Displaying 19 results from an estimated 19 matches for "startup_pipes".
Did you mean:
startup_pipe
2013 Aug 02
9
[Bug 2139] New: re-exec fallback problem
https://bugzilla.mindrot.org/show_bug.cgi?id=2139
Bug ID: 2139
Summary: re-exec fallback problem
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: FreeBSD
Status: NEW
Severity: minor
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
2001 Aug 20
1
Idletimeout patch, third attempt
Here is my third attempt at the idletimeout patch. I tried to address
the points which Marcus Friedl brought up.
It is actually bigger than the previous patches, but not as intrusive.
It is big because it moves some stuff from serverloop.c to packet.c.
- I moved all the logic to packet.c. This means that I also had to move
the actual select() call, which used to be in serverloop.c to packet.c.
2006 Jan 08
3
Allow --without-privsep build.
...g = strdelim(&cp)) && *arg != '\0') {
if (options->num_allow_users >= MAX_ALLOW_USERS)
--- openssh-4.2p1/sshd.c~ 2005-07-26 12:54:56.000000000 +0100
+++ openssh-4.2p1/sshd.c 2006-01-07 18:12:40.000000000 +0000
@@ -200,9 +200,11 @@ u_int utmp_len = MAXHOSTNAMELEN;
int *startup_pipes = NULL;
int startup_pipe; /* in child */
+#ifdef USE_PRIVSEP
/* variables used for privilege separation */
int use_privsep;
struct monitor *pmonitor = NULL;
+#endif
/* global authentication context */
Authctxt *the_authctxt = NULL;
@@ -308,9 +310,10 @@ grace_alarm_handler(int sig)
{
/...
2000 Jul 17
2
sshd -i problem under 2.1.1p4 as well
I have encountered the same problem with sshd -i (under Mandrake linux 6.1)
as that described by Ben L Perkins, this time with 2.1.1p4: ...
Last login: Mon Jul 17 12:04:50 2000 from orpheus.qimr.edu.au
-bash: ?oe90: command not found
-bash: glorious: command not found
-bash: ?]r90: command not found
-bash: marshall4: command not found
Connection to orpheus.qimr.edu.au closed.
log:
Jul 17
2000 Jul 17
1
logout() returned an error
Hi everybody,
I got the following problems, as I tried to connect from ssh (1.2.27) client
to openssh (2.1.1p4) server:
Client:
-------
$ ssh -l user1 192.168.0.2
user1 at 192.168.0.2's password:
Last login: Mon Jul 17 11.05.44 2000 from 192.168.0.1
-bash: ?Ptty3: command not found
-bash: Zg9tty3: command not found
connection to 192.168.0.2 closed.
Server:
-------
logfile-entries:
Jul 17
2001 Sep 28
0
openssh-2.9.9p2 session.c uses two undeclared void functions
I found this problem on 32-bit Solaris 8 sparc. session.c uses two
void functions without declaring them first; this violates the C
standard, which requires declarations for such functions. Here's a
patch.
2001-09-28 Paul Eggert <eggert at twinsun.com>
* session.c (do_pre_login, record_utmp_only): Add missing
declarations.
2008 Sep 24
0
utmp_len
...;
+#include <utmp.h>
#include <openssl/dh.h>
#include <openssl/bn.h>
@@ -238,7 +239,7 @@
u_int session_id2_len = 0;
/* record remote hostname or ip */
-u_int utmp_len = MAXHOSTNAMELEN;
+u_int utmp_len = UT_HOSTSIZE;
/* options.max_startup sized array of fd ints */
int *startup_pipes = NULL;
DES
--
Dag-Erling Sm?rgrav - des at des.no
2003 Oct 28
2
Privilege separation
...LE_PRIVSEP */
pty_setowner(s->pw, s->tty);
/* Set window size from the packet. */
diff -adurN openssh-3.7.1p2.privsep/sshd.c openssh-3.7.1p2/sshd.c
--- openssh-3.7.1p2.privsep/sshd.c Tue Sep 2 16:51:17 2003
+++ openssh-3.7.1p2/sshd.c Sat Oct 4 23:44:14 2003
@@ -197,9 +197,11 @@
int *startup_pipes = NULL;
int startup_pipe; /* in child */
+#ifndef DISABLE_PRIVSEP
/* variables used for privilege separation */
int use_privsep;
struct monitor *pmonitor;
+#endif /* DISABLE_PRIVSEP */
/* message to be displayed after login */
Buffer loginmsg;
@@ -526,6 +528,7 @@
/* We do not clear ssh...
2002 Feb 12
0
[Patch] Xauthority file in /tmp
This issue has been discussed here and elsewhere a fair bit in the past
year or so, but to re-address the issue...
As of OpenSSH 2.9.something the ability to have an Xauthority located in
/tmp was removed, with the following description in the ChangeLog :
- markus at cvs.openbsd.org 2001/06/12 21:21:29
[session.c]
remove xauth-cookie-in-tmp handling. use default $XAUTHORITY, since
2003 Jul 05
0
[PATCH] Replace AIX loginmsg with generic Buffer loginmsg
Hi All.
I've decided to try to merge the -Portable parts of the password expiry
patch (see bug #14) that do not depend on the OpenBSD change in bug #463.
The attached patch is the first step in this process. It removes the
AIX-specific "char *aixloginmsg" and replaces it with a platform-neutral
"Buffer loginmsg". I think this is worth having in -Portable even if it
2006 Mar 29
7
sshd config parser
Hi All.
For various reasons, we're currently looking at extending (or even
overhauling) the config parser used for sshd_config.
Right now the syntax I'm looking at is a cumulative "Match" keyword that
matches when all of the specified criteria are met. This would be
similar the the Host directive used in ssh_config, although it's still
limiting (eg you can't easily
2000 Jul 18
5
scp not shutting down in 2.1.1p4
Hi!
as I just noted, after scp the connection does not shut down properly.
When I do a "scp file targethost:path", on targethost a "sshd" process is
left running. I do use
--with-default-path="/usr/local/openssh/bin:/usr/bin:/usr/local/bin"
to assure, that the corrensponding openssh-scp is used.
It also seems, that normal sessions are not always closed properly.
2002 Apr 10
1
openssh-3.1p1 on GNU/Hurd
...-- openssh-3.1p1.old/sshd.c Mon Mar 4 20:31:30 2002
+++ openssh-3.1p1/sshd.c Tue Apr 9 14:09:55 2002
@@ -183,7 +183,7 @@
int session_id2_len = 0;
/* record remote hostname or ip */
-u_int utmp_len = MAXHOSTNAMELEN;
+u_int utmp_len = 0;
/* options.max_startup sized array of fd ints */
int *startup_pipes = NULL;
@@ -603,6 +603,13 @@
/* Save argv. */
saved_argc = ac;
saved_argv = av;
+
+ /* find max hostname length */
+#ifdef _SC_HOST_NAME_MAX
+ utmp_len = sysconf(_SC_HOST_NAME_MAX);
+#elif MAXHOSTNAMELEN
+ utmp_len = MAXHOSTNAMELEN;
+#endif
/* Initialize configuration options to their def...
2003 Jul 09
0
[PATCH] Add expired password handling for AIX.
Hi All.
Attached is a patch which adds AIX native password expiry support to
sshd. It will only apply to -current and is a subset of the patch I have
been working on in the last few months (see bug #14 [1]). It contains
code by Pablo Sor, Mark Pitt and Zdenek Tlusty and fixes for bugs reported
by many others (see [2] for a full list).
It adds a do_tty_change_password function that execs
2006 Jul 17
2
SMF/process contracts in Solaris 10
I've searched the archive for this mailing list and the bug list for
OpenSSH for this, and I'm finding nothing. I'd appreciate it if
somoene could point me to an existing thread about this. (I know that
other people are aware of the problem, though, so I'm a bit surprised
to find nothing.)
We're running OpenSSH under Solaris 10 using SMF instead of a legacy
init script. SMF
2003 Jul 30
1
[PATCH] Password expiry merge (AIX parts)
Hi All.
Attached is a patch introduces password expiry handling for AIX (other
platforms to follow). It is more or less the same as the previous patch
but has been updated to reflect recent changes to auth-passwd.c
I'm wondering if the AIX parts of auth.c should be moved to port-aix.c
and if the generic password change functions (currently at the end of
auth-passwd.c) belong in a separate
2023 Aug 03
20
[Bug 3598] New: Dead lock of sshd and Defunct of sshd
https://bugzilla.mindrot.org/show_bug.cgi?id=3598
Bug ID: 3598
Summary: Dead lock of sshd and Defunct of sshd
Product: Portable OpenSSH
Version: 9.1p1
Hardware: ix86
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
2017 Oct 10
3
tunnel device name acquisition?
Numerous how-tos all over the Internet show how one would set up
a tunnel using ssh, e.g.:
ssh -f -o Tunnel=ethernet <server_ip> true
I was wondering if there's a way to subsequently acquire the names
of the local and remote tun/tap interfaces (e.g., using the default
"-w any:any") for subsequent automatic tunnel configuration, e.g.:
ip link set $TapDev up
ip link set
2008 Apr 21
3
FIPS 140-2 OpenSSL(2007) patches
Hi,
I am happy to (re)send a set of patches for compiling OpenSSH 4.7p1 with
FIPS 140-2 OpenSSL.
These are based on previously reported patches by Steve Marquess
<marquess at ieee.org> and Ben Laurie <ben at algroup.co.uk>,
for ver. OpenSSH 3.8.
Note that these patches are NOT OFFICIAL, and MAY be used freely by
anyone.
Issues [partially] handled:
SSL FIPS Self test.
RC4,