Displaying 20 results from an estimated 20 matches for "packet_read_expect".
2007 Mar 14
1
sshd gets stuck: select() in packet_read_seqnr waits indefinitely
...se sshd wasn't draining its output,
and that's when I noticed the user's sshd was stuck and got a backtrace:
(gdb) where
#0 0x.. in select () from /lib/libc.so.6
#1 0x.. in packet_read_seqnr () from /usr/lib/libssh.so.3
#2 0x.. in packet_read () from /usr/lib/libssh.so.3
#3 0x.. in packet_read_expect () from /usr/lib/libssh.so.3
#4 0x.. in kexgex_server (kex=0x538900) at kexgexs.c:99
#5 0x.. in kex_setup () from /usr/lib/libssh.so.3
#6 0x.. in kex_input_kexinit () from /usr/lib/libssh.so.3
#7 0x.. in dispatch_run () from /usr/lib/libssh.so.3
#8 0x.. in process_buffered_input_packets () at...
2002 Mar 07
0
[Bug 148] New: Key Exchange Guesses not supported
...below in Section Section 5.1).
Otherwise, the guess is considered to be right and the optimistically
sent packet MUST be handled as the first key exchange packet.
The current code for kex in OpenSSH assumes that they only acceptable
packet is a NEWKEYS by using this code fragment:
packet_read_expect(SSH2_MSG_NEWKEYS);
SSH2_MSG_KEXDH_INIT can arrive if the other side sends a guess.
I have a partial solution (only works if the client guess was our prefered),
solution for the server side but this needs client support as well.
------- You are receiving this mail because: -------
You are the a...
2002 Mar 07
1
[Bug 148] Key Exchange Guesses not supported
...penbsd.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |ASSIGNED
------- Additional Comments From markus at openbsd.org 2002-03-08 08:10 -------
packet_read_expect(SSH2_MSG_NEWKEYS);
^^^
hm, i never thought i need to implement this, but
now it seems so. but i don't think it's related to
this line.
i think if the keyinit packet has
first_kex_follows set
i have to continue parsing the packet....
not sure how to implement this (ugly?) optimization...
2007 Dec 28
3
[Bug 1307] client disconnects if ServerAlive enabled but not implemented
https://bugzilla.mindrot.org/show_bug.cgi?id=1307
--- Comment #10 from Darren Tucker <dtucker at zip.com.au> 2007-12-29 00:38:09 ---
Created an attachment (id=1424)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=1424)
Hack sshd to provide testcase for this change.
This patch is a nasty hack to make sshd behave the same as described
here to test this change. Against the hacked
2007 Sep 17
18
[Bug 1363] New: sshd gets stuck: select() in packet_read_seqnr waits indefinitely
...se sshd wasn't draining its output,
and that's when I noticed the user's sshd was stuck and got a
backtrace:
(gdb) where
#0 0x.. in select () from /lib/libc.so.6
#1 0x.. in packet_read_seqnr () from /usr/lib/libssh.so.3
#2 0x.. in packet_read () from /usr/lib/libssh.so.3
#3 0x.. in packet_read_expect () from /usr/lib/libssh.so.3
#4 0x.. in kexgex_server (kex=0x538900) at kexgexs.c:99
#5 0x.. in kex_setup () from /usr/lib/libssh.so.3
#6 0x.. in kex_input_kexinit () from /usr/lib/libssh.so.3
#7 0x.. in dispatch_run () from /usr/lib/libssh.so.3
#8 0x.. in process_buffered_input_packets () at...
2000 Aug 15
0
Experimental -R support patch for openssh client
...acket_send();
packet_write_wait();
- /*
- * Wait for response from the remote side. It will send a disconnect
- * message on failure, and we will never see it here.
+
+ /* Jarno: Server can send SSH_SMSG_FAILURE if it won't do port
+ * forwardings. Read the server reply.
*/
- packet_read_expect(&payload_len, SSH_SMSG_SUCCESS);
+ type = packet_read(&payload_len); /* Expect reply from server */
+ switch (type) {
+ case SSH_SMSG_SUCCESS:
+ success = 1;
+ break;
+ case SSH_SMSG_FAILURE:
+ log("Warning: Server doesn't do port forwarding.");
+ break;
+ default...
2000 Aug 13
1
Patches for openssh port forwarding
..._opens++;
-
/* Send the forward request to the remote side. */
if (compat20) {
const char *address_to_bind = "0.0.0.0";
@@ -1534,7 +1534,28 @@
* Wait for response from the remote side. It will send a disconnect
* message on failure, and we will never see it here.
*/
- packet_read_expect(&payload_len, SSH_SMSG_SUCCESS);
+
+ /* Jarno: Server can send SSH_SMSG_FAILURE if it won't do port
+ forwardings !
+ */
+
+ type = packet_read(&payload_len);
+
+ switch (type) {
+ case SSH_SMSG_SUCCESS:
+ permitted_opens[num_permitted_opens].host_to_connect = xstrdup(host_t...
2007 Apr 17
9
[Bug 1307] client disconnects if ServerAlive enabled but not implemented
http://bugzilla.mindrot.org/show_bug.cgi?id=1307
Summary: client disconnects if ServerAlive enabled but not
implemented
Product: Portable OpenSSH
Version: 4.3p2
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: bitbucket at
2000 Feb 27
0
[PATCH] Fix login.conf, expiration, BSD compatibility in OpenSSH
...og on... */
return 1;
}
@@ -1268,6 +1269,12 @@
struct passwd *pw, pwcopy;
int plen, ulen;
char *user;
+#ifdef LOGIN_CAP
+ login_cap_t *lc;
+ char *hosts;
+ const char *from_host, *from_ip;
+ int denied;
+#endif /* LOGIN_CAP */
/* Get the name of the user that we wish to log in as. */
packet_read_expect(&plen, SSH_CMSG_USER);
@@ -1338,6 +1345,38 @@
packet_disconnect("ROOT LOGIN REFUSED FROM %.200s",
get_canonical_hostname());
}
+
+#ifdef LOGIN_CAP
+ lc = login_getpwclass(pw);
+ if (lc == NULL)
+ lc = login_getclassbyname(NULL, pw);
+ from_host = get_canonical_hostname(...
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
...packet_put_string(client_pubkey, sizeof(client_pubkey));
+ packet_send();
+ debug("sending SSH2_MSG_KEX_ECDH_INIT");
+
+#ifdef DEBUG_KEXECDH
+ dump_digest("client private key:", client_key, sizeof(client_key));
+#endif
+
+ debug("expecting SSH2_MSG_KEX_ECDH_REPLY");
+ packet_read_expect(SSH2_MSG_KEX_ECDH_REPLY);
+
+ /* hostkey */
+ server_host_key_blob = packet_get_string(&sbloblen);
+ server_host_key = key_from_blob(server_host_key_blob, sbloblen);
+ if (server_host_key == NULL)
+ fatal("cannot decode server_host_key_blob");
+ if (server_host_key->type != kex-&g...
2000 Jan 19
3
AIX openssh patches
...277,288 ----
{
extern char *optarg;
extern int optind;
! #ifdef _AIX
! unsigned long aux;
! #else
! int aux;
! #endif
! int opt, sock_in, sock_out, newsock, i, pid, on = 1;
int remote_major, remote_minor;
int silentrsa = 0;
struct pollfd fds;
***************
*** 988,994 ****
packet_read_expect(&plen, SSH_CMSG_USER);
/* Get the user name. */
! user = packet_get_string(&ulen);
packet_integrity_check(plen, (4 + ulen), SSH_CMSG_USER);
/* Destroy the private and public keys. They will no longer be needed. */
--- 993,999 ----
packet_read_expect(&plen, SSH_CMSG_U...
2013 Jun 25
1
RFC: encrypted hostkeys patch
...ype %d", kex->hostkey_type);
server_host_private = kex->load_host_private_key(kex->hostkey_type);
- if (server_host_private == NULL)
- fatal("Missing private key for hostkey type %d",
- kex->hostkey_type);
debug("expecting SSH2_MSG_KEX_ECDH_INIT");
packet_read_expect(SSH2_MSG_KEX_ECDH_INIT);
@@ -139,9 +136,8 @@ kexecdh_server(Kex *kex)
}
/* sign H */
- if (PRIVSEP(key_sign(server_host_private, &signature, &slen,
- hash, hashlen)) < 0)
- fatal("kexdh_server: key_sign failed");
+ kex->sign(server_host_private, server_host_public...
2004 Sep 07
0
Please review openssh patch for selinux
...vanilla/auth1.c 2004-08-12 14:40:25.000000000 +0200
+++ openssh-3.9p1_selinux/auth1.c 2004-09-07 18:04:03.000000000 +0200
@@ -284,6 +284,9 @@
{
u_int ulen;
char *user, *style = NULL;
+#ifdef WITH_SELINUX
+ char *role=NULL;
+#endif
/* Get the name of the user that we wish to log in as. */
packet_read_expect(SSH_CMSG_USER);
@@ -292,11 +295,19 @@
user = packet_get_string(&ulen);
packet_check_eom();
+#ifdef WITH_SELINUX
+ if ((role = strchr(user, '/')) != NULL)
+ *role++ = '\0';
+#endif
+
if ((style = strchr(user, ':')) != NULL)
*style++ = '\0';
authctx...
2001 Feb 10
3
Protocol 2 remote forwarding patch
...et_send();
packet_write_wait();
- /*
- * Wait for response from the remote side. It will send a disconnect
- * message on failure, and we will never see it here.
+ /* Jarno: Server can send SSH_SMSG_FAILURE if it won't do port
+ * forwardings. Read the server reply.
*/
- packet_read_expect(&payload_len, SSH_SMSG_SUCCESS);
+ type = packet_read(&payload_len);
+ switch (type) {
+ case SSH_SMSG_SUCCESS:
+ success = 1;
+ break;
+ case SSH_SMSG_FAILURE:
+ log("Warning: Server doesn't do port forwarding.");
+ break;
+ default:
+ /* Unknown packet */
+...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...acket_send();
packet_write_wait();
- /*
- * Wait for response from the remote side. It will send a disconnect
- * message on failure, and we will never see it here.
+
+ /* Jarno: Server can send SSH_SMSG_FAILURE if it won't do port
+ * forwardings. Read the server reply.
*/
- packet_read_expect(&payload_len, SSH_SMSG_SUCCESS);
+ type = packet_read(&payload_len); /* Expect reply from server */
+ switch (type) {
+ case SSH_SMSG_SUCCESS:
+ success = 1;
+ break;
+ case SSH_SMSG_FAILURE:
+ log("Warning: Server doesn't do port forwarding.");
+ break;
+ default...
2002 May 09
0
functions : server_input_channel_req userauth_pubkey
.../* Added the following so that the real ID of the owner of
the
+ * public key used for successful authentication, can be
returned by
+ * auth_rsa.
+ */
+ char realname[40] = "unknown";
+
/* Get the name of the user that we wish to log in as. */
packet_read_expect(SSH_CMSG_USER);
@@ -411,7 +417,7 @@
* Loop until the user has been authenticated or the
connection is
* closed, do_authloop() returns only if authentication is
successful
*/
- - do_authloop(authctxt);
+ do_authloop(authctxt, realname);
/* The user ha...
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi,
I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with
FIPS 140-2 OpenSSL.
These are based on previously reported patches by Steve Marquess
<marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>,
for ver. OpenSSH 3.8.
Note that these patches are NOT OFFICIAL, and MAY be used freely by
anyone.
Issues [partially] handled:
SSL FIPS Self test.
RC4,
2003 Oct 08
4
OS/390 openssh
...nt_dh_pub);
buffer_put_bignum2(&b, server_dh_pub);
buffer_put_bignum2(&b, shared_secret);
diff -bur openssh-3.7.1p2.orig/kexdhc.c openssh-3.7.1p2/kexdhc.c
--- openssh-3.7.1p2.orig/kexdhc.c Mon Feb 24 02:06:32 2003
+++ openssh-3.7.1p2/kexdhc.c Tue Oct 7 08:22:00 2003
@@ -62,7 +62,7 @@
packet_read_expect(SSH2_MSG_KEXDH_REPLY);
/* key, cert */
- server_host_key_blob = packet_get_string(&sbloblen);
+ server_host_key_blob = packet_get_binary(&sbloblen);
server_host_key = key_from_blob(server_host_key_blob, sbloblen);
if (server_host_key == NULL)
fatal("cannot decode server_host...
2014 Jul 15
3
GSSAPI
If I am trying to build OpenSSH 6.6 with Kerberos GSSAPI support, do I still need to get Simon Wilkinson's patches?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 |
2001 Nov 20
3
problem with AFS token forwarding
Hello,
I came across an interoperability problem in OpenSSH 3.0p1 and 3.0.1p1
concerning the AFS token forwarding. That means that the new versions are
not able to exchange AFS tokens (and Kerberos TGTs) with older OpenSSH
releases (including 2.9p2) and with the old SSH 1.2.2x. In my opinion this
problem already existed in Openssh 2.9.9p1, but I have never used this
version (I only looked at the