Displaying 10 results from an estimated 10 matches for "ssh_userauth2".
2008 Aug 11
5
[Bug 1502] New: Incompatible declaration of AuthctxtV2.success
...P2
Component: ssh
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy: THanson at CardinalPeak.com
Source file sshconnect2.c contains the definition of structure
AuthctxtV2. Field "success" in this structure is declared as type
"int".
In function ssh_userauth2(), authctxt.success is passed to
dispatch_run() as the second argument.
dispatch_run() is declared in dispatch.c with a second parameter of
type sig_atomic_t.
On some OS's (i.e. VxWorks) "sig_atomic_t" is declared as "unsigned
char". Where the system is also big-endian,...
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
...login(Sensitive *sensitive, const char *orighost,
/* key exchange */
/* authenticate user */
debug("Authenticating to %s:%d as '%s'", host, port, server_user);
- ssh_kex2(host, hostaddr, port);
+ ssh_kex2(host, hostaddr, port, client_version_string, server_version_string);
ssh_userauth2(local_user, server_user, host, sensitive);
+ free(client_version_string);
+ free(server_version_string);
free(local_user);
+ free(host);
}
void
diff --git a/sshconnect.h b/sshconnect.h
index 890d857..d6de9fe 100644
--- a/sshconnect.h
+++ b/sshconnect.h
@@ -40,7 +40,7 @@ void ssh_kill_proxy_c...
2006 May 15
2
[PATCH 10/12 bugfix: openssh-4.3p2: memory leak
The variable local_user was allocated by xstrdup and is not freed or
pointed to in this branch. This patch adds the xfree. This entire set
of patches passed the regression tests on my system. Bug found by
Coverity.
Signed-off-by: Kylene Hall <kjhall at us.ibm.com>
---
sshconnect.c | 1 +
1 files changed, 1 insertion(+)
diff -uprN openssh-4.3p2/sshconnect.c
2010 Nov 28
2
[PATCH] Use canonical hostname for DNS SSHFP lookup
...uct sockaddr *hostaddr, struct passwd *pw, int timeout_ms,
+ const char *canohost)
{
char *host, *cp;
char *server_user, *local_user;
@@ -1131,7 +1140,7 @@
/* key exchange */
/* authenticate user */
if (compat20) {
- ssh_kex2(host, hostaddr);
+ ssh_kex2(host, hostaddr, canohost);
ssh_userauth2(local_user, server_user, host, sensitive);
} else {
ssh_kex(host, hostaddr);
diff -ur openssh/sshconnect.h openssh-sshfp/sshconnect.h
--- openssh/sshconnect.h 2010-10-07 13:07:33.000000000 +0200
+++ openssh-sshfp/sshconnect.h 2010-11-28 10:34:37.941783851 +0100
@@ -33,18 +33,19 @@
int
ssh_...
2006 Dec 22
3
[Bug 1270] Public key (DSA) authentication works on 3.8p1 but not on 4.5p1
...naries are used,
first is old 3.8p1 ssh client (which works) and second is new 4.5p1
ssh client (which isn't working) but trying to login from the same
host (hostA) to the same remote host (hostB)
For both versions you can see the "SSH2_MSG_SERVICE_ACCEPT received"
debug message from ssh_userauth2(), but only the 3.8p1 version
will show the debug message "debug2("key: %s (%p)", id->filename,
id->key)" from pubkey_prepare().
I've tried this both with an identyFile directive (as shown in
example) as well as just having the id_dsa file being discovered
from $HOME...
2010 Apr 01
0
OpenSSH Coredump and "Bad packet length" errors seen on 5.10 sparc sun4v (Generic_125100-10)
...4 cipher_crypt (61f94, 774a8, 74490, 10, f0, 7b528) +
34
000338a4 packet_read_poll_seqnr (ffbfe474, 62000, 62000,
620f0,61800, 62400) + 258
00033f94 packet_read_seqnr (0, 6, ffbfe510, 628a8, f0, 3c) +
40
00038bbc dispatch_run (0, ffbfe524, ffbfe510, ffbfe4f0,
624ac, ff) +1c
00025988 ssh_userauth2 (64568, 65250, 72e08, 628a8, 1, 0) +
52c
00021a20 ssh_login (72e08, 4, 45400, 14, 45400, a) + 3a4
000196b4 main (62b14, 647e4, 42a60, 42a58, 42800, 62800)
+ 8a4
00017e48 _start (0, 0, 0, 0, 0, 0) + 5
Around the coredump, many "Bad packet length" errors can be seen in
/v...
2016 Nov 21
11
[Bug 2642] New: [sshconnect2] publickey authentication only properly works if used first: pubkey_prepare doesn't work after pubkey_cleanup
https://bugzilla.mindrot.org/show_bug.cgi?id=2642
Bug ID: 2642
Summary: [sshconnect2] publickey authentication only properly
works if used first: pubkey_prepare doesn't work after
pubkey_cleanup
Product: Portable OpenSSH
Version: 7.3p1
Hardware: amd64
OS: Linux
Status:
2018 Feb 23
2
Attempts to connect to Axway SFTP server result in publickey auth loopin
On Fri, Feb 23, 2018 at 05:01:00PM +1100, Darren Tucker wrote:
> You could try this patch which defers resetting the "tried" flag on the
> pubkeys until the list of authentication methods changes. I don't have
> a server with this behaviour so I'm not sure if it helps (and I'm not
> sure it's the right thing to do anyway).
I think this is a better way to
2016 Sep 21
3
Where to look next?
Thanks for your suggestion! It seems to have gone a little further this time, but isn't accepting the key and is failing back on password-based auth.
We're double-checking that the public key was correctly configured with the account, and also trying a DSA key to see if it behaves differently.
Is there anything you'd suggest we look at or try at this point, and thank you very much
2016 Aug 24
3
kex protocol error: type 7 seq xxx error message
..., it is related to the SSH_EXT_INFO
packet that is send by the server every time it is sending an
SSH_NEWKEYS packet, hence after every rekeying. I reproduced it on my
system with OpenSSH 7.3p1 and manually rekeying with escape R
http://pastebin.com/Xk0dF0mc
on the client side:
sshconnect2.c:
void
ssh_userauth2(const char *local_user, const char *server_user, char *host,
Sensitive *sensitive)
{
...
ssh_dispatch_set(ssh, SSH2_MSG_EXT_INFO, &input_userauth_ext_info);
ssh_dispatch_set(ssh, SSH2_MSG_SERVICE_ACCEPT,
&input_userauth_service_accept);
ssh_dispatch_run(ssh, DISP...