Displaying 20 results from an estimated 9000 matches similar to: "memset suggestion."
2003 Mar 21
4
3.6 portable ready.
The Cray and tru64 patches I have, have been applied. Unless there is any
major "oh my god it does not work". I believe 3.6 should now be ready for
release soon.
I'd like to thank everyone for providing feedback on the status of
their their platform. Hopefully, we have not missed any platform that is
commonly used.
- Ben
2019 Jan 24
5
sftp Vs scp
On Jan 24 03:47, Malcolm wrote:
> Quoting Chris High <highc at us.ibm.com>:
>
> > caught my eye. Do you see any 'advantage' to using sftp with an untrusted
> > server? If so, any thoughts about making an easy way to disable scp both
> > client and server side when doing an installation?
>
> SFTP allows file resume, while scp does not. If this
2000 Sep 16
15
Snapshot
Quite a few changes here, please test.
http://www.mindrot.org/misc/openssh/openssh-SNAP-20000916.tar.gz
-d
20000916
- (djm) New SuSE spec from Corinna Vinschen <corinna at vinschen.de>
- (djm) Update CygWin support from Corinna Vinschen <vinschen at cygnus.com>
- (djm) Use a real struct sockaddr inside the fake struct sockaddr_storage.
Patch from Larry Jones <larry.jones at
2000 Nov 17
8
To Do list...
This is just portable todo list. From the sounds of it Markus has his own
to do list. But can everyone review and let me know if there is anything
missing from this list. (Note.. I'm not looking for 'SSH should support
XYZ feature.' unless it's directly related to portability.) Or if there
is anything on this list that has been completed. (Namely Tru64 SIA
support?)
Thanks.
2001 Apr 28
1
Cygwin and sshd (fwd)
---------- Forwarded message ----------
Date: Sat, 28 Apr 2001 13:12:47 -0400
From: Brandon Barker <bebarker at meginc.com>
To: openssh at openssh.com
Subject: Cygwin and sshd
Is it possible to compile and run sshd on win32 with cygwin? When I trie to ./configure and make and make install, only the client programs are produced.
Thanks,
Brandon Barker
2001 Feb 22
11
Lets try this push again.. 2.5.1p2 bugs left.
Things that are still outstanding:
1) Solaris/Redhat/HPUX session.c patch. I've not seen a ya or na on
Kevin's pam patch from the Solaris group.
2) Odd Redhat/Debian scp/ssh issues. .. I'm baffled, and I can't
replicate the bug. Nor have I seen anything remotely like it reported.
3) SCO.. Is it happy yet for compiling? =)
Completed:
1) mdoc2man.pl .. Commited into
2002 Feb 20
11
Call for testing.
Recently we made somemajor changes to do_child() in
OpenSSH -current. Those changes included splitting it up
into smaller chunks to help with readability and also to
extract out IRIX and AIX specific code to reduce the number
of lines in our diffs against the OpenSSH tree.
I need people to do some testing on different platforms to ensure
that all the right #ifdef/#endif bits got put back in
2001 Apr 24
10
Call for testing for coming 2.9 release.
If we can get people to test their platforms against the last snapshot/cvs
tree I'd be greatful. (http://www.openssh.com/portable.html)
I know NeXT platform has problems. I'm going to spend tonight looking at
it.
Also, take a moment to see what manpage type ./configure decided for your
system and if it's 'cat' please let us know.
Thanks.
- Ben
2002 Jul 17
13
Testing Call
Ok.. I'm starting official testing calls early this release. I'd like to
have more feedback and more time for handling fixes.
If people could test snapshots (http://www.openssh.org/portable.html, pick
your favorate mirror and select snapshots directory) and report failures
it would be useful.
For those with pmake install there is regress/ which you can try out. It
may help any platform
2002 Jun 11
4
ssh setuid changes.
Ok, I'm doing a heads up here.
I just applied:
- markus at cvs.openbsd.org 2002/06/11 04:14:26
[ssh.c sshconnect.c sshconnect.h]
no longer use uidswap.[ch] from the ssh client
run less code with euid==0 if ssh is installed setuid root
just switch the euid, don't switch the complete set of groups
(this is only needed by sshd). ok provos@
A few comments about
2003 Apr 30
2
Portable OpenSSH 3.6.1p2
OpenSSH 3.6.1p2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly. This is a release
of the Portable version only.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support and encouragement.
Changes
2003 Apr 30
2
Portable OpenSSH 3.6.1p2
OpenSSH 3.6.1p2 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly. This is a release
of the Portable version only.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support and encouragement.
Changes
2002 Jun 21
2
Testing call.
Can I have people test the cvs tree or the next snapshots.
I believe NeXT is still broken (I will try to compile it tonight).
getopts patch will be applied, but I can't find the email address of who
sent to me (can you email me off list, thanks).
- Ben
2002 Aug 11
4
OSF/1 or Tru64 patch for Privsep
Either this never made it to the list or no one cares about Tru64. This
is the last time I'll send this patch to the list. If no one steps up and
finishes it or provides me with enough information to fix any remaining
bugs (one being complaint that 'ssh site cmd' does not work right).
If there is no activity on this for a week. I'll post it to bugzilla and
will ignore any
2002 Jun 26
3
OpenSSH 3.4 released
OpenSSH 3.4 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support and encouragement.
Changes since OpenSSH 3.3:
============================
2002 Sep 23
19
Call for testing for 3.5 OpenSSH
OpenBSD tree is heading into a lock and this includes OpenSSH. So we are
winding up for a 3.5 release. If we can get people to test the current
snapshots and report any problems that would improve the odds that your
platform won't be broke for 3.5.
Issues I know off of right now.
1. I can't test NeXT. So I TRULY need someone in that community to test
for me. Last I heard there was
2002 Jun 25
10
Last call.
Outside the pre-auth patch by Markus to fix Cygwin and a few other
platforms.
SEND ME (privately) ANY required patch against the lastest snapshot.
I'm doing the final commits this evening.
Patches that have been temporary rejected for this release.
- Owl's full patch for SysV Shm if mmap fails
- mmap() on /dev/zero
- mmap() on sparse file
.. Not looked at the BSD/OS 5.0 patch
2002 Mar 07
3
OpenSSH 3.1 released
OpenSSH 3.1 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support and encouragement.
Important Changes:
==================
- /etc/ssh/ now default
2002 Mar 07
3
OpenSSH 3.1 released
OpenSSH 3.1 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support and encouragement.
Important Changes:
==================
- /etc/ssh/ now default
2002 Jun 21
6
OpenSSH 3.3 released
OpenSSH 3.3 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued
support and encouragement.
Changes since OpenSSH 3.2.3:
============================