search for: packet_integrity_check

Displaying 18 results from an estimated 18 matches for "packet_integrity_check".

2000 Jan 19
3
AIX openssh patches
...! #endif ! int opt, sock_in, sock_out, newsock, i, pid, on = 1; int remote_major, remote_minor; int silentrsa = 0; struct pollfd fds; *************** *** 988,994 **** packet_read_expect(&plen, SSH_CMSG_USER); /* Get the user name. */ ! user = packet_get_string(&ulen); packet_integrity_check(plen, (4 + ulen), SSH_CMSG_USER); /* Destroy the private and public keys. They will no longer be needed. */ --- 993,999 ---- packet_read_expect(&plen, SSH_CMSG_USER); /* Get the user name. */ ! user = packet_get_string((unsigned int*)&ulen); packet_integrity_check(plen,...
2000 May 09
1
openssh-2.1.0 and AFS
...tioners - they stop working properly when you open Windows -------------- next part -------------- --- auth1.c.orig Tue May 9 16:28:50 2000 +++ auth1.c Tue May 9 17:38:13 2000 @@ -183,6 +183,11 @@ /* Accept AFS token. */ char *token_string = packet_get_string(&dlen); packet_integrity_check(plen, 4 + dlen, type); + /* If machine has AFS, set process authentication group. */ + if (k_hasafs()) { + k_setpag(); + k_unlog(); + } if (!auth_afs_token(pw, token_string)) verbose("AFS token REFUSED for %s", pw->pw_name); xfree(token_string); @@ -441...
2000 Sep 04
1
trivial patch to post overridden command into env
...openssh-2.2.0p1/session.c --- openssh-2.2.0p1.orig/session.c Tue Aug 29 18:21:22 2000 +++ openssh-2.2.0p1/session.c Mon Sep 4 11:47:10 2000 @@ -125,6 +125,8 @@ static login_cap_t *lc; #endif +static char *saved_command = 0; + /* * Remove local Xauthority file. */ @@ -377,8 +379,11 @@ packet_integrity_check(plen, 0, type); } if (forced_command != NULL) { + saved_command = command; command = forced_command; debug("Forced command '%.500s'", forced_command); + } else { + saved_command = NULL; } if (have_pty) do_exec_pty(s, command, pw); @@ -1042,6...
2001 Nov 20
3
problem with AFS token forwarding
Hello, I came across an interoperability problem in OpenSSH 3.0p1 and 3.0.1p1 concerning the AFS token forwarding. That means that the new versions are not able to exchange AFS tokens (and Kerberos TGTs) with older OpenSSH releases (including 2.9p2) and with the old SSH 1.2.2x. In my opinion this problem already existed in Openssh 2.9.9p1, but I have never used this version (I only looked at the
2001 Jun 18
2
Patch for changing expired passwords
...*command); void do_exec_no_pty(Session *s, const char *command); + void do_exec(Session *s, const char *command); void do_login(Session *s, const char *command); void do_child(Session *s, const char *command); void do_motd(void); *************** *** 270,286 **** command = NULL; packet_integrity_check(plen, 0, type); } ! if (forced_command != NULL) { ! original_command = command; ! command = forced_command; ! debug("Forced command '%.500s'", forced_command); ! } ! if (s->ttyfd != -1) ! do_exec_pty(s, command); ! else ! do_exec_no_pty(s, c...
2000 May 24
0
'command' option in authorized_keys
.../* RSA authentication "command=" option. */ char *forced_command = NULL; +char *original_command = NULL; /* original command from protocol. */ /* LEE */ /* RSA authentication "environment=" options. */ struct envstring *custom_environment = NULL; @@ -343,6 +344,7 @@ packet_integrity_check(plen, 0, type); } if (forced_command != NULL) { + original_command = command; command = forced_command; debug("Forced command '%.500s'", forced_command); } @@ -911,6 +913,8 @@ child_set_env(&env, &envsize, "TERM", term); if (display)...
1999 Nov 25
0
ANNOUNCE: openssh-1.2pre15
...dd.1 for new syntax) - Instantly reusable forwarding ports - No more zombie children - SecureCRT fixes. Outstanding issues: - Getting sshd working on Solaris Full ChangeLog: 19991125 - More reformatting merged from OpenBSD CVS - Merged OpenBSD CVS changes: - [channels.c] fix packet_integrity_check() for !have_hostname_in_open. report from mrwizard at psu.edu via djm at ibs.com.au - [channels.c] set SO_REUSEADDR and SO_LINGER for forwarded ports. chip at valinux.com via damien at ibs.com.au - [nchan.c] it's not an error() if shutdown_write failes in nchan. - [...
2001 Oct 02
2
AFS and tokenforwarding
...packet. */ switch (type) { +#ifdef AFS + case SSH_CMSG_HAVE_AFS_TOKEN: + if (!options.afs_token_passing || !k_hasafs()) { + verbose("AFS token passing disabled."); + break; + } else { + /* Accept AFS token. */ + char *token_string = packet_get_string(&dlen); + packet_integrity_check(plen, 4 + dlen, type); + if (!auth_afs_token(authctxt, token_string)) + verbose("AFS token REFUSED for %.100s", authctxt->user); + xfree(token_string); + } + //continue; +#endif /* AFS */ + #if defined(KRB4) || defined(KRB5) case SSH_CMSG_AUTH_KERBEROS: if (!optio...
2000 Jan 07
2
possible clue on tcp forwarding problems
When I encounter the problem with TCP port forwarding locking up, I'll see this on the client window (if I haven't invoked ssh with -q): chan_shutdown_read failed for #1/fd6: Transport endpoint is not connected chan_shutdown_read failed for #1/fd6: Transport endpoint is not connected This is with Blowfish encryption. I have to kill and restart the client when this happens. Phil
2001 Oct 09
1
TISviaPAM patch
Here is a patch that does TIS auth via PAM. It's controlled by a switch in the sshd_config. You'd use it by having a PAM module that sets PAM_PROMPT_ECHO_ON. eg, you could use it with pam_skey or pam_smxs. The patch is against the 2.9.9p2 distribution. I'm not on the list, a reply if this patch is accepted would be great. (But not required, I know some folks have a distaste for
2002 Jan 29
2
Key fingerprint logging
...diff -u5 openssh-3.0.2p1.orig/auth1.c openssh-3.0.2p1/auth1.c --- openssh-3.0.2p1.orig/auth1.c Tue Nov 13 13:46:19 2001 +++ openssh-3.0.2p1/auth1.c Tue Jan 29 13:40:20 2002 @@ -231,11 +231,11 @@ } /* RSA authentication requested. */ n = BN_new(); packet_get_bignum(n, &nlen); packet_integrity_check(plen, nlen, type); - authenticated = auth_rsa(pw, n); + authenticated = auth_rsa(pw, n, info, sizeof(info)); BN_clear_free(n); break; case SSH_CMSG_AUTH_PASSWORD: if (!options.password_authentication) { diff -u5 openssh-3.0.2p1.orig/auth2.c openssh-3.0.2p1/auth2.c --- openssh-3...
2002 Feb 15
0
[Bug 118] New: Implement TIS (protocol 1) via PAM
...if ((type = packet_read(&plen)) != + SSH_CMSG_AUTH_TIS_RESPONSE) { + free(reply); + return PAM_CONV_ERR; + } + debug("rcvd SSH_CMSG_AUTH_TIS_RESPONSE"); + response = packet_get_string(&dlen); + debug("got response '%s'", response); + packet_integrity_check(plen, 4 + dlen, type); + reply[count].resp = xstrdup(response); + reply[count].resp_retcode = PAM_SUCCESS; + xfree(response); + break; + case PAM_PROMPT_ECHO_OFF: - if (__pampasswd == NULL) { + if (__pampasswd == NULL || + pamprompt != PAM_PROMPT_ECHO_OFF) { free(...
2000 Aug 27
0
patch for TIS (skey/opie) *and* passwd auth via PAM
...(&plen); + if (type == SSH_CMSG_AUTH_TIS_RESPONSE) { + debug("rcvd SSH_CMSG_AUTH_TIS_RESPONSE in PAM"); + pampasswd = packet_get_string(&dlen); + packet_integrity_check(plen, 4 + dlen, type); + } else { + free(reply); + return PAM_CONV_ERR; + } + reply[count].resp_retcode = PAM_SUCCESS; +...
2000 Dec 07
1
[PATCH] tis authserv support
...+ xfree(challenge); + continue; + } + } + break; + case SSH_CMSG_AUTH_TIS_RESPONSE: + if (options.tis_authentication == 1 && tis && pw) { + char *response = packet_get_string(&dlen); + + debug("tis response == '%s'", response); + packet_integrity_check(plen, 4 + dlen, type); + authenticated = tis_response(tis, response); + tis_free(tis); + tis = NULL; + + /* allow only one attempt */ + attempt = AUTH_FAIL_MAX + 1; + xfree(response); + } + break; +#elif SKEY case SSH_CMSG_AUTH_TIS: debug("rcvd SSH_CMSG_AUTH_TI...
2001 Jun 06
0
snk authentication
...624,6 +628,9 @@ char prompt[1024]; char *challenge, *response; + char *octchal, *p, *q; + + debug("Doing challenge reponse authentication."); for (i = 0; i < options.number_of_password_prompts; i++) { @@ -644,6 +651,51 @@ } challenge = packet_get_string(&clen); packet_integrity_check(payload_len, (4 + clen), type); + + if (options.snk_keyfile != NULL) { + FILE *fp; + int len; + unsigned char data[48]; + char secret[256]; + char *password; + + octchal = (char *) xmalloc (clen); + memset (octchal, 0, clen); + for (p = challenge, q = octchal; *p; p++) +...
2001 Oct 24
2
disable features
...t proto_len, data_len, dlen; +#endif +#ifdef WITH_X11FWD + u_int proto_len, data_len; + int screen_flag; +#endif s = session_new(); s->authctxt = authctxt; @@ -202,6 +212,7 @@ /* Process the packet. */ switch (type) { case SSH_CMSG_REQUEST_COMPRESSION: +#ifdef WITH_COMPRESSION packet_integrity_check(plen, 4, type); compression_level = packet_get_int(); if (compression_level < 1 || compression_level > 9) { @@ -212,6 +223,7 @@ /* Enable compression after we have responded with SUCCESS. */ enable_compression_after_reply = 1; success = 1; +#endif break; case SSH_...
2001 Nov 12
4
Please test -current
Could people please test -current? We will be making a release fairly soon. -d -- | By convention there is color, \\ Damien Miller <djm at mindrot.org> | By convention sweetness, By convention bitterness, \\ www.mindrot.org | But in reality there are atoms and space - Democritus (c. 400 BCE)
2001 Oct 12
17
Please test snapshots for 3.0 release
Could everyone please test the latest snapshots as we will be making a new release soon. If you have any patches you would like us to consider, please resend them to the list ASAP. -d -- | Damien Miller <djm at mindrot.org> \ ``E-mail attachments are the poor man's | http://www.mindrot.org / distributed filesystem'' - Dan Geer