search for: ipv4or6

Displaying 20 results from an estimated 36 matches for "ipv4or6".

2002 Dec 04
1
[Bug 451] New: new config-Option: IPv4or6
http://bugzilla.mindrot.org/show_bug.cgi?id=451 Summary: new config-Option: IPv4or6 Product: Portable OpenSSH Version: 3.5p1 Platform: All URL: http://www.toppoint.de/~wklaebe/ipv4or6-config- 3.5p1.diff OS/Version: All Status: NEW Severity: enhancement Priority: P2 C...
2001 Oct 07
3
Using -lssh as shared library
...e minor problem with libssl.a: it is not a complete library per se. Yes, I know that it isn't intended to be used by other programs (btw, pam_ssh uses parts of libssh), but keeping it in a good state may be helpful anyway. One issue with this library is that it refers to an external variable, IPV4or6, that itself isn't in library, but defined in several source files instead, repeating the same lines every time. So, then libssl is a shared object, programs like ssh-keygen (those that doesn't define IPV4or6) will not build. I hacked source a bit, but not like this hack very well. What I...
2003 Jan 03
0
[Bug 451] new config-Option: IPv4or6
http://bugzilla.mindrot.org/show_bug.cgi?id=451 djm at mindrot.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |WONTFIX ------- Additional Comments From djm at mindrot.org 2003-01-03 14:46
2001 May 14
2
openssh-2.9p1
Hi, 1. I think you should apply the attached patch to openssh-2.9p1, otherwise ssh-keyscan on linux boxes with glibc-2.1 will experience enormous timeout delays. 2. Is there a program like ssh-keyscan for the Version2 (dsa and rsa) keys?? regards Peter Breitenlohner <peb at mppmu.mpg.de> -------------- next part -------------- diff -ur openssh-2.9p1.orig/ssh-keyscan.c
2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
...,20 @@ static int argno = 1; /* Number of argument currently being parsed */ -int family = AF_UNSPEC; /* IPv4, IPv6 or both */ +/* Flag indicating whether IPv4 or IPv6. This can be set on the command line. + Default value is AF_UNSPEC means both IPv4 and IPv6. */ +#ifdef IPV4_DEFAULT +int IPv4or6 = AF_INET; +#else +int IPv4or6 = AF_UNSPEC; +#endif + +#define KT_RSA1 1 +#define KT_DSA 2 +#define KT_RSA 4 +int get_keytypes = KT_RSA1; /* Get only RSA1 keys by default */ + #define MAXMAXFD 256 /* The number of seconds after which to give up on a TCP connection */ @@ -39,6 +57,8 @@ fd_set...
2002 Feb 02
1
openssh-3.0.2p1 BUGs
...2409 ! 2598 Strchr could return a NULL is $DISPLAY does not have a ?:? in it ! Deattack.c 139 Test at 132 for IV == NULL should probably bypass this area. Will segfault in this line if IV == NULL. Kexgex.c 304 If dh == NULL, this line segfaults. Test at 299 should probably return Ssh.c 88 IPv4or6 is an int. Line 136 of channels.c declares a static int for same variable. ??? Clientloop.c 1120 If c == NULL, this line segfaults. Test at 1116 should probably return 0 1146 If c == NULL, this line segfaults. Test at 1142 should probably return 1234 If c == NULL, this line segfaults. Test at...
2001 Jun 09
2
[PATCH] Make "-L" local ports bind to "127.0.0.1" in openssh-2.9p1
...nts (which are supposed to be private unless "-g" + * or "-o 'GatewayPorts yes'" is specified when "ssh" is + * started) are [ab]usable by any host which has a route + * to/from the this host. */ memset(&hints, 0, sizeof(hints)); hints.ai_family = IPv4or6; hints.ai_flags = gateway_ports ? AI_PASSIVE : 0; hints.ai_socktype = SOCK_STREAM; snprintf(strport, sizeof strport, "%d", listen_port); - if (getaddrinfo(NULL, strport, &hints, &aitop) != 0) + if (getaddrinfo(gateway_ports ? NULL : "127.0.0.1", strport, &hints...
2016 Nov 09
7
[Bug 2636] New: Fix X11 forwarding, when ::1 is not configured
https://bugzilla.mindrot.org/show_bug.cgi?id=2636 Bug ID: 2636 Summary: Fix X11 forwarding, when ::1 is not configured Product: Portable OpenSSH Version: 7.3p1 Hardware: Sparc OS: Solaris Status: NEW Severity: minor Priority: P5 Component: sshd Assignee: unassigned-bugs at
2002 Mar 26
1
Two patches for OpenSSH 3.1p1
...nd become a daemon. */ int no_daemon_flag = 0; *************** *** 608,614 **** initialize_server_options(&options); /* Parse command-line arguments. */ ! while ((opt = getopt(ac, av, "f:p:b:k:h:g:V:u:o:dDeiqtQ46")) != -1) { switch (opt) { case '4': IPv4or6 = AF_INET; --- 612,618 ---- initialize_server_options(&options); /* Parse command-line arguments. */ ! while ((opt = getopt(ac, av, "f:p:b:k:h:g:V:u:o:dDeiIqtQ46")) != -1) { switch (opt) { case '4': IPv4or6 = AF_INET; *************** *** 636,641 **** ---...
2002 May 22
0
[PATCH] connect() timeout
...l machine be forwarded over the secure channel, and the application --- openssh-3.2.2p1/ssh.c.ORIG Tue Apr 23 13:09:46 2002 +++ openssh-3.2.2p1/ssh.c Tue May 21 15:40:06 2002 @@ -677,7 +677,7 @@ /* Open a connection to the remote host. */ cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6, - options.connection_attempts, + options.connection_attempts, options.connection_timeout, original_effective_uid != 0 || !options.use_privileged_port, pw, options.proxy_command); --- openssh-3.2.2p1/sshconnect.c.ORIG Tue Mar 5 19:59:46 2002 +++ openssh-3.2.2p1/sshconnect.c T...
2005 Feb 24
3
Suggestion: SSHD pseudo/fake mode. Source available.
Hi, SSH brute force attacks seem to enjoy increasing popularity. Call me an optimist or a misrouted kind of contributer to the community, but on our company server I actually go through the logs and report extreme cases to the providers of the originating IP's. With the increasing number of these attacks, however, I have now decided that it's better to move the SSHd to a different
2004 Jul 20
4
[Bug 898] support for AddressFamily in sshd_config
http://bugzilla.mindrot.org/show_bug.cgi?id=898 Summary: support for AddressFamily in sshd_config Product: Portable OpenSSH Version: 3.8.1p1 Platform: All OS/Version: All Status: NEW Severity: enhancement Priority: P2 Component: sshd AssignedTo: openssh-bugs at mindrot.org ReportedBy: peak
2000 Apr 11
0
DNS lookup
...Is this intended? If so, why? After looking through the code I found this function call in ssh.c: /* Find canonic host name. */ if (strchr(host, '.') == 0) { struct addrinfo hints; struct addrinfo *ai = NULL; int errgai; memset(&hints, 0, sizeof(hints)); hints.ai_family = IPv4or6; hints.ai_flags = AI_CANONNAME; hints.ai_socktype = SOCK_STREAM; errgai = getaddrinfo(host, NULL, &hints, &ai); if (errgai == 0) { if (ai->ai_canonname != NULL) host = xstrdup(ai->ai_canonname); freeaddrinfo(ai); } } Unfortunately the function getaddrinfo, which...
2000 Dec 22
0
patch to specify DSA host key on command line
.../* Parse command-line arguments. */ - while ((opt = getopt(ac, av, "f:p:b:k:h:g:V:u:diqQ46")) != EOF) { + while ((opt = getopt(ac, av, "f:p:b:k:h:H:g:V:u:diqQ46")) != EOF) { switch (opt) { case '4': IPv4or6 = AF_INET; @@ -557,6 +557,9 @@ case 'h': options.host_key_file = optarg; break; + case 'H': + options.host_dsa_key_file = optarg; + break; case &...
2014 Jan 15
0
remote port forward failed because of failure resolving localhost to IP with error No such file or directory
...36 { 3137 struct addrinfo hints; 3138 int gaierr; 3139 int sock = -1; 3140 char strport[NI_MAXSERV]; 3141 struct channel_connect cctx; 3142 Channel *c; 3143 3144 memset(&cctx, 0, sizeof(cctx)); 3145 memset(&hints, 0, sizeof(hints)); 3146 hints.ai_family = IPv4or6; 3147 hints.ai_socktype = SOCK_STREAM; 3148 snprintf(strport, sizeof strport, "%d", port); 3149 if ((gaierr = getaddrinfo(host, strport, &hints, &cctx.aitop)) != 0) { 3150 error("connect_to %.100s: unknown host (%s)", host, 3151 ssh_gai_st...
2002 Jan 26
5
[PATCH] Connect timeout
...ies that a TCP/IP port on the local machine be forwarded over the secure channel, and the application --- ssh.c.OK Mon Nov 12 00:52:04 2001 +++ ssh.c Sat Jan 26 21:44:35 2002 @@ -674,7 +674,7 @@ /* Open a connection to the remote host. */ cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6, - options.connection_attempts, + options.connection_attempts, options.connection_timeout, original_effective_uid != 0 || !options.use_privileged_port, pw, options.proxy_command); --- sshconnect.c.OK Wed Oct 10 07:07:45 2001 +++ sshconnect.c Sat Jan 26 21:44:35 2002 @@ -35,6 +...
2002 Jun 11
4
ssh setuid changes.
Ok, I'm doing a heads up here. I just applied: - markus at cvs.openbsd.org 2002/06/11 04:14:26 [ssh.c sshconnect.c sshconnect.h] no longer use uidswap.[ch] from the ssh client run less code with euid==0 if ssh is installed setuid root just switch the euid, don't switch the complete set of groups (this is only needed by sshd). ok provos@ A few comments about
2000 Dec 07
1
[PATCH] tis authserv support
...ion }, + { "authservaddress", sAuthservAddress }, #endif { "checkmail", sCheckMail }, { "listenaddress", sListenAddress }, @@ -277,6 +289,35 @@ return sBadOption; } +#ifdef TIS_AUTH +void +add_authserv_addr(ServerOptions *options, char **addr) +{ + extern int IPv4or6; + struct addrinfo hints, *ai, *aitop; + char *host, *service; + int gaierr; + + memset(&hints, 0, sizeof(hints)); + hints.ai_family = IPv4or6; + hints.ai_socktype = SOCK_STREAM; + hints.ai_flags = (addr == NULL) ? AI_PASSIVE : 0; + + host = strdelim(addr); + service = strdelim(addr); + + if...
2001 Nov 17
0
[PATCH] Connect timeout
...ssword * prompts. */ int cipher; /* Cipher to use. */ --- openssh-3.0.1p1/ssh.c.ORIG Sat Nov 17 22:49:09 2001 +++ openssh-3.0.1p1/ssh.c Sat Nov 17 22:49:47 2001 @@ -674,7 +674,7 @@ /* Open a connection to the remote host. */ cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6, - options.connection_attempts, + options.connection_attempts, options.connection_timeout, original_effective_uid != 0 || !options.use_privileged_port, pw, options.proxy_command); --- openssh-3.0.1p1/sshconnect.c.ORIG Sat Nov 17 22:49:09 2001 +++ openssh-3.0.1p1/sshconnect.c S...
2003 Apr 15
0
Connect timeout patch
...password * prompts. */ int cipher; /* Cipher to use. */ --- openssh-3.6.1p1/ssh.c.ORIG Tue Apr 15 23:06:30 2003 +++ openssh-3.6.1p1/ssh.c Tue Apr 15 23:08:28 2003 @@ -619,7 +619,7 @@ /* Open a connection to the remote host. */ if (ssh_connect(host, &hostaddr, options.port, IPv4or6, - options.connection_attempts, + options.connection_attempts, options.connection_timeout, #ifdef HAVE_CYGWIN options.use_privileged_port, #else --- openssh-3.6.1p1/ssh_config.0.ORIG Tue Apr 15 23:06:30 2003 +++ openssh-3.6.1p1/ssh_config.0 Tue Apr 15 23:11:06 2003 @@ -112,6 +112,13...