search for: inaddr_loopback

Displaying 14 results from an estimated 14 matches for "inaddr_loopback".

2002 Mar 07
11
[Bug 146] OpenSSH 3.1p1 will not build on BSD/OS 4.2/4.1/4.01
...mindrot.org/show_bug.cgi?id=146 ------- Additional Comments From mouring at eviladmin.org 2002-03-08 07:38 ------- I just went through someone with this problem. And HAVE_BOGUS_SYS_QUEUE_H worked for them. However you must have BOTH HAVE_SYS_QUEUE_H and HAVE_BOGUS_SYS_QUEUE_H set. As for INADDR_LOOPBACK. I'd like to know where on BSD/OS that is defined so we can check and include it correctly. Otherwise the correct fix (which I am verifying with the SCO 3 fokes) is to change it to #define INADDR_LOOPBACK (0x7f000001L) ------- You are receiving this mail because: ------- You are the assig...
2002 Jun 28
0
[Bug 313] New: undefined type in older cc's
...P2 Component: Build system AssignedTo: openssh-unix-dev at mindrot.org ReportedBy: dirk.meyer at dinoex.sub.org --- defines.h.orig Tue Feb 26 17:40:49 2002 +++ defines.h Fri Mar 8 18:51:27 2002 @@ -146,7 +146,7 @@ including rpc/rpc.h breaks Solaris 6 */ #ifndef INADDR_LOOPBACK -#define INADDR_LOOPBACK ((ulong)0x7f000001) +#define INADDR_LOOPBACK ((u_long)0x7f000001) #endif /* Types */ ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2002 Mar 07
0
[Bug 146] New: OpenSSH 3.1p1 will not build on BSD/OS 4.2/4.1/4.01
...ulong' undeclared (first use in this function) ssh-rand-helper.c:154: (Each undeclared identifier is reported only once ssh-rand-helper.c:154: for each function it appears in.) ssh-rand-helper.c:154: syntax error before `0x7f000001' *** Error code 1 (continuing) defines.h defines: #ifndef INADDR_LOOPBACK #define INADDR_LOOPBACK ((ulong)0x7f000001) #endif It should probably be "u_long". ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2001 Dec 18
1
bug, smb 2.2.1a, redhat 7.2
...thing in the log log.smbd like: smbd/oplock.c:init_oplocks(1205) open_oplock_ipc: Failed to get local UDP socket for address 100007f. Error was Cannot assign requested address Looking at the code it seems it is allways trying to open a socket on 127.0.0.1 open_socket_in(SOCK_DGRAM, 0, 0, htonl(INADDR_LOOPBACK),False) But surely, if you specify "bind interfaces only" to yes and interfaces does not have 127.0.0.1 it should not try that? Off course, bug or not, it is not severe. Idiots like me who sometimes do not have a loopback device are rare. Hope this helps, kind regards, Thijmen -- __...
2001 Aug 02
3
Cray patch against openssh-SNAP-20010802
...s/unicosmk system is configured user could su to root without a password with out this mod. Add no_sco flag to noop check for -lrpc which assumes that their was a -lyp library. Changed ifdef around sigchld_handler to ifdef out mysignal on crays. This works around a unicos sigacton bug. Defined INADDR_LOOPBACK in entropy.c The details on all the patches: configure.in - Add work around to sco libyp assumution. sshd.c - Turn off cray process privileges root is enough on PRIV_SU unicos/unicosmk systems. entropy.c - Define INADDR_LOOPBACK deattack.c - Modified to not depend on u_int...
2014 Feb 13
3
Libguestfs (1.22.6) driver/changes for mingw/win32
Hi, I attached the changes I made to a vanilla libguestfs-1.22.6 in order to make it work in mingw/win32. Added is also the patch required to make QEMU compatible (add a command to QMP that lists the supported devices (the regilat way you do it print it to stderr, which is difficult to redirect in win32)). This is done on behalf of Intel Corp. Thanks, Or (oberon in irc)
2003 Jun 04
2
[Bug 413] Port forwarding: [localhost:]localport:remotehost:remoteport
http://bugzilla.mindrot.org/show_bug.cgi?id=413 dtucker at zip.com.au changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #229 is|0 |1 obsolete| | ------- Additional Comments From dtucker at zip.com.au 2003-06-04 21:37 -------
2001 Jul 02
1
Forwarding race resulting in lost data in openssh-2.9p2
...<arpa/inet.h> int main(int argc, char *argv[]) { struct sockaddr_in remoteAddr; int sock, delay = 0, n; char buf[1024]; if (argc > 1) delay = atoi(argv[1]); memset(&remoteAddr, 0, sizeof(&remoteAddr)); remoteAddr.sin_family = AF_INET; remoteAddr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); remoteAddr.sin_port = htons(8000); sock = socket(AF_INET, SOCK_STREAM, 0); if (sock == -1) abort(); if (connect(sock, (struct sockaddr*)&remoteAddr, sizeof(remoteAddr)) == -1) abort(); if (delay) sleep(delay); write(sock, "GET /\n\n", 7); while ((n = read(sock, buf,...
2002 Jun 26
1
privilege separation breaks dns lookups
...r hasn't yet initialized itself then dns lookups will not be possible. This is unfortunately what normally happens, but sshd falls back gracefully. There are a couple of wrinkles: the resolver will typically try talking to a nameserver on the local host by default (using INADDR_ANY rather than INADDR_LOOPBACK) so if one is running then things will still work. However if for some reason the name server is running but has ACLs which only permit queries on 127.0.0.1 then sshd will hang when attempting a DNS lookup since it gets neither an ICMP port unreachable nor a response. Tony. -- f.a.n.finch <dot...
2010 Jun 15
1
DO NOT REPLY [Bug 7514] New: Fix socketpair_tcp()
...Status: NEW Severity: normal Priority: P3 Component: core AssignedTo: wayned at samba.org ReportedBy: polatel at gmail.com QAContact: rsync-qa at samba.org The patch below fixes two issues about the socketpair_tcp() function: - Bind to INADDR_LOOPBACK instead of INADDR_ANY - Pass the correct sockaddr_in to accept() Here's the patch: http://dev.exherbo.org/~alip/tmp/rsync-3.0.7-bindlocal.patch -- Configure bugmail: https://bugzilla.samba.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the QA contact...
2018 Dec 12
2
[PATCH] drop old netinet/in_systm.h include
...0x10 diff --git a/includes.h b/includes.h index 0fd71792e1ac..94cbc92edd1c 100644 --- a/includes.h +++ b/includes.h @@ -110,7 +110,6 @@ #endif #include <netinet/in.h> -#include <netinet/in_systm.h> /* For typedefs */ #ifdef HAVE_RPC_TYPES_H # include <rpc/types.h> /* For INADDR_LOOPBACK */ #endif diff --git a/misc.c b/misc.c index dd74c8d45874..c8f6b6a33023 100644 --- a/misc.c +++ b/misc.c @@ -47,7 +47,6 @@ #include <unistd.h> #include <netinet/in.h> -#include <netinet/in_systm.h> #include <netinet/ip.h> #include <netinet/tcp.h> #include <a...
2001 Jun 07
2
Patch to enable multiple possible sources of entropy
...len) { int fd; char msg[2]; *************** *** 100,110 **** --- 98,110 ---- memset(&addr, '\0', sizeof(addr)); #ifdef PRNGD_PORT + debug2("Opening entropy socket on localhost port %d", PRNGD_PORT); addr.sin_family = AF_INET; addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); addr.sin_port = htons(PRNGD_PORT); addr_len = sizeof(struct sockaddr_in); #else /* use IP socket PRNGD_SOCKET instead */ + debug2("Opening entropy socket at %s", PRNGD_SOCKET); /* Sanity checks */ if (sizeof(PRNGD_SOCKET) > sizeof(addr.sun_path)) fatal("Random...
2001 Oct 02
2
New feature: remote entropy gatherer port
...e(PRNGD_HOST); + if (he == NULL) { + error("Could not get IP address for hostname %s.", PRNGD_HOST); + goto done; + } + + memcpy(&addr.sin_addr.s_addr, he->h_addr_list[0], sizeof(struct in_addr)); + #else /* use localhost IP address */ addr.sin_addr.s_addr = htonl(INADDR_LOOPBACK); + #endif addr.sin_port = htons(PRNGD_PORT); addr_len = sizeof(struct sockaddr_in); #else /* use IP socket PRNGD_SOCKET instead */ *************** *** 137,144 **** --- 150,162 ---- if (connect(fd, (struct sockaddr*)&addr, addr_len) == -1) { #ifdef PRNGD_PORT + #ifdef PRNGD_HOST...
2006 Aug 30
30
Testing for the 4.4p1 release
Hi, The 4.4p1 release is approaching now, so we are now asking people to actively test snapshots or CVS and report back to the mailing list. Snapshots are available from http://www.mindrot.org/openssh_snap or from any of the mirrors listed on http://www.openssh.org/portable.html The latter page also includes instructions for checking out portable OpenSSH via anonymous CVS. This release