Displaying 11 results from an estimated 11 matches for "packet_not_very_much_data_to_write".
2003 Sep 15
1
SCO 3.2v4.2 and OpenSSH -current --> connection hangs and does no t close
...d my hand at gdb, and this is the output and backtrace
before the session hangs.
(gdb)
wait_until_can_do_something (readsetp=0x7ffff8e4, writesetp=0x7ffff8e0,
maxfdp=0x7ffff8dc, nallocp=0x7ffff8d8, max_time_milliseconds=0)
at serverloop.c:313
313 if (child_terminated &&
packet_not_very_much_data_to_write())
(gdb)
317 if (max_time_milliseconds == 0)
(gdb)
318 tvp = NULL;
(gdb)
326 ret = select((*maxfdp)+1, *readsetp, *writesetp, NULL, tvp);
(gdb) p connection_closed
$1 = 0
(gdb) bt
#0 wait_until_can_do_something (readsetp=0x7ffff8e4, writesetp=0x7ffff8e0,...
2007 Nov 13
1
Help with openssh: ssh application writing data > 131071 to socket causing message too long error
...ound 1GB using sftp/scp I am getting a
send:Message too long error.
I did a bit of debugging and found that ssh code was sending packet of
size greater than 131072 bytes from the application level to the
socket and hence
the issue.
On going through the code
In client_loop( in clientloop.c)
if (packet_not_very_much_data_to_write())
channel_output_poll();
In packet.c
packet_not_very_much_data_to_write(void)
{
if (interactive_mode)
{
fprintf(stderr,"interactive mode buffer len %d\n",
buffer_len(&output));
return buffer_len(&outp...
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly:
http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html
<quote>
The paper concludes that the keystroke timing data observable from
today's SSH implementations reveals a dangerously significant amount of
information about user terminal sessions--enough to locate typed
passwords in the session data stream and reduce the
2003 Sep 15
0
SCO 3.2v4.2 and OpenSSH -current --> connection hangs and does n o t close
...isc.h,
recompiled ( make clean && make )
still the same problem exists:
(gdb)
wait_until_can_do_something (readsetp=0x7ffff8e4, writesetp=0x7ffff8e0,
maxfdp=0x7ffff8dc, nallocp=0x7ffff8d8, max_time_milliseconds=0)
at serverloop.c:313
313 if (child_terminated &&
packet_not_very_much_data_to_write())
(gdb)
317 if (max_time_milliseconds == 0)
(gdb)
318 tvp = NULL;
(gdb)
326 ret = select((*maxfdp)+1, *readsetp, *writesetp, NULL, tvp);
(gdb) bt
#0 wait_until_can_do_something (readsetp=0x7ffff8e4, writesetp=0x7ffff8e0,
maxfdp=0x7ffff8dc, nallocp=0...
2005 Jan 19
1
sshd hangs
..._start+0x5c(0, 0, 0, 0, 0, 0)
the corresponding c sources are:
void
server_loop2(Authctxt *authctxt)
{
[ ... ]
for (;;) {
process_buffered_input_packets();
rekeying = (xxx_kex != NULL && !xxx_kex->done);
if (!rekeying && packet_not_very_much_data_to_write())
channel_output_poll();
wait_until_can_do_something(&readset, &writeset, &max_fd,
&nalloc, 0);
[ ...]
and it hangs in the select() call in wait_until_can_do_something().
question: why is the wait time set to 0 (= wait...
2001 Aug 16
4
Idletimeout patch
...) {
+ time_t diff=time(NULL)-idletime_last;
+ if (diff>=options.idletimeout)
+ max_time_seconds=1;
+ else
+ max_time_seconds=options.idletimeout-diff;
+ }
+ }
+
/* When select fails we restart from here. */
retry_select:
@@ -258,10 +279,17 @@
if (child_terminated && packet_not_very_much_data_to_write())
if (max_time_milliseconds == 0 || client_alive_scheduled)
max_time_milliseconds = 100;
-
- if (max_time_milliseconds == 0)
- tvp = NULL;
- else {
+
+ if (max_time_milliseconds == 0) {
+ /* Use max_time_seconds only if max_time_milliseconds is
+ * not set */
+ if (max_time_seconds>...
2007 Jan 16
11
[Bug 52] ssh hangs on exit
http://bugzilla.mindrot.org/show_bug.cgi?id=52
dtucker at zip.com.au changed:
What |Removed |Added
----------------------------------------------------------------------------
OtherBugsDependingO| |1274
nThis| |
------- You are receiving this mail because: -------
You are the assignee for
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
...ot;Entering interactive session.");
start_time = get_current_time();
@@ -861,9 +940,16 @@
* Make packets from buffered channel data, and
* enqueue them for sending to the server.
*/
- if (packet_not_very_much_data_to_write())
- channel_output_poll();
-
+ /*
+ * Begin SD Mod: on expiration of 50 ms timer
call
+ * channel_ouput
+ */
+ if(time_out){
+
ch...
2001 Oct 06
1
Defeating Timing Attacks
Hello,
In response to the timing analysis attacks presented by Dawn Song et.
al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html
we
at Silicon Defense developed a patch for openssh to avoid such
measures.
Timing Analysis Evasion changes were developed by C. Jason Coit and Roel
Jonkman of Silicon Defense.
These changes cause SSH to send packets unless request not to,
2007 Mar 23
7
4.6p1 chan_read_failed error
The 4.6p1 sshd is logging this error during remote commands or file
transfers:
error: channel 0: chan_read_failed for istate 3
Platform is Solaris 8, 4.6p1 + OpenSSL 0.9.8d.
The commands and transfers work correctly, so the error message appears
to be spurious. The error message does not appear when processing logins.
Otherwise 4.6p1 is running without any apparent problems. This error
2007 Apr 08
11
Error message after upgraing the openssh 4.6P1
Hi,
We have upgraded the openssh 4.6P1 on Solaris 8 servers. After upgrade
we get the below error message whenever we execute the remote commands
using ssh. Please let me know what the fix is for this.
Apr 8 03:03:43 dvsrv10 sshd[25379]: [ID 800047 auth.info] Accepted
publickey for osteam from 10.0.93.31 port 35856 ssh2
Apr 8 03:03:50 dvsrv10 sshd[25381]: [ID 800047 auth.error] error: