Displaying 20 results from an estimated 400 matches similar to: "FW: pam headers not found : openssh3.8p1 install fails"
2017 Feb 16
2
Unsigned int displaying as negative
Tim, yes, I am on a very unique architecture, just about every instruction
has a signed and unsigned operation (ie, adds, addu, subs, subu, etc...)
and we handle signed and unsigned somewhat differently.
I'm not sure how we'll handle this yet, very worst case scenario is to
propagate the info from clang but that's not ideal, obviously.
Thanks for all the replies!
On Wed, Feb 15,
2009 Aug 12
2
Restrict a client port-forward to 1 port
Hi,
Is it possible to restrict a client port-forwarding to one port?
For example i want client X to open only port 1037 on server through
port-forwarding, client Y only port 1038 and so on...
How can this be possible?
I use private/public keys authentication.
Client version is openssh3.8p1, is windows client, and server version
is latest openssh on a linux machine.
Can anyone help please?
Thank
2020 Jan 23
0
dbus/systemd failure on startup (CentOS 7.7)
> We are seeing a problem that occurs ~5% of the time when rebooting
I see such issues on a quite large multi user system but when this
happens, after forced restarts for kernel updates, I usually don't have
the time to analyze and play doctor on it. My "solution" now is to simply
reboot the server again in such a case, AKA the systemd way :-)
> CentOS 7.7 where systemd gets
2004 May 11
1
openssh3.8p1 passwd -f for uid's longer than 8 char problem
Hi !
Solaris 5.8 Generic_108528-19 sun4u sparc SUNW,Ultra-60
Putty 0.53b
sshd version OpenSSH_3.8p1, OpenSSL 0.9.7d 17 Mar 2004
While using passwd -f for uid 10 char long, I'm not able to logon again to
change password because uid is truncated to 8 char.
Incoming packet type 14 / 0x0e (SSH1_SMSG_SUCCESS)
Event Log: Allocated pty
Outgoing packet type 12 / 0x0c (SSH1_CMSG_EXEC_SHELL)
Event
2020 Jan 23
0
dbus/systemd failure on startup (CentOS 7.7)
> Simon Matter via CentOS wrote:
>>
>>> We are seeing a problem that occurs ~5% of the time when rebooting
>>
>> I see such issues on a quite large multi user system but when this
>> happens, after forced restarts for kernel updates, I usually don't have
>> the time to analyze and play doctor on it. My "solution" now is to
>> simply
2020 Jan 22
3
dbus/systemd failure on startup (CentOS 7.7)
We are seeing a problem that occurs ~5% of the time when rebooting
CentOS 7.7 where systemd gets a 'Connection timed out' to D-Bus just
after the D-Bus service starts - from 'journalctl -x' :
...
Jan 21 16:09:59 linux7-7.mpc.local systemd[1]: Started D-Bus System
Message Bus.
-- Subject: Unit dbus.service has finished start-up
-- Defined-By: systemd
-- Support:
2020 Jan 23
2
dbus/systemd failure on startup (CentOS 7.7)
Simon Matter via CentOS wrote:
>
>> We are seeing a problem that occurs ~5% of the time when rebooting
>
> I see such issues on a quite large multi user system but when this
> happens, after forced restarts for kernel updates, I usually don't have
> the time to analyze and play doctor on it. My "solution" now is to simply
> reboot the server again in such a
2003 Mar 24
16
[Bug 517] bad "put" arg parsing
http://bugzilla.mindrot.org/show_bug.cgi?id=517
Summary: bad "put" arg parsing
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sftp
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: djm at
2003 Dec 17
3
Fedora FC1 RPMs
I've spent the morning looking at making some RPMs for Fedora Core 1
and run into a problem with GSSAPI. Basically the default install of
Fedora doesn't come with the necessary gssapi code to build the RPMs by
default (i.e. you need to say %define kerberos5 0 in openssh.spec).
Since Fedora is going to fork off from RedHat I was going to create a
set of patches to make a
2004 Sep 30
0
Building wine-i386 on x86_64 linux
Hi,
I'm trying to build Wine as a 32 bit program on my x86_64 machine,
running Fedora Core 2. I downloaded Wine-20040914.tar.gz specified that
I wanted to use the 32-bit compilers with:
CC=/usr/bin/i386-redhat-linux7-gcc
CXX=/usr/bin/i386-redhat-linux7-g++ CPP_FLAGS=-m32 CXXFLAGS=-m32
./configure
I then did make depend and make, and everything appears to be being
built with the correct
2002 Apr 11
3
getting OpenSSH/OpenSSL to utilize /dev/random
I've installed Sun's SUNWski package on Solaris 8 (32-bit) that provides a
/dev/random interface. It appears to as cat'ing it gives me a bunch of
well, random data.
However, when I ran my configure, it gives me the WARNING.RND message to the
effect that I'm using the built-in. I've seen allusions on this list to
building openssl with to get random support, so I rebuilt it
2003 Oct 29
2
OpenSSH and Redhat 8
John,
The following steps should work for you (or anyone buildling on a
RedHat box):
1) Get the official OpenSSH source RPM from
ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/rpm/SRPMS/openssh-3.7.1p2-1.src.rpm
2) Do 'rpmbuild --rebuild ./openssh-3.7.1p2-1.src.rpm' from where you
saved the file.
3) This should create the following files in /usr/src/redhat/RPMS/i386:
2004 Aug 16
3
[Bug 912] PATCH: Fix head(1) call in regress/yes-head.sh
http://bugzilla.mindrot.org/show_bug.cgi?id=912
Summary: PATCH: Fix head(1) call in regress/yes-head.sh
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: Miscellaneous
AssignedTo: openssh-bugs at mindrot.org
2019 Jan 18
0
[klibc:master] mips/mips64: simplify crt0 code
Commit-ID: 59f3f33338f371b3a30163406fbb5fe323503939
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=59f3f33338f371b3a30163406fbb5fe323503939
Author: James Cowgill <james.cowgill at mips.com>
AuthorDate: Fri, 2 Mar 2018 08:33:02 -0800
Committer: Ben Hutchings <ben at decadent.org.uk>
CommitDate: Wed, 2 Jan 2019 03:08:04 +0000
[klibc] mips/mips64: simplify
2004 Jan 21
5
Release testing
Hi,
We are planning on releasing the next version of OpenSSH in a couple
of weeks. As always, we would like to see it tested as widely as
possible before this happens.
We would therefore like you to test the latest snapshots (20030122
and later) on as many machines that you have access to. Ideally
this testing should include running the regress tests and use of
the snapshots in a
2004 Mar 03
8
[Bug 806] openssh after 3.6.1p1 can not authenticate via public rsa2 key
http://bugzilla.mindrot.org/show_bug.cgi?id=806
Summary: openssh after 3.6.1p1 can not authenticate via public
rsa2 key
Product: Portable OpenSSH
Version: 3.8p1
Platform: HPPA
OS/Version: HP-UX
Status: NEW
Severity: major
Priority: P2
Component: ssh
AssignedTo: openssh-bugs at
2003 Aug 26
6
Bad packet length error
Hi,
I am running sshd (openssh-2.9p2) on a power-pc LynxOS box, and am
connecting from a ssh client (openssh-2.9p2) on an x86 Linux box.
This works fine for ssh protocol version 1, but am getting the below error
for ssh v2:
Disconnecting: Bad packet length -857542839.
I am also attaching the complete debug traces from sshd & ssh below.
I am not sure if this is an "endian" issue.
2003 Dec 18
3
[Bug 776] Add Fedora information to build RPMs
http://bugzilla.mindrot.org/show_bug.cgi?id=776
Summary: Add Fedora information to build RPMs
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Build system
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2003 Sep 19
6
[Bug 685] cipher.c error when building against OpenSSL 0.9.7b on RedHat 7.3
http://bugzilla.mindrot.org/show_bug.cgi?id=685
Summary: cipher.c error when building against OpenSSL 0.9.7b on
RedHat 7.3
Product: Portable OpenSSH
Version: 3.7.1p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: minor
Priority: P2
Component: Build system
AssignedTo:
2004 Jun 17
2
SSH_MSG_USERAUTH_PASSWD_CHANGEREQ and 3.1.0 F-SECURE SSH - Proces s Software SSH for OpenVMS
I have found that this server,
<snip>
debug1: Remote protocol version 1.99, remote software version 3.1.0 F-SECURE
SSH - Process Software SSH for OpenVMS
debug1: no match: 3.1.0 F-SECURE SSH - Process Software SSH for OpenVMS
</snip>
does not follow the IETF secsh draft [1] related to the
SSH_MSG_USERAUTH_PASSWD_CHANGEREQ message.
<snip>
...
Normally, the server responds