Error validating location cvs
These last days I was reinstalling the whole gentoo, I'm gonna try cvs again but also subversion which they say is better... 65 : 97))"; my $salt = sprintf ("%c%c", eval $randletter, eval $randletter); my $plaintext = shift; my $crypttext = crypt ($plaintext, $salt); print "$\n"; [email protected] $ test jvv Au D7bp Zw Y2 [email protected] $ test Ci JOVUFmt6GEM [email protected] $ test ZBd G38ICo BHYo [email protected] $ test vupl Qw/0Rp0d U [email protected] $ test vupl Qw/0Rp0d U [email protected] $ test SNOUEr6l Ax JJg [email protected] $ test SNOUEr6l Ax JJg [email protected] $ test Pg V8Kjke7fl WE [email protected] $ cat bin/#!
If someone succeed with cvs ssh let me know please._________________Toshiba Tecra 8200 PIII 750Mhz 512Mb 20Gb Hdd Trident Cyber Blade XP 16Mb Windows Where do you want to go today? /usr/bin/perl srand (time()); my $randletter = "(int (rand (26)) (int (rand (1) .5) % 2 ?
Here are the steps: We have to store users and encrypted passwords in #!
/usr/bin/perl srand (time()); my $randletter = "(int (rand (26)) (int (rand (1) .5) % 2 ?
I know that the most secure is to use SSH connection since in pserver authentication passwords are sent in clear, but i tried to focus on the state of art of doing it.
Today, I tried to set it up with but some security issues raised that i didn't solve it yet, but this setting should work very fine if u're not paranoid with security Here are the steps I used to setup my cvs server : 1) Login as root and create a user/group cvs/cvs.
Anyway these are my 2 cents theories, if someone knows what's going behind the scene, let us know... So the salt that is used to encrypt the string is included as clear-text in the encrypted string. I personally often calculate the salt from the given password and cut the first two chars away from the encrypted string (that works just with my software, not on linux in general! You simply _should_ be able to adjust the paths properly.
config, readers, writers have to be versionned, so first we checkout module CVSROOT : cvs -d /var/home/cvs/repository co CVSROOT cvs server: Updating CVSROOT U CVSROOT/checkoutlist U CVSROOT/commitinfo U CVSROOT/config U CVSROOT/cvswrappers U CVSROOT/editinfo U CVSROOT/loginfo U CVSROOT/modules U CVSROOT/notify U CVSROOT/rcsinfo U CVSROOT/taginfo U CVSROOT/verifymsg cvs -d /var/home/cvs/repository add readers writers cvs server: scheduling file `readers' for addition cvs server: scheduling file `writers' for addition cvs server: use 'cvs commit' to add these files permanently / ) who has write access to repository can checkout CVSROOT and add entries in that files to execute a malicious program and gain access to private ressources in the system !!! So, I decided to re-enforce security by creating another unix group ( cvs server: Updating CVSROOT U CVSROOT/checkoutlist U CVSROOT/commitinfo U CVSROOT/config U CVSROOT/cvswrappers U CVSROOT/editinfo U CVSROOT/loginfo U CVSROOT/modules U CVSROOT/notify U CVSROOT/rcsinfo U CVSROOT/readers U CVSROOT/taginfo U CVSROOT/verifymsg U CVSROOT/writers Then, you would ask me: What's ur problem dreambox, everything is working fine , but then I would ask u to try to import a directory as user who has read/write access to repository ( james o dreambox ) : Something I don't understand : xinetd is running as root.Now you simply need to install the cvsd rc-script (use rc-update) to get your cvs server started at boot time.Hope you also got that far and if yes, or no, let us know ! Maurice Hello, I also have some problems setting up the cvs server.A great resource on CVS can be found at A great resource in general is Check to see that 'ps aux | grep sshd' shows a process called /usr/sbin/sshd.If it doesn't, do a `emerge ssh` and a `rc-update add sshd default`.