Displaying 20 results from an estimated 12000 matches similar to: "[Bug 372] [RFE] [authkrb5] : KRB5CCNAME set to pointer"
2002 Jul 28
0
[Bug 372] New: [authkrb5] : KRB5CCNAME set to pointer
http://bugzilla.mindrot.org/show_bug.cgi?id=372
           Summary: [authkrb5] : KRB5CCNAME set to pointer
           Product: Portable OpenSSH
           Version: -current
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: normal
          Priority: P2
         Component: sshd
        AssignedTo: openssh-unix-dev at mindrot.org
        ReportedBy: basalt
2003 May 20
0
[Bug 372] [RFE] [authkrb5] : KRB5CCNAME set to pointer
http://bugzilla.mindrot.org/show_bug.cgi?id=372
------- Additional Comments From simon at sxw.org.uk  2003-05-21 00:45 -------
If this is reproducable, then its a bug somewhere.
Could you confirm which Kerberos library and version you've seen this problem 
with?
Are the credentials correctly created in /tmp, and KRB5CCNAME just isn't set 
right, or are the credentials not being
2003 May 16
0
[Bug 372] [RFE] [authkrb5] : KRB5CCNAME set to pointer
http://bugzilla.mindrot.org/show_bug.cgi?id=372
djm at mindrot.org changed:
           What    |Removed                     |Added
----------------------------------------------------------------------------
          Component|sshd                        |Kerberos support
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2004 Jan 23
0
[Bug 372] [RFE] [authkrb5] : KRB5CCNAME set to pointer
http://bugzilla.mindrot.org/show_bug.cgi?id=372
dtucker at zip.com.au changed:
           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |INVALID
------- Additional Comments From dtucker at zip.com.au  2004-01-22
2017 Dec 23
5
[Bug 2815] New: please set KRB5CCNAME to collection
https://bugzilla.mindrot.org/show_bug.cgi?id=2815
            Bug ID: 2815
           Summary: please set KRB5CCNAME to collection
           Product: Portable OpenSSH
           Version: 7.4p1
          Hardware: amd64
                OS: Linux
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: Kerberos support
          Assignee: unassigned-bugs
2003 Oct 30
3
[Bug 751] KRB5CCNAME set incorrectly in GSSAPI code
http://bugzilla.mindrot.org/show_bug.cgi?id=751
           Summary: KRB5CCNAME set incorrectly in GSSAPI code
           Product: Portable OpenSSH
           Version: -current
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Kerberos support
        AssignedTo: openssh-bugs at mindrot.org
       
2003 Nov 11
1
AIX KRB5CCNAME problem
I believe there is a bug in how AIX handles the KRB5CCNAME environment 
variable.  The symptom occurs when a root user restarts sshd while they 
have KRB5CCNAME set; all of the resulting client connections will inherit 
the same KRB5CCNAME variable.  This can occur if the admin uses 'ksu' or 
some other kerberized method of obtaining root privileges.
Investigating this problem, I stumbled
2003 Nov 12
2
[Bug 757] KRB5CCNAME inherited from root's environment under AIX
http://bugzilla.mindrot.org/show_bug.cgi?id=757
           Summary: KRB5CCNAME inherited from root's environment under AIX
           Product: Portable OpenSSH
           Version: -current
          Platform: PPC
        OS/Version: AIX
            Status: NEW
          Severity: minor
          Priority: P2
         Component: sshd
        AssignedTo: openssh-bugs at mindrot.org
       
2002 Mar 09
0
krb5 problem: KRB5CCNAME is ""; possible fix for OpenSSH 3.0.2p1
I'm using a OpenSSH 3.0.2p1 with the krb5 patch from
<http://www.sxw.org.uk/computing/patches/openssh.html>.
I'm getting KRB5CCNAME set to "" even though
<http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=98269278629018&w=2>
mentions fixing it. This causes things like kinit to
fail with a somewhat uninformative error message.
The relevant sshd_config lines
2017 Feb 13
0
[RFC][cifs-utils PATCH] cifs.upcall: allow scraping of KRB5CCNAME out of initiating task's /proc/<pid>/environ file
On Mon, 2017-02-13 at 05:02 -0500, Simo Sorce wrote:
> On Sat, 2017-02-11 at 10:16 -0500, Jeff Layton wrote:
> > On Sat, 2017-02-11 at 08:41 -0500, Jeff Layton wrote:
> > > Chad reported that he was seeing a regression in cifs-utils-6.6.
> > > Prior
> > > to that, cifs.upcall was able to find credcaches in non-default
> > > FILE:
> > >
2009 Sep 19
1
cifs.upcall not respecting krb5ccname env var?
Hello,
 
I've been doing some extensive troubleshooting with respect to some issues
mounting CIFS shares on a Windows box via Kerberos. We're using the command:
/sbin/mount.cifs //whatever/whatever /whatever -o sec=krb5i
 
This should mount the share using Kerberos & Packet-signing by using the
cached credentials of the user executing the command. With judicious use of
strace, it
2010 Mar 23
1
caret package, how can I deal with RFE+SVM wrong message?
Hello, 
   
I am learning caret package, and I want to use the RFE to reduce the
feature. I want to use RFE coupled Random Forest (RFE+FR) to complete this
task. As we know, there are a number of pre-defined sets of functions, like
random Forest(rfFuncs), however,I want to tune the parameters (mtr) when
RFE, and then I write code below, but there is something wrong message, How
can I deal with it?
2004 Jan 25
2
[Bug 698] Specify FILE: for KRB5CCNAME
http://bugzilla.mindrot.org/show_bug.cgi?id=698
dtucker at zip.com.au changed:
           What    |Removed                     |Added
----------------------------------------------------------------------------
OtherBugsDependingO|                            |793
              nThis|                            |
            Summary|Specify FILE: for credential|Specify FILE: for KRB5CCNAME
      
2008 Sep 26
1
issue with varSel.svm.rfe in package MCRestimate
Hello all,
I would like to perform SVM-RFE (Guyon et al. 2002) in R and have only found
one implementation of this algorithm.  The function belongs
to the MCRestimate package but when I try to use it I encounter a problem
- the function appears to be missing a required package or other function
that I simply cannot find available anywhere.
Here is my session info followed by a simple example
2017 Feb 11
2
[RFC][cifs-utils PATCH] cifs.upcall: allow scraping of KRB5CCNAME out of initiating task's /proc/<pid>/environ file
Chad reported that he was seeing a regression in cifs-utils-6.6. Prior
to that, cifs.upcall was able to find credcaches in non-default FILE:
locations, but with the rework of that code, that ability was lost.
Unfortunately, the krb5 library design doesn't really take into account
the fact that we might need to find a credcache in a process that isn't
descended from the session.
When the
2004 Mar 21
6
[Bug 815] RFE: sshd should be able to set environment variables defined by the client
http://bugzilla.mindrot.org/show_bug.cgi?id=815
           Summary: RFE: sshd should be able to set environment variables
                    defined by the client
           Product: Portable OpenSSH
           Version: 3.8p1
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: enhancement
          Priority: P2
         Component: sshd
        AssignedTo:
2011 May 01
0
Dummy variables using rfe in caret for variable selection
I'm trying to run "rfe" for variable selection in the caret package, and am
getting an error. My data frame includes a dummy variable with 3 levels.
x <- chlDescr
y <- chl
#crate dummy variable 
levels(x$State) <- c("AL","GA","FL")
dummy <- model.matrix(~State,x)
z <- cbind(dummy, x)
#remove State category variable 
w <- z[,c(-4)]
2017 Feb 14
3
[PATCH v2 0/2] cifs.upcall: allow cifs.upcall to grab $KRB5CCNAME from initiating process
Small respin of the patches that I posted a few days ago. The main
difference is the reordering of the series to make it do the group
and grouplist manipulation first, and then the patch that makes
it grab the KRB5CCNAME from the initiating process.
I think the code is sound, my main question is whether we really
need the command-line switch for this. Should this just be the
default mode of
2004 Mar 30
1
[Bug 827] RFE: Allow forwarding of Xprint servers if X11 forwarning is enabled
http://bugzilla.mindrot.org/show_bug.cgi?id=827
           Summary: RFE: Allow forwarding of Xprint servers if X11
                    forwarning is enabled
           Product: Portable OpenSSH
           Version: 3.8p1
          Platform: All
               URL: http://xprint.mozdev.org/docs/Xprint_FAQ.html#manual_xpr
                    int_forwarding_via_ssh
        OS/Version: Linux
         
2007 Jun 22
2
RFE: idle timeout/auto-daemonize combo
Hi there,
I would like to have SSH connections be more "sudo-like".
With that I mean, when I ssh/scp/sftp to a host and disconnect,
the channel is held open for a while in case I reconnect.
I wrote a script (attached) that does this. It starts a master
SSH daemon for the connection if needed. Then it exec()s SSH.
Just put it in your path and use perssh instead of ssh.
It has some