Displaying 20 results from an estimated 300 matches similar to: "Unable to compile latest release on Linux"
2002 Mar 08
0
FW: Unable to compile latest release on Linux
-----Original Message-----
From: Ovanes Manucharyan
Sent: Thursday, March 07, 2002 3:34 PM
To: 'openssh at openssh.com'
Subject: Unable to compile latest release on Linux
Hello,
I tried to compile the latest portable version (openssh-3.1p1)
to no avail.
I tried 2 different configuration combinations with the same
problem.
./configure --with-pam --with-tcp-wrappers
2002 Mar 07
1
OpenSSH Security Advisory (adv.channelalloc)
1. Systems affected:
All versions of OpenSSH between 2.0 and 3.0.2 contain
an off-by-one error in the channel code.
OpenSSH 3.1 and later are not affected.
2. Impact:
This bug can be exploited locally by an authenticated user
logging into a vulnerable OpenSSH server or by a malicious
SSH server attacking a vulnerable OpenSSH client.
3. Solution:
Upgrade to
2002 Mar 07
1
OpenSSH Security Advisory (adv.channelalloc)
1. Systems affected:
All versions of OpenSSH between 2.0 and 3.0.2 contain
an off-by-one error in the channel code.
OpenSSH 3.1 and later are not affected.
2. Impact:
This bug can be exploited locally by an authenticated user
logging into a vulnerable OpenSSH server or by a malicious
SSH server attacking a vulnerable OpenSSH client.
3. Solution:
Upgrade to
2014 Dec 30
2
CVE-2002-0083 - whats the problem? beginners question
Hi,
I'm not a programmer nor able to fully understand the code of openssh in detail - hence my question here.
Out of curiosity I was looking at the patch for CVE-2002-0083 and tried to understand what the actual problem is, but failed:
--- channels_old.c?? ?Mon Mar? 4 02:07:06 2002
+++ channels.c?? ?Mon Mar? 4 02:07:16 2002
@@ -151,7 +151,7 @@
?channel_lookup(int id)
?{
??? ?Channel *c;
-??
2003 Sep 16
1
[alambert@quickfire.org: Heads up -- potential problems in 3.7, too? [Fwd: OpenSSH Security Advisory: buffer.adv]]
Is anybody aware of this?
-hc
----- Forwarded message from Alex Lambert <alambert@quickfire.org> -----
3.7.1 was just released.
Two patches for similar issues in a very short timeframe. Who do they
think they are -- Microsoft? <grin>
apl
-------- Original Message --------
Subject: OpenSSH Security Advisory: buffer.adv
Date: Wed, 17 Sep 2003 01:13:30 +0200
From: Markus Friedl
2001 Feb 10
3
Protocol 2 remote forwarding patch
Hi all,
I'm very new in this list, as looking for codes to plug up the lack of
functionality of "Protocol 2 Remote Forwardig".
Fortunately, I could find it in MARC's archive. Mr. Jarno Huuskonen
posted the codes in Sept, last year, and I tried applying it to my
FreeBSD box environment.
I couldn't apply an original patch, of course, for incompatibility of
virsion. The
2002 Mar 07
1
OpenSSH Security Advisory (adv.channelalloc) (fwd)
whoops, not announce.
--
Pekka Savola "Tell me of difficulties surmounted,
Netcore Oy not those you stumble over and fall"
Systems. Networks. Security. -- Robert Jordan: A Crown of Swords
---------- Forwarded message ----------
Date: Thu, 7 Mar 2002 16:59:38 +0200 (EET)
From: Pekka Savola <pekkas at netcore.fi>
To: Markus Friedl <markus at
2000 Aug 23
1
Protocol 2 remote forwarding patch
Hi !
Here's a patch to add remote port forwarding support (protocol 2) for
openssh. I have tried to test that it works like it should but a more
thorough testing is needed. This patch adds both client/server support.
The patch should be applied to openssh-2.1.1p4 source tree.
Also included is a PortForwarding sshd_config option, new ./configure
option --disable-forwarding that should make it
2013 May 15
1
[PATCH] Expose remote forwarding ports as environment variable
Good evening gentlemen,
the attached patch against openssh 6.2p1 exposes remote
forwarding ports to the remote shell:
targethost % ssh -R 1234:localhost:22 controlhost
controlhost % echo $SSH_REMOTE_FORWARDING_PORTS
1234
targethost % ssh -R 0:localhost:22 controlhost
controlhost % echo $SSH_REMOTE_FORWARDING_PORTS
54294
targethost % ssh -R 0:localhost:22 -R
2003 Jun 23
0
Budgetone + remote call pickup
Hi.
I've found a problem when I pickup a remote sip phone with *8.
There're both budgetones 102 and are both in the same group.
When one sip phone is ringing, I can pickup the call from
another sip phone, but the first one keeps playing a loud
busy signal... that don't go away until I receive another call
or go off hook and then on hook on the first phone.
I think that could be a
2001 Oct 08
1
FAQ 3.10
I'm having trouble getting any sort of work-around for 3.10 on Solaris 8
with Sun's tcsh. I've tried using "hup" to correct it but to no avail.
This problem wasn't present with ssh version 1 - it just seem to work.
Now we get all kinds of abandoned ssh processes lying around that have to
be manually killed. Does anyone know if there is going to be a fix for
this problem
2013 Aug 05
2
RemoteForward and dynamically allocated listen port
Specifying a RemoteForward of 0:example.com:1234 dynamically allocates
the listen port on the server, and then reports it to ... the client!
Where it is practically useless. Was this someone's idea of a joke?
Presumably not--there are some technical obstacles to reporting it to
the remote process. I'd like to help solve that problem.
The natural way to me would be to extend the syntax
2002 Feb 04
1
forkoff()
Please review the function below, forkoff(), meant to be used in
clientloop.c instead of daemon() and the code in process_escapes().
The intention is to make ~D ( like ~& but also detach) possible and to
make it possible for ssh -f (or ssh -f -f - see other thread on this)
to detach, not just forkoff().
I also intend to use the same detach technique in a feature patch for
the hang-on-exit
2011 Aug 17
1
openssh-unix-dev Digest, Vol 100, Issue 3
Works on my netbsd tinkerbox.
NetBSD 5.0.2 NetBSD 5.0.2 (GENERIC)
It uses rlimit.
Privsep sandbox style: rlimit
I also get warnings during make.
fmt_scaled.c: In function 'scan_scaled':
fmt_scaled.c:84: warning: array subscript has type 'char'
fmt_scaled.c:111: warning: array subscript has type 'char'
fmt_scaled.c:155: warning: array subscript has type 'char'
2023 Nov 08
2
Delay in starting programs on FreeBSD via ssh after upgrade OpenBSD from 7.3 to 7.4
On Wed, 8 Nov 2023, Roger Marsh wrote:
> Damien,
>
> Sorry about distributed context.
>
> Those discussions told me about the new ObscureKeystrokeTiming
> argument to the ssh command. One reply suggested I try that because it
> is easy to test.
>
> Most of my xterm ssh command combinations in fvwm configuration file
> are expressed 'Exec exec xterm -title ... -e
2000 Aug 13
1
Patches for openssh port forwarding
Hi !
I hacked together a couple of patches for Openssh 2.1.1p4 port forwarding.
It is a one patch file that does the following two things:
First:
If the server is configured not to allow port forwardings it sends
SSH_SMSG_FAILURE (protocol 1) while openssh client expects SSH_SMSG_SUCCESS.
When the client gets the failure it exists with protocol error message.
This patch will accept both failure
2002 Feb 01
1
FEATURE: -f -f - fork after successful open of fwd port/display/agent
Background
==========
"ssh -f ..." causes ssh to fork into the background when userauth
successfully completes.
WHAT
===
With this patch "ssh -f -f ..." causes ssh to fork into the background
when the first forwarded port/x11 display/agent is successfully opened.
WHY
===
This feature makes launching remote X11 apps more reliable: when ssh
exits it must have exited because
2000 Aug 15
0
Experimental -R support patch for openssh client
Hi !
Here's an experimental patch for openssh-2.1.1p4 to add support
(to openssh client) for -R (protocol 2).
So if you have access to a commercial ssh2 server (that allows port
forwardings) could you test this patch.
(Note the openssh server doesn't have support for -R with protocol 2 so
testing with openssh server won't do much good).
To test remember to use -o "Protocol
2002 Feb 05
0
New forkoff() and chan_wont_read/write() API
Markus,
How's this patch?
- a chan_wont_read()/chan_wont_write() API is added that is very much
like chan_read_failed()/chan_write_failed(), but for the debug
messages and chan_wont_*() don't ever call error()
The 3.0.2p1 channel_pre_x11_open() uses chan_*_failed() but looks
like it ought to use chan_wont_*() instead :)
- forkoff() no longer fakes EOF for SSHv2 (still
2003 Sep 16
1
OpenSSH Security Advisory: buffer.adv
This is the 1st revision of the Advisory.
This document can be found at: http://www.openssh.com/txt/buffer.adv
1. Versions affected:
All versions of OpenSSH's sshd prior to 3.7 contain a buffer
management error. It is uncertain whether this error is
potentially exploitable, however, we prefer to see bugs
fixed proactively.
2. Solution:
Upgrade to OpenSSH