Displaying 5 results from an estimated 5 matches for "ssh2_msg_request_failure".
2010 Feb 26
4
ClientAliveInterval
Hi,
I am having some trouble with the ClientAliveInterval server setting. My
(C++) application fails to start an SSH channel to an OpensSSH server within
this time-out period if it doesn't reply correctly to this 'keep-alive'
no-op that is sent by the server. How is this no-op handled? I am using the
libssh client library, and I could find no references on how to handle this.
2015 Nov 27
2
[Bug 2509] New: Unexpected change in tcpip-forward reply message in OpenSSH 6.8
...this, with there being no response-specific data in
the case where a non-zero port number is requested. The associated code
for this in server_input_global_request() in server loop.c is:
if (want_reply) {
packet_start(success ?
SSH2_MSG_REQUEST_SUCCESS :
SSH2_MSG_REQUEST_FAILURE);
if (success && allocated_listen_port > 0)
packet_put_int(allocated_listen_port);
packet_send();
packet_write_wait();
}
Note the test for "allocated_listen_port > 0". However, the new code in
O...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...+ /* We have a winner --> close the channel*/
+ channel_free( channels[chan].self );
+ success = 1;
+ }
+ xfree( address_to_bind );
+ }
+
+ /* Client requested a reply */
+ if ( want_reply ) {
+ if ( success ) {
+ packet_start(SSH2_MSG_REQUEST_SUCCESS);
+ }
+ else {
+ packet_start(SSH2_MSG_REQUEST_FAILURE);
+ }
+ /* Now send the SUCCESS/FAILURE */
+ packet_send();
+ packet_write_wait();
+ }
+ xfree(rtype);
+}
+
+
/*
* Stops listening for channels, and removes any unix domain sockets that we
* might have.
@@ -1292,6 +1423,7 @@
channel_free(i);
break;
case SSH_CHANNEL_PORT_LISTENER...
2000 Aug 15
0
Experimental -R support patch for openssh client
...or reply */
packet_put_cstring(address_to_bind);
packet_put_int(listen_port);
- } else {
+ packet_send();
+ packet_write_wait();
+
+ type = packet_read(&payload_len); /* Expect reply from server */
+ switch (type) {
+ case SSH2_MSG_REQUEST_SUCCESS:
+ success = 1;
+ break;
+ case SSH2_MSG_REQUEST_FAILURE:
+ log("Warning: Server doesn't do port forwarding.");
+ break;
+ default:
+ /* Unknown packet */
+ packet_disconnect("Protocol error for port forward request: received packet type %d.", type);
+ }
+
+ }
+ else {
+ /* Protocol 1 */
packet_start(SSH_CMSG_PORT_F...
2001 Feb 10
3
Protocol 2 remote forwarding patch
...= 1;
+ }
+ else {
+ debug("Invalid cancel-tcpip-forward request: Couldn't find channel.");
+ }
+ xfree( address_to_bind );
+ }
+
+ /* Client requested a reply */
+ if ( want_reply ) {
+ if ( success ) {
+ packet_start(SSH2_MSG_REQUEST_SUCCESS);
+ }
+ else {
+ packet_start(SSH2_MSG_REQUEST_FAILURE);
+ }
+ /* Now send the SUCCESS/FAILURE */
+ packet_send();
+ packet_write_wait();
+ }
+ xfree(rtype);
+}
+
/*
* Stops listening for channels, and removes any unix domain sockets that we
* might have.
@@ -1326,6 +1424,7 @@
channel_free(i);
break;
case SSH_CHANNEL_PORT_LISTENER:...