search for: daemonise

Displaying 20 results from an estimated 22 matches for "daemonise".

2015 Apr 04
1
systemctl (again)
.../home/jmr > Type=forking ExecStart=/usr/bin/timidity -iAD EOF > > systemctl daemon-reload > > systemctl start timidity > > You don't need to define an ExecStop and the type of the service > should be forking as you are daemonising it - simple if you didn't > daemonise it (or skip type which has this as default). > > There is also no need to deal with the race condition mess that is > a PID file with systemd as well... technically there is no need to > mess with MAINPID in this scenario. Points noted, I just took Andrew's file and changed the ba...
2015 Apr 04
4
systemctl (again)
On April 4, 2015 12:14:08 PM EDT, Pete Travis <lists at petetravis.com> wrote: >On Apr 4, 2015 7:55 AM, "J Martin Rushton" ><martinrushton56 at btinternet.com> >wrote: >> >> -----BEGIN PGP SIGNED MESSAGE----- >> Hash: SHA1 >> >> Thanks Andrew. >> >> One more problem solved, as I discovered last thing yesterday there >>
2015 Apr 04
0
systemctl (again)
...ice] User=jmr Group=users WorkingDirectory=/home/jmr Type=forking ExecStart=/usr/bin/timidity -iAD EOF systemctl daemon-reload systemctl start timidity You don't need to define an ExecStop and the type of the service should be forking as you are daemonising it - simple if you didn't daemonise it (or skip type which has this as default). There is also no need to deal with the race condition mess that is a PID file with systemd as well... technically there is no need to mess with MAINPID in this scenario. This is a quite messy though as you're running a 'system service' in t...
2015 Jun 05
0
[Bug 1948] ssh -f doesn't terminate when muxing connections.
https://bugzilla.mindrot.org/show_bug.cgi?id=1948 --- Comment #19 from Damien Miller <djm at mindrot.org> --- Created attachment 2645 --> https://bugzilla.mindrot.org/attachment.cgi?id=2645&action=edit daemonise with when -f specified and not in ControlPersist mode Maybe something as simple as this? -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug.
2023 Jul 19
0
[Bug 1948] ssh -f doesn't terminate when muxing connections.
...----------------------------------- CC| |peter.chubb at unsw.edu.au --- Comment #21 from Peter Chubb <peter.chubb at unsw.edu.au> --- Created attachment 3705 --> https://bugzilla.mindrot.org/attachment.cgi?id=3705&action=edit Proposed fix: daemonise if -f specified. -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
2023 Jul 19
0
[Bug 1948] ssh -f doesn't terminate when muxing connections.
https://bugzilla.mindrot.org/show_bug.cgi?id=1948 --- Comment #22 from Peter Chubb <peter.chubb at unsw.edu.au> --- The fix I propose is not to change the TTY settings if we're daemonising. It makes no sense to change terminal settings if we're detaching from the terminal anyway. -- You are receiving this mail because: You are watching the assignee of the bug. You are watching
2001 Feb 17
2
exit code weirdness in fatal()
Hello all, I came across the following with the latest snapshot (and previous): (just trying to start sshd when it's already running) # ./sshd -d [snip] socket: Invalid argument debug1: Bind to port 22 on 0.0.0.0. fatal: Cannot bind any address. # echo $? 255 # ./sshd # echo $? 0 with './sshd', the same fatal message is printed to syslog. This seems critically wrong on systems
2010 Apr 13
0
Samba 34 + LDAP = hang?
...ld not really get any useful debugging out of it :( The stack trace is junk (even after enabling max debug) and running with.. sudo /usr/local/sbin/smbd -d 10 -F -S Showed stuff but nothing related to LDAP (except mentioning the line in the config) and it still hung after saying it was going to daemonise itself. It hung not using any CPU but it hadn't yet opened any TCP listen sockets - however it did have a socket to the LDAP server open. Does anyone actually use this combination on FreeBSD? I have had various annoying issues with LDAP (eg slapd crashing when it's not shut down clean...
2013 Oct 10
0
[Bug 1988] ControlPersist causes stderr to be left open until the master connection times out
...LVED Resolution|--- |FIXED Blocks|2130 |2076 --- Comment #9 from Darren Tucker <dtucker at zip.com.au> --- nope, it's actually in 6.3: revision 1.381 date: 2013/07/25 00:29:10; author: djm; state: Exp; lines: +2 -1; daemonise backgrounded (ControlPersist'ed) multiplexing master to ensure it is fully detached from its controlling terminal. based on debugging and patch from tedu@ ok dtucker@ "be careful" deraadt@ please reopen if you can reproduce the problem with 6.3 or newer. -- You are receiving this...
2016 Jul 22
2
SSH crash on OpenBSD (pledge related?)
Hello, I just ran upon this problem and couldn't find it in bugzilla. SSH crashes (abort trap) if all of the following conditions are met: (a) option -f is used (crash happens when going to background), (b) reverse port forwarding is set up (option -R), (c) option ExitOnForwardFailure is enabled, (d) there are no actual port-forwarding failures. The problem can be reproduced by
2009 Feb 23
0
Announce: OpenSSH 5.2 released
...leaked information about the plaintext of injected data which formed the basis of this attack. We believe that these attacks are rendered infeasible by these changes. New features: * Added a -y option to ssh(1) to force logging to syslog rather than stderr, which is useful when running daemonised (ssh -f) * The sshd_config(5) ForceCommand directive now accepts commandline arguments for the internal-sftp server. * The ssh(1) ~C escape commandline now support runtime creation of dynamic (-D) port forwards. * Support the SOCKS4A protocol in ssh(1) dynamic (-D) forwards. (bz#148...
2009 Feb 23
0
Announce: OpenSSH 5.2 released
...leaked information about the plaintext of injected data which formed the basis of this attack. We believe that these attacks are rendered infeasible by these changes. New features: * Added a -y option to ssh(1) to force logging to syslog rather than stderr, which is useful when running daemonised (ssh -f) * The sshd_config(5) ForceCommand directive now accepts commandline arguments for the internal-sftp server. * The ssh(1) ~C escape commandline now support runtime creation of dynamic (-D) port forwards. * Support the SOCKS4A protocol in ssh(1) dynamic (-D) forwards. (bz#148...
2009 Feb 16
9
Call for testing: openssh-5.2
...leaked information about the plaintext of injected data which formed the basis of this attack. We believe that these attacks are rendered infeasible by these changes. New features: * Added a -y option to ssh(1) to force logging to syslog rather than stderr, which is useful when running daemonised (ssh -f) * The sshd_config(5) ForceCommand directive now accepts commandline arguments for the internal-sftp server. * The ssh(1) ~C escape commandline now support runtime creation of dynamic (-D) port forwards. * Support the SOCKS4A protocol in ssh(1) dynamic (-D) forwards. (bz#148...
2009 Feb 18
0
FW: Call for testing: openssh-5.2
...text of injected data which formed > the basis of this attack. We believe that these attacks are rendered > infeasible by these changes. > > New features: > > * Added a -y option to ssh(1) to force logging to syslog rather than > stderr, which is useful when running daemonised (ssh -f) > > * The sshd_config(5) ForceCommand directive now accepts commandline > arguments for the internal-sftp server. > > * The ssh(1) ~C escape commandline now support runtime creation of > dynamic (-D) port forwards. > > * Support the SOCKS4A protocol in...
2016 Dec 14
17
Call for testing: OpenSSH 7.4
...of restricting an account. * sshd(8), ssh(1): Support the "curve25519-sha256" key exchange method. This is identical to the currently-support method named "curve25519-sha256 at libssh.org". * sshd(8): Improve handling of SIGHUP by checking to see if sshd is already daemonised at startup and skipping the call to daemon(3) if it is. This ensures that a SIGHUP restart of sshd(8) will retain the same process-ID as the initial execution. sshd(8) will also now unlink the PidFile prior to SIGHUP restart and re-create it after a successful restart, rather than leav...
2019 Apr 19
2
Forking AGI or GoSub
In PHP something like: $pid = pcntl_fork(); if ($pid != 0) { // we are the parent // do parent stuff exit; } // we are the child, detatch from terminal $sid = posix_setsid(); if ($sid < 0) { die; } // do child stuff On 04/19/2019 02:00 PM, Mark Wiater wrote: > On 4/19/2019 1:49 PM, Dovid Bender wrote: >> Mark, >> >> I am using PHP agi and when forking
2008 Apr 25
0
RELEASE: Flumotion 0.5.2 'Can Tomas'
This mail announces the release of Flumotion 0.5.2 'Can Tomas'. Flumotion is a GPL streaming media server written in Python. It is distributed and component-based: every step in the streaming process (production, conversion, consumption) can be run inside a separate process on separate machines. Flumotion uses Twisted and GStreamer. Twisted enables the high-level functionality,
2016 Dec 19
2
Announce: OpenSSH 7.4 released
...f restricting an account. * sshd(8), ssh(1): Support the "curve25519-sha256" key exchange method. This is identical to the currently-supported method named "curve25519-sha256 at libssh.org". * sshd(8): Improve handling of SIGHUP by checking to see if sshd is already daemonised at startup and skipping the call to daemon(3) if it is. This ensures that a SIGHUP restart of sshd(8) will retain the same process-ID as the initial execution. sshd(8) will also now unlink the PidFile prior to SIGHUP restart and re-create it after a successful restart, rather than leav...
2016 Dec 19
2
Announce: OpenSSH 7.4 released
...f restricting an account. * sshd(8), ssh(1): Support the "curve25519-sha256" key exchange method. This is identical to the currently-supported method named "curve25519-sha256 at libssh.org". * sshd(8): Improve handling of SIGHUP by checking to see if sshd is already daemonised at startup and skipping the call to daemon(3) if it is. This ensures that a SIGHUP restart of sshd(8) will retain the same process-ID as the initial execution. sshd(8) will also now unlink the PidFile prior to SIGHUP restart and re-create it after a successful restart, rather than leav...
2015 Apr 02
4
systemctl (again)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 SELinux certainly was causing fun and games. I copied your suggestion to /etc/systemd/user/timidity.service (mode 750) but it's still not happy: [root at tamar user]# systemctl status timidity timidity.service Loaded: not-found (Reason: No such file or directory) Active: failed (Result: exit-code) since Th... ... Starting LSB: Add