search for: mm_pty_allocate

Displaying 20 results from an estimated 23 matches for "mm_pty_allocate".

2011 Feb 10
1
Behaviour of OpenSSH while login as root and non-root account
...se_session() and pam_sm_setcred() function in PAM module while OpenSSH hardcoded it "ssh". I made few changes in OpenSSh code so it can set terminal ID properly. These changes were : added do_pam_set_tty() in session_pty_req(Session *s) function in session.c and added do_pam_set_tty() in mm_pty_allocate() function in monitor_wrap.c It works fine for root and I get appropriate tty in pam_sm_cred() and pam_sm_close_session() function. But using same code, when I try to ssh through a non root account I am getting tty in pam_sm_close_session() but not in pam_sm_cred(). I am not sure why ssh is behav...
2014 Sep 08
1
possible deadcodes in sources
...*intptr = *intptr + 1; - } break; case sClientAliveInterval: * monitor_wrap.c:720:dead_error_line ? Execution cannot reach this statement "close(tmp2);".o --- a/monitor_wrap.c +++ b/monitor_wrap.c @@ -714,10 +714,8 @@ mm_pty_allocate(int *ptyfd, int *ttyfd, char *namebuf, size_t namebuflen) if ((tmp1 = dup(pmonitor->m_recvfd)) == -1 || (tmp2 = dup(pmonitor->m_recvfd)) == -1) { error("%s: cannot allocate fds for pty", __func__); - if (tmp1 > 0) +...
2004 Aug 27
0
Terminal modes
..._NONBLOCK debug1: channel 2: new [X11 inet listener] debug1: server_input_channel_req: channel 0 request pty-req reply 1 debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req pty-req debug1: Allocating pty. debug3: mm_request_send entering: type 25 debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY debug3: mm_request_receive_expect entering: type 26 debug3: mm_request_receive entering debug3: monitor_read: checking request 25 debug3: mm_answer_pty entering debug1: session_new: init debug1: session_new: session 0 debug3: mm_request_send entering: type 26 debug3: Tr...
2004 Aug 31
0
Terminal mode (repost)
..._NONBLOCK debug1: channel 2: new [X11 inet listener] debug1: server_input_channel_req: channel 0 request pty-req reply 1 debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req pty-req debug1: Allocating pty. debug3: mm_request_send entering: type 25 debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY debug3: mm_request_receive_expect entering: type 26 debug3: mm_request_receive entering debug3: monitor_read: checking request 25 debug3: mm_answer_pty entering debug1: session_new: init debug1: session_new: session 0 debug3: mm_request_send entering: type 26 debug3: Tr...
2003 Apr 19
4
[Bug 544] sshd w/privsep fails on Linux 2.0, mm_receive_fd: expected type 1 got 1074276337
...early Linuxes and I've found the following problem with privsep enabled (Debian slink, kernel 2.0.38, libc6 2.0.7). It seems to be related to file descriptor passing. $ ./sshd -ddd -p 2022 [snip] debug3: mm_answer_pty entering debug1: session_new: init debug1: session_new: session 0 debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY debug3: mm_request_receive_expect entering: type 26 debug3: mm_request_receive entering debug3: mm_request_send entering: type 26 mm_receive_fd: expected type 1 got 1074276337 It seems to be a bug in 2.0 kernels, cmsg_level and cmsg_type returned by recvmsg() make no...
2016 Jun 03
3
[Bug 2581] New: Coverity patches from Fedora
...39;t make it to upstream yet. 1. "debug3: mm_answer_keyallowed: key %p is allowed" is always NULL, because it is freed before calling the log function. There is a flaw in logic of this debug log, when the key pointer is always null (it is ensured that it is freed before) the call. 2. mm_pty_allocate contains Dead code (if the second dup fails, it can't be different than -1) and comparison of the return dup() return value should be >=0 instead of >0 -- 0 is also valid FD. 3. process_server_config_line: sAuthorizedPrincipalsFile option handles intptr, without any possible label (there...
2002 Jun 29
0
Privsep for osf/1 .. still need a bit of help
...rieving revision 1.6 diff -u -r1.6 monitor_wrap.h --- monitor_wrap.h 13 May 2002 01:07:42 -0000 1.6 +++ monitor_wrap.h 29 Jun 2002 03:19:30 -0000 @@ -59,6 +59,10 @@ void mm_start_pam(char *); #endif +#ifdef HAVE_OSF_SIA +void mm_setup_sia(char *, char *); +#endif + void mm_terminate(void); int mm_pty_allocate(int *, int *, char *, int); void mm_session_pty_cleanup2(void *); Index: session.c =================================================================== RCS file: /var/cvs/openssh/session.c,v retrieving revision 1.208 diff -u -r1.208 session.c --- session.c 26 Jun 2002 13:51:06 -0000 1.208 +++ sessi...
2009 Feb 04
1
SSH PAM authentication/login with a new user DB (through NSS)
...However, before the login prompt is granted, the connection is closed. The corresponding debug log is as follows: ... Feb 3 14:54:11 dharma sshd[7863]: debug1: Allocating pty. Feb 3 14:54:11 dharma sshd[7863]: debug3: mm_request_send entering: type 26 Feb 3 14:54:11 dharma sshd[7863]: debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY Feb 3 14:54:11 dharma sshd[7863]: debug3: mm_request_receive_expect entering: type 27 Feb 3 14:54:11 dharma sshd[7863]: debug3: mm_request_receive entering Feb 3 14:54:11 dharma sshd[7843]: debug2: User child is on pid 7863 Feb 3 14:54:11 dharma sshd[7843]: debug3...
2002 Jun 28
0
Newer OSF patch.
...rieving revision 1.6 diff -u -r1.6 monitor_wrap.h --- monitor_wrap.h 13 May 2002 01:07:42 -0000 1.6 +++ monitor_wrap.h 28 Jun 2002 20:29:12 -0000 @@ -59,6 +59,10 @@ void mm_start_pam(char *); #endif +#ifdef HAVE_OSF_SIA +void mm_setup_sia(char *, char *); +#endif + void mm_terminate(void); int mm_pty_allocate(int *, int *, char *, int); void mm_session_pty_cleanup2(void *); Index: session.c =================================================================== RCS file: /var/cvs/openssh/session.c,v retrieving revision 1.208 diff -u -r1.208 session.c --- session.c 26 Jun 2002 13:51:06 -0000 1.208 +++ sessi...
2002 Aug 01
0
Tru64 and OSF/1 Privsep patch
...penssh-3.4p1+/monitor_wrap.h --- openssh-3.4p1/monitor_wrap.h Sun May 12 21:07:42 2002 +++ openssh-3.4p1+/monitor_wrap.h Sun Jul 21 22:53:14 2002 @@ -59,6 +59,10 @@ void mm_start_pam(char *); #endif +#ifdef HAVE_OSF_SIA +void mm_setup_sia(char *, char *); +#endif + void mm_terminate(void); int mm_pty_allocate(int *, int *, char *, int); void mm_session_pty_cleanup2(void *); diff -ur openssh-3.4p1/session.c openssh-3.4p1+/session.c --- openssh-3.4p1/session.c Wed Jun 26 09:51:06 2002 +++ openssh-3.4p1+/session.c Sun Jul 21 23:26:49 2002 @@ -57,6 +57,7 @@ #include "canohost.h" #include "...
2003 Jan 21
3
X11 forwarding problem -- openssh-3.5p1 -- redhat 8.0 -- linux 2.4.18
...Couldn't open /var/log/lastlog: Permission denied debug1: Allocating pty. debug3: mm_request_send entering: type 25 debug3: monitor_read: checking request 25 debug3: mm_answer_pty entering debug1: session_new: init debug1: session_new: session 0 debug3: mm_request_send entering: type 26 debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY debug3: mm_request_receive_expect entering: type 26 debug3: mm_request_receive entering debug1: session_pty_req: session 0 alloc /dev/pts/4 debug3: mm_answer_pty: tty /dev/pts/4 ptyfd 3 debug3: mm_request_receive entering debug3: tty_parse_modes: SSH2 n_bytes 251 debug3...
2018 Apr 11
9
[Bug 2856] New: key-options.sh fails when pty /dev/ttyp1 is not owned by testing user
https://bugzilla.mindrot.org/show_bug.cgi?id=2856 Bug ID: 2856 Summary: key-options.sh fails when pty /dev/ttyp1 is not owned by testing user Product: Portable OpenSSH Version: 7.6p1 Hardware: ix86 OS: NetBSD Status: NEW Severity: minor Priority: P5 Component:
2002 Aug 11
4
OSF/1 or Tru64 patch for Privsep
...penssh-3.4p1+/monitor_wrap.h --- openssh-3.4p1/monitor_wrap.h Sun May 12 21:07:42 2002 +++ openssh-3.4p1+/monitor_wrap.h Sun Jul 21 22:53:14 2002 @@ -59,6 +59,10 @@ void mm_start_pam(char *); #endif +#ifdef HAVE_OSF_SIA +void mm_setup_sia(char *, char *); +#endif + void mm_terminate(void); int mm_pty_allocate(int *, int *, char *, int); void mm_session_pty_cleanup2(void *); diff -ur openssh-3.4p1/session.c openssh-3.4p1+/session.c --- openssh-3.4p1/session.c Wed Jun 26 09:51:06 2002 +++ openssh-3.4p1+/session.c Sun Jul 21 23:26:49 2002 @@ -57,6 +57,7 @@ #include "canohost.h" #include "...
2003 Apr 17
0
pam_mkhomedir and priv separation
...3: mm_request_send entering: type 25 debug3: monitor_read: checking request 25 debug3: mm_answer_pty entering debug1: session_new: init debug1: session_new: session 0 debug3: mm_request_send entering: type 26 debug3: mm_answer_pty: tty /dev/pts/14 ptyfd 7 debug3: mm_request_receive entering debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY debug3: mm_request_receive_expect entering: type 26 debug3: mm_request_receive entering debug1: session_pty_req: session 0 alloc /dev/pts/14 debug3: tty_parse_modes: SSH2 n_bytes 256 debug3: tty_parse_modes: ospeed 38400 debug3: tty_parse_modes: ispeed 38400 debug3: tty...
2004 Jan 22
1
AIX and openssh 3.7.1p2 with privsep
...0 debug1: server_input_channel_open: confirm session debug1: server_input_channel_req: channel 0 request pty-req reply 0 debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req pty-req debug1: Allocating pty. debug3: mm_request_send entering: type 25 debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY debug3: mm_request_receive_expect entering: type 26 debug3: mm_request_receive entering debug3: monitor_read: checking request 25 debug3: mm_answer_pty entering debug1: session_new: init debug1: session_new: session 0 debug3: mm_request_send entering: type 26 debug1: se...
2006 Aug 15
1
OpenSSH_4.3p2 fails to create a pty session
...send_fd: sendmsg(4): Bad file descriptor debug1: do_cleanup debug1: PAM: cleanup debug3: PAM: sshpam_thread_cleanup entering debug1: session_pty_cleanup: session 0 release /dev/ttyp3 close(s->ptymaster/0): Bad file descriptor 19:35 emillbrandt at mongoloid:/usr/local/etc/periodic/daily# debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY debug3: mm_request_receive_expect entering: type 26 debug3: mm_request_receive entering mm_receive_fd: recvmsg: expected received 1 got 0 debug1: do_cleanup debug1: PAM: cleanup debug3: PAM: sshpam_thread_cleanup entering 19:35 emillbrandt at mongoloid:/usr/local/etc/p...
2002 Jul 03
3
[Bug 333] X11 forwarding not working in OpenSSH 3.4p1
http://bugzilla.mindrot.org/show_bug.cgi?id=333 ------- Additional Comments From stevesk at pobox.com 2002-07-04 05:41 ------- i will guess configure did not find an xauth when it was built ($PATH is irrelevant here). please verify. see $HOME/.ssh/rc example in sshd.8 which can be used as a workaround in this case. djm: autoconf-2.53 exposes a bug for xauth path detection. ------- You
2009 Jun 05
2
ssh trouble checklist
...ld is on pid 433 debug3: mm_request_receive entering debug1: server_input_channel_req: channel 0 request pty-req reply 1 debug1: session_by_channel: session 0 channel 0 debug1: session_input_channel_req: session 0 req pty-req debug1: Allocating pty. debug3: mm_request_send entering: type 26 debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY debug3: mm_request_receive_expect entering: type 27 debug3: mm_request_receive entering debug3: monitor_read: checking request 26 debug3: mm_answer_pty entering debug2: session_new: allocate (allocated 0 max 10) debug3: session_unused: session id 0 unused debug1: sessio...
2015 Dec 16
2
Running sshd with Privilege Seperation drops connection on password change
...ec 16 22:22:13 knasim-ubuntu1 sshd[8569]: debug1: SELinux support disabled Dec 16 22:22:13 knasim-ubuntu1 sshd[8569]: debug3: mm_request_send entering: type 29 Dec 16 22:22:13 knasim-ubuntu1 sshd[8569]: debug3: mm_answer_pty: tty /dev/pts/1 ptyfd 4 Dec 16 22:22:13 knasim-ubuntu1 sshd[8623]: debug3: mm_pty_allocate: waiting for MONITOR_ANS_PTY Dec 16 22:22:13 knasim-ubuntu1 sshd[8623]: debug3: mm_request_receive_expect entering: type 29 Dec 16 22:22:13 knasim-ubuntu1 sshd[8623]: debug3: mm_request_receive entering Dec 16 22:22:13 knasim-ubuntu1 sshd[8623]: debug1: session_pty_req: session 0 alloc /dev/pts/1 D...
2015 Dec 04
3
Running sshd with Privilege Seperation drops connection on password change
Hi folks, I came across this issue on both stock CentOS(v6.4) and Ubuntu(14.04 LTS) and was wondering if any of you have seen it. As far as I can tell this seems like a day-1 bug to me. PROBLEM: If I expire a linux user's password (passwd -e <user>) and then log in via ssh, it will prompt you for a password change. On changing the password successfully, sshd will drop the connection