Displaying 13 results from an estimated 13 matches for "original_effective_uid".
2000 Sep 12
0
OpenSSH 2.2.0p1 port to QNX 4
...dif /* __QNX__ && !__QNXNTO__ */
diff -cr openssh-2.2.0p1.orig/ssh.c openssh-2.2.0p1.qnx/ssh.c
*** openssh-2.2.0p1.orig/ssh.c Tue Aug 29 02:33:51 2000
--- openssh-2.2.0p1.qnx/ssh.c Tue Sep 12 10:30:53 2000
***************
*** 215,220 ****
--- 215,221 ----
original_real_uid = getuid();
original_effective_uid = geteuid();
+ #if !defined(__QNX__) || defined(__QNXNTO__)
/* If we are installed setuid root be careful to not drop core. */
if (original_real_uid != original_effective_uid) {
struct rlimit rlim;
***************
*** 222,227 ****
--- 223,229 ----
if (setrlimit(RLIMIT_CORE, &r...
2002 May 22
0
[PATCH] connect() timeout
...:09:46 2002
+++ openssh-3.2.2p1/ssh.c Tue May 21 15:40:06 2002
@@ -677,7 +677,7 @@
/* Open a connection to the remote host. */
cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6,
- options.connection_attempts,
+ options.connection_attempts, options.connection_timeout,
original_effective_uid != 0 || !options.use_privileged_port,
pw, options.proxy_command);
--- openssh-3.2.2p1/sshconnect.c.ORIG Tue Mar 5 19:59:46 2002
+++ openssh-3.2.2p1/sshconnect.c Tue May 21 15:40:06 2002
@@ -222,6 +222,63 @@
return sock;
}
+int
+timeout_connect(int sockfd, const struct sockaddr *serv_a...
2005 May 31
0
ssh exit_status not 255 for many errors
...connect to host paypal.com port 22: Connection timed out
$ echo $?
1 <-- Return value of ssh
The following fixes my problem
--- openssh-3.8.1p1/ssh.c 2005-05-26 13:25:16.000000000 -0700
+++ openssh-3.8.1p1.mine/ssh.c 2005-05-26 13:24:51.000000000 -0700
@@ -579,7 +579,7 @@
original_effective_uid == 0 &&
options.use_privileged_port,
#endif
options.proxy_command) != 0)
- exit(1);
+ exit(255);
/*
* If we successfully made the connection, load the host
* private key
but `grep exit\( *.c` (both in 3.8.1p1 and cvs ssh.c...
2002 Jan 26
5
[PATCH] Connect timeout
...OK Mon Nov 12 00:52:04 2001
+++ ssh.c Sat Jan 26 21:44:35 2002
@@ -674,7 +674,7 @@
/* Open a connection to the remote host. */
cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6,
- options.connection_attempts,
+ options.connection_attempts, options.connection_timeout,
original_effective_uid != 0 || !options.use_privileged_port,
pw, options.proxy_command);
--- sshconnect.c.OK Wed Oct 10 07:07:45 2001
+++ sshconnect.c Sat Jan 26 21:44:35 2002
@@ -35,6 +35,8 @@
char *client_version_string = NULL;
char *server_version_string = NULL;
+static jmp_buf jmpenv;
+
extern Options op...
2002 Jun 11
4
ssh setuid changes.
Ok, I'm doing a heads up here.
I just applied:
- markus at cvs.openbsd.org 2002/06/11 04:14:26
[ssh.c sshconnect.c sshconnect.h]
no longer use uidswap.[ch] from the ssh client
run less code with euid==0 if ssh is installed setuid root
just switch the euid, don't switch the complete set of groups
(this is only needed by sshd). ok provos@
A few comments about
2000 Oct 30
2
RhostsAuthentication + nondefault port doesn't work?
Hello all,
It seems that RhostsAuthentication does not work on non-default port no
matter what when connecting from OpenSSH (2.1.1, 2.2.0 tried) either with
protocol 1 or protocol 2 (shouldn't work either..).
_However_ when connecting with SSH.COM Ltd's ssh, RhostsAuthentication
works just fine!
Checking the port number of ssh client you can see that OpenSSH doesn't
assign
2001 Nov 17
0
[PATCH] Connect timeout
...:49:09 2001
+++ openssh-3.0.1p1/ssh.c Sat Nov 17 22:49:47 2001
@@ -674,7 +674,7 @@
/* Open a connection to the remote host. */
cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6,
- options.connection_attempts,
+ options.connection_attempts, options.connection_timeout,
original_effective_uid != 0 || !options.use_privileged_port,
pw, options.proxy_command);
--- openssh-3.0.1p1/sshconnect.c.ORIG Sat Nov 17 22:49:09 2001
+++ openssh-3.0.1p1/sshconnect.c Sat Nov 17 23:02:27 2001
@@ -35,6 +35,8 @@
char *client_version_string = NULL;
char *server_version_string = NULL;
+static jm...
2002 Apr 03
1
[PATCH] connect() timeout
...05:20:58 2002
+++ openssh-3.1p1/ssh.c Wed Apr 3 23:33:48 2002
@@ -674,7 +674,7 @@
/* Open a connection to the remote host. */
cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6,
- options.connection_attempts,
+ options.connection_attempts, options.connection_timeout,
original_effective_uid != 0 || !options.use_privileged_port,
pw, options.proxy_command);
--- openssh-3.1p1/sshconnect.c.ORIG Tue Mar 5 19:59:46 2002
+++ openssh-3.1p1/sshconnect.c Wed Apr 3 23:33:48 2002
@@ -222,6 +222,64 @@
return sock;
}
+int
+timeout_connect(int sockfd, const struct sockaddr *serv_addr,...
2013 Jun 20
1
ProxyCommand that returns a socket
Hello,
My usage of ProxyCommand just calls the nc utility with various
parameters. That in turn after the initial setup just copies copies
the data from the network socket to stdin/stdout. This useless coping
can be avoided if ssh has an option to receive the socket from the
proxy command. I suppose it can improve network error reporting as ssh
would talk directly to the network socket rather
2010 Nov 28
2
[PATCH] Use canonical hostname for DNS SSHFP lookup
...8.000000000 +0100
+++ openssh-sshfp/ssh.c 2010-11-27 23:43:12.843314405 +0100
@@ -229,6 +229,7 @@
extern char *optarg;
struct servent *sp;
Forward fwd;
+ char *canohost;
/* Ensure that fds 0, 1 and 2 are open or directed to /dev/null */
sanitise_stdfd();
@@ -760,7 +761,7 @@
#else
original_effective_uid == 0 && options.use_privileged_port,
#endif
- options.proxy_command) != 0)
+ options.proxy_command, &canohost) != 0)
exit(255);
if (timeout_ms > 0)
@@ -880,7 +881,7 @@
/* Log into the remote system. Never returns if the login fails. */
ssh_login(&sensitive_...
2000 Nov 14
1
[PATCH] Added option 'RetryDelay'
Being rather aggrevated when testing at the enforced 1 second
delay between each connection attempt and the useless 1 second delay
done after all connection attempts have failed I wrote a patch to make
the number of seconds delayed between each connection attempt
configurable.
Stephen
-------------- next part --------------
diff -u --recursive openssh-2.3.0p1/ChangeLog
2013 Oct 07
4
Feature request: FQDN Host match
Hello!
I'm hoping that Gmail won't HTML format this mail so that I'll get flamed :)
Anyway, my question relates to ssh_config. The problem I find is that
the Host pattern is only applied to the argument given on the command
line, as outlined in the man page:
"The host is the hostname argument given on the command line (i.e. the
name is not converted to a canonicalized host name
2016 Oct 17
20
[Bug 2625] New: Support Capabilities for ssh client port forwarding
https://bugzilla.mindrot.org/show_bug.cgi?id=2625
Bug ID: 2625
Summary: Support Capabilities for ssh client port forwarding
Product: Portable OpenSSH
Version: 7.3p1
Hardware: All
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee: unassigned-bugs