search for: temporarily_use_uid

Displaying 20 results from an estimated 198 matches for "temporarily_use_uid".

2002 Jul 01
3
3.4p1: 'buffer_append_space: alloc 10506240 not supported'
...from 10.10.0.172 port 35503 ssh2 Failed none for quinot from 10.10.0.172 port 35503 ssh2 debug1: userauth-request for user quinot service ssh-connection method hostbased debug1: attempt 1 failures 1 debug1: userauth_hostbased: cuser quinot chost vienna.int.domain.com. pkalg s sh-dss slen 55 debug1: temporarily_use_uid: 529/101 (e=0) debug1: restore_uid debug1: temporarily_use_uid: 529/101 (e=0) debug1: restore_uid debug1: temporarily_use_uid: 529/101 (e=0) debug1: restore_uid debug1: temporarily_use_uid: 529/101 (e=0) debug1: restore_uid Failed hostbased for quinot from 10.10.0.172 port 35503 ssh2 debug1: userau...
2002 Jun 13
0
question about temporarily_use_uid()
hi.. can someone please explain to me what does the function temporarily_use_uid() in uidswap.c do? I'm trying to build ssh-3.1p1 for dgux. the compilation went fine. however, failed when trying to connect to the server. the reason is getgroups function in temporarily_use_uid() has a limit NGROUPS_MAX. this is defined to be 8 on dgux(limits.h) but for the group I belong to...
2019 Jun 30
2
Possibly Missing Syscalls from Seccomp Filter
Hi! I'm investigating the seccomp filter in openssh and I wanted to know whether the following system calls should be added to the filter: 1. getgroups - do_authentication2->dispatch_run_fatal->sshpkt_fatal->logdie->cleanup_exit->do_cleanup->temporarily_use_uid->getgroups 2. setgroups - do_authentication2->ssh_dispatch_run_fatal->sshpkt_fatal->logdie->cleanup_exit->do_cleanup->temporarily_use_uid->initgroups->setgroups 3. unlink - do_authentication2->ssh_dispatch_run_fatal->sshpkt_fatal->logdie->cleanup_exit-...
2011 Nov 03
1
Help with CA Certificates for user authentication?
...n the server: debug1: KEX done debug1: userauth-request for user test service ssh-connection method none debug1: attempt 0 failures 0 debug1: userauth-request for user test service ssh-connection method publickey debug1: attempt 1 failures 0 debug1: test whether pkalg/pkblob are acceptable debug1: temporarily_use_uid: 63203/54000 (e=0/0) debug1: trying public key file /etc/sshtest/authorized_keys debug1: fd 5 clearing O_NONBLOCK debug1: restore_uid: 0/0 debug1: temporarily_use_uid: 63203/54000 (e=0/0) debug1: trying public key file /etc/sshtest/authorized_keys debug1: fd 5 clearing O_NONBLOCK debug1: restore_ui...
2015 Jun 20
3
[PATCH] Fix potential use after free in uidswap.c (portable)
Fixes a potential (but probably rather unlikely) use after free bug in function temporarily_use_uid(), file uidswap.c. --- a/uidswap.c +++ b/uidswap.c @@ -113,8 +113,9 @@ temporarily_use_uid(struct passwd *pw) } } /* Set the effective uid to the given (unprivileged) uid. */ - if (setgroups(user_groupslen, user_groups) < 0) - fatal("setg...
2002 Jan 10
1
OpenSSH 3.0.Xp1, AIX -> Sun trusted host problem
...on method hostbased Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: attempt 1 failures 1 Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: userauth_hostbased: cuser patrol chost aixhost1.Stanford.EDU. pkalg ssh-dss slen 55 Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: temporarily_use_uid: 6737/1012 (e=0) Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: restore_uid Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: temporarily_use_uid: 6737/1012 (e=0) Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: restore_uid Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]:...
2012 Nov 13
1
problem with AuthorizedKeysCommand on OpenBSD
...g work right now.) The keys don't seem to be making it to the SSH server, however. Run with debugging, I get: ... debug3: mm_request_receive entering debug3: monitor_read: checking request 20 debug3: mm_answer_keyallowed entering debug3: mm_answer_keyallowed: key_from_blob: 0x81973440 debug1: temporarily_use_uid: 32767/32767 (e=0/0) debug3: Running AuthorizedKeysCommand: "/usr/local/libexec/ssh-ldap-wrapper" as "nobody" debug1: restore_uid: 0/0 debug1: temporarily_use_uid: 32767/32767 (e=0/0) debug2: key not found user_key_command_allowed2: dup2: Bad file descriptor AuthorizedKeysComman...
2002 Jul 18
1
[Bug 342] RhostsRSAAuthentication does not work with 3.4p1
http://bugzilla.mindrot.org/show_bug.cgi?id=342 stevesk at pobox.com changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |INVALID ------- Additional Comments From stevesk at pobox.com 2002-07-18
2002 Jul 25
0
scp hangs
...: attempt 0 failures 0 Failed none for root from 192.168.1.5 port 1743 ssh2 Failed none for root from 192.168.1.5 port 1743 ssh2 debug1: userauth-request for user root service ssh-connection method publickey debug1: attempt 1 failures 1 debug1: test whether pkalg/pkblob are acceptable debug1: temporarily_use_uid: 0/0 (e=0) debug1: trying public key file /root/.ssh/authorized_keys debug1: restore_uid debug1: temporarily_use_uid: 0/0 (e=0) debug1: trying public key file /root/.ssh/authorized_keys2 debug1: restore_uid Failed publickey for root from 192.168.1.5 port 1743 ssh2 debug1: userauth-request fo...
2005 Feb 19
0
[PATCH]: uidswap.c: Drop uid 0 check on Cygwin
Hi, the below patch drops another test for uid 0 on Cygwin. It's embarassing that I never found it. Actually temporarily_use_uid never worked on Cygwin due to that. So far that had no influence, but now that we have activated another feature which makes Cygwin more POSIX-like, somebody on the Cygwin list found that agent forwarding didn't work anymore. The reason is that due to the uid == 0 check in temporarily_use_uid...
2001 Apr 25
0
NeXT // Broken _POSIX_SAVED_ID patch
...d ids also work with seteuid, even though that is not part of the posix specification. */ - +#define SAVED_IDS_WORK_WITH_SETEUID +/* Saved effective uid. */ +static uid_t saved_euid = 0; +static gid_t saved_egid = 0; +#endif + /* Saved effective uid. */ static int privileged = 0; static int temporarily_use_uid_effective = 0; -static uid_t saved_euid = 0; -static gid_t saved_egid; static gid_t saved_egroups[NGROUPS_MAX], user_groups[NGROUPS_MAX]; static int saved_egroupslen = -1, user_groupslen = -1; - + /* * Temporarily changes to the given uid. If the effective user * id is not root, this does n...
2005 Apr 28
1
ssh 4.0 under AIX 5.3 password expiration
...empt 0 failures 0 Failed none for dummy from 192.168.247.63 port 34762 ssh2 Failed none for dummy from 192.168.247.63 port 34762 ssh2 debug1: userauth-request for user dummy service ssh-connection method publickey debug1: attempt 1 failures 1 debug1: test whether pkalg/pkblob are acceptable debug1: temporarily_use_uid: 203/1 (e=0/0) debug1: trying public key file /home/dummy/.ssh/authorized_keys debug1: restore_uid: 0/0 debug1: temporarily_use_uid: 203/1 (e=0/0) debug1: trying public key file /home/dummy/.ssh/authorized_keys2 debug1: restore_uid: 0/0 Failed publickey for dummy from 192.168.247.63 port 34762 ssh2...
2001 Aug 03
1
Disconnecting: protocol error: rcvd type 98
...h/ssh_config debug1: Applying options for * debug1: Seeding random number generator debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: restore_uid debug1: ssh_connect: getuid 1000 geteuid 1000 anon 1 debug1: Connecting to polaris [129.234.2.123] port 2222. debug1: temporarily_use_uid: 1000/1000 (e=1000) debug1: restore_uid debug1: temporarily_use_uid: 1000/1000 (e=1000) debug1: restore_uid debug1: Connection established. debug1: identity file /home/ads/.ssh/identity type 0 debug1: Remote protocol version 1.99, remote software version OpenSSH_2.9p1 debug1: match: OpenSSH_2.9p1 p...
2001 May 04
0
Exit status strangeness
...g1: Reading configuration data /etc/ssh/ssh_config debug1: Seeding random number generator debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: restore_uid debug1: ssh_connect: getuid 504 geteuid 504 anon 1 debug1: Connecting to qacrmdb [10.43.0.61] port 22. debug1: temporarily_use_uid: 504/504 (e=504) debug1: restore_uid debug1: temporarily_use_uid: 504/504 (e=504) debug1: restore_uid debug1: Connection established. debug1: identity file /home/ipopovet/.ssh/identity type 0 debug1: identity file /home/ipopovet/.ssh/id_rsa type -1 debug1: identity file /home/ipopovet/.ssh/id_dsa t...
2001 Jun 05
1
OpenSSH tmp cleanup
Hi, I noticed that Markus has fixed the temporary file cleanup problems in OpenSSH cvs. What files need patching for this ? I only noticed changes in: session.c, channels.h and channels.c. -Jarno -- Jarno Huuskonen <Jarno.Huuskonen at uku.fi>
2001 May 04
1
ssh_exchange_identification
...SSH protocols 1.5/2.0, OpenSSL 0x0090581f debug1: Reading configuration data /etc/ssh_config debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: restore_uid debug1: ssh_connect: getuid 0 geteuid 0 anon 1 debug1: Connecting to localhost [127.0.0.1] port 22. debug1: temporarily_use_uid: 0/0 (e=0) debug1: restore_uid debug1: temporarily_use_uid: 0/0 (e=0) debug1: restore_uid debug1: Connection established. debug1: read PEM private key done: type DSA debug1: PEM_read_PrivateKey failed debug1: read PEM private key done: type <unknown> debug1: identity file /root/.ssh/identity...
2009 Dec 03
1
Winbind + SSH + AIX - Connection to aixserver01 closed by remote host
...to aixserver01 closed by remote host. Connection to aixserver01 closed. Transferred: sent 1648, received 1544 bytes, in 0.0 seconds Bytes per second: sent 105932.7, received 99247.6 debug1: Exit status -1 On the server aixserver01: Dec 3 11:23:15 aixserver01 authpriv:debug sshd[467118]: debug1: temporarily_use_uid: 150302/100513 (e=0/0) Dec 3 11:23:15 aixserver01 authpriv:debug sshd[467118]: debug1: trying public key file /home/users/robertobouza/.ssh/authorized_keys Dec 3 11:23:15 aixserver01 authpriv:debug sshd[467118]: debug1: restore_uid: 0/0 Dec 3 11:23:15 aixserver01 authpriv:debug sshd[467118]: d...
2002 May 16
3
uidswap
All, Could someone explain the purpose of the uidswap functions with respect to ssh ( the client ). From what I gathered , ssh installs as setuid root and swaps ids when reading potential key files that may be read only by root. Also , I think when binding to a privileged port ssh swaps id. Is that so? What are the consequnences if you do not install ssh setuid root? ( As far I as know no uid
2002 Mar 16
4
[Bug 165] Problem with SSH1 Keys on RedHat7.2
http://bugzilla.mindrot.org/show_bug.cgi?id=165 ------- Additional Comments From markus at openbsd.org 2002-03-17 04:31 ------- never seen this. what does sshd -ddd say? ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2003 Feb 28
1
Hostbased Authentication Question
..._keyallowed entering debug3: mm_answer_keyallowed: key_from_blob: 0x80a4e88 debug2: userauth_hostbased: chost mckinley. resolvedname mckinley ipaddr 192.168.10.1 debug2: stripping trailing dot from chost mckinley. debug2: auth_rhosts2: clientuser root hostname mckinley ipaddr 192.168.10.1 debug1: temporarily_use_uid: 0/0 (e=0/0) debug1: restore_uid: 0/0 debug1: temporarily_use_uid: 0/0 (e=0/0) debug1: restore_uid: 0/0 debug3: mm_answer_keyallowed: key 0x80a4e88 is disallowed debug3: mm_request_send entering: type 21 debug3: mm_request_receive entering debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED...