search for: ssh_create_socket

Displaying 11 results from an estimated 11 matches for "ssh_create_socket".

2002 Jun 11
4
ssh setuid changes.
...h euid==0 if ssh is installed setuid root just switch the euid, don't switch the complete set of groups (this is only needed by sshd). ok provos@ A few comments about this.. 1. I bet dollars to donuts that platforms with problems recovering from set[e]uid() changes (NeXT,etc). 2. ssh_create_socket() changed slightly, which should only affect Cygwin. However, looking at the code I think it just needs a glance over by the porter to ensure no additional work is needed. sshconnect.c: @@ -297,26 +295,14 @@ host, ntop, strport); /* Create a...
2014 Jan 30
1
Announce: OpenSSH 6.5 released
Changes since OpenSSH 6.4 ========================= This is a feature-focused release. New features: * ssh(1), sshd(8): Add support for key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein's Curve25519. This key exchange method is the default when both the client and server support it. * ssh(1), sshd(8): Add support for Ed25519 as a public key type. Ed25519 is a
2012 Feb 12
0
PATCH: multiple BindAddress
...ddress. Note that this option does not work if .Cm UsePrivilegedPort diff -rupN orig/openssh-5.9p1/sshconnect.c openssh-5.9p1/sshconnect.c --- orig/openssh-5.9p1/sshconnect.c 2011-05-29 14:42:34.000000000 +0300 +++ openssh-5.9p1/sshconnect.c 2012-02-12 16:26:33.986132953 +0200 @@ -189,7 +189,7 @@ ssh_create_socket(int privileged, struct { int sock, gaierr; struct addrinfo hints, *res; - + uint i=0; /* * If we are running as root and want to connect to a privileged * port, bind our own socket to a privileged port. @@ -214,28 +214,61 @@ ssh_create_socket(int privileged, struct fcntl(sock, F_SETF...
2011 Jul 17
2
openSSH 5.8p2 BindPort patch
...sponse authentication. The argument to this keyword must be diff -rupN openssh-5.8p2//sshconnect.c openssh-5.8p2-srcport//sshconnect.c --- openssh-5.8p2//sshconnect.c 2011-01-16 12:17:59.000000000 +0000 +++ openssh-5.8p2-srcport//sshconnect.c 2011-07-17 20:19:20.093054511 +0100 @@ -214,7 +214,7 @@ ssh_create_socket(int privileged, struct fcntl(sock, F_SETFD, FD_CLOEXEC); /* Bind the socket to an alternative local IP address */ - if (options.bind_address == NULL) + if (options.bind_address == NULL && options.bind_port == NULL) return sock; memset(&hints, 0, sizeof(hints)); @@ -222,7 +222...
2001 Apr 12
1
ssh not using priv port if target prot not priv
...ple: ssh -p 22222 foo.ucla.edu would never try to connect from a privileged port. Even with useprivilegedport=yes. This disallows .shosts RSA host authentication without a password. This breaks compatability with ssh-1.2.27 and isn't documented anywhere except possibly in the source to the ssh_create_socket function in sshconnect.c: /* * If we are running as root and want to connect to a privileged * port, bind our own socket to a privileged port. */ if (privileged) { int p = IPPORT_RESERVED - 1; sock = rresvport_af(&p, fa...
2002 Oct 21
2
[Bug 418] Allow to build on systems without IPV6
http://bugzilla.mindrot.org/show_bug.cgi?id=418 dirk.meyer at dinoex.sub.org changed: What |Removed |Added ---------------------------------------------------------------------------- Component|Miscellaneous |Build system ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the
2018 Feb 23
6
RFC 8305 Happy Eyeballs in OpenSSH
...mpleted or failed */ - if (getsockopt(sockfd, SOL_SOCKET, SO_ERROR, &optval, &optlen) == -1) { - debug("getsockopt: %s", strerror(errno)); + } + debug("Connecting to %.200s [%.100s] port %s.", + host, ntop, strport); + /* Create a socket for connecting */ + sock = ssh_create_socket(needpriv, ai); + if (sock < 0) { + /* Any error is already output */ + errno = 0; + return -1; + } + if (sock >= FD_SETSIZE) { + error("socket number to big for select: %d", sock); + close(sock); return -1; } - if (optval != 0) { - errno = optval; + fd_ai[sock] = ai; + se...
2017 Jan 12
3
proposed change to ssh_connect_direct()
On Sat, Jan 7, 2017 at 2:30 PM, Peter Moody <mindrot at hda3.com> wrote: > so I spent a bit of time looking at this and it seems like the only > way to go, at least if I want to keep it in ssh_connect_direct(), is > to use pthreads. further, it seems like getting that accepted is > something of a long shot: Sorry, pthreads is a non-starter. I would have thought that using
2000 Oct 30
2
RhostsAuthentication + nondefault port doesn't work?
Hello all, It seems that RhostsAuthentication does not work on non-default port no matter what when connecting from OpenSSH (2.1.1, 2.2.0 tried) either with protocol 1 or protocol 2 (shouldn't work either..). _However_ when connecting with SSH.COM Ltd's ssh, RhostsAuthentication works just fine! Checking the port number of ssh client you can see that OpenSSH doesn't assign
2001 Feb 01
0
warnings on aix325
...uidswap.c:54: warning: implicit declaration of function `seteuid' ssh.c: In function `main': ssh.c:252: warning: implicit declaration of function `setrlimit' ssh.c: In function `ssh_session': ssh.c:802: warning: implicit declaration of function `ioctl' sshconnect.c: In function `ssh_create_socket': sshconnect.c:169: warning: implicit declaration of function `socket' sshconnect.c: In function `ssh_connect': sshconnect.c:265: warning: implicit declaration of function `connect' sshconnect.c:279: warning: implicit declaration of function `shutdown' sshconnect.c:305: warning:...
2000 Jan 19
3
AIX openssh patches
...f SOCKS + SOCKSinit(av0); + #endif /* SOCKS */ + /* Initialize option structure to indicate that no values have been set. */ initialize_options(&options); *** sshconnect.c.DIST Tue Jan 11 09:54:21 2000 --- sshconnect.c Wed Jan 19 11:03:46 2000 *************** *** 142,172 **** int ssh_create_socket(uid_t original_real_uid, int privileged) { ! int sock; ! /* ! * If we are running as root and want to connect to a privileged ! * port, bind our own socket to a privileged port. ! */ ! if (privileged) { ! int p = IPPORT_RESERVED - 1; ! sock = rresvport(&p); ! if (sock &lt...