Displaying 20 results from an estimated 9000 matches similar to: "tftp with pxelinux.0 from syslinux 4.10-pre17"
2013 Oct 24
5
Boot iPXE from syslinux/isolinux
Christian Hesse <list at eworm.de> on Tue, 2013/10/22 13:14:
> Christian Hesse <list at eworm.de> on Tue, 2013/10/22 12:56:
> > Gene Cumm <gene.cumm at gmail.com> on Tue, 2013/10/22 06:35:
> > > On Tue, Oct 22, 2013 at 5:41 AM, Christian Hesse <list at eworm.de> wrote:
> > > > Hello everybody,
> > > >
> > > > iPXE builds
2013 Oct 22
2
Boot iPXE from syslinux/isolinux
Gene Cumm <gene.cumm at gmail.com> on Tue, 2013/10/22 06:35:
> On Tue, Oct 22, 2013 at 5:41 AM, Christian Hesse <list at eworm.de> wrote:
> > Hello everybody,
> >
> > iPXE builds an ISO image by default. (The build system has to be updated
> > for new paths and to integrate ldlinux.c32, but that's not my problem.)
> >
> > With the binary
2015 Jul 01
4
[PATCH 1/1] update error messages about moduli and primes files
From: Christian Hesse <mail at eworm.de>
Both files can be used, so mention both in error messages.
Signed-off-by: Christian Hesse <mail at eworm.de>
---
dh.c | 7 ++++---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/dh.c b/dh.c
index 4c639ac..450f5c4 100644
--- a/dh.c
+++ b/dh.c
@@ -153,8 +153,8 @@ choose_dh(int min, int wantbits, int max)
if ((f =
2020 Mar 02
4
Question about host key algorithms
$ ssh -Q HostKeyAlgorithms
Unsupported query "HostKeyAlgorithms"
$ ssh -V
OpenSSH_7.4p1, OpenSSL 1.0.2u 20 Dec 2019
On Mon, Mar 2, 2020 at 2:24 PM Christian Hesse <list at eworm.de> wrote:
> Luveh Keraph <1.41421 at gmail.com> on Mon, 2020/03/02 14:07:
> > When I do ssh -Q key, where ssh is the OpenSSH 7.4p1 client, I get the
> > following output:
> >
2013 Oct 22
2
Boot iPXE from syslinux/isolinux
Hello everybody,
iPXE builds an ISO image by default. (The build system has to be updated for
new paths and to integrate ldlinux.c32, but that's not my problem.)
With the binary syslinux files from kernel.org booting fails with
latest version 6.02:
Loading ipxe.krn... ok
Booting kernel failed: Invalid argument
It does work with version 6.01, though. Any hints how to fix this regression?
--
2013 Dec 03
1
Boot iPXE from syslinux/isolinux
Christian Hesse <list at eworm.de> on Mon, 2013/11/11 18:41:
> "H. Peter Anvin" <hpa at zytor.com> on Mon, 2013/11/11 08:09:
> > On 11/11/2013 04:09 AM, Christian Hesse wrote:
> > >>
> > >> Let be know if you need any more info.
> > >
> > > Is anybody working on this? Is there a bug tracker I should report
> > >
2015 Aug 05
2
[PATCH 1/1] document all hash algorithms available for key fingerprint display
From: Christian Hesse <mail at eworm.de>
Signed-off-by: Christian Hesse <mail at eworm.de>
---
ssh_config.5 | 8 ++++++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/ssh_config.5 b/ssh_config.5
index 5b0975f..28f7714 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -649,9 +649,13 @@ The default is
.It Cm FingerprintHash
Specifies the hash algorithm used when
2019 Sep 06
2
[PATCH 1/1] log: do not print carriage return
From: Christian Hesse <mail at eworm.de>
Logging to stderr results in line endings being terminated with carriage
return (\r) and new line (\n). While this is fine for terminals it may
have undesired effects when running from crond and logging to syslog
or similar.
I run ssh from cron on an recent linux host. Viewing logs with
journalctl I see:
Sep 06 16:50:01 linux CROND[152575]: [96B
2015 Nov 18
3
AddKeysToAgent break local forwarding (and possibly more)
Hello everybody,
current git breaks local forwarding (and possibly more). Looks like the
option in ignored completely. I bisected the issue and found this commit to be
the culprit:
commit f361df474c49a097bfcf16d1b7b5c36fcd844b4b
Author: jcs at openbsd.org <jcs at openbsd.org>
Date: Sun Nov 15 22:26:49 2015 +0000
upstream commit
Add an AddKeysToAgent client option which can
2014 Jan 28
2
[PATCH 1/1] rework printing for visual host key upper border
Key types are getting longer and the current implementation of visual
host key breaks with ED25519, resulting in (note the missing bracket):
+--[ED25519 256--+
This reworks the calculation of visual host key upper border. Please be
aware that this may change the output for other key types as well.
---
key.c | 12 ++++++++----
1 file changed, 8 insertions(+), 4 deletions(-)
diff --git a/key.c
2011 Dec 13
1
Please test 4.10-pre17
Especially you who are doing large-scale network booting, please try out
4.10-pre17 *and report the results*. I'm hoping with Gene Cumm's fixes
that we have can promote this to a full release shortly, but I really
need test reports -- good or bad.
-hpa
--
H. Peter Anvin, Intel Open Source Technology Center
I work for Intel. I don't speak on their behalf.
2013 Nov 11
2
Boot iPXE from syslinux/isolinux
On 11/11/2013 04:09 AM, Christian Hesse wrote:
>>
>> Let be know if you need any more info.
>
> Is anybody working on this? Is there a bug tracker I should report
> this to so it does not get forgotten? Could not find one for
> syslinux.
>
Hm... it is odd that 03dda0f1 etc. didn't fix this.
Since this is extremely likely to be dependent on the memory map, this
2015 Jul 06
7
[PATCH 1/1] paint visual host key with unicode box-drawing characters
From: Christian Hesse <mail at eworm.de>
Signed-off-by: Christian Hesse <mail at eworm.de>
---
sshkey.c | 47 ++++++++++++++++++++++++++++++++++++-----------
1 file changed, 36 insertions(+), 11 deletions(-)
diff --git a/sshkey.c b/sshkey.c
index cfe5980..47511c2 100644
--- a/sshkey.c
+++ b/sshkey.c
@@ -44,6 +44,9 @@
#include <stdio.h>
#include <string.h>
#include
2015 Jul 06
2
[PATCH 1/1] paint visual host key with unicode box-drawing characters
Le 06/07/15 12:33, Alex Bligh a ?crit :
> On 6 Jul 2015, at 11:05, Christian Hesse <list at eworm.de> wrote:
>
>> +#ifdef HAVE_LOCALE_H
>> + char *locale;
>> + char *border_utf8[] = { "?", "?", "?", "?", "?", "?" };
>> +#endif
>> + char *border_ascii[] = { "+", "-",
2011 Dec 30
2
pxelinux 4.10-pre17 HTTP performance (cptime)
Hi,
thanks for writing cptime, after manually adding it to the Makefile of a
lwip git checkout it compiled fine (same about prdhcp) (only isohybrid
complained about a missing uuid/uuid.h)...
I have a 64bit VM with VMXNET3 and go there this result:
[image: cptime.png]
(can everybody see the picture?)
The download of a 180MB large file (Parted Magic initrd) takes between 60
and 72 seconds,
2015 Jul 06
3
[PATCH v2 1/1] paint visual host key with unicode box-drawing characters
From: Christian Hesse <mail at eworm.de>
Signed-off-by: Christian Hesse <mail at eworm.de>
---
log.c | 2 +-
sshkey.c | 77 +++++++++++++++++++++++++++++++++++++++++++++++-----------------
2 files changed, 58 insertions(+), 21 deletions(-)
diff --git a/log.c b/log.c
index 32e1d2e..90c1232 100644
--- a/log.c
+++ b/log.c
@@ -444,7 +444,7 @@ do_log(LogLevel level, const char *fmt,
2011 Dec 29
2
pxelinux 4.10 pre17 http:// on VMware works now
Hi,
I finally managed to test pxelinux 4.10 pre17 in our VMware environment and
can report that HTTP booting seems to work reliably now. Downloads are
fairly fast.
As a side note, rosh "ls" and "pwd" commands now work as expected with a
HTTP TFTP prefix, cool!
I'll leave it in production use now and report about any further issues.
Can you already tell when a 4.10
2014 Jul 25
1
corrupted copy in regress/multiplex.sh
Hello everybody,
after installing openbsd-netcat some tests in multiplex.sh do still fail for
me. Sadly this happens when trying to build a package only, everything works
just fine if I try to debug this. Any ideas? Logfile failed-regress.log is
attached.
[...]
run test multiplex.sh ...
test connection multiplexing: envpass
test connection multiplexing: transfer
test connection multiplexing:
2014 Jan 29
2
tests: multiplex.sh fails on i686
Hello everybody,
compiled openssh git master (6f917ad) on i686 without problems, but tests
fail:
[...]
run test multiplex.sh ...
test connection multiplexing: envpass
test connection multiplexing: transfer
scp: failed copy /tmp/openssh-git/src/openssh/regress/data
cmp: /tmp/openssh-git/src/openssh/regress/copy: No such file or directory
scp: corrupted copy of
2020 Mar 02
3
Question about host key algorithms
When I do ssh -Q key, where ssh is the OpenSSH 7.4p1 client, I get the
following output:
ssh-ed25519
ssh-ed25519-cert-v01 at openssh.com
ssh-rsa
ssh-dss
ecdsa-sha2-nistp256
ecdsa-sha2-nistp384
ecdsa-sha2-nistp521
ssh-rsa-cert-v01 at openssh.com
ssh-dss-cert-v01 at openssh.com
ecdsa-sha2-nistp256-cert-v01 at openssh.com
ecdsa-sha2-nistp384-cert-v01 at openssh.com
ecdsa-sha2-nistp521-cert-v01 at