Displaying 20 results from an estimated 108 matches for "channel_new".
2014 Mar 23
0
[PATCH] [channels.c] Remove wrong channel_new() comment
channel_new() doesn't free remote_name since 2003/05/11 20:30:25
(git commit b1ca8bb)
---
ChangeLog | 4 ++++
channels.c | 3 +--
2 files changed, 5 insertions(+), 2 deletions(-)
diff --git a/ChangeLog b/ChangeLog
index 4e6b8b2..8f203aa 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,7 @@
+2014...
2008 Jul 09
2
Changes in channel_connect_to
I just want to make sure I'm interpreting this correctly.
In 5.0 channel_connect_to would only return the requested socket. You'd
then need to use this socket to create the channel with with channel_new.
In 5.1 channel_connect_to doesn't return the socket but rolls in
channel_new and now returns the channel directly. The usage of
channel_new hasn't changed though, only channel_connect_to.
Is that about right? Are the any subtleties I'm missing?
2001 May 25
4
Upgraded to 2.9p1 with no luck..
...ter passphrase for key '/users/clad/.ssh/id_rsa':
debug1: read PEM private key done: type RSA
debug2: ssh_rsa_sign: done
debug1: ssh-userauth2 successful: method publickey
debug3: clear hostkey 0
debug3: clear hostkey 1
debug3: clear hostkey 2
debug1: channel 0: new [client-session]
debug1: channel_new: 0
debug1: send channel open 0
Memory fault
Output from /usr/local/sbin/sshd -ddd -D on server side (HP K460, HP-UX
11.0,
PA-RISC 1.1):
debug1: Enabling compression at level 6.
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS rec...
2011 Sep 08
1
Dynamic port remote listener - a BUG?
...{
*allocated_listen_port = get_sock_port(sock, 1);
debug("Allocated listen port %d",
*allocated_listen_port);
}
/* Allocate a channel number for the socket. */
c = channel_new("port listener", type, sock, sock, -1,
CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT,
0, "port listener", 1);
c->path = xstrdup(host);
c->host_port = port_to_connect;
c->listening...
2002 Oct 08
2
Memory fault on HP-UX 11.0, 3.4p1
...49 lastkey 400377a0 hint
-1
debug2: input_userauth_pk_ok: fp
7a:44:be:6c:94:18:fb:0c:ff:e5:1a:9a:07:98:a5:27
debug3: sign_and_send_pubkey
debug3: clear_auth_state: key_free 400377a0
debug1: ssh-userauth2 successful: method publickey
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug1: send channel open 0
Memory fault(coredump)
# ssh -V
OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090607f
HP-UX 11.0 (March 2002 patches)
Thanks,
Eric
2004 Jul 07
3
DynamicWindow Patch
...s: src/usr.bin/ssh/scard and ssh/scard
Common subdirectories: src/usr.bin/ssh/scp and ssh/scp
diff -u src/usr.bin/ssh/serverloop.c ssh/serverloop.c
--- src/usr.bin/ssh/serverloop.c 2004-05-21 07:33:11.000000000 -0400
+++ ssh/serverloop.c 2004-07-07 10:02:24.000000000 -0400
@@ -892,6 +892,9 @@
c = channel_new("session", SSH_CHANNEL_LARVAL,
-1, -1, -1, /*window size*/0, CHAN_SES_PACKET_DEFAULT,
0, "server-session", 1);
+ set_unlimited(&c->input,1);
+ set_unlimited(&c->output,1);
+ c->dynamic_window = 1;
if (session_open(the_authctxt, c->self) != 1) {...
2001 Aug 22
2
CVS oddness on Solaris.
..., and installed.. and
now:
ssh localhost "ps -ef" does not work. It acts like it works, -v -v -v
shows everything right, but.. no output..
[..]
debug3: clear hostkey 0
debug3: clear hostkey 1
debug3: clear hostkey 2
debug1: channel 0: new [client-session]
debug3: ssh_session2_command: channel_new: 0
debug1: send channel open 0
debug1: Entering interactive session.
debug2: callback start
debug1: client_init id 0 arg 0
debug1: Sending command: ps -ef
debug2: callback done
debug1: channel 0: open confirm rwindow 0 rmax 16384
debug1: channel_free: channel 0: client-session, nchannels 1
debug3:...
2001 Feb 10
3
Protocol 2 remote forwarding patch
...array. All slots of the array must always be
* initialized (at least the type field); unused slots are marked with type
@@ -608,13 +610,17 @@
"connect from %.200s port %d",
c->listening_port, c->path, c->host_port,
remote_hostname, remote_port);
- newch = channel_new("direct-tcpip",
+ newch = channel_new((c->type == SSH2_CHANNEL_PORT_LISTENER) ?
+ "forwarded-tcpip" : "direct-tcpip",
SSH_CHANNEL_OPENING, newsock, newsock, -1,
c->local_window_max, c->local_maxpacket,
0, xstrdup(buf), 1);
if (c...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...*/
+
/*
* Maximum file descriptor value used in any of the channels. This is
* updated in channel_allocate.
@@ -581,13 +587,20 @@
"connect from %.200s port %d",
c->listening_port, c->path, c->host_port,
remote_hostname, remote_port);
- newch = channel_new("direct-tcpip",
+ /* Jarno: If the channel is SSH2 port listener (server) then send
+ * forwarded-tcpip message.
+ */
+ newch = channel_new( (c->type == SSH2_CHANNEL_PORT_LISTENER) ?
+ "forwarded-tcpip" : "direct-tcpip",
SSH_CHANNEL_OPENING,...
2001 Aug 24
2
[PATCH] SO_KEEPALIVE for port forwards
...rno));
return;
+ }
+ /* Set keepalives if requested */
+ if (options.keepalives_forward &&
+ setsockopt(newsock, SOL_SOCKET, SO_KEEPALIVE,
+ (void *) &one, sizeof(one)) < 0)
+ {
+ error("setsockopt SO_KEEPALIVE: %.100s", strerror(errno));
}
newch = channel_new(rtype,
nextstate, newsock, newsock, -1,
--- openssh-2.9p2/readconf.c.keepalivetunnel Tue Apr 17 11:11:37 2001
+++ openssh-2.9p2/readconf.c Thu Aug 23 15:42:37 2001
@@ -106,7 +106,7 @@
oUser, oHost, oEscapeChar, oRhostsRSAAuthentication, oProxyCommand,
oGlobalKnownHostsFile, oUserKnownHos...
2003 Sep 16
1
OpenSSH Security Advisory: buffer.adv
This is the 1st revision of the Advisory.
This document can be found at: http://www.openssh.com/txt/buffer.adv
1. Versions affected:
All versions of OpenSSH's sshd prior to 3.7 contain a buffer
management error. It is uncertain whether this error is
potentially exploitable, however, we prefer to see bugs
fixed proactively.
2. Solution:
Upgrade to OpenSSH
2004 Jul 14
1
New dynamic window patch (with limits)
...3.8.1p1/scard and openssh-3.8.1p1-dynwindow/scard
diff -u openssh-3.8.1p1/serverloop.c openssh-3.8.1p1-dynwindow/serverloop.c
--- openssh-3.8.1p1/serverloop.c 2004-01-20 19:02:50.000000000 -0500
+++ openssh-3.8.1p1-dynwindow/serverloop.c 2004-07-07 09:53:44.000000000 -0400
@@ -894,6 +894,9 @@
c = channel_new("session", SSH_CHANNEL_LARVAL,
-1, -1, -1, /*window size*/0, CHAN_SES_PACKET_DEFAULT,
0, "server-session", 1);
+ set_unlimited(&c->input,1);
+ set_unlimited(&c->output,1);
+ c->dynamic_window = 1;
if (session_open(the_authctxt, c->self) != 1) {...
2011 Oct 26
4
C6: ssh X-forwarding does not work
...pm is
installed, have checked sshd config for
#X11Forwarding no
X11Forwarding yes
#X11DisplayOffset 10
Here is a verbose ssh logon, I can't see any difference to a working server:
debug1: Authentication succeeded (password).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug1: Entering interactive session.
debug2: callback start
debug2: x11_get_proto: /usr/bin/xauth list unix:10.0 2>/dev/null
debug1: Requesting X11 forwarding with authentication spoofing.
debug2: channel 0: request x11-req confirm 0
debug2: client_session2_setu...
2003 Sep 16
1
[alambert@quickfire.org: Heads up -- potential problems in 3.7, too? [Fwd: OpenSSH Security Advisory: buffer.adv]]
...g 2003 10:04:36 -0000 1.194
+++ channels.c 16 Sep 2003 21:02:40 -0000 1.195
@@ -228,12 +228,13 @@
if (found == -1) {
/* There are no free slots. Take last+1 slot and expand the
array. */
found = channels_alloc;
- channels_alloc += 10;
if (channels_alloc > 10000)
fatal("channel_new: internal error: channels_alloc
%d "
"too big.", channels_alloc);
+ channels = xrealloc(channels,
+ (channels_alloc + 10) * sizeof(Channel *));
+ channels_alloc += 10;
debug2("channel: expanding %d", channels_alloc);
- channels = xrealloc(channels, c...
2012 Dec 17
15
[Bug 2052] New: Memory leak when SSH login and logout
...locate
memory using xstrdup call and this was not freeed.
3, In Function list_hostkey_types (from line no 825) we allocate memory
using xstrdup call and this was not freeed.
4, In function kex_setup (line no : 246) we allocate memory using
buffer_init call and this was not freeed.
5, In Function channel_new (line no :332) allocate memory using xstrdup
call and this was not freeed.
6, In function channel_new (line no:317) we allocate memory using
buffer_init call and this was not freeed.
If this issue was fixed in the later release, can you please help us
with the patch.
I am attaching the logs for y...
2006 Aug 25
2
RFC: non-root ssh tun access
...08:24:58.000000000 -0400
@@ -941,7 +941,11 @@
goto done;
tun = forced_tun_device;
}
- sock = tun_open(tun, mode);
+#if defined(SSH_TUN_LINUX)
+ sock = tun_open(tun, mode, the_authctxt->pw->pw_uid);
+#else
+ sock = tun_open(tun, mode);
+#endif
if (sock < 0)
goto done;
c = channel_new("tun", SSH_CHANNEL_OPEN, sock, sock, -1,
diff -Nurd openssh-4.3p2.orig/ssh.c openssh-4.3p2/ssh.c
--- openssh-4.3p2.orig/ssh.c 2005-12-31 00:33:37.000000000 -0500
+++ openssh-4.3p2/ssh.c 2006-08-25 08:32:57.000000000 -0400
@@ -1073,8 +1073,13 @@
int fd;
debug("Requesting tun.&...
2001 May 24
0
occasional ssh hang
...h/id_dsa
debug1: try pubkey: /root/.ssh/id_rsa
debug1: input_userauth_pk_ok: pkalg ssh-rsa blen 149 lastkey 0x8112050 hint
2
debug1: read PEM private key done: type RSA
debug1: ssh-userauth2 successful: method publickey
debug1: fd 4 setting O_NONBLOCK
debug1: channel 0: new [client-session]
debug1: channel_new: 0
debug1: send channel open 0
debug1: Entering interactive session.
debug1: client_init id 0 arg 0
debug1: channel request 0: shell
debug1: channel 0: open confirm rwindow 0 rmax 16384
debug1: channel 0: read<=0 rfd 4 len 0
debug1: channel 0: read failed
debug1: channel 0: input open -> drai...
2020 Jul 15
4
Support for macOS feth devices
Hi,
I am currently using the L2 tunnel feature of ssh between two Linux
machines, and it works beautifully! As a result, I have come to prefer a
workflow that uses an L2 tunnel, but I can't seem to find a long-term
solution for this workflow on macOS. At the moment, tap devices on macOS
can be generated using a kernel extension like tuntaposx
<http://tuntaposx.sourceforge.net/>;
2012 Oct 22
1
[PATCH] Implement remote dynamic TCP forwarding
...+
+/* Return CONNECTING channel to remote host, port */
+static Channel *
+connect_to(const char *host, u_short port, char *ctype, char *rname)
+{
+ int sock;
+ struct channel_connect cctx;
+ Channel *c;
+
+ sock = connect_to_helper(host, port, &cctx);
+ if (sock == -1)
+ return NULL;
+
c = channel_new(ctype, SSH_CHANNEL_CONNECTING, sock, sock, -1,
CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0, rname, 1);
c->connect_ctx = cctx;
@@ -3347,6 +3479,10 @@ channel_connect_by_listen_address(u_short listen_port, char *ctype, char *rname)
for (i = 0; i < num_permitted_opens; i++) {...
2001 May 04
0
Exit status strangeness
.../home/ipopovet/.ssh/id_dsa
debug1: input_userauth_pk_ok: pkalg ssh-dss blen 434 lastkey 13a380 hint 2
debug1: read PEM private key done: type DSA
debug1: sig size 20 20
debug1: ssh-userauth2 successful: method publickey
debug1: fd 5 setting O_NONBLOCK
debug1: channel 0: new [client-session]
debug1: channel_new: 0
debug1: send channel open 0
debug1: Entering interactive session.
debug1: client_init id 0 arg 0
debug1: Requesting X11 forwarding with authentication spoofing.
debug1: Sending command: /bin/true
debug1: channel 0: open confirm rwindow 0 rmax 16384
debug1: channel 0: read<=0 rfd 5 len 0
debug...