Displaying 20 results from an estimated 23 matches for "mm_pty_alloc".
2011 Feb 10
1
Behaviour of OpenSSH while login as root and non-root account
...se_session() and
pam_sm_setcred() function in PAM module while OpenSSH hardcoded it "ssh". I
made few changes in OpenSSh code so it can set terminal ID properly. These
changes were :
added do_pam_set_tty() in session_pty_req(Session *s) function in session.c
and added do_pam_set_tty() in mm_pty_allocate() function in monitor_wrap.c
It works fine for root and I get appropriate tty in pam_sm_cred() and
pam_sm_close_session() function.
But using same code, when I try to ssh through a non root account I am
getting tty in pam_sm_close_session() but not in pam_sm_cred(). I am not
sure why ssh is be...
2014 Sep 08
1
possible deadcodes in sources
...*intptr = *intptr + 1;
- }
break;
case sClientAliveInterval:
* monitor_wrap.c:720:dead_error_line ? Execution cannot reach this statement "close(tmp2);".o
--- a/monitor_wrap.c
+++ b/monitor_wrap.c
@@ -714,10 +714,8 @@ mm_pty_allocate(int *ptyfd, int *ttyfd, char *namebuf, size_t namebuflen)
if ((tmp1 = dup(pmonitor->m_recvfd)) == -1 ||
(tmp2 = dup(pmonitor->m_recvfd)) == -1) {
error("%s: cannot allocate fds for pty", __func__);
- if (tmp1 > 0)
+...
2004 Aug 27
0
Terminal modes
..._NONBLOCK
debug1: channel 2: new [X11 inet listener]
debug1: server_input_channel_req: channel 0 request pty-req reply 1
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req pty-req
debug1: Allocating pty.
debug3: mm_request_send entering: type 25
debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY
debug3: mm_request_receive_expect entering: type 26
debug3: mm_request_receive entering
debug3: monitor_read: checking request 25
debug3: mm_answer_pty entering
debug1: session_new: init
debug1: session_new: session 0
debug3: mm_request_send entering: type 26
debug3:...
2004 Aug 31
0
Terminal mode (repost)
..._NONBLOCK
debug1: channel 2: new [X11 inet listener]
debug1: server_input_channel_req: channel 0 request pty-req reply 1
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req pty-req
debug1: Allocating pty.
debug3: mm_request_send entering: type 25
debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY
debug3: mm_request_receive_expect entering: type 26
debug3: mm_request_receive entering
debug3: monitor_read: checking request 25
debug3: mm_answer_pty entering
debug1: session_new: init
debug1: session_new: session 0
debug3: mm_request_send entering: type 26
debug3:...
2003 Apr 19
4
[Bug 544] sshd w/privsep fails on Linux 2.0, mm_receive_fd: expected type 1 got 1074276337
...early Linuxes and I've
found the following problem with privsep enabled (Debian slink, kernel 2.0.38,
libc6 2.0.7). It seems to be related to file descriptor passing.
$ ./sshd -ddd -p 2022
[snip]
debug3: mm_answer_pty entering
debug1: session_new: init
debug1: session_new: session 0
debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY
debug3: mm_request_receive_expect entering: type 26
debug3: mm_request_receive entering
debug3: mm_request_send entering: type 26
mm_receive_fd: expected type 1 got 1074276337
It seems to be a bug in 2.0 kernels, cmsg_level and cmsg_type returned by
recvmsg() make...
2016 Jun 03
3
[Bug 2581] New: Coverity patches from Fedora
...39;t make it
to upstream yet.
1. "debug3: mm_answer_keyallowed: key %p is allowed" is always NULL,
because it is freed before calling the log function.
There is a flaw in logic of this debug log, when the key pointer is
always null (it is ensured that it is freed before) the call.
2. mm_pty_allocate contains Dead code (if the second dup fails, it
can't be different than -1) and comparison of the return dup() return
value should be >=0 instead of >0 -- 0 is also valid FD.
3. process_server_config_line: sAuthorizedPrincipalsFile option handles
intptr, without any possible label (th...
2002 Jun 29
0
Privsep for osf/1 .. still need a bit of help
...rieving revision 1.6
diff -u -r1.6 monitor_wrap.h
--- monitor_wrap.h 13 May 2002 01:07:42 -0000 1.6
+++ monitor_wrap.h 29 Jun 2002 03:19:30 -0000
@@ -59,6 +59,10 @@
void mm_start_pam(char *);
#endif
+#ifdef HAVE_OSF_SIA
+void mm_setup_sia(char *, char *);
+#endif
+
void mm_terminate(void);
int mm_pty_allocate(int *, int *, char *, int);
void mm_session_pty_cleanup2(void *);
Index: session.c
===================================================================
RCS file: /var/cvs/openssh/session.c,v
retrieving revision 1.208
diff -u -r1.208 session.c
--- session.c 26 Jun 2002 13:51:06 -0000 1.208
+++ se...
2009 Feb 04
1
SSH PAM authentication/login with a new user DB (through NSS)
...However, before the login prompt is granted, the connection is closed.
The corresponding debug log is as follows:
...
Feb 3 14:54:11 dharma sshd[7863]: debug1: Allocating pty.
Feb 3 14:54:11 dharma sshd[7863]: debug3: mm_request_send entering: type 26
Feb 3 14:54:11 dharma sshd[7863]: debug3: mm_pty_allocate: waiting for
MONITOR_ANS_PTY
Feb 3 14:54:11 dharma sshd[7863]: debug3: mm_request_receive_expect
entering: type 27
Feb 3 14:54:11 dharma sshd[7863]: debug3: mm_request_receive entering
Feb 3 14:54:11 dharma sshd[7843]: debug2: User child is on pid 7863
Feb 3 14:54:11 dharma sshd[7843]: deb...
2002 Jun 28
0
Newer OSF patch.
...rieving revision 1.6
diff -u -r1.6 monitor_wrap.h
--- monitor_wrap.h 13 May 2002 01:07:42 -0000 1.6
+++ monitor_wrap.h 28 Jun 2002 20:29:12 -0000
@@ -59,6 +59,10 @@
void mm_start_pam(char *);
#endif
+#ifdef HAVE_OSF_SIA
+void mm_setup_sia(char *, char *);
+#endif
+
void mm_terminate(void);
int mm_pty_allocate(int *, int *, char *, int);
void mm_session_pty_cleanup2(void *);
Index: session.c
===================================================================
RCS file: /var/cvs/openssh/session.c,v
retrieving revision 1.208
diff -u -r1.208 session.c
--- session.c 26 Jun 2002 13:51:06 -0000 1.208
+++ se...
2002 Aug 01
0
Tru64 and OSF/1 Privsep patch
...penssh-3.4p1+/monitor_wrap.h
--- openssh-3.4p1/monitor_wrap.h Sun May 12 21:07:42 2002
+++ openssh-3.4p1+/monitor_wrap.h Sun Jul 21 22:53:14 2002
@@ -59,6 +59,10 @@
void mm_start_pam(char *);
#endif
+#ifdef HAVE_OSF_SIA
+void mm_setup_sia(char *, char *);
+#endif
+
void mm_terminate(void);
int mm_pty_allocate(int *, int *, char *, int);
void mm_session_pty_cleanup2(void *);
diff -ur openssh-3.4p1/session.c openssh-3.4p1+/session.c
--- openssh-3.4p1/session.c Wed Jun 26 09:51:06 2002
+++ openssh-3.4p1+/session.c Sun Jul 21 23:26:49 2002
@@ -57,6 +57,7 @@
#include "canohost.h"
#include &qu...
2003 Jan 21
3
X11 forwarding problem -- openssh-3.5p1 -- redhat 8.0 -- linux 2.4.18
...Couldn't open /var/log/lastlog: Permission
denied
debug1: Allocating pty.
debug3: mm_request_send entering: type 25
debug3: monitor_read: checking request 25
debug3: mm_answer_pty entering
debug1: session_new: init
debug1: session_new: session 0
debug3: mm_request_send entering: type 26
debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY
debug3: mm_request_receive_expect entering: type 26
debug3: mm_request_receive entering
debug1: session_pty_req: session 0 alloc /dev/pts/4
debug3: mm_answer_pty: tty /dev/pts/4 ptyfd 3
debug3: mm_request_receive entering
debug3: tty_parse_modes: SSH2 n_bytes 251
deb...
2018 Apr 11
9
[Bug 2856] New: key-options.sh fails when pty /dev/ttyp1 is not owned by testing user
https://bugzilla.mindrot.org/show_bug.cgi?id=2856
Bug ID: 2856
Summary: key-options.sh fails when pty /dev/ttyp1 is not owned
by testing user
Product: Portable OpenSSH
Version: 7.6p1
Hardware: ix86
OS: NetBSD
Status: NEW
Severity: minor
Priority: P5
Component:
2002 Aug 11
4
OSF/1 or Tru64 patch for Privsep
...penssh-3.4p1+/monitor_wrap.h
--- openssh-3.4p1/monitor_wrap.h Sun May 12 21:07:42 2002
+++ openssh-3.4p1+/monitor_wrap.h Sun Jul 21 22:53:14 2002
@@ -59,6 +59,10 @@
void mm_start_pam(char *);
#endif
+#ifdef HAVE_OSF_SIA
+void mm_setup_sia(char *, char *);
+#endif
+
void mm_terminate(void);
int mm_pty_allocate(int *, int *, char *, int);
void mm_session_pty_cleanup2(void *);
diff -ur openssh-3.4p1/session.c openssh-3.4p1+/session.c
--- openssh-3.4p1/session.c Wed Jun 26 09:51:06 2002
+++ openssh-3.4p1+/session.c Sun Jul 21 23:26:49 2002
@@ -57,6 +57,7 @@
#include "canohost.h"
#include &qu...
2003 Apr 17
0
pam_mkhomedir and priv separation
...3: mm_request_send entering: type 25
debug3: monitor_read: checking request 25
debug3: mm_answer_pty entering
debug1: session_new: init
debug1: session_new: session 0
debug3: mm_request_send entering: type 26
debug3: mm_answer_pty: tty /dev/pts/14 ptyfd 7
debug3: mm_request_receive entering
debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY
debug3: mm_request_receive_expect entering: type 26
debug3: mm_request_receive entering
debug1: session_pty_req: session 0 alloc /dev/pts/14
debug3: tty_parse_modes: SSH2 n_bytes 256
debug3: tty_parse_modes: ospeed 38400
debug3: tty_parse_modes: ispeed 38400
debug3:...
2004 Jan 22
1
AIX and openssh 3.7.1p2 with privsep
...0
debug1: server_input_channel_open: confirm session
debug1: server_input_channel_req: channel 0 request pty-req reply 0
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req pty-req
debug1: Allocating pty.
debug3: mm_request_send entering: type 25
debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY
debug3: mm_request_receive_expect entering: type 26
debug3: mm_request_receive entering
debug3: monitor_read: checking request 25
debug3: mm_answer_pty entering
debug1: session_new: init
debug1: session_new: session 0
debug3: mm_request_send entering: type 26
debug1:...
2006 Aug 15
1
OpenSSH_4.3p2 fails to create a pty session
...send_fd: sendmsg(4): Bad file descriptor
debug1: do_cleanup
debug1: PAM: cleanup
debug3: PAM: sshpam_thread_cleanup entering
debug1: session_pty_cleanup: session 0 release /dev/ttyp3
close(s->ptymaster/0): Bad file descriptor
19:35 emillbrandt at mongoloid:/usr/local/etc/periodic/daily# debug3:
mm_pty_allocate: waiting for MONITOR_ANS_PTY
debug3: mm_request_receive_expect entering: type 26
debug3: mm_request_receive entering
mm_receive_fd: recvmsg: expected received 1 got 0
debug1: do_cleanup
debug1: PAM: cleanup
debug3: PAM: sshpam_thread_cleanup entering
19:35 emillbrandt at mongoloid:/usr/local/et...
2002 Jul 03
3
[Bug 333] X11 forwarding not working in OpenSSH 3.4p1
http://bugzilla.mindrot.org/show_bug.cgi?id=333
------- Additional Comments From stevesk at pobox.com 2002-07-04 05:41 -------
i will guess configure did not find an xauth when
it was built ($PATH is irrelevant here). please
verify.
see $HOME/.ssh/rc example in sshd.8 which can be used
as a workaround in this case.
djm: autoconf-2.53 exposes a bug for xauth path detection.
------- You
2009 Jun 05
2
ssh trouble checklist
...ld is on pid 433
debug3: mm_request_receive entering
debug1: server_input_channel_req: channel 0 request pty-req reply 1
debug1: session_by_channel: session 0 channel 0
debug1: session_input_channel_req: session 0 req pty-req
debug1: Allocating pty.
debug3: mm_request_send entering: type 26
debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY
debug3: mm_request_receive_expect entering: type 27
debug3: mm_request_receive entering
debug3: monitor_read: checking request 26
debug3: mm_answer_pty entering
debug2: session_new: allocate (allocated 0 max 10)
debug3: session_unused: session id 0 unused
debug1: ses...
2015 Dec 16
2
Running sshd with Privilege Seperation drops connection on password change
...ec 16 22:22:13 knasim-ubuntu1 sshd[8569]: debug1: SELinux support disabled
Dec 16 22:22:13 knasim-ubuntu1 sshd[8569]: debug3: mm_request_send entering: type 29
Dec 16 22:22:13 knasim-ubuntu1 sshd[8569]: debug3: mm_answer_pty: tty /dev/pts/1 ptyfd 4
Dec 16 22:22:13 knasim-ubuntu1 sshd[8623]: debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY
Dec 16 22:22:13 knasim-ubuntu1 sshd[8623]: debug3: mm_request_receive_expect entering: type 29
Dec 16 22:22:13 knasim-ubuntu1 sshd[8623]: debug3: mm_request_receive entering
Dec 16 22:22:13 knasim-ubuntu1 sshd[8623]: debug1: session_pty_req: session 0 alloc /dev/pts/...
2015 Dec 04
3
Running sshd with Privilege Seperation drops connection on password change
Hi folks,
I came across this issue on both stock CentOS(v6.4) and Ubuntu(14.04 LTS) and was wondering if any of you have seen it.
As far as I can tell this seems like a day-1 bug to me.
PROBLEM:
If I expire a linux user's password (passwd -e <user>) and then log in via ssh, it will prompt you for a password change.
On changing the password successfully, sshd will drop the connection