search for: packet_get_int

Displaying 20 results from an estimated 43 matches for "packet_get_int".

2005 Nov 25
2
[Bug 1125] packet_get_int() returns -1 (serverloop.c)
http://bugzilla.mindrot.org/show_bug.cgi?id=1125 Summary: packet_get_int() returns -1 (serverloop.c) Product: Portable OpenSSH Version: 3.7.1p2 Platform: All OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: bitbucket at mindrot.org Repo...
2009 Feb 17
2
Idea: reverse socks proxy
Hi, Just a usecase that I'm sure has been covered before but just in case its not an openssh solution would be very helpful. I was trying to install software on a server that was firewalled so no outbound http connections would work. I was also tunnelling via another server. Outbound ssh connections also were a convenient option. What would have been nice would be a remote version of
2008 Nov 23
4
[Bug 1540] New: Incorrect hash in SSH_MSG_KEX_DH_GEX_REPLY
...max values have been previously sent from the client to server in a SSH_MSG_KEY_DH_GEX_REQUEST message. The corresponding section of code is in function kexgex_server in kexgexs.c: case SSH2_MSG_KEX_DH_GEX_REQUEST: debug("SSH2_MSG_KEX_DH_GEX_REQUEST received"); min = packet_get_int(); nbits = packet_get_int(); max = packet_get_int(); min = MAX(DH_GRP_MIN, min); max = MIN(DH_GRP_MAX, max); break; The bug is that, if the client sends values of 512 and 8192 for min and max in the SSH_MSG_KEY_DH_GEX_REQUEST message, then the client will e...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...+ want_reply = packet_get_char(); + debug("server received: %.100s request (reply=%d)",rtype, + (int)want_reply); + + if ( strcmp(rtype, "tcpip-forward") == 0 ) { + char *address_to_bind; + int port_to_bind; + address_to_bind = packet_get_string(NULL); + port_to_bind = packet_get_int(); + + /* Check if the client is allowed to forward (this port) */ + if ( allow_remote_forwarding(address_to_bind, port_to_bind) ) { + /* Start listening on the port */ + channel_request_local_forwarding( port_to_bind, address_to_bind, + port_to_bind, 1, 1 ); + /* NOT REA...
2018 Dec 03
3
[PATCH] removing an old API.
...fatal("%s: ssh_packet_set_connection failed", __func__); -} - u_int packet_get_char(void) { diff --git a/opacket.h b/opacket.h index c6e5124..d711468 100755 --- a/opacket.h +++ b/opacket.h @@ -38,7 +38,6 @@ do { \ void packet_close(void); u_int packet_get_char(void); u_int packet_get_int(void); -void packet_set_connection(int, int); int packet_read_seqnr(u_int32_t *); int packet_read_poll_seqnr(u_int32_t *); void packet_process_incoming(const char *buf, u_int len); diff --git a/sshd.c b/sshd.c index 2795a2e..65b96d4 100755 --- a/sshd.c +++ b/sshd.c @@ -1906,9 +1906,12...
2002 Jun 26
0
OpenSSH Security Advisory (adv.iss)
...============================= RCS file: /cvs/src/usr.bin/ssh/auth2-chall.c,v retrieving revision 1.18 diff -u -r1.18 auth2-chall.c --- auth2-chall.c 19 Jun 2002 00:27:55 -0000 1.18 +++ auth2-chall.c 26 Jun 2002 09:37:03 -0000 @@ -256,6 +256,8 @@ authctxt->postponed = 0; /* reset */ nresp = packet_get_int(); + if (nresp > 100) + fatal("input_userauth_info_response: nresp too big %u", nresp); if (nresp > 0) { response = xmalloc(nresp * sizeof(char*)); for (i = 0; i < nresp; i++) B: Index: auth2-pam.c =================================================================== RCS...
2002 Jun 26
0
Revised OpenSSH Security Advisory (adv.iss)
...============================= RCS file: /cvs/src/usr.bin/ssh/auth2-chall.c,v retrieving revision 1.18 diff -u -r1.18 auth2-chall.c --- auth2-chall.c 19 Jun 2002 00:27:55 -0000 1.18 +++ auth2-chall.c 26 Jun 2002 09:37:03 -0000 @@ -256,6 +256,8 @@ authctxt->postponed = 0; /* reset */ nresp = packet_get_int(); + if (nresp > 100) + fatal("input_userauth_info_response: nresp too big %u", nresp); if (nresp > 0) { response = xmalloc(nresp * sizeof(char*)); for (i = 0; i < nresp; i++) B: Index: auth2-pam.c =================================================================== RCS...
2002 Jun 26
1
Revised OpenSSH Security Advisory (adv.iss)
...============================= RCS file: /cvs/src/usr.bin/ssh/auth2-chall.c,v retrieving revision 1.18 diff -u -r1.18 auth2-chall.c --- auth2-chall.c 19 Jun 2002 00:27:55 -0000 1.18 +++ auth2-chall.c 26 Jun 2002 09:37:03 -0000 @@ -256,6 +256,8 @@ authctxt->postponed = 0; /* reset */ nresp = packet_get_int(); + if (nresp > 100) + fatal("input_userauth_info_response: nresp too big %u", nresp); if (nresp > 0) { response = xmalloc(nresp * sizeof(char*)); for (i = 0; i < nresp; i++) B: Index: auth2-pam.c =================================================================== RCS...
2002 Jun 26
2
OpenSSH Security Advisory (adv.iss)
...============================= RCS file: /cvs/src/usr.bin/ssh/auth2-chall.c,v retrieving revision 1.18 diff -u -r1.18 auth2-chall.c --- auth2-chall.c 19 Jun 2002 00:27:55 -0000 1.18 +++ auth2-chall.c 26 Jun 2002 09:37:03 -0000 @@ -256,6 +256,8 @@ authctxt->postponed = 0; /* reset */ nresp = packet_get_int(); + if (nresp > 100) + fatal("input_userauth_info_response: nresp too big %u", nresp); if (nresp > 0) { response = xmalloc(nresp * sizeof(char*)); for (i = 0; i < nresp; i++) B: Index: auth2-pam.c =================================================================== RCS...
2001 Feb 10
3
Protocol 2 remote forwarding patch
...+{ + char *rtype; + char want_reply; + int success = 0; + + rtype = packet_get_string(NULL); + want_reply = packet_get_char(); + + if ( strcmp(rtype, "tcpip-forward") == 0 ) { + char *address_to_bind; + int port_to_bind; + + address_to_bind = packet_get_string(NULL); + port_to_bind = packet_get_int(); + + /* Check if the client is allowed to forward (this port) */ + if ( port_to_bind < IPPORT_RESERVED && !user_authenticated_as_root ) { + log("User tries to forward privileged port %d", port_to_bind); + packet_send_debug("Requested forwarding of port %d but user...
2000 Aug 15
0
Experimental -R support patch for openssh client
...int client_port; /* Client port */ + + unsigned int client_len, connected_len; + + int newch; + int i; + + debug("ssh2 server tries to open forwarded-tcpip channel."); + + /* Get rest of the packet */ + connected_address = packet_get_string(&connected_len); + connected_port = packet_get_int(); + client_address = packet_get_string(&client_len); + client_port = packet_get_int(); + packet_done(); + + /* Check if we have requested this remote forwarding */ + for (i = 0; i<num_permitted_opens; i++) { + if ( permitted_opens[i].listen_port == connected_port ) { + break; + } + } +...
2000 Jan 07
2
possible clue on tcp forwarding problems
When I encounter the problem with TCP port forwarding locking up, I'll see this on the client window (if I haven't invoked ssh with -q): chan_shutdown_read failed for #1/fd6: Transport endpoint is not connected chan_shutdown_read failed for #1/fd6: Transport endpoint is not connected This is with Blowfish encryption. I have to kill and restart the client when this happens. Phil
2002 Jul 01
0
Revised OpenSSH Security Advisory
...============================= RCS file: /cvs/src/usr.bin/ssh/auth2-chall.c,v retrieving revision 1.18 diff -u -r1.18 auth2-chall.c --- auth2-chall.c 19 Jun 2002 00:27:55 -0000 1.18 +++ auth2-chall.c 26 Jun 2002 09:37:03 -0000 @@ -256,6 +256,8 @@ authctxt->postponed = 0; /* reset */ nresp = packet_get_int(); + if (nresp > 100) + fatal("input_userauth_info_response: nresp too big %u", nresp); if (nresp > 0) { response = xmalloc(nresp * sizeof(char*)); for (i = 0; i < nresp; i++) B: Index: auth2-pam.c =================================================================== RCS...
2002 Jul 01
0
Revised OpenSSH Security Advisory
...============================= RCS file: /cvs/src/usr.bin/ssh/auth2-chall.c,v retrieving revision 1.18 diff -u -r1.18 auth2-chall.c --- auth2-chall.c 19 Jun 2002 00:27:55 -0000 1.18 +++ auth2-chall.c 26 Jun 2002 09:37:03 -0000 @@ -256,6 +256,8 @@ authctxt->postponed = 0; /* reset */ nresp = packet_get_int(); + if (nresp > 100) + fatal("input_userauth_info_response: nresp too big %u", nresp); if (nresp > 0) { response = xmalloc(nresp * sizeof(char*)); for (i = 0; i < nresp; i++) B: Index: auth2-pam.c =================================================================== RCS...
2001 Jun 26
1
OpenSSH 2.9p2 with PAMAuthenticationViaKbdInt
...userauth_info_response_pam: no authentication context"); - if (authctxt->attempt++ >= AUTH_FAIL_MAX) - packet_disconnect("too many failed userauth_requests"); + if (authctxt->failures >= AUTH_FAIL_MAX) + packet_disconnect(AUTH_FAIL_MSG, authctxt->user); nresp = packet_get_int(); /* Number of responses. */ debug("got %d responses", nresp);
2000 Mar 27
1
Few question...
Hello I have few questions about openssh... 1/ there is probably bug in auth-password.c in auth_password function if (pw->pw_uid == 0 && options.permit_root_login == 2) return 0; if (*password == '\0' && options.permit_empty_passwd == 0) return 0; /* deny if no user. */ if (pw == NULL) <----------- this should be first checked .... return 0; 2/ do I have
2002 Feb 27
0
openssh & solaris (part 2)
...Tue Feb 26 15:31:26 2002 *************** *** 134,141 **** --- 134,143 ---- unsigned int nresp = 0, rlen = 0, i = 0; char *resp; + /* if (authctxt == NULL) fatal("input_userauth_info_response_pam: no authentication context"); + */ nresp = packet_get_int(); /* Number of responses. */ debug("got %d responses", nresp); _________________________________________________________________ Join the world?s largest e-mail service with MSN Hotmail. http://www.hotmail.com
2002 Feb 27
0
[Bug 128] New: PAM with ssh authentication and pam_krb5 doesn't work properly
...pam.c Tue Feb 26 15:31:26 2002 *************** *** 134,141 **** --- 134,143 ---- unsigned int nresp = 0, rlen = 0, i = 0; char *resp; + /* if (authctxt == NULL) fatal("input_userauth_info_response_pam: no authentication context"); + */ nresp = packet_get_int(); /* Number of responses. */ debug("got %d responses", nresp); ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2007 Oct 22
0
Intermittently stalling PAM authentication children
...ssh/sshd_config.OPIE unix$ tracing reveals they are blocked on a read() to file descriptor 7, which is a unix domain socket according to lsof and this is what gdb has to say (no debug version, sorry): #0 0x0000002a968b1a92 in __read_nocancel () from /lib64/tls/libc.so.6 #1 0x000000552aadea26 in packet_get_int () from /usr/sbin/sshd #2 0x000000552aae3f75 in kex_input_kexinit () from /usr/sbin/sshd #3 0x000000552aacdb60 in kexgex_server () from /usr/sbin/sshd #4 0x0000002a96eb1c27 in converse () from /lib/security/pam_opie.so #5 0x0000002a96eb1d7a in pam_sm_authenticate () from /lib/security/pam_opie....
2013 Oct 20
29
[Bug 2163] New: unchecked returned value from pam_get_item()
https://bugzilla.mindrot.org/show_bug.cgi?id=2163 Bug ID: 2163 Summary: unchecked returned value from pam_get_item() Product: Portable OpenSSH Version: -current Hardware: All OS: All Status: NEW Severity: minor Priority: P5 Component: PAM support Assignee: unassigned-bugs at