Displaying 13 results from an estimated 13 matches for "ssh2_msg_channel_data".
2001 Oct 04
1
FTP Port Forwarding & SSH2_MSG_CHANNEL_DATA question
Hi,
I'm currently working on an FTP utility which contains
SSH2/Port Forwarding functionality. I'm having a problem with
receiving large amounts of data. When I open my forwarding
channel, I give it a Window Size, say about 10K. When I try
to download a file through the forwarded FTP channel, the
SSH2 server (VShell in this case) is only sending over 10K.
Apparently the server will only
2011 Oct 02
4
Information on command execution in sshd
...h the code of open ssh server part ( code for sshd ). My query is when user gives any command ( for example unix command "ls")
in the console ( after ssh login is complete ), which function in sshd will execute this command. I traced that the command is coming to sshd code
in message type SSH2_MSG_CHANNEL_DATA. There is a check using function packet_check_eom(). But I am not able to trace the place
where linux command "ls" will be executed. I want to know the function in sshd code which will execute this function.
Hoping for your expertise in this regard. Kindly help.
Best regards,
Titu
2019 Jun 25
5
About rsync over SSH and compression
...yield better results,
on the ground that SSH will try to cram as much data as possible in a
channel data message, within the limitations imposed by the maximum SSH
message size and the current window size. On the other hand, rsync might
(and 'might' is the keyword here) resort to individual
SSH2_MSG_CHANNEL_DATA messages for particular deltas, thus giving the
compression code smaller amounts of data to play with every time.
Additionally, SSH compression will be able to compress the rsync protocol
control data, which rsync will not be able to compress (right?)
Feedback on the issues above will be much appr...
2001 Jul 22
1
[patch] ignore SSH2_MSG_IGNORE packets
Hi,
protocolkeepalives sends ssh_msg_ignore, which the ssh2 server handles
incorrectly (i.e. it produces some output to syslog, instead of
ignoring the packet):
Jul 9 11:58:07 ren sshd[16580]: error: Hm, dispatch protocol error:
type 32 plen 4
This patch implements a highly advanced function to ignore these
packets ;)
Matthew
-------------- next part --------------
An embedded and
2007 Nov 13
1
Help with openssh: ssh application writing data > 131071 to socket causing message too long error
...if (len > packet_get_maxsize()/
2)
len =
packet_get_maxsize()/2;
}
}
if (len > 0) {
packet_start(compat20 ?
SSH2_MSG_CHANNEL_DATA :
SSH_MSG_CHANNEL_DATA);
packet_put_int(c->remote_id);
packet_put_string(buffer_ptr(&c-
>input), len);
packet_send();
buffer_consume(&c->input, len);...
2019 Jun 25
2
About rsync over SSH and compression
...SSH will try to cram as much data as possible in a
> channel data message, within the limitations imposed by the maximum SSH
> message size and the current window size. On the other hand, rsync
> might
> (and 'might' is the keyword here) resort to individual
> SSH2_MSG_CHANNEL_DATA messages for particular deltas, thus giving the
> compression code smaller amounts of data to play with every time.
> Additionally, SSH compression will be able to compress the rsync
> protocol
> control data, which rsync will not be able to compress (right?)
>
> F...
2010 Jul 22
1
remote vs local window discrepancy
I am utilizing an openssh tunnel between two Linux boxes. On the client
box I issue the following commands to set up the tunnel;
- ssh -w0:0 root at x.x.x.x -v where x.x.x.x is the IP address of the Linux
system running sshd
- ip addr add 10.0.5.1/32 peer 10.0.5.2 dev tun0
- ip link set tun0 up
On the box running sshd I issue the following commands:
- ip addr add 10.0.5.2/32 peer 10.0.5.1 dev
2001 Aug 20
1
Idletimeout patch, third attempt
...return;
+
+ /* The following packets reset idletimeout on input or output.
+ * Note that only actual data resets idletimeout, control packets
+ * do not. */
+ switch(type) {
+ case SSH_MSG_CHANNEL_DATA:
+ case SSH_CMSG_STDIN_DATA:
+ case SSH_SMSG_STDOUT_DATA:
+ case SSH_SMSG_STDERR_DATA:
+ case SSH2_MSG_CHANNEL_DATA:
+ case SSH2_MSG_CHANNEL_EXTENDED_DATA:
+ time(&idletime_last);
+ }
+}
+
+int
+packet_select(int maxfds,
+ fd_set *readset, fd_set *writeset, fd_set *exceptset,
+ int max_time_milliseconds)
+{
+ struct timeval tv, *tvp=NULL;
+ int ret;
+
+ if (idletimeout>0) {
+...
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly:
http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html
<quote>
The paper concludes that the keystroke timing data observable from
today's SSH implementations reveals a dangerously significant amount of
information about user terminal sessions--enough to locate typed
passwords in the session data stream and reduce the
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
...ents bogus_send_count and
use_steno_timing_manipulation
+ * to channel_output_poll.
+*/
void
-channel_output_poll()
+channel_output_poll(int *bogus_send_count, int
use_steno_timing_manipulation)
{
int len, i;
Channel *c;
@@ -1649,11 +1678,49 @@
SSH2_MSG_CHANNEL_DATA :
SSH_MSG_CHANNEL_DATA);
packet_put_int(c->remote_id);
packet_put_string(buffer_ptr(&c->input),
len);
+ /*
+ * Begin SD Mod: if using SSH2 and it
is
+...
2001 May 04
19
SSH connection hanging on logout
I am running OpenSSH 2.9p1 on SunOS 5.7 w/4-24-2001 patch cluster.
Like many other users I am seeing the hanging session on logout
with background processes. This is a huge problem for me as
I centrally manage 50+ machines with rdist across ssh.
Instead of just complaining about the problem I thought I would
put my CS degree to use and try to track down the problem myself.
For starters,
2001 Oct 06
1
Defeating Timing Attacks
Hello,
In response to the timing analysis attacks presented by Dawn Song et.
al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html
we
at Silicon Defense developed a patch for openssh to avoid such
measures.
Timing Analysis Evasion changes were developed by C. Jason Coit and Roel
Jonkman of Silicon Defense.
These changes cause SSH to send packets unless request not to,
2003 Oct 08
4
OS/390 openssh
...ifdef CHARSET_EBCDIC
+ xfree(ucp);
+#endif
}
diff -bur openssh-3.7.1p2.orig/channels.c openssh-3.7.1p2/channels.c
--- openssh-3.7.1p2.orig/channels.c Tue Sep 16 23:34:12 2003
+++ openssh-3.7.1p2/channels.c Tue Oct 7 08:22:00 2003
@@ -1752,7 +1752,11 @@
packet_start(compat20 ?
SSH2_MSG_CHANNEL_DATA : SSH_MSG_CHANNEL_DATA);
packet_put_int(c->remote_id);
+ /*if (strcmp(c->ctype, "session") == 0)*/
+ if (c->ctype[0] == 's')
packet_put_string(buffer_ptr(&c->input), len);
+ else
+ packet_put_binary(buffer_ptr(&c->input), len);...