similar to: Testing 1...2..3..

Displaying 20 results from an estimated 400000 matches similar to: "Testing 1...2..3.."

2019 Apr 02
2
Call for testing: OpenSSH 8.0
On Wed, 3 Apr 2019, Adam Eijdenberg wrote: > > From: Damien Miller <djm at mindrot.org> > > Thanks for testing - are you able to see if there's anything in > > the server logs? > > Hi Damien, > > I've been able to reproduce being unable to successfully connect to > EC2 instances launched with either Amazon Linux 2 AMI (HVM) or Amazon > Linux AMI
2019 Apr 02
2
Call for testing: OpenSSH 8.0
On Wed, 3 Apr 2019, Adam Eijdenberg wrote: > On Wed, Apr 3, 2019 at 9:43 AM Damien Miller <djm at mindrot.org> wrote: > > Could you try turning off IPQoS setting (ssh -oIPQoS=none ...) and seeing > > whether that makes any difference? > > Yes - setting -oIPQoS=none on the client allows for a successful > connection to the server. > > Would you still like me
2015 Feb 20
2
Call for testing: OpenSSH 6.8
On Fri, 20 Feb 2015, ?smail D?nmez wrote: > Hi, > > On Fri, Feb 20, 2015 at 12:21 AM, Damien Miller <djm at mindrot.org> wrote: > > Hi, > > > > OpenSSH 6.8 is almost ready for release, so we would appreciate testing > > on as many platforms and systems as possible. This release contains > > some substantial new features and a number of bugfixes. >
2020 Feb 06
2
Call for testing: OpenSSH 8.2
On Wed, 5 Feb 2020, Phil Pennock wrote: > On 2020-02-06 at 10:29 +1100, Damien Miller wrote: > > * sshd(8): allow the UpdateHostKeys feature to function when > > multiple known_hosts files are in use. When updating host keys, > > ssh will now search subsequent known_hosts files, but will add > > updated host keys to the first specified file only. bz2738 >
2011 Aug 17
1
openssh-unix-dev Digest, Vol 100, Issue 3
Works on my netbsd tinkerbox. NetBSD 5.0.2 NetBSD 5.0.2 (GENERIC) It uses rlimit. Privsep sandbox style: rlimit I also get warnings during make. fmt_scaled.c: In function 'scan_scaled': fmt_scaled.c:84: warning: array subscript has type 'char' fmt_scaled.c:111: warning: array subscript has type 'char' fmt_scaled.c:155: warning: array subscript has type 'char'
2016 Feb 15
3
Call for testing: OpenSSH 7.2
On Mon, 15 Feb 2016, Jakub Jelen wrote: > On 02/12/2016 04:56 AM, Damien Miller wrote: > > Hi, > > > > OpenSSH 7.2 is almost ready for release, so we would appreciate > > testing on as many platforms and systems as possible. This release > > contains many bugfixes and several new features. > Hi there, > > Would it be possible to cover also ssh-copy-id
2018 Apr 11
9
[Bug 2856] New: key-options.sh fails when pty /dev/ttyp1 is not owned by testing user
https://bugzilla.mindrot.org/show_bug.cgi?id=2856 Bug ID: 2856 Summary: key-options.sh fails when pty /dev/ttyp1 is not owned by testing user Product: Portable OpenSSH Version: 7.6p1 Hardware: ix86 OS: NetBSD Status: NEW Severity: minor Priority: P5 Component:
2003 Nov 18
5
Testing of recent commits
There have been a few recent commits to portable OpenSSH that require testing. It would be appreciated if you could grab the 20031118 (or later) snapshot and give it a try on your platforms of choice. Ideally, "giving it a try" means running the regress tests, in addition to casual (non-production) use and reporting your experiences back to the list. The more platforms and compile-time
2003 Dec 22
0
openssh-unix-dev Digest, Vol 8, Issue 15
I think what Mr. Farr is referring to is keychain support. Keychain is provided as part of OS X. Apple published an API for it. An OS X compile would store and retrieve keys from Keychain in lieu/addition to the SSH Agent. Keychain is to OS-X what the ssh-agent is to ssh. This makes perfect sense, and I haven't been sufficiently peeved to do this yet, but I have dreamt of this myself. It
2002 Jun 26
0
[kouril: Re: [Fwd: Kerberos buglet in OpenSSH-3.3p1]]
resending to the whole mailing list .. ----- Forwarded message from kouril ----- Date: Wed, 26 Jun 2002 11:50:14 +0200 To: Damien Miller <djm at mindrot.org> Subject: Re: [Fwd: Kerberos buglet in OpenSSH-3.3p1] User-Agent: Mutt/1.2.5i In-Reply-To: <1025084114.12959.0.camel at mothra.mindrot.org>; from djm at mindrot.org on Wed, Jun 26, 2002 at 07:35:14PM +1000 On Wed, Jun 26, 2002 at
2024 Mar 06
2
Call for testing: OpenSSH 9.7
On Tue, 5 Mar 2024, The Doctor wrote: > Showstopper problem! > > I want configure to work with /usr/local/bin/openssl and not /usr/bin/openssl You can use --with-ssl-dir for this. --with-ssl-dir=/foo will have configure try /foo/bin/openssl and /foo/apps/openssl. Otherwise it just searches $PATH. Nothing has changed here for the last couple of releases. -d
2023 Mar 10
3
Call for testing: OpenSSH 9.3
Hi, OpenSSH 9.3p1 is almost ready for release, so we would appreciate testing on as many platforms and systems as possible. This is a bugfix release. Snapshot releases for portable OpenSSH are available from http://www.mindrot.org/openssh_snap/ The OpenBSD version is available in CVS HEAD: http://www.openbsd.org/anoncvs.html Portable OpenSSH is also available via git using the instructions at
2015 Feb 27
3
Call for testing: OpenSSH 6.8
On Sat, 28 Feb 2015, Tom G. Christensen wrote: > On 19/02/15 23:21, Damien Miller wrote: > > OpenSSH 6.8 is almost ready for release, so we would appreciate testing > > on as many platforms and systems as possible. > > > > I've now tested using revision 1ad3a77 and it passes the testsuite on Solaris > 2.6, 7, 8 and 9 (using gcc and openssl 1.0.1k). > >
2024 Jun 17
1
OpenSSH server doesn't log client disconnect without SSH_MSG_DISCONNECT
On Fri, 14 Jun 2024, Opty wrote: > On Tue, Jun 11, 2024 at 1:24?PM Opty <opty77 at gmail.com> wrote: > > On Wed, Jun 5, 2024 at 3:14?PM Opty <opty77 at gmail.com> wrote: > > > On Wed, Jun 5, 2024 at 6:03?AM Damien Miller <djm at mindrot.org> wrote: > > > > We need to decide whether to promote these log messages to INFO. > > > > > >
2012 Feb 13
8
Call for testing: OpenSSH-6.0
Hi, OpenSSH 6.0 is almost ready for release, so we would appreciate testing on as many platforms and systems as possible. This release contains a couple of new features and changes and bug fixes. Testing of the new sandboxed privilege separation mode (see below) would be particularly appreciated. Snapshot releases for portable OpenSSH are available from http://www.mindrot.org/openssh_snap/ The
2024 Mar 06
2
Call for testing: OpenSSH 9.7
On Thu, 7 Mar 2024 at 02:19, Damien Miller <djm at mindrot.org> wrote: > > > > On Tue, 5 Mar 2024, The Doctor wrote: > > > Showstopper problem! > > > > I want configure to work with /usr/local/bin/openssl and not /usr/bin/openssl > > You can use --with-ssl-dir for this. --with-ssl-dir=/foo will have > configure try /foo/bin/openssl and
2016 Jul 22
2
Call for testing: OpenSSH 7.3
On Fri, Jul 22, 2016 at 2:51 PM, The Doctor <doctor at doctor.nl2k.ab.ca> wrote: > On Fri, Jul 22, 2016 at 02:40:04PM +1000, Damien Miller wrote: [...] >> OpenSSH 5.3 is almost ready for release, so we would appreciate testing > ^ > Huh? Either a clone of Damien has been frozen Austin Powers style since 2009 and has only just been thawed out or maybe it
2015 Feb 24
2
Call for testing: OpenSSH 6.8
On Tue, 24 Feb 2015, Kevin Brott wrote: > > On Mon, Feb 23, 2015 at 4:53 PM, Damien Miller <djm at mindrot.org> wrote: > > This should fix it: > > diff --git a/regress/netcat.c b/regress/netcat.c > index 84efe11..4b8c51c 100644 > --- a/regress/netcat.c > +++ b/regress/netcat.c > [sniip] > > > > This patch
2013 Jul 31
1
openssh-unix-dev Digest, Vol 123, Issue 13
> > Message: 8 > Date: Tue, 30 Jul 2013 12:46:50 -0700 > From: Iain Morgan <imorgan at nas.nasa.gov> > To: Damien Miller <djm at mindrot.org> > Cc: "openssh-unix-dev at mindrot.org" <openssh-unix-dev at mindrot.org> > Subject: Re: Call for testing: OpenSSH-6.3 > Message-ID: <20130730194649.GC18047 at linux124.nas.nasa.gov> >
2017 Sep 29
3
Call for testing: OpenSSH 7.6
On Fri, 29 Sep 2017, Iain Morgan wrote: > Actually, according to OpenBSD's printenv(1) man page, it first appeared > in 2BSD. The man page on OS X claims it was BSD 3.0. However, it doesn't > appear to be part of any standard. > > Your suggestion ran into the same issue as the original test, but > escaping the evaluation by the user's shell appears to work: >