similar to: OpenSSH 3.3 tested on solsris 8 Sparc/Intel

Displaying 20 results from an estimated 5000 matches similar to: "OpenSSH 3.3 tested on solsris 8 Sparc/Intel"

2002 Jun 25
1
/dev/urandom|random and Solaris
Hello, Being new to the list i hope this question has not been asked before.... As you might know Solaris 9 supportes /dev/random and /dev/urandom bij default and earlier version need to install a patch to have these devices.... But the configuration script under Solaris (Sparc/X86) does not test the existing of the devices... is this to be known as a error/bug? and is there a patch? thanks --
2002 Jul 01
3
[Bug 328] starting sshd yeilds PRNG not seeded
http://bugzilla.mindrot.org/show_bug.cgi?id=328 ------- Additional Comments From luc at suryo.com 2002-07-02 06:45 ------- This may not be a openssh problem.... If the openssh/openssl was compiled to use /dev/urandom (or /dev/random) and your system does not have the proper path installed to support /dev/urandom (or /dev/urandom) this is what you will see when you try to start sshd/ssh
2002 Jun 29
3
[Bug 323] arp -n flag doesn't exist under Solaris, ssh_prng_cmds still uses it
http://bugzilla.mindrot.org/show_bug.cgi?id=323 ------- Additional Comments From luc at suryo.com 2002-06-30 05:40 ------- A better solution is to install the pacthes that will support /dev/random and /dev/urandom. Then recompile openssl and then openssh. Solaris 8: 112438-01 patch for Sparc 112439-01 patch for x86 Solaris 9: has standard /dev/random and /dev/urandom Not sure if one can
2002 Oct 24
1
[SUMMARY] Problems with 'last' (when OpenSSH compiled 64-bit)
Problem: 'last' output is incorrect, /var/adm/wtmpx is corrupted. Example: foster pts/1 Wed Dec 31 16:00 still logged in foster pts/3 dim Thu Aug 1 14:34 still logged in Solution: (workaround) This turned out to be an OpenSSH problem! If OpenSSH (only tested versions 3.4p1 and 3.5p1) is compiled 64-bit it corrupts the /var/adm/wtmpx
2013 Oct 17
0
Samba 4 as Kerberos server for NFSv4
Hello Folks, I'm trying to configure AD (mixed Samba4 and Windows2008R2 DC's) for kerberized NFS (NFSv4). Our server is CentOS 6.4 (with Samba 4.1.0)f and our clients are Fedora 19. Console sessions work fine and the user's home directory mounts fine with AutoFS. But sessions initiated with GDM, KDM, or even SSHD fail to mount the user's home directory. We can get an SSH
2002 Jun 26
5
[PATCH] improved chroot handling
There are a couple of niggles with the sandboxing of the unprivileged child in the privsep code: the empty directory causes namespace pollution, and it requires care to ensure that it is set up properly and remains set up properly. The patch below (against the portable OpenSSH, although the patch against the OpenBSD version is very similar) replaces the fixed empty directory with one that is
2002 Jun 27
1
[Bug 308] New: openssh 3.4 won't install or run on Solaris 8, on an Ultra 10 Sparc station
http://bugzilla.mindrot.org/show_bug.cgi?id=308 Summary: openssh 3.4 won't install or run on Solaris 8, on an Ultra 10 Sparc station Product: Portable OpenSSH Version: -current Platform: UltraSparc OS/Version: Solaris Status: NEW Severity: critical Priority: P1 Component: Build
2002 Aug 13
1
ACL: need additional samba option ?
Hi All, I need to setup the following rights behavior trhough samba and I'm currently stuck after lots of unsuccessful tests. Maybe one of you has an idea or a solution to this problem... Here it comes: - A share must be available only to some users belonging to the "project" group. That's easy: valid users = @project - There are several administrator-created
2010 Dec 03
1
Passwords not returned without auth_bind ?
Hi, Maybe I am missing something simple, but I can't get users authenticated using password lookups, as opposed to auth_bind. This is how the log looks like when using password lookup: dovecot: auth(default): new auth connection: pid=2449 dovecot: auth(default): client in:
2009 Aug 07
1
mounting volumes : pammount vs gvfs
Hi list. First sorry for my poor english, so not easy for me to explain exactly my problem. My problem is that files/ directories created in my mounted volumes don't have the rights I expect. Here is my smb.conf : [...] [Docs] comment = Docs path = /home/Docs browseable = yes writeable = yes force group = docs create mask = 0770 directory mask = 0770 force create
2002 Apr 29
0
[Bug 230] New: UsePrivilegeSeparation turns off Banner.
http://bugzilla.mindrot.org/show_bug.cgi?id=230 Summary: UsePrivilegeSeparation turns off Banner. Product: Portable OpenSSH Version: -current Platform: ix86 OS/Version: OpenBSD Status: NEW Severity: normal Priority: P3 Component: sshd AssignedTo: openssh-unix-dev at mindrot.org ReportedBy:
2002 May 28
0
[Bug 259] New: UsePrivilegeSeparation crashed sshd under Linux 2.2
http://bugzilla.mindrot.org/show_bug.cgi?id=259 Summary: UsePrivilegeSeparation crashed sshd under Linux 2.2 Product: Portable OpenSSH Version: -current Platform: ix86 OS/Version: Linux Status: NEW Severity: major Priority: P2 Component: sshd AssignedTo: openssh-unix-dev at mindrot.org
2002 Jun 27
1
(no subject)
Hi Phil, answer to your questions: > Which specific Slackware? Too embarrassed to say? Really, really don't know exactly. :) Installed approx. 5 yeras ago (maybe 4.5, 4.6, maybe 5.0 ... who knows now ... ) > Which OpenSSL? 0.9.6a? 0.9.6b? 0.9.6c? 0.9.6d? Only info I found is 0.9.6. Let's suppose it's 0.9.6. ;) > How about telling me how long you're going
2005 Sep 07
4
[Bug 1080] 4.1p1 to 4.2p1 broke UsePrivilegeSeparation on HPUX
http://bugzilla.mindrot.org/show_bug.cgi?id=1080 Summary: 4.1p1 to 4.2p1 broke UsePrivilegeSeparation on HPUX Product: Portable OpenSSH Version: 4.2p1 Platform: HPPA OS/Version: HP-UX Status: NEW Severity: security Priority: P2 Component: sshd AssignedTo: bitbucket at mindrot.org
2002 Jun 26
2
debug output when ssh'ing a remote host
Hi list, I'm not sure whether this (see below) is a "bug" or a feature but as I cannot find any information on this neither in the INSTALL file nor via ./configure --help or somewhere else, I would like to ask you whether there is an answer to my question. Thanx a lot & kind regards - have a nice day, B. Courtin Question: --------- I lately updatet from OpenSSH 3.0.1p1 to
2002 Jul 01
0
Revised OpenSSH Security Advisory
This is the 4th revision of the Advisory. This document can be found at: http://www.openssh.com/txt/preauth.adv 1. Versions affected: Serveral versions of OpenSSH's sshd between 2.3.1 and 3.3 contain an input validation error that can result in an integer overflow and privilege escalation. All versions between 2.3.1 and 3.3 contain a bug in the
2002 Jul 01
0
Revised OpenSSH Security Advisory
This is the 4th revision of the Advisory. This document can be found at: http://www.openssh.com/txt/preauth.adv 1. Versions affected: Serveral versions of OpenSSH's sshd between 2.3.1 and 3.3 contain an input validation error that can result in an integer overflow and privilege escalation. All versions between 2.3.1 and 3.3 contain a bug in the
2010 Sep 16
2
Can the require value be a function?
Hello I have this fly::create_dir { "/usr/share/mysql-zrm/pkgs" : mode => 0755, owner => bin, group => bin } ==> creates the directory and parents .. it just does a mkdir -p with couple test so I have file { "$client_package_file" : path => "/usr/share/mysql-zrm/pkgs/$client_package_file",
2020 Jan 09
0
mean
Jean-Luc, Please keep the communications on the list, for the benefit of others, now and in the future, via the list archive. I am adding r-devel back here. I can't speak to the rationale in some of these cases. As I noted, it may be (is likely) due to differing authors over time, and there may have been relevant use cases at the time that the code was written, resulting in the various
2002 Aug 12
1
PermitRootLogin=forced-commands-only does not work with UsePrivilegeSeparation=yes
Using openssh-3.4p1 on Linux I noticed that PermitRootLogin=forced-commands-only does not work if UsePrivilegeSeparation is enabled; but it does work if privsep is disabled. Here are excerpts of debug from the server. -----------UsePrivilegeSeparation DISABLED------- ... Found matching DSA key: 56:9d:72:b0:4f:67:2e:ed:06:e7:41:03:e2:86:52:0d^M debug1: restore_uid^M debug1: ssh_dss_verify: