search for: m61586

Displaying 4 results from an estimated 4 matches for "m61586".

2023 Jun 30
1
Subsystem sftp invoked even though forced command created
On 30/06/2023 09:56, Damien Miller wrote: > It's very hard to figure out what is happening here without a debug log. > > You can get one by stopping the listening sshd and running it manually > in debug mode, e.g. "/usr/sbin/sshd -ddd" Or starting one in debug mode on a different port, e.g. "-p99 -ddd"
2023 Jul 05
1
Subsystem sftp invoked even though forced command created
On 05.07.23 02:50, Damien Miller wrote: > Some possibilities: > 1. the receive.ksh script is faulty in some way that causes it to invoke > sftp-server How would the script even *know* that the client requested the SFTP subsystem? Is a subsystem's executable/path, supposedly internally overwritten with the forced command at that point, exposed through $SSH_ORIGINAL_COMMAND ?
2023 Jul 03
1
Subsystem sftp invoked even though forced command created
...t winding up in the server-side $SSH_ORIGINAL_COMMAND ... > debug1: server_input_channel_req: channel 0 request subsystem reply 1 > debug1: session_by_channel: session 0 channel 0 > debug1: session_input_channel_req: session 0 req subsystem > debug2: subsystem request for sftp by user m61586 > debug1: subsystem: exec() /usr/libexec/openssh/sftp-server > Starting session: forced-command (key-option) '/opt/app/workload/secgov/opt/sact-central/bin/receive.ksh' for m61586 from 135.99.45.25 port 49734 id 0 Well, I'll be ... Looks like the server side recognizes the force...
2023 Jul 05
1
Subsystem sftp invoked even though forced command created
...er-side $SSH_ORIGINAL_COMMAND ... > > > debug1: server_input_channel_req: channel 0 request subsystem reply 1 > > debug1: session_by_channel: session 0 channel 0 > > debug1: session_input_channel_req: session 0 req subsystem > > debug2: subsystem request for sftp by user m61586 > > debug1: subsystem: exec() /usr/libexec/openssh/sftp-server > > Starting session: forced-command (key-option) > > '/opt/app/workload/secgov/opt/sact-central/bin/receive.ksh' for m61586 from > > 135.99.45.25 port 49734 id 0 > > Well, I'll be ... Looks li...