Displaying 20 results from an estimated 5000 matches similar to: "OpenSSH 3.3 tested on solsris 8 Sparc/Intel"
2002 Jun 25
1
/dev/urandom|random and Solaris
Hello,
Being new to the list i hope this question has not been asked before....
As you might know Solaris 9 supportes /dev/random and /dev/urandom bij
default and earlier version need to install a patch to have these
devices....
But the configuration script under Solaris (Sparc/X86) does not test the
existing of the devices... is this to be known as a error/bug? and is
there a patch?
thanks
--
2002 Jul 01
3
[Bug 328] starting sshd yeilds PRNG not seeded
http://bugzilla.mindrot.org/show_bug.cgi?id=328
------- Additional Comments From luc at suryo.com 2002-07-02 06:45 -------
This may not be a openssh problem....
If the openssh/openssl was compiled to use /dev/urandom (or /dev/random)
and your system does not have the proper path installed to support /dev/urandom
(or /dev/urandom) this is what you will see when you try to start sshd/ssh
2002 Jun 29
3
[Bug 323] arp -n flag doesn't exist under Solaris, ssh_prng_cmds still uses it
http://bugzilla.mindrot.org/show_bug.cgi?id=323
------- Additional Comments From luc at suryo.com 2002-06-30 05:40 -------
A better solution is to install the pacthes that will support /dev/random and
/dev/urandom. Then recompile openssl and then openssh.
Solaris 8:
112438-01 patch for Sparc
112439-01 patch for x86
Solaris 9:
has standard /dev/random and /dev/urandom
Not sure if one can
2002 Oct 24
1
[SUMMARY] Problems with 'last' (when OpenSSH compiled 64-bit)
Problem:
'last' output is incorrect, /var/adm/wtmpx is corrupted. Example:
foster pts/1 Wed Dec 31 16:00 still logged in
foster pts/3 dim Thu Aug 1 14:34 still logged in
Solution: (workaround)
This turned out to be an OpenSSH problem! If OpenSSH (only tested
versions 3.4p1 and 3.5p1) is compiled 64-bit it corrupts the
/var/adm/wtmpx
2013 Oct 17
0
Samba 4 as Kerberos server for NFSv4
Hello Folks,
I'm trying to configure AD (mixed Samba4 and Windows2008R2 DC's) for
kerberized NFS (NFSv4).
Our server is CentOS 6.4 (with Samba 4.1.0)f and our clients are Fedora 19.
Console sessions work fine and the user's home directory mounts fine
with AutoFS. But sessions initiated with GDM, KDM, or even SSHD fail to
mount the user's home directory.
We can get an SSH
2002 Jun 26
5
[PATCH] improved chroot handling
There are a couple of niggles with the sandboxing of the unprivileged
child in the privsep code: the empty directory causes namespace pollution,
and it requires care to ensure that it is set up properly and remains set
up properly. The patch below (against the portable OpenSSH, although the
patch against the OpenBSD version is very similar) replaces the fixed
empty directory with one that is
2002 Jun 27
1
[Bug 308] New: openssh 3.4 won't install or run on Solaris 8, on an Ultra 10 Sparc station
http://bugzilla.mindrot.org/show_bug.cgi?id=308
Summary: openssh 3.4 won't install or run on Solaris 8, on an
Ultra 10 Sparc station
Product: Portable OpenSSH
Version: -current
Platform: UltraSparc
OS/Version: Solaris
Status: NEW
Severity: critical
Priority: P1
Component: Build
2002 Aug 13
1
ACL: need additional samba option ?
Hi All,
I need to setup the following rights behavior trhough samba and I'm currently
stuck after lots of unsuccessful tests. Maybe one of you has an idea or a
solution to this problem...
Here it comes:
- A share must be available only to some users belonging to the "project"
group.
That's easy:
valid users = @project
- There are several administrator-created
2010 Dec 03
1
Passwords not returned without auth_bind ?
Hi,
Maybe I am missing something simple, but I can't get users authenticated
using password lookups, as opposed to auth_bind. This is how the log looks
like when using password lookup:
dovecot: auth(default): new auth connection: pid=2449
dovecot: auth(default): client in:
2009 Aug 07
1
mounting volumes : pammount vs gvfs
Hi list.
First sorry for my poor english, so not easy for me to explain exactly
my problem.
My problem is that files/ directories created in my mounted volumes
don't have the rights I expect.
Here is my smb.conf :
[...]
[Docs]
comment = Docs
path = /home/Docs
browseable = yes
writeable = yes
force group = docs
create mask = 0770
directory mask = 0770
force create
2002 Apr 29
0
[Bug 230] New: UsePrivilegeSeparation turns off Banner.
http://bugzilla.mindrot.org/show_bug.cgi?id=230
Summary: UsePrivilegeSeparation turns off Banner.
Product: Portable OpenSSH
Version: -current
Platform: ix86
OS/Version: OpenBSD
Status: NEW
Severity: normal
Priority: P3
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy:
2002 May 28
0
[Bug 259] New: UsePrivilegeSeparation crashed sshd under Linux 2.2
http://bugzilla.mindrot.org/show_bug.cgi?id=259
Summary: UsePrivilegeSeparation crashed sshd under Linux 2.2
Product: Portable OpenSSH
Version: -current
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: major
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
2002 Jun 27
1
(no subject)
Hi Phil,
answer to your questions:
> Which specific Slackware? Too embarrassed to say?
Really, really don't know exactly. :)
Installed approx. 5 yeras ago (maybe 4.5, 4.6, maybe 5.0 ... who knows now ... )
> Which OpenSSL? 0.9.6a? 0.9.6b? 0.9.6c? 0.9.6d?
Only info I found is 0.9.6. Let's suppose it's 0.9.6. ;)
> How about telling me how long you're going
2005 Sep 07
4
[Bug 1080] 4.1p1 to 4.2p1 broke UsePrivilegeSeparation on HPUX
http://bugzilla.mindrot.org/show_bug.cgi?id=1080
Summary: 4.1p1 to 4.2p1 broke UsePrivilegeSeparation on HPUX
Product: Portable OpenSSH
Version: 4.2p1
Platform: HPPA
OS/Version: HP-UX
Status: NEW
Severity: security
Priority: P2
Component: sshd
AssignedTo: bitbucket at mindrot.org
2002 Jun 26
2
debug output when ssh'ing a remote host
Hi list,
I'm not sure whether this (see below) is a "bug" or a feature but as I cannot find any information on this neither in the INSTALL file nor via ./configure --help or somewhere else, I would like to ask you whether there is an answer to my question.
Thanx a lot & kind regards - have a nice day,
B. Courtin
Question:
---------
I lately updatet from OpenSSH 3.0.1p1 to
2002 Jul 01
0
Revised OpenSSH Security Advisory
This is the 4th revision of the Advisory.
This document can be found at: http://www.openssh.com/txt/preauth.adv
1. Versions affected:
Serveral versions of OpenSSH's sshd between 2.3.1 and 3.3
contain an input validation error that can result in an
integer overflow and privilege escalation.
All versions between 2.3.1 and 3.3 contain a bug in the
2002 Jul 01
0
Revised OpenSSH Security Advisory
This is the 4th revision of the Advisory.
This document can be found at: http://www.openssh.com/txt/preauth.adv
1. Versions affected:
Serveral versions of OpenSSH's sshd between 2.3.1 and 3.3
contain an input validation error that can result in an
integer overflow and privilege escalation.
All versions between 2.3.1 and 3.3 contain a bug in the
2010 Sep 16
2
Can the require value be a function?
Hello
I have this
fly::create_dir { "/usr/share/mysql-zrm/pkgs" : mode => 0755, owner => bin,
group => bin }
==> creates the directory and parents .. it just does a mkdir -p with couple
test
so I have
file { "$client_package_file" :
path =>
"/usr/share/mysql-zrm/pkgs/$client_package_file",
2020 Jan 09
0
mean
Jean-Luc,
Please keep the communications on the list, for the benefit of others, now and in the future, via the list archive. I am adding r-devel back here.
I can't speak to the rationale in some of these cases. As I noted, it may be (is likely) due to differing authors over time, and there may have been relevant use cases at the time that the code was written, resulting in the various
2002 Aug 12
1
PermitRootLogin=forced-commands-only does not work with UsePrivilegeSeparation=yes
Using openssh-3.4p1 on Linux I noticed that PermitRootLogin=forced-commands-only
does not work if UsePrivilegeSeparation is enabled; but it does work if privsep
is disabled.
Here are excerpts of debug from the server.
-----------UsePrivilegeSeparation DISABLED-------
...
Found matching DSA key: 56:9d:72:b0:4f:67:2e:ed:06:e7:41:03:e2:86:52:0d^M
debug1: restore_uid^M
debug1: ssh_dss_verify: