similar to: [Bug 3766] New: openssh PerSourcePenalties and pam_nologin interaction

Displaying 20 results from an estimated 10000 matches similar to: "[Bug 3766] New: openssh PerSourcePenalties and pam_nologin interaction"

2014 Mar 20
4
[Bug 76414] New: [NVE4] Flash player triggers freeze with: PFIFO: read fault at ... [UNSUPPORTED_KIND] from PBDMA0/HOST ...
https://bugs.freedesktop.org/show_bug.cgi?id=76414 Priority: medium Bug ID: 76414 Assignee: nouveau at lists.freedesktop.org Summary: [NVE4] Flash player triggers freeze with: PFIFO: read fault at ... [UNSUPPORTED_KIND] from PBDMA0/HOST ... QA Contact: xorg-team at lists.x.org Severity: major Classification:
2024 Dec 10
1
PerSourcePenalties and ssh-copy-id
Damien Miller <djm at mindrot.org> writes: > On Mon, 9 Dec 2024, Dmitry Belyavskiy wrote: > >> Dear colleagues, >> >> Can we somehow improve the UX related to a relatively freshly >> introduced PerSourcePenalties option? >> >> A popular pattern implies installation of the users' keys to a freshly >> installed machine using ssh-copy-id
2024 Dec 10
1
PerSourcePenalties and ssh-copy-id
On Mon, 9 Dec 2024, Dmitry Belyavskiy wrote: > Dear colleagues, > > Can we somehow improve the UX related to a relatively freshly > introduced PerSourcePenalties option? > > A popular pattern implies installation of the users' keys to a freshly > installed machine using ssh-copy-id script. The default settings don't > allow this command to work normally and
2014 Mar 24
4
[PATCH 1/4] pm/fan: drop the fan lock in fan_update() before rescheduling
From: Martin Peres <martin.peres at labri.fr> This should fix a deadlock that has been reported to us where fan_update() would hold the fan lock and try to grab the alarm_program_lock to reschedule an update. On an other CPU, the alarm_program_lock would have been taken before calling fan_update(), leading to a deadlock. We should Cc: <stable at vger.kernel.org> # 3.9+ Reported-by:
2024 Dec 09
1
PerSourcePenalties and ssh-copy-id
Dear colleagues, Can we somehow improve the UX related to a relatively freshly introduced PerSourcePenalties option? A popular pattern implies installation of the users' keys to a freshly installed machine using ssh-copy-id script. The default settings don't allow this command to work normally and causes login failures. A reasonable workaround could be adding some threshold for a number
2024 Jul 03
0
[Bug 3705] New: Disk space exhaustion from PerSourcePenalties logging
https://bugzilla.mindrot.org/show_bug.cgi?id=3705 Bug ID: 3705 Summary: Disk space exhaustion from PerSourcePenalties logging Product: Portable OpenSSH Version: -current Hardware: amd64 OS: Linux Status: NEW Severity: normal Priority: P5 Component: sshd Assignee:
2014 Mar 13
1
[PATCH] pm/fan: drop the fan lock in fan_update() before rescheduling
From: Martin Peres <martin.peres at labri.fr> This should fix a deadlock that has been reported to us where fan_update() would hold the fan lock and try to grab the alarm_program_lock to reschedule an update. On an other CPU, the alarm_program_lock would have been taken before calling fan_update(), leading to a deadlock. Reported-by: Marcin Slusarz <marcin.slusarz at gmail.com>
2024 Aug 01
0
ratelimiting for PerSourcePenalties logging
Hi, A few people have requested rate-limiting for PerSourcePenalties logging. These patches add it. Please give them a try if you're interested in this feature. -d -------------- next part --------------
2024 Jun 18
2
Call for testing: openssh-9.8
On Tue, 18 Jun 2024, Chris Rapier wrote: > Just curious, has this been tested at scale? I see that there are, by > default, a maximum number of hosts it can track (default of 64k it > seems). At that point I think one of two things happen - sshd stops > allowing all connections until some of the banned IPs age out (with > the exception of those IPs on an approved list) or it drops
2024 Jun 19
1
An Analysis of the DHEat DoS Against SSH in Cloud Environments
On Wed, Jun 19, 2024 at 02:10:30PM +1000, Damien Miller wrote: > On Tue, 18 Jun 2024, Joseph S. Testa II wrote: > > > In the upcoming v9.8 release notes I see "the server will now block > > client addresses that repeatedly fail authentication, repeatedly > > connect without ever completing authentication or that crash the > > server." Has this new
2019 Jan 21
7
[Bug 109407] New: GTX 1050 fails to initialise acceleration
https://bugs.freedesktop.org/show_bug.cgi?id=109407 Bug ID: 109407 Summary: GTX 1050 fails to initialise acceleration Product: xorg Version: unspecified Hardware: Other OS: All Status: NEW Severity: normal Priority: medium Component: Driver/nouveau Assignee: nouveau at
2009 Nov 12
2
read/connect anvil-auth-penalty failed: EOF/Connection refused
Since the changesets: http://hg.dovecot.org/dovecot-2.0/rev/9bec70f26637 http://hg.dovecot.org/dovecot-2.0/rev/75b48fa3aec4 there is another problem. A `dovecot stop`, while auth and auth -w are still running, logs: Nov 12 03:17:00 master: Warning: Killed with signal 15 (by pid=31656 uid=0 code=kill) Nov 12 03:17:00 auth: Error: read(anvil-auth-penalty) failed: EOF Nov 12 03:17:00 auth:
2010 Feb 09
1
Formula used to create new plot
Dear list users, I was wondering if there is any way to know, for an open graphical peripheric, the instruction that was used to call it. For example, if I create a plot using plot(runif(10)) is there any way to have the call returned to me? That would be especially usefull to know it there are any log axes, for example thanks t --------------------------------------- Timothée POISOT -
2024 Sep 22
0
Announce: OpenSSH 9.9 released
OpenSSH 9.9 has just been released. It will be available from the mirrors listed at https://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support. Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested
2024 Sep 20
0
Announce: OpenSSH 9.9 released
OpenSSH 9.9 has just been released. It will be available from the mirrors listed at https://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support. Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested
2024 Sep 20
0
Announce: OpenSSH 9.9 released
OpenSSH 9.9 has just been released. It will be available from the mirrors listed at https://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support. Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested
2024 Sep 22
0
Announce: OpenSSH 9.9 released
OpenSSH 9.9 has just been released. It will be available from the mirrors listed at https://www.openssh.com/ shortly. OpenSSH is a 100% complete SSH protocol 2.0 implementation and includes sftp client and server support. Once again, we would like to thank the OpenSSH community for their continued support of the project, especially those who contributed code or patches, reported bugs, tested
2010 Mar 02
0
10821:f56c227a7fc9 compiler warnings in penalty code
Hi Timo, on a 32bit Debian squeeze/sid system, with gcc-4.4 (Debian 4.4.2-9) 4.4.3 20100108 (prerelease) I'm getting this warnings: penalty.c: In function ?penalty_timeout?: penalty.c:169: warning: comparison between signed and unsigned integer expressions test-penalty.c: In function ?test_penalty_checksum?: test-penalty.c:27: warning: comparison between signed and unsigned integer
2024 Jun 25
3
An Analysis of the DHEat DoS Against SSH in Cloud Environments
On Wed, 2024-06-19 at 16:11 -0400, Joseph S. Testa II wrote: > I suppose in the next few days, I'll try reproducing my original > steps > with the new version and see what happens. I managed to do some limited testing with a local VM, and the results are... interesting. I installed openssh-SNAP-20240626.tar.gz on a fresh and fully-updated Ubuntu Linux 24.04 LTS VM with 1 vCPU.
2024 Jun 19
1
An Analysis of the DHEat DoS Against SSH in Cloud Environments
On Tue, 18 Jun 2024, Joseph S. Testa II wrote: > In the upcoming v9.8 release notes I see "the server will now block > client addresses that repeatedly fail authentication, repeatedly > connect without ever completing authentication or that crash the > server." Has this new PerSourcePenalties config directive been tested > against the DHEat attack? Not explicitly but