On Fri, Feb 10, 2006 at 10:36:58AM +0100, Falk Hueffner wrote:
So this is OpenBSD's flagship security product? Frankly, I'm baffled.
This is a rookie mistake, and it was even obvious from the compiler
warnings.
Please don't blame OpenBSD or OpenSSH portable upstream for this; the
GSSAPI code
Colin Watson [EMAIL PROTECTED] writes:
Please don't blame OpenBSD or OpenSSH portable upstream for this;
the GSSAPI code is a third-party patch that I integrated in order to
be able to get rid of the separate ssh-krb5 package.
Yeah, that was a stupid comment of mine that I made when I was in
Dear maintainers,
this problem makes people not being able to log in, it has a complete
analysis which is easy to follow, and it has a patch that is obviously
correct (minus the typo).
There has been no reaction from you whatsoever for 5 weeks now. Could
you give some indication on the status of
Hi,
some comments:
* ints are 32 bit on Alpha, like on any Linux target
* casting an unsigned int* to int* should have absolutely no effect on
the generated code. So this might be a gcc bug. Can you show a diff
of the assembly?
--
Falk
--
To UNSUBSCRIBE, email to [EMAIL
Hi,
the actual problem is that gss_buffer_desc is defined like this in
/usr/include/gssapi/gssapi.h from libkrb5-dev:
typedef struct gss_buffer_desc_struct {
size_t length;
void *value;
} gss_buffer_desc, *gss_buffer_t;
size_t is 64 bit. So you need something like (untested):
---
I am experiencing this problem (I think) on a i386 machine (x86-64
running i386). If I attempt to login when I have an active Kerberos
TGT, it gets to the section Calling gss_init_sec_context on the
client, then mysteriously disconnects. If I kdestroy my ticket, I can
log in without a
Package: openssh-server
Version: 1:4.2p1-4bpo1juhaj1
Severity: normal
Tags: patch
OpenSSH's GSSAPI authentication routines pass addresses of OM_uint32 to
functions expecting a pointer to int. On alpha, int is 64 bits and the
values stored in the variables pointed by these pointers only have half
7 matches
Mail list logo