Displaying 20 results from an estimated 27 matches for "connection_attempts".
2000 Nov 14
1
[PATCH] Added option 'RetryDelay'
..."connectionattempts", oConnectionAttempts },
+ { "retrydelay", oRetryDelay },
{ "batchmode", oBatchMode },
{ "checkhostip", oCheckHostIP },
{ "stricthostkeychecking", oStrictHostKeyChecking },
@@ -474,6 +475,10 @@
intptr = &options->connection_attempts;
goto parse_int;
+ case oRetryDelay:
+ intptr = &options->retry_delay;
+ goto parse_int;
+
case oCipher:
intptr = &options->cipher;
arg = strdelim(&s);
@@ -687,6 +692,7 @@
options->compression_level = -1;
options->port = -1;
options->connection_attemp...
2000 Jun 06
0
connection timeout
...onAttempts },
+ { "connectiontimeout", oConnectionTimeout },
{ "batchmode", oBatchMode },
{ "checkhostip", oCheckHostIP },
{ "stricthostkeychecking", oStrictHostKeyChecking },
@@ -460,6 +462,10 @@
case oConnectionAttempts:
intptr = &options->connection_attempts;
goto parse_int;
+
+ case oConnectionTimeout:
+ intptr = &options->connection_timeout;
+ goto parse_int;
case oCipher:
intptr = &options->cipher;
@@ -669,6 +675,7 @@
options->compression_level = -1;
options->port = -1;
options->connection_attempts =...
2002 May 22
0
[PATCH] connect() timeout
...uot;%.200s line %d: Invalid time argument.", filename, linenum);
+ if (*intptr == -1)
+ *intptr = value;
+ break;
+
case oForwardAgent:
intptr = &options->forward_agent;
parse_flag:
@@ -775,6 +790,7 @@
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
+ options->connection_timeout = -1;
options->number_of_password_prompts = -1;
options->cipher = -1;
options->ciphers = NULL;
--- openssh-3.2.2p1/readconf.h.ORIG Tue Mar 5 02:53:05 2002
+++ openssh-3.2.2p1/readconf.h Tue May 21 15:40:06 2002
@@ -68,6 +68,8 @@
int port;...
2002 Jan 26
5
[PATCH] Connect timeout
...urn -1;
/* NOTREACHED */
+
+ case oConnectTimeout:
+ intptr = &options->connection_timeout;
+ goto parse_int;
+
case oForwardAgent:
intptr = &options->forward_agent;
parse_flag:
@@ -775,6 +782,7 @@
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
+ options->connection_timeout = -1;
options->number_of_password_prompts = -1;
options->cipher = -1;
options->ciphers = NULL;
--- readconf.h.OK Wed Oct 3 19:39:39 2001
+++ readconf.h Sat Jan 26 21:44:35 2002
@@ -68,6 +68,8 @@
int port; /* Port to connect. */
int...
2001 Nov 17
0
[PATCH] Connect timeout
...urn -1;
/* NOTREACHED */
+
+ case oConnectTimeout:
+ intptr = &options->connection_timeout;
+ goto parse_int;
+
case oForwardAgent:
intptr = &options->forward_agent;
parse_flag:
@@ -775,6 +782,7 @@
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
+ options->connection_timeout = -1;
options->number_of_password_prompts = -1;
options->cipher = -1;
options->ciphers = NULL;
--- openssh-3.0.1p1/readconf.h.ORIG Sat Nov 17 22:49:09 2001
+++ openssh-3.0.1p1/readconf.h Sat Nov 17 22:49:47 2001
@@ -68,6 +68,8 @@
int port;...
2003 Apr 15
0
Connect timeout patch
...ot;%.200s line %d: Invalid time argument.", filename, linenum);
+ if (*intptr == -1)
+ *intptr = value;
+ break;
+
case oForwardAgent:
intptr = &options->forward_agent;
parse_flag:
@@ -770,6 +783,7 @@
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
+ options->connection_timeout = -1;
options->number_of_password_prompts = -1;
options->cipher = -1;
options->ciphers = NULL;
--- openssh-3.6.1p1/readconf.h.ORIG Tue Apr 15 23:06:30 2003
+++ openssh-3.6.1p1/readconf.h Tue Apr 15 23:08:28 2003
@@ -66,6 +66,8 @@
int port;...
2002 Apr 03
1
[PATCH] connect() timeout
...uot;%.200s line %d: Invalid time argument.", filename, linenum);
+ if (*intptr == -1)
+ *intptr = value;
+ break;
+
case oForwardAgent:
intptr = &options->forward_agent;
parse_flag:
@@ -775,6 +790,7 @@
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
+ options->connection_timeout = -1;
options->number_of_password_prompts = -1;
options->cipher = -1;
options->ciphers = NULL;
--- openssh-3.1p1/readconf.h.ORIG Tue Mar 5 02:53:05 2002
+++ openssh-3.1p1/readconf.h Wed Apr 3 23:33:48 2002
@@ -68,6 +68,8 @@
int port; /*...
2002 Oct 17
0
[PATCH] connect() timeout for OpenSSH-3.5p1
...ot;%.200s line %d: Invalid time argument.", filename, linenum);
+ if (*intptr == -1)
+ *intptr = value;
+ break;
+
case oForwardAgent:
intptr = &options->forward_agent;
parse_flag:
@@ -769,6 +782,7 @@
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
+ options->connection_timeout = -1;
options->number_of_password_prompts = -1;
options->cipher = -1;
options->ciphers = NULL;
--- openssh-3.5p1/readconf.h.ORIG Sun Jun 9 22:04:03 2002
+++ openssh-3.5p1/readconf.h Wed Oct 16 14:59:12 2002
@@ -66,6 +66,8 @@
int port; /*...
2017 Jan 12
3
proposed change to ssh_connect_direct()
On Sat, Jan 7, 2017 at 2:30 PM, Peter Moody <mindrot at hda3.com> wrote:
> so I spent a bit of time looking at this and it seems like the only
> way to go, at least if I want to keep it in ssh_connect_direct(), is
> to use pthreads. further, it seems like getting that accepted is
> something of a long shot:
Sorry, pthreads is a non-starter.
I would have thought that using
2013 Oct 07
4
Feature request: FQDN Host match
Hello!
I'm hoping that Gmail won't HTML format this mail so that I'll get flamed :)
Anyway, my question relates to ssh_config. The problem I find is that
the Host pattern is only applied to the argument given on the command
line, as outlined in the man page:
"The host is the hostname argument given on the command line (i.e. the
name is not converted to a canonicalized host name
2010 Nov 28
2
[PATCH] Use canonical hostname for DNS SSHFP lookup
...nssh/sshconnect.c openssh-sshfp/sshconnect.c
--- openssh/sshconnect.c 2010-11-28 12:04:32.127050308 +0100
+++ openssh-sshfp/sshconnect.c 2010-11-28 10:32:12.357225689 +0100
@@ -335,7 +335,8 @@
int
ssh_connect(const char *host, struct sockaddr_storage * hostaddr,
u_short port, int family, int connection_attempts, int *timeout_ms,
- int want_keepalive, int needpriv, const char *proxy_command)
+ int want_keepalive, int needpriv, const char *proxy_command,
+ char **canohost)
{
int gaierr;
int on = 1;
@@ -352,6 +353,8 @@
/* No proxy command. */
memset(&hints, 0, sizeof(hints));
+ if (ca...
2015 Nov 19
2
[Bug 2500] New: ConnectionAttempts=0 causes ssh to output uninitialised data on stdout
...vw at phas.ubc.ca
Using ssh with ConnectionAttempts set to zero results in the contents
of uninitialised memory being sent to stdout. For example:
$ ssh -o ConnectionAttempts=0 somehost
ssh: connect to host somehost port \200\335q\002\374\177: Success
Cause:
When ssh_connect_direct() is passed connection_attempts=0, the
strport[] buffer is never initialised, since the whole attempt loop is
skipped. Its contents are later output in the error message after the
skipped loop (sshconnect.c:485).
--
You are receiving this mail because:
You are watching the assignee of the bug.
2018 Feb 23
6
RFC 8305 Happy Eyeballs in OpenSSH
...fd_ai[sock]->ai_addrlen);
+ break;
+ }
+ }
+ oerrno = errno;
+ while (nfds-- > 0)
+ if (FD_ISSET(nfds, &fds))
+ close(nfds);
+ if (ssh_connect_timeout(&start_tv, *timeout_ms))
+ errno = ETIMEDOUT;
+ else
+ errno = oerrno;
+ return sock;
}
/*
@@ -505,13 +664,9 @@
int connection_attempts, int *timeout_ms, int want_keepalive, int needpriv)
{
int on = 1;
- int oerrno, sock = -1, attempt;
- char ntop[NI_MAXHOST], strport[NI_MAXSERV];
- struct addrinfo *ai;
+ int sock = -1, attempt;
debug2("%s: needpriv %d", __func__, needpriv);
- memset(ntop, 0, sizeof(ntop));
- memse...
2001 Oct 11
0
[patch] option to prevent connection timeout
...ptr = &options->number_of_password_prompts;
goto parse_int;
@@ -767,6 +772,7 @@
options->strict_host_key_checking = -1;
options->compression = -1;
options->keepalives = -1;
+ options->idle = -1;
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
@@ -859,6 +865,8 @@
options->compression = 0;
if (options->keepalives == -1)
options->keepalives = 1;
+ if (options->idle == -1)
+ options->idle = 0;
if (options->compression_level == -1)
options->compression_level = 6;
if (options->port == -1)
--- open...
2002 Jun 11
4
ssh setuid changes.
Ok, I'm doing a heads up here.
I just applied:
- markus at cvs.openbsd.org 2002/06/11 04:14:26
[ssh.c sshconnect.c sshconnect.h]
no longer use uidswap.[ch] from the ssh client
run less code with euid==0 if ssh is installed setuid root
just switch the euid, don't switch the complete set of groups
(this is only needed by sshd). ok provos@
A few comments about
2001 Mar 14
1
[PATCH] Added Null packet keepalive option
...ions->number_of_password_prompts;
goto parse_int;
@@ -707,6 +712,7 @@
options->strict_host_key_checking = -1;
options->compression = -1;
options->keepalives = -1;
+ options->noop_msg_frequency = -1;
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
@@ -791,6 +797,8 @@
options->compression = 0;
if (options->keepalives == -1)
options->keepalives = 1;
+ if (options->noop_msg_frequency == -1)
+ options->noop_msg_frequency = 0;
if (options->compression_level == -1)
options->compression_level = 6;
if (opti...
2001 Aug 24
2
[PATCH] SO_KEEPALIVE for port forwards
...ions->number_of_password_prompts;
goto parse_int;
@@ -738,6 +743,7 @@
options->strict_host_key_checking = -1;
options->compression = -1;
options->keepalives = -1;
+ options->keepalives_forward = -1;
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
@@ -825,6 +831,8 @@
options->compression = 0;
if (options->keepalives == -1)
options->keepalives = 1;
+ if (options->keepalives_forward == -1)
+ options->keepalives_forward = 0;
if (options->compression_level == -1)
options->compression_level = 6;
if (opti...
2001 May 18
0
PATCH: implement delay (sleep) after last tunnelled connection exits
...-177,6 +177,7 @@
{ "dynamicforward", oDynamicForward },
{ "preferredauthentications", oPreferredAuthentications },
{ "hostkeyalgorithms", oHostKeyAlgorithms },
+ { "sleep", oSleep },
{ NULL, 0 }
};
@@ -494,6 +495,10 @@
intptr = &options->connection_attempts;
goto parse_int;
+ case oSleep:
+ intptr = &options->sleep;
+ goto parse_int;
+
case oCipher:
intptr = &options->cipher;
arg = strdelim(&s);
@@ -761,6 +766,7 @@
options->num_remote_forwards = 0;
options->log_level = (LogLevel) - 1;
options->preferred_...
2002 Jan 27
0
[PATCH] Add an exit delay to Openssh-3.0.2p1 for use in tunneling
...t;smartcarddevice", oSmartcardDevice },
{ "clearallforwardings", oClearAllForwardings },
{ "nohostauthenticationforlocalhost", oNoHostAuthenticationForLocalhost },
+ { "sleep", oSleep },
{ NULL, 0 }
};
@@ -528,6 +529,10 @@
intptr = &options->connection_attempts;
goto parse_int;
+ case oSleep:
+ intptr = &options->sleep;
+ goto parse_int;
+
case oCipher:
intptr = &options->cipher;
arg = strdelim(&s);
@@ -799,6 +804,7 @@
options->bind_address = NULL;
options->smartcard_device = NULL;
options->no_host_authentic...
2001 Sep 26
1
[PATCH] random SSH_MSG_IGNORE packets
...@@ -738,6 +776,8 @@
options->strict_host_key_checking = -1;
options->compression = -1;
options->keepalives = -1;
+ options->bogus_traffic_interval_max = -1;
+ options->bogus_traffic_interval_min = -1;
options->compression_level = -1;
options->port = -1;
options->connection_attempts = -1;
@@ -825,6 +865,10 @@
options->compression = 0;
if (options->keepalives == -1)
options->keepalives = 1;
+ if (options->bogus_traffic_interval_max == -1)
+ options->bogus_traffic_interval_max = 0;
+ if (options->bogus_traffic_interval_min == -1)
+ options->bogus_t...