[Bug 930] two configure warnings

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Fri Sep 17 01:05:10 EST 2004


           Summary: two configure warnings
           Product: Portable OpenSSH
           Version: 3.8p1
          Platform: Sparc
        OS/Version: Solaris
            Status: NEW
          Severity: normal
          Priority: P2
         Component: Build system
        AssignedTo: openssh-bugs at mindrot.org
        ReportedBy: cbar44 at tsg.cbot.com

I do not know if these are critical or not, but I want to pass them along.

I am on a Sun blade 150 running Solaris 9 with just about all packages installed
and current with patches.  This is with the ./configure for OpenSsh version
3.9p1.  I run ./configure with the options --with-tcp-wrappers
--with-pid-dir=/var/run --with-mantype=cat --sysconfdir=/etc
--with-ssl-dir=/usr/local/ssl.  (ssl is OpenSSL 0.9.7d).  configure has the
warning in the middle 

configure: WARNING: sys/ptms.h: present but cannot be compiled
configure: WARNING: sys/ptms.h:     check for missing prerequisite headers?
configure: WARNING: sys/ptms.h: see the Autoconf documentation
configure: WARNING: sys/ptms.h:     section "Present But Cannot Be Compiled"
configure: WARNING: sys/ptms.h: proceeding with the preprocessor's result
configure: WARNING: sys/ptms.h: in the future, the compiler will take
precedenceconfigure: WARNING:     ## ------------------------------------------ ##
configure: WARNING:     ## Report this to the AC_PACKAGE_NAME lists.  ##
configure: WARNING:     ## ------------------------------------------ ##

final summary of the configuration says
WARNING: the operating system that you are using does not 
appear to support either the getpeereid() API nor the 
SO_PEERCRED getsockopt() option. These facilities are used to 
enforce security checks to prevent unauthorised connections to 
ssh-agent. Their absence increases the risk that a malicious 
user can connect to your agent.

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

More information about the openssh-bugs mailing list