Displaying 20 results from an estimated 2000 matches similar to: "[Bug 2127] New: incorrectness of do_print_resource_record()"
2016 Apr 13
1
[Fwd: Re: Samba_dlz, dhcp y zona inversa no actualiza]
>> what is in '/usr/bin/dhcpd-update-samba-dns.sh' ?
# will receive addresses from this DHCP server. Instructions are found here:
#
https://wiki.archlinux.org/index.php/Samba_4_Active_Directory_Domain_Controller#DHCP
sleep 5
checkvalues()
{
[ -z "${2}" ] && echo "Error: argument '${1}' requires a parameter." &&
exit 1
case ${2} in
-*)
echo
2009 Sep 08
2
Rails + Sybase ASE : group effort, please
Here''s what I have:
Ruby 1.8.7
Rails 2.3.3 (activerecord 2.3.3, etc)
activerecord-sybase-adapter ( http://itsignals.cascadia.com.au/?p=23 )
Here is the base code (login info was changed to protect me)
require ''rubygems''
require ''activerecord''
a = ActiveRecord::Base.establish_connection(
:adapter => "sybase",
:host =>
2013 Jul 29
4
[Bug 2134] New: invalid prototype for get_last_login_time()
https://bugzilla.mindrot.org/show_bug.cgi?id=2134
Bug ID: 2134
Summary: invalid prototype for get_last_login_time()
Product: Portable OpenSSH
Version: 6.2p1
Hardware: Other
OS: FreeBSD
Status: NEW
Severity: enhancement
Priority: P5
Component: Build system
Assignee:
2013 Aug 02
9
[Bug 2139] New: re-exec fallback problem
https://bugzilla.mindrot.org/show_bug.cgi?id=2139
Bug ID: 2139
Summary: re-exec fallback problem
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: FreeBSD
Status: NEW
Severity: minor
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
2013 Apr 15
6
[Bug 2088] New: meoory leak in do_gen_krl()
https://bugzilla.mindrot.org/show_bug.cgi?id=2088
Bug ID: 2088
Summary: meoory leak in do_gen_krl()
Classification: Unclassified
Product: Portable OpenSSH
Version: 6.2p1
Hardware: All
OS: FreeBSD
Status: NEW
Severity: minor
Priority: P5
Component: ssh-keygen
Assignee:
2011 Nov 21
3
ssh-keygen -r should support SSHFP records for ECDSA (or at least return non-zero error code on failure)
hi folks:
it looks like ssh-keygen -r can''t export SSHFP records for ECDSA keys:
0 dkg@pip:/tmp/cdtemp.oiRYAS$ ssh-keygen -f foobar -t ecdsa -q -P ''''
0 dkg@pip:/tmp/cdtemp.oiRYAS$ ssh-keygen -r foobar -f foobar.pub
export_dns_rr: unsupported algorithm
0 dkg@pip:/tmp/cdtemp.oiRYAS$
the first number in my prompt is the return code of the last command;
note that
2011 Feb 28
3
Incorrectness of mean()
I have found following problem:
I have a vector:
> a <- c(1.04,1.04,1.05,1.04,1.04)
I want a mean of this vector:
> mean(a)
[1] 1.042
which is correct, but:
> mean(1.04,1.04,1.05,1.04,1.04)
[1] 1.04
gives an incorrect value.
how is this possible?
thanks,
zbynek
--
View this message in context: http://r.789695.n4.nabble.com/Incorrectness-of-mean-tp3327701p3327701.html
Sent from the R
2000 Dec 27
1
patch to support hurd-i386.
Damn, forgot the rest of the patch. Here it comes.
diff -Nur openssh-2.2.0p1-/ssh-keygen.c openssh-2.2.0p1/ssh-keygen.c
--- openssh-2.2.0p1-/ssh-keygen.c Wed Aug 23 02:46:24 2000
+++ openssh-2.2.0p1/ssh-keygen.c Sun Oct 29 16:44:50 2000
@@ -68,7 +68,7 @@
static const char *__progname = "ssh-keygen";
#endif /* HAVE___PROGNAME */
-char hostname[MAXHOSTNAMELEN];
+char
2014 Mar 04
0
[Bug 2208] New: memleak in servconf.c
https://bugzilla.mindrot.org/show_bug.cgi?id=2208
Bug ID: 2208
Summary: memleak in servconf.c
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: FreeBSD
Status: NEW
Severity: trivial
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
2012 Sep 24
3
[Bug 2043] New: memleak in import_environments
https://bugzilla.mindrot.org/show_bug.cgi?id=2043
Priority: P5
Bug ID: 2043
Assignee: unassigned-bugs at mindrot.org
Summary: memleak in import_environments
Severity: trivial
Classification: Unclassified
OS: All
Reporter: arthurmesh at gmail.com
Hardware: All
Status: NEW
Version:
2014 Aug 26
0
Blanks in filenames generated by ssh-keygen (Was RE: GSSAPI)
Scott Neugroschl wrote:
>Thanks, Damien. I was trying to debug an issue in this code. Turns out there was a trailing blank in
> my host key file name. I'll look at ssh-keygen.c and see if I can rectify that.
Is there a particular reason to allow leading/trailing blanks in the key file name? If there is
no such reason, then buf should be trimmed in ask_filename(), around line 250
2023 Jul 19
1
[Announce] Samba 4.18.5, 4.17.10., 4.16.11 Security Releases are available for Download
Release Announcements
---------------------
This are security releases in order to address the following defects:
o CVE-2022-2127:? When winbind is used for NTLM authentication, a
maliciously
????????????????? crafted request can trigger an out-of-bounds read in
winbind
????????????????? and possibly crash it.
https://www.samba.org/samba/security/CVE-2022-2127.html
o CVE-2023-3347:? SMB2
2023 Jul 19
1
[Announce] Samba 4.18.5, 4.17.10., 4.16.11 Security Releases are available for Download
Release Announcements
---------------------
This are security releases in order to address the following defects:
o CVE-2022-2127:? When winbind is used for NTLM authentication, a
maliciously
????????????????? crafted request can trigger an out-of-bounds read in
winbind
????????????????? and possibly crash it.
https://www.samba.org/samba/security/CVE-2022-2127.html
o CVE-2023-3347:? SMB2
2023 Sep 03
1
[patch] ssh-keygen(1): generate Ed25519 keys when invoked without arguments
Dear all,
Ed25519 public keys being as small as they are is very convenient.
There is an opportunity to nudge the world towards modern algorithms.
I believe choices made in OpenSSH can positively impact the wider
eco-system and industry. I'd like to suggest ssh-keygen to generate an
Ed25519 keypair, if invoked without any arguments.
OpenSSH has supported Ed25519 since version 6.5 (January
2014 Mar 03
6
[Bug 2207] New: Potential NULL deference, found using coverity
https://bugzilla.mindrot.org/show_bug.cgi?id=2207
Bug ID: 2207
Summary: Potential NULL deference, found using coverity
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: FreeBSD
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee:
2016 Nov 14
2
Clients can't write to group-writable files - plea for help
On Mon, Nov 14, 2016 at 11:38:52AM -0500, Josh Malone via samba wrote:
> All,
>
> Apologies for basically bumping my own thread, but I'm absolutely at
> my wits' end trying to figure out this access problem. I've
> replicated the issue with and without NFS being involved. On our old
> 4.0.25 server, users can write to files that they have group-based
> write
2019 Aug 13
0
[PATCH libnbd 4/4] lib: Add CALL_CALLBACK macro.
Another simple internal macro, this time encapsulating calling a
callback.
---
generator/states-reply-simple.c | 8 ++++----
generator/states-reply-structured.c | 31 ++++++++++++++---------------
generator/states-reply.c | 2 +-
generator/states.c | 2 +-
lib/debug.c | 2 +-
lib/internal.h | 4 ++++
6 files
2013 Nov 28
1
Samba4 git pull (11/28/2013) won't compile on FreeBSD 9.2
[2799/3801] Compiling source3/locking/locking.c
[2800/3801] Compiling source3/locking/brlock.c
../source3/locking/brlock.c: In function 'brl_get_locks_readonly_parser':
../source3/locking/brlock.c:2071: error: expected expression before 'struct'
../source3/locking/brlock.c:2071: warning: assignment makes pointer from
integer without a cast
../source3/locking/brlock.c: In function
2005 May 19
1
ssh-keygen private keys export - new feature
Hello,
I had some difficulties in order to convert private keys between different
implementations of SSH.
So, I wrote the following patch to allow export of SSH2 RSA and DSA private
keys into IETF SECSH format.
Note that I also slightly revised the IETF SECSH key import code.
Usage: use of the "-e" option on a private key file generates an unencrypted
private key file in IETF SECSH
2019 Aug 06
2
[PATCH v2] Remove sshkey_load_private()
Remove sshkey_load_private(), as this function's role
is similar to sshkey_load_private_type().
---
Dependency:
This change depends over recently merged change in openbsd:
https://github.com/openbsd/src/commit/b0c328c8f066f6689874bef7f338179145ce58d0
Change log:
v1->v2
- Remove declaration of sshkey_load_private() in authfile.h
authfile.c | 38