Displaying 16 results from an estimated 16 matches for "inetd_flag".
2002 Oct 15
0
[Bug 414] New: sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
http://bugzilla.mindrot.org/show_bug.cgi?id=414
Summary: sshd initially ignores -e (log_stderr) if -i
(inetd_flag) is given
Product: Portable OpenSSH
Version: -current
Platform: All
URL: http://marc.theaimsgroup.com/?l=openssh-unix-
dev&m=102469253706346&w=2
OS/Version: Linux
Status: NEW
Severity: normal...
2002 Nov 05
2
[Bug 414] sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
http://bugzilla.mindrot.org/show_bug.cgi?id=414
------- Additional Comments From markus at openbsd.org 2002-11-06 07:01 -------
Created an attachment (id=164)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=164&action=view)
proposed patch
what about this? (more in line with the rest of the code).
------- You are receiving this mail because: -------
You are the assignee for the
2002 Jun 21
0
sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
A non-text attachment was scrubbed...
Name: sshd-stderr.patch
Type: text/x-patch
Size: 424 bytes
Desc: make sshd honor -e even with -i
Url : http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20020621/b29eef76/attachment.bin
2002 Mar 26
1
Two patches for OpenSSH 3.1p1
...---------
diff -r -c openssh-3.1p1/sshd.c openssh-3.1p1-peter/sshd.c
*** openssh-3.1p1/sshd.c Tue Mar 5 02:31:30 2002
--- openssh-3.1p1-peter/sshd.c Tue Mar 26 20:59:06 2002
***************
*** 120,125 ****
--- 120,128 ----
/* Flag indicating that the daemon is being started from inetd. */
int inetd_flag = 0;
+ /* Flag indicating that the daemon is being started from init (/etc/inittab). */
+ int init_flag = 0;
+
/* Flag indicating that sshd should not detach and become a daemon. */
int no_daemon_flag = 0;
***************
*** 608,614 ****
initialize_server_options(&options);...
2001 Jan 04
2
Patch to allow openssh-2.2.0-p1 to be started from /etc/inittab
...2:05:50 2000
--- openssh-2.2.0p1-pen1/sshd.c Thu Jan 4 23:30:46 2001
***************
*** 552,558 ****
log_init(av0,
options.log_level == -1 ? SYSLOG_LEVEL_INFO : options.log_level,
options.log_facility == -1 ? SYSLOG_FACILITY_AUTH : options.log_facility,
! !silent && !inetd_flag);
/* Read server configuration options from the configuration file. */
read_server_config(&options, config_file_name);
--- 552,558 ----
log_init(av0,
options.log_level == -1 ? SYSLOG_LEVEL_INFO : options.log_level,
options.log_facility == -1 ? SYSLOG_FACILITY_AUTH : op...
2007 Dec 26
1
sshd's -e doesn't work as expected
...===================================================
RCS file: /cvsroot/src/crypto/dist/ssh/sshd.c,v
retrieving revision 1.42
diff -u -p -r1.42 sshd.c
--- sshd.c 18 Dec 2007 02:35:33 -0000 1.42
+++ sshd.c 26 Dec 2007 20:12:22 -0000
@@ -1485,8 +1485,16 @@ main(int ac, char **av)
if (!(debug_flag || inetd_flag || no_daemon_flag)) {
int fd;
- if (daemon(0, 0) < 0)
+ if (daemon(0, 1) < 0)
fatal("daemon() failed: %.200s", strerror(errno));
+ close(STDIN_FILENO);
+ open(_PATH_DEVNULL, O_RDONLY);
+ close(STDOUT_FILENO);
+ open(_PATH_DEVNULL, O_WRONLY);
+ if (!log_stderr) {
+...
2002 Dec 18
2
patch for openssh3.5p1 - adds logging option
...enssh-3.5p1-orig/sshd.c 2002-12-18 10:10:13.000000000 -0500
+++ openssh-3.5p1/sshd.c 2002-12-18 10:51:30.000000000 -0500
@@ -944,7 +944,7 @@
SYSLOG_LEVEL_INFO : options.log_level,
options.log_facility == SYSLOG_FACILITY_NOT_SET ?
SYSLOG_FACILITY_AUTH : options.log_facility,
- !inetd_flag);
+ !inetd_flag, options.log_file);
#ifdef _UNICOS
/* Cray can define user privs drop all prives now!
@@ -1079,7 +1079,7 @@
/* Initialize the log (it is reinitialized below in case we forked). */
if (debug_flag && !inetd_flag)
log_stderr = 1;
- log_init(__progname, options.l...
2006 Apr 13
1
Prototyping for basejail distribuition
...in/sh /etc/rc"
exec_stop="/bin/sh /etc/rc.shutdown"
devfs_enable="NO"
fdescfs_enable="NO"
procfs_enable="NO"
mount_enable="NO"
devfs_ruleset="ruleset_name"
flags="-l -U root"
#
# JAIL RC.CONF
#
sendmail_enable="NO"
inetd_flags="-wW -a"
rpcbind_enable="NO"
network_interfaces=""
#
# FILES
#
copy_to_jail="/etc/localtime /etc/resolv.conf /etc/csh.cshrc
/etc/csh.login"
#
# JAILS
#
jail_node01_rootdir="/usr/jail/node01"
jail_node01_hostname="node01.example.com"
jai...
2007 Apr 10
6
[PATCH 0/6] openssh V_4_6: minor fixes/cleanups
This patch series consists of minor fixes and cleanups I made during
update to openssh V_4_6 branch.
openssh/auth-pam.c | 9 ++++-----
openssh/auth2.c | 2 --
openssh/readconf.c | 7 ++++---
openssh/servconf.c | 14 ++++++++------
openssh/sftp-server.c | 9 ++++++---
openssh/sshd.c | 2 +-
6 files changed, 23 insertions(+), 20 deletions(-)
--
ldv
2003 May 21
1
netstat/ipcs inside jail
...sys/ruby2 i386
System was updated, mergemaster done, kernel in sync with world.
The interfaces par of my rc.conf from the host :
ifconfig_rl1="inet 10.0.2.1 netmask 255.255.255.0"
ifconfig_rl1_alias0="inet 10.0.2.6 netmask 0xffffffff"
route_0="10.0.2.6 -iface lo0"
inetd_flags="-wW -a 10.0.2.1"
portmap_enable="NO"
---
- my sysctls for the jail are set as follows and are loaded by
/etc/sysctl.conf
> sysctl -a | grep jail
jail.set_hostname_allowed: 0
jail.socket_unixiproute_only: 0
jail.sysvipc_allowed: 1
- my kernel is compiled with these options...
2024 Aug 14
2
[Bug 3717] New: Stricter sshd absolute path requirement breaks xinetd
...sion binaries
(https://anongit.mindrot.org/openssh.git/commit/?id=03e3de416ed7c34faeb692967737be4a7bbe2eb5)
had the effect of breaking use with xinetd. This is due to a
combination of two things. Firstly, sshd no longer exempts inetd mode
from the absolute-path check:
- if (rexeced_flag || inetd_flag)
- rexec_flag = 0;
- if (!test_flag && !do_dump_cfg && rexec_flag &&
!path_absolute(av[0]))
- fatal("sshd re-exec requires execution with an absolute
path");
+ if (!test_flag && !do_dump_cfg && !path_absolute(...
2000 Dec 22
0
patch to specify DSA host key on command line
...arg;
break;
+ case 'H':
+ options.host_dsa_key_file = optarg;
+ break;
case 'V':
client_version_string = optarg;
/* only makes sense with inetd_flag, i.e. no listen() */
@@ -578,8 +581,9 @@
fprintf(stderr, " -k seconds Regenerate server key every this many seconds (default: 3600)\n");
fprintf(stderr, " -g seconds Grace period for authentication (default: 300)\n");...
2016 Dec 13
15
[Bug 2646] New: zombie processes when using privilege separation
https://bugzilla.mindrot.org/show_bug.cgi?id=2646
Bug ID: 2646
Summary: zombie processes when using privilege separation
Product: Portable OpenSSH
Version: 7.2p2
Hardware: ix86
OS: Linux
Status: NEW
Severity: minor
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2001 Sep 14
8
Call for testers.
http://bass.directhit.com/openssh_snap/
Starting tonight I plan on tracking changes very closely with the OpenBSD
tree. I need people to test the latest snapshot (9/14 at of right now)
and report success or failure on compiling.
I am starting this now because we are looking at a code freeze soon and I
really want to ensure it compiles and runs on all existing platforms. So
we (the portable
2016 Nov 21
42
[Bug 2641] New: Add systemd notify code to to track running server
https://bugzilla.mindrot.org/show_bug.cgi?id=2641
Bug ID: 2641
Summary: Add systemd notify code to to track running server
Product: Portable OpenSSH
Version: 7.3p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee:
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |