Displaying 20 results from an estimated 10000 matches similar to: "[Bug 489] New: root login with PublicKeyAuthentication disabled"
2003 May 16
1
[Bug 489] root login with PublicKeyAuthentication disabled
http://bugzilla.mindrot.org/show_bug.cgi?id=489
------- Additional Comments From djm at mindrot.org 2003-05-16 16:30 -------
Could you please attach a debug trace from the server when it fails?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Aug 09
0
[Bug 383] New: PublicKeyAuthentication failure when rlogin set to false
http://cvs-mirror.mozilla.org/webtools/bugzilla/show_bug.cgi?id=383
Summary: PublicKeyAuthentication failure when rlogin set to false
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: AIX
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at
2002 Aug 22
7
[Bug 383] PublicKeyAuthentication failure when rlogin set to false
http://bugzilla.mindrot.org/show_bug.cgi?id=383
------- Additional Comments From markus at openbsd.org 2002-08-23 07:46 -------
what does "rlogin set to false" mean?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2003 Apr 04
5
[Bug 533] sshd failure on Tru64 (OSF/1) 5.1a
http://bugzilla.mindrot.org/show_bug.cgi?id=533
Summary: sshd failure on Tru64 (OSF/1) 5.1a
Product: Portable OpenSSH
Version: 3.6p1
Platform: Alpha
OS/Version: OSF/1
Status: NEW
Severity: critical
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy:
2003 Mar 17
6
[Bug 511] PublickKeyAuthentication failures when account password expires
http://bugzilla.mindrot.org/show_bug.cgi?id=511
Summary: PublickKeyAuthentication failures when account password
expires
Product: Portable OpenSSH
Version: 3.4p1
Platform: All
OS/Version: Solaris
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo:
2002 Oct 16
0
[Bug 383] PublicKeyAuthentication failure when rlogin set to false
http://bugzilla.mindrot.org/show_bug.cgi?id=383
mouring at eviladmin.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |FIXED
------- Additional Comments From mouring at eviladmin.org
2002 Jul 12
0
[Bug 353] New: login failure on tru64
http://bugzilla.mindrot.org/show_bug.cgi?id=353
Summary: login failure on tru64
Product: Portable OpenSSH
Version: -current
Platform: Alpha
OS/Version: OSF/1
Status: NEW
Severity: critical
Priority: P2
Component: ssh
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: weberc at
2002 Feb 18
4
[Bug 120] sshd fails pty chown() when run as non-root userid
http://bugzilla.mindrot.org/show_bug.cgi?id=120
------- Additional Comments From markus at openbsd.org 2002-02-19 04:29 -------
can you allocate ptys as non-root?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2004 Sep 20
3
[Bug 933] compile problem on tru64 5.1A code outside of a #ifdef that should not be included on tru64
http://bugzilla.mindrot.org/show_bug.cgi?id=933
Summary: compile problem on tru64 5.1A code outside of a #ifdef
that should not be included on tru64
Product: Portable OpenSSH
Version: 3.8p1
Platform: Alpha
OS/Version: OSF/1
Status: NEW
Severity: normal
Priority: P2
Component: Build
2006 Sep 10
2
rsyncing as root when root login is disabled?
I'm trying to do a simple rsync:
rsync -av admin@mydomain.com:/backup .
But a number of files in /backup are readable only by
root, and hence rsync gives these errors:
sync: send_files failed to open
"/backup/etc/mail/virtusertable.db": Permission denied
(13)
Since root login is disabled, I can't simple do
'root@mydomain.com'. I searched a bit and saw this:
rsync -av
2002 Feb 18
0
[Bug 120] New: sshd fails pty chown() when run as non-root userid
http://bugzilla.mindrot.org/show_bug.cgi?id=120
Summary: sshd fails pty chown() when run as non-root userid
Product: Portable OpenSSH
Version: 3.0.2p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
2002 Oct 09
1
openssh-3.4p1 built on Tru64 Unix 5.1a - bug with sftpd
Dear openssh-unix-dev;
I recently downloaded the tarball openssh-3.4p1 and built it for my
Tru64 Unix ( OSF/1 ) 5.1a system. My configure statement is:
./configure --prefix=/usr/local/security/tools/openssh-3.4p1 \
--exec-prefix=/usr/local/security/tools/openssh-3.4p1 \
-with-ssl-dir=/usr/local/security/tools/openssl-0.9.6g \
-with-zlib-dir=/usr/local/compress/tools/zlib-1.1.3 \
2006 Dec 05
4
[Bug 1269] PAM Callback returns garbage if user unknown or root with disabled login in ssh-config
http://bugzilla.mindrot.org/show_bug.cgi?id=1269
Summary: PAM Callback returns garbage if user unknown or root
with disabled login in ssh-config
Product: Portable OpenSSH
Version: v4.5p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: PAM support
1999 Oct 21
1
[RHSA-1999:042-01] screen defaults to not using Unix98 ptys
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: screen defaults to not using Unix98 ptys
Advisory ID: RHSA-1999:042-01
Issue date: 1999-10-20
Updated on:
Keywords:
Cross references: screen unix98 pty permissions
---------------------------------------------------------------------
1. Topic:
Screen uses ptys with world
2001 Nov 27
2
3.0.1p1 losing tty modes?
Hello,
openssh-3.0.1p1 appears to transmit and parse tty modes correctly,
but later in the code it uses vhangup() to close all tty references and
reset the tty to default modes. I don't think that vhangup() should be
needed on Unix98 ptys, possibly not even on BSD ptys, and I am probably
wrong, so please tell me where. Of course vhangup() clears all tty modes,
so you need to save them
2013 Jan 05
1
[Bug 805] New: osf iptables[-save] errors
http://bugzilla.netfilter.org/show_bug.cgi?id=805
Summary: osf iptables[-save] errors
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
ReportedBy: blackhole
1996 Mar 23
0
No subject
Announcing Moo-Tiff for FreeBSD 2.1.
Sender: owner-freebsd-announce@FreeBSD.ORG
X-Loop: FreeBSD.org
Precedence: bulk
Moo-Tiff is a 100% compatible port of OSF/Motif 2.0 for FreeBSD 2.1, built
from the official OSF sources and run through the OSF VTS (Validation Test
Suite). If it works with OSF/Motif 2.0 on any platform, it can now work
on FreeBSD 2.1 with Moo-Tiff ! Moo-Tiff is priced at
2004 Apr 02
1
R on Tru64 OSF 5.1
Has anyone achieved a current successful build of R
1.8 or 1.9 or earlier for HPUX Tru 64 OSF 5.1?
There is no binary version of R for HPUX Tru 64 OSF
5.1. The R admin manual mentions that the native make
fails on "Alpha/OSF (aka Tru 64)" and gnu make must be
used instead. There are problems reported with
building R versions around 1.4 from 2002 on R-devel,
some of which were fixed with
2006 Mar 06
0
[Bug 458] New: osf module doesn't always identify operating system
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=458
Summary: osf module doesn't always identify operating system
Product: netfilter/iptables
Version: patch-o-matic
Platform: i386
OS/Version: Mandrake Linux
Status: NEW
Severity: normal
Priority: P2
Component: unknown
AssignedTo:
2013 Jan 31
2
OpenSSH NoPty patch
Hey everyone,
I wanted to add support for denying PTY allocation through OpenSSH. I'm
not certain if this is quite thorough enough for all cases, but for me
it might work for the moment.
I know that you can currently do this through authorized_keys, but as
far as I know that only works for an actual key. In my use case, I
wanted a user with no password which is forced to run a specific