search for: pty_setowner

Displaying 12 results from an estimated 12 matches for "pty_setowner".

2014 Aug 27
1
pty_setowner and tty permissions
Hi, while looking into Cygwin's tty code, I stumbled over this problem: Every time you log in to Cygwin via sshd, the pty's permissions are set like this: $ ls -l `tty` crw--w--w- 1 user group 136, 2 Aug 27 13:06 /dev/pty2 Since Cygwin sets the permissions more tight to begin with, I was wondering why the permissions are this open. Turns out, sshd sets them like this:
2001 Sep 28
1
openssh-2.9.9p2 assumes pid_t, uid_t, etc. are not 'long'
...d_seedfile): Likewise. * serverloop.c (server_loop, server_loop2): Likewise. * session.c (session_dump, session_by_pid, session_exit_message, session_close_by_pid, session_have_children, session_close_by_channel): Likewise. * ssh-agent.c, sshd.c (main): Likewise. * sshpty.c (pty_setowner): Likewise. * uidswap.c: (temporarily_use_uid): Likewise. =================================================================== RCS file: authfile.c,v retrieving revision 2.9.9.2 retrieving revision 2.9.9.2.0.1 diff -pu -r2.9.9.2 -r2.9.9.2.0.1 --- authfile.c 2001/09/23 13:53:22 2.9.9.2 +++ authfile...
2007 Dec 21
17
[Bug 1419] New: Fix PTY handling on Mac OS X
https://bugzilla.mindrot.org/show_bug.cgi?id=1419 Summary: Fix PTY handling on Mac OS X Classification: Unclassified Product: Portable OpenSSH Version: 4.7p1 Platform: Other OS/Version: Mac OS X Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo: bitbucket at mindrot.org
2002 Feb 18
0
[Bug 120] New: sshd fails pty chown() when run as non-root userid
...Component: sshd AssignedTo: openssh-unix-dev at mindrot.org ReportedBy: idallen at freenet.carleton.ca I have to run a private copy of sshd (on AIX) as non-root because the local admin won't install the real thing. As non-root, I can't chown() ptys. The sshd function pty_setowner() fails and so does sshd when I try an interactive (shell) login. The chown() should not be attempted if sshd is running as non-root. (All the occurrences of chown() in sshpty.c need this checking.) ------- You are receiving this mail because: ------- You are the assignee for the bug, or are wa...
2008 Jul 28
0
PTY allocation without being root
...magine this is not the right way to do it. I predict this breaks badly when the unprivileged process is chroot'ed. I think a better approach would be to switch to the actual user somewhere inside pty_allocate(). If we would call openpty() by the proper user, we wouldn't need functions like pty_setowner(), because openpty() already sets the proper permissions then. There's no rush in implementing this, but I think it would be cool if OpenSSH would honour this behaviour. Thanks! -- Ed Schouten <ed at FreeBSD.org> -------------- next part -------------- A non-text attachment was scrubb...
2014 Dec 28
2
Compiling a static openssh server
...e glibc version used for linking groupaccess.o: In function `ga_init': /home/john/Downloads/openssh-6.6p1/groupaccess.c:70: warning: Using 'getgrgid' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking sshpty.o: In function `pty_setowner': /home/john/Downloads/openssh-6.6p1/sshpty.c:211: warning: Using 'getgrnam' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking session.o: In function `do_setusercontext': /home/john/Downloads/openssh-6.6p1/session.c:15...
2000 May 31
3
Solaris utmp problems
Could all those who were having problems with utmp logging on Solaris please try the test release at: http://violet.ibs.com.au/openssh/files/test/openssh-TEST-2000053100.tar.gz Users on other platforms, particularly HP/UX, AIX and SCO are invited as well, to test compatibility. The login code is heaps cleaner now. -d -- | "Bombay is 250ms from New York in the new world order" -
2012 Mar 06
6
openssh static build - mission impossible?
...glibc version used for linking groupaccess.o: In function `ga_init': /builddir/build/BUILD/openssh-5.6p1/groupaccess.c:69: warning: Using 'getgrgid' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking sshpty.o: In function `pty_setowner': /builddir/build/BUILD/openssh-5.6p1/sshpty.c:211: warning: Using 'getgrnam' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking session.o: In function `do_setusercontext': /builddir/build/BUILD/openssh-5.6p1/session.c:...
2001 Feb 01
0
warnings on aix325
...file': auth-rhosts.c:110: warning: implicit declaration of function `innetgr' auth-rhosts.c:113: warning: implicit declaration of function `strcasecmp' pty.c: In function `pty_make_controlling_tty': pty.c:222: warning: implicit declaration of function `ioctl' pty.c: In function `pty_setowner': pty.c:312: warning: int format, long int arg (arg 3) pty.c:312: warning: int format, long int arg (arg 4) pty.c:315: warning: unsigned int format, mode_t arg (arg 3) log-server.c: In function `do_log': log-server.c:174: warning: implicit declaration of function `openlog' log-server.c:...
2018 Apr 11
9
[Bug 2856] New: key-options.sh fails when pty /dev/ttyp1 is not owned by testing user
https://bugzilla.mindrot.org/show_bug.cgi?id=2856 Bug ID: 2856 Summary: key-options.sh fails when pty /dev/ttyp1 is not owned by testing user Product: Portable OpenSSH Version: 7.6p1 Hardware: ix86 OS: NetBSD Status: NEW Severity: minor Priority: P5 Component:
2003 Oct 28
2
Privilege separation
...w_uid, get_remote_name_or_ip(utmp_len, options.use_dns), @@ -1668,7 +1670,9 @@ * time in case we call fatal() (e.g., the connection gets closed). */ fatal_add_cleanup(session_pty_cleanup, (void *)s); +#ifndef DISABLE_PRIVSEP if (!use_privsep) +#endif /* DISABLE_PRIVSEP */ pty_setowner(s->pw, s->tty); /* Set window size from the packet. */ diff -adurN openssh-3.7.1p2.privsep/sshd.c openssh-3.7.1p2/sshd.c --- openssh-3.7.1p2.privsep/sshd.c Tue Sep 2 16:51:17 2003 +++ openssh-3.7.1p2/sshd.c Sat Oct 4 23:44:14 2003 @@ -197,9 +197,11 @@ int *startup_pipes = NULL; int st...
2020 May 12
9
Call for testing: OpenSSH 8.3
Hi, OpenSSH 8.3p1 is almost ready for release, so we would appreciate testing on as many platforms and systems as possible. This is a bugfix release. Snapshot releases for portable OpenSSH are available from http://www.mindrot.org/openssh_snap/ The OpenBSD version is available in CVS HEAD: http://www.openbsd.org/anoncvs.html Portable OpenSSH is also available via git using the instructions at