Contributed by jose on from the OpenSSH-3.5 dept.
"OpenSSH 3.5 should be available right now (also at the time of writing this both OpenBSD and portable version weren't available from FTP servers).I know a bunch of changes went into this one, and I think it's also been cut into -stable. However, give it a whirl.
UPDATE : Fixed the link, thanks Jolan, Sam.
(Comments are closed)
By Anonymous Coward () on
Comments
By jolan () on
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/version.h
By Anonymous Coward () on
By Shane () on
install: unknown group _sshagnt
*** Error code 67
Stop in /usr/src/usr.bin/ssh/ssh-agent (line 134 of /usr/share/mk/bsd.prog.mk).
*** Error code 1
Stop in /usr/src/usr.bin/ssh.
I followed the directions at http://www.openssh.org/openbsd.html. I just took a look at the patch at ftp://ftp.openbsd.org/pub/OpenBSD/OpenSSH/openbsd31_3.5.patch and noticed this:
-BINGRP= _sshagnt
+#BINGRP= _sshagnt
Are the installation instructions missing the part about _sshagnt?
Comments
By Shane () on
By Anonymous Coward () on
By Anonymous Coward () on
Yes, I experienced the same problem. I had a v3.1-stable OS installation, and had upgraded to OpenSSH v3.4 when that was released. At that point, I added the sshd user and group as per the installation instructions--it was not necessary (at least for me) to add the _sshagnt group at that point. Now at least for my installation it appears necessary to add this _sshagnt group as Shaneon has pointed out.
By thugwar () on
Comments
By Shane () on
By Anonymous Coward () on
By James () quel@quel.linux-dude.com on http://quel.linux-dude.com
Comments
By RainBrain () rainbrain@antisocial.com on mailto:rainbrain@antisocial.com
Seems kind of an odd objection.
Comments
By He who cannnot be bother to get an account () on
By Anonymous Coward () on
Comments
By Anonymous Coward () on
Comments
By Anonymous Coward () on
Comments
By Anonymous Coward () on
How? :)
Comments
By Anonymous Coward () on
By Anonymous Coward () on
By anoneimous coward () on
Comments
By zil0g () on
I'm far from being an 'authoritay' on this, but if say user 'foo' chrooted itself and got exploited in the chroot, couldn't 'foo' just do a chroot("/"); ?
that would be silly...
Comments
By Anonymous Coward () on
how about chroot() and then exec systrace program where the systrace rules disallow chroot()
By Anonymous Coward () on
By djm () on
By jose () on http://www.monkey.org/~jose/
Subject: OpenSSH 3.5 released
Date: Tue, 15 Oct 2002 20:58:03 +0200
OpenSSH 3.5 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support.
We would like to thank the OpenSSH community for their continued support and encouragement.
Changes since OpenSSH 3.4:
============================
Checksums:
==========
- MD5 (openssh-3.5p1.tar.gz) = 42bd78508d208b55843c84dd54dea848
- MD5 (openssh-3.5.tgz) = 79fc225dbe0fe71ebb6910f449101d23
Reporting Bugs:
===============
- please read [29]http://www.openssh.com/report.html and [30]http://bugzilla.mindrot.org/
OpenSSH is brought to you by Markus Friedl, Niels Provos, Theo de Raadt, Kevin Steves, Damien Miller and Ben Lindstrom.
By Anonymous Coward () on
Comments
By Anonymous Coward () on
Comments
By Anonymous Coward () on
Comments
By Ben "Mouring" Lindstrom () mouring@eviladmin.org on mailto:mouring@eviladmin.org
- Ben
By Indigo () diaboliko@operamail.com on mailto:diaboliko@operamail.com
Comments
By Anonymous Coward () on