Displaying 8 results from an estimated 8 matches for "mux_client_hello_exchange".
[Bug 2707] New: mux_client_hello_exchange: write packet: Broken pipe when timeout is about to expire
2017 Apr 07
5
[Bug 2707] New: mux_client_hello_exchange: write packet: Broken pipe when timeout is about to expire
https://bugzilla.mindrot.org/show_bug.cgi?id=2707
Bug ID: 2707
Summary: mux_client_hello_exchange: write packet: Broken pipe
when timeout is about to expire
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: ssh...
2019 Jun 27
2
Does ssh need sendfd in pledge() call?
...g3: channel_post_mux_listener: new mux channel 1 fd 5
debug3: mux_master_read_cb: channel 1: hello sent
debug2: set_control_persist_exit_time: cancel scheduled exit
debug3: mux_master_read_cb: channel 1 packet type 0x00000001 len 4
debug2: mux_master_process_hello: channel 1 slave version 4
debug2: mux_client_hello_exchange: master version 4
debug3: mux_client_forwards: request forwardings: 0 local, 1 remote
debug1: Requesting forwarding of remote forward /home/tbrown/.gnupg/S.gpg-agent:-2 -> /home/tbrown/.gnupg/S.gpg-agent.extra:-2
debug3: mux_master_read_cb: channel 1 packet type 0x10000006 len 92
debug2: mux_mas...
2010 Jun 04
2
[Bug 1775] New: RFE: Would like to use 'abstract' unix sockets for ControlPath
https://bugzilla.mindrot.org/show_bug.cgi?id=1775
Summary: RFE: Would like to use 'abstract' unix sockets for
ControlPath
Product: Portable OpenSSH
Version: 5.5p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
AssignedTo:
2022 Apr 08
31
[Bug 3418] New: tracking bug for openssh-9.1
https://bugzilla.mindrot.org/show_bug.cgi?id=3418
Bug ID: 3418
Summary: tracking bug for openssh-9.1
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee: unassigned-bugs at
2016 Aug 17
4
[Portable OpenSSH] hang up during login after OpenSSH 7.3 upgrade
...g3: channel_post_mux_listener: new mux channel 1 fd 5
debug3: mux_master_read_cb: channel 1: hello sent
debug2: set_control_persist_exit_time: cancel scheduled exit
debug3: mux_master_read_cb: channel 1 packet type 0x00000001 len 4
debug2: process_mux_master_hello: channel 1 slave version 4
debug2: mux_client_hello_exchange: master version 4
debug3: mux_client_forwards: request forwardings: 0 local, 0 remote
debug3: mux_client_request_session: entering
debug3: mux_client_request_alive: entering
debug3: mux_master_read_cb: channel 1 packet type 0x10000004 len 4
debug2: process_mux_alive_check: channel 1: alive check
de...
2020 Sep 21
4
Call for testing: OpenSSH 8.4
On Mon, 21 Sep 2020 at 09:53, Hisashi T Fujinaka <htodd at twofifty.com> wrote:
> OK, NetBSD-current amd64, NetBSD-9-amd64, and NetBSD-9-i386 all pass all
> tests. MacOS, well, I always try it but it has problems.
What's the problem on OS X? We test on it regularly (El Capitan and
High Sierra) and the only problem I'm aware of is that the native
libcrypto on High Sierra is
2017 Mar 23
93
[Bug 2698] New: Tracking bug for OpenSSH 7.6 release
https://bugzilla.mindrot.org/show_bug.cgi?id=2698
Bug ID: 2698
Summary: Tracking bug for OpenSSH 7.6 release
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: Miscellaneous
Assignee: unassigned-bugs at
2010 Jan 14
1
ssh(1) multiplexing rewrite
...&queue, need) != 0) {
+ oerrno = errno;
+ debug3("%s: read body failed: %s", __func__, strerror(errno));
+ errno = oerrno;
+ return -1;
+ }
+ ptr = buffer_get_string_ptr(&queue, &have);
+ buffer_append(m, ptr, have);
+ buffer_free(&queue);
+ return 0;
+}
+
+static int
+mux_client_hello_exchange(int fd)
+{
+ Buffer m;
+ u_int type, ver;
buffer_init(&m);
+ buffer_put_int(&m, MUX_MSG_HELLO);
+ buffer_put_int(&m, SSHMUX_VER);
+ /* no extensions */
- /* Send our command to server */
- buffer_put_int(&m, muxclient_command);
- buffer_put_int(&m, flags);
- if (ssh_msg_se...