Displaying 20 results from an estimated 271 matches for "sshconnect".
2006 May 15
2
[PATCH 10/12 bugfix: openssh-4.3p2: memory leak
The variable local_user was allocated by xstrdup and is not freed or
pointed to in this branch. This patch adds the xfree. This entire set
of patches passed the regression tests on my system. Bug found by
Coverity.
Signed-off-by: Kylene Hall <kjhall at us.ibm.com>
---
sshconnect.c | 1 +
1 files changed, 1 insertion(+)
diff -uprN openssh-4.3p2/sshconnect.c openssh-4.3p2-kylie/sshconnect.c
--- openssh-4.3p2/sshconnect.c 2005-12-13 02:29:03.000000000 -0600
+++ openssh-4.3p2-kylie/sshconnect.c 2006-05-04 10:07:57.000000000 -0500
@@ -937,6 +937,7 @@ ssh_login(Sensitive *sen...
2018 Dec 09
2
[PATCH] Enable ConnectTimeout with ConnectionAttempts
Fix bug ConnectTimeout=N only works on the first ConnectionAttempts
https://bugzilla.mindrot.org/show_bug.cgi?id=2918
---
sshconnect.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/sshconnect.c b/sshconnect.c
index 4862da5e..b837a83a 100644
--- a/sshconnect.c
+++ b/sshconnect.c
@@ -454,11 +454,12 @@ waitrfd(int fd, int *timeoutp)
{
struct pollfd pfd;
struct timeval t_start;
- int oerrno, r;
+ int oe...
2002 Oct 21
2
[Bug 418] Allow to build on systems without IPV6
http://bugzilla.mindrot.org/show_bug.cgi?id=418
dirk.meyer at dinoex.sub.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Component|Miscellaneous |Build system
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the
2004 Mar 23
2
A question on Compilation errors...
...ake stage I run into the
following undefineds. Any idea what may be causing this. I am using
version 3.8p1 of OpenSSH.
Thank you in advance for your response
Amba
(cd openbsd-compat && make)
make[1]: Nothing to be done for `all'.
gcc -o ssh ssh.o readconf.o clientloop.o sshtty.o sshconnect.o
sshconnect1.o sshconnect2.o -L.
-Lopenbsd-compat/ -L/usr/local/ssl/lib -lssh -lopenbsd-compat
-lcrypto -lz
collect2: ld returned 1 exit status
readconf.o: In function `parse_token':
/openssh-3.8p1/readconf.c(263): undefined reference to `strcasecmp'
readconf.o: In function `process_conf...
2000 Mar 01
0
Problem in sshconnect.c?
...0 box using the 1.2.2 i386 rpms, and I
can't connect to it from
other machines. I edited the sshd_config file and changed the
ListenAddress from 0.0.0.0 to
the machine's IP number.
The error I have been getting at first confused me, so I checked out the
code, and found the function in the sshconnect.c file. The strange
thing is that sometimes the error message is different, (not less
confusing, unfortunately)
This is the error message I've been getting:
-> ssh_exchange_identification: read: Success
I have also got it to give me these error messages:
-> ssh_exchange_identification:...
2014 Jul 16
1
ssh - Connection closed by UNKNOWN
...p from canohost.c is still NULL and the function
returns "UNKNOWN". I think that it could be workarounded by calling get_remote_ipaddr() right
after packet_set_connection(), e.g. using another debug message, see bellow, or
there could be set_remote_ipaddr() in canonhost.c for that.
--- a/sshconnect.c
+++ b/sshconnect.c
@@ -62,6 +62,7 @@
#include "monitor_fdpass.h"
#include "ssh2.h"
#include "version.h"
+#include "canohost.h"
char *client_version_string = NULL;
char *server_version_string = NULL;
@@ -171,6 +172,8 @@ ssh_proxy_fdpass_connect(const...
2002 Aug 02
3
[Bug 377] New: Reduce compiler warnings. Use unsigned args to the ctype.h is*() macros.
...39;
inet_aton.c:155: warning: subscript has type `char'
match.c:138: warning: subscript has type `char'
mktemp.c:168: warning: subscript has type `char'
readpassphrase.c:123: warning: subscript has type `char'
scp.c:758: warning: subscript has type `char'
sshconnect.c:834: warning: subscript has type `char'
Given the possibility of characters outside of the 0 thru 0x7f range
and the implementation of the is*() macros as using an index into an
array, negative arguments could lead to unexpected behavior.
log:
* canohost.c (get_remote_hostname): Argument t...
2002 Jun 11
4
ssh setuid changes.
Ok, I'm doing a heads up here.
I just applied:
- markus at cvs.openbsd.org 2002/06/11 04:14:26
[ssh.c sshconnect.c sshconnect.h]
no longer use uidswap.[ch] from the ssh client
run less code with euid==0 if ssh is installed setuid root
just switch the euid, don't switch the complete set of groups
(this is only needed by sshd). ok provos@
A few comments about this..
1. I bet dollars...
2014 Dec 03
0
[Bug 1742] sshconnect should use port returned by getaddrinfo
https://bugzilla.mindrot.org/show_bug.cgi?id=1742
Sorin Sbarnea <sorin.sbarnea at gmail.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |sorin.sbarnea at gmail.com
--
You are receiving this mail because:
You are watching someone on the CC list
2000 Feb 15
0
tiny bug fix
Hi,
when IPv4-only client connect to a server which have IPv4 and IPv6
addresses, the client can't connect to the server via IPv4 because
the client give up on first rresevport_af().
the below patch fixes it.
---
Munechika SUMIKAWA @ KAME Project / FreeBSD.org
Index: sshconnect.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/sshconnect.c,v
retrieving revision 1.53
diff -u -r1.53 sshconnect.c
--- sshconnect.c 2000/01/18 09:42:17 1.53
+++ sshconnect.c 2000/02/15 10:18:18
@@ -150,7 +150,7 @@
int p = IPPORT_RESERVED - 1;...
2005 Jun 09
0
Disconnects from Cisco router ssh sessions.
...:33 -0000 1.37
+++ compat.h 9 Jun 2005 07:55:01 -0000
@@ -56,6 +56,7 @@
#define SSH_BUG_PROBE 0x00400000
#define SSH_BUG_FIRSTKEX 0x00800000
#define SSH_OLD_FORWARD_ADDR 0x01000000
+#define SSH_BUG_BIGV1PACKET 0x02000000
void enable_compat13(void);
void enable_compat20(void);
Index: sshconnect.c
===================================================================
RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/sshconnect.c,v
retrieving revision 1.130
diff -u -p -r1.130 sshconnect.c
--- sshconnect.c 26 May 2005 02:23:44 -0000 1.130
+++ sshconnect.c 9 Jun 2005 07:55:14 -0000
@@ -5...
2013 May 10
0
[Bug 1742] sshconnect should use port returned by getaddrinfo
https://bugzilla.mindrot.org/show_bug.cgi?id=1742
Gene Hightower <gene at digilicious.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |gene at digilicious.com
--
You are receiving this mail because:
You are watching the assignee of the bug.
You
2013 Jul 25
2
[Bug 1742] sshconnect should use port returned by getaddrinfo
https://bugzilla.mindrot.org/show_bug.cgi?id=1742
--- Comment #13 from Damien Miller <djm at mindrot.org> ---
Thinking about this a little more, this patch would break hosts where
"ssh" isn't in /etc/services. There are probably a few of these out
there, since people like to run OpenSSH on all sorts of old things.
How about we do the getservbyname lookup but only set port (to
2014 Feb 05
0
[Bug 1742] sshconnect should use port returned by getaddrinfo
https://bugzilla.mindrot.org/show_bug.cgi?id=1742
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks| |2188
--- Comment #16 from Damien Miller <djm at mindrot.org> ---
Retarget incomplete bugs / feature requests
2014 Apr 12
0
[Bug 1742] sshconnect should use port returned by getaddrinfo
https://bugzilla.mindrot.org/show_bug.cgi?id=1742
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks| |2226
--- Comment #18 from Damien Miller <djm at mindrot.org> ---
Retarget to 6.7 release, since 6.6 was mostly
2014 Jul 03
0
[Bug 1742] sshconnect should use port returned by getaddrinfo
https://bugzilla.mindrot.org/show_bug.cgi?id=1742
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Blocks|2226 |
--- Comment #20 from Damien Miller <djm at mindrot.org> ---
untarget from 6.7; this needs a concrete design
2010 Nov 28
2
[PATCH] Use canonical hostname for DNS SSHFP lookup
...:%d).", host,
@@ -889,6 +890,8 @@
verbose("Authenticated to %s (via proxy).", host);
}
+ xfree (canohost);
+
/* We no longer need the private host keys. Clear them now. */
if (sensitive_data.nkeys != 0) {
for (i = 0; i < sensitive_data.nkeys; i++) {
diff -ur openssh/sshconnect1.c openssh-sshfp/sshconnect1.c
--- openssh/sshconnect1.c 2006-11-07 13:14:42.000000000 +0100
+++ openssh-sshfp/sshconnect1.c 2010-11-27 23:57:11.267747490 +0100
@@ -535,7 +535,7 @@
debug("Received server public key (%d bits) and host key (%d bits).",
BN_num_bits(server_key->rsa...
2001 Feb 01
0
warnings on aix325
...`temporarily_use_uid':
uidswap.c:54: warning: implicit declaration of function `seteuid'
ssh.c: In function `main':
ssh.c:252: warning: implicit declaration of function `setrlimit'
ssh.c: In function `ssh_session':
ssh.c:802: warning: implicit declaration of function `ioctl'
sshconnect.c: In function `ssh_create_socket':
sshconnect.c:169: warning: implicit declaration of function `socket'
sshconnect.c: In function `ssh_connect':
sshconnect.c:265: warning: implicit declaration of function `connect'
sshconnect.c:279: warning: implicit declaration of function `shutdo...
2015 Feb 19
2
Proposal: Allow HostKeyAlias to be used in hostname check against certificate principal.
Howdy --
I have a number of servers with host keys validated by certificates.
These systems are behind a load-balanced frontend, and the
certificates are signed as valid for the DNS name used by that common
frontend address.
This works well for the primary use case of the systems; however, when
wishing to address only a single unit within the pool, the certificate
cannot be used to validate that
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string
client_version_string.
These are used just in a few functions and can easily be passed as
parameters.
Also, there is a strange construct, where their memory is allocated to
the global pointers, then copies of these pointers are assign...