Hi!
I believe I had very similar problem and Ubuntu has fix for that. Will
there be a fix also on a Debian system?
https://bugs.launchpad.net/ubuntu/+source/openssh/+bug/237557
There is also a workaround: recompile an OpenSSH package without a
SELinux switch.
So my problem was on a Linux Debian
On Tue, 25 Mar 2008 13:26:09 +0100, Peter Mogensen <[EMAIL PROTECTED]> said:
> Hi, We see this bug when running under a vserver where
> /proc/filesystems is missing.
Actually, while /proc/filesystems is not probed for, /proc is,
and if there is no mount of /proc, then you will see such
Hi,
The behaviour reported does not make sense to me. Looking at
sshd code, the only place ssh_selinux_getctxbyname is called is in
openbsd-compat/port-linux.c, and sshd takes care to see if selinux is
enabled:
--8<---cut here---start->8---
/* Wrappe
Hi,
We see this bug when running under a vserver where /proc/filesystems is
missing.
Peter
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Hi,
I would like to confirm this bug and consider it a major breakage
because it effectively prevents to have any kind of chroot'ed ssh
accounts.
And I am not sure that libselinux is the bad guy in here indeed, because
sshd itself barks out and not any selinux component:
sshd[1235]: fatal: ssh_s
reassign 454076 libselinux
thanks
On Sun, Dec 02, 2007 at 10:31:44PM +0100, Roland Eggner wrote:
> sshd executed in chroot-environment refuses connections if SELinux is
> disabled by boot option selinux=0, whereas with sshd executed in
> "regular" environment same ssh-login works flawless.
[...]
>
Package: openssh-server
Version: 1:4.6p1-5
Severity: normal
--- Please enter the report below this line. ---
sshd executed in chroot-environment refuses connections if SELinux is
disabled by boot option selinux=0, whereas with sshd executed in
"regular" environment same ssh-login works flawless.
7 matches
Mail list logo