search for: startup_pipe

Displaying 19 results from an estimated 19 matches for "startup_pipe".

2013 Aug 02
9
[Bug 2139] New: re-exec fallback problem
https://bugzilla.mindrot.org/show_bug.cgi?id=2139 Bug ID: 2139 Summary: re-exec fallback problem Product: Portable OpenSSH Version: -current Hardware: Other OS: FreeBSD Status: NEW Severity: minor Priority: P5 Component: sshd Assignee: unassigned-bugs at mindrot.org
2001 Aug 20
1
Idletimeout patch, third attempt
...orig/session.c Sun Jun 17 06:40:51 2001 +++ openssh-2.9p2/session.c Mon Aug 20 22:47:16 2001 @@ -170,6 +170,11 @@ * authentication. */ alarm(0); + /* + * Now that the login grace alarm is cleared it is time to apply + * idletimeout */ + packet_set_idletimeout(options.idletimeout); + if (startup_pipe != -1) { close(startup_pipe); startup_pipe = -1;
2006 Jan 08
3
Allow --without-privsep build.
...g = strdelim(&cp)) && *arg != '\0') { if (options->num_allow_users >= MAX_ALLOW_USERS) --- openssh-4.2p1/sshd.c~ 2005-07-26 12:54:56.000000000 +0100 +++ openssh-4.2p1/sshd.c 2006-01-07 18:12:40.000000000 +0000 @@ -200,9 +200,11 @@ u_int utmp_len = MAXHOSTNAMELEN; int *startup_pipes = NULL; int startup_pipe; /* in child */ +#ifdef USE_PRIVSEP /* variables used for privilege separation */ int use_privsep; struct monitor *pmonitor = NULL; +#endif /* global authentication context */ Authctxt *the_authctxt = NULL; @@ -308,9 +310,10 @@ grace_alarm_handler(int sig) {...
2000 Jul 17
2
sshd -i problem under 2.1.1p4 as well
I have encountered the same problem with sshd -i (under Mandrake linux 6.1) as that described by Ben L Perkins, this time with 2.1.1p4: ... Last login: Mon Jul 17 12:04:50 2000 from orpheus.qimr.edu.au -bash: ?oe90: command not found -bash: glorious: command not found -bash: ?]r90: command not found -bash: marshall4: command not found Connection to orpheus.qimr.edu.au closed. log: Jul 17
2000 Jul 17
1
logout() returned an error
Hi everybody, I got the following problems, as I tried to connect from ssh (1.2.27) client to openssh (2.1.1p4) server: Client: ------- $ ssh -l user1 192.168.0.2 user1 at 192.168.0.2's password: Last login: Mon Jul 17 11.05.44 2000 from 192.168.0.1 -bash: ?Ptty3: command not found -bash: Zg9tty3: command not found connection to 192.168.0.2 closed. Server: ------- logfile-entries: Jul 17
2001 Sep 28
0
openssh-2.9.9p2 session.c uses two undeclared void functions
...n *, const char *); +#ifdef LOGIN_NEEDS_UTMPX +static void do_pre_login(Session *s); +#endif void do_exec_no_pty(Session *, const char *); void do_exec(Session *, const char *); void do_login(Session *, const char *); @@ -147,6 +150,7 @@ extern int debug_flag; extern u_int utmp_len; extern int startup_pipe; extern void destroy_sensitive_data(void); +extern void record_utmp_only(pid_t, const char *, const char *, const char *, struct sockaddr *); /* original command from peer. */ const char *original_command = NULL;
2008 Sep 24
0
utmp_len
...; +#include <utmp.h> #include <openssl/dh.h> #include <openssl/bn.h> @@ -238,7 +239,7 @@ u_int session_id2_len = 0; /* record remote hostname or ip */ -u_int utmp_len = MAXHOSTNAMELEN; +u_int utmp_len = UT_HOSTSIZE; /* options.max_startup sized array of fd ints */ int *startup_pipes = NULL; DES -- Dag-Erling Sm?rgrav - des at des.no
2003 Oct 28
2
Privilege separation
...LE_PRIVSEP */ pty_setowner(s->pw, s->tty); /* Set window size from the packet. */ diff -adurN openssh-3.7.1p2.privsep/sshd.c openssh-3.7.1p2/sshd.c --- openssh-3.7.1p2.privsep/sshd.c Tue Sep 2 16:51:17 2003 +++ openssh-3.7.1p2/sshd.c Sat Oct 4 23:44:14 2003 @@ -197,9 +197,11 @@ int *startup_pipes = NULL; int startup_pipe; /* in child */ +#ifndef DISABLE_PRIVSEP /* variables used for privilege separation */ int use_privsep; struct monitor *pmonitor; +#endif /* DISABLE_PRIVSEP */ /* message to be displayed after login */ Buffer loginmsg; @@ -526,6 +528,7 @@ /* We do not clear ss...
2002 Feb 12
0
[Patch] Xauthority file in /tmp
...f true, set SO_KEEPALIVE. */ char *ciphers; /* Supported SSH2 ciphers. */ diff -r --unified openssh-3.0.2p1.orig/session.c openssh-3.0.2p1/session.c --- openssh-3.0.2p1.orig/session.c Sun Dec 2 10:37:08 2001 +++ openssh-3.0.2p1/session.c Tue Feb 12 12:01:51 2002 @@ -151,6 +151,9 @@ extern int startup_pipe; extern void destroy_sensitive_data(void); +/* Local Xauthority file. */ +static char *xauthfile = NULL; + /* original command from peer. */ const char *original_command = NULL; @@ -220,6 +223,28 @@ #endif } +xauthfile_cleanup_proc(void *_pw) +{ + struct passwd *pw = _pw; + + debu...
2003 Jul 05
0
[PATCH] Replace AIX loginmsg with generic Buffer loginmsg
...===================================== RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/session.c,v retrieving revision 1.238 diff -u -r1.238 session.c --- session.c 3 Jun 2003 00:25:48 -0000 1.238 +++ session.c 5 Jul 2003 02:21:49 -0000 @@ -95,6 +95,7 @@ extern u_int utmp_len; extern int startup_pipe; extern void destroy_sensitive_data(void); +extern Buffer loginmsg; /* original command from peer. */ const char *original_command = NULL; @@ -103,10 +104,6 @@ #define MAX_SESSIONS 10 Session sessions[MAX_SESSIONS]; -#ifdef WITH_AIXAUTHENTICATE -char *aixloginmsg; -#endif /* WITH_AIXAUTHEN...
2006 Mar 29
7
sshd config parser
Hi All. For various reasons, we're currently looking at extending (or even overhauling) the config parser used for sshd_config. Right now the syntax I'm looking at is a cumulative "Match" keyword that matches when all of the specified criteria are met. This would be similar the the Host directive used in ssh_config, although it's still limiting (eg you can't easily
2000 Jul 18
5
scp not shutting down in 2.1.1p4
...rgethost a "sshd" process is left running. I do use --with-default-path="/usr/local/openssh/bin:/usr/bin:/usr/local/bin" to assure, that the corrensponding openssh-scp is used. It also seems, that normal sessions are not always closed properly. I run OpenSSH 2.1.1p4 (with the startup_pipe = -1; patch posted yesterday, but that should not matter here) on HP-UX 10.20. Any ideas what to do or what to look for? The behaviour occurs with both ssh-1.2.27 "scp" and openssh "scp". Best regards, Lutz -- Lutz Jaenicke Lutz.Jaenicke at aet.TU...
2002 Apr 10
1
openssh-3.1p1 on GNU/Hurd
...-- openssh-3.1p1.old/sshd.c Mon Mar 4 20:31:30 2002 +++ openssh-3.1p1/sshd.c Tue Apr 9 14:09:55 2002 @@ -183,7 +183,7 @@ int session_id2_len = 0; /* record remote hostname or ip */ -u_int utmp_len = MAXHOSTNAMELEN; +u_int utmp_len = 0; /* options.max_startup sized array of fd ints */ int *startup_pipes = NULL; @@ -603,6 +603,13 @@ /* Save argv. */ saved_argc = ac; saved_argv = av; + + /* find max hostname length */ +#ifdef _SC_HOST_NAME_MAX + utmp_len = sysconf(_SC_HOST_NAME_MAX); +#elif MAXHOSTNAMELEN + utmp_len = MAXHOSTNAMELEN; +#endif /* Initialize configuration options to their de...
2003 Jul 09
0
[PATCH] Add expired password handling for AIX.
...===================================== RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/session.c,v retrieving revision 1.241 diff -u -r1.241 session.c --- session.c 8 Jul 2003 12:59:59 -0000 1.241 +++ session.c 9 Jul 2003 02:02:53 -0000 @@ -95,7 +95,9 @@ extern u_int utmp_len; extern int startup_pipe; extern void destroy_sensitive_data(void); +extern int password_change_required; extern Buffer loginmsg; +extern Buffer expiremsg; /* original command from peer. */ const char *original_command = NULL; @@ -461,6 +463,9 @@ "TTY available"); } #endif /* USE_PAM */ + if (pas...
2006 Jul 17
2
SMF/process contracts in Solaris 10
I've searched the archive for this mailing list and the bug list for OpenSSH for this, and I'm finding nothing. I'd appreciate it if somoene could point me to an existing thread about this. (I know that other people are aware of the problem, though, so I'm a bit surprised to find nothing.) We're running OpenSSH under Solaris 10 using SMF instead of a legacy init script. SMF
2003 Jul 30
1
[PATCH] Password expiry merge (AIX parts)
...===================================== RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/session.c,v retrieving revision 1.241 diff -u -r1.241 session.c --- session.c 8 Jul 2003 12:59:59 -0000 1.241 +++ session.c 9 Jul 2003 02:02:53 -0000 @@ -95,7 +95,9 @@ extern u_int utmp_len; extern int startup_pipe; extern void destroy_sensitive_data(void); +extern int password_change_required; extern Buffer loginmsg; +extern Buffer expiremsg; /* original command from peer. */ const char *original_command = NULL; @@ -461,6 +463,9 @@ "TTY available"); } #endif /* USE_PAM */ + if (pas...
2023 Aug 03
18
[Bug 3598] New: Dead lock of sshd and Defunct of sshd
https://bugzilla.mindrot.org/show_bug.cgi?id=3598 Bug ID: 3598 Summary: Dead lock of sshd and Defunct of sshd Product: Portable OpenSSH Version: 9.1p1 Hardware: ix86 OS: Linux Status: NEW Severity: normal Priority: P5 Component: sshd Assignee: unassigned-bugs at mindrot.org
2017 Oct 10
3
tunnel device name acquisition?
Numerous how-tos all over the Internet show how one would set up a tunnel using ssh, e.g.: ssh -f -o Tunnel=ethernet <server_ip> true I was wondering if there's a way to subsequently acquire the names of the local and remote tun/tap interfaces (e.g., using the default "-w any:any") for subsequent automatic tunnel configuration, e.g.: ip link set $TapDev up ip link set
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi, I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with FIPS 140-2 OpenSSL. These are based on previously reported patches by Steve Marquess <marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>, for ver. OpenSSH 3.8. Note that these patches are NOT OFFICIAL, and MAY be used freely by anyone. Issues [partially] handled: SSL FIPS Self test. RC4,