Displaying 20 results from an estimated 4000 matches similar to: "Testing for the 4.4p1 release, round 2"
2006 Aug 30
30
Testing for the 4.4p1 release
Hi,
The 4.4p1 release is approaching now, so we are now asking people to
actively test snapshots or CVS and report back to the mailing list.
Snapshots are available from http://www.mindrot.org/openssh_snap or
from any of the mirrors listed on http://www.openssh.org/portable.html
The latter page also includes instructions for checking out portable
OpenSSH via anonymous CVS.
This release
2008 Jul 30
1
5.1p build problem on SCO OSR6
Build of 5.1p1 fails on SCO OSR6 with the error:
UX:acomp: ERROR: "addrmatch.c", line 100: undefined struct/union member: sin6_scope_id
configure checks for presence of struct sockaddr_in6 and uses the system
declaration if found (via #define HAVE_STRUCT_SOCKADDR_IN6 in config.h)
If not found, the struct is declared in openbsd-compat/fake-rfc2553.h.
OSR6 has struct sockaddr_in6 but it
2005 Aug 29
1
greater than 8 character passwords on SCO OSR6
I read the exchange regarding > 8 char passwords on Unixware from the
end of June.
Is anything being done to add support for >8 character passwords on SCO
OSR6 (in udk mode)? I have it working by calling osr5bigcrypt(), instead
of bigcrypt(), in openbsd-compat/xcrypt.c and linking with -lcrypt.
libcrypt has bigcrypt(), but for whatever reason, openssh built with it
fails to authenticate
2007 Apr 05
2
openssh-4.4p1 compile error.
Darren or anyone, can anyone point me to what and where
I can download the necessary src's and dependencies to
make ssh work on HP-UX 11.0 PARISC 1.0. I've been trying
to work with:
openssh-4.4p1
openssh-4.5p1
openssl-0.9.7e
openssl-0.9.8e
Jerry Moore
CSC, Principal UNIX Systems Administrator
BAE Systems Electronics & Integrated Solutions
3131 Story Road West, Irving, Texas 75038
1999 Dec 16
4
ANNOUNCE: openssh-1.2.1pre18
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I have just uploaded 1.2.1pre18.
This is mainly merges from the OpenBSD tree, bugfixes for Solaris
and libc5 Linux systems. It should fix all reported bugs except the
snprintf problems on some older Solaris versions.
Please test thoroughly, my hope is to have a stable version
released before Jan 1. At this point the main holdup is Solaris.
I have
2014 Jul 16
1
ssh - Connection closed by UNKNOWN
Hi,
ssh clients shows "closed by UNKNOWN" message when a socket is closed by a
remote side while ssh is waiting for user's password:
$ ssh user at localhost
user at localhost's password:
Connection closed by UNKNOWN
When the packet_read_seqnr() calls get_remote_ipaddr(), a connection's
socket is already closed and there's not been any other call of this function
yet
2008 Aug 21
2
IP options
I'm seeing something similar to bug 1179
(https://bugzilla.mindrot.org/show_bug.cgi?id=1179), even with the
reordered IP options check.
For some reason, getsockopt is returning an IP options of length 2,
value 00 00.
Would Mark Weindling's original patch
(https://bugzilla.mindrot.org/attachment.cgi?id=1105) break anything if
I incorporated it?
Platform: HP NonStop S7000 series
2010 Nov 28
2
[PATCH] Use canonical hostname for DNS SSHFP lookup
In the current implementation, ssh always uses the hostname supplied by
the user directly for the SSHFP DNS record lookup. This causes problems
when using the domain search path, e.g. I have "search example.com" in my
resolv.conf and then do a "ssh host", I will connect to host.example.com,
but ssh will query the DNS for an SSHFP record of "host.", not
2007 Sep 10
1
4.7p1 password auth broken on SCO OSR6
openssh 4.7p1
SCO OSR6
Password authentication is non-functional. This seems dependent on
USE_LIBIAF which further depends on HAVE_LIBIAF (in defines.h), but
there is no longer any code in configure to define the latter. Building
with HAVE_LIBIAF defined enables password authentication, but only for
non-long (<9 char) passwords, even though UNIXWARE_LONG_PASSWORDS seems
to be defined. I
2002 Sep 21
4
OpenSSH -current fails regression on Solaris 8, sshd dumps core
Hi All.
While working on something I noticed a regression failure on Solaris 8.
It turned out to be present in -cvs and wasn't due to my changes.
One of the tests that fail is basically:
ssh -2 -F $build/regress/ssh_proxy 999.999.999.999 true
The server reports:
sshd[20529]: Disconnecting: Command terminated on signal 11.
The culprit seems to be session.c line 1019 or so:
snprintf(buf,
2009 Feb 04
1
4.4p1 to 5.1p1 = $HOME/bin no longer in PATH?
What's going on here? I see nothing about this in the
ChangeLog, so I am confused.
==================================================================
~:cairo> pwd
/afs/rcf/user/jblaine
~:cairo> cat bin/tester
#!/bin/sh
echo "TESTER program in $HOME/bin!"
~:cairo>
==================================================================
OpenSSH 4.4p1 (previous version we were
2000 Mar 07
2
patch for openssh-1.2.2p1
Hi,
openssh-1.2.2p1 seems to have 2 problems on ipv6 (and
ipv4 mapped addresses).
1. "BREAKIN ATTEMPT" warnings from ipv4 node
2. X forwarding
The following patche fixes them.
Thanks.
diff -ru openssh-1.2.2p1/canohost.c openssh-1.2.2p1-20000308/canohost.c
--- openssh-1.2.2p1/canohost.c Fri Jan 14 13:45:48 2000
+++ openssh-1.2.2p1-20000308/canohost.c Wed Mar 8 00:25:18 2000
@@
2001 Apr 06
3
SFTP client script broken after OpenSSH 2.5.1p1 to 2.5.2p2-1
Hello friends,
I have a script that uses the sftp client to transfer a file to another
server using PK authentication. It was working until I upgraded from
OpenSSH 2.5.1p1 to 2.5.2p2-1 yesterday (on a RH Linux 6.2 system). The sftp
command is:
sftp -o "IdentityFile ~/.ssh/id_dsa" \
$PUSERNAME@$PSERVER >$TEMPFILE 2>&1 <<-!
cd $PDIR
put $DOC_ARCHIVE
ls
quit
!
2002 Aug 02
3
[Bug 377] New: Reduce compiler warnings. Use unsigned args to the ctype.h is*() macros.
http://bugzilla.mindrot.org/show_bug.cgi?id=377
Summary: Reduce compiler warnings. Use unsigned args to the
ctype.h is*() macros.
Product: Portable OpenSSH
Version: -current
Platform: Sparc
OS/Version: Solaris
Status: NEW
Severity: trivial
Priority: P2
Component: Miscellaneous
2006 Jun 26
2
[Bug 1201] Bind address information is not specified in command line help messages
http://bugzilla.mindrot.org/show_bug.cgi?id=1201
Summary: Bind address information is not specified in command
line help messages
Product: Portable OpenSSH
Version: 4.3p2
Platform: Other
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo:
2007 Mar 01
11
Call for release testing.
Hi All.
We are planning on doing one of our regular OpenSSH releases (4.6/4.6p1)
some time next week. This is a mostly a bugfix release, but there is
one new feature:
sshd now allows the enabling and disabling of authentication methods on
a per user, group, host and network basis via the Match directive in
sshd_config.
The bugs fixed are:
#52 ssh hangs on exit.
#1252 sftp returns 0 when
2005 Nov 17
2
AllowUsers not working under certain conditions
Hello,
I've trawled archives looking for changes in the "AllowUsers" option,
manuals, changes log, reported bugs and to my surprise I can't find anything
or anyone that has reported the issues that I am experiencing.
I am using the default installation sshd_config file as supplied by Redhat
and the only options I have changed are:
ListenAddress
AllowUsers
The first problem
2004 Apr 30
1
Code question (canohost.c)
On Fri, 30 Apr 2004, YOSHIFUJI Hideaki / [iso-2022-jp] $B5HF#1QL@(B wrote:
> In article <Pine.BSO.4.44.0404292059520.953-100000 at etoh.eviladmin.org> (at Thu, 29 Apr 2004 21:00:26 -0500 (CDT)), Ben Lindstrom <mouring at etoh.eviladmin.org> says:
>
> > Be that true.. then one should review the usage of it in sshconnect.c
> > which is the other place we do it.
>
2006 Feb 04
1
getnameinfo() call and fake-rfc2553.c
Hello All,
Im using OpenSSH 4.2p1. The getnameinfo() call in my system libc is broken
and as a result SSH fails saying getnameinfo failed:host nor service
provided.
Im thinking of using getnameinfo() call available from openbsd-compat
directory to get rid of this problem. As this is a production system, we
can't make changes
without convincing my syadmin and managers.
I understand that
2006 Sep 06
1
Is there any impact?
Hi All,
Is there any impact in OpenSSH build with OpenSSL 0.9.7j as OpenSSL is
affected by the following vulnerability
http://www.openssl.org/news/secadv_20060905.txt ?
Thanks & Regards,
Santhi.