Displaying 11 results from an estimated 11 matches for "ssh_create_socket".
2002 Jun 11
4
ssh setuid changes.
...h euid==0 if ssh is installed setuid root
just switch the euid, don't switch the complete set of groups
(this is only needed by sshd). ok provos@
A few comments about this..
1. I bet dollars to donuts that platforms with problems recovering from
set[e]uid() changes (NeXT,etc).
2. ssh_create_socket() changed slightly, which should only affect Cygwin.
However, looking at the code I think it just needs a glance over by the
porter to ensure no additional work is needed.
sshconnect.c:
@@ -297,26 +295,14 @@
host, ntop, strport);
/* Create a...
2014 Jan 30
1
Announce: OpenSSH 6.5 released
Changes since OpenSSH 6.4
=========================
This is a feature-focused release.
New features:
* ssh(1), sshd(8): Add support for key exchange using elliptic-curve
Diffie Hellman in Daniel Bernstein's Curve25519. This key exchange
method is the default when both the client and server support it.
* ssh(1), sshd(8): Add support for Ed25519 as a public key type.
Ed25519 is a
2012 Feb 12
0
PATCH: multiple BindAddress
...ddress.
Note that this option does not work if
.Cm UsePrivilegedPort
diff -rupN orig/openssh-5.9p1/sshconnect.c openssh-5.9p1/sshconnect.c
--- orig/openssh-5.9p1/sshconnect.c 2011-05-29 14:42:34.000000000 +0300
+++ openssh-5.9p1/sshconnect.c 2012-02-12 16:26:33.986132953 +0200
@@ -189,7 +189,7 @@ ssh_create_socket(int privileged, struct
{
int sock, gaierr;
struct addrinfo hints, *res;
-
+ uint i=0;
/*
* If we are running as root and want to connect to a privileged
* port, bind our own socket to a privileged port.
@@ -214,28 +214,61 @@ ssh_create_socket(int privileged, struct
fcntl(sock, F_SETF...
2011 Jul 17
2
openSSH 5.8p2 BindPort patch
...sponse authentication.
The argument to this keyword must be
diff -rupN openssh-5.8p2//sshconnect.c openssh-5.8p2-srcport//sshconnect.c
--- openssh-5.8p2//sshconnect.c 2011-01-16 12:17:59.000000000 +0000
+++ openssh-5.8p2-srcport//sshconnect.c 2011-07-17 20:19:20.093054511 +0100
@@ -214,7 +214,7 @@ ssh_create_socket(int privileged, struct
fcntl(sock, F_SETFD, FD_CLOEXEC);
/* Bind the socket to an alternative local IP address */
- if (options.bind_address == NULL)
+ if (options.bind_address == NULL && options.bind_port == NULL)
return sock;
memset(&hints, 0, sizeof(hints));
@@ -222,7 +222...
2001 Apr 12
1
ssh not using priv port if target prot not priv
...ple:
ssh -p 22222 foo.ucla.edu
would never try to connect from a privileged port. Even with
useprivilegedport=yes. This disallows .shosts RSA host authentication
without a password.
This breaks compatability with ssh-1.2.27 and isn't documented anywhere
except possibly in the source to the ssh_create_socket function in
sshconnect.c:
/*
* If we are running as root and want to connect to a privileged
* port, bind our own socket to a privileged port.
*/
if (privileged) {
int p = IPPORT_RESERVED - 1;
sock = rresvport_af(&p, fa...
2002 Oct 21
2
[Bug 418] Allow to build on systems without IPV6
http://bugzilla.mindrot.org/show_bug.cgi?id=418
dirk.meyer at dinoex.sub.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Component|Miscellaneous |Build system
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the
2018 Feb 23
6
RFC 8305 Happy Eyeballs in OpenSSH
...mpleted or failed */
- if (getsockopt(sockfd, SOL_SOCKET, SO_ERROR, &optval, &optlen) == -1) {
- debug("getsockopt: %s", strerror(errno));
+ }
+ debug("Connecting to %.200s [%.100s] port %s.",
+ host, ntop, strport);
+ /* Create a socket for connecting */
+ sock = ssh_create_socket(needpriv, ai);
+ if (sock < 0) {
+ /* Any error is already output */
+ errno = 0;
+ return -1;
+ }
+ if (sock >= FD_SETSIZE) {
+ error("socket number to big for select: %d", sock);
+ close(sock);
return -1;
}
- if (optval != 0) {
- errno = optval;
+ fd_ai[sock] = ai;
+ se...
2017 Jan 12
3
proposed change to ssh_connect_direct()
On Sat, Jan 7, 2017 at 2:30 PM, Peter Moody <mindrot at hda3.com> wrote:
> so I spent a bit of time looking at this and it seems like the only
> way to go, at least if I want to keep it in ssh_connect_direct(), is
> to use pthreads. further, it seems like getting that accepted is
> something of a long shot:
Sorry, pthreads is a non-starter.
I would have thought that using
2000 Oct 30
2
RhostsAuthentication + nondefault port doesn't work?
Hello all,
It seems that RhostsAuthentication does not work on non-default port no
matter what when connecting from OpenSSH (2.1.1, 2.2.0 tried) either with
protocol 1 or protocol 2 (shouldn't work either..).
_However_ when connecting with SSH.COM Ltd's ssh, RhostsAuthentication
works just fine!
Checking the port number of ssh client you can see that OpenSSH doesn't
assign
2001 Feb 01
0
warnings on aix325
...uidswap.c:54: warning: implicit declaration of function `seteuid'
ssh.c: In function `main':
ssh.c:252: warning: implicit declaration of function `setrlimit'
ssh.c: In function `ssh_session':
ssh.c:802: warning: implicit declaration of function `ioctl'
sshconnect.c: In function `ssh_create_socket':
sshconnect.c:169: warning: implicit declaration of function `socket'
sshconnect.c: In function `ssh_connect':
sshconnect.c:265: warning: implicit declaration of function `connect'
sshconnect.c:279: warning: implicit declaration of function `shutdown'
sshconnect.c:305: warning:...
2000 Jan 19
3
AIX openssh patches
...f SOCKS
+ SOCKSinit(av0);
+ #endif /* SOCKS */
+
/* Initialize option structure to indicate that no values have been set. */
initialize_options(&options);
*** sshconnect.c.DIST Tue Jan 11 09:54:21 2000
--- sshconnect.c Wed Jan 19 11:03:46 2000
***************
*** 142,172 ****
int
ssh_create_socket(uid_t original_real_uid, int privileged)
{
! int sock;
! /*
! * If we are running as root and want to connect to a privileged
! * port, bind our own socket to a privileged port.
! */
! if (privileged) {
! int p = IPPORT_RESERVED - 1;
! sock = rresvport(&p);
! if (sock <...