search for: dispatch_run

Displaying 20 results from an estimated 26 matches for "dispatch_run".

2008 Aug 11
5
[Bug 1502] New: Incompatible declaration of AuthctxtV2.success
...unassigned-bugs at mindrot.org ReportedBy: THanson at CardinalPeak.com Source file sshconnect2.c contains the definition of structure AuthctxtV2. Field "success" in this structure is declared as type "int". In function ssh_userauth2(), authctxt.success is passed to dispatch_run() as the second argument. dispatch_run() is declared in dispatch.c with a second parameter of type sig_atomic_t. On some OS's (i.e. VxWorks) "sig_atomic_t" is declared as "unsigned char". Where the system is also big-endian, the size mismatch between "sig_atomic_t&...
2001 Dec 26
3
auth*.c
...found a couple of issues with openssh3.0.2p1: 1. In userauth_finish() in auth2.c (as well as in do_authloop in auth1.c), the foll. check: if (authctxt->failures++ > AUTH_FAIL_MAX) is never satisfied and thus packet_disconnect() never gets called. I suspect the code just drops out of the dispatch_run function list instead. This should be an == instead of >. While looking at the debug output when deliberately entering wrong passwords, I noticed one try for none, three for password, and then three for keyboard-interactive, at which point authctxt->failures is 6, and then the loop completes....
2001 Apr 09
1
input_userauth_request() vs. stateful authmethods
...code is duplicated (logging, sending the reply), but the root special case is skipped. One way to fix this, and make life easier for authmethods that require some state to be hauled around, is to take all the post-authmethod stuff currently in input_userauth_request(), and put it after the call to dispatch_run() in do_authentication2(). That would simplify that code (it's currently mostly conditional on 'authenticated') and ensure that the root & other tests get done all the time. (You might want to leave the auth_log() call in there, so debug sessions keep the "Postponed" ent...
2008 Mar 19
2
I got a strange "connection refused"
Hi everybody, I got a strange error message when I used the openssh. When I run it with debug mode, like this: # /usr/local/sbin/sshd -d I can open the session via ssh command. However, when I run with daemon mode, the ssh client was closed down and threw out the following message: debug1: dispatch_run:dispatch done debug1: Authentication succeeded (keyboard-interactive). debug1: channel 0: new [client-session] debug2: channel 0: send open debug1: Entering interactive session. debug1: channel 0: free: client-session, nchannels 1 Read from remote host localhost: Connection reset by peer Connection...
2001 Oct 23
2
PAM problem - sshd segfault on Solaris
...nd=0x121950 "ls") at session.c:668 #6 0x34008 in session_exec_req (s=0x1108ac) at session.c:1742 #7 0x3417c in session_input_channel_req (id=0, arg=0x0) at session.c:1795 #8 0x3a040 in channel_input_channel_request (type=98, plen=19, ctxt=0x116898) at channels.c:1974 #9 0x3cae0 in dispatch_run (mode=1, done=0x0, ctxt=0x116898) at dispatch.c:71 #10 0x30e1c in process_buffered_input_packets () at serverloop.c:423 #11 0x314b8 in server_loop2 (authctxt=0xffbef408) at serverloop.c:705 #12 0x348d8 in do_authenticated2 (authctxt=0x1170f0) at session.c:2063 #13 0x31eb4 in do_authenticated (authc...
2008 Jan 25
1
OpenSSH for OS/390
...) and I am not sure how to do the conversion properly so that it will not corrupt truely binary data. The second problem is that connection fails even for ssh client and deamon that belong to the same build. Here is the output of sshd (the client has received SSH2_MSG_SERVICE_ACCEPT and is running dispatch_run): debug1: attempt 0 failures 0 debug3: mm_getpwnamallow entering debug3: mm_request_send entering: type 6 debug3: mm_getpwnamallow: waiting for MONITOR_ANS_PWNAM debug3: mm_request_receive_expect entering: type 7 debug3: mm_request_receive entering debug3: monitor_read: checking request 6 debug3:...
2001 May 14
2
openssh-2.9p1
Hi, 1. I think you should apply the attached patch to openssh-2.9p1, otherwise ssh-keyscan on linux boxes with glibc-2.1 will experience enormous timeout delays. 2. Is there a program like ssh-keyscan for the Version2 (dsa and rsa) keys?? regards Peter Breitenlohner <peb at mppmu.mpg.de> -------------- next part -------------- diff -ur openssh-2.9p1.orig/ssh-keyscan.c
2003 Jan 10
0
Core dump from sshd fatal_cleanup()
...0 in session_shell_req (s=0x101b4c) at ../session.c:1729 #8 0x0002b358 in session_input_channel_req (c=0x110cd8, rtype=0x10f750 "shell") at ../session.c:1780 #9 0x00028790 in server_input_channel_req (type=1111888, seq=13, ctxt=0x10d018) at ../serverloop.c:1021 #10 0x00038930 in dispatch_run (mode=1, done=0x0, ctxt=0x10d018) at ../dispatch.c:93 #11 0x00027f5c in server_loop2 (authctxt=0xff800) at ../serverloop.c:764 #12 0x00028d18 in do_authenticated (authctxt=0x109230) at ../session.c:218 #13 0x0001d84c in main (ac=7868, av=0x6) at ../sshd.c:1536 (gdb) frame 1 #1 0x0003ccb4 in fatal_...
2013 May 07
0
Some potential bugs in Openssh-6.2p1
Hi, I'm a developer of a static analysis tool canalyze. Recently I applied it to Openssh-6.2p1. It seems some reports are real after by manually checking: 1. Use undefined value file: dispatch.c function: dispatch_run At line 93: type = packet_read_poll_seqnr(&seqnr); seqnr may not be override at file: packet.c function: packet_read_poll_seqnr line 1442 where compat20 is 0. 2. Null Pointer file: session.c function: child_set_env At line 962: if (*envp == NULL && *envsizep == 0) Is it possible that *...
2010 Nov 23
2
[Bug 1213] ssh-keyscan exits in mid-way
https://bugzilla.mindrot.org/show_bug.cgi?id=1213 --- Comment #3 from aab at purdue.edu 2010-11-23 12:00:50 EST --- Created attachment 1961 --> https://bugzilla.mindrot.org/attachment.cgi?id=1961 One attempt at getting the rsa key from a remote server that was having a number of problems. -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving
2012 Nov 24
0
ssh-keyscan continuity patch --
...3 @@ { int j; +/* + * New fd and socket. Clear the possibly cached IP-address of the + * remote host (kex.c:canonical_host_ip) of the previous socket. Also + * clear the packet_read_seqnr() "Connection closed ..." and "Connection + * to ... timed out ..." flags (called by dispatch_run()). + */ + clear_cached_addr(); + connclosed = 0; + conntimedout = 0; + packet_set_connection(c->c_fd, c->c_fd); +/* + * Use our "timeout" value to set the maximum allowed wait time for data + * to become available in the `packet.c:packet_read_seqnr()' function. + */ + packet_...
2010 Apr 01
0
OpenSSH Coredump and "Bad packet length" errors seen on 5.10 sparc sun4v (Generic_125100-10)
...f23dfb8 EVP_Cipher (61f98, 774a8, 74490, 10, 61800, 62400) + 18 0002f3e4 cipher_crypt (61f94, 774a8, 74490, 10, f0, 7b528) + 34 000338a4 packet_read_poll_seqnr (ffbfe474, 62000, 62000, 620f0,61800, 62400) + 258 00033f94 packet_read_seqnr (0, 6, ffbfe510, 628a8, f0, 3c) + 40 00038bbc dispatch_run (0, ffbfe524, ffbfe510, ffbfe4f0, 624ac, ff) +1c 00025988 ssh_userauth2 (64568, 65250, 72e08, 628a8, 1, 0) + 52c 00021a20 ssh_login (72e08, 4, 45400, 14, 45400, a) + 3a4 000196b4 main (62b14, 647e4, 42a60, 42a58, 42800, 62800) + 8a4 00017e48 _start (0, 0, 0, 0, 0, 0) + 5 Arou...
2001 Oct 22
2
sshd dumps core in pam_sm_open_session
...fbeef70, 0xffffffff, 0xfffffff8, 0xffbeef04), at 0x3edcc [7] 0x4183c(0x13b364, 0x10ec54, 0x0, 0x0, 0x6f6e00, 0x0), at 0x4183b [8] session_input_channel_req(0x0, 0x0, 0x0, 0x4, 0xeb, 0x145918), at 0x41ac8 [9] channel_input_channel_request(0x62, 0x19, 0x145498, 0x0, 0x0, 0x0), at 0x4e9a0 [10] dispatch_run(0x1, 0x0, 0x145498, 0x147348, 0x21a54, 0x3bb78), at 0x53790 [11] 0x3c2c4(0x147348, 0x147348, 0xffbef160, 0xffbef158, 0x0, 0x0), at 0x3c2c3 [12] server_loop2(0x1456a8, 0x0, 0x0, 0x0, 0x0, 0x0), at 0x3cc54 [13] 0x4284c(0x1456a8, 0x0, 0x0, 0x0, 0x21b6c, 0x3de34), at 0x4284b [14] do_authenticat...
2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
...c->c_fd); + enable_compat20(); + myproposal[PROPOSAL_SERVER_HOST_KEY_ALGS] = c->c_keytype == KT_DSA? + "ssh-dss": "ssh-rsa"; + c->c_kex = kex_setup(myproposal); + c->c_kex->verify_host_key = hostjump; + + if (!(j = setjmp(kexjmp))) { + nonfatal_fatal = 1; + dispatch_run(DISPATCH_BLOCK, &c->c_kex->done, c->c_kex); + fprintf(stderr, "Impossible! dispatch_run() returned!\n"); + exit(1); + } + nonfatal_fatal = 0; + xfree(c->c_kex); + c->c_kex = NULL; + packet_close(); + if (j < 0) + j = 0; - fprintf(stdout, "%s ", output_...
2005 Sep 13
13
[Bug 1085] Intermittent ssh core dumps
http://bugzilla.mindrot.org/show_bug.cgi?id=1085 Summary: Intermittent ssh core dumps Product: Portable OpenSSH Version: 4.2p1 Platform: Sparc OS/Version: Solaris Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo: bitbucket at mindrot.org ReportedBy: js at phil.uu.nl I
2002 Dec 20
3
Bad packet length problem with "aes128-cbc" and openssh3.1p1
Hi, I am trying to run openssh 3.1p1. But it is giving "Bad packet length" error when I run sshd with default config file. On further investigation I found that the error is coming only for the cipher algorithm "aes128-cbc". Also the error comes only when I don't specify any protocol file (/usr/local/etc/ssh_host_[rd]sa_key) or specify only "protocol 2" files. I
2007 Mar 14
1
sshd gets stuck: select() in packet_read_seqnr waits indefinitely
...sh.so.3 #2 0x.. in packet_read () from /usr/lib/libssh.so.3 #3 0x.. in packet_read_expect () from /usr/lib/libssh.so.3 #4 0x.. in kexgex_server (kex=0x538900) at kexgexs.c:99 #5 0x.. in kex_setup () from /usr/lib/libssh.so.3 #6 0x.. in kex_input_kexinit () from /usr/lib/libssh.so.3 #7 0x.. in dispatch_run () from /usr/lib/libssh.so.3 #8 0x.. in process_buffered_input_packets () at serverloop.c:475 #9 0x.. in server_loop2 (authctxt=0x4) at serverloop.c:760 #10 0x.. in do_authenticated2 (authctxt=0x4) at session.c:2456 #11 0x.. in do_authenticated (authctxt=0x53a400) at session.c:227 #12 0x.. in mai...
2002 Oct 16
3
ssh-3.5p1 core dumps on Solaris 2.6
...ey=0xffaa8) at sshconnect2.c:71 #8 0x4182c in kexgex_client (kex=0x105d90) at kexgex.c:184 #9 0x422c4 in kexgex (kex=0x105d90) at kexgex.c:413 #10 0x3fbe0 in kex_kexinit_finish (kex=0x105d90) at kex.c:243 #11 0x3fac4 in kex_input_kexinit (type=20, seq=0, ctxt=0x105d90) at kex.c:209 #12 0x3ba64 in dispatch_run (mode=0, done=0x105dd4, ctxt=0x105d90) at dispatch.c:93 #13 0x24698 in ssh_kex2 (host=0xfa790 "pf-i400", hostaddr=0xf3560) at sshconnect2.c:119 #14 0x21778 in ssh_login (sensitive=0xf433c, orighost=0xeffffab1 "pf-i400", hostaddr=0xf3560, pw=0xf4d28) at sshconnect.c:846 #15 0...
2002 Apr 26
0
PAM keyboard-interactive
...); - - /* - * Grabbing control of execution and spinning until we get what - * we want is probably rude, but it seems to work properly, and - * the client *should* be in lock-step with us, so the loop should - * only be traversed once. - */ - while(context_pam2.finished == 0) { - done = 1; - dispatch_run(DISPATCH_BLOCK, &done, appdata_ptr); - if(context_pam2.finished == 0) - debug("extra packet during conversation"); - } - - if(context_pam2.num_received == context_pam2.num_expected) { - *resp = context_pam2.responses; - return PAM_SUCCESS; - } else - return PAM_CONV_ERR; -} - -v...
2007 Sep 17
18
[Bug 1363] New: sshd gets stuck: select() in packet_read_seqnr waits indefinitely
...sh.so.3 #2 0x.. in packet_read () from /usr/lib/libssh.so.3 #3 0x.. in packet_read_expect () from /usr/lib/libssh.so.3 #4 0x.. in kexgex_server (kex=0x538900) at kexgexs.c:99 #5 0x.. in kex_setup () from /usr/lib/libssh.so.3 #6 0x.. in kex_input_kexinit () from /usr/lib/libssh.so.3 #7 0x.. in dispatch_run () from /usr/lib/libssh.so.3 #8 0x.. in process_buffered_input_packets () at serverloop.c:475 #9 0x.. in server_loop2 (authctxt=0x4) at serverloop.c:760 #10 0x.. in do_authenticated2 (authctxt=0x4) at session.c:2456 #11 0x.. in do_authenticated (authctxt=0x53a400) at session.c:227 #12 0x.. in mai...