search for: session_auth_agent_req

Displaying 6 results from an estimated 6 matches for "session_auth_agent_req".

2009 Feb 07
0
Patch to 5.1p1 : Log X11 forwarding
...== 0) { success = session_x11_req(s); + if (success) { + host = get_canonical_hostname(options.use_dns); + verbose("X11 forwarding for %s to %s", s->pw->pw_name, host); + } } else if (strcmp(rtype, "auth-agent-req at openssh.com") == 0) { success = session_auth_agent_req(s); } else if (strcmp(rtype, "subsystem") == 0) {
2003 Jan 29
0
[PATCH] features for restricted shell environments
...(stat(_PATH_SSH_USER_RC, &st) >= 0)) { snprintf(cmd, sizeof cmd, "%s -c '%s %s'", shell, _PATH_BSHELL, _PATH_SSH_USER_RC); if (debug_flag) @@ -1723,8 +1726,8 @@ { static int called = 0; packet_check_eom(); - if (no_agent_forwarding_flag) { - debug("session_auth_agent_req: no_agent_forwarding_flag"); + if (auth_restricted(RESTRICT_AGENT, s->pw)) { + debug("session_auth_agent_req: agent forwarding disabled"); return 0; } if (called) { @@ -2019,12 +2022,8 @@ char display[512], auth_display[512]; char hostname[MAXHOSTNAMELEN]; - if (no_x...
2001 Oct 24
2
disable features
...ons.use_login) { @@ -1326,6 +1348,7 @@ return success; } +#ifdef WITH_X11FWD static int session_x11_req(Session *s) { @@ -1346,6 +1369,7 @@ } return success; } +#endif static int session_shell_req(Session *s) @@ -1366,6 +1390,7 @@ return 1; } +#ifdef WITH_AGENTFWD static int session_auth_agent_req(Session *s) { @@ -1382,6 +1407,7 @@ return auth_input_request_forwarding(s->pw); } } +#endif void session_input_channel_req(int id, void *arg) @@ -1417,10 +1443,14 @@ success = session_exec_req(s); } else if (strcmp(rtype, "pty-req") == 0) { success = session_pty...
2004 Jan 19
3
Security suggestion concering SSH and port forwarding.
Hi, sorry if it is the wrong approuch to suggest improvments to OpenSSH, but here comes my suggestion: I recently stumbled upon the scponly shell which in it's chroot:ed form is an ideal solution when you want to share some files with people you trust more or less. The problem is, if you use the scponlyc as shell, port forwarding is still allowed. This can of course be dissallowed in
2002 May 09
0
functions : server_input_channel_req userauth_pubkey
...uot;pty-req") == 0) { success = session_pty_req(s); } else if (strcmp(rtype, "x11-req") == 0) { @@ -1630,7 +1632,7 @@ } else if (strcmp(rtype, "auth-agent-req at openssh.com") == 0) { success = session_auth_agent_req(s); } else if (strcmp(rtype, "subsystem") == 0) { - - success = session_subsystem_req(s); + success = session_subsystem_req(s, realname); } } if (strcmp(rtype, "window-change") == 0) { @@...
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly: http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html <quote> The paper concludes that the keystroke timing data observable from today's SSH implementations reveals a dangerously significant amount of information about user terminal sessions--enough to locate typed passwords in the session data stream and reduce the