search for: readset

Displaying 20 results from an estimated 63 matches for "readset".

Did you mean: headset
2020 Oct 14
2
Connection hang, can't stop SSH
Using OpenSSH_8.3p1 I had an open (working) connection to some other box; after a bit of inactivity, some device in the middle seems to have forgotten about the TCP connection (NAT) and broke it. I've got an EscapeChar defined, though; so first I tried to send a BREAK and, when that didn't help (TCP already gone, packets get lost!), I tried (just out of curiosity) a Rekey. Now I can see
2012 Oct 22
1
[PATCH] Implement remote dynamic TCP forwarding
...el_open_message(void) case SSH_CHANNEL_OPENING: case SSH_CHANNEL_CONNECTING: case SSH_CHANNEL_DYNAMIC: + case SSH_CHANNEL_RDYNAMIC: case SSH_CHANNEL_OPEN: case SSH_CHANNEL_X11_OPEN: case SSH_CHANNEL_INPUT_DRAINING: @@ -1033,14 +1038,23 @@ channel_decode_socks4(Channel *c, fd_set *readset, fd_set *writeset) u_int16_t dest_port; struct in_addr dest_addr; } s4_req, s4_rsp; + Buffer *input, *output; + + if (c->type == SSH_CHANNEL_RDYNAMIC) { + input = &c->output; + output = &c->input; + } else { + input = &c->input; + output = &c->output; + }...
2007 Jan 16
11
[Bug 52] ssh hangs on exit
http://bugzilla.mindrot.org/show_bug.cgi?id=52 dtucker at zip.com.au changed: What |Removed |Added ---------------------------------------------------------------------------- OtherBugsDependingO| |1274 nThis| | ------- You are receiving this mail because: ------- You are the assignee for
2001 Oct 31
2
suggested fix for the sigchld race
...ipe[0] = -1; /* read end */ + notify_pipe[1] = -1; /* write end */ + } else { + set_nonblock(notify_pipe[0]); + set_nonblock(notify_pipe[1]); + } +} +static void +notify_parent(void) +{ + if (notify_pipe[1] != -1) + write(notify_pipe[1], "", 1); +} +static void +notify_prepare(fd_set *readset) +{ + if (notify_pipe[0] != -1) + FD_SET(notify_pipe[0], readset); +} +static void +notify_done(fd_set *readset) +{ + char c; + + if (notify_pipe[0] != -1 && FD_ISSET(notify_pipe[0], readset)) + while (read(notify_pipe[0], &c, 1) != -1) + debug2("notify_done: reading"); +}...
2000 Mar 03
7
[PATCH] Add a Maximum Idle Time (1.2.2)
...part -------------- diff -ur openssh-1.2.2/clientloop.c openssh-1.2.2-trans_inter/clientloop.c --- openssh-1.2.2/clientloop.c Mon Dec 6 20:38:32 1999 +++ openssh-1.2.2-trans_inter/clientloop.c Fri Mar 3 11:21:12 2000 @@ -396,8 +396,10 @@ */ void -client_wait_until_can_do_something(fd_set * readset, fd_set * writeset) +client_wait_until_can_do_something(fd_set * readset, fd_set * writeset, int trans_inter) { + int select_return; + /* Initialize select masks. */ FD_ZERO(readset); @@ -436,15 +438,32 @@ max_fd = channel_max_fd(); /* - * Wait for something to happen. This will sus...
2001 Oct 25
2
SIGCHLD race *trivial* patch
...", (int) max_time_milliseconds / + 1000, (int) 1000 * (max_time_milliseconds % 1000)); } if (tvp!=NULL) debug3("tvp!=NULL kid %d mili %d", child_terminated, max_time_milliseconds); /* Wait for something to happen, or the timeout to expire. */ ret = select((*maxfdp)+1, *readsetp, *writesetp, NULL, tvp); + debug("select() returned %d, child_terminated=%d, channel_still_open() returned %d", ret, + child_terminated, channel_still_open()); if (ret == -1) { if (errno != EINTR) @@ -590,6 +597,8 @@ /* Sleep in select() until we can do something. */ wait_u...
2007 Aug 13
0
[PATCH] Use default item separator for lists.
...+++++++++------------ 1 files changed, 12 insertions(+), 12 deletions(-) diff --git a/settings-backend/kconfig_backend.cpp b/settings-backend/kconfig_backend.cpp index a68e270..43d66e5 100644 --- a/settings-backend/kconfig_backend.cpp +++ b/settings-backend/kconfig_backend.cpp @@ -595,7 +595,7 @@ readSetting (CCSContext *c, case TypeString: { - QStringList list = cfg->readListEntry (key, ';'); + QStringList list = cfg->readListEntry (key); if (!list.count() ) break; @@ -628,7 +628,7 @@ readSetting (CCSContext *c, case TypeMatch: { - QS...
2003 Jun 25
1
socks5 support for -D
...ks5 header */ +#define SSH_SOCKS5_AUTHDONE 0x1000 +#define SSH_SOCKS5_NOAUTH 0x00 +#define SSH_SOCKS5_IPV4 0x01 +#define SSH_SOCKS5_DOMAIN 0x03 +#define SSH_SOCKS5_IPV6 0x04 +#define SSH_SOCKS5_CONNECT 0x01 +#define SSH_SOCKS5_SUCCESS 0x00 + +static int +channel_decode_socks5(Channel *c, fd_set * readset, fd_set * writeset) +{ + struct { + u_int8_t version; + u_int8_t command; + u_int8_t reserved; + u_int8_t atyp; + } s5_req, s5_rsp; + u_int16_t dest_port; + u_char *p, dest_addr[255+1]; + int i, have, found, nmethods, addrlen, af; + + debug2("channel %d: decode socks5", c->self); +...
2001 Mar 26
1
duplicated lines in serverloop.c? (openssh252p2)
...rce, and I noticed that the following code appears twice in the file serverloop.c. Is it supposed to, and if not, would there be any ill effect? +289 +290 /* Read and buffer any available stdout data from the program. */ +291 if (!fdout_eof && FD_ISSET(fdout, readset)) { +292 len = read(fdout, buf, sizeof(buf)); +293 if (len < 0 && (errno == EINTR || errno == EAGAIN)) { +294 /* do nothing */ +295 } else if (len <= 0) { +296 fdout_eof...
2008 Jun 19
5
Portforwarding using the control master.
Hi all, currently I am considering writing a patch for OpenSSH that will allow portforwarding using the control_master unix domain socket. The idea is to introduce an extra SSHMUX command, SSHMUX_COMMAND_SOCKS, which will then pass control to the normal socks functions used for dynamic forwarding. The main reason for me to write this patch are: - some more control over who gets to connect to
2001 Oct 10
7
OpenSSH solaris: bad return code after exec of remote command
Hi OpenSSH developers, I am using openSSH (now 2.9.9p2, but prob occurs in 2.9p2 also) to execute commands on a remote machine which outputs data to stdout then pipes it to another invocation of ssh which connects back to the first machine in the same way, where it starts a program to read and store the output from the command on the second machine. I am using the "command" option in
2001 Oct 24
2
disable features
...CPFWD /* helper */ static void port_open_helper(Channel *c, char *rtype); +#endif /* -- channel core */ @@ -678,6 +683,7 @@ chan_fn *channel_pre[SSH_CHANNEL_MAX_TYPE]; chan_fn *channel_post[SSH_CHANNEL_MAX_TYPE]; +#ifdef WITH_TCPFWD static void channel_pre_listener(Channel *c, fd_set * readset, fd_set * writeset) { @@ -690,7 +696,9 @@ debug3("channel %d: waiting for connection", c->self); FD_SET(c->sock, writeset); } +#endif +#ifdef WITH_PROTO13 static void channel_pre_open_13(Channel *c, fd_set * readset, fd_set * writeset) { @@ -699,6 +707,7 @@ if (buffer_l...
2001 Feb 22
3
intermittent stderr
The command "ssh ls -l /doesnotexist" gives various responses: Running from a 200 MHz PentiumPro with dsa key added to ssh-agent: Mistakes worst to fast machine: To a faster 600 MHz dual processor i686 600 MHz machine: ls: /doesnotexist: No such file or directory -- correct nothing at all -- wrong ls: select: Bad file descriptor -- wrong
2007 Mar 23
7
4.6p1 chan_read_failed error
The 4.6p1 sshd is logging this error during remote commands or file transfers: error: channel 0: chan_read_failed for istate 3 Platform is Solaris 8, 4.6p1 + OpenSSL 0.9.8d. The commands and transfers work correctly, so the error message appears to be spurious. The error message does not appear when processing logins. Otherwise 4.6p1 is running without any apparent problems. This error
2006 Nov 27
5
[Bug 52] ssh hangs on exit
http://bugzilla.mindrot.org/show_bug.cgi?id=52 dtucker at zip.com.au changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #1075 is|0 |1 obsolete| | Attachment #1098 is|0 |1 obsolete|
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
...becomes available on * one of the file descriptors). */ - -static void +/* + * SD Mod: We changed the return value of client_wait_until_can_do_something + * from void to int. It now returns 1 if the steno_timer has expired and 0 if not. + */ +int client_wait_until_can_do_something(fd_set **readsetp, fd_set **writesetp, int *maxfdp, int *nallocp, int rekeying) { + /* SD Mod: added variable steno_timer */ + static struct timeval steno_timer = {0, 50000}; + + int return_val = 0; + long int prev_timer_val = 0; + /* Add any selections by the channel mechani...
2009 Jul 07
1
Read buffer size in clientloop.c
Hi, when trying to optimize socket transfer rates under Cygwin, it turned out that the underlying WinSock implementation is surprisingly sensitive to buffer sizes. The latest Cygwin from CVS is now setting the socket receive/send buffers (SO_RCVBUF/SO_SNDBUF) to 64K, rather than keeping them at their default values of 8K which thwarts data transfers a lot. While testing I still had the problem
2009 Jan 06
3
[Bug 1548] New: Double free in OpenSSH clientloop.c/xmalloc.c via cmdline port forwarding
...es (c=0xb8235240, bin=0xb8235280, bout=0xb8235290 , berr=0xb82352a0, buf=0xbf9efda8 "C", len=1) at ../clientloop.c:882 #8 0xb7fba94d in client_simple_escape_filter (c=0x651c, buf=0xbf9efda8 "C", len =1) at ../clientloop.c:1281 #9 0xb7fcc965 in channel_handle_rfd (c=0xb8235240, readset=<value optimized out >, writeset=0xb8234df0) at ../channels.c:1522 #10 0xb7fcce65 in channel_post_open (c=0xb8235240, readset=0xb8233828, writeset= 0xb8234df0) at ../channels.c:1729 #11 0xb7fd0e1b in channel_handler (ftab=0xb7ffd680, readset=0xb8233828, writeset =0xb8234df0) at ../channels.c:...
2001 Oct 06
1
Defeating Timing Attacks
Hello, In response to the timing analysis attacks presented by Dawn Song et. al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html we at Silicon Defense developed a patch for openssh to avoid such measures. Timing Analysis Evasion changes were developed by C. Jason Coit and Roel Jonkman of Silicon Defense. These changes cause SSH to send packets unless request not to,
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly: http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html <quote> The paper concludes that the keystroke timing data observable from today's SSH implementations reveals a dangerously significant amount of information about user terminal sessions--enough to locate typed passwords in the session data stream and reduce the