search for: max_time_milliseconds

Displaying 19 results from an estimated 19 matches for "max_time_milliseconds".

2001 Oct 25
2
SIGCHLD race *trivial* patch
...ortable. So, summary of changes: - session.h Added prototype for session_still_used() boolean function. - session.c Added session_still_used() boolean function. - serverloop.c Added this bit of code to wait_until_can_do_something(): if (!channel_still_open()) max_time_milliseconds = 1000; before select()ing. Added this bit of code to server_loop2(): if (child_terminated) { while ((pid = waitpid(-1, &status, WNOHANG)) > 0) session_close_by_pid(pid, status); - child_te...
2001 Aug 20
1
Idletimeout patch, third attempt
...SSH_CMSG_STDIN_DATA: + case SSH_SMSG_STDOUT_DATA: + case SSH_SMSG_STDERR_DATA: + case SSH2_MSG_CHANNEL_DATA: + case SSH2_MSG_CHANNEL_EXTENDED_DATA: + time(&idletime_last); + } +} + +int +packet_select(int maxfds, + fd_set *readset, fd_set *writeset, fd_set *exceptset, + int max_time_milliseconds) +{ + struct timeval tv, *tvp=NULL; + int ret; + + if (idletimeout>0) { + /* Count the time to idletimeout */ + time_t diff=time(NULL)-idletime_last; + if (diff>=idletimeout) + tv.tv_sec=1; + else + tv.tv_sec=idletimeout-diff+1; + tv.tv_usec=0;...
2001 Aug 16
4
Idletimeout patch
...ons.idletimeout>0) { + if (idletime_last==0) { + /* Initialize idletime_last */ + time(&idletime_last); + } + /* Schedule idletimeout if no other timeouts are scheduled. + * Idletimeouts are the longest and it is not a big deal, + * if they are missed by few seconds. */ + if (max_time_milliseconds == 0) { + time_t diff=time(NULL)-idletime_last; + if (diff>=options.idletimeout) + max_time_seconds=1; + else + max_time_seconds=options.idletimeout-diff; + } + } + /* When select fails we restart from here. */ retry_select: @@ -258,10 +279,17 @@ if (child_terminated &&...
2003 Sep 15
1
SCO 3.2v4.2 and OpenSSH -current --> connection hangs and does no t close
...channel 0: send eof debug2: channel 0: input drain -> closed ------------------- I have tried my hand at gdb, and this is the output and backtrace before the session hangs. (gdb) wait_until_can_do_something (readsetp=0x7ffff8e4, writesetp=0x7ffff8e0, maxfdp=0x7ffff8dc, nallocp=0x7ffff8d8, max_time_milliseconds=0) at serverloop.c:313 313 if (child_terminated && packet_not_very_much_data_to_write()) (gdb) 317 if (max_time_milliseconds == 0) (gdb) 318 tvp = NULL; (gdb) 326 ret = select((*maxfdp)+1, *readsetp, *writesetp, NULL, tvp); (gdb) p...
2014 Jul 06
15
[Bug 2252] New: RekeyLimit breaks ClientAlive
...verity: normal Priority: P5 Component: sshd Assignee: unassigned-bugs at mindrot.org Reporter: wiwi at progon.net If RekeyLimit is enabled, ClientAlive messages will not be sent, ever! Problem seems to be: serverloop.c: wait_until_can_do_something(...) max_time_milliseconds is set to the remaining time to a rekey. client_alive_scheduled never gets set, as max_time_milliseconds!=0: if (compat20 && max_time_milliseconds == 0 && options.client_alive_interval) { client_alive_scheduled = 1; max_time_milliseconds = (u_int64_t)options.client...
2003 Sep 15
0
SCO 3.2v4.2 and OpenSSH -current --> connection hangs and does n o t close
...e results. > > - Ben > Commented out the #define signal (a,b) mysignal(a,b) in bsd-misc.h, recompiled ( make clean && make ) still the same problem exists: (gdb) wait_until_can_do_something (readsetp=0x7ffff8e4, writesetp=0x7ffff8e0, maxfdp=0x7ffff8dc, nallocp=0x7ffff8d8, max_time_milliseconds=0) at serverloop.c:313 313 if (child_terminated && packet_not_very_much_data_to_write()) (gdb) 317 if (max_time_milliseconds == 0) (gdb) 318 tvp = NULL; (gdb) 326 ret = select((*maxfdp)+1, *readsetp, *writesetp, NULL, tvp); (gdb) b...
2005 Mar 03
3
ssh hang problem under solaris 8
...problem.... is it a solaris problem ? Greetings Frank sshd: #0 0xff19d618 in _poll () from /usr/lib/libc.so.1 #1 0xff14d53c in select () from /usr/lib/libc.so.1 #2 0x000339a0 in wait_until_can_do_something (readsetp=0xffbee5dc, writesetp=0xffbee5d8, maxfdp=0xffbee5d4, nallocp=0xffbee5d0, max_time_milliseconds=0) at serverloop.c:325 #3 0x00034d6c in server_loop2 (authctxt=0x123ac8) at serverloop.c:776 #4 0x0003ae0c in do_authenticated (authctxt=0x123ac8) at session.c:2265 #5 0x0002ea78 in main (ac=1161216, av=0x11f288) at sshd.c:1719 ssh: (gdb) backtrace #0 0xff19d618 in _poll () #1 0xff14d53c in _...
2013 Nov 12
7
[Bug 2170] New: Potential integer overflow
...hancement Priority: P5 Component: sshd Assignee: unassigned-bugs at mindrot.org Reporter: loganaden at gmail.com Created attachment 2373 --> https://bugzilla.mindrot.org/attachment.cgi?id=2373&action=edit potential_overflow_fix in serverloop.c: max_time_milliseconds = options.client_alive_interval * 1000; client_alive_interval is declare as int. int client_alive_interval; /* * poke the client this often to * see if it's still there max_time_milliseconds is dec...
2003 Sep 17
3
[Bug 651] SCO 3.2v4.2 and OpenSSH 3.7.1p1 --> connection hangs and does not close (ssh2 only)
...channel 0: send eof debug2: channel 0: input drain -> closed --->hangs<--- -------------------------------------------- below is a backtrace from gdb: (gdb) s 326 ret = select((*maxfdp)+1, *readsetp, *writesetp, NULL, tvp); (gdb) l 321 tv.tv_usec = 1000 * (max_time_milliseconds % 1000); 322 tvp = &tv; 323 } 324 325 /* Wait for something to happen, or the timeout to expire. */ 326 ret = select((*maxfdp)+1, *readsetp, *writesetp, NULL, tvp); 327 328 if (ret == -1) { 329 memset(*reads...
2000 Dec 28
2
sshd doesn't log which RSA key was used
Hi guys, and another feature request for sshd which I would classify as really useful. And I think this behaviour is currently not available (If yes, sorry, I must have missed it): > I believe that the sshd should log which RSA key was used to connect to > an account. When there are a number of keys in the authorized_keys file > it is often useful to know which one was used for each
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
...*/ -static void + +/* + * SD Mod: + * We changed wait_until_can_do_something's return value from void + * to int. It now returns 1 if the steno_timer has expired and 0 if not. + */ +int wait_until_can_do_something(fd_set **readsetp, fd_set **writesetp, int *maxfdp, int *nallocp, u_int max_time_milliseconds) { - struct timeval tv, *tvp; + + struct timeval tv, *tvp; + /* SD Mod: added variable steno_timer*/ + static struct timeval steno_timer = {0, 50000}; int ret; int client_alive_scheduled = 0; - - /* + long int prev_timer_val = 0; + /*...
2001 Oct 06
1
Defeating Timing Attacks
Hello, In response to the timing analysis attacks presented by Dawn Song et. al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html we at Silicon Defense developed a patch for openssh to avoid such measures. Timing Analysis Evasion changes were developed by C. Jason Coit and Roel Jonkman of Silicon Defense. These changes cause SSH to send packets unless request not to,
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly: http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html <quote> The paper concludes that the keystroke timing data observable from today's SSH implementations reveals a dangerously significant amount of information about user terminal sessions--enough to locate typed passwords in the session data stream and reduce the
2012 Dec 04
2
OpenSSH warnings on FreeBSD
...============================== RCS file: /cvs/openssh/serverloop.c,v retrieving revision 1.172 diff -u -p -r1.172 serverloop.c --- serverloop.c 2 Dec 2012 22:50:55 -0000 1.172 +++ serverloop.c 4 Dec 2012 11:46:33 -0000 @@ -708,7 +708,7 @@ server_loop(pid_t pid, int fdin_arg, int &nalloc, max_time_milliseconds); if (received_sigterm) { - logit("Exiting on signal %d", received_sigterm); + logit("Exiting on signal %d", (int)received_sigterm); /* Clean up sessions, utmp, etc. */ cleanup_exit(255); } @@ -858,7 +858,7 @@ server_loop2(Authctxt *authctxt) &nallo...
2006 Apr 22
2
bug & patch in ServerAliveInterval (openssh 4.3-p2)
Hi openssh-unix-dev subscribers :) I have found that ServerAliveInterval & ServerAliveCountMax have some bug. Basically the ssh-alive check function (that verify the peer is alive) is called only if no data at all gets into ssh (when it should work only for server channel).I am pretty sure developers know about this ..anyway I have tried to fix this issue. Here is the patch: diff -rNu
2001 Aug 03
1
Disconnecting: protocol error: rcvd type 98
When I SSH using protocol 1 from a Debian box running OpenSSH 2.9p2-4 to a sparc.sunos5 box running vanilla OpenSSH 2.9.1, after a little while (of inactivity?) I get the following message on the client terminal: Disconnecting: protocol error: rcvd type 98 Looking further, this message is actually caused by the SSH daemon. However, I'm at a loss to determine why sshd is doing this. I attach
2000 Jul 18
5
scp not shutting down in 2.1.1p4
Hi! as I just noted, after scp the connection does not shut down properly. When I do a "scp file targethost:path", on targethost a "sshd" process is left running. I do use --with-default-path="/usr/local/openssh/bin:/usr/bin:/usr/local/bin" to assure, that the corrensponding openssh-scp is used. It also seems, that normal sessions are not always closed properly.
2006 Sep 07
12
Multiple (multiplexed) simultaneous ssh connections - Cygwin bug?
Hello, ? I need to make many (>50) ssh connections from linux to cygwin at the same time. Using Windows 2000 Server (OpenSSH_4.3p2, OpenSSL 0.9.8b and updated cygwin) and Linux RHEL4 (OpenSSH_3.9p1, OpenSSL 0.9.7a). ? It's been difficult to optimize many simultaneous connections. Here were some issues: 1.?????? On Windows XP/Professional, Microsoft intentionally cripples the TCP/IP stack.
2001 Oct 10
7
OpenSSH solaris: bad return code after exec of remote command
Hi OpenSSH developers, I am using openSSH (now 2.9.9p2, but prob occurs in 2.9p2 also) to execute commands on a remote machine which outputs data to stdout then pipes it to another invocation of ssh which connects back to the first machine in the same way, where it starts a program to read and store the output from the command on the second machine. I am using the "command" option in