search for: k_flag

Displaying 4 results from an estimated 4 matches for "k_flag".

Did you mean: f_flag
2002 Apr 02
0
[Bug 199] New: ssh-agent -k doesn't check $SHELL environment variable
...EW Severity: minor Priority: P3 Component: ssh-agent AssignedTo: openssh-unix-dev at mindrot.org ReportedBy: menscher+bug at uiuc.edu CC: menscher+bug at uiuc.edu Line 882 of ssh-agent.c reads: if (ac == 0 && !c_flag && !k_flag && !s_flag && !d_flag) { stuff to set c_flag=1 iff $SHELL=*csh } This means that someone running ssh-agent -k will have k_flag set and therefore won't get the auto-shell determination, therefore leaving them with bash-style commands. I'm guessing the debug flag should...
2011 May 18
2
Might a patch to ssh-agent to allow relaxing of peer euid check be accepted?
...a:t:U")) != -1) { switch (ch) { case 'c': if (s_flag) @@ -1186,6 +1197,9 @@ usage(); } break; + case 'U': + U_flag++; + break; default: usage(); } @@ -1193,7 +1207,7 @@ ac -= optind; av += optind; - if (ac > 0 && (c_flag || k_flag || s_flag || d_flag)) + if (ac > 0 && (c_flag || k_flag || s_flag || d_flag || U_flag)) usage(); if (ac == 0 && !c_flag && !s_flag) {
2007 Feb 23
1
ssh-agent does not immediately clean timeouted keys from memory
during my seminar of advanced exploitation techniques (SEAT, [1]) i developed some methods to crack into system via DMA (e.g. via firewire). as part of this i developed a program that steals loaded ssh private keys from ssh-agents. i was astonished to find that the keys are not immediately removed from the agent when a timeout occurs, but only the next time the agent is queried via its socket. i
2023 Jun 17
2
[PATCH] ssh-agent: add systemd socket-based activation
...leanup_pid != 0 && getpid() != cleanup_pid) return; +#ifdef WITH_SYSTEMD + if (external_socket) + return; +#endif debug_f("cleanup"); if (socket_name[0]) unlink(socket_name); @@ -2000,7 +2012,7 @@ int main(int ac, char **av) { int c_flag = 0, d_flag = 0, D_flag = 0, k_flag = 0, s_flag = 0; - int sock, ch, result, saved_errno; + int sock = 0, ch, result, saved_errno; char *shell, *format, *pidstr, *agentsocket = NULL; #ifdef HAVE_SETRLIMIT struct rlimit rlim; @@ -2015,6 +2027,9 @@ main(int ac, char **av) struct pollfd *pfd = NULL; size_t npfd = 0; u_int max...