Displaying 20 results from an estimated 10000 matches similar to: "[Bug 208] SCO build/runtime fixes"
2002 Mar 07
1
SCO 3 / CVS version
Hi,
just to give you a quick "success" note: current portable CVS snapshot
builds mostly fine on SCO3. The only remaining problem is truncate() in
sftp-server.c - SCO3 can replace ftruncate() with chsize() (detected by
configure and works), but has no truncate() equivalent.
Run-time testing tomorrow, but I do not expect nasty surprises.
gert
--
USENET is *not* the non-clickable
2016 Mar 08
2
Need Help to Fix CVE-2008-1483, CVE-2008-5161, CVE-2015-5600 and CVE-2015-6565
Hi Gert,
Thanks for your reply.
But we can't upgrade to 7.2 version also we don't have plan to upgrade in
near future. Can I fix these vulnerabilities in the current version?
Regards
Abhishek
On Tue, Mar 8, 2016 at 6:42 PM, Gert Doering <gert at greenie.muc.de> wrote:
> Hi,
>
> On Tue, Mar 08, 2016 at 06:14:01PM +0530, abhi dhiman wrote:
> > Actually I am working
2001 Feb 22
11
Lets try this push again.. 2.5.1p2 bugs left.
Things that are still outstanding:
1) Solaris/Redhat/HPUX session.c patch. I've not seen a ya or na on
Kevin's pam patch from the Solaris group.
2) Odd Redhat/Debian scp/ssh issues. .. I'm baffled, and I can't
replicate the bug. Nor have I seen anything remotely like it reported.
3) SCO.. Is it happy yet for compiling? =)
Completed:
1) mdoc2man.pl .. Commited into
2000 Dec 18
3
SCO remove() and unlink()
There was a patch merged in on 9/29 that changed remove() calls to
unlink():
- (djm) Merged big SCO portability patch from Tim Rice
<tim at multitalents.net>
Does SCO's libc not include remove()? Note that sftp-server.c is
currently using remove. The reason I ask is I'd like to keep the
portable tree as close to openbsd as possible, and if we need remove()
for SCO we should
2002 Apr 02
3
PrivSep and portability
Hi,
I've seen a few patches related to the PrivSep works. As far as I can
see, it seems to work by using a shared memory segment to communicate.
I just want to point out that there are some unix systems that do not
have mmap() (SCO, older SVR3 systems) or that might have problems with
anonymous shared mmap() (don't have an examples, but e.g. the INN docs
are full of warnings concerning
2000 Dec 22
1
bug in sshd.d (destroy_sensitive_data core dumps)
Hi,
experimenting with openssh_cvs on my SCO Unix 3.2v4.2 machine, I had
sshd core dumping on me.
Tracking this, I found that if a host key is specified in the sshd_config
that does not exist (I used "./sshd -d -d -d -f sshd_config" with the
shipped sshd_config file, to work around incompatibilities with the
installed sshd.com's sshd_config, and I do not have ssh2 host keys on
2017 Oct 17
2
Status of OpenSSL 1.1 support
Hi,
On Tue, Oct 17, 2017 at 05:54:52AM -0600, The Doctor wrote:
> The best solution is if (LIBRESSL) || (OPENSSL < 1010...)
>
> Else
>
> Whatever.
>
> Is that too much work?
Littering code with #ifdef is almost never a good idea.
gert
--
USENET is *not* the non-clickable part of WWW!
//www.muc.de/~gert/
Gert
2001 Nov 09
1
socklen_t - where?
Hi,
openssh_cvs as of today, SCO Open Server 3.0, socklen_t
this typedef doesn't exist on SCO OSR 3, and "configure" properly detects
this, leading to
/* #undef HAVE_SOCKLEN_T */
in config.h.
Problem: I can't find any place where this is actually being used? I'd
expect something like
#ifndef HAVE_SOCKLEN_T
typdef int socklen_t;
#endif
("int" is what the
2002 Apr 07
0
[Bug 208] New: SCO build/runtime fixes
http://bugzilla.mindrot.org/show_bug.cgi?id=208
Summary: SCO build/runtime fixes
Product: Portable OpenSSH
Version: -current
Platform: ix86
OS/Version: other
Status: NEW
Severity: normal
Priority: P2
Component: Build system
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: gert at
2002 Feb 11
3
OpenSHH on SCO Open Server 3
Is anyone still using OpenSSH on SCO Open Server 3?
My clients no longer run Open Server 3.
The entropy gathering code changes have broken the Open Server 3 build.
If there is still interest I'll work on it.
If not, I have no need for it.
--
Tim Rice Multitalents (707) 887-1469
tim at multitalents.net
2016 Feb 17
5
Using 'ForceCommand' Option
Gert,
Thank you for the feedback. Can you give any further direction on where to
get more information on what you are describing?
On Wed, Feb 17, 2016 at 3:17 PM, Gert Doering <gert at greenie.muc.de> wrote:
> Hi,
>
> On Wed, Feb 17, 2016 at 12:59:57PM -0600, Lesley Kimmel wrote:
> > I would like to implement an arbitrary script to be executed when logging
> > on via
2015 Jul 07
2
[PATCH 1/1] paint visual host key with unicode box-drawing characters
Hi,
On Tue, Jul 07, 2015 at 04:25:25PM +0200, Roland Mainz wrote:
> General comments:
> 1. Not all locales use UTF-8 as encoding but can still use the Unicode
> characters you use (e.g. GB18030 is a modern example and it's use is
> mandated by all software vendors in PRC China). A quick solution is to
> use |iconv()| to convert the UTF-8 byte sequences to the local
>
2010 Nov 05
2
test request: SCO with setluid() (i686-pc-sco3.2v5.0.7, possibly others)
Hi all.
I am cleaning up (I hope) one of the nastier pieces of code in openssh:
do_setusercontext which is/was a twisty maze of platform-specific
nested ifdefs. I made a series of changes[1] where I moved each
platform-specific piece into a portable-only file platform.c, which does
not need to be kept in sync with OpenBSD.
The changes did not (I hope!) change the semantics, but there's one
2001 Feb 16
1
CVS and AIX
Hi,
trying "current CVS" on AIX 4.3.3, yields:
gcc -O2 -Wall -I/usr/local/include -I/gnulocal/include -I/gnu/include -I. -I./openbsd-compat -I. -DETCDIR=\"/etc\" -D_PATH_SSH_PROGRAM=\"/gnu/bin/ssh\" -D_PATH_SSH_ASKPASS_DEFAULT=\"/gnu/libexec/ssh-askpass\" -D_PATH_SFTP_SERVER=\"/gnu/libexec/sftp-server\" -DHAVE_CONFIG_H -c auth.c
auth.c: In
2018 Jul 06
2
Does anyone use UsePrivilegedPort=yes or setuid ssh(1) ?
On 6 July 2018 at 17:24, Gert Doering <gert at greenie.muc.de>wrote:
[...]
> I think we have one customer connection where their firewall admin
> thinks "it is more secure that way" - read, we can't ssh in if we come
> from high ports.
>
> OTOH, thanks for the pointer with ProxyCommand - it's a very specific
> niche problem with a viable workaround, so I
2017 May 19
2
feature request: use HOME before getpwnam() in misc.c
I'm using bash. The shell does the correct thing.?
Sorry ?didn't give the use case clearly.?
I'm talking about the use of tilde inside client config. ?The example was to illustrate desired behavior. Ssh itself does not eval tilde with any consideration for environment. That is the problem.?
? Original Message ?
From: Gert Doering
Sent: Friday, May 19, 2017 02:19
To: matthew patton
2001 Nov 15
1
ssh -2 and hostbasedauth
Hi,
I'm trying to figure out how to read OpenSSH's log files (to assist
our people in diagnosing "why is it always asking me for passwords").
All clients and servers are 3.0p1.
First: server does not have the client's RSA2 key in known_host.
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got
2024 Sep 09
1
OL8 (RHEL8), ssh-rsa turned off using update-crypto-policies, receiving an openssh error that I don't seem to be able to override in my personal .ssh/config file
Hi,
On Mon, Sep 09, 2024 at 05:41:42PM +0200, Jan Schermer wrote:
> The correct solution is to throw whatever requires it to the garbage and never buy from that vendor again.
As nice as this sounds, the selection of possible algorithms on the
(usually "internal network only") management interface is waaaaay low
on the priority list when shopping for a $50k router...
gert
--
2015 Apr 22
3
shared private key
On Wed, Apr 22, 2015 at 1:53 PM, Gert Doering <gert at greenie.muc.de> wrote:
> Hi,
>
> On Wed, Apr 22, 2015 at 01:26:06PM -0700, Reuben Hawkins wrote:
>> Let me know if I'm missing something. :)
>
> Signed keys from a common CA?
I don't think the signed key helps in my particular case (I may be
wrong, if so please correct me).
I'm working on a management
2017 Oct 19
2
Status of OpenSSL 1.1 support - Thoughts
Hi,
On Thu, Oct 19, 2017 at 09:43:41AM +1100, Damien Miller wrote:
> You've got this exactly backwards. We don't want a shim that allows
> OpenSSL-1.1 to present a OpenSSL-1.0 API. We want a shim that allows
> us to use the OpenSSL-1.1 API when using OpenSSL-1.0, so we don't have
> to maintain a forest of #ifdefs.
For obvious reasons this shim cannot exist. If the