search for: remote_window

Displaying 16 results from an estimated 16 matches for "remote_window".

2010 Jul 22
1
remote vs local window discrepancy
...;s window size a SSH_MSG_CHANNEL_WINDOW_ADJUST message is never sent once the client's remote window count goes to 0. The client never attempts to read off the tun device file descriptor again. After some investigation I determined that for every packet sent the client is decrementing Channel.remote_window by a value that is 4 bytes larger than the amount that the server decrements Channel.local_window and Channel.local_consumed. Prior to the stall the server does send SSH_MSG_CHANNEL_WINDOW_ADJUST messages. When it does the "byte to add" value is off by 4x the number of packets consumed...
2001 Feb 22
3
intermittent stderr
The command "ssh ls -l /doesnotexist" gives various responses: Running from a 200 MHz PentiumPro with dsa key added to ssh-agent: Mistakes worst to fast machine: To a faster 600 MHz dual processor i686 600 MHz machine: ls: /doesnotexist: No such file or directory -- correct nothing at all -- wrong ls: select: Bad file descriptor -- wrong
2007 Nov 13
1
Help with openssh: ssh application writing data > 131071 to socket causing message too long error
...greater than 131071 bytes. As to my understanding this is true with a linux networking stack also (on my system the max system value allowed is 131071).Please correct me if I am wrong. In channel_output_poll(void) in channels.c if (compat20) { if (len > c->remote_window) len = c->remote_window; if (len > c->remote_maxpacket) len = c->remote_maxpacket; fprintf(stderr,"Remote window size %d Remote max packet %d\n&qu...
2004 Jul 13
1
channel->input buffer bug and patch
...-3.8.1p1-bugfix/channels.c --- openssh-3.8.1p1/channels.c 2004-01-20 19:02:09.000000000 -0500 +++ openssh-3.8.1p1-bugfix/channels.c 2004-07-13 09:37:20.000000000 -0400 @@ -702,6 +702,8 @@ channel_pre_open(Channel *c, fd_set * readset, fd_set * writeset) { u_int limit = compat20 ? c->remote_window : packet_get_maxsize(); + if (limit > 0x10000) + limit = 0x10000; if (c->istate == CHAN_INPUT_OPEN && limit > 0 && Common subdirectories: openssh-3.8.1p1/contrib and openssh-3.8.1p1-bugfix/contrib Common subdirectories: openssh-3.8....
2004 Jul 14
1
New dynamic window patch (with limits)
...+++ openssh-3.8.1p1-dynwindow/channels.c 2004-07-13 09:46:58.000000000 -0400 @@ -255,6 +255,7 @@ c->local_window_max = window; c->local_consumed = 0; c->local_maxpacket = maxpack; + c->dynamic_window = 0; c->remote_id = -1; c->remote_name = xstrdup(remote_name); c->remote_window = 0; @@ -702,6 +703,10 @@ channel_pre_open(Channel *c, fd_set * readset, fd_set * writeset) { u_int limit = compat20 ? c->remote_window : packet_get_maxsize(); + if (!c->input.unlimited && limit > 0x10000) + limit = 0x10000; + else if (c->input.unlimited && limit &g...
2020 Oct 14
2
Connection hang, can't stop SSH
Using OpenSSH_8.3p1 I had an open (working) connection to some other box; after a bit of inactivity, some device in the middle seems to have forgotten about the TCP connection (NAT) and broke it. I've got an EscapeChar defined, though; so first I tried to send a BREAK and, when that didn't help (TCP already gone, packets get lost!), I tried (just out of curiosity) a Rekey. Now I can see
2004 Jul 07
3
DynamicWindow Patch
...:44:38.000000000 -0400 +++ ssh/channels.c 2004-07-07 10:02:24.000000000 -0400 @@ -255,6 +255,7 @@ c->local_window_max = window; c->local_consumed = 0; c->local_maxpacket = maxpack; + c->dynamic_window = 0; c->remote_id = -1; c->remote_name = xstrdup(remote_name); c->remote_window = 0; @@ -1520,14 +1521,26 @@ !(c->flags & (CHAN_CLOSE_SENT|CHAN_CLOSE_RCVD)) && c->local_window < c->local_window_max/2 && c->local_consumed > 0) { + u_int32_t tcpwinsz = 0; + socklen_t optsz = sizeof(tcpwinsz); + int ret = -1; + u_int32_t...
2006 Nov 03
0
a strange behavior on a small memory system with tun0
...router, not better. -I tried with openvpn, works fine but i would prefer openssh for my backup solution. -I changed for testing in channels.c: debug2("channel %d: rcvd adjust %u", id, adjust); to debug2("channel %d: rcvd adjust %u is_now: %u", id, adjust, c->remote_window); debug on router shows: .. .. .. Nov 3 12:26:51 (none) user.info : debug2: channel 1: rcvd adjust 1049336 is_now: 705152^M Nov 3 12:26:59 (none) user.info : debug2: channel 1: rcvd adjust 1048663 is_now: 698457^M Nov 3 12:27:01 (none) user.info : debug2: channel 1: window 108432 sent adjust 10...
2001 Feb 10
3
Protocol 2 remote forwarding patch
...PEN] = &channel_post_open_2; channel_post[SSH_CHANNEL_PORT_LISTENER] = &channel_post_port_listener; + channel_post[SSH2_CHANNEL_PORT_LISTENER] = &channel_post_port_listener; channel_post[SSH_CHANNEL_X11_LISTENER] = &channel_post_x11_listener; } @@ -1309,6 +1317,96 @@ c->remote_window += adjust; } +/* Jarno Huuskonen: This is called when server receives + * SSH2_MSG_GLOBAL_REQUEST. Handles both "tcpip-forward" and + * "cancel-tcpip-forward" requests. + */ +void +channel_server_global_request(int type, int plen, void *ctxt) +{ + char *rtype; + char want_r...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...EN] = &channel_post_open_2; channel_post[SSH_CHANNEL_PORT_LISTENER] = &channel_post_port_listener; + channel_post[SSH2_CHANNEL_PORT_LISTENER] = &channel_post_port_listener; channel_post[SSH_CHANNEL_X11_LISTENER] = &channel_post_x11_listener; } @@ -1275,6 +1290,122 @@ c->remote_window += adjust; } +/* Jarno Huuskonen: Checks if the server allows port forwarding. + * Logs all failed attempts. + * Return 1 if the forwarding is allowed or 0 for failure. + */ +int allow_remote_forwarding(const char *address_to_listen, int port) +{ +#ifdef DISABLE_FORWARDING + return 0; +#endif /*...
2001 Oct 24
2
disable features
...void channel_input_close_confirmation(int type, int plen, void *ctxt) { @@ -1871,6 +1953,7 @@ "non-closed channel %d (type %d).", id, c->type); channel_free(c); } +#endif void channel_input_open_confirmation(int type, int plen, void *ctxt) @@ -2005,6 +2088,7 @@ c->remote_window += adjust; } +#ifdef WITH_TCPFWD void channel_input_port_open(int type, int plen, void *ctxt) { @@ -2042,7 +2126,7 @@ } xfree(host); } - +#endif /* -- tcp forwarding */ @@ -2052,6 +2136,7 @@ IPv4or6 = af; } +#ifdef WITH_X11FWD /* * Initiate forwarding of connections to local...
2003 Oct 08
4
OS/390 openssh
...if (strcmp(c->ctype, "session") == 0)*/ + if (c->ctype[0] == 's') packet_put_string(buffer_ptr(&c->input), len); + else + packet_put_binary(buffer_ptr(&c->input), len); packet_send(); buffer_consume(&c->input, len); c->remote_window -= len; @@ -1787,7 +1791,11 @@ packet_start(SSH2_MSG_CHANNEL_EXTENDED_DATA); packet_put_int(c->remote_id); packet_put_int(SSH2_EXTENDED_DATA_STDERR); + /*if (strcmp(c->ctype, "session") == 0)*/ + if (c->ctype[0] == 's') packet_put_string(buffer_ptr(&am...
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly: http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html <quote> The paper concludes that the keystroke timing data observable from today's SSH implementations reveals a dangerously significant amount of information about user terminal sessions--enough to locate typed passwords in the session data stream and reduce the
2006 Feb 14
15
[Bug 1131] buffer_append_space: alloc not supported Error with V 4.2p1
http://bugzilla.mindrot.org/show_bug.cgi?id=1131 ------- Comment #5 from dtucker at zip.com.au 2006-02-14 22:17 ------- Also, what compiler did you use to compile OpenSSH? If you compile OpenSSH (and openssl and zlib if possible) with optimization disabled (-O0) does the error still occur? ------- You are receiving this mail because: ------- You are the assignee for the bug, or are
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
...debug2("reseting count"); + } + /* End SD Mod */ packet_send(); buffer_consume(&c->input, len); c->remote_window -= len; } - } else if (c->istate == CHAN_INPUT_WAIT_DRAIN) { + } + /* + * Begin SD Mod: + * packet does not contain data, we are not in a draining + * state and timing manipulat...
2001 Oct 06
1
Defeating Timing Attacks
Hello, In response to the timing analysis attacks presented by Dawn Song et. al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html we at Silicon Defense developed a patch for openssh to avoid such measures. Timing Analysis Evasion changes were developed by C. Jason Coit and Roel Jonkman of Silicon Defense. These changes cause SSH to send packets unless request not to,