Displaying 10 results from an estimated 10 matches for "fork_after_authentication_flag".
2002 Feb 01
1
FEATURE: -f -f - fork after successful open of fwd port/display/agent
...g list I hereby grant permission to distribute-
-and copy this message.-
-------------- next part --------------
Index: 3_0_2p1.1/ssh.c
--- 3_0_2p1.1/ssh.c Wed, 21 Nov 2001 10:38:46 -0500
+++ 3_0_2p1_double_dash_f.1/ssh.c Fri, 01 Feb 2002 12:59:13 -0500
@@ -111,6 +111,7 @@
* background.
*/
int fork_after_authentication_flag = 0;
+int wait_for_port_open_before_fork = 0;
/*
* General data structure for command line options and options configurable
@@ -330,6 +331,8 @@
stdin_null_flag = 1;
break;
case 'f':
+ if (fork_after_authentication_flag)
+ wait_for_port_open_before_fork = 1;
fork_aft...
2020 Mar 14
2
ssh -f and -O ControlPersist=yes, ControlMaster=yes leaves stderr open
...es not do that in some cases...
From current master's ssh.c:
------------------------------------>snip<------------------------------------
static int ssh_session2(struct ssh *ssh, struct passwd *pw) {
[...]
if (options.control_persist && muxserver_sock != -1) {
[...]
if (!fork_after_authentication_flag)
need_controlpersist_detach = 1;
fork_after_authentication_flag = 1;
}
------------------------------------>snip<------------------------------------
Note how need_controlpersist_detach is only set to 1 if
fork_after_authentication_flag is not set (i.e., -f has not been passed). This
p...
2002 Jan 11
1
X11 forwarding, -f, error handling
I'd like a feature whereby ssh puts itself in the background after the
first successful X11 (or other port) forwarding.
The reason for this is simple: error handling.
If the application fails to open the X display and exits, then the
client can still exit with the application's exit code. But if the
application opens the X display successfully, then it can just display
any errors by
2000 Aug 05
0
Protocol 2 and fork
...er:110 server' and fetchmail.
Patch:
diff -u -r openssh-2.1.1p4/ssh.c openssh-2.1.1p4-ruined/ssh.c
--- openssh-2.1.1p4/ssh.c Sat Jul 15 07:14:17 2000
+++ openssh-2.1.1p4-ruined/ssh.c Fri Aug 4 20:54:10 2000
@@ -460,10 +460,6 @@
}
}
- /* Cannot fork to background if no command. */
- if (fork_after_authentication_flag && buffer_len(&command) == 0)
- fatal("Cannot fork into background without a command to execute.");
-
/* Allocate a tty by default if no command specified. */
if (buffer_len(&command) == 0)
tty_flag = 1;
@@ -511,6 +507,29 @@
/* reinit */
log_init(av[0], options...
2005 Jul 25
1
ssh -f won't detach properly when run from cron.
Hi,
In file ssh.c, in function "ssh_session2", this piece of code:
/* If requested, let ssh continue in the background. */
if (fork_after_authentication_flag)
if (daemon(1, 1) < 0)
fatal("daemon() failed: %.200s", strerror(errno));
implements the "-f" option, but when run from cron, it does not detach
properly because of the second parameter (noclose) of the daemon() function.
The result is a defunct process and a CR...
2016 Jul 22
2
SSH crash on OpenBSD (pledge related?)
Hello,
I just ran upon this problem and couldn't find it in bugzilla.
SSH crashes (abort trap) if all of the following conditions are met:
(a) option -f is used (crash happens when going to background),
(b) reverse port forwarding is set up (option -R),
(c) option ExitOnForwardFailure is enabled,
(d) there are no actual port-forwarding failures.
The problem can be reproduced by
2001 Sep 04
3
2.9p2 behaves different from 2.5.2p2 on tunneling issue
Hi,
I have a problem with a Linux box which I updated from 2.5.2p2
to 2.9p2 recently. It's running a tunnel started via inittab
using a script which starts
ssh -2 -N -o 'ConnectionAttempts 3600' -L <tunnel> $host
This has run reliable with 2.5.2 over the last months. Now, after
I have upgraded to 2.9p2, the tunnel is closed right after each
attempt of an application to use
2002 Apr 23
0
[Bug 225] New: Supression of login warning banner for noninteractive commands
...ew, so maybe the
supression of the banners could be the default behavior, and displaying them
(for noninteractive sessions) could be a compile-time option.
********************************
--- ssh.c_orig Mon Apr 22 16:18:41 2002
+++ ssh.c Mon Apr 22 16:18:54 2002
@@ -113,6 +113,12 @@
int fork_after_authentication_flag = 0;
/*
+ * Flag to indicate the login banner from the server should not be displayed.
+ * This is usedful when issuing command on remote hosts noninteractively.
+ */
+int supress_banner = 0;
+
+/*
* General data structure for command line options and options configurable
* in configuration...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...ns.gateway_ports);
success = 1;
diff -u -r openssh-2.1.1p4/ssh.c openssh-2.1.1p4-jhchanges/ssh.c
--- openssh-2.1.1p4/ssh.c Sat Jul 15 07:14:17 2000
+++ openssh-2.1.1p4-jhchanges/ssh.c Mon Aug 21 18:37:31 2000
@@ -460,10 +460,6 @@
}
}
- /* Cannot fork to background if no command. */
- if (fork_after_authentication_flag && buffer_len(&command) == 0)
- fatal("Cannot fork into background without a command to execute.");
-
/* Allocate a tty by default if no command specified. */
if (buffer_len(&command) == 0)
tty_flag = 1;
@@ -511,6 +507,29 @@
/* reinit */
log_init(av[0], options...
2001 Feb 10
3
Protocol 2 remote forwarding patch
...arding(options.remote_forwards[i].port,
+ options.remote_forwards[i].host,
+ options.remote_forwards[i].host_port);
}
}
@@ -997,6 +1015,7 @@
/* should be pre-session */
init_local_fwd();
+ init_remote_fwd();
/* If requested, let ssh continue in the background. */
if (fork_after_authentication_flag)