search for: channel_new

Displaying 20 results from an estimated 108 matches for "channel_new".

2014 Mar 23
0
[PATCH] [channels.c] Remove wrong channel_new() comment
channel_new() doesn't free remote_name since 2003/05/11 20:30:25 (git commit b1ca8bb) --- ChangeLog | 4 ++++ channels.c | 3 +-- 2 files changed, 5 insertions(+), 2 deletions(-) diff --git a/ChangeLog b/ChangeLog index 4e6b8b2..8f203aa 100644 --- a/ChangeLog +++ b/ChangeLog @@ -1,3 +1,7 @@ +2014...
2008 Jul 09
2
Changes in channel_connect_to
I just want to make sure I'm interpreting this correctly. In 5.0 channel_connect_to would only return the requested socket. You'd then need to use this socket to create the channel with with channel_new. In 5.1 channel_connect_to doesn't return the socket but rolls in channel_new and now returns the channel directly. The usage of channel_new hasn't changed though, only channel_connect_to. Is that about right? Are the any subtleties I'm missing?
2001 May 25
4
Upgraded to 2.9p1 with no luck..
...ter passphrase for key '/users/clad/.ssh/id_rsa': debug1: read PEM private key done: type RSA debug2: ssh_rsa_sign: done debug1: ssh-userauth2 successful: method publickey debug3: clear hostkey 0 debug3: clear hostkey 1 debug3: clear hostkey 2 debug1: channel 0: new [client-session] debug1: channel_new: 0 debug1: send channel open 0 Memory fault Output from /usr/local/sbin/sshd -ddd -D on server side (HP K460, HP-UX 11.0, PA-RISC 1.1): debug1: Enabling compression at level 6. debug1: SSH2_MSG_NEWKEYS sent debug1: waiting for SSH2_MSG_NEWKEYS debug1: newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS rec...
2011 Sep 08
1
Dynamic port remote listener - a BUG?
...{ *allocated_listen_port = get_sock_port(sock, 1); debug("Allocated listen port %d", *allocated_listen_port); } /* Allocate a channel number for the socket. */ c = channel_new("port listener", type, sock, sock, -1, CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0, "port listener", 1); c->path = xstrdup(host); c->host_port = port_to_connect; c->listening...
2002 Oct 08
2
Memory fault on HP-UX 11.0, 3.4p1
...49 lastkey 400377a0 hint -1 debug2: input_userauth_pk_ok: fp 7a:44:be:6c:94:18:fb:0c:ff:e5:1a:9a:07:98:a5:27 debug3: sign_and_send_pubkey debug3: clear_auth_state: key_free 400377a0 debug1: ssh-userauth2 successful: method publickey debug1: channel 0: new [client-session] debug3: ssh_session2_open: channel_new: 0 debug1: send channel open 0 Memory fault(coredump) # ssh -V OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090607f HP-UX 11.0 (March 2002 patches) Thanks, Eric
2004 Jul 07
3
DynamicWindow Patch
...s: src/usr.bin/ssh/scard and ssh/scard Common subdirectories: src/usr.bin/ssh/scp and ssh/scp diff -u src/usr.bin/ssh/serverloop.c ssh/serverloop.c --- src/usr.bin/ssh/serverloop.c 2004-05-21 07:33:11.000000000 -0400 +++ ssh/serverloop.c 2004-07-07 10:02:24.000000000 -0400 @@ -892,6 +892,9 @@ c = channel_new("session", SSH_CHANNEL_LARVAL, -1, -1, -1, /*window size*/0, CHAN_SES_PACKET_DEFAULT, 0, "server-session", 1); + set_unlimited(&c->input,1); + set_unlimited(&c->output,1); + c->dynamic_window = 1; if (session_open(the_authctxt, c->self) != 1) {...
2001 Aug 22
2
CVS oddness on Solaris.
..., and installed.. and now: ssh localhost "ps -ef" does not work. It acts like it works, -v -v -v shows everything right, but.. no output.. [..] debug3: clear hostkey 0 debug3: clear hostkey 1 debug3: clear hostkey 2 debug1: channel 0: new [client-session] debug3: ssh_session2_command: channel_new: 0 debug1: send channel open 0 debug1: Entering interactive session. debug2: callback start debug1: client_init id 0 arg 0 debug1: Sending command: ps -ef debug2: callback done debug1: channel 0: open confirm rwindow 0 rmax 16384 debug1: channel_free: channel 0: client-session, nchannels 1 debug3:...
2001 Feb 10
3
Protocol 2 remote forwarding patch
...array. All slots of the array must always be * initialized (at least the type field); unused slots are marked with type @@ -608,13 +610,17 @@ "connect from %.200s port %d", c->listening_port, c->path, c->host_port, remote_hostname, remote_port); - newch = channel_new("direct-tcpip", + newch = channel_new((c->type == SSH2_CHANNEL_PORT_LISTENER) ? + "forwarded-tcpip" : "direct-tcpip", SSH_CHANNEL_OPENING, newsock, newsock, -1, c->local_window_max, c->local_maxpacket, 0, xstrdup(buf), 1); if (c...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...*/ + /* * Maximum file descriptor value used in any of the channels. This is * updated in channel_allocate. @@ -581,13 +587,20 @@ "connect from %.200s port %d", c->listening_port, c->path, c->host_port, remote_hostname, remote_port); - newch = channel_new("direct-tcpip", + /* Jarno: If the channel is SSH2 port listener (server) then send + * forwarded-tcpip message. + */ + newch = channel_new( (c->type == SSH2_CHANNEL_PORT_LISTENER) ? + "forwarded-tcpip" : "direct-tcpip", SSH_CHANNEL_OPENING,...
2001 Aug 24
2
[PATCH] SO_KEEPALIVE for port forwards
...rno)); return; + } + /* Set keepalives if requested */ + if (options.keepalives_forward && + setsockopt(newsock, SOL_SOCKET, SO_KEEPALIVE, + (void *) &one, sizeof(one)) < 0) + { + error("setsockopt SO_KEEPALIVE: %.100s", strerror(errno)); } newch = channel_new(rtype, nextstate, newsock, newsock, -1, --- openssh-2.9p2/readconf.c.keepalivetunnel Tue Apr 17 11:11:37 2001 +++ openssh-2.9p2/readconf.c Thu Aug 23 15:42:37 2001 @@ -106,7 +106,7 @@ oUser, oHost, oEscapeChar, oRhostsRSAAuthentication, oProxyCommand, oGlobalKnownHostsFile, oUserKnownHos...
2003 Sep 16
1
OpenSSH Security Advisory: buffer.adv
This is the 1st revision of the Advisory. This document can be found at: http://www.openssh.com/txt/buffer.adv 1. Versions affected: All versions of OpenSSH's sshd prior to 3.7 contain a buffer management error. It is uncertain whether this error is potentially exploitable, however, we prefer to see bugs fixed proactively. 2. Solution: Upgrade to OpenSSH
2004 Jul 14
1
New dynamic window patch (with limits)
...3.8.1p1/scard and openssh-3.8.1p1-dynwindow/scard diff -u openssh-3.8.1p1/serverloop.c openssh-3.8.1p1-dynwindow/serverloop.c --- openssh-3.8.1p1/serverloop.c 2004-01-20 19:02:50.000000000 -0500 +++ openssh-3.8.1p1-dynwindow/serverloop.c 2004-07-07 09:53:44.000000000 -0400 @@ -894,6 +894,9 @@ c = channel_new("session", SSH_CHANNEL_LARVAL, -1, -1, -1, /*window size*/0, CHAN_SES_PACKET_DEFAULT, 0, "server-session", 1); + set_unlimited(&c->input,1); + set_unlimited(&c->output,1); + c->dynamic_window = 1; if (session_open(the_authctxt, c->self) != 1) {...
2011 Oct 26
4
C6: ssh X-forwarding does not work
...pm is installed, have checked sshd config for #X11Forwarding no X11Forwarding yes #X11DisplayOffset 10 Here is a verbose ssh logon, I can't see any difference to a working server: debug1: Authentication succeeded (password). debug1: channel 0: new [client-session] debug3: ssh_session2_open: channel_new: 0 debug2: channel 0: send open debug1: Entering interactive session. debug2: callback start debug2: x11_get_proto: /usr/bin/xauth list unix:10.0 2>/dev/null debug1: Requesting X11 forwarding with authentication spoofing. debug2: channel 0: request x11-req confirm 0 debug2: client_session2_setu...
2003 Sep 16
1
[alambert@quickfire.org: Heads up -- potential problems in 3.7, too? [Fwd: OpenSSH Security Advisory: buffer.adv]]
...g 2003 10:04:36 -0000 1.194 +++ channels.c 16 Sep 2003 21:02:40 -0000 1.195 @@ -228,12 +228,13 @@ if (found == -1) { /* There are no free slots. Take last+1 slot and expand the array. */ found = channels_alloc; - channels_alloc += 10; if (channels_alloc > 10000) fatal("channel_new: internal error: channels_alloc %d " "too big.", channels_alloc); + channels = xrealloc(channels, + (channels_alloc + 10) * sizeof(Channel *)); + channels_alloc += 10; debug2("channel: expanding %d", channels_alloc); - channels = xrealloc(channels, c...
2012 Dec 17
15
[Bug 2052] New: Memory leak when SSH login and logout
...locate memory using xstrdup call and this was not freeed. 3, In Function list_hostkey_types (from line no 825) we allocate memory using xstrdup call and this was not freeed. 4, In function kex_setup (line no : 246) we allocate memory using buffer_init call and this was not freeed. 5, In Function channel_new (line no :332) allocate memory using xstrdup call and this was not freeed. 6, In function channel_new (line no:317) we allocate memory using buffer_init call and this was not freeed. If this issue was fixed in the later release, can you please help us with the patch. I am attaching the logs for y...
2006 Aug 25
2
RFC: non-root ssh tun access
...08:24:58.000000000 -0400 @@ -941,7 +941,11 @@ goto done; tun = forced_tun_device; } - sock = tun_open(tun, mode); +#if defined(SSH_TUN_LINUX) + sock = tun_open(tun, mode, the_authctxt->pw->pw_uid); +#else + sock = tun_open(tun, mode); +#endif if (sock < 0) goto done; c = channel_new("tun", SSH_CHANNEL_OPEN, sock, sock, -1, diff -Nurd openssh-4.3p2.orig/ssh.c openssh-4.3p2/ssh.c --- openssh-4.3p2.orig/ssh.c 2005-12-31 00:33:37.000000000 -0500 +++ openssh-4.3p2/ssh.c 2006-08-25 08:32:57.000000000 -0400 @@ -1073,8 +1073,13 @@ int fd; debug("Requesting tun.&...
2001 May 24
0
occasional ssh hang
...h/id_dsa debug1: try pubkey: /root/.ssh/id_rsa debug1: input_userauth_pk_ok: pkalg ssh-rsa blen 149 lastkey 0x8112050 hint 2 debug1: read PEM private key done: type RSA debug1: ssh-userauth2 successful: method publickey debug1: fd 4 setting O_NONBLOCK debug1: channel 0: new [client-session] debug1: channel_new: 0 debug1: send channel open 0 debug1: Entering interactive session. debug1: client_init id 0 arg 0 debug1: channel request 0: shell debug1: channel 0: open confirm rwindow 0 rmax 16384 debug1: channel 0: read<=0 rfd 4 len 0 debug1: channel 0: read failed debug1: channel 0: input open -> drai...
2020 Jul 15
4
Support for macOS feth devices
Hi, I am currently using the L2 tunnel feature of ssh between two Linux machines, and it works beautifully! As a result, I have come to prefer a workflow that uses an L2 tunnel, but I can't seem to find a long-term solution for this workflow on macOS. At the moment, tap devices on macOS can be generated using a kernel extension like tuntaposx <http://tuntaposx.sourceforge.net/>;
2012 Oct 22
1
[PATCH] Implement remote dynamic TCP forwarding
...+ +/* Return CONNECTING channel to remote host, port */ +static Channel * +connect_to(const char *host, u_short port, char *ctype, char *rname) +{ + int sock; + struct channel_connect cctx; + Channel *c; + + sock = connect_to_helper(host, port, &cctx); + if (sock == -1) + return NULL; + c = channel_new(ctype, SSH_CHANNEL_CONNECTING, sock, sock, -1, CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0, rname, 1); c->connect_ctx = cctx; @@ -3347,6 +3479,10 @@ channel_connect_by_listen_address(u_short listen_port, char *ctype, char *rname) for (i = 0; i < num_permitted_opens; i++) {...
2001 May 04
0
Exit status strangeness
.../home/ipopovet/.ssh/id_dsa debug1: input_userauth_pk_ok: pkalg ssh-dss blen 434 lastkey 13a380 hint 2 debug1: read PEM private key done: type DSA debug1: sig size 20 20 debug1: ssh-userauth2 successful: method publickey debug1: fd 5 setting O_NONBLOCK debug1: channel 0: new [client-session] debug1: channel_new: 0 debug1: send channel open 0 debug1: Entering interactive session. debug1: client_init id 0 arg 0 debug1: Requesting X11 forwarding with authentication spoofing. debug1: Sending command: /bin/true debug1: channel 0: open confirm rwindow 0 rmax 16384 debug1: channel 0: read<=0 rfd 5 len 0 debug...