After nummerous advices on the list that I should upgrade, I decided to
try remote upgrading.
At the folowing step:
Reboot on the new kernel: This might be a tempting step to skip, but it
should be done now, as usually, the new kernel will run old userland
apps (such as the soon to be
On Wed, Apr 19, 2006 at 04:22:06PM +0200, Jasper Bal wrote:
After nummerous advices on the list that I should upgrade, I decided to
try remote upgrading.
AFAIK you're running an 3.6 system, right? Did you directly go from
3.6 to 3.9?
Reboot on the new kernel: This might be a tempting step
Jasper Bal wrote:
After nummerous advices on the list that I should upgrade, I decided to
try remote upgrading.
there is reason we suggest practicing on an identical LOCAL box first!
At the folowing step:
Reboot on the new kernel: This might be a tempting step to skip, but it
should be
Oliver Peter schreef:
On Wed, Apr 19, 2006 at 04:22:06PM +0200, Jasper Bal wrote:
After nummerous advices on the list that I should upgrade, I decided to
try remote upgrading.
AFAIK you're running an 3.6 system, right? Did you directly go from
3.6 to 3.9?
3.6 to 3.7
root
Nick Holland schreef:
and then log in (or have them disable PF or ...). You can also look at
/var/log/authlog for clues as to why you can't log in as you wish now.
Nick.
Thanks Nick. Look what I found in authlog:
Apr 19 16:09:17 Speculum sshd[15678]: User jabal not allowed because
shell
On 2006/04/19 16:22, Jasper Bal wrote:
something went wrong. I issued a reboot. And when the system came back
up, SSH didn't recognize any of my passwords. All the services seem to
be running though. I even have unchrooted access through FTP. I'm in
wheel group but have no access as root
Stuart Henderson schreef:
On 2006/04/19 16:22, Jasper Bal wrote:
something went wrong. I issued a reboot. And when the system came back
up, SSH didn't recognize any of my passwords. All the services seem to
be running though. I even have unchrooted access through FTP. I'm in
wheel group
On 2006/04/19 17:20, Jasper Bal wrote:
Can you upload a ~/.ssh/authorized_keys for some user in wheel?
Yes I can. Will connecting trough RSA/DSA not give the same problem with
tcsh? See my response to Nick Holland.
Ah yes, it will, sorry..
if you can read /var/log/authlog, you are in wheel (unless you've
changed perms on it). So just use scp to copy ksh to /usr/local/bin/
tcsh...
/Pete
On 19. apr. 2006, at 17.15, Jasper Bal wrote:
Nick Holland schreef:
and then log in (or have them disable PF or ...). You can also
look
At 05:20 PM 4/19/2006 +0200, Jasper Bal wrote:
Will connecting trough RSA/DSA not give the same problem with tcsh? See
my response to Nick Holland.
How about ftp'ing up another copy of csh named tcsh? Might get you running, ..
Lee
On Wed, Apr 19, 2006 at 05:36:37PM +0200, Pete Vickers wrote:
| if you can read /var/log/authlog, you are in wheel (unless you've
| changed perms on it). So just use scp to copy ksh to /usr/local/bin/
| tcsh...
[EMAIL PROTECTED] $ id
uid=864(weerd) gid=864(weerd) groups=864(weerd), 0(wheel),
On Wed, Apr 19, 2006 at 05:36:37PM +0200, Pete Vickers wrote:
if you can read /var/log/authlog, you are in wheel (unless you've
changed perms on it). So just use scp to copy ksh to /usr/local/bin/
tcsh...
But you don't have write permission on that directory, at least, not on
my machine.
On Wed, Apr 19, 2006 at 04:22:06PM +0200, Jasper Bal wrote:
After nummerous advices on the list that I should upgrade, I decided to
try remote upgrading.
At the folowing step:
Reboot on the new kernel: This might be a tempting step to skip, but it
should be done now, as usually, the new
On 4/19/06, Joachim Schipper [EMAIL PROTECTED] wrote:
On Wed, Apr 19, 2006 at 05:36:37PM +0200, Pete Vickers wrote:
if you can read /var/log/authlog, you are in wheel (unless you've
changed perms on it). So just use scp to copy ksh to /usr/local/bin/
tcsh...
But you don't have write
On 2006/04/19 13:10, Jeff Quast wrote:
Maybe I'm missing something, no access to a unix right now, but how
about the ssh option for a command?, the ssh manpage says
I checked this earlier - it doesn't work (at least on current OpenSSH;
I didn't check older versions).
user ... not allowed
just throwing out an idea, again i havn't openbsd available to me atm,
how about replacing a crontab for a fix via ftp? a netcat
bindshell-style program for back-door entry.
I'm thinking, though, since crontab is setuid, that you may not have
permission to overwrite a crontab file (be it your
* Joachim Schipper ([EMAIL PROTECTED]) wrote:
On Wed, Apr 19, 2006 at 04:22:06PM +0200, Jasper Bal wrote:
Any hints? Did I do something wrong? Is there a fix? Or do I have to
travel 400 km?
Is sendmail listening to incoming connections? If so, you might have a
chance to exploit it to
Howdy,
You might also want to check that you unpacked the base file set
correctly (using tar xzpf). If you didn't preserve the setuid file
modes in /usr/libexec/auth for example, the system's ability to
process password based logins would be pretty well crippled.If
this is the case,
On Wed, Apr 19, 2006 at 04:59:32PM +0200, Jasper Bal wrote:
Any hints? Did I do something wrong? Is there a fix? Or do I have to
travel 400 km?
[...]
I replaced bsd and bsd.rd.
Made the obligatory backup copy (/obsd)? This could save you a train
ticket -- just tell someone near the box to
On Wed, Apr 19, 2006 at 05:36:37PM +0200, Pete Vickers wrote:
if you can read /var/log/authlog, you are in wheel (unless you've
changed perms on it). So just use scp to copy ksh to /usr/local/bin/
tcsh...
The above is exactly what we in germany call Gefrickel.
$ ssh [EMAIL PROTECTED] chsh
On Wed, Apr 19, 2006 at 11:28:37AM -0700, Michael Wilsker wrote:
You might also want to check that you unpacked the base file set
correctly (using tar xzpf).
Well, tell me an idiot, but if I read the OPs mail, he just replaced
the kernel and the firmware -- nothing else yet.
Ciao,
21 matches
Mail list logo