Bug#1082730: Wrong version for ext-info-s in https://www.openssh.com/specs.html

2024-10-06 Thread Darren Tucker
e on the site in the next hour or so. -- Darren Tucker (dtucker at dtucker.net) GPG key 11EAA6FA / A86E 3E07 5B19 5880 E860 37F4 9357 ECEF 11EA A6FA Good judgement comes with experience. Unfortunately, the experience usually comes from bad judgement.

Bug#984940: CVE-2021-28041

2021-03-12 Thread Darren Tucker
he exit path from the function and there can't be a following call to free. -- Darren Tucker (dtucker at dtucker.net) GPG key 11EAA6FA / A86E 3E07 5B19 5880 E860 37F4 9357 ECEF 11EA A6FA (new) Good judgement comes with experience. Unfortunately, the experience usually comes from bad judgement.

Bug#711289: Bug#726661: Does not permit login as root from version 1:6.2p2-6

2014-03-24 Thread Darren Tucker
On Mon, Mar 24, 2014 at 11:06 AM, Olivier Berger wrote: > Hi. > > On Mon, Nov 11, 2013 at 12:58:00PM +1100, Darren Tucker wrote: >> Workaround: comment out this line in /etc/pam.d/ssh: >> >> session required pam_loginuid.so > > Would you care commenting on

Bug#726661: Does not permit login as root from version 1:6.2p2-6

2013-11-10 Thread Darren Tucker
Workaround: comment out this line in /etc/pam.d/ssh: session required pam_loginuid.so -- Darren Tucker (dtucker at zip.com.au) GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69 Good judgement comes with experience. Unfortunately, the experience usually comes from bad

Bug#286844: Debian bug #286844: possible explanation.

2006-09-12 Thread Darren Tucker
On Mon, Sep 11, 2006 at 10:57:12AM +0200, Geoffroy Fouquier wrote: > Quoting Darren Tucker <[EMAIL PROTECTED]>: > >I found your Debian bug report about sshd segfaulting during DH GEX > >and think I can offer an explanation. I recently helped someone else > >who repo

Bug#364635: Debian bug #364635: possible workaround

2006-09-12 Thread Darren Tucker
On Tue, Sep 12, 2006 at 12:54:07AM +0100, Jochen Voss wrote: > Hi Darren, > > thank you for your message. > > On Mon, Sep 11, 2006 at 05:48:24PM +1000, Darren Tucker wrote: > > I came across the Debian bug that you reported and have a suggestion: > > [...] > Did y

Bug#364635: Debian bug #364635: possible workaround

2006-09-11 Thread Darren Tucker
ups in chroots, see http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=111045930530623 for the gory details. You can also try this seeing if this minimal test case crashes when run as root: #include #include int main(void) { chroot("/tmp"); chdir("/"); g

Bug#286844: Debian bug #286844: possible explanation.

2006-09-11 Thread Darren Tucker
esolve sporadic SEGV crashes in bn_sub_words in OpenSSH. I'm baffled why it crashes and does it sporadically... You may also find that renaming the "/etc/ssh/moduli" file provides a workaround, however this just masks the problem rather than fixing it. -- Darren Tucker (dtucker at

Bug#251474: Debian bug #251474: fixed upstream

2005-05-03 Thread Darren Tucker
of whether or not the machine is IPv6 enabled. ok djm@ -- Darren Tucker (dtucker at zip.com.au) GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69 Good judgement comes with experience. Unfortunately, the experience usually comes from bad judgement. -- To UNSUBSCRIBE, em

Bug#271822: Debian bug #271822: fixed upstream

2005-01-26 Thread Darren Tucker
Hi. The aforementioned Debian bug has been fixed upstream (and, I believe, it Debian too since the upstream patch is partially based on one from Colin Watson). http://bugzilla.mindrot.org/show_bug.cgi?id=971 -- Darren Tucker (dtucker at zip.com.au) GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4

Bug#78699: Debian bug #78699: possible solution

2005-01-26 Thread Darren Tucker
couldn't find an skey library, does Debian have one?) Anyway. feel free to contact me offline if you want the patch. -- Darren Tucker (dtucker at zip.com.au) GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69 Good judgement comes with experience. Unfortunately

Bug#291959: Debian bugs #291959 & 257130 (scp/sftp + ctrl-C) fixed upstream

2005-01-26 Thread Darren Tucker
Hi. I just wanted to let you know that the aforementioned bugs have been fixed upstream: http://bugzilla.mindrot.org/show_bug.cgi?id=950 -- Darren Tucker (dtucker at zip.com.au) GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69 Good judgement comes with experience

Bug#265627: Debian bug #265627 (ssh.1 Ciphers spec) fixed upstream.

2005-01-26 Thread Darren Tucker
``aes256-cbc'', ``aes128-ctr'', ``aes192-ctr'', ``aes256-ctr'', ``arcfour'', ``blowfish-cbc'', and ``cast128-cbc''. The default is ``aes128-cbc,3des-cbc,blowfish-cbc,cast128-cbc,arcfour, aes192-cbc,aes256-cbc

Bug#289592: Debian bug #289592: possible solution

2005-01-26 Thread Darren Tucker
You can also put a default IPv4 bindaddress in a "Host *" block at the end of the file then overrride it in the host-specific block for your IPv6 hosts, eg Host ipv6host.example.com BindAddress my:local:ip6:addr [other ipv4 hosts] Host * BindAddress my.local.ip4.addr