similar to: [Bug 401] New: misc. ipv4-mapped address support fix

Displaying 20 results from an estimated 30000 matches similar to: "[Bug 401] New: misc. ipv4-mapped address support fix"

2000 Mar 07
2
patch for openssh-1.2.2p1
Hi, openssh-1.2.2p1 seems to have 2 problems on ipv6 (and ipv4 mapped addresses). 1. "BREAKIN ATTEMPT" warnings from ipv4 node 2. X forwarding The following patche fixes them. Thanks. diff -ru openssh-1.2.2p1/canohost.c openssh-1.2.2p1-20000308/canohost.c --- openssh-1.2.2p1/canohost.c Fri Jan 14 13:45:48 2000 +++ openssh-1.2.2p1-20000308/canohost.c Wed Mar 8 00:25:18 2000 @@
2002 Sep 24
3
[Bug 401] ipv4 mapped address (ipv4 in ipv6) and ipv6 support fix
http://bugzilla.mindrot.org/show_bug.cgi?id=401 yoshfuji at linux-ipv6.org changed: What |Removed |Added ---------------------------------------------------------------------------- Summary|misc. ipv4-mapped address |ipv4 mapped address (ipv4 in |support fix |ipv6) and ipv6 support fix ------- Additional
2002 Sep 23
0
[Bug 401] misc. ipv4-mapped address support fix
http://bugzilla.mindrot.org/show_bug.cgi?id=401 ------- Additional Comments From yoshfuji at linux-ipv6.org 2002-09-24 03:50 ------- Created an attachment (id=148) --> (http://bugzilla.mindrot.org/attachment.cgi?id=148&action=view) set length of sockaddr{}. run sshd with glibc-2.2 on linux-2.2 ------- You are receiving this mail because: ------- You are the assignee for the bug,
2002 May 20
0
Openssh 3.2.2p1 KRB5 addition
The Kerberos V support may still fail on hosts with two or more interfaces. Regards Markus -------------- next part -------------- *** auth-krb5.c.orig Mon May 20 11:51:57 2002 --- auth-krb5.c Mon May 20 11:53:34 2002 *************** *** 38,43 **** --- 38,44 ---- #include "servconf.h" #include "uidswap.h" #include "auth.h" + #include "canohost.h"
2003 Jan 06
3
[Bug 401] ipv4 mapped address (ipv4 in ipv6) and ipv6 support fix
http://bugzilla.mindrot.org/show_bug.cgi?id=401 ------- Additional Comments From yoshfuji at linux-ipv6.org 2003-01-06 12:20 ------- Created an attachment (id=194) --> (http://bugzilla.mindrot.org/attachment.cgi?id=194&action=view) patch to run openssh-3.5p1 on linux-2.2 & glibc-2.2(or later) This is modified patch for openssh-3.5p1. Patch is simplified. ------- You are
2010 Sep 23
4
[Bug 1825] New: ipv64_normalise_mapped()'s memset should use a4, not addr, for clarity
https://bugzilla.mindrot.org/show_bug.cgi?id=1825 Summary: ipv64_normalise_mapped()'s memset should use a4, not addr, for clarity Product: Portable OpenSSH Version: 5.6p1 Platform: All OS/Version: All Status: NEW Severity: trivial Priority: P2 Component: Miscellaneous
2007 Jan 06
3
Re: [nut-commits] svn commit r708 - in trunk: . clients server
With the Ipv6 patch (r708), I get: upsclient.c: In function `upscli_connect': upsclient.c:469: `AI_ADDRCONFIG' undeclared (first use in this function) upsclient.c:469: (Each undeclared identifier is reported only once upsclient.c:469: for each function it appears in.) Even if it doesn't break IPv4 support, it may break portability, as IPv6 seems to require specific functions that are
2010 Nov 28
2
[PATCH] Use canonical hostname for DNS SSHFP lookup
In the current implementation, ssh always uses the hostname supplied by the user directly for the SSHFP DNS record lookup. This causes problems when using the domain search path, e.g. I have "search example.com" in my resolv.conf and then do a "ssh host", I will connect to host.example.com, but ssh will query the DNS for an SSHFP record of "host.", not
2009 Nov 23
0
[PATCH] Bluetooth support.
This is just the first part -- it adds support for correctly reporting incoming connections when there's an external d?mon accepting the connections and invoking 'sshd -i' with them, like inetd does. In later patches I'll extend sshd to listen on a Bluetooth socket (and advertise the service in SDP) for itself, and extend the ssh client to make the connection directly. For now,
2019 Sep 15
0
[PATCH nbdkit 4/4] reflection: Enhance plugin to support client address mode.
--- .../reflection/nbdkit-reflection-plugin.pod | 23 ++++- plugins/reflection/reflection.c | 88 +++++++++++++++++++ tests/Makefile.am | 2 + tests/test-reflection-address.sh | 63 +++++++++++++ 4 files changed, 174 insertions(+), 2 deletions(-) diff --git a/plugins/reflection/nbdkit-reflection-plugin.pod
2004 Mar 02
2
[PATCH] Force mountd(8) to a specified port.
Hi all, I have a requirement to run NFS read-only in an Internet-facing colocation environment. I am not happy with packet filters alone around rpcbind, call me paranoid, so I just spent the last few minutes cutting this patch. As you are aware, RPC applications can be forced to listen on a known port through the sin/sa argument to bindresvport[_sa](). Why several Linux distributions have this
2004 Apr 01
1
[patch] net/rsync: problems in client name lookup code
>Submitter-Id: current-users >Originator: Alex Vasylenko >Organization: >Confidential: no >Synopsis: [patch] net/rsync: problems in client name lookup code >Severity: non-critical >Priority: low >Category: ports >Class: sw-bug >Release: FreeBSD 4.8-RELEASE-p16 i386 >Environment: System: FreeBSD 4.8-RELEASE-p16 >Description: rsync does reverse name
2000 Nov 21
1
Openssh-2.2.0pl1 for UnixWare 7.1
UnixWare (not sure when, 7? 7.1?) introduces a new sockaddr_in structure that splits the 16 bit family entity into an 8-bit length and an 8-bit familiy memember: (from in.h): struct sockaddr_in { #ifdef __NEW_SOCKADDR__ sa_len_t sin_len; /* 8-bit structure length */ #endif sa_family_t sin_family; /* 8/16-bit address family (AF_INET) */ in_port_t sin_port; /* 16-bit port
2010 Dec 07
0
[PATCH]: A daemon to support HyperV KVP functionality
From: K. Y. Srinivasan <ksrinivasan at novell.com> Subject: An implementation of key/value pair feature (KVP) for Linux on HyperV. Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com> Index: linux.trees.git/drivers/staging/hv/tools/hv_kvp_daemon.c =================================================================== --- /dev/null 1970-01-01 00:00:00.000000000 +0000 +++
2010 Dec 07
0
[PATCH]: A daemon to support HyperV KVP functionality
From: K. Y. Srinivasan <ksrinivasan at novell.com> Subject: An implementation of key/value pair feature (KVP) for Linux on HyperV. Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com> Index: linux.trees.git/drivers/staging/hv/tools/hv_kvp_daemon.c =================================================================== --- /dev/null 1970-01-01 00:00:00.000000000 +0000 +++
2010 Dec 08
0
No subject
This daemon gathers all the guest specific information needed to support = the HyperV KVP functionality. This daemon communicates with the kernel component via a netlink channel. Signed-off-by: ksrinivasan <ksrinivasan at novell.com> --- drivers/staging/hv/tools/hv_kvp_daemon.c | 470 ++++++++++++++++++++++++++= ++++ 1 files changed, 470 insertions(+), 0 deletions(-) create mode 100644
2010 Dec 08
0
No subject
This daemon gathers all the guest specific information needed to support = the HyperV KVP functionality. This daemon communicates with the kernel component via a netlink channel. Signed-off-by: ksrinivasan <ksrinivasan at novell.com> --- drivers/staging/hv/tools/hv_kvp_daemon.c | 470 ++++++++++++++++++++++++++= ++++ 1 files changed, 470 insertions(+), 0 deletions(-) create mode 100644
2010 Dec 17
0
[PATCH 4/4] Staging: hv: Add a user-space daemon to support key/value pair (KVP)
All guest specific data gathering is implemented in a user-mode daemon. The kernel component of KVP passes the "key" to this daemon and the daemon is responsible for passing back the corresponding value. This daemon communicates with the kernel component via a netlink channel. Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com> --- drivers/staging/hv/tools/hv_kvp_daemon.c
2010 Dec 17
0
[PATCH 4/4] Staging: hv: Add a user-space daemon to support key/value pair (KVP)
All guest specific data gathering is implemented in a user-mode daemon. The kernel component of KVP passes the "key" to this daemon and the daemon is responsible for passing back the corresponding value. This daemon communicates with the kernel component via a netlink channel. Signed-off-by: K. Y. Srinivasan <ksrinivasan at novell.com> --- drivers/staging/hv/tools/hv_kvp_daemon.c
2000 Jan 18
0
More NetBSD patches
Here's a unified diff, proposed by Christos Zoulas (with a little reworking to get the configure.in part a bit cleaner). The main target of the patches are NetBSD compatability, although there are some changes making if (pointer X) into if (X != NULL) as well. Christos also proposed a change to Makefile.in, but I'll send that as a seperate mail. Thanks, David Index: configure.in