Displaying 4 results from an estimated 4 matches for "k_flag".
Did you mean:
f_flag
2002 Apr 02
0
[Bug 199] New: ssh-agent -k doesn't check $SHELL environment variable
...EW
Severity: minor
Priority: P3
Component: ssh-agent
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: menscher+bug at uiuc.edu
CC: menscher+bug at uiuc.edu
Line 882 of ssh-agent.c reads:
if (ac == 0 && !c_flag && !k_flag && !s_flag && !d_flag) {
stuff to set c_flag=1 iff $SHELL=*csh
}
This means that someone running ssh-agent -k will have k_flag set and therefore
won't get the auto-shell determination, therefore leaving them with bash-style
commands.
I'm guessing the debug flag should...
2011 May 18
2
Might a patch to ssh-agent to allow relaxing of peer euid check be accepted?
...a:t:U")) != -1) {
switch (ch) {
case 'c':
if (s_flag)
@@ -1186,6 +1197,9 @@
usage();
}
break;
+ case 'U':
+ U_flag++;
+ break;
default:
usage();
}
@@ -1193,7 +1207,7 @@
ac -= optind;
av += optind;
- if (ac > 0 && (c_flag || k_flag || s_flag || d_flag))
+ if (ac > 0 && (c_flag || k_flag || s_flag || d_flag || U_flag))
usage();
if (ac == 0 && !c_flag && !s_flag) {
2007 Feb 23
1
ssh-agent does not immediately clean timeouted keys from memory
during my seminar of advanced exploitation techniques (SEAT, [1]) i
developed some methods to crack into system via DMA (e.g. via firewire).
as part of this i developed a program that steals loaded ssh private
keys from ssh-agents. i was astonished to find that the keys are not
immediately removed from the agent when a timeout occurs, but only the
next time the agent is queried via its socket. i
2023 Jun 17
2
[PATCH] ssh-agent: add systemd socket-based activation
...leanup_pid != 0 && getpid() != cleanup_pid)
return;
+#ifdef WITH_SYSTEMD
+ if (external_socket)
+ return;
+#endif
debug_f("cleanup");
if (socket_name[0])
unlink(socket_name);
@@ -2000,7 +2012,7 @@ int
main(int ac, char **av)
{
int c_flag = 0, d_flag = 0, D_flag = 0, k_flag = 0, s_flag = 0;
- int sock, ch, result, saved_errno;
+ int sock = 0, ch, result, saved_errno;
char *shell, *format, *pidstr, *agentsocket = NULL;
#ifdef HAVE_SETRLIMIT
struct rlimit rlim;
@@ -2015,6 +2027,9 @@ main(int ac, char **av)
struct pollfd *pfd = NULL;
size_t npfd = 0;
u_int max...