Displaying 9 results from an estimated 9 matches for "session_subsystem_req".
2000 May 22
1
future of subsystem requests
...ccessful, then the log
left off with a semi-cryptic "subsystem request for sftp" line. After
that, nothing.
Poking around the source, I found this little routine in session.c (it
appears to be identical to the same routine in the OpenBSD source, so it's
not a porting issue):
int
session_subsystem_req(Session *s)
{
unsigned int len;
int success = 0;
char *subsys = packet_get_string(&len);
packet_done();
log("subsystem request for %s", subsys);
xfree(subsys);
return success;
}
To my eyes, this looks like a planned no-op. Markus Friedl...
2009 May 18
6
[Bug 1599] New: "ForceCommand internal-sftp" not working as expected
...stat /usr/lib/openssh/sftp-server: No such file or
directory
subsystem request for sftp failed, subsystem not found
Connection closed by 127.0.0.1
Setting "Subsystem sftp internal-sftp" works around the problem, but
that option is not allowed inside a Match block.
If the stat() call in session_subsystem_req succeeds, is_subsystem is
set to SUBSYSTEM_EXT; then do_exec is called, it overrides this and
sets is_subsystem = SUBSYSTEM_INT_SFTP.
I believe that calling stat() on the external program and then calling
the internal sftp handler is not intended behaviour.
Regards
J?rn Heissler
--
Configure bu...
2002 May 09
0
functions : server_input_channel_req userauth_pubkey
...rd_login(pid, s->tty, pw->pw_name, pw->pw_uid,
get_remote_name_or_ip(utmp_len,
options.verify_reverse_mapping),
- - (struct sockaddr *)&from);
+ (struct sockaddr *)&from, realname);
#ifdef USE_PAM
/*
@@ -1509,7 +1509,7 @@
}
static int
- -session_subsystem_req(Session *s)
+session_subsystem_req(Session *s, const char *realname)
{
struct stat st;
u_int len;
@@ -1530,7 +1530,7 @@
}
debug("subsystem: exec() %s", cmd);
s->is_subsystem = 1;
- -...
2023 Jul 05
1
Subsystem sftp invoked even though forced command created
...rting session: forced-command" in session.c:do_exec() the command
variable contains the requested forced command and that is what is
actually executed.
https://github.com/openssh/openssh-portable/blob/V_7_4_P1/session.c#L623-L663
The "subsystem: exec()" comes earlier from
session.c:session_subsystem_req(), which is recording (badly) which
subsystem was requested, but this is before the forced command is applied
in do_exec().
https://github.com/openssh/openssh-portable/blob/V_7_4_P1/session.c#L1938-L1944
Further evidence that this is the case is the audit calls that log the
command being executed...
2023 Jul 03
1
Subsystem sftp invoked even though forced command created
On 30.06.23 17:56, MCMANUS, MICHAEL P wrote:
> The actual command is similar to the following (parameters inserted to protect the source):
> (print ${FQDN} ; print ${Environment} ; cat ${OutFileXML}) | \
> ssh -Ti ${EmbeddedPrivateKey} \
> -o HostKeyAlias="${Alias}" \
> -o
2001 Oct 24
2
disable features
...type, "x11-req") == 0) {
success = session_x11_req(s);
+#endif
+#ifdef WITH_AGENTFWD
} else if (strcmp(rtype, "auth-agent-req at openssh.com") == 0) {
success = session_auth_agent_req(s);
+#endif
} else if (strcmp(rtype, "subsystem") == 0) {
success = session_subsystem_req(s);
}
@@ -1640,6 +1670,7 @@
setproctitle("%s@%s", s->pw->pw_name, session_tty_list());
}
+#ifdef WITH_X11FWD
int
session_setup_x11fwd(Session *s)
{
@@ -1674,6 +1705,7 @@
}
return 1;
}
+#endif
static void
do_authenticated2(Authctxt *authctxt)
Index: ssh.c
=======...
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly:
http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html
<quote>
The paper concludes that the keystroke timing data observable from
today's SSH implementations reveals a dangerously significant amount of
information about user terminal sessions--enough to locate typed
passwords in the session data stream and reduce the
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
...tion)
+ {
+ options.use_steno_timing_manipulation = 0;
+ }
+ return 1;
+}
+/* End SD Mod */
+
static int
session_exec_req(Session *s)
{
@@ -1795,6 +1839,14 @@
} else if (strcmp(rtype, "subsystem") == 0) {
success = session_subsystem_req(s);
}
+ /*
+ * Begin SD Mod: Handle request from the client
+ * to turn off server's timing manipulation.
+ */
+ else if (strcmp(rtype, "no_steno") == 0) {
+ success = session_n...
2001 Oct 06
1
Defeating Timing Attacks
Hello,
In response to the timing analysis attacks presented by Dawn Song et.
al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html
we
at Silicon Defense developed a patch for openssh to avoid such
measures.
Timing Analysis Evasion changes were developed by C. Jason Coit and Roel
Jonkman of Silicon Defense.
These changes cause SSH to send packets unless request not to,