search for: inetd_flag

Displaying 16 results from an estimated 16 matches for "inetd_flag".

2002 Oct 15
0
[Bug 414] New: sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
http://bugzilla.mindrot.org/show_bug.cgi?id=414 Summary: sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given Product: Portable OpenSSH Version: -current Platform: All URL: http://marc.theaimsgroup.com/?l=openssh-unix- dev&m=102469253706346&w=2 OS/Version: Linux Status: NEW Severity: normal...
2002 Nov 05
2
[Bug 414] sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
http://bugzilla.mindrot.org/show_bug.cgi?id=414 ------- Additional Comments From markus at openbsd.org 2002-11-06 07:01 ------- Created an attachment (id=164) --> (http://bugzilla.mindrot.org/attachment.cgi?id=164&action=view) proposed patch what about this? (more in line with the rest of the code). ------- You are receiving this mail because: ------- You are the assignee for the
2002 Jun 21
0
sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
A non-text attachment was scrubbed... Name: sshd-stderr.patch Type: text/x-patch Size: 424 bytes Desc: make sshd honor -e even with -i Url : http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20020621/b29eef76/attachment.bin
2002 Mar 26
1
Two patches for OpenSSH 3.1p1
...--------- diff -r -c openssh-3.1p1/sshd.c openssh-3.1p1-peter/sshd.c *** openssh-3.1p1/sshd.c Tue Mar 5 02:31:30 2002 --- openssh-3.1p1-peter/sshd.c Tue Mar 26 20:59:06 2002 *************** *** 120,125 **** --- 120,128 ---- /* Flag indicating that the daemon is being started from inetd. */ int inetd_flag = 0; + /* Flag indicating that the daemon is being started from init (/etc/inittab). */ + int init_flag = 0; + /* Flag indicating that sshd should not detach and become a daemon. */ int no_daemon_flag = 0; *************** *** 608,614 **** initialize_server_options(&options);...
2001 Jan 04
2
Patch to allow openssh-2.2.0-p1 to be started from /etc/inittab
...2:05:50 2000 --- openssh-2.2.0p1-pen1/sshd.c Thu Jan 4 23:30:46 2001 *************** *** 552,558 **** log_init(av0, options.log_level == -1 ? SYSLOG_LEVEL_INFO : options.log_level, options.log_facility == -1 ? SYSLOG_FACILITY_AUTH : options.log_facility, ! !silent && !inetd_flag); /* Read server configuration options from the configuration file. */ read_server_config(&options, config_file_name); --- 552,558 ---- log_init(av0, options.log_level == -1 ? SYSLOG_LEVEL_INFO : options.log_level, options.log_facility == -1 ? SYSLOG_FACILITY_AUTH : op...
2007 Dec 26
1
sshd's -e doesn't work as expected
...=================================================== RCS file: /cvsroot/src/crypto/dist/ssh/sshd.c,v retrieving revision 1.42 diff -u -p -r1.42 sshd.c --- sshd.c 18 Dec 2007 02:35:33 -0000 1.42 +++ sshd.c 26 Dec 2007 20:12:22 -0000 @@ -1485,8 +1485,16 @@ main(int ac, char **av) if (!(debug_flag || inetd_flag || no_daemon_flag)) { int fd; - if (daemon(0, 0) < 0) + if (daemon(0, 1) < 0) fatal("daemon() failed: %.200s", strerror(errno)); + close(STDIN_FILENO); + open(_PATH_DEVNULL, O_RDONLY); + close(STDOUT_FILENO); + open(_PATH_DEVNULL, O_WRONLY); + if (!log_stderr) { +...
2002 Dec 18
2
patch for openssh3.5p1 - adds logging option
...enssh-3.5p1-orig/sshd.c 2002-12-18 10:10:13.000000000 -0500 +++ openssh-3.5p1/sshd.c 2002-12-18 10:51:30.000000000 -0500 @@ -944,7 +944,7 @@ SYSLOG_LEVEL_INFO : options.log_level, options.log_facility == SYSLOG_FACILITY_NOT_SET ? SYSLOG_FACILITY_AUTH : options.log_facility, - !inetd_flag); + !inetd_flag, options.log_file); #ifdef _UNICOS /* Cray can define user privs drop all prives now! @@ -1079,7 +1079,7 @@ /* Initialize the log (it is reinitialized below in case we forked). */ if (debug_flag && !inetd_flag) log_stderr = 1; - log_init(__progname, options.l...
2006 Apr 13
1
Prototyping for basejail distribuition
...in/sh /etc/rc" exec_stop="/bin/sh /etc/rc.shutdown" devfs_enable="NO" fdescfs_enable="NO" procfs_enable="NO" mount_enable="NO" devfs_ruleset="ruleset_name" flags="-l -U root" # # JAIL RC.CONF # sendmail_enable="NO" inetd_flags="-wW -a" rpcbind_enable="NO" network_interfaces="" # # FILES # copy_to_jail="/etc/localtime /etc/resolv.conf /etc/csh.cshrc /etc/csh.login" # # JAILS # jail_node01_rootdir="/usr/jail/node01" jail_node01_hostname="node01.example.com" jai...
2007 Apr 10
6
[PATCH 0/6] openssh V_4_6: minor fixes/cleanups
This patch series consists of minor fixes and cleanups I made during update to openssh V_4_6 branch. openssh/auth-pam.c | 9 ++++----- openssh/auth2.c | 2 -- openssh/readconf.c | 7 ++++--- openssh/servconf.c | 14 ++++++++------ openssh/sftp-server.c | 9 ++++++--- openssh/sshd.c | 2 +- 6 files changed, 23 insertions(+), 20 deletions(-) -- ldv
2003 May 21
1
netstat/ipcs inside jail
...sys/ruby2 i386 System was updated, mergemaster done, kernel in sync with world. The interfaces par of my rc.conf from the host : ifconfig_rl1="inet 10.0.2.1 netmask 255.255.255.0" ifconfig_rl1_alias0="inet 10.0.2.6 netmask 0xffffffff" route_0="10.0.2.6 -iface lo0" inetd_flags="-wW -a 10.0.2.1" portmap_enable="NO" --- - my sysctls for the jail are set as follows and are loaded by /etc/sysctl.conf > sysctl -a | grep jail jail.set_hostname_allowed: 0 jail.socket_unixiproute_only: 0 jail.sysvipc_allowed: 1 - my kernel is compiled with these options...
2024 Aug 14
2
[Bug 3717] New: Stricter sshd absolute path requirement breaks xinetd
...sion binaries (https://anongit.mindrot.org/openssh.git/commit/?id=03e3de416ed7c34faeb692967737be4a7bbe2eb5) had the effect of breaking use with xinetd. This is due to a combination of two things. Firstly, sshd no longer exempts inetd mode from the absolute-path check: - if (rexeced_flag || inetd_flag) - rexec_flag = 0; - if (!test_flag && !do_dump_cfg && rexec_flag && !path_absolute(av[0])) - fatal("sshd re-exec requires execution with an absolute path"); + if (!test_flag && !do_dump_cfg && !path_absolute(...
2000 Dec 22
0
patch to specify DSA host key on command line
...arg; break; + case 'H': + options.host_dsa_key_file = optarg; + break; case 'V': client_version_string = optarg; /* only makes sense with inetd_flag, i.e. no listen() */ @@ -578,8 +581,9 @@ fprintf(stderr, " -k seconds Regenerate server key every this many seconds (default: 3600)\n"); fprintf(stderr, " -g seconds Grace period for authentication (default: 300)\n");...
2016 Dec 13
15
[Bug 2646] New: zombie processes when using privilege separation
https://bugzilla.mindrot.org/show_bug.cgi?id=2646 Bug ID: 2646 Summary: zombie processes when using privilege separation Product: Portable OpenSSH Version: 7.2p2 Hardware: ix86 OS: Linux Status: NEW Severity: minor Priority: P5 Component: sshd Assignee: unassigned-bugs at
2001 Sep 14
8
Call for testers.
http://bass.directhit.com/openssh_snap/ Starting tonight I plan on tracking changes very closely with the OpenBSD tree. I need people to test the latest snapshot (9/14 at of right now) and report success or failure on compiling. I am starting this now because we are looking at a code freeze soon and I really want to ensure it compiles and runs on all existing platforms. So we (the portable
2016 Nov 21
42
[Bug 2641] New: Add systemd notify code to to track running server
https://bugzilla.mindrot.org/show_bug.cgi?id=2641 Bug ID: 2641 Summary: Add systemd notify code to to track running server Product: Portable OpenSSH Version: 7.3p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: sshd Assignee:
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches? --- Scott Neugroschl | XYPRO Technology Corporation 4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |