Displaying 20 results from an estimated 1000 matches similar to: "openssh 5.0p1: Solaris - Failed to allocate internet-domain X11 display socket."
2007 Mar 22
1
ChallengeResponseAuthentication defaults to no?
Hello,
I have just installed OpenSSH 4.6p1 and it appears that ChallengeResponseAuthentication is not allowed unless I explicitly set it to "yes" in the sshd_config file. I am using the same config file as I did with 4.5p1 where it was allowed by default. Also, this is OpenSSH package from sunfreeware, but I believe that both versions were compiled with the same options.
Is this the
2000 Jul 20
3
scp over 2 hosts
Hi folks,
I have the that I must copy some through a Plag-Gateway of a Firewall over 2 host. A secure connection via "ssh - t hosta ssh -t hostb" works fine, but does this work with scp too? Icould not realize it either with scp (1.2.27 of ssh.com) or scp from openssh. Do you have any ideas?
Thanks
Stephan
2000 Jul 07
0
Patch to add scp -L option
Here is a patch to scp made against openssh-2.1.1p2 that adds the -L option to
scp. The -L option tells scp to use nonprivilaged ports (by passing ssh the -P
option). The non-free ssh's scp has this option, and it is required under some
firewall setups (like mine) for scp to function.
Please let me know if there are any problems with this patch, or if there is
anything I can do to help get
2000 Oct 07
2
[PATCH]: Add tcp_wrappers protection to port forwarding
Hi,
attached is a patch by Chris Faylor <cgf at cygnus.com> relative to
2.2.0p1.
Description:
OpenSSH does not allow port gatewaying by default. This means that only
the local host can access forwarded ports. Adding "GatewayPorts yes" to
.ssh/config usually does this job.
Unfortunately, OpenSSH does not recognize the same hosts.allow/
hosts.deny options as ssh.com's sshd
2014 Apr 20
2
bad bignum encoding for curve25519-sha256@libssh.org
Hi,
So I screwed up when writing the support for the curve25519 KEX method
that doesn't depend on OpenSSL's BIGNUM type - a bug in my code left
leading zero bytes where they should have been skipped. The impact of
this is that OpenSSH 6.5 and 6.6 will fail during key exchange with a
peer that implements curve25519-sha256 at libssh.org properly about 0.2%
of the time (one in every 512ish
2001 Feb 14
10
SSH trademarks and the OpenSSH product name
Friends,
Sorry to write this to a developer mailing list. I have already
approached some OpenSSH/OpenBSD core members on this, including Markus
Friedl, Theo de Raadt, and Niels Provos, but they have chosen not to
bring the issue up on the mailing list. I am not aware of any other
forum where I would reach the OpenSSH developers, so I will post this
here.
As you know, I have been using the SSH
2001 Feb 16
6
ssh(R) trademark issues: comments and proposal
I'd like to address several issues raised by people in relation to my
notice of the ssh(R) trademark to the OpenSSH group. Also, I would
like to make a proposal to the community for resolving this issue
(included at the end).
First, I'll answer a number of questions and arguments presented in
the discussion.
> "the SSH Corp trademark registration in the US is for a logo
2001 Feb 16
0
Regarding Trademark Dispute.
I received the following e-mail in response to an e-mail I had
sent to SSH communications questioning the wisdom of their
requesting OpenSSH to change it's name. Contained in the message
is that statement that SSH Communications did not exert their
trademark rights earlier becuase it's only recently that
OpenSSH has become more visible.
In the United States, this would invalidate the
2000 Sep 18
0
scp.1
A few people have commented that the synopsis in 'man 1 scp' is a
bit difficult for humans to parse. I attach a diff between the
distributed version and mine:
(I suppose this should really go to the OpenBSD maintainers, but I
wanted a little feedback about whether this was better or not.)
Thanks,
Andrew Stribblehill
Systems Programmer, IT Service, University of Durham
--------------
2009 Dec 18
0
[agc@NetBSD.org: CVS commit: src/crypto/external/bsd/openssh/dist]
Hi,
I applied the following minor diff to preserve the value of the extern
variable across calls to process_sign_request2() in ssh-agent.c.
I've no idea if the attachment of the attachment will come out
correctly so a cvs diff is also attached.
Regards,
Alistair
-------------- next part --------------
An embedded message was scrubbed...
From: "Alistair G. Crooks" <agc at
2002 Jul 13
0
[PATCH]: scp program improved
Hi,
I have made a patch which improves scp utility. It adds two new features:
rate limit and resume support. With rate limit it's possible to limit
transfer speed. Resume allows to continue file transfer where it was last
interrupted. Also the progress meter was improved.
Here is my patch, please send comments about it and what I can do better
if there is something to fix.
---
2001 Feb 14
1
More on TTSSH and the SSH trademark
I would also like to mention that when I released TTSSH in May 1998, I had
no concerns about violating any trademarks because I observed that the
name "SSH" was already being used by several different parties for
different purposes --- as the name of Ylonen's original SSH package and
its derivatives, as the name of the protocol, and as a component of names
of other implementations
1998 Jan 20
0
SNI-23: SSH - Vulnerability in ssh-agent
-----BEGIN PGP SIGNED MESSAGE-----
###### ## ## ######
## ### ## ##
###### ## # ## ##
## ## ### ##
###### . ## ## . ######.
Secure Networks Inc.
Security Advisory
2001 Nov 20
3
problem with AFS token forwarding
Hello,
I came across an interoperability problem in OpenSSH 3.0p1 and 3.0.1p1
concerning the AFS token forwarding. That means that the new versions are
not able to exchange AFS tokens (and Kerberos TGTs) with older OpenSSH
releases (including 2.9p2) and with the old SSH 1.2.2x. In my opinion this
problem already existed in Openssh 2.9.9p1, but I have never used this
version (I only looked at the
2007 Sep 29
64
[Bug 1371] New: Add PKCS#11 (Smartcards) support into OpenSSH
http://bugzilla.mindrot.org/show_bug.cgi?id=1371
Summary: Add PKCS#11 (Smartcards) support into OpenSSH
Product: Portable OpenSSH
Version: 4.7p1
Platform: All
URL: http://alon.barlev.googlepages.com/openssh-pkcs11
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component:
2001 Sep 13
4
ssh argv[0] support
Right - I know you've had a discussion about the argv[0] stuff
already, but I've written this simple script to simulate the (now
missing) support for Debian, and was asked to send it to you...
--- ssh-argv0 ---
#! /bin/sh -e
if [ "${0##*/}" == "ssh-argv0" ]
then
echo 'ssh-argv0: This script should not be run like this, see
ssh-argv0(1) for details'
2001 Nov 24
2
Authenticating the rsync server
Scenario: I have a main website. I want to allow other people with web
servers to use rsync to synchronize mirror copies of my website.
When the mirror website uses rsync to connect to the server, how can it be
sure that the server is not an IP spoofing impostor that is serving up
altered files?
2011 Sep 30
1
need help on forest plot with ggplot
Dear R users,
I am trying to do the forest plot follow the function given on web. However,
the order of the tests has been sorted alphabetically. I would prefer
keeping the order as data frame input so that I can group and compare (from
the graph) the target immune NS1, IgG and IgM (where SD, BioRad, Pb etc are
the brand names)
> d
x y ylo yhi
SD.NS1
2001 Nov 12
4
Please test -current
Could people please test -current? We will be making a release fairly
soon.
-d
--
| By convention there is color, \\ Damien Miller <djm at mindrot.org>
| By convention sweetness, By convention bitterness, \\ www.mindrot.org
| But in reality there are atoms and space - Democritus (c. 400 BCE)
2006 Apr 28
1
variance using lmer
Dear R help
I have a question on the variance of the binomial probit model.
I have fitted the following model :
> lmer1<-lmer(mp ~ l + op + l*op+ us_lev + bw_lev +(1|tatu) ,
+ family = binomial(link="probit"),
+ method = 'Laplace',
+ data = matings,
+ msVerbose= True)
> summary(lmer1)
Generalized linear