Displaying 20 results from an estimated 40000 matches similar to: "[Bug 301] In openssh 3.3 and 3.4 pam session seems be called from non-root"
2002 Jun 26
0
[Bug 301] New: In openssh 3.3 and 3.4 pam session seems be called from non-root
http://bugzilla.mindrot.org/show_bug.cgi?id=301
Summary: In openssh 3.3 and 3.4 pam session seems be called from
non-root
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: Linux
Status: NEW
Severity: critical
Priority: P3
Component: sshd
AssignedTo:
2002 Jun 26
1
[Bug 301] In openssh 3.3 and 3.4 pam session seems be called from non-root
http://bugzilla.mindrot.org/show_bug.cgi?id=301
------- Additional Comments From ldv at altlinux.org 2002-06-27 03:09 -------
In your case, to make pam_limits work,
use "ulimit -Sc 0" instead of "ulimit -c 0".
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Oct 16
0
[Bug 83] PAM limits applied incorrectly (pam_session being called as non-root)
http://bugzilla.mindrot.org/show_bug.cgi?id=83
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |misiek at pld.org.pl
Summary|PAM limits applied |PAM limits applied
|incorrectly
2003 Mar 10
10
[Bug 83] PAM limits applied incorrectly (pam_session being called as non-root)
http://bugzilla.mindrot.org/show_bug.cgi?id=83
------- Additional Comments From djm at mindrot.org 2003-03-10 15:49 -------
Created an attachment (id=247)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=247&action=view)
Call pam_session after child fork()
Hopefully this patch will allow people to gather the feedback necessary to
close this bug.
------- You are receiving this
2003 Jun 18
1
[Bug 598] case sensitive in host matching
http://bugzilla.mindrot.org/show_bug.cgi?id=598
Summary: case sensitive in host matching
Product: Portable OpenSSH
Version: -current
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: openssh-bugs at mindrot.org
ReportedBy: misiek at
2003 Mar 27
1
[Bug 523] ssh saves only host/ip information in known_hosts while port information is missing
http://bugzilla.mindrot.org/show_bug.cgi?id=523
Summary: ssh saves only host/ip information in known_hosts while
port information is missing
Product: Portable OpenSSH
Version: 3.5p1
Platform: Other
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
2002 Jun 30
2
Password auth problem with openssh 3.4 and Linux 2.2.20
After upgrading to openssh-3.4p1, password authentication is no longer
working on my system. I'm running Linux RedHat 6.2 with:
kernel 2.2.20
openssh-3.4p1
openssl-0.9.6
pam-0.72-6
pwdb-0.61-0
I've tried it with and without compression, with and without priv sep, and I
always get errors like this:
Jun 30 19:07:48 sugarfreejazz sshd[1344]: Failed password for randy from
10.10.10.2 port
2004 Apr 28
1
[Bug 855] doesn't properly log logout event in utmp entry when pts bigger than 999
http://bugzilla.mindrot.org/show_bug.cgi?id=855
Summary: doesn't properly log logout event in utmp entry when pts
bigger than 999
Product: Portable OpenSSH
Version: 3.8p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo:
2002 Nov 17
0
NT_STATUS_ACCESS_DENIED with smbclient
Hi,
the problem is that when doing smbclient -L user I'm getting
NT_STATUS_ACCESS_DENIED. ,,user'' is using win xp and I can view
his shares from other _windows_ computer but not with smbclient.
Any ideas why?
[misiek@arm ~]$ smbclient -L lookas -d4
Serverzone is -3600
Initialising global parameters
params.c:pm_process() - Processing configuration file "/etc/samba/smb.conf"
2000 Oct 21
2
scp and regstarting transfer
Hi,
I have one question. Is someone working on restarting transfers ability in scp ?
This will be nice feature especially when you want to download huge file and
you will lost connection (at 90%, 600MB file as I had) :-(
--
Arkadiusz Mi?kiewicz http://www.misiek.eu.org/ipv6/
PLD GNU/Linux [IPv6 enabled] http://www.pld.org.pl/
2001 Feb 17
2
Important fix (sshd && binding). Portable version only.
If bind() fails we _always_ should close socket. I sent this patch while ago
to djm but I still don't see this fix in openssh_cvs.
diff -urN openssh-2.3.0p1.org/sshd.c openssh-2.3.0p1/sshd.c
--- openssh-2.3.0p1.org/sshd.c Sat Jan 6 19:54:11 2001
+++ openssh-2.3.0p1/sshd.c Sat Jan 6 19:55:48 2001
@@ -782,10 +782,10 @@
debug("Bind to port %s on %s.", strport, ntop);
/*
2000 Mar 07
0
ANNOUNCE: openssh-1.2.2p1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
This is a patch release which contains fixes to all the problems
which have been reported over the last month.
Most importantly: OpenSSL-0.9.5 has exposed a bug in RSA key
generation on systems which lack a /dev/random (Solaris, HPUX,
SCO). On such systems this port was not properly initialising
OpenSSL's entropy pool. This results in lower
2000 May 17
4
Openssh-2.1.0p1 test release
This to announce a test release of 2.1.0p1 before making it widely
available.
This release includes many fixes to problems reported over the last
week. In particular:
- spurious error and coredumps caused by the inbuilt entropy gathering
- RSAref detection
- Compilation fixes for Solaris and others
It also contains (completely untested) support for compiling without
RSA support. This may be
2002 Oct 16
0
[Bug 84] last command provides incorrect information on Solaris 8
http://bugzilla.mindrot.org/show_bug.cgi?id=84
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |misiek at pld.org.pl
------- Additional Comments From djm at mindrot.org 2002-10-16 13:08 -------
*** Bug 301 has been marked as a
2005 Jul 31
1
xen 3.0 on UP amd64 - rootfs mounting problem in xenU
Hi,
I''m trying to run Xen 3.0 on my amd64 UP machine. So far xen0 is working fine
but there is a problem with mounting rootfs on xenU kernel.
Is there something else that needs to be compiled into xenU 3.0 kernel?
$ grep XEN kernel-xenU-x86_64-3.0.config
CONFIG_XEN=y
CONFIG_ARCH_XEN=y
# XEN
# CONFIG_XEN_PRIVILEGED_GUEST is not set
# CONFIG_XEN_PHYSDEV_ACCESS is not set
2003 Mar 27
1
[Bug 454] SSH doesn't consider distinguish ports for host-key verification
http://bugzilla.mindrot.org/show_bug.cgi?id=454
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |misiek at pld.org.pl
------- Additional Comments From djm at mindrot.org 2003-03-27 21:35 -------
*** Bug 523 has been marked as a
2005 Sep 22
2
repeatable disconnections when rsyncing over ssh
Hi,
I have a problem with rsyncing large data sets (consisting bunch of small
files) over ssh.
rsync 2.6.6 on both sides. Linux 2.6.10 on receiving side, 2.6.12.6 on sending
side.
This strace is from rsyncing over 2Mbit link but I can repeat it over 100Mbps
lan, too (while testing on lan 2.6.11.3 was on sending and 2.6.12.6 on
receiving side).
I wonder what can be problem here? Some
2003 Jan 07
0
[Bug 83] PAM limits applied incorrectly (pam_session being called as non-root)
http://bugzilla.mindrot.org/show_bug.cgi?id=83
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |rudolph at getsystems.com
------- Additional Comments From djm at mindrot.org 2003-01-07 18:31 -------
*** Bug 354 has been marked as a
2003 May 16
0
[Bug 83] PAM limits applied incorrectly (pam_session being called as non-root)
http://bugzilla.mindrot.org/show_bug.cgi?id=83
djm at mindrot.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Component|sshd |PAM support
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2003 Sep 15
0
[Bug 83] PAM limits applied incorrectly (pam_session being called as non-root)
http://bugzilla.mindrot.org/show_bug.cgi?id=83
------- Additional Comments From dtucker at zip.com.au 2003-09-15 12:13 -------
Hey, isn't this fixed in -current? do_pam_session is now called before
permanently_set_uid.
Could you please try a snapshot?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.