Displaying 20 results from an estimated 4000 matches similar to: "[Bug 3579] New: OpenSSH trims last character of fixed-lenght buffers received from the pkcs11 providers providing users with inaccurate information"
2023 Mar 17
17
[Bug 3549] New: Tracking bug for OpenSSH 9.4
https://bugzilla.mindrot.org/show_bug.cgi?id=3549
Bug ID: 3549
Summary: Tracking bug for OpenSSH 9.4
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Keywords: meta
Severity: normal
Priority: P5
Component: Miscellaneous
Assignee:
[Bug 3561] New: Open SSH does not support 1-byte structure packing on non-windows systems for PKCS11
2023 Apr 10
6
[Bug 3561] New: Open SSH does not support 1-byte structure packing on non-windows systems for PKCS11
https://bugzilla.mindrot.org/show_bug.cgi?id=3561
Bug ID: 3561
Summary: Open SSH does not support 1-byte structure packing on
non-windows systems for PKCS11
Product: Portable OpenSSH
Version: 9.3p1
Hardware: Other
OS: All
Status: NEW
Severity: enhancement
Priority: P5
2016 Nov 16
3
[PATCH] ssh-pkcs11: allow providing unconditional pin code for PKCS11
Some HSM's such as Safenet Network HSM do not allow searching for keys
unauthenticated. To support such devices provide a mechanism for users
to provide a pin code that is always used to automatically log in to
the HSM when using PKCS11.
The pin code is read from a file specified by the environment variable
SSH_PKCS11_PINFILE if it is set.
Tested against Safenet Network HSM.
---
2016 Nov 16
2
[PATCH] ssh-pkcs11: allow providing unconditional pin code for PKCS11
I find this approach very bad in general.?
PKCS#11 standard says that *private* keys should not be accessible without authentication. *Public* keys and certificates of course can and should be accessible with no authentication.
SoftHSM misinterpreted this originally (older pkcs11 documents were less clear :), but they rectified this mistake. We should not repeat it.?
2016 Nov 16
2
[PATCH] ssh-pkcs11: allow providing unconditional pin code for PKCS11
On 11/16/16, 8:55 AM, "openssh-unix-dev on behalf of Juha-Matti Tapio" <openssh-unix-dev-bounces+uri=ll.mit.edu at mindrot.org on behalf of jmtapio at ssh.com> wrote:
On Wed, Nov 16, 2016 at 12:54:44PM +0000, Blumenthal, Uri - 0553 - MITLL wrote:
> I find this approach very bad in general.
>
> PKCS#11 standard says that *private* keys should not be
2023 May 22
6
[Bug 3574] New: ssh ignores AuthorizedPrincipalsCommand if AuthorizedKeysCommand is also set
https://bugzilla.mindrot.org/show_bug.cgi?id=3574
Bug ID: 3574
Summary: ssh ignores AuthorizedPrincipalsCommand if
AuthorizedKeysCommand is also set
Product: Portable OpenSSH
Version: 9.3p1
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component:
2023 Jul 19
9
[Bug 3589] New: ControlMaster auto, persist and -f fail.
https://bugzilla.mindrot.org/show_bug.cgi?id=3589
Bug ID: 3589
Summary: ControlMaster auto, persist and -f fail.
Product: Portable OpenSSH
Version: 9.3p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: minor
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
2005 Jan 28
1
3.0.1x, "min password lenght" deprecated, smbpasswd
Hallo @all,
since 3.0.10 parameter "min password lenght" is deprecated. If removing
the entry from smb.conf, the default of "min password lenght = 5" is
used. smbpasswd uses this entry if creating or changing passwords.
How can I set a min password lenght of 2 characters without the
deprecated parameter when the passdb backend is smbpasswd?
Think "min password
2010 Jun 16
1
prcomp() and the lenght of PC:s
Hi,
I would like to know whether there is some deeper rationale behind or is it just an established practice that the lenghts of principal components, giving for example by prcomp-function, are normalised to 1?
Best regards,
Atte Tenkanen
University of Turku, Finland
Department of Musicology
+35823335278
http://users.utu.fi/attenka/
2004 Oct 07
0
guidelines for queue lenght
Hello,
does anybody have suggestions for queue lenght guidelines?
Is there a paper somewhere or any thoughts that have to be reconsidered.
Suggestions and impulses welcome
Alexander
_______________________________________________
LARTC mailing list / LARTC@mailman.ds9a.nl
http://mailman.ds9a.nl/mailman/listinfo/lartc HOWTO: http://lartc.org/
2006 Feb 04
0
Easy way to force using jlenght and no lenght in validations
I need validates_lenght_of validates lenght of UTF-8 strings and not
just byte counting. Is there easier way than create my own validation
method just validates_jlenght_of?
--
Posted via http://www.ruby-forum.com/.
2005 Jun 17
2
Calculating the lenght of time in a call queue?
Dear All,
I'm running version 0.7.1 of Asterisk server for our global help desk.
We have put together a comprehensive reporting package for static's from
the CDR.
I'm not able to calculate the time a call is in the queue before it goes
to an agent?
I would appreciate help with working this out.
Warm Regards and Thanks
Shad Mortazavi
2006 Apr 16
2
How do I limit the lenght of a call
Hi,
Is there a way to limit the duration of a call in the Dial command? Mainly for perpay account.
Thanks
__________________________________________________
Do You Yahoo!?
Tired of spam? Yahoo! Mail has the best spam protection around
http://mail.yahoo.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
2009 Apr 23
0
rsync- buffer overflow/broken pipe with critical filename-lenght using cwrsync at server-side
hi everybody,
i?ve a problem with rsync runnig.
constellation:
rsyncserver is cwrsync at win2k-machine (without cygwin-beta against
long filename-problem), client is a linux-ubuntu box.
log from the server: (i just change names with xxx, no special charakters)
this error happens all the time again,
/overflow: flags=0xba l1=240 l2=22
2008 Mar 10
1
Want to know Frequency and lenght of Frame
I am planning to write a module to find if a Special Information was detected or not.
Can anyone please help me to figure out the below fields?
1. The Frequency of a frame
2. Length of frame in milliseconds
Thanks in advance.
Regards,
Sanjay.
2012 Aug 01
2
How to increase lenght of axis according input data?
Hi,
I am working on barplot. I need to plot x-axis but scale on x axis is very
upto 15 while my data is upto 19.
pdf("image.pdf", width=10 , height =13)
par(mar=c(5,22.5,2,2))
barplot(t(data[,2:3]), beside=TRUE, col=c(rgb(.537, .769, .933),rgb(.059,
.412, .659)), width = 1, horiz=TRUE,cex.names=.9, border ="white",las=1,
cex.axis= 1, cex.lab=1.2)
2009 Sep 15
5
identical(length(x), 1) returns FALSE, but print(length(x)) is 1, length(x)==1 is TRUE, and is.integer(lenght(x)) is TRUE????
Dear R,
the condition:
identical(length(x),1) returns FALSE
but
print(length(x))
returns 1 and:
is.vector(x) is TRUE.
is.integer(length(x)) is TRUE
length(x) ==1 is TRUE
I am puzzled.
Regards
--
Corrado Topi
Global Climate Change & Biodiversity Indicators
Area 18,Department of Biology
University of York, York, YO10 5YW, UK
Phone: + 44 (0) 1904 328645, E-mail: ct529 at york.ac.uk
2010 Apr 08
1
ssh-add -s /usr/lib/opensc-pkcs11.so does not work
Dear friends,
First, thanks for helping me on ssh default option for smartcards. I
recompiled SSH from CVS and it seems to work.
I still have problems with:
ssh-add -s /usr/lib/opensc-pkcs11.so
Enter passphrase for PKCS#11: (I enter PIN code)
SSH_AGENT_FAILURE
Could not add card: /usr/lib/opensc-pkcs11.so
pkcs11-tool --slot 1 -O
Public Key Object; RSA 2048 bits
label: Public Key
ID:
2023 Jun 20
8
[Bug 3581] New: ssh-keyscan fails with `fdlim_get: bad value` with large file descriptor limit due to type confusion
https://bugzilla.mindrot.org/show_bug.cgi?id=3581
Bug ID: 3581
Summary: ssh-keyscan fails with `fdlim_get: bad value` with
large file descriptor limit due to type confusion
Product: Portable OpenSSH
Version: 9.3p1
Hardware: ARM64
OS: Mac OS X
Status: NEW
Severity: enhancement
2010 Apr 10
3
pkcs11-helper-devel is needed
how could i install pkcs11 on 64 cent os 5.4 :S it always asking me for
pkcs11-helper but i've already installing
[root at vpn VpnSetup]# rpmbuild -tb openvpn-2.1.1.tar.gz
hata: Failed build dependencies:
pkcs11-helper-devel is needed by openvpn-2.1.1-1.x86_64
[root at vpn VpnSetup]# rpm -ivh pkcs11-helper-devel-1.06-2.1.x86_64.rpm
uyar??: pkcs11-helper-devel-1.06-2.1.x86_64.rpm: