search for: recv_rexec_st

Displaying 10 results from an estimated 10 matches for "recv_rexec_st".

2023 Feb 13
4
[Bug 3539] New: sshbuf memory leak in recv_rexec_state()
https://bugzilla.mindrot.org/show_bug.cgi?id=3539 Bug ID: 3539 Summary: sshbuf memory leak in recv_rexec_state() Product: Portable OpenSSH Version: 9.1p1 Hardware: All OS: All Status: NEW Severity: normal Priority: P5 Component: sshd Assignee: unassigned-bugs at mindrot.org Reporter: mbr at cipher...
2011 Sep 25
0
sshd 5.6p1 does not accept connections in fips mode
...ning on 0.0.0.0 port 2222. debug3: fd 5 is not O_NONBLOCK debug1: Server will not fork when running in debugging mode. debug3: send_rexec_state: entering fd = 8 config len 164 debug3: ssh_msg_send: type 0 debug3: send_rexec_state: done debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 8 debug3: recv_rexec_state: entering fd = 5 debug3: ssh_msg_recv entering debug3: recv_rexec_state: done debug2: parse_server_config: config rexec len 164 debug3: rexec:111 setting Subsystem sftp /local/fips/libexec/sftp-server ***IN FIPS MODE*** debug1: sshd version OpenSSH_5.6p1 debug3: Not a RSA1 key file /local/fips/...
2012 Jan 28
1
PATCH: Support for encrypted host keys
...); + for (i = 0; i < options.num_host_key_files; i++) { + if (sensitive_data.host_keys[i] != NULL) + buffer_put_key(&m, sensitive_data.host_keys[i]); + } + if (ssh_msg_send(fd, 0, &m) == -1) fatal("%s: ssh_msg_send failed", __func__); @@ -946,8 +962,10 @@ static void recv_rexec_state(int fd, Buffer *conf) { Buffer m; + Key *hk; char *cp; u_int len; + int i, num_host_keys; debug3("%s: entering fd = %d", __func__, fd); @@ -981,6 +999,30 @@ recv_rexec_state(int fd, Buffer *conf) rexec_recv_rng_seed(&m); #endif + num_host_keys = buffer_get_int(&am...
2006 Feb 14
15
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #5 from dtucker at zip.com.au 2006-02-14 22:17 ------- Also, what compiler did you use to compile OpenSSH? If you compile OpenSSH (and openssl and zlib if possible) with optimization disabled (-O0) does the error still occur? ------- You are receiving this mail because: ------- You are the assignee for the bug, or are
2012 Jun 16
1
[Bug 2019] New: After a possible buffer overflow attack sshd does not accept connections any longer.
...29: error: reexec socketpair: Interrupted system call 15:04:29: error: ssh_msg_recv: read: header 15:04:29: mountd: mount (version 3) attempt failed for /home2/refpos request from <IP Address> Subsequent messages in the log 15:06:54: sshd: error: ssh_msg_recv: read: header 15:06:54: fatal: recv_rexec_state: ssh_msg_recv failed -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug.
2006 Apr 21
4
Solaris 8 x86 rsa pubkey auth problem
...192.168.10.10 port 22. debug1: fd 5 clearing O_NONBLOCK debug1: Server will not fork when running in debugging mode. debug3: send_rexec_state: entering fd = 10 config len 226 debug3: ssh_msg_send: type 0 debug3: send_rexec_state: done debug1: rexec start in 5 out 5 newsock 5 pipe -1 sock 10 debug3: recv_rexec_state: entering fd = 5 debug3: ssh_msg_recv entering debug3: recv_rexec_state: done debug2: parse_server_config: config rexec len 226 debug1: sshd version OpenSSH_4.3p1 debug3: Not a RSA1 key file /usr/pkg/etc/ssh/ssh_host_rsa_key. debug1: read PEM private key done: type RSA debug1: private host key:...
2005 Nov 17
3
4.2 and the 'last' command
We've run into an interesting dilemma regarding last log information and ssh 4.2p1. In 3.8, we didn't see this problem, but now has cropped up in 4.2. When a user logs in, sshd seems to call 'last' to get the last log information. 'last' then opens the /var/log/wtmp file and processes the information. On some systems, this file can be quite large, and we're seeing
2023 Jun 30
1
Subsystem sftp invoked even though forced command created
On 30/06/2023 09:56, Damien Miller wrote: > It's very hard to figure out what is happening here without a debug log. > > You can get one by stopping the listening sshd and running it manually > in debug mode, e.g. "/usr/sbin/sshd -ddd" Or starting one in debug mode on a different port, e.g. "-p99 -ddd"
2005 Jan 17
19
[Bug 973] sshd behaves differently while doing syslog entries for tcpwrappers denied message, with -r and without -r option.
http://bugzilla.mindrot.org/show_bug.cgi?id=973 Summary: sshd behaves differently while doing syslog entries for tcpwrappers denied message, with -r and without -r option. Product: Portable OpenSSH Version: 3.9p1 Platform: All OS/Version: All Status: NEW Severity: normal
2015 Sep 15
36
[Bug 2468] New: Option to include external files to sshd_config
https://bugzilla.mindrot.org/show_bug.cgi?id=2468 Bug ID: 2468 Summary: Option to include external files to sshd_config Product: Portable OpenSSH Version: 7.1p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: sshd Assignee: unassigned-bugs