similar to: tftp with pxelinux.0 from syslinux 4.10-pre17

Displaying 20 results from an estimated 9000 matches similar to: "tftp with pxelinux.0 from syslinux 4.10-pre17"

2013 Oct 24
5
Boot iPXE from syslinux/isolinux
Christian Hesse <list at eworm.de> on Tue, 2013/10/22 13:14: > Christian Hesse <list at eworm.de> on Tue, 2013/10/22 12:56: > > Gene Cumm <gene.cumm at gmail.com> on Tue, 2013/10/22 06:35: > > > On Tue, Oct 22, 2013 at 5:41 AM, Christian Hesse <list at eworm.de> wrote: > > > > Hello everybody, > > > > > > > > iPXE builds
2013 Oct 22
2
Boot iPXE from syslinux/isolinux
Gene Cumm <gene.cumm at gmail.com> on Tue, 2013/10/22 06:35: > On Tue, Oct 22, 2013 at 5:41 AM, Christian Hesse <list at eworm.de> wrote: > > Hello everybody, > > > > iPXE builds an ISO image by default. (The build system has to be updated > > for new paths and to integrate ldlinux.c32, but that's not my problem.) > > > > With the binary
2015 Jul 01
4
[PATCH 1/1] update error messages about moduli and primes files
From: Christian Hesse <mail at eworm.de> Both files can be used, so mention both in error messages. Signed-off-by: Christian Hesse <mail at eworm.de> --- dh.c | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/dh.c b/dh.c index 4c639ac..450f5c4 100644 --- a/dh.c +++ b/dh.c @@ -153,8 +153,8 @@ choose_dh(int min, int wantbits, int max) if ((f =
2020 Mar 02
4
Question about host key algorithms
$ ssh -Q HostKeyAlgorithms Unsupported query "HostKeyAlgorithms" $ ssh -V OpenSSH_7.4p1, OpenSSL 1.0.2u 20 Dec 2019 On Mon, Mar 2, 2020 at 2:24 PM Christian Hesse <list at eworm.de> wrote: > Luveh Keraph <1.41421 at gmail.com> on Mon, 2020/03/02 14:07: > > When I do ssh -Q key, where ssh is the OpenSSH 7.4p1 client, I get the > > following output: > >
2013 Oct 22
2
Boot iPXE from syslinux/isolinux
Hello everybody, iPXE builds an ISO image by default. (The build system has to be updated for new paths and to integrate ldlinux.c32, but that's not my problem.) With the binary syslinux files from kernel.org booting fails with latest version 6.02: Loading ipxe.krn... ok Booting kernel failed: Invalid argument It does work with version 6.01, though. Any hints how to fix this regression? --
2013 Dec 03
1
Boot iPXE from syslinux/isolinux
Christian Hesse <list at eworm.de> on Mon, 2013/11/11 18:41: > "H. Peter Anvin" <hpa at zytor.com> on Mon, 2013/11/11 08:09: > > On 11/11/2013 04:09 AM, Christian Hesse wrote: > > >> > > >> Let be know if you need any more info. > > > > > > Is anybody working on this? Is there a bug tracker I should report > > >
2015 Aug 05
2
[PATCH 1/1] document all hash algorithms available for key fingerprint display
From: Christian Hesse <mail at eworm.de> Signed-off-by: Christian Hesse <mail at eworm.de> --- ssh_config.5 | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/ssh_config.5 b/ssh_config.5 index 5b0975f..28f7714 100644 --- a/ssh_config.5 +++ b/ssh_config.5 @@ -649,9 +649,13 @@ The default is .It Cm FingerprintHash Specifies the hash algorithm used when
2019 Sep 06
2
[PATCH 1/1] log: do not print carriage return
From: Christian Hesse <mail at eworm.de> Logging to stderr results in line endings being terminated with carriage return (\r) and new line (\n). While this is fine for terminals it may have undesired effects when running from crond and logging to syslog or similar. I run ssh from cron on an recent linux host. Viewing logs with journalctl I see: Sep 06 16:50:01 linux CROND[152575]: [96B
2015 Nov 18
3
AddKeysToAgent break local forwarding (and possibly more)
Hello everybody, current git breaks local forwarding (and possibly more). Looks like the option in ignored completely. I bisected the issue and found this commit to be the culprit: commit f361df474c49a097bfcf16d1b7b5c36fcd844b4b Author: jcs at openbsd.org <jcs at openbsd.org> Date: Sun Nov 15 22:26:49 2015 +0000 upstream commit Add an AddKeysToAgent client option which can
2014 Jan 28
2
[PATCH 1/1] rework printing for visual host key upper border
Key types are getting longer and the current implementation of visual host key breaks with ED25519, resulting in (note the missing bracket): +--[ED25519 256--+ This reworks the calculation of visual host key upper border. Please be aware that this may change the output for other key types as well. --- key.c | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/key.c
2011 Dec 13
1
Please test 4.10-pre17
Especially you who are doing large-scale network booting, please try out 4.10-pre17 *and report the results*. I'm hoping with Gene Cumm's fixes that we have can promote this to a full release shortly, but I really need test reports -- good or bad. -hpa -- H. Peter Anvin, Intel Open Source Technology Center I work for Intel. I don't speak on their behalf.
2013 Nov 11
2
Boot iPXE from syslinux/isolinux
On 11/11/2013 04:09 AM, Christian Hesse wrote: >> >> Let be know if you need any more info. > > Is anybody working on this? Is there a bug tracker I should report > this to so it does not get forgotten? Could not find one for > syslinux. > Hm... it is odd that 03dda0f1 etc. didn't fix this. Since this is extremely likely to be dependent on the memory map, this
2015 Jul 06
7
[PATCH 1/1] paint visual host key with unicode box-drawing characters
From: Christian Hesse <mail at eworm.de> Signed-off-by: Christian Hesse <mail at eworm.de> --- sshkey.c | 47 ++++++++++++++++++++++++++++++++++++----------- 1 file changed, 36 insertions(+), 11 deletions(-) diff --git a/sshkey.c b/sshkey.c index cfe5980..47511c2 100644 --- a/sshkey.c +++ b/sshkey.c @@ -44,6 +44,9 @@ #include <stdio.h> #include <string.h> #include
2015 Jul 06
2
[PATCH 1/1] paint visual host key with unicode box-drawing characters
Le 06/07/15 12:33, Alex Bligh a ?crit : > On 6 Jul 2015, at 11:05, Christian Hesse <list at eworm.de> wrote: > >> +#ifdef HAVE_LOCALE_H >> + char *locale; >> + char *border_utf8[] = { "?", "?", "?", "?", "?", "?" }; >> +#endif >> + char *border_ascii[] = { "+", "-",
2011 Dec 30
2
pxelinux 4.10-pre17 HTTP performance (cptime)
Hi, thanks for writing cptime, after manually adding it to the Makefile of a lwip git checkout it compiled fine (same about prdhcp) (only isohybrid complained about a missing uuid/uuid.h)... I have a 64bit VM with VMXNET3 and go there this result: [image: cptime.png] (can everybody see the picture?) The download of a 180MB large file (Parted Magic initrd) takes between 60 and 72 seconds,
2015 Jul 06
3
[PATCH v2 1/1] paint visual host key with unicode box-drawing characters
From: Christian Hesse <mail at eworm.de> Signed-off-by: Christian Hesse <mail at eworm.de> --- log.c | 2 +- sshkey.c | 77 +++++++++++++++++++++++++++++++++++++++++++++++----------------- 2 files changed, 58 insertions(+), 21 deletions(-) diff --git a/log.c b/log.c index 32e1d2e..90c1232 100644 --- a/log.c +++ b/log.c @@ -444,7 +444,7 @@ do_log(LogLevel level, const char *fmt,
2011 Dec 29
2
pxelinux 4.10 pre17 http:// on VMware works now
Hi, I finally managed to test pxelinux 4.10 pre17 in our VMware environment and can report that HTTP booting seems to work reliably now. Downloads are fairly fast. As a side note, rosh "ls" and "pwd" commands now work as expected with a HTTP TFTP prefix, cool! I'll leave it in production use now and report about any further issues. Can you already tell when a 4.10
2014 Jul 25
1
corrupted copy in regress/multiplex.sh
Hello everybody, after installing openbsd-netcat some tests in multiplex.sh do still fail for me. Sadly this happens when trying to build a package only, everything works just fine if I try to debug this. Any ideas? Logfile failed-regress.log is attached. [...] run test multiplex.sh ... test connection multiplexing: envpass test connection multiplexing: transfer test connection multiplexing:
2014 Jan 29
2
tests: multiplex.sh fails on i686
Hello everybody, compiled openssh git master (6f917ad) on i686 without problems, but tests fail: [...] run test multiplex.sh ... test connection multiplexing: envpass test connection multiplexing: transfer scp: failed copy /tmp/openssh-git/src/openssh/regress/data cmp: /tmp/openssh-git/src/openssh/regress/copy: No such file or directory scp: corrupted copy of
2020 Mar 02
3
Question about host key algorithms
When I do ssh -Q key, where ssh is the OpenSSH 7.4p1 client, I get the following output: ssh-ed25519 ssh-ed25519-cert-v01 at openssh.com ssh-rsa ssh-dss ecdsa-sha2-nistp256 ecdsa-sha2-nistp384 ecdsa-sha2-nistp521 ssh-rsa-cert-v01 at openssh.com ssh-dss-cert-v01 at openssh.com ecdsa-sha2-nistp256-cert-v01 at openssh.com ecdsa-sha2-nistp384-cert-v01 at openssh.com ecdsa-sha2-nistp521-cert-v01 at