search for: sshconnect

Displaying 20 results from an estimated 271 matches for "sshconnect".

2006 May 15
2
[PATCH 10/12 bugfix: openssh-4.3p2: memory leak
The variable local_user was allocated by xstrdup and is not freed or pointed to in this branch. This patch adds the xfree. This entire set of patches passed the regression tests on my system. Bug found by Coverity. Signed-off-by: Kylene Hall <kjhall at us.ibm.com> --- sshconnect.c | 1 + 1 files changed, 1 insertion(+) diff -uprN openssh-4.3p2/sshconnect.c openssh-4.3p2-kylie/sshconnect.c --- openssh-4.3p2/sshconnect.c 2005-12-13 02:29:03.000000000 -0600 +++ openssh-4.3p2-kylie/sshconnect.c 2006-05-04 10:07:57.000000000 -0500 @@ -937,6 +937,7 @@ ssh_login(Sensitive *sen...
2018 Dec 09
2
[PATCH] Enable ConnectTimeout with ConnectionAttempts
Fix bug ConnectTimeout=N only works on the first ConnectionAttempts https://bugzilla.mindrot.org/show_bug.cgi?id=2918 --- sshconnect.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/sshconnect.c b/sshconnect.c index 4862da5e..b837a83a 100644 --- a/sshconnect.c +++ b/sshconnect.c @@ -454,11 +454,12 @@ waitrfd(int fd, int *timeoutp) { struct pollfd pfd; struct timeval t_start; - int oerrno, r; + int oe...
2002 Oct 21
2
[Bug 418] Allow to build on systems without IPV6
http://bugzilla.mindrot.org/show_bug.cgi?id=418 dirk.meyer at dinoex.sub.org changed: What |Removed |Added ---------------------------------------------------------------------------- Component|Miscellaneous |Build system ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the
2004 Mar 23
2
A question on Compilation errors...
...ake stage I run into the following undefineds. Any idea what may be causing this. I am using version 3.8p1 of OpenSSH. Thank you in advance for your response Amba (cd openbsd-compat && make) make[1]: Nothing to be done for `all'. gcc -o ssh ssh.o readconf.o clientloop.o sshtty.o sshconnect.o sshconnect1.o sshconnect2.o -L. -Lopenbsd-compat/ -L/usr/local/ssl/lib -lssh -lopenbsd-compat -lcrypto -lz collect2: ld returned 1 exit status readconf.o: In function `parse_token': /openssh-3.8p1/readconf.c(263): undefined reference to `strcasecmp' readconf.o: In function `process_conf...
2000 Mar 01
0
Problem in sshconnect.c?
...0 box using the 1.2.2 i386 rpms, and I can't connect to it from other machines. I edited the sshd_config file and changed the ListenAddress from 0.0.0.0 to the machine's IP number. The error I have been getting at first confused me, so I checked out the code, and found the function in the sshconnect.c file. The strange thing is that sometimes the error message is different, (not less confusing, unfortunately) This is the error message I've been getting: -> ssh_exchange_identification: read: Success I have also got it to give me these error messages: -> ssh_exchange_identification:...
2014 Jul 16
1
ssh - Connection closed by UNKNOWN
...p from canohost.c is still NULL and the function returns "UNKNOWN". I think that it could be workarounded by calling get_remote_ipaddr() right after packet_set_connection(), e.g. using another debug message, see bellow, or there could be set_remote_ipaddr() in canonhost.c for that. --- a/sshconnect.c +++ b/sshconnect.c @@ -62,6 +62,7 @@ #include "monitor_fdpass.h" #include "ssh2.h" #include "version.h" +#include "canohost.h" char *client_version_string = NULL; char *server_version_string = NULL; @@ -171,6 +172,8 @@ ssh_proxy_fdpass_connect(const...
2002 Aug 02
3
[Bug 377] New: Reduce compiler warnings. Use unsigned args to the ctype.h is*() macros.
...39; inet_aton.c:155: warning: subscript has type `char' match.c:138: warning: subscript has type `char' mktemp.c:168: warning: subscript has type `char' readpassphrase.c:123: warning: subscript has type `char' scp.c:758: warning: subscript has type `char' sshconnect.c:834: warning: subscript has type `char' Given the possibility of characters outside of the 0 thru 0x7f range and the implementation of the is*() macros as using an index into an array, negative arguments could lead to unexpected behavior. log: * canohost.c (get_remote_hostname): Argument t...
2002 Jun 11
4
ssh setuid changes.
Ok, I'm doing a heads up here. I just applied: - markus at cvs.openbsd.org 2002/06/11 04:14:26 [ssh.c sshconnect.c sshconnect.h] no longer use uidswap.[ch] from the ssh client run less code with euid==0 if ssh is installed setuid root just switch the euid, don't switch the complete set of groups (this is only needed by sshd). ok provos@ A few comments about this.. 1. I bet dollars...
2014 Dec 03
0
[Bug 1742] sshconnect should use port returned by getaddrinfo
https://bugzilla.mindrot.org/show_bug.cgi?id=1742 Sorin Sbarnea <sorin.sbarnea at gmail.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |sorin.sbarnea at gmail.com -- You are receiving this mail because: You are watching someone on the CC list
2000 Feb 15
0
tiny bug fix
Hi, when IPv4-only client connect to a server which have IPv4 and IPv6 addresses, the client can't connect to the server via IPv4 because the client give up on first rresevport_af(). the below patch fixes it. --- Munechika SUMIKAWA @ KAME Project / FreeBSD.org Index: sshconnect.c =================================================================== RCS file: /cvs/src/usr.bin/ssh/sshconnect.c,v retrieving revision 1.53 diff -u -r1.53 sshconnect.c --- sshconnect.c 2000/01/18 09:42:17 1.53 +++ sshconnect.c 2000/02/15 10:18:18 @@ -150,7 +150,7 @@ int p = IPPORT_RESERVED - 1;...
2005 Jun 09
0
Disconnects from Cisco router ssh sessions.
...:33 -0000 1.37 +++ compat.h 9 Jun 2005 07:55:01 -0000 @@ -56,6 +56,7 @@ #define SSH_BUG_PROBE 0x00400000 #define SSH_BUG_FIRSTKEX 0x00800000 #define SSH_OLD_FORWARD_ADDR 0x01000000 +#define SSH_BUG_BIGV1PACKET 0x02000000 void enable_compat13(void); void enable_compat20(void); Index: sshconnect.c =================================================================== RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/sshconnect.c,v retrieving revision 1.130 diff -u -p -r1.130 sshconnect.c --- sshconnect.c 26 May 2005 02:23:44 -0000 1.130 +++ sshconnect.c 9 Jun 2005 07:55:14 -0000 @@ -5...
2013 May 10
0
[Bug 1742] sshconnect should use port returned by getaddrinfo
https://bugzilla.mindrot.org/show_bug.cgi?id=1742 Gene Hightower <gene at digilicious.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |gene at digilicious.com -- You are receiving this mail because: You are watching the assignee of the bug. You
2013 Jul 25
2
[Bug 1742] sshconnect should use port returned by getaddrinfo
https://bugzilla.mindrot.org/show_bug.cgi?id=1742 --- Comment #13 from Damien Miller <djm at mindrot.org> --- Thinking about this a little more, this patch would break hosts where "ssh" isn't in /etc/services. There are probably a few of these out there, since people like to run OpenSSH on all sorts of old things. How about we do the getservbyname lookup but only set port (to
2014 Feb 05
0
[Bug 1742] sshconnect should use port returned by getaddrinfo
https://bugzilla.mindrot.org/show_bug.cgi?id=1742 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks| |2188 --- Comment #16 from Damien Miller <djm at mindrot.org> --- Retarget incomplete bugs / feature requests
2014 Apr 12
0
[Bug 1742] sshconnect should use port returned by getaddrinfo
https://bugzilla.mindrot.org/show_bug.cgi?id=1742 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks| |2226 --- Comment #18 from Damien Miller <djm at mindrot.org> --- Retarget to 6.7 release, since 6.6 was mostly
2014 Jul 03
0
[Bug 1742] sshconnect should use port returned by getaddrinfo
https://bugzilla.mindrot.org/show_bug.cgi?id=1742 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Blocks|2226 | --- Comment #20 from Damien Miller <djm at mindrot.org> --- untarget from 6.7; this needs a concrete design
2010 Nov 28
2
[PATCH] Use canonical hostname for DNS SSHFP lookup
...:%d).", host, @@ -889,6 +890,8 @@ verbose("Authenticated to %s (via proxy).", host); } + xfree (canohost); + /* We no longer need the private host keys. Clear them now. */ if (sensitive_data.nkeys != 0) { for (i = 0; i < sensitive_data.nkeys; i++) { diff -ur openssh/sshconnect1.c openssh-sshfp/sshconnect1.c --- openssh/sshconnect1.c 2006-11-07 13:14:42.000000000 +0100 +++ openssh-sshfp/sshconnect1.c 2010-11-27 23:57:11.267747490 +0100 @@ -535,7 +535,7 @@ debug("Received server public key (%d bits) and host key (%d bits).", BN_num_bits(server_key->rsa...
2001 Feb 01
0
warnings on aix325
...`temporarily_use_uid': uidswap.c:54: warning: implicit declaration of function `seteuid' ssh.c: In function `main': ssh.c:252: warning: implicit declaration of function `setrlimit' ssh.c: In function `ssh_session': ssh.c:802: warning: implicit declaration of function `ioctl' sshconnect.c: In function `ssh_create_socket': sshconnect.c:169: warning: implicit declaration of function `socket' sshconnect.c: In function `ssh_connect': sshconnect.c:265: warning: implicit declaration of function `connect' sshconnect.c:279: warning: implicit declaration of function `shutdo...
2015 Feb 19
2
Proposal: Allow HostKeyAlias to be used in hostname check against certificate principal.
Howdy -- I have a number of servers with host keys validated by certificates. These systems are behind a load-balanced frontend, and the certificates are signed as valid for the DNS name used by that common frontend address. This works well for the primary use case of the systems; however, when wishing to address only a single unit within the pool, the certificate cannot be used to validate that
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string client_version_string. These are used just in a few functions and can easily be passed as parameters. Also, there is a strange construct, where their memory is allocated to the global pointers, then copies of these pointers are assign...