search for: fork_after_authentication_flag

Displaying 10 results from an estimated 10 matches for "fork_after_authentication_flag".

2002 Feb 01
1
FEATURE: -f -f - fork after successful open of fwd port/display/agent
...g list I hereby grant permission to distribute- -and copy this message.- -------------- next part -------------- Index: 3_0_2p1.1/ssh.c --- 3_0_2p1.1/ssh.c Wed, 21 Nov 2001 10:38:46 -0500 +++ 3_0_2p1_double_dash_f.1/ssh.c Fri, 01 Feb 2002 12:59:13 -0500 @@ -111,6 +111,7 @@ * background. */ int fork_after_authentication_flag = 0; +int wait_for_port_open_before_fork = 0; /* * General data structure for command line options and options configurable @@ -330,6 +331,8 @@ stdin_null_flag = 1; break; case 'f': + if (fork_after_authentication_flag) + wait_for_port_open_before_fork = 1; fork_aft...
2020 Mar 14
2
ssh -f and -O ControlPersist=yes, ControlMaster=yes leaves stderr open
...es not do that in some cases... From current master's ssh.c: ------------------------------------>snip<------------------------------------ static int ssh_session2(struct ssh *ssh, struct passwd *pw) { [...] if (options.control_persist && muxserver_sock != -1) { [...] if (!fork_after_authentication_flag) need_controlpersist_detach = 1; fork_after_authentication_flag = 1; } ------------------------------------>snip<------------------------------------ Note how need_controlpersist_detach is only set to 1 if fork_after_authentication_flag is not set (i.e., -f has not been passed). This p...
2002 Jan 11
1
X11 forwarding, -f, error handling
I'd like a feature whereby ssh puts itself in the background after the first successful X11 (or other port) forwarding. The reason for this is simple: error handling. If the application fails to open the X display and exits, then the client can still exit with the application's exit code. But if the application opens the X display successfully, then it can just display any errors by
2000 Aug 05
0
Protocol 2 and fork
...er:110 server' and fetchmail. Patch: diff -u -r openssh-2.1.1p4/ssh.c openssh-2.1.1p4-ruined/ssh.c --- openssh-2.1.1p4/ssh.c Sat Jul 15 07:14:17 2000 +++ openssh-2.1.1p4-ruined/ssh.c Fri Aug 4 20:54:10 2000 @@ -460,10 +460,6 @@ } } - /* Cannot fork to background if no command. */ - if (fork_after_authentication_flag && buffer_len(&command) == 0) - fatal("Cannot fork into background without a command to execute."); - /* Allocate a tty by default if no command specified. */ if (buffer_len(&command) == 0) tty_flag = 1; @@ -511,6 +507,29 @@ /* reinit */ log_init(av[0], options...
2005 Jul 25
1
ssh -f won't detach properly when run from cron.
Hi, In file ssh.c, in function "ssh_session2", this piece of code: /* If requested, let ssh continue in the background. */ if (fork_after_authentication_flag) if (daemon(1, 1) < 0) fatal("daemon() failed: %.200s", strerror(errno)); implements the "-f" option, but when run from cron, it does not detach properly because of the second parameter (noclose) of the daemon() function. The result is a defunct process and a CR...
2016 Jul 22
2
SSH crash on OpenBSD (pledge related?)
Hello, I just ran upon this problem and couldn't find it in bugzilla. SSH crashes (abort trap) if all of the following conditions are met: (a) option -f is used (crash happens when going to background), (b) reverse port forwarding is set up (option -R), (c) option ExitOnForwardFailure is enabled, (d) there are no actual port-forwarding failures. The problem can be reproduced by
2001 Sep 04
3
2.9p2 behaves different from 2.5.2p2 on tunneling issue
Hi, I have a problem with a Linux box which I updated from 2.5.2p2 to 2.9p2 recently. It's running a tunnel started via inittab using a script which starts ssh -2 -N -o 'ConnectionAttempts 3600' -L <tunnel> $host This has run reliable with 2.5.2 over the last months. Now, after I have upgraded to 2.9p2, the tunnel is closed right after each attempt of an application to use
2002 Apr 23
0
[Bug 225] New: Supression of login warning banner for noninteractive commands
...ew, so maybe the supression of the banners could be the default behavior, and displaying them (for noninteractive sessions) could be a compile-time option. ******************************** --- ssh.c_orig Mon Apr 22 16:18:41 2002 +++ ssh.c Mon Apr 22 16:18:54 2002 @@ -113,6 +113,12 @@ int fork_after_authentication_flag = 0; /* + * Flag to indicate the login banner from the server should not be displayed. + * This is usedful when issuing command on remote hosts noninteractively. + */ +int supress_banner = 0; + +/* * General data structure for command line options and options configurable * in configuration...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...ns.gateway_ports); success = 1; diff -u -r openssh-2.1.1p4/ssh.c openssh-2.1.1p4-jhchanges/ssh.c --- openssh-2.1.1p4/ssh.c Sat Jul 15 07:14:17 2000 +++ openssh-2.1.1p4-jhchanges/ssh.c Mon Aug 21 18:37:31 2000 @@ -460,10 +460,6 @@ } } - /* Cannot fork to background if no command. */ - if (fork_after_authentication_flag && buffer_len(&command) == 0) - fatal("Cannot fork into background without a command to execute."); - /* Allocate a tty by default if no command specified. */ if (buffer_len(&command) == 0) tty_flag = 1; @@ -511,6 +507,29 @@ /* reinit */ log_init(av[0], options...
2001 Feb 10
3
Protocol 2 remote forwarding patch
...arding(options.remote_forwards[i].port, + options.remote_forwards[i].host, + options.remote_forwards[i].host_port); } } @@ -997,6 +1015,7 @@ /* should be pre-session */ init_local_fwd(); + init_remote_fwd(); /* If requested, let ssh continue in the background. */ if (fork_after_authentication_flag)