Displaying 20 results from an estimated 4000 matches similar to: "Boot iPXE from syslinux/isolinux"
2013 Oct 22
2
Boot iPXE from syslinux/isolinux
Gene Cumm <gene.cumm at gmail.com> on Tue, 2013/10/22 06:35:
> On Tue, Oct 22, 2013 at 5:41 AM, Christian Hesse <list at eworm.de> wrote:
> > Hello everybody,
> >
> > iPXE builds an ISO image by default. (The build system has to be updated
> > for new paths and to integrate ldlinux.c32, but that's not my problem.)
> >
> > With the binary
2013 Oct 24
5
Boot iPXE from syslinux/isolinux
Christian Hesse <list at eworm.de> on Tue, 2013/10/22 13:14:
> Christian Hesse <list at eworm.de> on Tue, 2013/10/22 12:56:
> > Gene Cumm <gene.cumm at gmail.com> on Tue, 2013/10/22 06:35:
> > > On Tue, Oct 22, 2013 at 5:41 AM, Christian Hesse <list at eworm.de> wrote:
> > > > Hello everybody,
> > > >
> > > > iPXE builds
2013 Oct 22
0
Boot iPXE from syslinux/isolinux
Christian Hesse <list at eworm.de> on Tue, 2013/10/22 12:56:
> Gene Cumm <gene.cumm at gmail.com> on Tue, 2013/10/22 06:35:
> > On Tue, Oct 22, 2013 at 5:41 AM, Christian Hesse <list at eworm.de> wrote:
> > > Hello everybody,
> > >
> > > iPXE builds an ISO image by default. (The build system has to be updated
> > > for new paths and to
2013 Nov 11
0
Boot iPXE from syslinux/isolinux
Christian Hesse <list at eworm.de> on Thu, 2013/10/24 10:09:
> Christian Hesse <list at eworm.de> on Tue, 2013/10/22 13:14:
> > Christian Hesse <list at eworm.de> on Tue, 2013/10/22 12:56:
> > > Gene Cumm <gene.cumm at gmail.com> on Tue, 2013/10/22 06:35:
> > > > On Tue, Oct 22, 2013 at 5:41 AM, Christian Hesse <list at eworm.de>
>
2013 Dec 03
1
Boot iPXE from syslinux/isolinux
Christian Hesse <list at eworm.de> on Mon, 2013/11/11 18:41:
> "H. Peter Anvin" <hpa at zytor.com> on Mon, 2013/11/11 08:09:
> > On 11/11/2013 04:09 AM, Christian Hesse wrote:
> > >>
> > >> Let be know if you need any more info.
> > >
> > > Is anybody working on this? Is there a bug tracker I should report
> > >
2013 Dec 04
2
Boot iPXE from syslinux/isolinux
"H. Peter Anvin" <hpa at zytor.com> on Tue, 2013/12/03 20:26:
> On 10/24/2013 01:09 AM, Christian Hesse wrote:
> >>>
> >>> version 6.02-pre5 works, 6.02-pre6 does not.
> >>
> >> Struggled with git bisect, but finally succeeded:
> >>
> >> 8f470e7bfe75f6401f6c5432988c620b863ad274 is the first bad commit
> >>
2013 Nov 11
2
Boot iPXE from syslinux/isolinux
On 11/11/2013 04:09 AM, Christian Hesse wrote:
>>
>> Let be know if you need any more info.
>
> Is anybody working on this? Is there a bug tracker I should report
> this to so it does not get forgotten? Could not find one for
> syslinux.
>
Hm... it is odd that 03dda0f1 etc. didn't fix this.
Since this is extremely likely to be dependent on the memory map, this
2013 Oct 22
0
Boot iPXE from syslinux/isolinux
On Tue, Oct 22, 2013 at 5:41 AM, Christian Hesse <list at eworm.de> wrote:
> Hello everybody,
>
> iPXE builds an ISO image by default. (The build system has to be updated for
> new paths and to integrate ldlinux.c32, but that's not my problem.)
>
> With the binary syslinux files from kernel.org booting fails with
> latest version 6.02:
>
> Loading ipxe.krn...
2013 Dec 04
1
Boot iPXE from syslinux/isolinux
"H. Peter Anvin" <hpa at zytor.com> on Wed, 2013/12/04 09:43:
> On 12/04/2013 12:38 AM, Christian Hesse wrote:
> >
> > Sure. Here we go:
> >
> > boot: debug -e bios_boot_linux calc_cmdline_offset
> > boot: ipxe.lkrn
> > Loading ipxe.lkrn... ok
> > cmdline_offset at 0x9f7e0
> > Initial memory map:
> > Could not find location
2020 Mar 02
4
Question about host key algorithms
$ ssh -Q HostKeyAlgorithms
Unsupported query "HostKeyAlgorithms"
$ ssh -V
OpenSSH_7.4p1, OpenSSL 1.0.2u 20 Dec 2019
On Mon, Mar 2, 2020 at 2:24 PM Christian Hesse <list at eworm.de> wrote:
> Luveh Keraph <1.41421 at gmail.com> on Mon, 2020/03/02 14:07:
> > When I do ssh -Q key, where ssh is the OpenSSH 7.4p1 client, I get the
> > following output:
> >
2015 Nov 18
3
AddKeysToAgent break local forwarding (and possibly more)
Hello everybody,
current git breaks local forwarding (and possibly more). Looks like the
option in ignored completely. I bisected the issue and found this commit to be
the culprit:
commit f361df474c49a097bfcf16d1b7b5c36fcd844b4b
Author: jcs at openbsd.org <jcs at openbsd.org>
Date: Sun Nov 15 22:26:49 2015 +0000
upstream commit
Add an AddKeysToAgent client option which can
2013 Nov 11
0
Boot iPXE from syslinux/isolinux
"H. Peter Anvin" <hpa at zytor.com> on Mon, 2013/11/11 08:09:
> On 11/11/2013 04:09 AM, Christian Hesse wrote:
> >>
> >> Let be know if you need any more info.
> >
> > Is anybody working on this? Is there a bug tracker I should report
> > this to so it does not get forgotten? Could not find one for
> > syslinux.
> >
>
>
2014 Jul 25
1
corrupted copy in regress/multiplex.sh
Hello everybody,
after installing openbsd-netcat some tests in multiplex.sh do still fail for
me. Sadly this happens when trying to build a package only, everything works
just fine if I try to debug this. Any ideas? Logfile failed-regress.log is
attached.
[...]
run test multiplex.sh ...
test connection multiplexing: envpass
test connection multiplexing: transfer
test connection multiplexing:
2015 Jul 01
4
[PATCH 1/1] update error messages about moduli and primes files
From: Christian Hesse <mail at eworm.de>
Both files can be used, so mention both in error messages.
Signed-off-by: Christian Hesse <mail at eworm.de>
---
dh.c | 7 ++++---
1 file changed, 4 insertions(+), 3 deletions(-)
diff --git a/dh.c b/dh.c
index 4c639ac..450f5c4 100644
--- a/dh.c
+++ b/dh.c
@@ -153,8 +153,8 @@ choose_dh(int min, int wantbits, int max)
if ((f =
2014 Jan 29
2
tests: multiplex.sh fails on i686
Hello everybody,
compiled openssh git master (6f917ad) on i686 without problems, but tests
fail:
[...]
run test multiplex.sh ...
test connection multiplexing: envpass
test connection multiplexing: transfer
scp: failed copy /tmp/openssh-git/src/openssh/regress/data
cmp: /tmp/openssh-git/src/openssh/regress/copy: No such file or directory
scp: corrupted copy of
2014 Jan 28
2
[PATCH 1/1] rework printing for visual host key upper border
Key types are getting longer and the current implementation of visual
host key breaks with ED25519, resulting in (note the missing bracket):
+--[ED25519 256--+
This reworks the calculation of visual host key upper border. Please be
aware that this may change the output for other key types as well.
---
key.c | 12 ++++++++----
1 file changed, 8 insertions(+), 4 deletions(-)
diff --git a/key.c
2015 Aug 05
2
[PATCH 1/1] document all hash algorithms available for key fingerprint display
From: Christian Hesse <mail at eworm.de>
Signed-off-by: Christian Hesse <mail at eworm.de>
---
ssh_config.5 | 8 ++++++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/ssh_config.5 b/ssh_config.5
index 5b0975f..28f7714 100644
--- a/ssh_config.5
+++ b/ssh_config.5
@@ -649,9 +649,13 @@ The default is
.It Cm FingerprintHash
Specifies the hash algorithm used when
2019 Sep 06
2
[PATCH 1/1] log: do not print carriage return
From: Christian Hesse <mail at eworm.de>
Logging to stderr results in line endings being terminated with carriage
return (\r) and new line (\n). While this is fine for terminals it may
have undesired effects when running from crond and logging to syslog
or similar.
I run ssh from cron on an recent linux host. Viewing logs with
journalctl I see:
Sep 06 16:50:01 linux CROND[152575]: [96B
2015 Jul 06
7
[PATCH 1/1] paint visual host key with unicode box-drawing characters
From: Christian Hesse <mail at eworm.de>
Signed-off-by: Christian Hesse <mail at eworm.de>
---
sshkey.c | 47 ++++++++++++++++++++++++++++++++++++-----------
1 file changed, 36 insertions(+), 11 deletions(-)
diff --git a/sshkey.c b/sshkey.c
index cfe5980..47511c2 100644
--- a/sshkey.c
+++ b/sshkey.c
@@ -44,6 +44,9 @@
#include <stdio.h>
#include <string.h>
#include
2015 Jul 06
2
[PATCH 1/1] paint visual host key with unicode box-drawing characters
Le 06/07/15 12:33, Alex Bligh a ?crit :
> On 6 Jul 2015, at 11:05, Christian Hesse <list at eworm.de> wrote:
>
>> +#ifdef HAVE_LOCALE_H
>> + char *locale;
>> + char *border_utf8[] = { "?", "?", "?", "?", "?", "?" };
>> +#endif
>> + char *border_ascii[] = { "+", "-",