelle/api/err_cast.cocci.
More information about semantic patching is available at
http://coccinelle.lip6.fr/
Signed-off-by: Chris Samuel
2009 May 12
0
[PATCH 1/2] btrfs-progs: mixed back ref support
This patch adds mixed back ref support for btrfs programs.
The mixed back ref is a new disk format. back compatilibity
is still not implemented. To try the new disk format, you
need fresh formatted btrfs.
Signed-off-by: Yan Zheng <zheng.yan@oracle.com>
---
diff -urp btrfs-progs-unstable/crc32c.h btrfs-progs-2/crc32c.h
--- btrfs-progs-unstable/crc32c.h 2008-09-30 16:50:58.898877720 +0800
2011 Apr 06
3
[PATCH V2] Btrfs: fix subvolume mount by name problem when default mount subvolume is set
We create two subvolumes (meego_root and meego_home) in
btrfs root directory. And set meego_root as default mount
subvolume. After we remount btrfs, meego_root is mounted
to top directory by default. Then when we try to mount
meego_home (subvol=meego_home) to a subdirectory, it failed.
The problem is when default mount subvolume is set to
meego_root, we search meego_home in meego_root but can not
2012 Feb 10
0
[PATCH] btrfs: honor umask when creating subvol root
Set the subvol root inode permissions based on the current umask.
---
fs/btrfs/inode.c | 6 ++++--
1 files changed, 4 insertions(+), 2 deletions(-)
diff --git a/fs/btrfs/inode.c b/fs/btrfs/inode.c
index 32214fe..b88e71a 100644
--- a/fs/btrfs/inode.c
+++ b/fs/btrfs/inode.c
@@ -6696,8 +6696,10 @@ int btrfs_create_subvol_root(struct btrfs_trans_handle *trans,
int err;
u64 index = 0;
-