Displaying 20 results from an estimated 44 matches for "packet_put_int".
2016 Jan 22
6
[Bug 2529] New: direct-streamlocal channel open doesn't match PROTOCOL documentation
...uint32 initial window size
uint32 maximum packet size
string socket path
However, the implementation tacks some additional data to the end:
packet_start(SSH2_MSG_CHANNEL_OPEN);
packet_put_cstring(rtype);
packet_put_int(c->self);
packet_put_int(c->local_window_max);
packet_put_int(c->local_maxpacket);
if (strcmp(rtype, "direct-tcpip") == 0) {
/* target host, port */
packet_put_cstring(c->path);...
2000 Aug 15
0
Experimental -R support patch for openssh client
...2_MSG_GLOBAL_REQUEST);
packet_put_cstring("tcpip-forward");
- packet_put_char(0); /* boolean: want reply */
+ /* Ask for reply so we know to expect 'forwarded-tcpip' messages */
+ packet_put_char(1); /* Boolean 1 asks for reply */
packet_put_cstring(address_to_bind);
packet_put_int(listen_port);
- } else {
+ packet_send();
+ packet_write_wait();
+
+ type = packet_read(&payload_len); /* Expect reply from server */
+ switch (type) {
+ case SSH2_MSG_REQUEST_SUCCESS:
+ success = 1;
+ break;
+ case SSH2_MSG_REQUEST_FAILURE:
+ log("Warning: Server doesn't d...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...0, xstrdup(buf));
if (compat20) {
packet_start(SSH2_MSG_CHANNEL_OPEN);
- packet_put_cstring("direct-tcpip");
+ if (c->type == SSH2_CHANNEL_PORT_LISTENER)
+ packet_put_cstring("forwarded-tcpip");
+ else
+ packet_put_cstring("direct-tcpip");
packet_put_int(newch);
packet_put_int(c->local_window_max);
packet_put_int(c->local_maxpacket);
@@ -786,10 +799,12 @@
channel_pre[SSH_CHANNEL_OPEN] = &channel_pre_open_20;
channel_pre[SSH_CHANNEL_X11_OPEN] = &channel_pre_x11_open;
channel_pre[SSH_CHANNEL_PORT_LISTENER] = &channe...
2014 Nov 05
2
[PATCH] Early request for comments: U2F authentication
...ussion going
:). Please see the two attached files for the patch. Due to their
size, I?ve not posted them in-line.
The way it currently (!) works:
1) Use ?AuthenticationMethods publickey,u2f? in sshd_config (or <whatever>,u2f)
2) Recompile SSH with the patch and change userauth_u2f() to use
packet_put_int(0) (== registration) instead of packet_put_int(1) (==
authentication). Sorry about that. See my question below.
3) You need to do this step only once: ssh into your server, touch
your security key when prompted, and you?ll see a ssh-u2f key line,
which you should copy&paste into the server?s ~/...
2001 Jul 05
1
Patch to workaround host key size mismatch bug in old SSH sshd
...ot;, rbits, bits);
log("Warning: This may be due to an old implementation of ssh.");
--- sshd.c.O Thu Jul 5 10:49:10 2001
+++ sshd.c Thu Jul 5 10:49:27 2001
@@ -1217,7 +1217,12 @@
packet_put_bignum(sensitive_data.server_key->rsa->n);
/* Store our public host RSA key. */
- packet_put_int(BN_num_bits(sensitive_data.ssh1_host_key->rsa->n));
+ len = BN_num_bits(sensitive_data.ssh1_host_key->rsa->n);
+ if ((datafellows & SSH_BUG_SERVERLIESSIZE) && (len & 1)) {
+ /* old ssh client expects even number for host key */
+ len += 1;
+ }
+ packet_put_int(le...
2001 Feb 10
3
Protocol 2 remote forwarding patch
...0, xstrdup(buf), 1);
if (compat20) {
packet_start(SSH2_MSG_CHANNEL_OPEN);
- packet_put_cstring("direct-tcpip");
+ if (c->type == SSH2_CHANNEL_PORT_LISTENER)
+ packet_put_cstring("forwarded-tcpip");
+ else
+ packet_put_cstring("direct-tcpip");
packet_put_int(newch);
packet_put_int(c->local_window_max);
packet_put_int(c->local_maxpacket);
@@ -820,10 +826,12 @@
channel_pre[SSH_CHANNEL_OPEN] = &channel_pre_open_20;
channel_pre[SSH_CHANNEL_X11_OPEN] = &channel_pre_x11_open;
channel_pre[SSH_CHANNEL_PORT_LISTENER] = &channe...
2006 Jun 20
2
[PATCH] openssh pseudo-terminal bug
hello
short description:
ssh client sends a wrong all-zero terminal info when requesting forced pseudo-terminal
allocation while stdin is not a terminal.
sshd then sets the terminals ospeed to 0 because it receives this information from the
client. on solaris this means that the pseudo-terminal is closed and output of any
remote command is dropped.
longer description:
what we're doing is
2004 Jul 14
1
New dynamic window patch (with limits)
...)
+ tcpwinsz = MAXBUFSZ/2;
+ }
+ if (c->dynamic_window && (ret == 0) &&
+ (2*tcpwinsz > c->local_window_max)) {
+ addition = 2 * tcpwinsz - c->local_window_max;
+ c->local_window_max += addition;
+ }
packet_start(SSH2_MSG_CHANNEL_WINDOW_ADJUST);
packet_put_int(c->remote_id);
- packet_put_int(c->local_consumed);
+ packet_put_int(c->local_consumed + addition);
packet_send();
debug2("channel %d: window %d sent adjust %d",
c->self, c->local_window,
c->local_consumed);
- c->local_window += c->local_cons...
2002 Apr 11
2
SSH2_MSG_KEX_DH_GEX_REQUEST_OLD
Hi All,
I am trying to decode the message received from openssh client 3.1.0
Following is the third message which I received.
length = 0000 008c
padding length = 06
messagetype = 1e (SSH2_MSG_KEX_DH_GEX_REQUEST_OLD)
padding = b8 218e c680
and the next four byte should have the n which is 0000 0080 which is less
than 1024.
0000 008c 061e 0000 0080 2a19 a9e4 05fb
aee2 b107 4fa9 f0c1 83d3 3bf0
2004 Jan 08
3
Send Break to terminal server
Setup ::
PC (cygwin) <-> Terminal Server (InReach) <-> Sun Server (Solaris 8)
Scenarios :
Using Tera Term Pro with ssh extension, I connect to the Terminal Server via
ssh and I can use 'Control -> Send Break' to send the break sequence to drop
the Sun Server into its 'ok prompt'.
Using ssh via cygwin, I tried to do '~ ctrl-B', but it will not
2004 Jul 07
3
DynamicWindow Patch
...O_RCVBUF, &tcpwinsz, &optsz);
+ if (c->dynamic_window && (ret == 0) &&
+ (tcpwinsz > c->local_window_max)) {
+ addition = 2 * tcpwinsz - c->local_window_max;
+ c->local_window_max += addition;
+ }
packet_start(SSH2_MSG_CHANNEL_WINDOW_ADJUST);
packet_put_int(c->remote_id);
- packet_put_int(c->local_consumed);
+ packet_put_int(c->local_consumed + addition);
packet_send();
debug2("channel %d: window %d sent adjust %d",
c->self, c->local_window,
c->local_consumed);
- c->local_window += c->local_cons...
2016 Dec 22
3
[Bug 2649] New: Problem with reverse tunnel between SSH client 5.5p1 and SSH server > 6.4p1
...the problem:
--- openssh-7.3p1.orig/channels.c
+++ openssh-7.3p1/channels.c
@@ -1458,7 +1458,7 @@ port_open_helper(Channel *c, char *rtype
} else {
/* listen address, port */
packet_put_cstring(c->path);
- packet_put_int(local_port);
+ packet_put_int(c->listening_port);
}
if (strcmp(rtype,
"forwarded-streamlocal at openssh.com") == 0) {
/* reserved for future owner/mode info */
This is also Debian bug #846379 (https://...
2016 Feb 12
2
Test Failure OpenSSH 7.1 P2 on HPE NSE for integrity
...Looking closer at the sshd log:
debug1: client_input_channel_req: channel 0 rtype exit-signal reply 0
The code for this is in session_exit_message() and looks like:
if (WIFEXITED(status)) {
channel_request_start(s->chanid, "exit-status", 0);
packet_put_int(WEXITSTATUS(status));
packet_send();
} else if (WIFSIGNALED(status)) {
channel_request_start(s->chanid, "exit-signal", 0);
so your printf is probably dying with a signal rather than exiting.
Which signal? dunno, but my guess would be SIGPIPE....
2005 Feb 24
7
Question performnace of SSH v1 vs SSH v2
Hello
I have ported OpenSSH 3.8p1 to a LynxOS platform. Recently I heard a
report from the field that v2 is perceived to be significantly slower
than v1. Is this a known issue? Are there any configuration parameters
that can be modified to make v2 faster?
Thanks in advance for your response
Amba
2010 Jan 28
1
Possible issue with stdio forwarding
Greetings,
I've been doing a little testing with the stdio forwarding support added
in recent snapshots and have encountered one possible issue. First, I
should say that this feature generally seems to work. However, I haven't
been able to get it to work when connecting to a server running
SSH.COM's product.
The config file I am using is fairly simple:
Host sfe1
LogLevel debug3
2003 Mar 27
0
[Bug 524] Keyboard-interactive PAM back end hides information
.../* Name */
- packet_put_cstring(""); /* Instructions */
+
+ if (text) {
+ packet_put_cstring(text);
+ xfree(text);
+ text = NULL;
+ } else
+ packet_put_cstring(""); /* Instructions */
+
packet_put_cstring(""); /* Language */
packet_put_int(context_pam2.num_expected);
@@ -96,12 +103,7 @@
continue;
context_pam2.prompts[j++] = i;
- if (text) {
- message_cat(&text, PAM_MSG_MEMBER(msg, i, msg));
- packet_put_cstring(text);
- text = NULL;
- } els...
2010 Mar 12
1
Is this a bug in 5.4p1?
I am testing with a 5.4p1 client and have noticed, on the server
side, that sometimes an SSH_MSG_DISCONNECT message is received with
the following 28-byte long payload:
0x00 0x00 0x00 0x0b
Reason: SSH_DISCONNECT_BY_APPLICATION
0x00 0x00 0x00 0x14
Description string length: 20 bytes
0x64 0x69 0x73 0x63 0x6f 0x6e 0x6e 0x65
2001 Oct 29
0
signal messages
..._kex->done = 0;
kex_send_kexinit(xxx_kex);
need_rekeying = 0;
+ }
+ if (send_signal == 2) {
+ send_signal = 0;
+ signame = sig2name(received_signal);
+ debug("Sending SIG%s to the remote host.",
+ signame);
+ packet_start(SSH2_MSG_CHANNEL_REQUEST);
+ packet_put_int(session_ident);
+ packet_put_cstring("signal");
+ packet_put_char(0);
+ packet_put_cstring(signame);
+ packet_send();
}
}
Index: session.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/session.c,v
retrieving revisio...
2015 Nov 27
2
[Bug 2509] New: Unexpected change in tcpip-forward reply message in OpenSSH 6.8
...ode
for this in server_input_global_request() in server loop.c is:
if (want_reply) {
packet_start(success ?
SSH2_MSG_REQUEST_SUCCESS :
SSH2_MSG_REQUEST_FAILURE);
if (success && allocated_listen_port > 0)
packet_put_int(allocated_listen_port);
packet_send();
packet_write_wait();
}
Note the test for "allocated_listen_port > 0". However, the new code in
OpenSSH 6.8 does the following:
if ((r = sshbuf_put_u32(resp, allocated_listen_port))
!= 0)...
2013 Aug 31
11
[Bug 2147] New: OpenSSH remote forwarding of dynamic ports doesn't work when you create more than one
https://bugzilla.mindrot.org/show_bug.cgi?id=2147
Bug ID: 2147
Summary: OpenSSH remote forwarding of dynamic ports doesn't
work when you create more than one
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5