search for: do_exec

Displaying 20 results from an estimated 27 matches for "do_exec".

2002 May 09
0
functions : server_input_channel_req userauth_pubkey
...-3.1p1-mods/session.c - --- openssh-3.1p1/session.c Thu May 9 12:18:34 2002 +++ openssh-3.1p1-mods/session.c Thu May 9 12:20:03 2002 @@ -98,10 +98,10 @@ static void session_pty_cleanup(void *); void session_proctitle(Session *); int session_setup_x11fwd(Session *); - -void do_exec_pty(Session *, const char *); +void do_exec_pty(Session *, const char *, const char *realname); void do_exec_no_pty(Session *, const char *); - -void do_exec(Session *, const char *); - -void do_login(Session *, const char *); +void do_exec(Session *, const char *, const char *realname);...
2001 Jun 18
2
Patch for changing expired passwords
...mary purpose of the attached patches is for portable OpenSSH to support changing expired passwords as specified in shadow password files. To support that, I did a couple enhancements to the base OpenBSD OpenSSH code. They are: 1. Consolidated the handling of "forced_command" into a do_exec() function in session.c. These were being handled inconsistently and allocated memory was not always being properly freed. 2. Added log messages to say why a user is disallowed by allowed_user() in session.c. Those two changes are in attachment #1, against the current OpenBSD OpenSSH CVS....
2004 Aug 23
8
[Bug 918] ssh_gssapi_storecreds called to late to be usable by PAM in sesion.c
...Priority: P2 Component: PAM support AssignedTo: openssh-bugs at mindrot.org ReportedBy: deengert at anl.gov The gss-serv-krb5.c will call do_pam_putenv to set the KRB5CCNAME so it can be used by a PAM routine. But the call to ssh_gssapi_storecreds is called from do_exec which is way to late to be usable by do_pam_session or do_pam_setcred. Suggestion is to move the call. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2008 Aug 19
1
fixed: [patch] fix to ForceCommand to support additional arguments to internal-sftp
The previous version broke the case of internal-sftp without arguments. This is a fixed version. --- /var/tmp/session.c 2008-08-18 21:07:10.000000000 -0700 +++ session.c 2008-08-19 11:28:29.000000000 -0700 @@ -781,7 +781,7 @@ if (options.adm_forced_command) { original_command = command; command = options.adm_forced_command; - if
2023 Jul 05
1
Subsystem sftp invoked even though forced command created
...t; > Well, I'll be ... Looks like the server side recognizes the forced-command > setup, but honors the SFTP subsystem request by exec()ing that nonetheless ... no, that's the log message being misleading. At the point of the "Starting session: forced-command" in session.c:do_exec() the command variable contains the requested forced command and that is what is actually executed. https://github.com/openssh/openssh-portable/blob/V_7_4_P1/session.c#L623-L663 The "subsystem: exec()" comes earlier from session.c:session_subsystem_req(), which is recording (badly) whic...
2023 Jul 03
1
Subsystem sftp invoked even though forced command created
On 30.06.23 17:56, MCMANUS, MICHAEL P wrote: > The actual command is similar to the following (parameters inserted to protect the source): > (print ${FQDN} ; print ${Environment} ; cat ${OutFileXML}) | \ > ssh -Ti ${EmbeddedPrivateKey} \ > -o HostKeyAlias="${Alias}" \ > -o
2001 Oct 23
2
PAM problem - sshd segfault on Solaris
...n strncpy () from /usr/lib/libc.so.1 #1 0xff0b61b0 in pam_sm_open_session () from /usr/lib/security/pam_unix.so.1 #2 0xff372b88 in pam_open_session () from /usr/lib/libpam.so.1 #3 0x2cc88 in do_pam_session (username=0x115fb0 "wyodlows", ttyname=0x0) at auth-pam.c:283 #4 0x32360 in do_exec_no_pty (s=0x1108ac, command=0x121950 "ls") at session.c:433 #5 0x32884 in do_exec (s=0x1108ac, command=0x121950 "ls") at session.c:668 #6 0x34008 in session_exec_req (s=0x1108ac) at session.c:1742 #7 0x3417c in session_input_channel_req (id=0, arg=0x0) at session.c:1795 #...
2017 Feb 20
3
[Bug 2681] New: postauth processes to log via monitor
https://bugzilla.mindrot.org/show_bug.cgi?id=2681 Bug ID: 2681 Summary: postauth processes to log via monitor Product: Portable OpenSSH Version: 7.4p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: sshd Assignee: unassigned-bugs at
2012 May 17
2
New Subsystem criteria for Match option block in OpenSSH server
...%s", prog); < } else { < if (stat(prog, &st) < 0) < debug("subsystem: cannot stat %s: %s", < prog, strerror(errno)); < s->is_subsystem = SUBSYSTEM_EXT; < debug("subsystem: exec() %s", cmd); < } < success = do_exec(s, cmd) == 0; < break; --- > if (strcmp(subsys, options.subsystem_name[i]) == 0) break; > } > > if (i < options.num_subsystems) { /* subsystem found */ > ConnectionInfo connection_info; > > connection_info.user = NULL; > connection_info.host = NULL; >...
2001 Sep 28
0
openssh-2.9.9p2 session.c uses two undeclared void functions
...9.9.2 retrieving revision 2.9.9.2.0.1 diff -pu -r2.9.9.2 -r2.9.9.2.0.1 --- session.c 2001/09/16 22:17:15 2.9.9.2 +++ session.c 2001/09/28 18:17:11 2.9.9.2.0.1 @@ -126,6 +126,9 @@ static void session_pty_cleanup(void *); void session_proctitle(Session *); int session_setup_x11fwd(Session *); void do_exec_pty(Session *, const char *); +#ifdef LOGIN_NEEDS_UTMPX +static void do_pre_login(Session *s); +#endif void do_exec_no_pty(Session *, const char *); void do_exec(Session *, const char *); void do_login(Session *, const char *); @@ -147,6 +150,7 @@ extern int debug_flag; extern u_int utmp_len;...
2003 Jan 10
0
Core dump from sshd fatal_cleanup()
...0 in ?? () #1 0x0003ccb4 in fatal_cleanup () at ../log.c:254 #2 0x00038988 in fatal (fmt=0xf0c00 "") at ../fatal.c:39 #3 0x00023400 in do_tty_change_password (pw=0x10e690) at ../auth-passwd.c:300 #4 0x00029884 in do_login (s=0x101b4c, command=0x0) at ../session.c:764 #5 0x00029518 in do_exec_pty (s=0x101b4c, command=0x0) at ../session.c:617 #6 0x000296c0 in do_exec (s=0x101b4c, command=0x0) at ../session.c:710 #7 0x0002b1b0 in session_shell_req (s=0x101b4c) at ../session.c:1729 #8 0x0002b358 in session_input_channel_req (c=0x110cd8, rtype=0x10f750 "shell") at ../sessio...
2003 May 06
1
logging command line execs
...c command '%.500s'", command); /* LOCAL CHANGE: We log this */ log("User %.100s attempting to execute comand '%.500s' on command line", s->pw->pw_name, command); do_exec(s, command); xfree(command); } else { -------------------------------------- But as you might recognize, this snipet is from the do_authenticated1() function - which is obviously for ssh protocol 1. I cannot find the ssh protocol 2 counte...
2007 Apr 17
1
where is the point the client command is executed?
Hi, I met some difficult in reading ssh/sshd souce code, I want to find out how the command that user input in client is executed on the server. I only found out the process_input function put the command in a buffer,but can not find how it is executed. Could you please help me on that? Thank you very much. B Rgds, Kexin
2012 Mar 12
0
ssh shell spawn
...transferred to the client end point, the server side and to the log file. My goal is to patch it into ssh, but for that I need to locate where the ssh dups (with dup2() the 0,1 and 2 fds with the client socket fd (I guess it does like this, I've no another idea without pipes, but I've read do_exec() and nothing about pipes, so... how can it be possible if not like this way?) for the best working of the application. Basically I want to know where can I putt the code below. Thanks in advance. The code of the mini shell daemon with buffer session log is which follows (I tried to simulate pty...
2001 Aug 07
1
do_pre_login() used before declared
do_pre_login() in session.c is used (in do_exec_pty()) before it's declared, which is causing some problems for me. please move it up a couple hundred lines in the file. patch included for 0807 snapshot. thanks, wendy % diff -u session.c.orig session.c.mod --- session.c.orig Tue Aug 7 13:11:51 2001 +++ session.c.mod Tue Aug...
2001 Oct 22
2
sshd dumps core in pam_sm_open_session
..., 0x5, 0x7, 0x0, 0x21aa4, 0xffbee4cc), at 0xff133abc [2] pam_sm_open_session(0x6, 0x0, 0x70a10, 0x0, 0xff0f6000, 0x0), at 0xff0d61d8 [3] pam_open_session(0xff3865c8, 0x0, 0xff386000, 0x13, 0x13, 0x0), at 0xff372c50 [4] do_pam_session(0x147338, 0x0, 0x6, 0x2, 0x1, 0xffbeee44), at 0x34ac0 [5] do_exec_no_pty(0x13b364, 0x14cc80, 0xffbeef00, 0x0, 0x0, 0xffbeef23), at 0x3e5d0 [6] do_exec(0x13b364, 0x14cc80, 0xffbeef70, 0xffffffff, 0xfffffff8, 0xffbeef04), at 0x3edcc [7] 0x4183c(0x13b364, 0x10ec54, 0x0, 0x0, 0x6f6e00, 0x0), at 0x4183b [8] session_input_channel_req(0x0, 0x0, 0x0, 0x4, 0xeb, 0x1...
2002 Jan 30
0
[Bug 87] New: Last logon that gets reported upon login is the current login time
...2001, and he sent in a patch that moved the do_pam_session call into the do_login function in session.c. I can't find any discussion about why that patch did not get applied, but it hasn't, so I propose, instead of moving the do_pam_session call, to move the call to get_last_login_time into do_exec_pty and pass the resultant information to do_login. This has the unfortunate result of getting information that you may never use, but it seems that the portable release does have a few things in it explicit for one system or another, so this may be viable. The definition of do_login could be chang...
2009 Sep 01
7
[Bug 1643] New: Set FD_CLOEXEC on client socket
https://bugzilla.mindrot.org/show_bug.cgi?id=1643 Summary: Set FD_CLOEXEC on client socket Product: Portable OpenSSH Version: 5.2p1 Platform: Other OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: unassigned-bugs at mindrot.org ReportedBy: jchadima at
2013 Jul 03
5
[Bug 2124] New: TCP_NODELAY not set by sshd for non-interactive non-exec sessions
...-N host -R port # TCP_NODELAY is not set ssh -n host -R port sleep 1d # TCP_NODELAY is set - this is a workaround There is a difference in TCP_NODELAY being set or not depending on whether there is a remote command being executed. This is because packet_set_interactive() is only called in do_exec() on the server side. This bug has the unfortunate effect of not setting TCP_NODELAY for port forwarding only connections. The proper fix is probably to use attachment 1099 by Darren Tucker that sets it for all connections on the server side. https://bugzilla.mindrot.org/show_bug.cgi?id=556#c10 ht...
2002 Mar 21
0
[Bug 178] New: Content of /etc/nologin isn't shown to users, fix triggers probably AIX bug
...istener] debug1: exit session_input_channel_req debug1: server_input_channel_req: channel 0 request shell reply 0 debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req shell debug1: calling session_shell_req debug1: calling packet_check_eom debug1: calling do_exec debug1: calling do_exec_pty setsid: Not owner debug1: Received SIGCHLD. debug1: parent+ debug1: parent++ ^rz192:~ # The "parent+" debug statements are in patch No 3. Index: auth.c =================================================================== RCS file: /usr/local/.cvs/auth/openssh/...