Displaying 17 results from an estimated 17 matches for "1246ab".
2002 Oct 30
1
connect() timeout patch.
...options->smartcard_device = NULL;
options->no_host_authentication_for_localhost = - 1;
+ options->time_out = 0;
}
/*
--- ssh.c Wed Sep 18 22:05:04 2002
+++ ../openssh-3.5p1.modlwc/ssh.c Wed Oct 30 09:47:44 2002
@@ -275,7 +275,7 @@
again:
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX")) != -1) {
+ "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX:z:")) != -1) {
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -421,6 +421,9 @@
exit(1);
}
break;
+ case 'z':
+ options.ti...
2009 Feb 18
1
ssh -f & pid
...snprintf(buffer, sizeof(buffer), "%d\n", getpid());
+ if (write(fd, buffer, len) != len)
+ {
+ close(fd);
+ return -1;
+ }
+
+ close(fd);
+
+ return 0;
+}
+
/*
* Main program for the ssh client.
*/
@@ -271,9 +295,12 @@
host = NULL;
again:
- while ((opt = getopt(ac, av, "1246ab:c:e:fgi:kl:m:no:p:qstvx"
+ while ((opt = getopt(ac, av, "1246ab:c:e:fgi:kl:m:no:p:qstvxz:"
"ACD:F:I:KL:MNO:PR:S:TVw:XY")) != -1) {
switch (opt) {
+ case 'z':
+ pid_file = optarg;
+ break;
case '1':
options.protocol = SSH_PROTO_1;
bre...
2007 Aug 22
0
Patch to allow checking of v1 keys on remote host.
...ess:]port] [-e escape_char] [-F configfile]\n"
" [-i identity_file] [-L [bind_address:]port:host:hostport]\n"
" [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port]\n"
@@ -272,7 +272,7 @@
again:
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:MNO:PR:S:TVw:XY")) != -1) {
+ "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:MNO:PR:S:TuVw:XY")) != -1) {
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -523,6 +523,9 @@
case 'F':
config = optarg;
break;...
2009 Jul 09
0
[PATCH] Allow binding to a local port (OpenSSH 5.2)
...c_spec] [-O ctl_cmd] [-o option] [-p port]\n"
" [-R [bind_address:]port:host:hostport] [-S ctl_path]\n"
" [-w local_tun[:remote_tun]] [user@]hostname [command]\n"
);
@@ -272,7 +273,7 @@
use_syslog = 0;
again:
- while ((opt = getopt(ac, av, "1246ab:c:e:fgi:kl:m:no:p:qstvx"
+ while ((opt = getopt(ac, av, "1246ab:B:c:e:fgi:kl:m:no:p:qstvx"
"ACD:F:I:KL:MNO:PR:S:TVw:XYy")) != -1) {
switch (opt) {
case '1':
@@ -514,6 +515,9 @@
case 'b':
options.bind_address = optarg;
break;
+ case ...
2001 Oct 18
1
Patch for SSH-tunneling via HTTPS-proxy
...SH2 subsystem.\n");
fprintf(stderr, " -b addr Local IP address.\n");
+ fprintf(stderr, " -H 'realhost:port' do HTTPS-proxy negotiation before expecting SSH-version\n");
exit(1);
}
@@ -320,7 +321,7 @@
again:
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX")) != -1) {
+ "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVXH:")) != -1) {
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -530,6 +531,9 @@
break;
case 'F':
config = optarg;
+ break;
+...
2002 Jan 27
0
[PATCH] Add an exit delay to Openssh-3.0.2p1 for use in tunneling
...t; -C Enable compression.\n");
fprintf(stderr, " -N Do not execute a shell or command.\n");
fprintf(stderr, " -g Allow remote hosts to connect to forwarded ports.\n");
@@ -312,7 +313,7 @@
again:
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX")) != -1) {
+ "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:S:TVX")) != -1) {
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -487,7 +488,13 @@
add_remote_forward(&options, fwd_port, buf,
fwd...
2001 Sep 28
1
[PATCH] fix for Linux hang on exit bug in 2.9.9p2
...t; -C Enable compression.\n");
fprintf(stderr, " -N Do not execute a shell or command.\n");
fprintf(stderr, " -g Allow remote hosts to connect to forwarded ports.\n");
@@ -320,7 +321,7 @@
again:
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX")) != -1) {
+ "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:S:TVX")) != -1) {
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -495,7 +496,13 @@
add_remote_forward(&options, fwd_port, buf,
fwd...
2002 Apr 22
9
Password from open filedescriptor
...Sets the escape character for sessions with a pty (default:
.Ql ~ ) .
diff -bur openssh-3.1p1.org/ssh.c openssh-3.1p1/ssh.c
--- openssh-3.1p1.org/ssh.c Tue Feb 19 05:20:58 2002
+++ openssh-3.1p1/ssh.c Mon Apr 22 10:13:55 2002
@@ -312,7 +312,7 @@
again:
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX")) != -1) {
+ "1246ab:c:e:d:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX")) != -1) {
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -522,6 +522,9 @@
break;
case 'F':
config = optarg;
+ break;
+...
2001 Nov 14
6
[PATCH]: Patch to fix hang on exit bug under Linux and add optional exit delay
...t; -C Enable compression.\n");
fprintf(stderr, " -N Do not execute a shell or command.\n");
fprintf(stderr, " -g Allow remote hosts to connect to forwarded ports.\n");
@@ -320,7 +321,7 @@
again:
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX")) != -1) {
+ "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:S:TVX")) != -1) {
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -495,7 +496,13 @@
add_remote_forward(&options, fwd_port, buf,
fwd...
2014 Feb 10
0
[PATCH] Basic SCTP support for OpenSSH client and server
...onnect_via_sctp)
+ hints.ai_protocol = IPPROTO_SCTP;
+#endif
if (cname != NULL)
hints.ai_flags = AI_CANONNAME;
if ((gaierr = getaddrinfo(name, strport, &hints, &res)) != 0) {
@@ -454,8 +458,8 @@ main(int ac, char **av)
argv0 = av[0];
again:
- while ((opt = getopt(ac, av, "1246ab:c:e:fgi:kl:m:no:p:qstvx"
- "ACD:E:F:I:KL:MNO:PQ:R:S:TVw:W:XYy")) != -1) {
+ while ((opt = getopt(ac, av, "1246ab:c:e:fghi:kl:m:no:p:qstvx"
+ "ACD:E:F:HI:KL:MNO:PQ:R:S:TVw:W:XYy")) != -1) {
switch (opt) {
case '1':
options.protocol = SSH_P...
2004 Nov 20
1
[Bug 955] ssh -h " Displayed as illegal options " in SSH 3.9
...host:hostport] [-l login_name] [-m mac_spec] [-o option]
[-p port] [-R port:host:hostport] [-S ctl] [user@]hostname [command]
To avoid this we have include the 'h' character in getopt( ) as given below
In ssh.c #
242 while ((opt = getopt(ac, av,
243 "1246ab:c:e:fgi:hkl:m:no:p:qstvxACD:F:I:L:MNPR:S:TVXY")) != -1) {
244 switch (opt) {
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2011 Jul 17
2
openSSH 5.8p2 BindPort patch
...t;
" [-D [bind_address:]port] [-e escape_char] [-F configfile]\n"
" [-I pkcs11] [-i identity_file]\n"
" [-L [bind_address:]port:host:hostport]\n"
@@ -297,7 +297,7 @@ main(int ac, char **av)
again:
while ((opt = getopt(ac, av, "1246ab:c:e:fgi:kl:m:no:p:qstvx"
- "ACD:F:I:KL:MNO:PR:S:TVw:W:XYy")) != -1) {
+ "AB:CD:F:I:KL:MNO:PR:S:TVw:W:XYy")) != -1) {
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -568,6 +568,9 @@ main(int ac, char **av)
case 'F':
confi...
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly:
http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html
<quote>
The paper concludes that the keystroke timing data observable from
today's SSH implementations reveals a dangerously significant amount of
information about user terminal sessions--enough to locate typed
passwords in the session data stream and reduce the
2015 Jul 29
2
[PATCH] ssh: Add option to present certificates on command line
...ssh_session(void);
static int ssh_session2(void);
static void load_public_identity_files(void);
+static void load_certificate_files(void);
static void main_sigchld_handler(int);
/* from muxclient.c */
@@ -595,7 +597,7 @@ main(int ac, char **av)
again:
while ((opt = getopt(ac, av, "1246ab:c:e:fgi:kl:m:no:p:qstvx"
- "ACD:E:F:GI:KL:MNO:PQ:R:S:TVw:W:XYy")) != -1) {
+ "ACD:E:F:GI:KL:MNO:PQ:R:S:TVw:W:XYyz:")) != -1) {
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -906,6 +908,9 @@ main(int ac, char **av)
case 'F':...
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
.../* SD Mod: */
+ fprintf(stderr, " -S Don't use stenographic timing
manipulation\n");
exit(1);
}
@@ -319,8 +346,9 @@
host = NULL;
again:
+ /* SD Mod: add s option to getopt() call */
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX")) != -1) {
+ "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:STVX")) != -1)
{
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -525,6 +553,14 @@...
2001 Oct 06
1
Defeating Timing Attacks
Hello,
In response to the timing analysis attacks presented by Dawn Song et.
al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html
we
at Silicon Defense developed a patch for openssh to avoid such
measures.
Timing Analysis Evasion changes were developed by C. Jason Coit and Roel
Jonkman of Silicon Defense.
These changes cause SSH to send packets unless request not to,
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
...s:]port] [-e escape_char] [-F
configfile]\n"
" [-i identity_file] [-L
[bind_address:]port:host:hostport]\n"
" [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p
port]\n"
@@ -272,8 +292,13 @@
again:
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:KL:MNO:PR:S:TVw:XY")) !=
-1) {
+ "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:KL:MNO:PR:S:TVw:X"
FIPS_OPTS "Y")) != -1) {
switch (opt) {
+#ifdef OPENSSL_FIPS
+ case 'y':
+ fips_mode = 0;
+...