search for: remote_major

Displaying 11 results from an estimated 11 matches for "remote_major".

2002 Jan 22
2
ssh-keyscan: xmalloc out of memory error
hi all, I got "xmalloc: out of memory" when i used ssh-keyscan to a remote host that is using SSH protocol 2 and only protocol 2 (no fallback to SSH protocol 1). Looks to me more like ssh-keyscan doesn't talk SSH protocol 2 to the server. Please help. Here is the exact error: # /usr/local/bin/ssh-keyscan -v miad_1 # miad_1 SSH-2.0-OpenSSH_3.0.2p1 xmalloc: out of memory
1999 Dec 06
1
Ugly patch to openssh-1.2pre15
...izeof(buf) - 1; i++) { if (read(connection_in, &buf[i], 1) != 1) *************** *** 917,927 **** * Check that the versions match. In future this might accept * several versions and set appropriate flags to handle them. */ if (sscanf(buf, "SSH-%d.%d-%[^\n]\n", &remote_major, &remote_minor, ! remote_version) != 3) fatal("Bad remote protocol version identification: '%.100s'", buf); debug("Remote protocol version %d.%d, remote software version %.100s", remote_major, remote_minor, remote_version); /* Check if the...
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
...anner(int connection_out, int minor1) * identification string. */ void -ssh_exchange_identification(int timeout_ms) +ssh_exchange_identification(int timeout_ms, char **client_version_stringp, char **server_version_stringp) { char buf[256], remote_version[256]; /* must be same size! */ int remote_major, remote_minor, mismatch; @@ -632,7 +630,7 @@ ssh_exchange_identification(int timeout_ms) size_t len; int rc; - send_client_banner(connection_out, 0); + send_client_banner(connection_out, 0, client_version_stringp); /* Read other side's version identification. */ for (n = 0;;) { @@ -...
2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
...10 +292,70 @@ (void) buffer_get_int(&msg); buffer_get_bignum(&msg, rsa->rsa->e); buffer_get_bignum(&msg, rsa->rsa->n); + buffer_clear(&msg); + + return (rsa); +} + +static int +hostjump(Key *hostkey) +{ + longjmp(kexjmp, (int)hostkey); +} + +int +ssh2_capable(int remote_major, int remote_minor) +{ + switch (remote_major) { + case 1: + if (remote_minor == 99) + return 1; + break; + case 2: + return 1; + default: + break; + } + return 0; +} + +static Key * +keygrab_ssh2(con *c) +{ + int j; + + packet_set_connection(c->c_fd, c->c_fd); + enable_compat20(); + myp...
2004 Mar 07
1
[Bug 809] ssh-keyscan breaks too obscurely when remote isn't an SSH server
...bugs at mindrot.org ReportedBy: cjwatson at debian.org When you ask ssh-keyscan to scan something that isn't an SSH server, it sometimes fatals before scanning the rest of the list, rather than printing a debug message and continuing as it's supposed to. This appears to be because remote_major and remote_minor aren't initialized in congreet(), so if the sscanf() for the SSH version banner fails then they just contain whatever happens to be on the stack. A patch will follow in a moment. ------- Additional Comments From cjwatson at debian.org 2004-03-07 23:52 ------- Created an atta...
2000 Mar 01
0
Problem in sshconnect.c?
...the same error message as I am getting. Any help you guys can give would be greatly appreciated. Regards, Paul Tiemann //------------- Here's a code snip from the sshconnect.c file below void ssh_exchange_identification() { char buf[256], remote_version[256]; /* must be same size! */ int remote_major, remote_minor, i; int connection_in = packet_get_connection_in(); int connection_out = packet_get_connection_out(); /* Read other side\'s version identification. */ for (i = 0; i < sizeof(buf) - 1; i++) { buf[i + 1] = 0; if (read(connection_in, &buf[i], 1) != 1) fatal("...
2000 Oct 30
1
Compatibility with 1.2.16 (commercial)?
Hi folks, I'm currently trying to connect to version 1.2.16 of the commercial server. The server says it supports protocol version 1.4 and that that is incompatible with protocol version 1.5. Is that actually true? The complete output from "ssh -v xxxxxxx" is: $ ./ssh -v xxxxxxx SSH Version OpenSSH_2.3.0p1, protocol versions 1.5/2.0. Compiled with SSL (0x0090581f). debug:
2012 Nov 24
0
ssh-keyscan continuity patch --
...;c_name); break; case ECONNREFUSED: - break; + if (! log_verbose) + break; + /* fall thru */ default: error("read (%s): %s", c->c_name, strerror(errno)); break; @@ -443,14 +482,20 @@ datafellows = 0; if (c->c_keytype != KT_RSA1) { if (!ssh2_capable(remote_major, remote_minor)) { + if (log_verbose) + logit("%s doesn't support ssh2", c->c_name); + else debug("%s doesn't support ssh2", c->c_name); - confree(s); - return; + confree(s); + return; } } else if (remote_major != 1) { + if (lo...
2015 May 23
5
Name based SSH proxy
...inor1, SSH_VERSION); @@ -537,7 +538,7 @@ send_client_banner(int connection_out, i * identification string. */ void -ssh_exchange_identification(int timeout_ms) +ssh_exchange_identification(int timeout_ms, const char *host) { char buf[256], remote_version[256]; /* must be same size! */ int remote_major, remote_minor, mismatch; @@ -559,7 +560,7 @@ ssh_exchange_identification(int timeout_ */ if (options.protocol == SSH_PROTO_2) { enable_compat20(); - send_client_banner(connection_out, 0); + send_client_banner(connection_out, 0, host); client_banner_sent = 1; } @@ -672,7 +673,7 @@ s...
2000 Jan 19
3
AIX openssh patches
..." "Reponse will be transmitted in clear text."); *** sshd.c.DIST Tue Jan 11 09:55:44 2000 --- sshd.c Wed Jan 19 11:05:02 2000 *************** *** 277,283 **** { extern char *optarg; extern int optind; ! int opt, aux, sock_in, sock_out, newsock, i, pid, on = 1; int remote_major, remote_minor; int silentrsa = 0; struct pollfd fds; --- 277,288 ---- { extern char *optarg; extern int optind; ! #ifdef _AIX ! unsigned long aux; ! #else ! int aux; ! #endif ! int opt, sock_in, sock_out, newsock, i, pid, on = 1; int remote_major, remote_minor; int silentrsa...
2003 Oct 08
4
OS/390 openssh
...f[sizeof(buf) - 1] = 0; client_version_string = xstrdup(buf); +#ifdef CHARSET_EBCDIC + __atoe(client_version_string); +#endif /* * Check that the versions match. In future this might accept @@ -409,7 +425,14 @@ if (sscanf(client_version_string, "SSH-%d.%d-%[^\n]\n", &remote_major, &remote_minor, remote_version) != 3) { s = "Protocol mismatch.\n"; +#ifdef CHARSET_EBCDIC + s = xstrdup(s); + __etoa(s); + (void) atomicio(vwrite, sock_out, s, strlen(s)); + free(s); +#else (void) atomicio(vwrite, sock_out, s, strlen(s)); +#endif close(sock_in); close...