Displaying 20 results from an estimated 186 matches for "restore_uid".
2002 Jul 01
3
3.4p1: 'buffer_append_space: alloc 10506240 not supported'
...e for quinot from 10.10.0.172 port 35503 ssh2
debug1: userauth-request for user quinot service ssh-connection method
hostbased
debug1: attempt 1 failures 1
debug1: userauth_hostbased: cuser quinot chost vienna.int.domain.com.
pkalg s
sh-dss slen 55
debug1: temporarily_use_uid: 529/101 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 529/101 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 529/101 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 529/101 (e=0)
debug1: restore_uid
Failed hostbased for quinot from 10.10.0.172 port 35503 ssh2
debug1: userauth-request for user quinot service...
2011 Nov 03
1
Help with CA Certificates for user authentication?
...userauth-request for user test service ssh-connection method publickey
debug1: attempt 1 failures 0
debug1: test whether pkalg/pkblob are acceptable
debug1: temporarily_use_uid: 63203/54000 (e=0/0)
debug1: trying public key file /etc/sshtest/authorized_keys
debug1: fd 5 clearing O_NONBLOCK
debug1: restore_uid: 0/0
debug1: temporarily_use_uid: 63203/54000 (e=0/0)
debug1: trying public key file /etc/sshtest/authorized_keys
debug1: fd 5 clearing O_NONBLOCK
debug1: restore_uid: 0/0
Failed publickey for test from 172.31.43.3 port 2991 ssh2
debug1: userauth-request for user test service ssh-connection method...
2002 Jan 10
1
OpenSSH 3.0.Xp1, AIX -> Sun trusted host problem
...es 1
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1:
userauth_hostbased: cuser patrol chost aixhost1.Stanford.EDU. pkalg
ssh-dss slen 55
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1:
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: restore_uid
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1:
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: restore_uid
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1:
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:31:15 sunhost.stanford.edu ssh...
2001 Jun 05
1
OpenSSH tmp cleanup
Hi,
I noticed that Markus has fixed the temporary file cleanup problems in
OpenSSH cvs. What files need patching for this ? I only noticed
changes in: session.c, channels.h and channels.c.
-Jarno
--
Jarno Huuskonen <Jarno.Huuskonen at uku.fi>
2001 May 04
0
Exit status strangeness
...n 255)
3:33pm.orangecrush: ~> ssh -v qacrmdb -n /bin/true
OpenSSH_2.9p1, SSH protocols 1.5/2.0, OpenSSL 0x0090601f
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Seeding random number generator
debug1: Rhosts Authentication disabled, originating port will not be
trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 504 geteuid 504 anon 1
debug1: Connecting to qacrmdb [10.43.0.61] port 22.
debug1: temporarily_use_uid: 504/504 (e=504)
debug1: restore_uid
debug1: temporarily_use_uid: 504/504 (e=504)
debug1: restore_uid
debug1: Connection established.
debug1: identity file /home/ipopov...
2003 Mar 28
0
PRIVSEP annoys me.
...file %s", file);
>
> /* Fail quietly if file does not exist */
> /* If UsePriviledgeSeperation is yes, stat() always fails. */
> if (stat(file, &st) < 0) {
> /* Restore the privileged uid. */
> debug("Public key file does not exist.");
> restore_uid();
> return 0;
> }
>
> /* Open the file containing the authorized keys. */
> f = fopen(file, "r");
> if (!f) {
> packet_send_debug("Could not open file %.900s
> for reading.",file);
> packet_send_debug(&q...
2001 May 04
1
ssh_exchange_identification
...or a hosts.deny in the etc directory. I ran ssh -v localhost and this is what I got...
# ssh -v localhost
OpenSSH_2.9, SSH protocols 1.5/2.0, OpenSSL 0x0090581f
debug1: Reading configuration data /etc/ssh_config
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 0 geteuid 0 anon 1
debug1: Connecting to localhost [127.0.0.1] port 22.
debug1: temporarily_use_uid: 0/0 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 0/0 (e=0)
debug1: restore_uid
debug1: Connection established.
debug1: read PEM private key done: type DSA
debug...
2002 May 16
3
uidswap
All,
Could someone explain the purpose of the uidswap functions with
respect to ssh ( the client ). From what I gathered , ssh installs as
setuid root and swaps ids when reading potential key files that may be read
only by root. Also , I think when binding to a privileged port ssh swaps
id. Is that so? What are the consequnences if you do not install ssh setuid
root? ( As far I as know no uid
2007 Sep 07
0
Public key reading abstraction (to allow future work)
...t st;
Key *key;
/* Temporarily use the user's uid. */
@@ -183,26 +182,9 @@
file = authorized_keys_file(pw);
debug("trying public RSA key file %s", file);
- /* Fail quietly if file does not exist */
- if (stat(file, &st) < 0) {
- /* Restore the privileged uid. */
- restore_uid();
- xfree(file);
- return (0);
- }
- /* Open the file containing the authorized keys. */
- f = fopen(file, "r");
+ f = open_keyfile(file, pw, options.strict_modes);
if (!f) {
- /* Restore the privileged uid. */
- restore_uid();
- xfree(file);
- return (0);
- }
- if (options.stric...
2002 Jul 18
1
[Bug 342] RhostsRSAAuthentication does not work with 3.4p1
http://bugzilla.mindrot.org/show_bug.cgi?id=342
stevesk at pobox.com changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |INVALID
------- Additional Comments From stevesk at pobox.com 2002-07-18
2002 Oct 16
2
SSH Bug 3.5p1 Expired Passwords
...d Passwort, SSH denys the Acces to the System
fbeckman at zvadmxz:/home/fbeckman # ssh -v fbeckman at xy
OpenSSH_3.1p1, SSH protocols 1.5/2.0, OpenSSL 0x0090605f
debug1: Reading configuration data /etc/ssh_config
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 0 geteuid 0 anon 1
debug1: Connecting to webmann [129.8.140.69] port 22.
debug1: temporarily_use_uid: 0/1 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 0/1 (e=0)
debug1: restore_uid
debug1: Connection established.
debug1: identity file /.ssh/identity type 0
debu...
2001 Jun 13
1
2.9p1 SCO OS 5.0.5 server and Linux client hang on exit when using X11 forwarding and protocol 2
...home/spin/.ssh/config
debug1: Applying options for *
debug1: Applying options for njdb*
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Seeding random number generator
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 1000 geteuid 0 anon 1
debug1: Connecting to njdb1b [X.X.X.X] port 22.
debug1: temporarily_use_uid: 1000/100 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 1000/100 (e=0)
debug1: restore_uid
debug1: Connection established.
debug1: read PEM private key done: type D...
2002 Jul 25
0
scp hangs
...from 192.168.1.5 port 1743 ssh2
debug1: userauth-request for user root service ssh-connection method
publickey
debug1: attempt 1 failures 1
debug1: test whether pkalg/pkblob are acceptable
debug1: temporarily_use_uid: 0/0 (e=0)
debug1: trying public key file /root/.ssh/authorized_keys
debug1: restore_uid
debug1: temporarily_use_uid: 0/0 (e=0)
debug1: trying public key file /root/.ssh/authorized_keys2
debug1: restore_uid
Failed publickey for root from 192.168.1.5 port 1743 ssh2
debug1: userauth-request for user root service ssh-connection method
publickey
debug1: attempt 2 failures 2
debug1:...
2001 Aug 03
1
Disconnecting: protocol error: rcvd type 98
...ome/ads/.ssh/config
debug1: Applying options for polaris
debug1: Applying options for *
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Seeding random number generator
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 1000 geteuid 1000 anon 1
debug1: Connecting to polaris [129.234.2.123] port 2222.
debug1: temporarily_use_uid: 1000/1000 (e=1000)
debug1: restore_uid
debug1: temporarily_use_uid: 1000/1000 (e=1000)
debug1: restore_uid
debug1: Connection established.
debug1: identity file...
2001 May 24
0
occasional ssh hang
...v 147.101.224.39
Successful:
OpenSSH_2.9p1, SSH protocols 1.5/2.0, OpenSSL 0x0090581f
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: Applying options for *
debug1: Seeding random number generator
debug1: Rhosts Authentication disabled, originating port will not be
trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 0 geteuid 0 anon 1
debug1: Connecting to 147.101.224.39 [147.101.224.39] port 22.
debug1: temporarily_use_uid: 0/0 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 0/0 (e=0)
debug1: restore_uid
debug1: Connection established.
debug1: identity file /root/.ssh/identi...
2012 Nov 13
1
problem with AuthorizedKeysCommand on OpenBSD
...bug3: monitor_read: checking request 20
debug3: mm_answer_keyallowed entering
debug3: mm_answer_keyallowed: key_from_blob: 0x81973440
debug1: temporarily_use_uid: 32767/32767 (e=0/0)
debug3: Running AuthorizedKeysCommand: "/usr/local/libexec/ssh-ldap-wrapper" as "nobody"
debug1: restore_uid: 0/0
debug1: temporarily_use_uid: 32767/32767 (e=0/0)
debug2: key not found
user_key_command_allowed2: dup2: Bad file descriptor
AuthorizedKeysCommand /usr/local/libexec/ssh-ldap-wrapper returned status 1
debug1: restore_uid: 0/0
debug1: temporarily_use_uid: 1000/1000 (e=0/0)
...
Any suggestions,...
2002 Jan 04
2
Strange problem from "identical" hosts
...et
OpenSSH_3.0.2p1, SSH protocols 1.5/2.0, OpenSSL 0x0090601f
debug1: Reading configuration data /etc/opt/ssh-3.0/ssh_config
debug1: Applying options for *
debug1: Seeding random number generator
debug1: Rhosts Authentication disabled, originating port will not be
trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 0 geteuid 0 anon 1
debug1: Connecting to target [10.0.0.253] port 22.
debug1: temporarily_use_uid: 0/3 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 0/3 (e=0)
debug1: restore_uid
debug1: Connection established.
debug1: read PEM private ke...
2005 Apr 28
1
ssh 4.0 under AIX 5.3 password expiration
...168.247.63 port 34762
ssh2
debug1: userauth-request for user dummy service
ssh-connection method publickey
debug1: attempt 1 failures 1
debug1: test whether pkalg/pkblob are acceptable
debug1: temporarily_use_uid: 203/1 (e=0/0)
debug1: trying public key file
/home/dummy/.ssh/authorized_keys
debug1: restore_uid: 0/0
debug1: temporarily_use_uid: 203/1 (e=0/0)
debug1: trying public key file
/home/dummy/.ssh/authorized_keys2
debug1: restore_uid: 0/0
Failed publickey for dummy from 192.168.247.63 port
34762 ssh2
debug1: userauth-request for user dummy service
ssh-connection method publickey
debug1: attempt 2...
2009 Dec 03
1
Winbind + SSH + AIX - Connection to aixserver01 closed by remote host
...23:15 aixserver01 authpriv:debug sshd[467118]: debug1:
temporarily_use_uid: 150302/100513 (e=0/0)
Dec 3 11:23:15 aixserver01 authpriv:debug sshd[467118]: debug1: trying
public key file /home/users/robertobouza/.ssh/authorized_keys
Dec 3 11:23:15 aixserver01 authpriv:debug sshd[467118]: debug1:
restore_uid: 0/0
Dec 3 11:23:15 aixserver01 authpriv:debug sshd[467118]: debug1:
temporarily_use_uid: 150302/100513 (e=0/0)
Dec 3 11:23:15 aixserver01 authpriv:debug sshd[467118]: debug1: trying
public key file /home/users/robertobouza/.ssh/authorized_keys2
Dec 3 11:23:15 aixserver01 authpriv:debug sshd[4...
2001 Oct 17
0
OpenSSH 2.9.9p2 on Solaris 8 buffer_get problem
...ient:
[root at autoserver /]# /opt/OBSDssh/bin/ssh -vv firewall
OpenSSH_2.9.9p2, SSH protocols 1.5/2.0, OpenSSL 0x0090602f
debug1: Reading configuration data /etc/ssh_config
debug1: Seeding random number generator
debug1: Rhosts Authentication disabled, originating port will not be
trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 0 geteuid 0 anon 1
debug1: Connecting to firewall [x.y.z.t] port 22.
debug1: temporarily_use_uid: 0/1 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 0/1 (e=0)
debug1: restore_uid
debug1: Connection established.
debug1: read PEM private key done: type DSA
debug1:...