Displaying 15 results from an estimated 15 matches for "channel_after_select".
2001 Oct 25
2
SIGCHLD race *trivial* patch
...g. */
wait_until_can_do_something(&readset, &writeset, &max_fd,
max_time_milliseconds);
+ debug("wait_until_can_do_something returned; child_terminated=%d, channel_still_open=%d",
+ child_terminated, channel_still_open());
/* Process any channel events. */
channel_after_select(readset, writeset);
@@ -599,6 +608,11 @@
/* Process output to the client and to program stdin. */
process_output(writeset);
+
+ /* Don't know if this is needed -- if it is, uncomment
+ if (!channel_still_open() && child_terminated)
+ break;
+ */
}
if (readset)
xfree...
2000 Nov 08
1
internal error: we do not read, but chan_read_failed
...re info; gets none and goes
through the 'read failed'; 'input open -> drain'; 'input open -> closed';
'send eof' sequence. *Then* 'session_free' is called (as part of session
close), and we end up back in session.c. Next (in serverloop.c) is called
'channel_after_select' which calls channel_handler. This calls (in our case
we are using protocol 2) 'channel_post_open_2', which calls
'channel_handle_rfd' which (eventually) calls 'chan_read_failed' because the
channel still hasn't been closed. As such in the original openssh we get the...
2020 Oct 14
2
Connection hang, can't stop SSH
Using OpenSSH_8.3p1 I had an open (working) connection to some other
box; after a bit of inactivity, some device in the middle seems to have
forgotten about the TCP connection (NAT) and broke it.
I've got an EscapeChar defined, though; so first I tried to send a BREAK
and, when that didn't help (TCP already gone, packets get lost!), I
tried (just out of curiosity) a Rekey.
Now I can see
2001 Jan 18
1
sigchld_handler2.
...erminated) {
while ((pid = waitpid(-1, &status, WNOHANG)) >
0)
session_close_by_pid(pid, status);
+ signal(SIGCHLD, sigchld_handler2);
child_terminated = 0;
}
channel_after_select(&readset, &writeset);
Alain St-Denis
Environment Canada
2004 Apr 23
1
openssh code
Hi,
How do the communication between sshd and program happens when compat20
is enabled? There are two function process_buffered_input_packets and
process_input, but in both cases if compat20 is enabled its just buffering
the packets, but how do sshd will the command to program for execution?
Regards
prasad
2000 May 15
1
AIX authenticate patches
...SIGCHLD.");
child_terminated = 1;
- signal(SIGCHLD, sigchld_handler2);
errno = save_errno;
}
@@ -640,6 +639,7 @@
while ((pid = waitpid(-1, &status, WNOHANG)) > 0)
session_close_by_pid(pid, status);
child_terminated = 0;
+ signal(SIGCHLD, sigchld_handler2);
}
channel_after_select(&readset, &writeset);
process_input(&readset);
--- session.c.orig Wed May 10 10:23:59 2000
+++ session.c Wed May 10 16:16:06 2000
@@ -27,6 +27,13 @@
#include "ssh2.h"
#include "auth.h"
+#ifndef WCOREFLG
+#define WCOREFLG 0200
+#endif
+#ifndef WCOREDUMP
+#defi...
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
...OR ``AS IS'' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES
* OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED.
@@ -173,7 +200,15 @@
void channel_prepare_select(fd_set **, fd_set **, int *, int*, int);
void channel_after_select(fd_set *, fd_set *);
-void channel_output_poll(void);
+
+/*
+ * SD Mod: added parameters bogus_send_count, and
use_steno_timing_manipulation.
+ * The bogus_send_count keeps track of how many bogus packets have been
sent since
+ * the last packet containing real data. The
use_steno_timining_man...
2001 Oct 06
1
Defeating Timing Attacks
Hello,
In response to the timing analysis attacks presented by Dawn Song et.
al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html
we
at Silicon Defense developed a patch for openssh to avoid such
measures.
Timing Analysis Evasion changes were developed by C. Jason Coit and Roel
Jonkman of Silicon Defense.
These changes cause SSH to send packets unless request not to,
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly:
http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html
<quote>
The paper concludes that the keystroke timing data observable from
today's SSH implementations reveals a dangerously significant amount of
information about user terminal sessions--enough to locate typed
passwords in the session data stream and reduce the
2000 Jan 19
3
AIX openssh patches
...int sock)
{
struct sockaddr_in from;
+ #ifdef _AIX
+ unsigned long fromlen;
+ #else
int fromlen;
+ #endif
/* Get IP address of client. */
fromlen = sizeof(from);
*** channels.c.DIST Tue Jan 11 12:16:35 2000
--- channels.c Wed Jan 19 11:01:32 2000
***************
*** 374,380 ****
channel_after_select(fd_set * readset, fd_set * writeset)
{
struct sockaddr addr;
! int addrlen, newsock, i, newch, len;
Channel *ch;
char buf[16384], *remote_hostname;
--- 374,385 ----
channel_after_select(fd_set * readset, fd_set * writeset)
{
struct sockaddr addr;
! #ifdef _AIX
! unsigned long...
2006 Mar 16
11
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
...et=0x92e1e88,
writeset=0x92e07b8) at channels.c:1449
#6 0x0806f9bf in channel_post_open (c=0x9382580, readset=0x92e1e88,
writeset=0x92e07b8) at channels.c:1636
#7 0x0806fe30 in channel_handler (ftab=0x809a480, readset=0x92e1e88,
writeset=0x92e07b8) at channels.c:1778
#8 0x0806ff41 in channel_after_select (readset=0x92e1e88, writeset=0x92e07b8)
at channels.c:1817
#9 0x0805536d in server_loop2 (authctxt=0x92d7750) at serverloop.c:805
#10 0x0805cacd in do_authenticated2 (authctxt=0x92d7750) at session.c:2420
#11 0x08058c81 in do_authenticated (authctxt=0x92d7750) at session.c:217
#12 0x0804f928 i...
2000 May 17
4
Openssh-2.1.0p1 test release
This to announce a test release of 2.1.0p1 before making it widely
available.
This release includes many fixes to problems reported over the last
week. In particular:
- spurious error and coredumps caused by the inbuilt entropy gathering
- RSAref detection
- Compilation fixes for Solaris and others
It also contains (completely untested) support for compiling without
RSA support. This may be
2001 Oct 10
7
OpenSSH solaris: bad return code after exec of remote command
Hi OpenSSH developers,
I am using openSSH (now 2.9.9p2, but prob occurs in 2.9p2 also) to execute
commands on a remote machine which outputs data to stdout then pipes it to
another invocation of ssh which connects back to the first machine in the same
way, where it starts a program to read and store the output from the command on
the second machine. I am using the "command" option in
2001 May 04
19
SSH connection hanging on logout
I am running OpenSSH 2.9p1 on SunOS 5.7 w/4-24-2001 patch cluster.
Like many other users I am seeing the hanging session on logout
with background processes. This is a huge problem for me as
I centrally manage 50+ machines with rdist across ssh.
Instead of just complaining about the problem I thought I would
put my CS degree to use and try to track down the problem myself.
For starters,
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |