search for: postauth

Displaying 13 results from an estimated 13 matches for "postauth".

2017 Feb 20
3
[Bug 2681] New: postauth processes to log via monitor
https://bugzilla.mindrot.org/show_bug.cgi?id=2681 Bug ID: 2681 Summary: postauth processes to log via monitor Product: Portable OpenSSH Version: 7.4p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: sshd Assignee: unassigned-bugs at mindrot.org...
2014 Aug 22
7
[Bug 2263] New: sshd privsep monitor process doesn't handle SIGXFSZ signal
https://bugzilla.mindrot.org/show_bug.cgi?id=2263 Bug ID: 2263 Summary: sshd privsep monitor process doesn't handle SIGXFSZ signal Product: Portable OpenSSH Version: 6.6p1 Hardware: All OS: Linux Status: NEW Severity: normal Priority: P5 Component: sshd
2023 Jun 09
1
Question About Dynamic Remote Forwarding
Hi all, When a client requests dynamic remote forwarding with -R it delays forking into the background. In ssh.c we see if (options.fork_after_authentication) { if (options.exit_on_forward_failure && options.num_remote_forwards > 0) { debug("deferring postauth fork until remote forward " "confirmation received"); } else fork_postauth(ssh); } This seems to depend on forwarding_success() for it to then call fork_postauth. If I'm reading this correctly the client sends out a number of forward reques...
2016 Nov 16
2
problem connecting to shares from Win7 clients - invalid NTLMSSP_MIC
...shares. Some users can connect one day but then lose the ability the next. When the problem starts to occur the log.smbd displays: =============================================== check_ntlm_password: authentication for user [user1] -> [user1] -> [MYDOMAIN\user1] succeeded ntlmssp_server_postauth: invalid NTLMSSP_MIC for user=[user1] domain=[MYDOMAIN] workstation=[MACHINE] =============================================== The file server in question is running Version 4.5.2-GIT-0d08df6 The PDC (a different server) is running Version 3.6.24-SerNet-Debian Connecting using smbclient from two o...
2024 Jul 14
1
Splitting of sshd binaries in 9.8?
I realize that the splitting of the sshd binaries is a work in progress. Nonetheless I am trying to make a diagram of the situation as of 9.8. How close have I gotten? Is it correct that currently for a basic session, binaries are run four ways? 1. A privileged binary to listen for incoming connections (66717 below) 2. A privileged session monitor to track the session, for the duration of the
2019 Aug 01
2
Working with PAM stages
Hi, I?m trying to develop a PAM module with OpenSSH, and I realized I need to retrieve something in a later stage that was saved in another previous stage. As far as my tests on OpenSSH 7.6 go, the password auth route goes through PAM auth, account, session, and the session stage is in a different UNIX process from the process where auth and account take place. For the key auth route, auth stage
2023 Jun 10
1
Question About Dynamic Remote Forwarding
...equests dynamic remote forwarding with -R it delays forking > into the background. In ssh.c we see > > if (options.fork_after_authentication) { > if (options.exit_on_forward_failure && > options.num_remote_forwards > 0) { > debug("deferring postauth fork until remote forward " > "confirmation received"); > } else > fork_postauth(ssh); > } > > > This seems to depend on forwarding_success() for it to then call > fork_postauth. > > If I'm reading this correctly th...
2016 Nov 17
0
problem connecting to shares from Win7 clients - invalid NTLMSSP_MIC
...day but then lose the ability > the next. > > When the problem starts to occur the log.smbd displays: > =============================================== >   check_ntlm_password:  authentication for user [user1] -> [user1] -> > [MYDOMAIN\user1] succeeded >   ntlmssp_server_postauth: invalid NTLMSSP_MIC for user=[user1] > domain=[MYDOMAIN] workstation=[MACHINE] > =============================================== > > The file server in question is running Version 4.5.2-GIT-0d08df6 > The PDC (a different server) is running Version 3.6.24-SerNet-Debian > > Co...
2013 Aug 14
0
HPN-SSH for OpenSSH 6.2
...TR cipher to MT-AES-CTR after authentication and then forcing a rekey. Throughput improvements of more than 50% were seen on test systems. MT-AES-CTR is cipherstream compatible with the default implementation. 2) In order to reduce the complexity of the patch sets I've finally stripped the postauth NONE cipher switching from the patchsets. It's now a standalone patch. Thanks for your time! Chris Rapier
2015 Oct 22
3
[Bug 2482] New: SELinux integration
..._t context is not used anymore (sftp runs under context of the actual user). [1] 3) The last bits so far are related to the privilege separation SELinux context (the net child is confined as sshd_net_t). 4) root logins can be also confined by SELinux, so we should not skip privilege separation in postauth phase (skipping also requires additional permissions to be available for selinux context of this user). [1] Sorry for posting all patches in one, but they are quire closely related. If there is something not clear from description, I am free to explain further the reasons behind each line. [1] ht...
2019 Jun 27
2
Does ssh need sendfd in pledge() call?
...: fd 4 setting O_NONBLOCK debug3: fd 4 is O_NONBLOCK debug3: fd 4 is O_NONBLOCK debug1: channel 0: new [/home/tbrown/.ssh/mux/192.168.1.100_22_tbrown] debug3: muxserver_listen: mux listener channel 0 fd 4 debug2: fd 3 setting TCP_NODELAY debug3: ssh_packet_set_tos: set IP_TOS 0x20 debug1: deferring postauth fork until remote forward confirmation received debug1: Entering interactive session. debug1: pledge: id debug2: set_control_persist_exit_time: schedule exit in 14400 seconds debug3: receive packet: type 80 debug1: client_input_global_request: rtype hostkeys-00 at openssh.com want_reply 0 debug3: r...
2006 Sep 14
6
sshd audit not happy with ssh1 and scp
...early on it tries to enable MONITOR_REQ_AUDIT_COMMAND in mm_answer_pwnamallow(). However, this doesn't actually work as it tries to enable it in the monitor_dispatch table (which doesn't even have a REQ_AUDIT_COMMAND in either version 1.5 or 2.0) when it needs to be enabled in the monitor_postauth table instead. So, you can either make it MON_PERMIT like above or you can fix it to not do the monitor_permit() on the passed in table, but do it on the appropriate postauth table instead. I'm using the above patch for now, but if you fix openssh I'll go with the vendor's fix once...
2011 Apr 12
1
Vpopmail and lastauth
Hello, I'm migrating many accounts to a new server with vpopmail 5.4.33 and dovecot 2.0.11. I've already vpopmail 5.4.32 and dovecot 1.2.16 on others servers running without problems. With dovecot 2.0.11 my lastauth file is not updated. This file usually is update on any access (smtp, pop3, imap) with the client's IP, for every mailbox. Now it's updated only when a client