search for: channel_prepare_select

Displaying 20 results from an estimated 24 matches for "channel_prepare_select".

2005 Sep 04
2
ControlPersist and multiple X11 forwarding.
Three patches attached. One implements a 'ControlPersist' option, which when used with 'ControlMaster auto' or 'ControlMaster 'yes' make makes the master background itself and stick around after its own primary session is completed. The second causes control clients to pass X11 display, auth proto and auth data over the control socket so that appropriate X11
2007 Jul 26
1
Channel Handling Patch
...channel_pre_open 5159 72113 3.8336 53.5869 packet_read_poll_seqnr 4253 76366 3.1604 56.7473 channel_post_open 3864 80230 2.8713 59.6186 cipher_crypt 3849 84079 2.8602 62.4788 buffer_len 3541 87620 2.6313 65.1101 channel_prepare_select 3267 90887 2.4277 67.5378 client_wait_until_can... 2557 93444 1.9001 69.4379 buffer_append Patched: samples cum. samples % cum. % symbol name 15832 15832 11.4148 11.4148 client_loop 15059 30891 10.8575 22.2723 packet_sen...
2002 Mar 12
2
[Bug 160] Race condition in clientloop.c?
http://bugzilla.mindrot.org/show_bug.cgi?id=160 ------- Additional Comments From Nicolas.Williams at ubsw.com 2002-03-13 09:10 ------- Created an attachment (id=40) Debug output, lsof output, etc... ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2001 May 18
0
PATCH: implement delay (sleep) after last tunnelled connection exits
...nt_init_dispatch(void); int session_ident = -1; @@ -324,6 +324,10 @@ client_wait_until_can_do_something(fd_set **readsetp, fd_set **writesetp, int *maxfdp, int rekeying) { + struct timeval timer; + struct timeval *timerp; + int rc; + /* Add any selections by the channel mechanism. */ channel_prepare_select(readsetp, writesetp, maxfdp, rekeying); @@ -346,7 +350,15 @@ if (buffer_len(&stderr_buffer) > 0) FD_SET(fileno(stderr), *writesetp); } else { - FD_SET(connection_in, *readsetp); + /* channel_prepare_select could have closed the last channel */ + if ((session_status == SessionCl...
2002 Jan 27
0
[PATCH] Add an exit delay to Openssh-3.0.2p1 for use in tunneling
...atch(void); int session_ident = -1; @@ -320,6 +322,10 @@ client_wait_until_can_do_something(fd_set **readsetp, fd_set **writesetp, int *maxfdp, int *nallocp, int rekeying) { + struct timeval timer; + struct timeval *timerp; + int rc; + /* Add any selections by the channel mechanism. */ channel_prepare_select(readsetp, writesetp, maxfdp, nallocp, rekeying); @@ -343,7 +349,7 @@ FD_SET(fileno(stderr), *writesetp); } else { /* channel_prepare_select could have closed the last channel */ - if (session_closed && !channel_still_open() && + if (session_status == SessionClose &&...
2001 Sep 28
1
[PATCH] fix for Linux hang on exit bug in 2.9.9p2
...atch(void); int session_ident = -1; @@ -320,6 +322,10 @@ client_wait_until_can_do_something(fd_set **readsetp, fd_set **writesetp, int *maxfdp, int *nallocp, int rekeying) { + struct timeval timer; + struct timeval *timerp; + int rc; + /* Add any selections by the channel mechanism. */ channel_prepare_select(readsetp, writesetp, maxfdp, nallocp, rekeying); @@ -343,11 +349,12 @@ FD_SET(fileno(stderr), *writesetp); } else { /* channel_prepare_select could have closed the last channel */ - if (session_closed && !channel_still_open()) { + if ((session_status == SessionClose) + &am...
2013 Apr 04
15
[Bug 2085] New: fd_mask and howmany are not defined in Android
...is the first of a few patches that I will be submitting - I am attempting to get OpenSSH to cross-compile for the Android platform. Android does not define fd_mask or howmany - and therefore channels.c:2143 and channels.c:2145 cause compilation to fail with errors: channels.c: In function 'channel_prepare_select': channels.c:2143:2: warning: implicit declaration of function 'howmany' [-Wimplicit-function-declaration] channels.c:2145:45: error: 'fd_mask' undeclared (first use in this function) The attached patch adds a couple of definitions that will work around this problem. -- Y...
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly: http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html <quote> The paper concludes that the keystroke timing data observable from today's SSH implementations reveals a dangerously significant amount of information about user terminal sessions--enough to locate typed passwords in the session data stream and reduce the
2001 Sep 05
2
sshd hangs on logout -- is this a bug?
In the changelog, there is an entry: 20001129 - (djm) Back out all the serverloop.c hacks. sshd will now hang again if there are background children with open fds. Does this mean that this is regarded as expected (and correct) behavior, that should not change in the future, or does it mean that this behavior is a known problem that someone will eventually fix? --Adam -- Adam McKenna
2001 Nov 14
6
[PATCH]: Patch to fix hang on exit bug under Linux and add optional exit delay
...atch(void); int session_ident = -1; @@ -320,6 +322,10 @@ client_wait_until_can_do_something(fd_set **readsetp, fd_set **writesetp, int *maxfdp, int *nallocp, int rekeying) { + struct timeval timer; + struct timeval *timerp; + int rc; + /* Add any selections by the channel mechanism. */ channel_prepare_select(readsetp, writesetp, maxfdp, nallocp, rekeying); @@ -343,7 +349,7 @@ FD_SET(fileno(stderr), *writesetp); } else { /* channel_prepare_select could have closed the last channel */ - if (session_closed && !channel_still_open() && + if (session_status == SessionClose &&...
2001 Aug 02
0
patch: properly zeroing fd_set in clientloop
...o channels in * select bitmasks. */ --- channels.c~ Wed Jun 13 15:18:05 2001 +++ channels.c Thu Jul 12 08:32:53 2001 @@ -1160,6 +1160,14 @@ } void +channel_zero_set(fd_set *setp, int maxfdp) +{ + u_int sz = howmany(maxfdp+1, NFDBITS) * sizeof(fd_mask); + + memset(setp, 0, sz); +} + +void channel_prepare_select(fd_set **readsetp, fd_set **writesetp, int *maxfdp, int rekeying) { @@ -1178,8 +1186,8 @@ *writesetp = xmalloc(sz); *maxfdp = n; } - memset(*readsetp, 0, sz); - memset(*writesetp, 0, sz); + channel_zero_set(*readsetp, *maxfdp); + channel_zero_set(*writesetp, *maxfdp); if (!rekeyin...
2001 Jul 27
0
openssh-2.9p2 compilation on LynxOS
...packet.c(717): undefined reference to `howmany' ./libssh.a(packet.o): In function `packet_write_wait': /openssh/openssh-2.9p2/packet.c(1216): undefined reference to `howmany' /openssh/openssh-2.9p2/packet.c(1220): undefined reference to `howmany' ./libssh.a(channels.o): In function `channel_prepare_select': /openssh/openssh-2.9p2/channels.c(1171): undefined reference to `howmany' ./libssh.a(canohost.o): In function `check_ip_options': /openssh/openssh-2.9p2/canohost.c(152): undefined reference to `getprotobynamopenbsd-compat//libopenbsd-compat.a(fake-getaddrinfo.o): In function `getaddri...
2001 Oct 11
0
[patch] option to prevent connection timeout
...51:14 2001 +++ openssh-2.9.9p2/clientloop.c Thu Oct 11 22:03:09 2001 @@ -320,6 +320,9 @@ client_wait_until_can_do_something(fd_set **readsetp, fd_set **writesetp, int *maxfdp, int *nallocp, int rekeying) { + struct timeval tv; + int n; + /* Add any selections by the channel mechanism. */ channel_prepare_select(readsetp, writesetp, maxfdp, nallocp, rekeying); @@ -364,7 +367,24 @@ * SSH_MSG_IGNORE packet when the timeout expires. */ - if (select((*maxfdp)+1, *readsetp, *writesetp, NULL, NULL) < 0) { + /* + * When the "Idle" option is set to a non-zero value, a dummy + * packet is s...
2001 Mar 14
1
[PATCH] Added Null packet keepalive option
...5,6 +365,10 @@ client_wait_until_can_do_something(fd_set **readsetp, fd_set **writesetp, int *maxfdp) { + struct timeval tv = {0}; + tv.tv_sec = options.noop_msg_frequency; + /* Send a noop message at this frequency as a keepalive. */ + /* Add any selections by the channel mechanism. */ channel_prepare_select(readsetp, writesetp, maxfdp); @@ -403,7 +407,8 @@ * SSH_MSG_IGNORE packet when the timeout expires. */ - if (select((*maxfdp)+1, *readsetp, *writesetp, NULL, NULL) < 0) { + switch (select((*maxfdp)+1, *readsetp, *writesetp, NULL, ((tv.tv_sec)?(&tv):NULL))) { + case -1: {...
2001 Sep 26
1
[PATCH] random SSH_MSG_IGNORE packets
...+ openssh-2.9p2.servalive/clientloop.c Wed Sep 26 12:58:38 2001 @@ -324,6 +324,9 @@ client_wait_until_can_do_something(fd_set **readsetp, fd_set **writesetp, int *maxfdp, int rekeying) { + struct timeval tv, *tvp = &tv; + int ret; + /* Add any selections by the channel mechanism. */ channel_prepare_select(readsetp, writesetp, maxfdp, rekeying); @@ -356,13 +359,29 @@ /* * Wait for something to happen. This will suspend the process until * some selected descriptor can be read, written, or has some other - * event pending. Note: if you want to implement SSH_MSG_IGNORE - * messages to fool...
2020 Oct 14
2
Connection hang, can't stop SSH
Using OpenSSH_8.3p1 I had an open (working) connection to some other box; after a bit of inactivity, some device in the middle seems to have forgotten about the TCP connection (NAT) and broke it. I've got an EscapeChar defined, though; so first I tried to send a BREAK and, when that didn't help (TCP already gone, packets get lost!), I tried (just out of curiosity) a Rekey. Now I can see
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
...*************************** + * * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. @@ -173,7 +200,15 @@ void channel_prepare_select(fd_set **, fd_set **, int *, int*, int); void channel_after_select(fd_set *, fd_set *); -void channel_output_poll(void); + +/* + * SD Mod: added parameters bogus_send_count, and use_steno_timing_manipulation. + * The bogus_send_count keeps track of how many bogus packets have been sent sin...
2003 Apr 04
5
Anti-idle in OpenSSH client?
Heya, Most of the windows ssh clients (putty, securecrt) have anti-idle features. They offer either a null packet or protocol no-op or user defined string to be sent over every x seconds. Is this possible or planned with the OpenSSH client? Our draconian firewall admins have started timing out ssh sessions. Yes I'm aware I could hack up a port forwarding dumb traffic process, but was
2004 Mar 23
2
A question on Compilation errors...
...log' /openssh-3.8p1/log.c(330): undefined reference to `syslog' /openssh-3.8p1/log.c(331): undefined reference to `closelog' ./libssh.a(cipher.o): In function `cipher_by_name': /openssh-3.8p1/cipher.c(149): undefined reference to `strcasecmp' ./libssh.a(channels.o): In function `channel_prepare_select': /openssh-3.8p1/channels.c(1668): undefined reference to `howmany' ./libssh.a(packet.o): In function `packet_read_seqnr': /openssh-3.8p1/packet.c(833): undefined reference to `howmany' /openssh-3.8p1/packet.c(858): undefined reference to `howmany' ./libssh.a(packet.o): In funct...
2001 Oct 06
1
Defeating Timing Attacks
Hello, In response to the timing analysis attacks presented by Dawn Song et. al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html we at Silicon Defense developed a patch for openssh to avoid such measures. Timing Analysis Evasion changes were developed by C. Jason Coit and Roel Jonkman of Silicon Defense. These changes cause SSH to send packets unless request not to,