Displaying 6 results from an estimated 6 matches for "session_auth_agent_req".
2009 Feb 07
0
Patch to 5.1p1 : Log X11 forwarding
...== 0) {
success = session_x11_req(s);
+ if (success) {
+ host = get_canonical_hostname(options.use_dns);
+ verbose("X11 forwarding for %s to %s", s->pw->pw_name, host);
+ }
} else if (strcmp(rtype, "auth-agent-req at openssh.com") == 0) {
success = session_auth_agent_req(s);
} else if (strcmp(rtype, "subsystem") == 0) {
2003 Jan 29
0
[PATCH] features for restricted shell environments
...(stat(_PATH_SSH_USER_RC, &st) >= 0)) {
snprintf(cmd, sizeof cmd, "%s -c '%s %s'",
shell, _PATH_BSHELL, _PATH_SSH_USER_RC);
if (debug_flag)
@@ -1723,8 +1726,8 @@
{
static int called = 0;
packet_check_eom();
- if (no_agent_forwarding_flag) {
- debug("session_auth_agent_req: no_agent_forwarding_flag");
+ if (auth_restricted(RESTRICT_AGENT, s->pw)) {
+ debug("session_auth_agent_req: agent forwarding disabled");
return 0;
}
if (called) {
@@ -2019,12 +2022,8 @@
char display[512], auth_display[512];
char hostname[MAXHOSTNAMELEN];
- if (no_x...
2001 Oct 24
2
disable features
...ons.use_login) {
@@ -1326,6 +1348,7 @@
return success;
}
+#ifdef WITH_X11FWD
static int
session_x11_req(Session *s)
{
@@ -1346,6 +1369,7 @@
}
return success;
}
+#endif
static int
session_shell_req(Session *s)
@@ -1366,6 +1390,7 @@
return 1;
}
+#ifdef WITH_AGENTFWD
static int
session_auth_agent_req(Session *s)
{
@@ -1382,6 +1407,7 @@
return auth_input_request_forwarding(s->pw);
}
}
+#endif
void
session_input_channel_req(int id, void *arg)
@@ -1417,10 +1443,14 @@
success = session_exec_req(s);
} else if (strcmp(rtype, "pty-req") == 0) {
success = session_pty...
2004 Jan 19
3
Security suggestion concering SSH and port forwarding.
Hi,
sorry if it is the wrong approuch to suggest improvments to OpenSSH,
but here comes my suggestion:
I recently stumbled upon the scponly shell which in it's chroot:ed form is
an ideal solution when you want to share some files with people you trust
more or less.
The problem is, if you use the scponlyc as shell, port forwarding is still
allowed. This can of course be dissallowed in
2002 May 09
0
functions : server_input_channel_req userauth_pubkey
...uot;pty-req") == 0) {
success = session_pty_req(s);
} else if (strcmp(rtype, "x11-req") == 0) {
@@ -1630,7 +1632,7 @@
} else if (strcmp(rtype,
"auth-agent-req at openssh.com") == 0) {
success = session_auth_agent_req(s);
} else if (strcmp(rtype, "subsystem") == 0) {
- - success = session_subsystem_req(s);
+ success = session_subsystem_req(s, realname);
}
}
if (strcmp(rtype, "window-change") == 0) {
@@...
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly:
http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html
<quote>
The paper concludes that the keystroke timing data observable from
today's SSH implementations reveals a dangerously significant amount of
information about user terminal sessions--enough to locate typed
passwords in the session data stream and reduce the