Displaying 10 results from an estimated 10 matches for "client_channel_closed".
2005 Jun 23
0
ControlPersist.
...code for '~&'
backgrounding already does.
My earlier patch for 'ControlPath none' still applies and is required, btw.
--- openssh/clientloop.c~ 2005-06-17 03:59:35.000000000 +0100
+++ openssh/clientloop.c 2005-06-23 11:05:11.000000000 +0100
@@ -1271,8 +1271,28 @@ static void
client_channel_closed(int id, void *arg)
{
channel_cancel_cleanup(id);
- session_closed = 1;
leave_raw_mode();
+ if (options.control_persist && options.control_path != NULL && control_fd != -1) {
+ int pid = fork();
+
+ if (pid < 0) {
+ error("fork: %.100s", strerror(errno));
+ /*...
2007 Jul 23
0
ControlPersist + IdleTimeout
...hrough for 5 minutes.
You can find it here:
https://bugzilla.mindrot.org/show_bug.cgi?id=1330#c5
It works really well as long as you exit by closing your shell. If
you exit by ~. or closing your terminal window, the daemonizing code
doesn't run.
Can someone please explain to me how client_channel_closed() is
called upon normal termination? I have a hard time gleaning it from
the code.
I'm thinking to let the connection be daemonized when quit_pending is
true in the client loop, but I'm also not sure if that catches all
non-fatal exits that happen to ssh. Any comments?
Note that...
2001 May 18
0
PATCH: implement delay (sleep) after last tunnelled connection exits
...buf, "select: %s\r\n", strerror(errno));
buffer_append(&stderr_buffer, buf, strlen(buf));
quit_pending = 1;
- }
+ } else if (rc == 0 && session_status == SessionWait)
+ session_status=SessionClose;
}
void
@@ -751,7 +773,7 @@
if (id != session_ident)
error("client_channel_closed: id %d != session_ident %d",
id, session_ident);
- session_closed = 1;
+ session_status = (options.sleep >= 0) ? SessionWait : SessionClose;
if (in_raw_mode())
leave_raw_mode();
}
@@ -776,6 +798,7 @@
start_time = get_current_time();
/* Initialize variables. */
+ if(!have_...
2002 Jan 27
0
[PATCH] Add an exit delay to Openssh-3.0.2p1 for use in tunneling
...nprintf(buf, sizeof buf, "select: %s\r\n", strerror(errno));
buffer_append(&stderr_buffer, buf, strlen(buf));
quit_pending = 1;
- }
+ } else if (rc == 0 && session_status == SessionWait)
+ session_status=SessionClose;
}
static void
@@ -760,7 +776,7 @@
error("client_channel_closed: id %d != session_ident %d",
id, session_ident);
channel_cancel_cleanup(id);
- session_closed = 1;
+ session_status = (options.sleep >= 0) ? SessionWait : SessionClose;
if (in_raw_mode())
leave_raw_mode();
}
@@ -785,6 +801,7 @@
start_time = get_current_time();
/* Initi...
2001 Sep 28
1
[PATCH] fix for Linux hang on exit bug in 2.9.9p2
...in client_loop(). */
+#if 0
snprintf(buf, sizeof buf, "Connection to %.300s closed by remote host.\r\n",
host);
buffer_append(&stderr_buffer, buf, strlen(buf));
+#endif
quit_pending = 1;
return;
}
@@ -753,7 +774,7 @@
if (id != session_ident)
error("client_channel_closed: id %d != session_ident %d",
id, session_ident);
- session_closed = 1;
+ session_status = (options.sleep >= 0) ? SessionWait : SessionClose;
if (in_raw_mode())
leave_raw_mode();
}
@@ -778,6 +799,7 @@
start_time = get_current_time();
/* Initialize variables. */
+ if(!have_...
2001 Sep 05
2
sshd hangs on logout -- is this a bug?
In the changelog, there is an entry:
20001129
- (djm) Back out all the serverloop.c hacks. sshd will now hang again
if there are background children with open fds.
Does this mean that this is regarded as expected (and correct) behavior, that
should not change in the future, or does it mean that this behavior is a
known problem that someone will eventually fix?
--Adam
--
Adam McKenna
2001 Nov 14
6
[PATCH]: Patch to fix hang on exit bug under Linux and add optional exit delay
...duplicates the one already in client_loop(). */
+#if 0
snprintf(buf, sizeof buf, "Connection to %.300s closed by remote host.\r\n",
host);
buffer_append(&stderr_buffer, buf, strlen(buf));
+#endif
quit_pending = 1;
return;
}
@@ -757,7 +777,7 @@
error("client_channel_closed: id %d != session_ident %d",
id, session_ident);
channel_cancel_cleanup(id);
- session_closed = 1;
+ session_status = (options.sleep >= 0) ? SessionWait : SessionClose;
if (in_raw_mode())
leave_raw_mode();
}
@@ -782,6 +802,7 @@
start_time = get_current_time();
/* Initi...
2001 Oct 10
7
OpenSSH solaris: bad return code after exec of remote command
Hi OpenSSH developers,
I am using openSSH (now 2.9.9p2, but prob occurs in 2.9p2 also) to execute
commands on a remote machine which outputs data to stdout then pipes it to
another invocation of ssh which connects back to the first machine in the same
way, where it starts a program to read and store the output from the command on
the second machine. I am using the "command" option in
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly:
http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html
<quote>
The paper concludes that the keystroke timing data observable from
today's SSH implementations reveals a dangerously significant amount of
information about user terminal sessions--enough to locate typed
passwords in the session data stream and reduce the
2007 Jul 05
36
[Bug 1330] New: RFE: 'ControlPersist' support -- automatically fork and leave ControlMaster behind as a dæmon
http://bugzilla.mindrot.org/show_bug.cgi?id=1330
Summary: RFE: 'ControlPersist' support -- automatically fork and
leave ControlMaster behind as a d?mon
Product: Portable OpenSSH
Version: 4.6p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: