Displaying 20 results from an estimated 400 matches similar to: "Further comment on chroot patch for openssh-3.4p1"
2002 Aug 08
0
Probable bug in Chroot patch (v3.4p1)
While I was trying to get the patch to work on one of my AIX hosts (4.3.3),
I discovered what is probably a bug in the section of code in session.c.
for (i = 0; i < options.num_chroot_users; i++) {
if (match_user(pw->pw_name, hostname, ipaddr,
options.chroot_users[i])) {
dir = chroot_dir(pw);
/* 'dir' now points to memory block holding pathname */
2007 Sep 09
2
Batch mode scenario ("use case")
Hello,
I came up with this scenario of the use of batch mode while
thinking of back-up schemes to use for myself. However, it could
be that the last step needed in this scenario is not supported by
rsync! Here's the scenario:
At one time, /c/home/wer/work and /e/gold had identical content
and were really huge (say, 200 GBytes).
After some complex, intricate work, Mr. Wer
2002 Jul 04
4
Chroot patch (v3.4p1)
The following is a patch I've been working on to support a "ChrootUser"
option in the sshd_config file.
I was looking for a way to offer sftp access and at the same time restict
interactive shell access. This patch is a necessary first step (IMO).
It applies clean with 'patch -l'.
Also attached is a shell script that helps to build a chrooted home dir on
a RedHat 7.2
2005 Jan 05
3
[Bug 969] early setpcred() stomps on PAM
http://bugzilla.mindrot.org/show_bug.cgi?id=969
Summary: early setpcred() stomps on PAM
Product: Portable OpenSSH
Version: 3.9p1
Platform: All
OS/Version: AIX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-bugs at mindrot.org
ReportedBy: dleonard at
2009 Mar 06
20
[Bug 1567] New: Insufficient privileges to chroot() on AIX
https://bugzilla.mindrot.org/show_bug.cgi?id=1567
Summary: Insufficient privileges to chroot() on AIX
Product: Portable OpenSSH
Version: 5.2p1
Platform: PPC
OS/Version: AIX
Status: NEW
Severity: major
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy: bana
2006 Oct 09
3
[Bug 1249] pam_open_session called with dropped privs
http://bugzilla.mindrot.org/show_bug.cgi?id=1249
Summary: pam_open_session called with dropped privs
Product: Portable OpenSSH
Version: 4.4p1
Platform: PPC
OS/Version: AIX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: bitbucket at mindrot.org
ReportedBy: dleonard at
2002 Jun 06
9
[Bug 261] AIX capabilities + port-aix.c cleanup
http://bugzilla.mindrot.org/show_bug.cgi?id=261
dtucker at zip.com.au changed:
What |Removed |Added
----------------------------------------------------------------------------
OS/Version|other |AIX
------- Additional Comments From dtucker at zip.com.au 2002-06-06 21:22 -------
I finally got a chance to try this. I got compile
2008 Mar 13
1
Can't access shares
Running FC6 and Samba 3.0.24-11.fc6.
Workstation is XP Pro
Initially, after disabling SELinux and turning off Iptables, I could access
the shares that were set up. Came in this morning ready to start copying
files and can't get in. Prompts me for a username and password which is
rejected. I know it's not my workstation because I have another FC6/Samba
server running and have no problem
2008 Mar 10
1
NT_STATUS_BAD_NETWORK_NAME
I am trying to run Samba 3.0.24-11.fc6 on Fedora Core 6. I've run across
two problems that are keeping me from being successful.
1. IPTables. Even when I configure it through Webmin to not run at
startup, it does anyway. I consider this a minor problem, at least for now,
although I wouldn't mind some input on how to configure it to allow Samba.
2. Access to shares. We are running
2002 Jun 25
3
BSD/OS with privsep
I need this for BSD/OS 4.2 + privsep
perhaps we should not call do_setusercontext() after
chroot().
--- sshd.c.orig Fri Jun 21 03:09:47 2002
+++ sshd.c Tue Jun 25 13:11:03 2002
@@ -548,21 +548,35 @@
/* Change our root directory*/
if (chroot(_PATH_PRIVSEP_CHROOT_DIR) == -1)
fatal("chroot(\"%s\"): %s", _PATH_PRIVSEP_CHROOT_DIR,
strerror(errno));
if
2009 Dec 01
4
[Bug 1678] New: Insufficient privileges to chroot() on AIX
https://bugzilla.mindrot.org/show_bug.cgi?id=1678
Summary: Insufficient privileges to chroot() on AIX
Product: Portable OpenSSH
Version: 5.3p1
Platform: PPC
OS/Version: AIX
Status: NEW
Severity: major
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy:
2009 Mar 02
0
About setpcred() and chroot()
Hi,
I need to use sftp-only accounts, chroot()ed in their home dirs, on AIX 5.3
with OpenSSH_5.2p1.
But there is a problem with the chroot() call.
In the do_setusercontext() function, chroot() is called after the setpcred()
(only AIX is concerned by the setpcred() call), so privileges are already
dropped when chroot() is called.
When not calling setpcred(), the chroot() does not fail and the
2003 Jul 03
0
AIX cleanups: includes and arguments
Hi All.
First the questions:
Is there anything objectionable in this patch?
Is AUDIT_FAIL_AUTH appropriate for the "Reason" field?
Now the details: attached is a patch that changes some of the #includes
for AIX. It moves the AIX-specific includes to port-aix.h and adds
includes that contain the prototypes for many of the authentication
functions. The idea isto fix some warnings.
2003 Oct 28
4
AIX patch for openssh-3.7.1p2
There are a couple of bugs in the openssh-3.7.1p2. The aix_setauthdb
function does not work with other types of authentication such as AFS/DFS.
The loginfailed test in configure is not correct. Also, AIX can use the
wtmp logging which I added in configure. Attached is the patch.
Thanks,
Matt Richards
-------------- next part --------------
*** openssh-3.7.1p2/openbsd-compat/port-aix.c Mon Jul 14
2002 May 31
0
[Bug 261] New: AIX capabilities + port-aix.c cleanup
http://bugzilla.mindrot.org/show_bug.cgi?id=261
Summary: AIX capabilities + port-aix.c cleanup
Product: Portable OpenSSH
Version: -current
Platform: Other
OS/Version: other
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy:
2003 Oct 02
1
Connection drops after entering password.
Has anyone seen the error that I'm getting below? After you ssh to the box
and enter the password the connection just closes.
SSH Version
{ root at xxxxxxxx} # ssh -V
OpenSSH_3.7p1, SSH protocols 1.5/2.0, OpenSSL 0.9.7b 10 Apr 2003
OS Version
{ root at xxxxxxxx } # oslevel -r
AIX 4330-09
SSH Connect Failure
{ root at xxxxxxxxx } # ssh -l xxxxxxxxx -v localhost
OpenSSH_3.7p1, SSH protocols
2002 May 14
1
AIX capabilities not set
Hi,
we're in the process of setting up large-page support on IBM regattas,
but for large-page support the users have to have a set of extra
capabilities (CAP_BYPASS_RAC_VMM,CAP_PROPAGATE). This are configured
on a per user basis by listing which capability each user have in
/etc/security/user.
Unfortunately they don't get set when the users log in via OpenSSH
(3.1p1). Does anybody know
2008 Jun 14
0
[Bug 1249] pam_open_session called with dropped privs
https://bugzilla.mindrot.org/show_bug.cgi?id=1249
Darren Tucker <dtucker at zip.com.au> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |dtucker at zip.com.au
--- Comment #4 from Darren Tucker <dtucker at zip.com.au> 2008-06-15 05:27:49
2002 Oct 25
0
NeXT Community
I need someone in the NeXT community to apply this to 3.5 and tell me if
it solves the mmap issue where it misdetects a working mmap().
My NeXT box is packed up. If you know anyone in Minnesota that wants a
68k-25mhz Slab w/ 2 B&W monitors, 2 keyboards, 2 mice, NeXT printer and
OS. Have them email me. I won't ship it, but I have no more time to be
handling an OS this old. =) I have no
2003 Apr 15
3
[Bug 543] sshd does not use AIX's setauthdb
http://bugzilla.mindrot.org/show_bug.cgi?id=543
Summary: sshd does not use AIX's setauthdb
Product: Portable OpenSSH
Version: 3.6p1
Platform: PPC
OS/Version: AIX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: cawlfiel at