Displaying 12 results from an estimated 12 matches for "qstvxacd".
2002 Oct 30
1
connect() timeout patch.
...vice = NULL;
options->no_host_authentication_for_localhost = - 1;
+ options->time_out = 0;
}
/*
--- ssh.c Wed Sep 18 22:05:04 2002
+++ ../openssh-3.5p1.modlwc/ssh.c Wed Oct 30 09:47:44 2002
@@ -275,7 +275,7 @@
again:
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX")) != -1) {
+ "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX:z:")) != -1) {
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -421,6 +421,9 @@
exit(1);
}
break;
+ case 'z':
+ options.time_out = atoi(optarg);
+...
2007 Aug 22
0
Patch to allow checking of v1 keys on remote host.
...r] [-F configfile]\n"
" [-i identity_file] [-L [bind_address:]port:host:hostport]\n"
" [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p port]\n"
@@ -272,7 +272,7 @@
again:
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:MNO:PR:S:TVw:XY")) != -1) {
+ "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:MNO:PR:S:TuVw:XY")) != -1) {
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -523,6 +523,9 @@
case 'F':
config = optarg;
break;
+ case 'u':
+ o...
2001 Oct 18
1
Patch for SSH-tunneling via HTTPS-proxy
...fprintf(stderr, " -b addr Local IP address.\n");
+ fprintf(stderr, " -H 'realhost:port' do HTTPS-proxy negotiation before expecting SSH-version\n");
exit(1);
}
@@ -320,7 +321,7 @@
again:
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX")) != -1) {
+ "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVXH:")) != -1) {
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -530,6 +531,9 @@
break;
case 'F':
config = optarg;
+ break;
+ case 'H':
+...
2002 Jan 27
0
[PATCH] Add an exit delay to Openssh-3.0.2p1 for use in tunneling
...mpression.\n");
fprintf(stderr, " -N Do not execute a shell or command.\n");
fprintf(stderr, " -g Allow remote hosts to connect to forwarded ports.\n");
@@ -312,7 +313,7 @@
again:
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX")) != -1) {
+ "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:S:TVX")) != -1) {
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -487,7 +488,13 @@
add_remote_forward(&options, fwd_port, buf,
fwd_host_port);
break;
-
+...
2001 Sep 28
1
[PATCH] fix for Linux hang on exit bug in 2.9.9p2
...mpression.\n");
fprintf(stderr, " -N Do not execute a shell or command.\n");
fprintf(stderr, " -g Allow remote hosts to connect to forwarded ports.\n");
@@ -320,7 +321,7 @@
again:
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX")) != -1) {
+ "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:S:TVX")) != -1) {
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -495,7 +496,13 @@
add_remote_forward(&options, fwd_port, buf,
fwd_host_port);
break;
-
+...
2002 Apr 22
9
Password from open filedescriptor
...for sessions with a pty (default:
.Ql ~ ) .
diff -bur openssh-3.1p1.org/ssh.c openssh-3.1p1/ssh.c
--- openssh-3.1p1.org/ssh.c Tue Feb 19 05:20:58 2002
+++ openssh-3.1p1/ssh.c Mon Apr 22 10:13:55 2002
@@ -312,7 +312,7 @@
again:
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX")) != -1) {
+ "1246ab:c:e:d:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX")) != -1) {
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -522,6 +522,9 @@
break;
case 'F':
config = optarg;
+ break;
+ case 'd':
+ optio...
2001 Nov 14
6
[PATCH]: Patch to fix hang on exit bug under Linux and add optional exit delay
...mpression.\n");
fprintf(stderr, " -N Do not execute a shell or command.\n");
fprintf(stderr, " -g Allow remote hosts to connect to forwarded ports.\n");
@@ -320,7 +321,7 @@
again:
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX")) != -1) {
+ "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:S:TVX")) != -1) {
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -495,7 +496,13 @@
add_remote_forward(&options, fwd_port, buf,
fwd_host_port);
break;
-
+...
2004 Nov 20
1
[Bug 955] ssh -h " Displayed as illegal options " in SSH 3.9
...ame] [-m mac_spec] [-o option]
[-p port] [-R port:host:hostport] [-S ctl] [user@]hostname [command]
To avoid this we have include the 'h' character in getopt( ) as given below
In ssh.c #
242 while ((opt = getopt(ac, av,
243 "1246ab:c:e:fgi:hkl:m:no:p:qstvxACD:F:I:L:MNPR:S:TVXY")) != -1) {
244 switch (opt) {
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
...fprintf(stderr, " -S Don't use stenographic timing
manipulation\n");
exit(1);
}
@@ -319,8 +346,9 @@
host = NULL;
again:
+ /* SD Mod: add s option to getopt() call */
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:TVX")) != -1) {
+ "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:L:NPR:STVX")) != -1)
{
switch (opt) {
case '1':
options.protocol = SSH_PROTO_1;
@@ -525,6 +553,14 @@
case 's':...
2001 Oct 06
1
Defeating Timing Attacks
Hello,
In response to the timing analysis attacks presented by Dawn Song et.
al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html
we
at Silicon Defense developed a patch for openssh to avoid such
measures.
Timing Analysis Evasion changes were developed by C. Jason Coit and Roel
Jonkman of Silicon Defense.
These changes cause SSH to send packets unless request not to,
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
...[-F
configfile]\n"
" [-i identity_file] [-L
[bind_address:]port:host:hostport]\n"
" [-l login_name] [-m mac_spec] [-O ctl_cmd] [-o option] [-p
port]\n"
@@ -272,8 +292,13 @@
again:
while ((opt = getopt(ac, av,
- "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:KL:MNO:PR:S:TVw:XY")) !=
-1) {
+ "1246ab:c:e:fgi:kl:m:no:p:qstvxACD:F:I:KL:MNO:PR:S:TVw:X"
FIPS_OPTS "Y")) != -1) {
switch (opt) {
+#ifdef OPENSSL_FIPS
+ case 'y':
+ fips_mode = 0;
+ break;
+#endif...
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly:
http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html
<quote>
The paper concludes that the keystroke timing data observable from
today's SSH implementations reveals a dangerously significant amount of
information about user terminal sessions--enough to locate typed
passwords in the session data stream and reduce the