Displaying 10 results from an estimated 10 matches for "monitor_apply_keyst".
2003 Sep 22
3
Fwd: privsep in ssh
...E Linux <selinux at tycho.nsa.gov>
Cc: Colin Watson <cjwatson at debian.org>
#ifdef DISABLE_FD_PASSING
if (1) {
#else
if (authctxt->pw->pw_uid == 0 || options.use_login) {
#endif
/* File descriptor passing is broken or root login */
monitor_apply_keystate(pmonitor);
use_privsep = 0;
return;
}
When browsing the ssh source I noticed the above in sshd.c. It appears from
a casual inspection that we should change this and remove the check for
pw_uid == 0. Logging in as root in SE Linux does not mean that we...
2015 Feb 28
2
SAP-2015-3-1 issues
On Sun, Mar 01, 2015 at 03:23:04AM +1100, Damien Miller wrote:
>
>
> On Sat, 28 Feb 2015, The Doctor wrote:
>
> > BSD/OS issues
> >
> > with 1.0.2a dev
>
> Thanks for testing.
>
You are welcome.
> > make tests
> >
> > regress/netcat.c:656: `on' undeclared (first use in this function)
> > regress/netcat.c:656: (Each
2015 Jul 24
3
Cisco vs. 6.9
...itor_read_log: child log fd closed
debug3: mm_share_sync: Share sync
debug3: mm_share_sync: Share sync end
debug1: temporarily_use_uid: 934/55 (e=0/0)
debug1: ssh_gssapi_storecreds: Not a GSSAPI mechanism
debug1: restore_uid: 0/0
User child is on pid 7678
debug1: permanently_set_uid: 934/55
debug3: monitor_apply_keystate: packet_set_state
debug2: set_newkeys: mode 0
debug2: set_newkeys: mode 1
debug1: ssh_packet_set_postauth: called
debug3: ssh_packet_set_state: done
debug3: notify_hostkeys: key 1: ssh-rsa SHA256:XXXXXXXXX
debug3: notify_hostkeys: key 2: ssh-dss SHA256:XXXXXXXXX
debug3: notify_hostkeys: sent 2 h...
2015 Jul 23
3
Cisco vs. 6.9
After upgrading a Linux system from OpenSSH 6.7 to 6.9, Cisco
switches/routers can no longer scp config files to/from the system. The
last debug entry before the Cisco device closes the connection is "debug1:
server_input_channel_open: confirm session". The next line is "Connection
closed by x.x.x.x". Anyone else seen this or know of a fix? The Cisco
device gives
2003 Oct 28
2
Privilege separation
...P */
/* message to be displayed after login */
Buffer loginmsg;
@@ -526,6 +528,7 @@
/* We do not clear ssh1_host key and cookie. XXX - Okay Niels? */
}
+#ifndef DISABLE_PRIVSEP
static void
privsep_preauth_child(void)
{
@@ -674,6 +677,7 @@
/* It is safe now to apply the key state */
monitor_apply_keystate(pmonitor);
}
+#endif /* DISABLE_PRIVSEP */
static char *
list_hostkey_types(void)
@@ -1034,6 +1038,7 @@
}
}
+#ifndef DISABLE_PRIVSEP
if (use_privsep) {
struct passwd *pw;
struct stat st;
@@ -1056,6 +1061,7 @@
fatal("%s must be owned by root and not group or "...
2023 Jun 30
1
Subsystem sftp invoked even though forced command created
On 30/06/2023 09:56, Damien Miller wrote:
> It's very hard to figure out what is happening here without a debug log.
>
> You can get one by stopping the listening sshd and running it manually
> in debug mode, e.g. "/usr/sbin/sshd -ddd"
Or starting one in debug mode on a different port, e.g. "-p99 -ddd"
2020 Jul 07
3
libssh2 is hanging during a file transfert
...debug1: monitor_read_log: child log fd
closed
Jul 7 11:52:16 TOTO sshd[19126]: debug3: ssh_sandbox_parent_finish:
finished
Jul 7 11:52:16 TOTO sshd[19126]: User child is on pid 19553
Jul 7 11:52:16 TOTO sshd[19553]: debug1: permanently_set_uid: 1001/1001
Jul 7 11:52:16 TOTO sshd[19553]: debug3: monitor_apply_keystate:
packet_set_state
Jul 7 11:52:16 TOTO sshd[19553]: debug2: set_newkeys: mode 0
Jul 7 11:52:16 TOTO sshd[19553]: debug1: rekey after 4294967296 blocks
Jul 7 11:52:16 TOTO sshd[19553]: debug2: set_newkeys: mode 1
Jul 7 11:52:16 TOTO sshd[19553]: debug1: rekey after 4294967296 blocks
Jul 7 11:...
2002 Jun 25
10
[Bug 296] Priv separation does not work on OSF/1
http://bugzilla.mindrot.org/show_bug.cgi?id=296
------- Additional Comments From bugzilla-openssh at thewrittenword.com 2002-06-26 01:20 -------
Are you sure? I have 3.3p1 running on 4.0D and 5.1 and I can connect as non-root.
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2016 Feb 12
22
Call for testing: OpenSSH 7.2
Hi,
OpenSSH 7.2 is almost ready for release, so we would appreciate
testing on as many platforms and systems as possible. This release
contains many bugfixes and several new features.
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is available via Git at
https://anongit.mindrot.org/openssh.git/ or via a mirror on Github at
2019 Mar 27
26
Call for testing: OpenSSH 8.0
Hi,
OpenSSH 8.0p1 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is also available via git using the
instructions at