Displaying 20 results from an estimated 44 matches for "padlen".
1999 Dec 10
0
snprintf from postgresql
...lag);
break;
case '%':
dopr_outch(ch);
continue;
default:
dostr("???????", 0);
}
break;
default:
dopr_outch(ch);
break;
}
}
*output = 0;
}
static void
fmtstr(char *value, int ljust, int len, int zpad, int maxwidth)
{
int padlen,
strlen; /* amount to pad */
if (value == 0)
value = "<NULL>";
for (strlen = 0; value[strlen]; ++strlen); /* strlen */
if (strlen > maxwidth && maxwidth)
strlen = maxwidth;
padlen = len - strlen;
if (padlen < 0)
padlen = 0;
if (ljust)
padlen = -pad...
2000 Jan 06
1
bsd-snprintf.c and NeXT.
I'm wonder if anyone happens to have a simplier (slower) version of
bsd-snprintf.c. It seems NeXT 3.3 (unsure about 4.2) is missing
mprotect().
If I could get something to replace that for a while and fix some of
theses utmp in login.c issues I may have a rough port NeXT to black
hardware.=)
Thanks
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly:
http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html
<quote>
The paper concludes that the keystroke timing data observable from
today's SSH implementations reveals a dangerously significant amount of
information about user terminal sessions--enough to locate typed
passwords in the session data stream and reduce the
2016 May 02
6
[Bug 2566] New: 2 integer overflows in function ssh_packet_send2_wrapped()
...certain values of extra_pad,
block_size and len. Firstly, the computation roundup(state->extra_pad,
block_size) can return 0 for certain values of extra_pad and
block_size. This causes state->extra_pad = 0 but this variable is used
subsequently in a modular operation. Secondly, the assignment padlen +=
pad might overflow for certain values of extra_pad, padlen and
block_size. This can cause the length of the padding appended to the
outgoing packet to be strictly less than 4; because no sanity check on
the padding length follows the adding of extra padding.
The computation roundup(state->e...
2005 Mar 16
1
openssh-3.8.1p1, with pthreads enabled, hung in pthread_join.
...wait a min or so, long enough for the "Timeout before
authentication for %s" alarm to trigger. If at that point I enter my
password ssh will just sit there:
debug2: input_userauth_info_req
debug2: input_userauth_info_req: num_prompts 1
Password:
debug3: packet_send2: adding 32 (len 18 padlen 14 extra_pad 64)
And the sshd will be in this state:
Attaching to program: `/private/tmp/OpenSSH.roots/OpenSSH~obj/sshd',
process 26589.
Reading symbols for shared libraries ...................... done
0x9002cf88 in semaphore_wait_trap ()
(gdb) bt
#0 0x9002cf88 in semaphore_wait_trap ()
#1...
2008 Sep 12
4
Custom build kernel patch fails big time.
...+ if (unlikely(optlen)) {
+ struct ip_beet_phdr *ph;
+
+ BUG_ON(optlen < 0);
+
+ ph = (struct ip_beet_phdr *)skb->h.raw;
+ ph->padlen = 4 - (optlen & 4);
+ ph->hdrlen = (optlen + ph->padlen +
sizeof(*ph)) / 8;
+ ph->nexthdr = iphv4->protocol;
+ top_iphv4->protocol = IPPROTO_BEETPH;
+ top_iphv4->ihl = sizeof(struct ip...
2004 Jun 17
2
SSH_MSG_USERAUTH_PASSWD_CHANGEREQ and 3.1.0 F-SECURE SSH - Proces s Software SSH for OpenVMS
...guage tag as defined in [RFC3066]
...
</snip>
I tested with the OpenBSD ssh client and portable ssh in cygwin.
It specifically doesn't send the language tag. Here is the tail of ssh -vvv,
<snip>
debug1: Next authentication method: password
debug3: packet_send2: adding 64 (len 58 padlen 6 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug2: input_userauth_passwd_changereq
buffer_get: trying to get more bytes 4 than in buffer 0
</snip>
I stepped through in the debugger to see that I do get the password change
prompt and then we barf when we try to get the...
2002 Mar 11
1
Problem ssh: Permission denied
...sable: no info_req_seen
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred:
debug3: authmethod_is_enabled password
debug1: next auth method to try is password
root at 192.168.100.1's password:
debug1: packet_send2: adding 48 (len 61 padlen 19 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug1: authentications that can continue: publickey,password,keyboard-interactive
Permission denied, please try again.
root at 192.168.100.1's password:
debug1: packet_send2: adding 48 (len 61 padlen 19 extra_pad 64)
debug2: w...
2009 Sep 22
2
Problems using sftp on HMC IBM system
...nabled keyboard-interactive
debug1: Next authentication method: keyboard-interactive
debug2: userauth_kbdint
debug2: we sent a keyboard-interactive packet, wait for reply
debug2: input_userauth_info_req
debug2: input_userauth_info_req: num_prompts 1
Password:
debug3: packet_send2: adding 32 (len 22 padlen 10 extra_pad 64)
debug2: input_userauth_info_req
debug2: input_userauth_info_req: num_prompts 0
debug3: packet_send2: adding 48 (len 10 padlen 6 extra_pad 64)
debug1: Authentication succeeded (keyboard-interactive).
debug2: fd 4 setting O_NONBLOCK
debug3: fd 5 is O_NONBLOCK
debug1: channel 0: new [...
2012 Sep 30
2
User can't use SFTP after chroot
...g to localhost...
sam at localhost's password:
Couldn't read packet: Connection reset by peer
--
If I remove sam from the users group, he can SFTP fine, but isn't chrooted.
Using -vvv, I get the following:
-----
sam at localhost's password:
debug3: packet_send2: adding 64 (len 56 padlen 8 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug3: Wrote 144 bytes for a total of 1639
debug1: Authentication succeeded (password).
debug2: fd 4 setting O_NONBLOCK
debug3: fd 5 is O_NONBLOCK
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
deb...
2015 Jan 28
0
[Bug 1213] ssh-keyscan exits in mid-way
...bove comment), and got this error two-for-two:
[...]
# blarg.internal.example.com SSH-2.0-OpenSSH_5.2
# blarg.internal.example.com SSH-2.0-OpenSSH_5.2
Received disconnect from A.B.C.D: 11: Logged out.
# xyzzy.internal.example.com SSH-2.0-OpenSSH_5.8
Disconnecting: Corrupted padlen 0 on input.
(exit status 255)
I can try again with -current if that ought to work differently...
--
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
2004 Aug 21
1
openssh-unix-dev Digest, Vol 16, Issue 9
...2: load_server_config: filename /opt/ssh/etc/sshd_config
debug2: load_server_config: done config len = 331
debug2: parse_server_config: config /opt/ssh/etc/sshd_config len 331
ssh:
debug2: input_userauth_info_req
debug2: input_userauth_info_req: num_prompts 0
debug3: packet_send2: adding 48 (len 10 padlen 6 extra_pad 64)
debug1: Authentication succeeded (keyboard-interactive).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
--
Michael
2003 Aug 06
1
Reg. openssh-3.51p1/packet.c (function packet_send2())
...lculates (8 - (150 % 8) = 2). Since
this is less than 4 bytes, it adds another 8 bytes of padding to allow 10
bytes of pading.
2. The packet length is correctly calculated as 0x9c (=156), and the
padding length is correctly calculated as 0x0a (=10) in the below output.
send: len 160 (includes padlen 10)
0000 009c 0a5e 0000 0000 0000 0088 7eff
0300 2145 0000 8000 0040 0040 11bb 89c0
a8fe c8c0 a8fe c994 7194 7000 6cf5 4000
0000 02c6 2e31 3f11 4d07 0053 5353 5353
5353 5353 5353 5353 5353 5353 5353 5353
5353 5353 5353 5353 5353 5353 5353 5353
5353 5353 5353 5353 5353 5353 5353 5353
5353 5353 5353...
2008 Aug 27
1
5.1p1 doesn't work, 5.0p1 works fine
...ferred: ,keyboard-interactive,password
debug3: authmethod_is_enabled password
debug1: Next authentication method: password
admin at router's password:
^
The password prompt works fine and blocks wrong passwords properly.
This is a failed connection ->
debug3: packet_send2: adding 56 (len 61 padlen 11 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug1: Authentication succeeded (password).
debug2: fd 5 setting O_NONBLOCK
debug3: fd 6 is O_NONBLOCK
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug1: Requestin...
2008 Apr 15
0
ChrootDirectory - SFTP subsystem works fine but SSH hangs
...not use
chroot, using SFTP and SSH.
I guess for an interactive SSH session I may be missing some required
system files inside the jail- but I really only need SFTP for this account.
Thanks
Simon
The last ouput from the ssh -vvv command is below:-
debug3: packet_send2: adding 48 (len 63 padlen 17 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug1: Authentication succeeded (password).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug1: Entering interactive session.
debug2: callback start
debug2: client_...
2002 Oct 01
1
ssh with iptables and equalize
...info_req_seen
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred:
debug3: authmethod_is_enabled password
debug1: next auth method to try is password
mkhurana at unix1.andrew.cmu.edu's password:
debug1: packet_send2: adding 48 (len 62 padlen 18 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug1: ssh-userauth2 successful: method password
debug3: clear hostkey 0
debug3: clear hostkey 1
debug3: clear hostkey 2
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug1: send channel open 0...
2005 Mar 02
0
Ssh / sft /scp password problems, agent runs fine
...nabled keyboard-interactive
debug1: Next authentication method: keyboard-interactive
debug2: userauth_kbdint
debug2: we sent a keyboard-interactive packet, wait for reply
debug2: input_userauth_info_req
debug2: input_userauth_info_req: num_prompts 1
Password:
debug3: packet_send2: adding 32 (len 24 padlen 8 extra_pad 64)
debug2: input_userauth_info_req
debug2: input_userauth_info_req: num_prompts 0
debug3: packet_send2: adding 48 (len 10 padlen 6 extra_pad 64)
debug1: Authentication succeeded (keyboard-interactive).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
de...
2010 Dec 31
2
happy new years ssh key problem :)
...disable: no info_req_seen
debug2: we did not send a packet, disable method
debug3: authmethod_lookup password
debug3: remaining preferred:
debug3: authmethod_is_enabled password
debug1: Next authentication method: password
amandabackup at lb1's password:
debug3: packet_send2: adding 48 (len 67 padlen 13 extra_pad 64)
debug2: we sent a password packet, wait for reply
debug1: Authentication succeeded (password).
Authenticated to lb1 ([192.168.1.23]:22).
debug1: channel 0: new [client-session]
debug3: ssh_session2_open: channel_new: 0
debug2: channel 0: send open
debug1: Requesting no-more-session...
2002 Nov 25
2
weird behaviour of commands option : bug or not ?
Hello
I think I've found a bug but since no one replied to me on comp.security.ssh,
I'll try my luck here.
On my client, PreferredAuthentications is set to publickey,password.
When using the commands option in authorized_keys file like
command="ls" ssh-dss <key>... it is supposed to connect using the private key
associated with <key>, perform ls and then quits.
2002 Jun 14
0
[Bug 277] New: X11 forwarding problem behind Router/NAT box
...password,keyboard-interactive
debug1: next auth method to try is keyboard-interactive
debug1: authentications that can continue:
publickey,password,keyboard-interactive
debug1: next auth method to try is password
ballen at dirac.phys.uwm.edu's password:
debug1: packet_send2: adding 64 (len 60 padlen 4 extra_pad 64)
debug1: ssh-userauth2 successful: method password
debug1: channel 0: new [client-session]
debug1: send channel open 0
debug1: Entering interactive session.
debug1: ssh_session2_setup: id 0
debug1: channel request 0: pty-req
debug1: Requesting X11 forwarding with authentication spoof...