Displaying 20 results from an estimated 6000 matches similar to: "openssh 3.4p1 and 3.5p1 with Tru64"
2002 Oct 08
2
tru64 unix openssh-3.4p1 problems
Hi,
I'm attempting to get openssh-3.4p1 up and running on our DEC/Compaq
Alpa workstations.
They are running Tru64 Unix 5.1A. I compile the package myself.
Openssh-3.1 worked perfectly, with the default sshd_config file.
Openssh-3.4p1 works, if I set UsePrivilegeSeparation to "no" in the
sshd_config file.
NOTE: I have a secondary issue with the ListenAddress default setting
2003 Sep 19
1
configure fixes for Tru64 UNIX V4.0x
1) Testing of uidswap.c on a Tru64 UNIX V4.0G PK4 (BL22) machine shows the
following defines to be required for correct uid changing semantics:
#define BROKEN_SETREGID 1
#define BROKEN_SETREUID 1
#define SETEUID_BREAKS_SETUID 1
Failure to fix these contributes to breaking privilege separation
(in a safe way: connections will fail while UsePrivilegeSeparation=yes,
thanks to
2002 Aug 28
0
patch almost works on 5.1A openssh 3.4p1 - get in, but get kicked out (fwd)
Hi-
I applied the privsep patch to Tru64 5.1A openssh 3.4p1 and it
*almost* works.
I get in from the client side and xauth is run, but in the meantime
the server side disconnects. Running sshd in debug mode level 3 gives
the following output:
.
.
.
debug1: session_input_channel_req: session 0 req shell
debug1: fd 5 setting TCP_NODELAY
debug1: channel 0: rfd 13
2002 Nov 10
0
[Bug 429] SSH 3.4p1 problems on Tru64 V4.0D & Tru64 V4.0F
http://bugzilla.mindrot.org/show_bug.cgi?id=429
mouring at eviladmin.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |DUPLICATE
Summary|SSH 3.4p1 problems on Tru64 |SSH 3.4p1 problems
2002 Oct 15
1
3.4p1 Error on Tru64 Unix - cannot set login uid
Hi,
I have recently loaded Openssh 3.4p1 on an Tru64 Unix 5.1A system.
I followed the installation instructions described in INSTALL, essentially
using all default settings, and it went throught without any obvious errors.
I can then use the root account to initiate outbound and inbound ssh calls,
and can log on without any problems.
The trouble is that when I try to use ssh to log in (from a
2002 Nov 06
0
[Bug 429] New: SSH 3.4p1 problems on Tru64 V4.0D & Tru64 V4.0F
http://bugzilla.mindrot.org/show_bug.cgi?id=429
Summary: SSH 3.4p1 problems on Tru64 V4.0D & Tru64 V4.0F
Product: Portable OpenSSH
Version: 3.4p1
Platform: Alpha
OS/Version: OSF/1
Status: NEW
Severity: major
Priority: P2
Component: ssh
AssignedTo: openssh-unix-dev at mindrot.org
2002 Aug 28
1
interested tru64 unix person - privsep patch against 3.4p1 + howto /regress
Hi-
Unfortunately, I just found out about the patch that was available for
tru64 privsep. I was entirely unaware that there was a lack of support.
Will the patch be considered for approval if it is applied to 3.4p1, or does
it have to be done against -current? The reason I'm asking is that I
have 3.4p1 working as is, so I know if I have a problem it is likely
related to the patch and not
2002 Oct 09
1
openssh-3.4p1 built on Tru64 Unix 5.1a - bug with sftpd
Dear openssh-unix-dev;
I recently downloaded the tarball openssh-3.4p1 and built it for my
Tru64 Unix ( OSF/1 ) 5.1a system. My configure statement is:
./configure --prefix=/usr/local/security/tools/openssh-3.4p1 \
--exec-prefix=/usr/local/security/tools/openssh-3.4p1 \
-with-ssl-dir=/usr/local/security/tools/openssl-0.9.6g \
-with-zlib-dir=/usr/local/compress/tools/zlib-1.1.3 \
2002 Aug 28
2
Tru64 patch won't make it into 3.5 due to lack of interest.
Tru64 patch will not make it into 3.5 (this is final) due to lack of
willing people to test. I have given the Tru64/osf1 community almost a
month to test it. And *ONE* person came forward to give me verification.
And don't give me shit about "I don't have time." The person who tested
it was LEAVING his employer with Tru64. He found time.
IT IS YOUR GAWD DAMN PLATFORM. IF
2002 Aug 14
1
[Bug 353] login failure on tru64
http://cvs-mirror.mozilla.org/webtools/bugzilla/show_bug.cgi?id=353
------- Additional Comments From Wayne.Corelli at hp.com 2002-08-14 23:56 -------
A temporary work around is to set "UsePrivilegeSeparation no" in sshd_config
althought this disables all the "enhanced security" features.
Would someone PLease address this!!!
------- You are receiving this mail
2002 Jul 12
0
[Bug 353] New: login failure on tru64
http://bugzilla.mindrot.org/show_bug.cgi?id=353
Summary: login failure on tru64
Product: Portable OpenSSH
Version: -current
Platform: Alpha
OS/Version: OSF/1
Status: NEW
Severity: critical
Priority: P2
Component: ssh
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: weberc at
2002 Jun 27
0
[Bug 306] New: ssh on Tru64 returns " Name does not resolv to supplied parameters"
http://bugzilla.mindrot.org/show_bug.cgi?id=306
Summary: ssh on Tru64 returns " Name does not resolv to supplied
parameters"
Product: Portable OpenSSH
Version: -current
Platform: Alpha
OS/Version: OSF/1
Status: NEW
Severity: normal
Priority: P2
Component: ssh
2002 Aug 29
3
tru64 patch: openssh-SNAP-20020826.tar.gz does not contain 'configure', so how to build?
Hi-
Since the tru64 patch was designed for -current, I thought I would try
to build it with a recent snapshot before backporting to 3.4p1.
So I downloaded openssh-SNAP-20020826.tar.gz frpm the portable snapshots, but it
does not contain the 'configure' script. I tried copying the 'configure' from
3.4p1, but that does not create a Makefile from the Makefile.in.
Where are the
2002 Aug 28
5
Tru64 privsep patch testing
OK, I got a chance to try out the Tru64 patch for privsep. I applied the patch
to 3.4p1. Partial success, in that it now works for me for logins to "root".
Logins to ordinary accounts fail after authentication, when trying to set tty
characteristics. See the excerpt from the debug messages below. This is for
Tru64 V4.0F (with enhanced_security turned on, obviously.) I guess it's time
2003 Apr 04
5
[Bug 533] sshd failure on Tru64 (OSF/1) 5.1a
http://bugzilla.mindrot.org/show_bug.cgi?id=533
Summary: sshd failure on Tru64 (OSF/1) 5.1a
Product: Portable OpenSSH
Version: 3.6p1
Platform: Alpha
OS/Version: OSF/1
Status: NEW
Severity: critical
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy:
2004 Sep 20
3
[Bug 933] compile problem on tru64 5.1A code outside of a #ifdef that should not be included on tru64
http://bugzilla.mindrot.org/show_bug.cgi?id=933
Summary: compile problem on tru64 5.1A code outside of a #ifdef
that should not be included on tru64
Product: Portable OpenSSH
Version: 3.8p1
Platform: Alpha
OS/Version: OSF/1
Status: NEW
Severity: normal
Priority: P2
Component: Build
2002 Aug 11
4
OSF/1 or Tru64 patch for Privsep
Either this never made it to the list or no one cares about Tru64. This
is the last time I'll send this patch to the list. If no one steps up and
finishes it or provides me with enough information to fix any remaining
bugs (one being complaint that 'ssh site cmd' does not work right).
If there is no activity on this for a week. I'll post it to bugzilla and
will ignore any
2002 Jan 02
1
Building R-1.4 on Tru64
Hello everyone,
I've just attempted to build R-1.4 on Compaq Tru64 (I'll enclose the
text from bug.report() from R-1.3.1 at the end.) The relevant part of
the log is below.
Any ideas?
gcc -shared -o methods.so do_substitute_direct.o
methods_list_dispatch.o method_meta_data.o slot.o -L/usr/local/lib
/usr/ucb/ld:
Warning: Unresolved:
TYPEOF
Rf_error
Rf_protect
Rf_substitute
2002 Aug 01
0
Tru64 and OSF/1 Privsep patch
Ok.. I need wider testing for this. I'm getting reports back it works
mostly. 'ssh site ls' fails, but they can login with Privsep enbled.
Can I get those who are using Tru64 or OSF/1 that have SIA enabled to
test? This should apple to either -cvs or the current snapshot (I would
perfer not to use 3.4p1 due to bugs).
I'm going on a trip next week and will be around very spotty
2002 Jun 27
1
No TTY prealloc; Tru64 can't do post-auth privsep
Well, after digging around and thinking some more, I'm giving up on the
idea of preallocating a TTY to get post-auth privsep working on Tru64.
I don't think it will work, because just allocating a TTY doesn't fix
the problem - there's no valid way to tie that TTY back to the client
process (because it hasn't requested a TTY yet and may not ever do so).
The problem is that the