Displaying 20 results from an estimated 3000 matches similar to: "[Bug 2636] New: Fix X11 forwarding, when ::1 is not configured"
2015 May 21
7
[Bug 2402] New: Missing include in kex.h results in compilation error due to unknown type
https://bugzilla.mindrot.org/show_bug.cgi?id=2402
            Bug ID: 2402
           Summary: Missing include in kex.h results in compilation error
                    due to unknown type
           Product: Portable OpenSSH
           Version: 6.8p1
          Hardware: Sparc
                OS: Solaris
            Status: NEW
          Severity: normal
          Priority: P5
         Component:
2001 Jun 09
2
[PATCH] Make "-L" local ports bind to "127.0.0.1" in openssh-2.9p1
diff -u -r -N openssh-2.9p1/channels.c openssh-2.9p1-ajf.1/channels.c
--- openssh-2.9p1/channels.c	Tue Apr 17 14:14:35 2001
+++ openssh-2.9p1-ajf.1/channels.c	Wed Jun  6 23:25:36 2001
@@ -1815,13 +1815,25 @@
 	/*
 	 * getaddrinfo returns a loopback address if the hostname is
 	 * set to NULL and hints.ai_flags is not AI_PASSIVE
+	 *
+	 * Oh yeah?  Setting hostname to NULL and hints.ai_flags to
+	
2013 Oct 07
4
Feature request: FQDN Host match
Hello!
I'm hoping that Gmail won't HTML format this mail so that I'll get flamed :)
Anyway, my question relates to ssh_config. The problem I find is that
the Host pattern is only applied to the argument given on the command
line, as outlined in the man page:
"The host is the hostname argument given on the command line (i.e. the
name is not converted to a canonicalized host name
2014 Jan 30
1
Announce: OpenSSH 6.5 released
Changes since OpenSSH 6.4
=========================
This is a feature-focused release.
New features:
 * ssh(1), sshd(8): Add support for key exchange using elliptic-curve
   Diffie Hellman in Daniel Bernstein's Curve25519. This key exchange
   method is the default when both the client and server support it.
 * ssh(1), sshd(8): Add support for Ed25519 as a public key type.
   Ed25519 is a
2002 Jan 07
1
rsync-2.5.1 / socket.c - unititialized variable breaks build.
In socket.c, the variable error is unitilialzed.
Also the variable length should be an unsigned int.
EAGLE> type socket.gdiff
--- ref_src:socket.c    Sat Jan  5 13:27:07 2002
+++ lcl_src:socket.c    Sun Jan  6 08:40:51 2002
@@ -1,3 +1,4 @@
+/* Converted by prj_src:unix_c_to_vms_c.tpu AND prj_src:socket.tpu on 
6-JAN-20
02 08:40:51.01 OPENVMS_AXP */
  /* -*- c-file-style: "linux"
2017 Jan 29
2
[PATCH tftpd-hpa] tftpd: don't use AI_CANONNAME and AI_ADDRCONFIG to resolve addresses for bind
AI_CANONNAME is only relevant when the resulting official name is used,
which is not the case in tftpd for the address to bind to. Also
AI_ADDRCONFIG isn't helpful. This flag is good for sockets used to
connect(2) somewhere. But for listening sockets it makes tftpd fail to
start when -a 0.0.0.0:69 is passed and no network device is up yet.
This addresses Debian bug
2004 Jul 20
4
[Bug 898] support for AddressFamily in sshd_config
http://bugzilla.mindrot.org/show_bug.cgi?id=898
           Summary: support for AddressFamily in sshd_config
           Product: Portable OpenSSH
           Version: 3.8.1p1
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: enhancement
          Priority: P2
         Component: sshd
        AssignedTo: openssh-bugs at mindrot.org
        ReportedBy: peak
2015 Apr 13
2
[Bug 2378] New: Allow login to a role using Hostbased auth on platforms supporting PAM_AUSER
https://bugzilla.mindrot.org/show_bug.cgi?id=2378
            Bug ID: 2378
           Summary: Allow login to a role using Hostbased auth on
                    platforms supporting PAM_AUSER
           Product: Portable OpenSSH
           Version: 6.8p1
          Hardware: Sparc
                OS: Solaris
            Status: NEW
          Severity: enhancement
          Priority: P5
        
2001 Nov 27
1
[PATCH] tcp-wrappers support extended to x11 forwards
Hi!
Here is the patch to support tcp wrappers with x11-forwarded connections.
The patch is for openssh-3.0.1p1 but it works fine with 2.9.9p2 too.
I've understood that this will not be included in the official version
because it adds complexity (?!) to openssh.
Binding the forwarded port to localhost doesn't solve all problems. I've
understood that you should also implement
2004 Apr 30
1
Code question (canohost.c)
On Fri, 30 Apr 2004, YOSHIFUJI Hideaki / [iso-2022-jp] $B5HF#1QL@(B wrote:
> In article <Pine.BSO.4.44.0404292059520.953-100000 at etoh.eviladmin.org> (at Thu, 29 Apr 2004 21:00:26 -0500 (CDT)), Ben Lindstrom <mouring at etoh.eviladmin.org> says:
>
> > Be that true.. then one should review the usage of it in sshconnect.c
> > which is the other place we do it.
>
2007 Mar 22
1
ChallengeResponseAuthentication defaults to no?
Hello,
 
I have just installed OpenSSH 4.6p1 and it appears that ChallengeResponseAuthentication is not allowed unless I explicitly set it to "yes" in the sshd_config file. I am using the same config file as I did with 4.5p1 where it was allowed by default. Also, this is OpenSSH package from sunfreeware, but I believe that both versions were compiled with the same options.
Is this the
2015 Apr 09
6
[Bug 2376] New: Add compile time option to disable Curve25519
https://bugzilla.mindrot.org/show_bug.cgi?id=2376
            Bug ID: 2376
           Summary: Add compile time option to disable Curve25519
           Product: Portable OpenSSH
           Version: 6.8p1
          Hardware: Sparc
                OS: Solaris
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: Build system
          Assignee:
2014 Oct 22
3
[Bug 2299] New: Disable uid=0 resetting test on Solaris
https://bugzilla.mindrot.org/show_bug.cgi?id=2299
            Bug ID: 2299
           Summary: Disable uid=0 resetting test on Solaris
           Product: Portable OpenSSH
           Version: 6.7p1
          Hardware: Sparc
                OS: Solaris
            Status: NEW
          Severity: normal
          Priority: P5
         Component: sshd
          Assignee: unassigned-bugs at
2017 May 22
11
[Bug 2719] New: Notify user, when ssh transport process dies.
https://bugzilla.mindrot.org/show_bug.cgi?id=2719
            Bug ID: 2719
           Summary: Notify user, when ssh transport process dies.
           Product: Portable OpenSSH
           Version: 7.5p1
          Hardware: Sparc
                OS: Solaris
            Status: NEW
          Severity: minor
          Priority: P5
         Component: sftp
          Assignee: unassigned-bugs at
2017 May 22
4
[Bug 2718] New: SFTP idle timeout
https://bugzilla.mindrot.org/show_bug.cgi?id=2718
            Bug ID: 2718
           Summary: SFTP idle timeout
           Product: Portable OpenSSH
           Version: 7.5p1
          Hardware: Sparc
                OS: Solaris
            Status: NEW
          Severity: enhancement
          Priority: P5
         Component: sftp-server
          Assignee: unassigned-bugs at mindrot.org
       
2013 May 13
8
[Bug 2101] New: Unaligned memory access on sparc in UMAC implemetation
https://bugzilla.mindrot.org/show_bug.cgi?id=2101
            Bug ID: 2101
           Summary: Unaligned memory access on sparc in UMAC implemetation
    Classification: Unclassified
           Product: Portable OpenSSH
           Version: 6.0p1
          Hardware: Sparc
                OS: Solaris
            Status: NEW
          Severity: normal
          Priority: P5
         Component: ssh
 
2016 Mar 04
8
[Bug 2548] New: Make pam_set_data/pam_get_data work with OpenSSH
https://bugzilla.mindrot.org/show_bug.cgi?id=2548
            Bug ID: 2548
           Summary: Make pam_set_data/pam_get_data work with OpenSSH
           Product: Portable OpenSSH
           Version: 7.2p1
          Hardware: Sparc
                OS: Solaris
            Status: NEW
          Severity: major
          Priority: P5
         Component: PAM support
          Assignee:
2017 Feb 03
5
[PATCH 0/5] Support socket activation in virt-p2v.
As the subject says, support socket activation in virt-p2v.
I have added upstream support for socket activation to nbdkit already:
https://github.com/libguestfs/nbdkit/commit/7ff39d028c6359f5c0925ed2cf4a2c4c751af2e4
I posted a patch for qemu-nbd, still waiting on more reviews for that
one:
https://www.mail-archive.com/qemu-devel@nongnu.org/msg427246.html
I tested this against old and new qemu
2001 May 14
2
openssh-2.9p1
Hi,
1. I think you should apply the attached patch to openssh-2.9p1,
otherwise ssh-keyscan on linux boxes with glibc-2.1 will experience enormous
timeout delays.
2. Is there a program like ssh-keyscan for the Version2 (dsa and rsa) keys??
regards
Peter Breitenlohner <peb at mppmu.mpg.de>
-------------- next part --------------
diff -ur openssh-2.9p1.orig/ssh-keyscan.c
2016 Apr 18
8
[Bug 2565] New: High baud rate gets sent, solaris closes pty
https://bugzilla.mindrot.org/show_bug.cgi?id=2565
            Bug ID: 2565
           Summary: High baud rate gets sent, solaris closes pty
           Product: Portable OpenSSH
           Version: 7.1p2
          Hardware: Sparc
                OS: Solaris
            Status: NEW
          Severity: minor
          Priority: P5
         Component: sshd
          Assignee: unassigned-bugs at