search for: channel_after_select

Displaying 15 results from an estimated 15 matches for "channel_after_select".

2001 Oct 25
2
SIGCHLD race *trivial* patch
...g. */ wait_until_can_do_something(&readset, &writeset, &max_fd, max_time_milliseconds); + debug("wait_until_can_do_something returned; child_terminated=%d, channel_still_open=%d", + child_terminated, channel_still_open()); /* Process any channel events. */ channel_after_select(readset, writeset); @@ -599,6 +608,11 @@ /* Process output to the client and to program stdin. */ process_output(writeset); + + /* Don't know if this is needed -- if it is, uncomment + if (!channel_still_open() && child_terminated) + break; + */ } if (readset) xfree...
2000 Nov 08
1
internal error: we do not read, but chan_read_failed
...re info; gets none and goes through the 'read failed'; 'input open -> drain'; 'input open -> closed'; 'send eof' sequence. *Then* 'session_free' is called (as part of session close), and we end up back in session.c. Next (in serverloop.c) is called 'channel_after_select' which calls channel_handler. This calls (in our case we are using protocol 2) 'channel_post_open_2', which calls 'channel_handle_rfd' which (eventually) calls 'chan_read_failed' because the channel still hasn't been closed. As such in the original openssh we get the...
2020 Oct 14
2
Connection hang, can't stop SSH
Using OpenSSH_8.3p1 I had an open (working) connection to some other box; after a bit of inactivity, some device in the middle seems to have forgotten about the TCP connection (NAT) and broke it. I've got an EscapeChar defined, though; so first I tried to send a BREAK and, when that didn't help (TCP already gone, packets get lost!), I tried (just out of curiosity) a Rekey. Now I can see
2001 Jan 18
1
sigchld_handler2.
...erminated) { while ((pid = waitpid(-1, &status, WNOHANG)) > 0) session_close_by_pid(pid, status); + signal(SIGCHLD, sigchld_handler2); child_terminated = 0; } channel_after_select(&readset, &writeset); Alain St-Denis Environment Canada
2004 Apr 23
1
openssh code
Hi, How do the communication between sshd and program happens when compat20 is enabled? There are two function process_buffered_input_packets and process_input, but in both cases if compat20 is enabled its just buffering the packets, but how do sshd will the command to program for execution? Regards prasad
2000 May 15
1
AIX authenticate patches
...SIGCHLD."); child_terminated = 1; - signal(SIGCHLD, sigchld_handler2); errno = save_errno; } @@ -640,6 +639,7 @@ while ((pid = waitpid(-1, &status, WNOHANG)) > 0) session_close_by_pid(pid, status); child_terminated = 0; + signal(SIGCHLD, sigchld_handler2); } channel_after_select(&readset, &writeset); process_input(&readset); --- session.c.orig Wed May 10 10:23:59 2000 +++ session.c Wed May 10 16:16:06 2000 @@ -27,6 +27,13 @@ #include "ssh2.h" #include "auth.h" +#ifndef WCOREFLG +#define WCOREFLG 0200 +#endif +#ifndef WCOREDUMP +#defi...
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
...OR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. @@ -173,7 +200,15 @@ void channel_prepare_select(fd_set **, fd_set **, int *, int*, int); void channel_after_select(fd_set *, fd_set *); -void channel_output_poll(void); + +/* + * SD Mod: added parameters bogus_send_count, and use_steno_timing_manipulation. + * The bogus_send_count keeps track of how many bogus packets have been sent since + * the last packet containing real data. The use_steno_timining_man...
2001 Oct 06
1
Defeating Timing Attacks
Hello, In response to the timing analysis attacks presented by Dawn Song et. al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html we at Silicon Defense developed a patch for openssh to avoid such measures. Timing Analysis Evasion changes were developed by C. Jason Coit and Roel Jonkman of Silicon Defense. These changes cause SSH to send packets unless request not to,
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly: http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html <quote> The paper concludes that the keystroke timing data observable from today's SSH implementations reveals a dangerously significant amount of information about user terminal sessions--enough to locate typed passwords in the session data stream and reduce the
2000 Jan 19
3
AIX openssh patches
...int sock) { struct sockaddr_in from; + #ifdef _AIX + unsigned long fromlen; + #else int fromlen; + #endif /* Get IP address of client. */ fromlen = sizeof(from); *** channels.c.DIST Tue Jan 11 12:16:35 2000 --- channels.c Wed Jan 19 11:01:32 2000 *************** *** 374,380 **** channel_after_select(fd_set * readset, fd_set * writeset) { struct sockaddr addr; ! int addrlen, newsock, i, newch, len; Channel *ch; char buf[16384], *remote_hostname; --- 374,385 ---- channel_after_select(fd_set * readset, fd_set * writeset) { struct sockaddr addr; ! #ifdef _AIX ! unsigned long...
2006 Mar 16
11
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
...et=0x92e1e88, writeset=0x92e07b8) at channels.c:1449 #6 0x0806f9bf in channel_post_open (c=0x9382580, readset=0x92e1e88, writeset=0x92e07b8) at channels.c:1636 #7 0x0806fe30 in channel_handler (ftab=0x809a480, readset=0x92e1e88, writeset=0x92e07b8) at channels.c:1778 #8 0x0806ff41 in channel_after_select (readset=0x92e1e88, writeset=0x92e07b8) at channels.c:1817 #9 0x0805536d in server_loop2 (authctxt=0x92d7750) at serverloop.c:805 #10 0x0805cacd in do_authenticated2 (authctxt=0x92d7750) at session.c:2420 #11 0x08058c81 in do_authenticated (authctxt=0x92d7750) at session.c:217 #12 0x0804f928 i...
2000 May 17
4
Openssh-2.1.0p1 test release
This to announce a test release of 2.1.0p1 before making it widely available. This release includes many fixes to problems reported over the last week. In particular: - spurious error and coredumps caused by the inbuilt entropy gathering - RSAref detection - Compilation fixes for Solaris and others It also contains (completely untested) support for compiling without RSA support. This may be
2001 Oct 10
7
OpenSSH solaris: bad return code after exec of remote command
Hi OpenSSH developers, I am using openSSH (now 2.9.9p2, but prob occurs in 2.9p2 also) to execute commands on a remote machine which outputs data to stdout then pipes it to another invocation of ssh which connects back to the first machine in the same way, where it starts a program to read and store the output from the command on the second machine. I am using the "command" option in
2001 May 04
19
SSH connection hanging on logout
I am running OpenSSH 2.9p1 on SunOS 5.7 w/4-24-2001 patch cluster. Like many other users I am seeing the hanging session on logout with background processes. This is a huge problem for me as I centrally manage 50+ machines with rdist across ssh. Instead of just complaining about the problem I thought I would put my CS degree to use and try to track down the problem myself. For starters,
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches? --- Scott Neugroschl | XYPRO Technology Corporation 4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |