search for: fdmax

Displaying 8 results from an estimated 8 matches for "fdmax".

Did you mean: fdma
2017 Jan 12
3
proposed change to ssh_connect_direct()
On Sat, Jan 7, 2017 at 2:30 PM, Peter Moody <mindrot at hda3.com> wrote: > so I spent a bit of time looking at this and it seems like the only > way to go, at least if I want to keep it in ssh_connect_direct(), is > to use pthreads. further, it seems like getting that accepted is > something of a long shot: Sorry, pthreads is a non-starter. I would have thought that using
2009 Jul 04
2
[PATCH] Create /var/run/tftpd-hpa.pid in standalone mode
...le = fopen ("/var/run/tfpd-hpa.pid","w"); + if (!pidfile + || fprintf(pidfile, "%d\n", getpid()) < 0 + || fclose(pidfile)) { + syslog(LOG_ERR, "cannot write pid file: %m"); + } if (fd6 > fd4) fdmax = fd6; else -- 1.5.6.5
2009 Jul 19
3
[PATCH] tftpd.c: write a pid file in standalone mode
...xit, 0); + pf = fopen (pidfile, "w"); + if (!pf + || fprintf(pf, "%d\n", getpid()) < 0 + || fclose(pf)) { + syslog(LOG_ERR, "cannot write pid file '%s': %m", pidfile); + } if (fd6 > fd4) fdmax = fd6; else @@ -734,11 +752,23 @@ int main(int argc, char **argv) lose packets as a result. */ set_signal(SIGHUP, handle_sighup, 0); + if (spec_umask || !unixperms) + umask(my_umask); + while (1) { fd_set readset; struct timeval tv_waittime;...
1999 Nov 11
0
[RHSA-1999:054-01] Security problems in bind
--------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Security problems in bind Advisory ID: RHSA-1999:054-01 Issue date: 1999-11-11 Updated on: 1999-11-11 Keywords: bind named NXT solinger fdmax Cross references: http://www.isc.org/products/BIND/bind-security-19991108.html --------------------------------------------------------------------- 1. Topic: Several security vulnerabilities exist in the DNS server, ''bind''. 2. Relevant releases/architectures: Red Hat Linux 4....
2009 Sep 05
5
[tftpd PATCH 0/5] pidfile option and syslog fix
Hi, This is my current patch queue. The patches are independent, AFAIK, so feel free to cherry-pick or reject them independently. The bottom one was needed for a successful build here; the top one contains all the modifications you requested on IRC, and more. Meanwhile I hit one of the four stray TABs in tftpd.c, and decided to get rid of them. Comments welcome. --- Ferenc Wagner (5):
2003 Jun 08
1
redirect unauthorized users to a login page (natd as a transparent proxy)
Hello I am trying to redirect all http traffic of unauthorized wifi users on a wireless hotspot to a login page. The problem I have is that I can not disable the regular address translation (I want the source address to stay the same). 10.0.0.7 is the wifi client 195.250.155.29 is the web wifi user tries to access from his browser 195.113.17.94 is my login page 10.0.0.1 is the wifi
1999 Nov 11
0
CERT Advisory CA-99.14 - Multiple Vulnerabilities in BIND (fwd)
...tiple versions of BIND, including 4.9.5 through 8.x. Vulnerability #3: the "so_linger bug" By intentionally violating the expected protocols for closing a TCP session, remote intruders can cause named to pause for periods up to 120 seconds. Vulnerability #4: the "fdmax bug" Remote intruders can consume more file descriptors than BIND can properly manage, causing named to crash. Vulnerability #5: the "maxdname bug" Improper handling of certain data copied from the network could allow a remote intruder to disrupt the normal operatio...
1999 Nov 12
1
[RHSA-1999:054-01] Security problems in bind (fwd)
...Resent-cc: recipient list not shown: ; --------------------------------------------------------------------- Red Hat, Inc. Security Advisory Synopsis: Security problems in bind Advisory ID: RHSA-1999:054-01 Issue date: 1999-11-11 Updated on: 1999-11-11 Keywords: bind named NXT solinger fdmax Cross references: http://www.isc.org/products/BIND/bind-security-19991108.html --------------------------------------------------------------------- 1. Topic: Several security vulnerabilities exist in the DNS server, 'bind'. 2. Relevant releases/architectures: Red Hat Linux 4.x, all pla...