Displaying 20 results from an estimated 20000 matches similar to: "[Bug 1008] GSSAPI authentication fails with Round Robin DNS hosts"
2016 Aug 07
0
[Bug 1008] GSSAPI authentication fails with Round Robin DNS hosts
https://bugzilla.mindrot.org/show_bug.cgi?id=1008
Colin Watson <cjwatson at debian.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |cjwatson at debian.org
--- Comment #15 from Colin Watson <cjwatson at debian.org> ---
I think it would make
2016 Jul 18
0
[Bug 1008] GSSAPI authentication fails with Round Robin DNS hosts
https://bugzilla.mindrot.org/show_bug.cgi?id=1008
Darren Tucker <dtucker at zip.com.au> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |dtucker at zip.com.au
--- Comment #13 from Darren Tucker <dtucker at zip.com.au> ---
well it was never
2016 Aug 04
0
[Bug 1008] GSSAPI authentication fails with Round Robin DNS hosts
https://bugzilla.mindrot.org/show_bug.cgi?id=1008
--- Comment #14 from Mike Frysinger <vapier at gentoo.org> ---
(In reply to Darren Tucker from comment #13)
the original patch written in 2006 was against openbsd cvs, and it
included a config option to turn it on/off (with the default being
off). it largely applied cleanly up through 7.2 until the
get_canonical_hostname refactor.
since
2016 Jul 15
0
[Bug 1008] GSSAPI authentication fails with Round Robin DNS hosts
https://bugzilla.mindrot.org/show_bug.cgi?id=1008
kgizdov <mindrot at kge.pw> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |mindrot at kge.pw
--- Comment #12 from kgizdov <mindrot at kge.pw> ---
I just wanted to chime in here to say that
2016 Aug 17
0
[Bug 1008] GSSAPI authentication fails with Round Robin DNS hosts
https://bugzilla.mindrot.org/show_bug.cgi?id=1008
--- Comment #16 from kgizdov <mindrot at kge.pw> ---
Apparently, some good Samaritan already made patches compatible with
the current version of OpenSSH. There is a package on the Arch User
Repo (openssh-gssapi 7.1p2-1) that implements them. Here are the
patches themselves:
2006 Aug 18
2
[Bug 1008] GSSAPI authentication failes with Round Robin DNS hosts
http://bugzilla.mindrot.org/show_bug.cgi?id=1008
simon at sxw.org.uk changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |simon at sxw.org.uk
------- Comment #5 from simon at sxw.org.uk 2006-08-19 08:28 -------
There isn't an easy fix for this, at
2005 Jun 08
1
[Bug 1008] GSSAPI authentication failes with Round Robin DNS hosts
http://bugzilla.mindrot.org/show_bug.cgi?id=1008
------- Additional Comments From dleonard at vintela.com 2005-06-08 22:16 -------
a workaround at http://blog.macnews.de/unspecific/stories/4581/
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2006 Oct 23
1
[Bug 1008] GSSAPI authentication failes with Round Robin DNS hosts
http://bugzilla.mindrot.org/show_bug.cgi?id=1008
------- Comment #7 from jan.iven at cern.ch 2006-10-24 02:17 -------
Created an attachment (id=1202)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=1202&action=view)
(simplified patch - no config option)
Given that the GSSAPI library will (unconditionally) use DNS anyway,
perhaps we don't need yet another client-side config
2005 Mar 31
2
[Bug 1008] GSSAPI authentication failes with Round Robin DNS hosts
http://bugzilla.mindrot.org/show_bug.cgi?id=1008
Summary: GSSAPI authentication failes with Round Robin DNS hosts
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: Kerberos support
AssignedTo: openssh-bugs at mindrot.org
2007 Sep 15
0
[Bug 1008] GSSAPI authentication failes with Round Robin DNS hosts
http://bugzilla.mindrot.org/show_bug.cgi?id=1008
--- Comment #9 from Simon Wilkinson <simon at sxw.org.uk> 2007-09-15 20:59:25 ---
I've noted this on the mailing list too, but just for the record,
the simplified patch is incorrect. GSSAPI != Kerberos, and even
within the Kerberos space, some vendors ship with
canonicalisation disabled.
If we are going to ship a workaround for
2023 Oct 14
0
[Bug 1008] GSSAPI authentication fails with Round Robin DNS hosts
https://bugzilla.mindrot.org/show_bug.cgi?id=1008
--- Comment #20 from Christoph Anton Mitterer <calestyo at scientia.org> ---
I think this was answered last year in this thread:
https://lists.mindrot.org/pipermail/openssh-unix-dev/2022-May/040285.html
and unfortunately it seems there won't be any merging of the GSSAPI
patch. :-(
There's:
2013 May 22
0
[Bug 1008] GSSAPI authentication fails with Round Robin DNS hosts
https://bugzilla.mindrot.org/show_bug.cgi?id=1008
DarioP <pellegrini.dario at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |pellegrini.dario at gmail.com
--- Comment #11 from DarioP <pellegrini.dario at gmail.com> ---
(In reply to
2016 Nov 08
0
[Bug 1008] GSSAPI authentication fails with Round Robin DNS hosts
https://bugzilla.mindrot.org/show_bug.cgi?id=1008
Eitan Adler <lists at eitanadler.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |lists at eitanadler.com
--
You are receiving this mail because:
You are the assignee for the bug.
You are
2023 Oct 14
0
[Bug 1008] GSSAPI authentication fails with Round Robin DNS hosts
https://bugzilla.mindrot.org/show_bug.cgi?id=1008
Oliver Freyermuth <o.freyermuth at googlemail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |o.freyermuth at googlemail.com
--- Comment #19 from Oliver Freyermuth <o.freyermuth at
2003 Oct 24
0
openssh3.7.1p2 + krb5 round-robin dns issue
Hello All,
I've encountered a problem with OpenSSH_3.7.1p2 and krb5 authentication
that I did not have using previous OpenSSH versions and krb5.
I have a group of machines that are all listed as addresses for
hostname.domain.blah via round-robin dns. When attempting to ssh to
hostname.here.blah using krb5 auth, I get the following error:
(client side)
debug1: Authentications that can
2003 Jul 03
0
AIX cleanups: includes and arguments
Hi All.
First the questions:
Is there anything objectionable in this patch?
Is AUDIT_FAIL_AUTH appropriate for the "Reason" field?
Now the details: attached is a patch that changes some of the #includes
for AIX. It moves the AIX-specific includes to port-aix.h and adds
includes that contain the prototypes for many of the authentication
functions. The idea isto fix some warnings.
2003 Jul 05
0
[PATCH] Replace AIX loginmsg with generic Buffer loginmsg
Hi All.
I've decided to try to merge the -Portable parts of the password expiry
patch (see bug #14) that do not depend on the OpenBSD change in bug #463.
The attached patch is the first step in this process. It removes the
AIX-specific "char *aixloginmsg" and replaces it with a platform-neutral
"Buffer loginmsg". I think this is worth having in -Portable even if it
2002 May 20
0
Openssh 3.2.2p1 KRB5 addition
The Kerberos V support may still fail on hosts with two or more
interfaces.
Regards
Markus
-------------- next part --------------
*** auth-krb5.c.orig Mon May 20 11:51:57 2002
--- auth-krb5.c Mon May 20 11:53:34 2002
***************
*** 38,43 ****
--- 38,44 ----
#include "servconf.h"
#include "uidswap.h"
#include "auth.h"
+ #include "canohost.h"
2001 Oct 13
0
local IP in environment
I'm not sure if this is useful to anyone, but I made a small patch to
include the local IP address that the user connected to in the environment
(the opposite of SSH_CLIENT). The variable is called SSH_LOCAL.
-Eric
-------------- next part --------------
*** openssh-2.9.9p2/canohost.c.bak Sun Jun 24 22:01:24 2001
--- openssh-2.9.9p2/canohost.c Fri Oct 12 16:52:09 2001
***************
***
2018 Sep 24
2
DNS Round Robin not working?
>
> The internal DNS is NOT supporting round robin. As Rowland said use Bind9
>
That's news to me! If so, then the internal DNS backed is not suitable for
multiple DC's. (Though, I could've sworn it worked on versions 4.2+ <
4.7. It's on my to-do list to explore this further with different
versions.)