similar to: [Bug 252] Patch for use of /etc/default/login

Displaying 20 results from an estimated 100000 matches similar to: "[Bug 252] Patch for use of /etc/default/login"

2002 May 20
0
[Bug 252] New: Patch for use of /etc/default/login
http://bugzilla.mindrot.org/show_bug.cgi?id=252 Summary: Patch for use of /etc/default/login Product: Portable OpenSSH Version: -current Platform: All OS/Version: Solaris Status: NEW Severity: enhancement Priority: P4 Component: sshd AssignedTo: openssh-unix-dev at mindrot.org ReportedBy:
2003 Jan 07
2
[Bug 252] Patch for use of /etc/default/login
http://bugzilla.mindrot.org/show_bug.cgi?id=252 djm at mindrot.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2003 Aug 22
14
[Bug 252] Patch for use of /etc/default/login
http://bugzilla.mindrot.org/show_bug.cgi?id=252 dtucker at zip.com.au changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #212 is|0 |1 obsolete| | ------- Additional Comments From dtucker at zip.com.au 2003-08-22 14:14 -------
2003 Sep 23
5
[Bug 710] ReliantUnix: -ldl missing when libcrypto is a shared object
http://bugzilla.mindrot.org/show_bug.cgi?id=710 Summary: ReliantUnix: -ldl missing when libcrypto is a shared object Product: Portable OpenSSH Version: -current Platform: MIPS OS/Version: other Status: NEW Severity: normal Priority: P3 Component: Build system AssignedTo:
2003 Sep 25
7
[Bug 715] usage of BROKEN_SETREUID/BROKEN_SETREGID considered harmful
http://bugzilla.mindrot.org/show_bug.cgi?id=715 Summary: usage of BROKEN_SETREUID/BROKEN_SETREGID considered harmful Product: Portable OpenSSH Version: -current Platform: All OS/Version: All Status: NEW Severity: major Priority: P2 Component: Build system AssignedTo:
2003 Jan 25
0
[Bug 475] sshd should source /etc/default/login
http://bugzilla.mindrot.org/show_bug.cgi?id=475 dtucker at zip.com.au changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |DUPLICATE ------- Additional Comments From dtucker at zip.com.au 2003-01-26
2004 Aug 23
2
[Bug 919] --disable-etc-default-login has no visible feedback
http://bugzilla.mindrot.org/show_bug.cgi?id=919 Summary: --disable-etc-default-login has no visible feedback Product: Portable OpenSSH Version: -current Platform: All OS/Version: Solaris Status: NEW Severity: normal Priority: P2 Component: Build system AssignedTo: openssh-bugs at mindrot.org
2004 Jan 27
2
[Bug 797] ignores setting of CONSOLE var in /etc/default/login
http://bugzilla.mindrot.org/show_bug.cgi?id=797 Summary: ignores setting of CONSOLE var in /etc/default/login Product: Portable OpenSSH Version: 3.7.1p2 Platform: UltraSparc OS/Version: Solaris Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: openssh-bugs at mindrot.org
2003 Sep 17
3
[Bug 643] sshd bus faults (64bit) or segfaults (32bit) when reading /etc/default/login
http://bugzilla.mindrot.org/show_bug.cgi?id=643 dtucker at zip.com.au changed: What |Removed |Added ---------------------------------------------------------------------------- Summary|sshd bus faults on 64-bit |sshd bus faults (64bit) or |SPARCs when reading |segfaults (32bit) when |/etc/default/login
2002 Jul 03
2
--{enable/disable}-suid-ssh removed, rhosts auth gone when UID != 0
Hi, According to ChangeLog someone "(bal)" removed -{enable/disable}-suid-ssh from configure (dating from 2002/06/07). Don't know the reason, probably this has something to do with PrivilegeSeparation. Consequence is: Users with UID != 0 are no longer able to allocate privileged ports, sshd answers "Rhosts Authentication disabled, originating port will not be
2003 Jan 25
0
[Bug 475] New: sshd should source /etc/default/login
http://bugzilla.mindrot.org/show_bug.cgi?id=475 Summary: sshd should source /etc/default/login Product: Portable OpenSSH Version: 3.5p1 Platform: All OS/Version: Solaris Status: NEW Severity: enhancement Priority: P2 Component: sshd AssignedTo: openssh-unix-dev at mindrot.org ReportedBy:
2001 Nov 04
4
Slow connection performance with ssh2
Hi, since I switched from SSH 1 to OpenSSH 2.9p2/2.9.9p2/3.0p1 Snapshot I suffer from awfully slow connection performance. Once the connection is established, performance is perfectly ok. Client Server (protocol 2 only) # time ssh -p 22222 xx id # time sshd -d -p 22222 real 0m13.340s real 0m13.900s user 0m7.860s
2001 Aug 20
4
[PATCH] some patches for Fujitsu-Siemens ReliantUNIX, minor fixes and XXXes
Hi, attached please find some patches for ReliantUNIX. This was tested under Reliant UNIX V5.43C40 with Compiler CDSDEV V2.0C00. Here is what I did: - there is a common misunderstanding how to use /usr/libucb/libucb.a: There are some library functions only in libucb.a under ReliantUNIX, so one needs to bind it. The problem is: there are some other functions in this library you should never
2004 Apr 01
3
[Bug 830] Check immediate EOF coming on stdin
http://bugzilla.mindrot.org/show_bug.cgi?id=830 Summary: Check immediate EOF coming on stdin Product: Portable OpenSSH Version: 3.8p1 Platform: Other OS/Version: other Status: NEW Severity: minor Priority: P2 Component: ssh AssignedTo: openssh-bugs at mindrot.org ReportedBy: ignasi.roca at
2002 Nov 12
2
Forcing privileged ports with ssh -R
Hi, I have a daemon process which is changings things in the system only the superuser should be allowed to change. Lets call it "riskyd". Users use a frontend on the same machine (lets call it "risky"). risky is a SUID program which talks to riskyd by binding to a privileged port, then connecting to riskyd on localhost. riskyd cheks that the connection is coming from
2011 Feb 17
5
[Bug 1860] New: UseDNS option ignored
https://bugzilla.mindrot.org/show_bug.cgi?id=1860 Summary: UseDNS option ignored Product: Portable OpenSSH Version: 5.6p1 Platform: All OS/Version: Other Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: unassigned-bugs at mindrot.org ReportedBy: pavel.krejci at
2010 Aug 07
7
[Bug 1804] New: ssh option -R 127.0.0.2:10443:<dest ip>:443 does not work
https://bugzilla.mindrot.org/show_bug.cgi?id=1804 Summary: ssh option -R 127.0.0.2:10443:<dest ip>:443 does not work Product: Portable OpenSSH Version: 5.5p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo:
2004 Apr 01
0
[Bug 829] Don't allocate a tty if -n option is set
http://bugzilla.mindrot.org/show_bug.cgi?id=829 Summary: Don't allocate a tty if -n option is set Product: Portable OpenSSH Version: 3.8p1 Platform: All OS/Version: All Status: NEW Severity: minor Priority: P2 Component: ssh AssignedTo: openssh-bugs at mindrot.org ReportedBy:
2002 Mar 18
0
[Bug 171] New: Banner /etc/issue.net (default) not displaying with Protocol 2
http://bugzilla.mindrot.org/show_bug.cgi?id=171 Summary: Banner /etc/issue.net (default) not displaying with Protocol 2 Product: Portable OpenSSH Version: 3.1p1 Platform: ix86 OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo:
2015 Apr 17
5
[Bug 2385] New: ssh does not document relative priorities among various methods of specifying login name
https://bugzilla.mindrot.org/show_bug.cgi?id=2385 Bug ID: 2385 Summary: ssh does not document relative priorities among various methods of specifying login name Product: Portable OpenSSH Version: 6.8p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5