similar to: How do I subscribe to this list?

Displaying 20 results from an estimated 300000 matches similar to: "How do I subscribe to this list?"

2003 Feb 11
2
Subscribe to list
Remote users on external networks unable to connect to the host using F-Secure SSH from their workstations. The Host is installed with openssh-3.4p1 from IBM. Previously the host was installed with F-Secure 1.2.26 and there wasn't any problems. What can we do. I've checked in the sshd_config file and the AllowHosts and Allow Users tags are in there with the host ips and usernames that
2002 Jan 15
1
User-Dependent Identity File
On Tue, Jan 15, 2002 at 06:00:50PM -0000, John Bowman wrote: > > Date: Tue, 15 Jan 2002 17:29:44 +0100 > > From: Markus Friedl <markus at openbsd.org> > > Cc: openssh at openbsd.org > > Content-Type: text/plain; charset=us-ascii > > Content-Disposition: inline > > User-Agent: Mutt/1.3.25i > > > > On Tue, Jan 15, 2002 at 03:46:15PM -0000, John
2005 Jun 12
1
I have a quick question regarding this list.
-- Hello OpenSSH, How do I know if my message has been posted correctly if at all? Unlike other list, I do not get my original message. Is there anyway to check and see if my message was posted correctly (outside of creating another account)?. Thanks! -- Best regards, Victor B. Gonzalez OpenSSH-4.1p1-1 Cygwin 2.457.2.2 Windows XP 5.1 Build 2600
2013 Jan 29
1
Subscribing to list openssh-unix-dev@mindrot.org
Hi, Please could you subscribe me to this list openssh-unix-dev at mindrot.org. BR, Teemu Ahlholm
2002 Mar 15
0
OpenSSH on mips-sony-bsd
Dear developpers, I have some problem with the latest openssh available via CVS. The target host is detected as mips-sony-bsd, SONY NEWS-OS 4.2.1R, which is an old type OS based on 4.3BSD. At first, this system has VSTATUS defined but no _POSIX_VDISABLE which both are used in openbsd-compat/readpassphrase.c. Second, some header files on this OS do not include <sys/types.h> and it causes
2002 Jul 01
0
Revised OpenSSH Security Advisory
This is the 4th revision of the Advisory. This document can be found at: http://www.openssh.com/txt/preauth.adv 1. Versions affected: Serveral versions of OpenSSH's sshd between 2.3.1 and 3.3 contain an input validation error that can result in an integer overflow and privilege escalation. All versions between 2.3.1 and 3.3 contain a bug in the
2002 Jul 01
0
Revised OpenSSH Security Advisory
This is the 4th revision of the Advisory. This document can be found at: http://www.openssh.com/txt/preauth.adv 1. Versions affected: Serveral versions of OpenSSH's sshd between 2.3.1 and 3.3 contain an input validation error that can result in an integer overflow and privilege escalation. All versions between 2.3.1 and 3.3 contain a bug in the
2001 Jan 07
0
Linux glibc 2.1 openpty() and /dev/ptmx
Hello, looking at the pty handling in OpenSSH 2.3.0p1 (hasn't changed much in CVS, as far as I can tell after a quick look at it), I can see that if the system provides both /dev/ptmx and openpty() types of pty interface, the latter is preferred. This is the case on Linux with glibc 2.1.3 and most likely later versions too. However, openpty() is documented to be dangerous - quote from the
2010 Apr 02
1
Extremely weired Thunderbird OpenSSH interaction
Dear OpenSSH developers, first thank you for this great tool! Me and a friend have experienced some seriously crazy interaction between Thunderbird and OpenSSH, the problem is it's not reproducable but as it left definite traces on the server and it could be a serious security problem I still want to report it. so the following happened: My friend is running Ubuntu 9.10 with the new
2010 Mar 23
0
Processed: Re: Processed: ipv6 release goal
Processing commands for control at bugs.debian.org: > ## dear clint. > ## > ## release goals are release goals and not release blockers. > ## please learn the difference and discuss this beforehand. > ## > ## thanks. > ## > > severity 382189 serious > ## > Bug #382189 [nbd-server] no IPv6 support > ## > Severity set to 'serious' from
2003 Apr 30
4
Portable OpenSSH: Dangerous AIX linker behavior (aixgcc.adv)
1. Systems affected: Users of Portable OpenSSH prior to 3.6.1p2 on AIX are affected if OpenSSH was compiled using a non-AIX compiler (e.g. gcc). Please note that the IBM-supplied OpenSSH packages[1] are not vulnerable. 2. Description: The default behavior of the runtime linker on AIX is to search the current directory for dynamic libraries before searching system paths. This is done
2003 Apr 30
4
Portable OpenSSH: Dangerous AIX linker behavior (aixgcc.adv)
1. Systems affected: Users of Portable OpenSSH prior to 3.6.1p2 on AIX are affected if OpenSSH was compiled using a non-AIX compiler (e.g. gcc). Please note that the IBM-supplied OpenSSH packages[1] are not vulnerable. 2. Description: The default behavior of the runtime linker on AIX is to search the current directory for dynamic libraries before searching system paths. This is done
1999 Dec 01
1
[Fwd: Serious Bug Report: OpenSSH]
Can anyone using PAM and rsa-rhosts authentication replicate this? Damien -------------- next part -------------- An embedded message was scrubbed... From: Adrian Baugh <adrian at merlin.keble.ox.ac.uk> Subject: Serious Bug Report: OpenSSH Date: Wed, 1 Dec 1999 02:38:56 +0000 (GMT) Size: 3926 Url:
2008 Nov 21
0
OpenSSH security advisory: cbc.adv
OpenSSH Security Advisory: cbc.adv Regarding the "Plaintext Recovery Attack Against SSH" reported as CPNI-957037[1]: The OpenSSH team has been made aware of an attack against the SSH protocol version 2 by researchers at the University of London. Unfortunately, due to the report lacking any detailed technical description of the attack and CPNI's unwillingness to share necessary
2010 Mar 23
0
Processed: ipv6 release goal
Processing commands for control at bugs.debian.org: > severity 382189 serious Bug #382189 [nbd-server] no IPv6 support Severity set to 'serious' from 'important' > severity 384372 serious Bug #384372 [libadns1] libadns1: Cannot query IPv6 DNS servers Severity set to 'serious' from 'important' > severity 517299 serious Bug #517299 [klibido] klibido: needs
2002 Jun 18
1
ssh-keygen hangs with empty prngd.conf - bug ?
Hi, I use openssh-2.9p2 on an i386 LynxOS system. Since LynxOS does not have support for /dev/[u]random, I installed openssh with prngd support. It so happened by accident on installation that prngd.conf got truncated to zero size. With prngd running as such, ssh-keygen just hangs. I notice similar case with sshd, ssh, ... as all these depend on prngd for random number. SMMEstack# /usr/sbin/sshd
2002 Jul 12
0
[Bug 325] PermitRootLogin forced-commands-only & privsep - not working together
http://bugzilla.mindrot.org/show_bug.cgi?id=325 ------- Additional Comments From hlein at progressive-comp.com 2002-07-13 06:14 ------- Seeing this here too; it appears that when auth2.c:userauth_finish is called, forced_command has been cleared (or perhaps, never set in that forked sshd) so the call to auth_root_allowed(method) returns 0. The following patch makes forced-command logins as
2003 Mar 20
0
Frequently occuring sshd Error message
Hi Marcus, I have OpenSSH_3.5p1, SSH protocols 1.5/2.0, OpenSSL 0x0090700f installed on my Sun 480R server and frequently get the following error messages in the /var/adm/messages file. Someone please help as to how I can prevent these messages from occuring and how serious they are.... Mar 19 17:21:18 last message repeated 39 times Mar 19 17:21:30 sshd[683]: [ID 800047 auth.error] error:
2000 Feb 16
1
a protocol weakness at the user-interface level
I'm afraid I'm not at all involved with OpenSSH development, so perhaps this attack has been discussed in the past. It's something that seems difficult to search for in mailing list archives. I found myself reflecting on the following, mildly serious, protocol weakness at the user-interface level. In a nutshell, the OpenSSH client (at least as of version 1.2.2) fails to provide
2000 Oct 18
0
[SUMMARY] openssh: ld: mismatched ABI
Original question: ----------------- [..] What I am attempting to do is compiling openssh-2.2.0p1 on a C200 running 11.0 64bit. During configure, ld exits from building a test program stating: /usr/ccs/bin/ld: /opt/openssl/lib/libcrypto.a: Not a valid library (invalid magic number). Possibly a 64-bit PA archive library (Mismatched ABI). [..] Solution: -------- Many thanks to Albert C. Smith who