Displaying 20 results from an estimated 5000 matches similar to: "OpenSSH 3.1 and OpenBSD 2.8 problem"
2002 Jun 20
0
[Bug 281] New: unable to authorize with local shadow password
http://bugzilla.mindrot.org/show_bug.cgi?id=281
Summary: unable to authorize with local shadow password
Product: Portable OpenSSH
Version: -current
Platform: MIPS
OS/Version: IRIX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
2002 Aug 19
0
kerberosIV authentication is broken in openssh-3.4p1
Hi,
I think kerberosIV authentication is broken in openssh-3.4p1 in ssh2
version protocol:
nmrindy$ klist
Ticket file: /tmp/tkt111_429097
Principal: mmokrejs at NATUR.CUNI.CZ
Issued Expires Principal
Aug 19 12:40:49 Aug 19 22:40:49 krbtgt.NATUR.CUNI.CZ at NATUR.CUNI.CZ
Aug 19 12:40:49 Aug 19 12:45:49 rcmd.nmrindy at NATUR.CUNI.CZ
Aug 19 12:40:49 Aug 19
2004 Aug 24
1
Possible problem with hostbased protocol 1 rhosts authentication
I found this problem when working with the Suse9.1 distribution, but have
since reproduced it with a vanilla build of Openssh
(openssh-3.9p1.tar.gz). Basically I cannot get a command like this:
XXXX>ssh -vvv -1 -o "RhostsAuthentication yes" AAAA
to work. Yes the appropriate settings are in the servers sshd_config file.
Hostbased protocol 1 ssh using rhosts between computers is
2005 May 18
0
Problems with RhostRSAAuthecntication and UsePrivilegeSeparation (RH9, 2.4.20-42.9.legacybigmem)
Hi,
for some days now I am/was fighting with an annoying problem. I have
to support an environment where RhostRSAAuthecntication via
/etc/ssh/sshd_known_hosts is used for password-less login.
This works fine with RH7.3 (and RH8) and openssh versions
openssh-3.1p1-3 (and openssh-3.4p1-2).
Our customer has now requested an upgrade to RH9. That comes with
openssh-3.5p-11 and the password-less
2002 Mar 20
0
[Bug 176] New: OpenSSH_3.1p1 gives X_ShmAttach error on forwarded X11 channel
http://bugzilla.mindrot.org/show_bug.cgi?id=176
Summary: OpenSSH_3.1p1 gives X_ShmAttach error on forwarded X11
channel
Product: Portable OpenSSH
Version: 3.1p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P3
Component: sshd
AssignedTo:
2003 Mar 21
5
[Bug 516] RhostsAuthentication failing under AIX 4.3.3
http://bugzilla.mindrot.org/show_bug.cgi?id=516
Summary: RhostsAuthentication failing under AIX 4.3.3
Product: Portable OpenSSH
Version: 3.5p1
Platform: PPC
OS/Version: AIX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy:
2002 Mar 12
1
Disconnecting: Corrupted check bytes on input.
Hi,
just "cvs update"'d to get the latest portable version, to start
rebuilding our AIX systems to get zlib-1.1.4 and the channel-bug fix.
SSH protocol 2 seems to work nicely, ssh protocol 1 doesn't work properly.
Environment: AIX 4.3.3, openssl 0.9.6c, openssh as of today (Mar 12, 11:20
GMT).
Client/blowfish, to openssh 3.0p1 or to 2.5.1p1:
debug1: Encryption type: blowfish
2002 Sep 10
8
[Bug 369] Inconsistant exiit status from scp
http://bugzilla.mindrot.org/show_bug.cgi?id=369
------- Additional Comments From devel at pitux.com 2002-09-10 19:19 -------
I confirm that this bug does exist. It's especially annoying since we use here
a lot of scripts which check for the return values of scp to indicate success
or failure.
In fact it does the good thing on nonexistent files/dirs/etc, but fails in case
of auth
2002 Jul 08
0
[Bug 342] New: RhostsRSAAuthentication does not work with 3.4p1
http://bugzilla.mindrot.org/show_bug.cgi?id=342
Summary: RhostsRSAAuthentication does not work with 3.4p1
Product: Portable OpenSSH
Version: -current
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: openssh-unix-dev at mindrot.org
2002 Jul 17
1
[Bug 357] New: SSH does not handle "Protocol" option in ~/.ssh/options properly
http://bugzilla.mindrot.org/show_bug.cgi?id=357
Summary: SSH does not handle "Protocol" option in ~/.ssh/options
properly
Product: Portable OpenSSH
Version: -current
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo:
2002 Mar 22
0
[Bug 179] New: sshd sends channel data after sending EOF
http://bugzilla.mindrot.org/show_bug.cgi?id=179
Summary: sshd sends channel data after sending EOF
Product: Portable OpenSSH
Version: 3.1p1
Platform: ix86
URL: http://www.denisbider.com
OS/Version: Linux
Status: NEW
Severity: major
Priority: P2
Component: sshd
AssignedTo:
2002 Mar 07
0
[Bug 142] New: OpenSSH 3.1 with patch will not build on OpenBSD 2.8
http://bugzilla.mindrot.org/show_bug.cgi?id=142
Summary: OpenSSH 3.1 with patch will not build on OpenBSD 2.8
Product: Portable OpenSSH
Version: -current
Platform: ix86
OS/Version: OpenBSD
Status: NEW
Severity: critical
Priority: P2
Component: Build system
AssignedTo: openssh-unix-dev at
2004 May 03
1
rsync error: error in rsync protocol data stream (code 12) at io.c(189)
Rsync Issue Solaris8
When performing a simple rsync between servers I was getting the
following error:
root:#> rsync -e ssh -va /export/home/a078479/bob
smmk39:/export/home/a078479/
ksh: rsync: not found
rsync: connection unexpectedly closed (0 bytes read so far)
rsync error: error in rsync protocol data stream (code 12) at io.c(189)
root:#>
I was thorghrough in setting up rsync to be
2005 Jun 02
1
FW: openssh 4.0 - sftp batch mode behavior
Hello,
I just installed the openssh 4.0 for Solaris. The users have reported a
difference in behavior when using the batch mode of sftp client.
Previously they could issue the following command sftp -b batchfile
user at hostname and in the absence of publickey authentication they would
be issued the password prompt and they could enter password and the
process would continue.
After upgrading from
2012 Nov 13
1
problem with AuthorizedKeysCommand on OpenBSD
Hi,
I'm attempting to test the AuthorizedKeysCommand feature with the new
port of ssh-ldap-wrapper to OpenBSD. I'm running yesterday's
OpenBSD-current i386 snapshot, which includes AuthorizedKeysCommand.
The port of ssh-ldap-helper (at
http://old.nabble.com/-new--ssh-ldap-helper-td34667413.html) contains
all the bits I need, and the individual pieces appear to work once
configured:
2002 Oct 16
3
ssh-3.5p1 core dumps on Solaris 2.6
Hi,
I've reported this problem a month ago on this list, and probably no-one
is interested? Binaries were configured with krb4 and afs enabled.
However, only the second crash seems to be related to krb4.
Any thoughts?
I had to add one line to includes.h:
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/ioctl.h>
+#include <sys/ioccom.h>
#include
2008 Jun 12
2
FIPS mode OpenSSH suggestion
Hi OpenSSH team,
I find a url http://www.gossamer-threads.com/lists/openssh/dev/42808?do=post_view_threaded#42808, which provides unofficial patch for FIPS Capable OpenSSH. I try it and it seems working for some cases.
(BTW, I also find that aes128-ctr, aes192-ctr and aes256-ctr ciphers can't work in FIPS mode properly.
The fips mode sshd debug info is as following.
2019 Feb 26
1
AD-DC Bind: TKEY is unacceptable
I'm having trouble with nsupdates. I'm getting TKEY is unacceptable.
I'm using Fedora 29, with its packages:
[root at dc2 kwhite]# rpm -qa | grep samba
samba-4.9.4-1.fc29.x86_64
samba-dc-bind-dlz-4.9.4-1.fc29.x86_64
samba-common-4.9.4-1.fc29.noarch
samba-libs-4.9.4-1.fc29.x86_64
samba-dc-libs-4.9.4-1.fc29.x86_64
samba-winbind-4.9.4-1.fc29.x86_64
samba-common-libs-4.9.4-1.fc29.x86_64
2008 Jun 19
0
Is there any plan for OpenSSH to support FIPS?
Hi OpenSSh Developer,
Currently, I can make openssh-5.0p1 working in FIPS mode. The detail steps I did are as follows.
1) Build FIPS OpenSSL according to FIPS User Guide(http://www.openssl.org/docs/fips/) on HP-UX PA 11.23 box.
FIPS object module is generated by compiling openssl-fips-1.1.2.
FIPS OpenSSL is built by openssl-0.9.7m, which is passed fips option for Configure step.
2) Modify
2002 Jul 04
4
With bounds checking patch for gcc-3.1 problems if using AES
Hello developers,
some informations before I come to the problem:
At work we're using Open-SSH 3.4p1 under Solaris 8. I compiled the
Open-SSH by myself with gcc-3.1. In the gcc is the bounds checking patch
included
(http://web.inter.nl.net/hcc/Haj.Ten.Brugge/bounds-checking-gcc-3.1-1.01.patch.bz2).
With this patch I compiled:
- prngd 0.9.25
- zlib 1.1.4
- Open-SSL 0.9.6d
Everything