Displaying 20 results from an estimated 10000 matches similar to: "[Bug 3766] New: openssh PerSourcePenalties and pam_nologin interaction"
2014 Mar 20
4
[Bug 76414] New: [NVE4] Flash player triggers freeze with: PFIFO: read fault at ... [UNSUPPORTED_KIND] from PBDMA0/HOST ...
https://bugs.freedesktop.org/show_bug.cgi?id=76414
Priority: medium
Bug ID: 76414
Assignee: nouveau at lists.freedesktop.org
Summary: [NVE4] Flash player triggers freeze with: PFIFO: read
fault at ... [UNSUPPORTED_KIND] from PBDMA0/HOST ...
QA Contact: xorg-team at lists.x.org
Severity: major
Classification:
2024 Dec 10
1
PerSourcePenalties and ssh-copy-id
Damien Miller <djm at mindrot.org> writes:
> On Mon, 9 Dec 2024, Dmitry Belyavskiy wrote:
>
>> Dear colleagues,
>>
>> Can we somehow improve the UX related to a relatively freshly
>> introduced PerSourcePenalties option?
>>
>> A popular pattern implies installation of the users' keys to a freshly
>> installed machine using ssh-copy-id
2024 Dec 10
1
PerSourcePenalties and ssh-copy-id
On Mon, 9 Dec 2024, Dmitry Belyavskiy wrote:
> Dear colleagues,
>
> Can we somehow improve the UX related to a relatively freshly
> introduced PerSourcePenalties option?
>
> A popular pattern implies installation of the users' keys to a freshly
> installed machine using ssh-copy-id script. The default settings don't
> allow this command to work normally and
2014 Mar 24
4
[PATCH 1/4] pm/fan: drop the fan lock in fan_update() before rescheduling
From: Martin Peres <martin.peres at labri.fr>
This should fix a deadlock that has been reported to us where fan_update()
would hold the fan lock and try to grab the alarm_program_lock to reschedule
an update. On an other CPU, the alarm_program_lock would have been taken
before calling fan_update(), leading to a deadlock.
We should Cc: <stable at vger.kernel.org> # 3.9+
Reported-by:
2024 Dec 09
1
PerSourcePenalties and ssh-copy-id
Dear colleagues,
Can we somehow improve the UX related to a relatively freshly
introduced PerSourcePenalties option?
A popular pattern implies installation of the users' keys to a freshly
installed machine using ssh-copy-id script. The default settings don't
allow this command to work normally and causes login failures.
A reasonable workaround could be adding some threshold for a number
2024 Jul 03
0
[Bug 3705] New: Disk space exhaustion from PerSourcePenalties logging
https://bugzilla.mindrot.org/show_bug.cgi?id=3705
Bug ID: 3705
Summary: Disk space exhaustion from PerSourcePenalties logging
Product: Portable OpenSSH
Version: -current
Hardware: amd64
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: sshd
Assignee:
2014 Mar 13
1
[PATCH] pm/fan: drop the fan lock in fan_update() before rescheduling
From: Martin Peres <martin.peres at labri.fr>
This should fix a deadlock that has been reported to us where fan_update()
would hold the fan lock and try to grab the alarm_program_lock to reschedule
an update. On an other CPU, the alarm_program_lock would have been taken
before calling fan_update(), leading to a deadlock.
Reported-by: Marcin Slusarz <marcin.slusarz at gmail.com>
2024 Aug 01
0
ratelimiting for PerSourcePenalties logging
Hi,
A few people have requested rate-limiting for PerSourcePenalties logging.
These patches add it. Please give them a try if you're interested in this
feature.
-d
-------------- next part --------------
2024 Jun 18
2
Call for testing: openssh-9.8
On Tue, 18 Jun 2024, Chris Rapier wrote:
> Just curious, has this been tested at scale? I see that there are, by
> default, a maximum number of hosts it can track (default of 64k it
> seems). At that point I think one of two things happen - sshd stops
> allowing all connections until some of the banned IPs age out (with
> the exception of those IPs on an approved list) or it drops
2024 Jun 19
1
An Analysis of the DHEat DoS Against SSH in Cloud Environments
On Wed, Jun 19, 2024 at 02:10:30PM +1000, Damien Miller wrote:
> On Tue, 18 Jun 2024, Joseph S. Testa II wrote:
>
> > In the upcoming v9.8 release notes I see "the server will now block
> > client addresses that repeatedly fail authentication, repeatedly
> > connect without ever completing authentication or that crash the
> > server." Has this new
2019 Jan 21
7
[Bug 109407] New: GTX 1050 fails to initialise acceleration
https://bugs.freedesktop.org/show_bug.cgi?id=109407
Bug ID: 109407
Summary: GTX 1050 fails to initialise acceleration
Product: xorg
Version: unspecified
Hardware: Other
OS: All
Status: NEW
Severity: normal
Priority: medium
Component: Driver/nouveau
Assignee: nouveau at
2009 Nov 12
2
read/connect anvil-auth-penalty failed: EOF/Connection refused
Since the changesets:
http://hg.dovecot.org/dovecot-2.0/rev/9bec70f26637
http://hg.dovecot.org/dovecot-2.0/rev/75b48fa3aec4
there is another problem. A `dovecot stop`, while auth and auth -w are
still running, logs:
Nov 12 03:17:00 master: Warning: Killed with signal 15 (by pid=31656 uid=0 code=kill)
Nov 12 03:17:00 auth: Error: read(anvil-auth-penalty) failed: EOF
Nov 12 03:17:00 auth:
2010 Feb 09
1
Formula used to create new plot
Dear list users,
I was wondering if there is any way to know, for an open graphical peripheric, the instruction that was used to call it. For example, if I create a plot using
plot(runif(10))
is there any way to have the call returned to me? That would be especially usefull to know it there are any log axes, for example
thanks
t
---------------------------------------
Timothée POISOT
-
2024 Sep 22
0
Announce: OpenSSH 9.9 released
OpenSSH 9.9 has just been released. It will be available from the
mirrors listed at https://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested
2024 Sep 20
0
Announce: OpenSSH 9.9 released
OpenSSH 9.9 has just been released. It will be available from the
mirrors listed at https://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested
2024 Sep 20
0
Announce: OpenSSH 9.9 released
OpenSSH 9.9 has just been released. It will be available from the
mirrors listed at https://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested
2024 Sep 22
0
Announce: OpenSSH 9.9 released
OpenSSH 9.9 has just been released. It will be available from the
mirrors listed at https://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol 2.0 implementation and
includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches, reported bugs, tested
2010 Mar 02
0
10821:f56c227a7fc9 compiler warnings in penalty code
Hi Timo,
on a 32bit Debian squeeze/sid system, with gcc-4.4 (Debian 4.4.2-9)
4.4.3 20100108 (prerelease) I'm getting this warnings:
penalty.c: In function ?penalty_timeout?:
penalty.c:169: warning: comparison between signed and unsigned integer expressions
test-penalty.c: In function ?test_penalty_checksum?:
test-penalty.c:27: warning: comparison between signed and unsigned integer
2024 Jun 25
3
An Analysis of the DHEat DoS Against SSH in Cloud Environments
On Wed, 2024-06-19 at 16:11 -0400, Joseph S. Testa II wrote:
> I suppose in the next few days, I'll try reproducing my original
> steps
> with the new version and see what happens.
I managed to do some limited testing with a local VM, and the results
are... interesting.
I installed openssh-SNAP-20240626.tar.gz on a fresh and fully-updated
Ubuntu Linux 24.04 LTS VM with 1 vCPU.
2024 Jun 19
1
An Analysis of the DHEat DoS Against SSH in Cloud Environments
On Tue, 18 Jun 2024, Joseph S. Testa II wrote:
> In the upcoming v9.8 release notes I see "the server will now block
> client addresses that repeatedly fail authentication, repeatedly
> connect without ever completing authentication or that crash the
> server." Has this new PerSourcePenalties config directive been tested
> against the DHEat attack?
Not explicitly but