Displaying 7 results from an estimated 7 matches for "ssh_listen_backlog".
2015 Aug 17
2
[PATCH] Expand tilde for UNIX domain socket forwards.
..., __func__, type, fwd->listen_path);
+ /* Expand home directory if necessary */
+ char *expanded_path = tilde_expand_filename(fwd->listen_path, getuid());
+
/* Start a Unix domain listener. */
omask = umask(fwd_opts->streamlocal_bind_mask);
- sock = unix_listener(fwd->listen_path, SSH_LISTEN_BACKLOG,
+ sock = unix_listener(expanded_path, SSH_LISTEN_BACKLOG,
fwd_opts->streamlocal_bind_unlink);
+ free(expanded_path);
umask(omask);
if (sock < 0)
return 0;
--
1.9.1
2023 Jun 17
2
[PATCH] ssh-agent: add systemd socket-based activation
...t_pid);
} else {
/* Try to use specified agent socket */
socket_dir[0] = '\0';
@@ -2161,14 +2195,16 @@ main(int ac, char **av)
* Create socket early so it will exist before command gets run from
* the parent.
*/
- prev_mask = umask(0177);
- sock = unix_listener(socket_name, SSH_LISTEN_BACKLOG, 0);
- if (sock < 0) {
- /* XXX - unix_listener() calls error() not perror() */
- *socket_name = '\0'; /* Don't unlink any existing file */
- cleanup_exit(1);
+ if (sock == 0) {
+ prev_mask = umask(0177);
+ sock = unix_listener(socket_name, SSH_LISTEN_BACKLOG, 0);
+ if (sock &l...
2006 Feb 24
5
[Bug 1162] Inappropriate sequence of syslog messages
http://bugzilla.mindrot.org/show_bug.cgi?id=1162
Summary: Inappropriate sequence of syslog messages
Product: Portable OpenSSH
Version: 4.2p1
Platform: Other
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: bitbucket at mindrot.org
ReportedBy:
2004 Jun 22
2
Tcp listen limit.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi folks.
Please, someone confirm if i'm right. if i'm wrong, please forgive-me.
-
--------------------------------------------------------------------------------------------------------------
I've developed a little tool to stress test tcp connections.( Sending
syn and answer ack-syn ). that simuates a real tcp connection. (
2017 Jun 16
2
[PATCH] allow relative path in streamlocal forwarding
...n 0;
}
- debug3("%s: type %d path %s", __func__, type, fwd->listen_path);
+ debug3("%s: type %d path %s", __func__, type, listen_path);
/* Start a Unix domain listener. */
omask = umask(fwd_opts->streamlocal_bind_mask);
- sock = unix_listener(fwd->listen_path, SSH_LISTEN_BACKLOG,
+ sock = unix_listener(listen_path, SSH_LISTEN_BACKLOG,
fwd_opts->streamlocal_bind_unlink);
umask(omask);
- if (sock < 0)
+ if (sock < 0) {
+ free(listen_path);
return 0;
+ }
- debug("Local forwarding listening on path %s.", fwd->listen_path);
+ debug("Loca...
2016 Jul 21
7
[Bug 2601] New: StreamLocalBindUnlink not working
...remote_fwd_listener(&fwd, NULL, &options.fwd_opts)
channels.c:
channel_setup_local_fwd_listener ->
channel_setup_fwd_listener_streamlocal
channel_setup_fwd_listener_streamlocal(int type, struct Forward *fwd,
struct ForwardOptions *fwd_opts)
calls unix_listener(fwd->listen_path, SSH_LISTEN_BACKLOG,
fwd_opts->streamlocal_bind_unlink)
fwd_opts->streamlocal_bind_unlink is set in servconf.c and thus a
server option.
To fix this, not only the fwd.listen_path would have to be transmitted,
but also the bind_unlink flag, which would probably need a new type of
message, like "str...
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string
client_version_string.
These are used just in a few functions and can easily be passed as
parameters.
Also, there is a strange construct, where their memory is allocated to
the global pointers, then copies of these pointers are assigned to the
kex structure. The kex_free finally frees them via cleanup of the kex