Displaying 20 results from an estimated 4000 matches similar to: "OpenSSH 3.1 and OpenBSD 2.8 problem"
2002 Jun 20
0
[Bug 281] New: unable to authorize with local shadow password
http://bugzilla.mindrot.org/show_bug.cgi?id=281
Summary: unable to authorize with local shadow password
Product: Portable OpenSSH
Version: -current
Platform: MIPS
OS/Version: IRIX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
2002 Aug 19
0
kerberosIV authentication is broken in openssh-3.4p1
Hi,
I think kerberosIV authentication is broken in openssh-3.4p1 in ssh2
version protocol:
nmrindy$ klist
Ticket file: /tmp/tkt111_429097
Principal: mmokrejs at NATUR.CUNI.CZ
Issued Expires Principal
Aug 19 12:40:49 Aug 19 22:40:49 krbtgt.NATUR.CUNI.CZ at NATUR.CUNI.CZ
Aug 19 12:40:49 Aug 19 12:45:49 rcmd.nmrindy at NATUR.CUNI.CZ
Aug 19 12:40:49 Aug 19
2002 Mar 07
0
[Bug 142] New: OpenSSH 3.1 with patch will not build on OpenBSD 2.8
http://bugzilla.mindrot.org/show_bug.cgi?id=142
Summary: OpenSSH 3.1 with patch will not build on OpenBSD 2.8
Product: Portable OpenSSH
Version: -current
Platform: ix86
OS/Version: OpenBSD
Status: NEW
Severity: critical
Priority: P2
Component: Build system
AssignedTo: openssh-unix-dev at
2004 Aug 24
1
Possible problem with hostbased protocol 1 rhosts authentication
I found this problem when working with the Suse9.1 distribution, but have
since reproduced it with a vanilla build of Openssh
(openssh-3.9p1.tar.gz). Basically I cannot get a command like this:
XXXX>ssh -vvv -1 -o "RhostsAuthentication yes" AAAA
to work. Yes the appropriate settings are in the servers sshd_config file.
Hostbased protocol 1 ssh using rhosts between computers is
2005 May 18
0
Problems with RhostRSAAuthecntication and UsePrivilegeSeparation (RH9, 2.4.20-42.9.legacybigmem)
Hi,
for some days now I am/was fighting with an annoying problem. I have
to support an environment where RhostRSAAuthecntication via
/etc/ssh/sshd_known_hosts is used for password-less login.
This works fine with RH7.3 (and RH8) and openssh versions
openssh-3.1p1-3 (and openssh-3.4p1-2).
Our customer has now requested an upgrade to RH9. That comes with
openssh-3.5p-11 and the password-less
2002 Mar 20
0
[Bug 176] New: OpenSSH_3.1p1 gives X_ShmAttach error on forwarded X11 channel
http://bugzilla.mindrot.org/show_bug.cgi?id=176
Summary: OpenSSH_3.1p1 gives X_ShmAttach error on forwarded X11
channel
Product: Portable OpenSSH
Version: 3.1p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P3
Component: sshd
AssignedTo:
2003 Mar 21
5
[Bug 516] RhostsAuthentication failing under AIX 4.3.3
http://bugzilla.mindrot.org/show_bug.cgi?id=516
Summary: RhostsAuthentication failing under AIX 4.3.3
Product: Portable OpenSSH
Version: 3.5p1
Platform: PPC
OS/Version: AIX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy:
2019 Feb 26
1
AD-DC Bind: TKEY is unacceptable
I'm having trouble with nsupdates. I'm getting TKEY is unacceptable.
I'm using Fedora 29, with its packages:
[root at dc2 kwhite]# rpm -qa | grep samba
samba-4.9.4-1.fc29.x86_64
samba-dc-bind-dlz-4.9.4-1.fc29.x86_64
samba-common-4.9.4-1.fc29.noarch
samba-libs-4.9.4-1.fc29.x86_64
samba-dc-libs-4.9.4-1.fc29.x86_64
samba-winbind-4.9.4-1.fc29.x86_64
samba-common-libs-4.9.4-1.fc29.x86_64
2002 Mar 12
1
Disconnecting: Corrupted check bytes on input.
Hi,
just "cvs update"'d to get the latest portable version, to start
rebuilding our AIX systems to get zlib-1.1.4 and the channel-bug fix.
SSH protocol 2 seems to work nicely, ssh protocol 1 doesn't work properly.
Environment: AIX 4.3.3, openssl 0.9.6c, openssh as of today (Mar 12, 11:20
GMT).
Client/blowfish, to openssh 3.0p1 or to 2.5.1p1:
debug1: Encryption type: blowfish
2002 Jul 08
0
[Bug 342] New: RhostsRSAAuthentication does not work with 3.4p1
http://bugzilla.mindrot.org/show_bug.cgi?id=342
Summary: RhostsRSAAuthentication does not work with 3.4p1
Product: Portable OpenSSH
Version: -current
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: openssh-unix-dev at mindrot.org
2002 Sep 10
8
[Bug 369] Inconsistant exiit status from scp
http://bugzilla.mindrot.org/show_bug.cgi?id=369
------- Additional Comments From devel at pitux.com 2002-09-10 19:19 -------
I confirm that this bug does exist. It's especially annoying since we use here
a lot of scripts which check for the return values of scp to indicate success
or failure.
In fact it does the good thing on nonexistent files/dirs/etc, but fails in case
of auth
2002 Jul 17
1
[Bug 357] New: SSH does not handle "Protocol" option in ~/.ssh/options properly
http://bugzilla.mindrot.org/show_bug.cgi?id=357
Summary: SSH does not handle "Protocol" option in ~/.ssh/options
properly
Product: Portable OpenSSH
Version: -current
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo:
2002 Mar 22
0
[Bug 179] New: sshd sends channel data after sending EOF
http://bugzilla.mindrot.org/show_bug.cgi?id=179
Summary: sshd sends channel data after sending EOF
Product: Portable OpenSSH
Version: 3.1p1
Platform: ix86
URL: http://www.denisbider.com
OS/Version: Linux
Status: NEW
Severity: major
Priority: P2
Component: sshd
AssignedTo:
2002 Oct 16
3
ssh-3.5p1 core dumps on Solaris 2.6
Hi,
I've reported this problem a month ago on this list, and probably no-one
is interested? Binaries were configured with krb4 and afs enabled.
However, only the second crash seems to be related to krb4.
Any thoughts?
I had to add one line to includes.h:
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/ioctl.h>
+#include <sys/ioccom.h>
#include
2004 May 03
1
rsync error: error in rsync protocol data stream (code 12) at io.c(189)
Rsync Issue Solaris8
When performing a simple rsync between servers I was getting the
following error:
root:#> rsync -e ssh -va /export/home/a078479/bob
smmk39:/export/home/a078479/
ksh: rsync: not found
rsync: connection unexpectedly closed (0 bytes read so far)
rsync error: error in rsync protocol data stream (code 12) at io.c(189)
root:#>
I was thorghrough in setting up rsync to be
2002 Jul 12
0
Client connection problem
I've been banging my head on this for two days now !
Everything checks out cool on the server, however I can't get the client to
connect. I've gone through a number of troubleshooting docs and all lead
me to suspect the hosts allow entry, however, even if I allow everyone on
the network, I still get the below error msgs.
Server: scooby - FreeBSD 4.5 running Samba 2.2.2
Client :
2005 Jun 02
1
FW: openssh 4.0 - sftp batch mode behavior
Hello,
I just installed the openssh 4.0 for Solaris. The users have reported a
difference in behavior when using the batch mode of sftp client.
Previously they could issue the following command sftp -b batchfile
user at hostname and in the absence of publickey authentication they would
be issued the password prompt and they could enter password and the
process would continue.
After upgrading from
2012 Nov 13
1
problem with AuthorizedKeysCommand on OpenBSD
Hi,
I'm attempting to test the AuthorizedKeysCommand feature with the new
port of ssh-ldap-wrapper to OpenBSD. I'm running yesterday's
OpenBSD-current i386 snapshot, which includes AuthorizedKeysCommand.
The port of ssh-ldap-helper (at
http://old.nabble.com/-new--ssh-ldap-helper-td34667413.html) contains
all the bits I need, and the individual pieces appear to work once
configured:
2002 Jul 08
0
"Help with EVP_CipherInit"
Hello,
I am working on a bounds checking gcc(based on Richard Jones work)
with a low enough overhead that will make it acceptable in production code.
And i obtained openssh-3.2.2p1 with the view of testing the effectiveness
of my code detecting the recently reported vunerability,but my code fails
on with an error report of a use of memcpy with overlapping source and
destination regions. I have
2008 Jun 12
2
FIPS mode OpenSSH suggestion
Hi OpenSSH team,
I find a url http://www.gossamer-threads.com/lists/openssh/dev/42808?do=post_view_threaded#42808, which provides unofficial patch for FIPS Capable OpenSSH. I try it and it seems working for some cases.
(BTW, I also find that aes128-ctr, aes192-ctr and aes256-ctr ciphers can't work in FIPS mode properly.
The fips mode sshd debug info is as following.