Displaying 11 results from an estimated 11 matches for "channel_output_pol".
Did you mean:
channel_output_poll
2010 Jul 22
1
remote vs local window discrepancy
...the "byte to add"
value is off by 4x the number of packets consumed by the server.
Eventually over time this drives the client's remote window count to go to
zero. As an aside the remote window count has to be exactly 0 for the
stall to occur.
Initially the following line of code in channel_output_poll that decrements
the remote window count for datagram channels looked suspicious:
c->remote_window -= dlen + 4;
However, the code that updates Channel.local_window and
Channel.local_consumed for a datagram channel also includes the +4 in the
calculation. Does anybody know why the datagram ca...
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
...#39;' AND ANY EXPRESS OR
* IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES
@@ -1590,9 +1616,12 @@
/* If there is data to send to the connection, enqueue some of it now.
*/
-
+/*
+ * SD Mod: add arguments bogus_send_count and
use_steno_timing_manipulation
+ * to channel_output_poll.
+*/
void
-channel_output_poll()
+channel_output_poll(int *bogus_send_count, int
use_steno_timing_manipulation)
{
int len, i;
Channel *c;
@@ -1649,11 +1678,49 @@
SSH2_MSG_CHANNEL_DATA :
SSH_MSG_CHANNEL_DATA);
pac...
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly:
http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html
<quote>
The paper concludes that the keystroke timing data observable from
today's SSH implementations reveals a dangerously significant amount of
information about user terminal sessions--enough to locate typed
passwords in the session data stream and reduce the
2001 Oct 06
1
Defeating Timing Attacks
Hello,
In response to the timing analysis attacks presented by Dawn Song et.
al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html
we
at Silicon Defense developed a patch for openssh to avoid such
measures.
Timing Analysis Evasion changes were developed by C. Jason Coit and Roel
Jonkman of Silicon Defense.
These changes cause SSH to send packets unless request not to,
2007 Jul 26
1
Channel Handling Patch
...ata transfers using the standard code and the patched code as
follows.
Standard:
samples cum. samples % cum. % symbol name
15360 15360 11.4140 11.4140 client_loop
13277 28637 9.8661 21.2801 packet_send2_wrapped
11017 39654 8.1867 29.4668 channel_output_poll
8070 47724 5.9968 35.4635 buffer_append_space
7914 55638 5.8809 41.3444 channel_handler
5970 61608 4.4363 45.7807 arc4random
5346 66954 3.9726 49.7533 channel_pre_open
5159 72113 3.8336 53.5869 packet_read_poll_se...
2007 Nov 13
1
Help with openssh: ssh application writing data > 131071 to socket causing message too long error
...did a bit of debugging and found that ssh code was sending packet of
size greater than 131072 bytes from the application level to the
socket and hence
the issue.
On going through the code
In client_loop( in clientloop.c)
if (packet_not_very_much_data_to_write())
channel_output_poll();
In packet.c
packet_not_very_much_data_to_write(void)
{
if (interactive_mode)
{
fprintf(stderr,"interactive mode buffer len %d\n",
buffer_len(&output));
return buffer_len(&output) < 16384;
}
else
{...
2023 Nov 08
2
Delay in starting programs on FreeBSD via ssh after upgrade OpenBSD from 7.3 to 7.4
...tinue;
+ if (c->client_tty)
+ return 1;
+ }
+ return 0;
+}
+
/* Returns the id of an open channel suitable for keepaliving */
int
channel_find_open(struct ssh *ssh)
diff --git a/channels.h b/channels.h
index 7cfba92..c31733f 100644
--- a/channels.h
+++ b/channels.h
@@ -337,6 +337,7 @@ int channel_output_poll(struct ssh *);
int channel_not_very_much_buffered_data(struct ssh *);
void channel_close_all(struct ssh *);
int channel_still_open(struct ssh *);
+int channel_tty_open(struct ssh *);
const char *channel_format_extended_usage(const Channel *);
char *channel_open_message(struct s...
2005 Jun 21
0
Keypress delay & grouping
...to
busywait but instead wait for the system clock. This
introduces a variable delay that greatly reduces the
information from timing analysis.
I believe sshd already can handle multiple keypresses
per packet, but I did get one to choke around 1500
after pasting in 10KB.
I inserted a usleep() in channel_output_poll() [not the
best place but I couldn't get it to work in clientloop.c]
and it runs fine for me, but I may need to make the delay a
bit smarter.
-- Robert
2005 Jan 19
1
sshd hangs
...:
void
server_loop2(Authctxt *authctxt)
{
[ ... ]
for (;;) {
process_buffered_input_packets();
rekeying = (xxx_kex != NULL && !xxx_kex->done);
if (!rekeying && packet_not_very_much_data_to_write())
channel_output_poll();
wait_until_can_do_something(&readset, &writeset, &max_fd,
&nalloc, 0);
[ ...]
and it hangs in the select() call in wait_until_can_do_something().
question: why is the wait time set to 0 (= wait forever) ? server_loop()
(the interactive fun...
2012 Oct 22
1
[PATCH] Implement remote dynamic TCP forwarding
...nnel_post[SSH_CHANNEL_OPEN] = &channel_post_open;
channel_post[SSH_CHANNEL_CONNECTING] = &channel_post_connecting;
channel_post[SSH_CHANNEL_DYNAMIC] = &channel_post_open;
+ channel_post[SSH_CHANNEL_RDYNAMIC] = &channel_post_rdynamic;
}
static void
@@ -2190,10 +2306,12 @@ channel_output_poll(void)
*/
if (compat13) {
if (c->type != SSH_CHANNEL_OPEN &&
- c->type != SSH_CHANNEL_INPUT_DRAINING)
+ c->type != SSH_CHANNEL_INPUT_DRAINING &&
+ c->type != SSH_CHANNEL_RDYNAMIC)
continue;
} else {
- if (c->type != SSH_CHANNEL_O...
2001 Jun 20
8
[Lutz.Jaenicke@aet.TU-Cottbus.DE: 2.9p1: HP-UX 10.20 utmp/wtmp handling broken?]
Hi!
I am resending the following message about problems with utmp handling.
* In the meantime I had some request in private mail from people asking
whether I have new information.
* The problem is still persistant in 2.9p2.
* My own new investigations show, that the problem only appears with
protocol 2, not with protocol 1, I therefore only started to note it
when protocol 2 became the