similar to: GNU netcat in make tests

Displaying 20 results from an estimated 1000 matches similar to: "GNU netcat in make tests"

2014 Jul 25
1
corrupted copy in regress/multiplex.sh
Hello everybody, after installing openbsd-netcat some tests in multiplex.sh do still fail for me. Sadly this happens when trying to build a package only, everything works just fine if I try to debug this. Any ideas? Logfile failed-regress.log is attached. [...] run test multiplex.sh ... test connection multiplexing: envpass test connection multiplexing: transfer test connection multiplexing:
2013 Oct 22
2
Boot iPXE from syslinux/isolinux
Gene Cumm <gene.cumm at gmail.com> on Tue, 2013/10/22 06:35: > On Tue, Oct 22, 2013 at 5:41 AM, Christian Hesse <list at eworm.de> wrote: > > Hello everybody, > > > > iPXE builds an ISO image by default. (The build system has to be updated > > for new paths and to integrate ldlinux.c32, but that's not my problem.) > > > > With the binary
2013 Dec 03
1
Boot iPXE from syslinux/isolinux
Christian Hesse <list at eworm.de> on Mon, 2013/11/11 18:41: > "H. Peter Anvin" <hpa at zytor.com> on Mon, 2013/11/11 08:09: > > On 11/11/2013 04:09 AM, Christian Hesse wrote: > > >> > > >> Let be know if you need any more info. > > > > > > Is anybody working on this? Is there a bug tracker I should report > > >
2013 Oct 22
2
Boot iPXE from syslinux/isolinux
Hello everybody, iPXE builds an ISO image by default. (The build system has to be updated for new paths and to integrate ldlinux.c32, but that's not my problem.) With the binary syslinux files from kernel.org booting fails with latest version 6.02: Loading ipxe.krn... ok Booting kernel failed: Invalid argument It does work with version 6.01, though. Any hints how to fix this regression? --
2013 Nov 11
0
Boot iPXE from syslinux/isolinux
Christian Hesse <list at eworm.de> on Thu, 2013/10/24 10:09: > Christian Hesse <list at eworm.de> on Tue, 2013/10/22 13:14: > > Christian Hesse <list at eworm.de> on Tue, 2013/10/22 12:56: > > > Gene Cumm <gene.cumm at gmail.com> on Tue, 2013/10/22 06:35: > > > > On Tue, Oct 22, 2013 at 5:41 AM, Christian Hesse <list at eworm.de> >
2020 Mar 02
4
Question about host key algorithms
$ ssh -Q HostKeyAlgorithms Unsupported query "HostKeyAlgorithms" $ ssh -V OpenSSH_7.4p1, OpenSSL 1.0.2u 20 Dec 2019 On Mon, Mar 2, 2020 at 2:24 PM Christian Hesse <list at eworm.de> wrote: > Luveh Keraph <1.41421 at gmail.com> on Mon, 2020/03/02 14:07: > > When I do ssh -Q key, where ssh is the OpenSSH 7.4p1 client, I get the > > following output: > >
2015 Nov 18
3
AddKeysToAgent break local forwarding (and possibly more)
Hello everybody, current git breaks local forwarding (and possibly more). Looks like the option in ignored completely. I bisected the issue and found this commit to be the culprit: commit f361df474c49a097bfcf16d1b7b5c36fcd844b4b Author: jcs at openbsd.org <jcs at openbsd.org> Date: Sun Nov 15 22:26:49 2015 +0000 upstream commit Add an AddKeysToAgent client option which can
2013 Oct 22
0
Boot iPXE from syslinux/isolinux
Christian Hesse <list at eworm.de> on Tue, 2013/10/22 12:56: > Gene Cumm <gene.cumm at gmail.com> on Tue, 2013/10/22 06:35: > > On Tue, Oct 22, 2013 at 5:41 AM, Christian Hesse <list at eworm.de> wrote: > > > Hello everybody, > > > > > > iPXE builds an ISO image by default. (The build system has to be updated > > > for new paths and to
2013 Oct 24
5
Boot iPXE from syslinux/isolinux
Christian Hesse <list at eworm.de> on Tue, 2013/10/22 13:14: > Christian Hesse <list at eworm.de> on Tue, 2013/10/22 12:56: > > Gene Cumm <gene.cumm at gmail.com> on Tue, 2013/10/22 06:35: > > > On Tue, Oct 22, 2013 at 5:41 AM, Christian Hesse <list at eworm.de> wrote: > > > > Hello everybody, > > > > > > > > iPXE builds
2014 Jan 29
2
tests: multiplex.sh fails on i686
Hello everybody, compiled openssh git master (6f917ad) on i686 without problems, but tests fail: [...] run test multiplex.sh ... test connection multiplexing: envpass test connection multiplexing: transfer scp: failed copy /tmp/openssh-git/src/openssh/regress/data cmp: /tmp/openssh-git/src/openssh/regress/copy: No such file or directory scp: corrupted copy of
2013 Dec 04
2
Boot iPXE from syslinux/isolinux
"H. Peter Anvin" <hpa at zytor.com> on Tue, 2013/12/03 20:26: > On 10/24/2013 01:09 AM, Christian Hesse wrote: > >>> > >>> version 6.02-pre5 works, 6.02-pre6 does not. > >> > >> Struggled with git bisect, but finally succeeded: > >> > >> 8f470e7bfe75f6401f6c5432988c620b863ad274 is the first bad commit > >>
2015 May 04
2
fatal: ssh_dispatch_run_fatal: Connection reset by peer [preauth]
Hello everybody, I have systemd set up to listen on ssh socket (:::22), the connection is handled to sshd via socket activation. Usually this works perfectly fine. However the service is checked from nagios. Sometimes the host logs: systemd[1]: Started OpenSSH Per-Connection Daemon ([::1]:60865). systemd[1]: Starting OpenSSH Per-Connection Daemon ([::1]:60865)... systemd[1]: Started OpenSSH
2013 Nov 11
0
Boot iPXE from syslinux/isolinux
"H. Peter Anvin" <hpa at zytor.com> on Mon, 2013/11/11 08:09: > On 11/11/2013 04:09 AM, Christian Hesse wrote: > >> > >> Let be know if you need any more info. > > > > Is anybody working on this? Is there a bug tracker I should report > > this to so it does not get forgotten? Could not find one for > > syslinux. > > > >
2013 Dec 04
1
Boot iPXE from syslinux/isolinux
"H. Peter Anvin" <hpa at zytor.com> on Wed, 2013/12/04 09:43: > On 12/04/2013 12:38 AM, Christian Hesse wrote: > > > > Sure. Here we go: > > > > boot: debug -e bios_boot_linux calc_cmdline_offset > > boot: ipxe.lkrn > > Loading ipxe.lkrn... ok > > cmdline_offset at 0x9f7e0 > > Initial memory map: > > Could not find location
2013 Dec 05
0
[syslinux:firmware] load_linux: Don' t use size heuristic for non-relocatable kernels
"syslinux-bot for H. Peter Anvin" <hpa at zytor.com> on Wed, 2013/12/04 12:39: > Commit-ID: ef81a3ad54845ffb5ad62714cd62db4740ad5cff > Gitweb: > http://www.syslinux.org/commit/ef81a3ad54845ffb5ad62714cd62db4740ad5cff > Author: H. Peter Anvin <hpa at zytor.com> AuthorDate: Wed, 4 Dec 2013 > 12:35:09 -0800 Committer: H. Peter Anvin <hpa at zytor.com>
2014 Jul 04
1
multiplex.sh fails in make tests
Hello everybody, running make tests on latest openssh-portable git master (V_6_6_P1-114-g72e6b5c) fails: [...] run test multiplex.sh ... test connection multiplexing: envpass test connection multiplexing: transfer test connection multiplexing: status 0 test connection multiplexing: status 1 test connection multiplexing: status 4 test connection multiplexing: status 5 test connection
2015 Apr 13
3
[Compile Issue] netcat.c on HP NonStop
Greetings, I am porting the openssh-portable 6.8 release to the HP NonStop (NSE) platform. Prior versions were no real problem, with minor tweeks. However, with the inclusion of regress/netcat.c, which depends on arpa/telnet.h, we have an issue. Unfortunately, the platform does not have this file, nor anything like it - telnet is done rather differently. We do have a version of netcat (0.7.1
2012 Mar 14
2
testing a udp socket with netcat
i've this udp daemon which is waiting for an incoming udp datagram. now i want test this daemon for random garbage to test how it behaves. My udp daemon is running because its shows on netstat. problem is if i issue following command for putting udp datagram : $nc -uvvz <host> <port> it does not output any thing. i have straced the udp daemon. which does not returns from recv()
2014 May 04
1
Pulling stalls before 52MB (works via netcat)
I can push fine over ssh but pulling via rsync or scp always stalls at about the same point which must be between 26MB and 52MB. I can pull via netcat just fine. I've tried compiling HPN out of the install on both the client and server and I've tried -C on the client with the same result. I'm on Gentoo. Any ideas? - Grant
2014 Jan 28
2
[PATCH 1/1] rework printing for visual host key upper border
Key types are getting longer and the current implementation of visual host key breaks with ED25519, resulting in (note the missing bracket): +--[ED25519 256--+ This reworks the calculation of visual host key upper border. Please be aware that this may change the output for other key types as well. --- key.c | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/key.c