Displaying 13 results from an estimated 13 matches for "ssh_sandbox_violation".
2022 Dec 20
37
[Bug 3512] New: net-misc/openssh-9.1_p1: stopped accepting connections after upgrade to sys-libs/glibc-2.36 (fatal: ssh_sandbox_violation: unexpected system call)
https://bugzilla.mindrot.org/show_bug.cgi?id=3512
Bug ID: 3512
Summary: net-misc/openssh-9.1_p1: stopped accepting connections
after upgrade to sys-libs/glibc-2.36 (fatal:
ssh_sandbox_violation: unexpected system call)
Product: Portable OpenSSH
Version: 9.1p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: major
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org...
2023 Dec 02
33
[Bug 3639] New: server thread aborts during client login after receiving SSH2_MSG_KEXINIT
https://bugzilla.mindrot.org/show_bug.cgi?id=3639
Bug ID: 3639
Summary: server thread aborts during client login after
receiving SSH2_MSG_KEXINIT
Product: Portable OpenSSH
Version: 9.2p1
Hardware: ARM
OS: Linux
Status: NEW
Severity: critical
Priority: P5
Component:
2024 Mar 25
18
[Bug 3674] New: Tracking bug for OpenSSH 9.8
...correct host
https://bugzilla.mindrot.org/show_bug.cgi?id=3449
[Bug 3449] LocalForward doesn't support ~/path syntax for UNIX sockets
https://bugzilla.mindrot.org/show_bug.cgi?id=3512
[Bug 3512] net-misc/openssh-9.1_p1: stopped accepting connections after
upgrade to sys-libs/glibc-2.36 (fatal: ssh_sandbox_violation:
unexpected system call)
https://bugzilla.mindrot.org/show_bug.cgi?id=3531
[Bug 3531] Ssh will not exit when it receives SIGTERM before calling
poll in client_wait_until_can_do_something until some events happen.
--
You are receiving this mail because:
You are watching the assignee of the bug.
2023 Feb 04
26
[Bug 3533] New: tracking bug for openssh-9.3
https://bugzilla.mindrot.org/show_bug.cgi?id=3533
Bug ID: 3533
Summary: tracking bug for openssh-9.3
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Keywords: meta
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee:
2024 Jan 09
8
[Bug 3651] New: tracking bug for openssh-9.7
...correct host
https://bugzilla.mindrot.org/show_bug.cgi?id=3449
[Bug 3449] LocalForward doesn't support ~/path syntax for UNIX sockets
https://bugzilla.mindrot.org/show_bug.cgi?id=3512
[Bug 3512] net-misc/openssh-9.1_p1: stopped accepting connections after
upgrade to sys-libs/glibc-2.36 (fatal: ssh_sandbox_violation:
unexpected system call)
https://bugzilla.mindrot.org/show_bug.cgi?id=3531
[Bug 3531] Ssh will not exit when it receives SIGTERM before calling
poll in client_wait_until_can_do_something until some events happen.
--
You are receiving this mail because:
You are watching the assignee of the bug.
2024 Jun 15
11
[Bug 3702] New: sshd fork crashed when compiled with seccomp
https://bugzilla.mindrot.org/show_bug.cgi?id=3702
Bug ID: 3702
Summary: sshd fork crashed when compiled with seccomp
Product: Portable OpenSSH
Version: 9.7p1
Hardware: ARM64
OS: Linux
Status: NEW
Severity: minor
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2023 Mar 18
1
Minimize sshd log clutter/spam from unauthenticated connections
modern syslog daemons (including rsyslog, which is default on just about every
linux system) allow you to filter efficiently on the message contents, not just
the severity, so you can opt to throw out the messages you don't want.
I advocate for a slightly different way of dealing with it, filter these
messages from your main logstream, but put them into either a script directly,
or a
2023 Nov 03
0
9.3p1 Daemon Rejects Client Connections on armv7l-dey-linux-gnueabihf w/ GCC 10/11/12
...e len=101
debug3: mm_request_send: entering, type 7
debug2: monitor_read: 6 used once, disabling now
debug3: send packet: type 31 [preauth]
debug3: send packet: type 21 [preauth]
debug2: ssh_set_newkeys: mode 1 [preauth]
debug1: rekey out after 134217728 blocks [preauth]
ssh_sandbox_violation: unexpected system call (arch:0x40000028,syscall:403 @ 0x76ccaa66) [preauth]
debug1: monitor_read_log: child log fd closed
debug3: mm_request_receive: entering
debug1: do_cleanup
debug1: Killing privsep child 528
...
The last defined system call in <asm/unistd-common.h> i...
2023 Mar 18
3
Minimize sshd log clutter/spam from unauthenticated connections
...ace, see my other mail):
Invalid user $(ping -c 1 16e939dc.ad.xspzo.com) from ...
Invalid user ' $(ping -c 1 16e939dc.ad.xspzo.com) from ...
Invalid user ' or '1'='1' - from 176.100.42.41
Only two concerning messages came up:
error: beginning MaxStartups throttling
fatal: ssh_sandbox_violation: unexpected system call (arch:0xc000003e,syscall:20 @ 0x7f1d8469e1f5) [preauth]
I definitely wouldn't want to miss the above among an almost endless
list of (invalid) usernames, (dis-)connecting IP addresses, invalid
version strings, etc. that various script kiddies are playing with.
While...
2022 Oct 04
40
[Bug 3480] New: tracking bug for openssh-9.1
https://bugzilla.mindrot.org/show_bug.cgi?id=3480
Bug ID: 3480
Summary: tracking bug for openssh-9.1
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Keywords: meta
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee:
2023 Mar 17
18
[Bug 3549] New: Tracking bug for OpenSSH 9.4
...correct host
https://bugzilla.mindrot.org/show_bug.cgi?id=3449
[Bug 3449] LocalForward doesn't support ~/path syntax for UNIX sockets
https://bugzilla.mindrot.org/show_bug.cgi?id=3512
[Bug 3512] net-misc/openssh-9.1_p1: stopped accepting connections after
upgrade to sys-libs/glibc-2.36 (fatal: ssh_sandbox_violation:
unexpected system call)
--
You are receiving this mail because:
You are watching the assignee of the bug.
2024 Jul 07
19
[Bug 3708] New: Tracking bug for OpenSSH 9.9
...correct host
https://bugzilla.mindrot.org/show_bug.cgi?id=3449
[Bug 3449] LocalForward doesn't support ~/path syntax for UNIX sockets
https://bugzilla.mindrot.org/show_bug.cgi?id=3512
[Bug 3512] net-misc/openssh-9.1_p1: stopped accepting connections after
upgrade to sys-libs/glibc-2.36 (fatal: ssh_sandbox_violation:
unexpected system call)
https://bugzilla.mindrot.org/show_bug.cgi?id=3673
[Bug 3673] -fzero-call-used-regs=used detection fails on Linux m68k
with GCC 13
--
You are receiving this mail because:
You are watching the assignee of the bug.
2023 Oct 11
25
[Bug 3628] New: tracking bug for openssh-9.6
https://bugzilla.mindrot.org/show_bug.cgi?id=3628
Bug ID: 3628
Summary: tracking bug for openssh-9.6
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Keywords: meta
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee: