Displaying 20 results from an estimated 198 matches for "temporarily_use_uid".
2002 Jul 01
3
3.4p1: 'buffer_append_space: alloc 10506240 not supported'
...from 10.10.0.172 port 35503 ssh2
Failed none for quinot from 10.10.0.172 port 35503 ssh2
debug1: userauth-request for user quinot service ssh-connection method
hostbased
debug1: attempt 1 failures 1
debug1: userauth_hostbased: cuser quinot chost vienna.int.domain.com.
pkalg s
sh-dss slen 55
debug1: temporarily_use_uid: 529/101 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 529/101 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 529/101 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 529/101 (e=0)
debug1: restore_uid
Failed hostbased for quinot from 10.10.0.172 port 35503 ssh2
debug1: userau...
2002 Jun 13
0
question about temporarily_use_uid()
hi..
can someone please explain to me what does the
function temporarily_use_uid() in uidswap.c do?
I'm trying to build ssh-3.1p1 for dgux. the
compilation went fine. however, failed when trying to
connect to the server. the reason is getgroups
function in temporarily_use_uid() has a limit
NGROUPS_MAX. this is defined to be 8 on dgux(limits.h)
but for the group I belong to...
2019 Jun 30
2
Possibly Missing Syscalls from Seccomp Filter
Hi!
I'm investigating the seccomp filter in openssh and I wanted to know
whether the following system calls should be added to the filter:
1. getgroups
-
do_authentication2->dispatch_run_fatal->sshpkt_fatal->logdie->cleanup_exit->do_cleanup->temporarily_use_uid->getgroups
2. setgroups
-
do_authentication2->ssh_dispatch_run_fatal->sshpkt_fatal->logdie->cleanup_exit->do_cleanup->temporarily_use_uid->initgroups->setgroups
3. unlink
-
do_authentication2->ssh_dispatch_run_fatal->sshpkt_fatal->logdie->cleanup_exit-...
2011 Nov 03
1
Help with CA Certificates for user authentication?
...n the server:
debug1: KEX done
debug1: userauth-request for user test service ssh-connection method none
debug1: attempt 0 failures 0
debug1: userauth-request for user test service ssh-connection method publickey
debug1: attempt 1 failures 0
debug1: test whether pkalg/pkblob are acceptable
debug1: temporarily_use_uid: 63203/54000 (e=0/0)
debug1: trying public key file /etc/sshtest/authorized_keys
debug1: fd 5 clearing O_NONBLOCK
debug1: restore_uid: 0/0
debug1: temporarily_use_uid: 63203/54000 (e=0/0)
debug1: trying public key file /etc/sshtest/authorized_keys
debug1: fd 5 clearing O_NONBLOCK
debug1: restore_ui...
2015 Jun 20
3
[PATCH] Fix potential use after free in uidswap.c (portable)
Fixes a potential (but probably rather unlikely) use after free bug in
function temporarily_use_uid(), file uidswap.c.
--- a/uidswap.c
+++ b/uidswap.c
@@ -113,8 +113,9 @@ temporarily_use_uid(struct passwd *pw)
}
}
/* Set the effective uid to the given (unprivileged) uid. */
- if (setgroups(user_groupslen, user_groups) < 0)
- fatal("setg...
2002 Jan 10
1
OpenSSH 3.0.Xp1, AIX -> Sun trusted host problem
...on method
hostbased
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: attempt 1 failures 1
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1:
userauth_hostbased: cuser patrol chost aixhost1.Stanford.EDU. pkalg
ssh-dss slen 55
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1:
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: restore_uid
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1:
temporarily_use_uid: 6737/1012 (e=0)
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]: debug1: restore_uid
Jan 10 13:31:15 sunhost.stanford.edu sshd[6832]:...
2012 Nov 13
1
problem with AuthorizedKeysCommand on OpenBSD
...g work right now.)
The keys don't seem to be making it to the SSH server, however. Run
with debugging, I get:
...
debug3: mm_request_receive entering
debug3: monitor_read: checking request 20
debug3: mm_answer_keyallowed entering
debug3: mm_answer_keyallowed: key_from_blob: 0x81973440
debug1: temporarily_use_uid: 32767/32767 (e=0/0)
debug3: Running AuthorizedKeysCommand: "/usr/local/libexec/ssh-ldap-wrapper" as "nobody"
debug1: restore_uid: 0/0
debug1: temporarily_use_uid: 32767/32767 (e=0/0)
debug2: key not found
user_key_command_allowed2: dup2: Bad file descriptor
AuthorizedKeysComman...
2002 Jul 18
1
[Bug 342] RhostsRSAAuthentication does not work with 3.4p1
http://bugzilla.mindrot.org/show_bug.cgi?id=342
stevesk at pobox.com changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution| |INVALID
------- Additional Comments From stevesk at pobox.com 2002-07-18
2002 Jul 25
0
scp hangs
...: attempt 0 failures 0
Failed none for root from 192.168.1.5 port 1743 ssh2
Failed none for root from 192.168.1.5 port 1743 ssh2
debug1: userauth-request for user root service ssh-connection method
publickey
debug1: attempt 1 failures 1
debug1: test whether pkalg/pkblob are acceptable
debug1: temporarily_use_uid: 0/0 (e=0)
debug1: trying public key file /root/.ssh/authorized_keys
debug1: restore_uid
debug1: temporarily_use_uid: 0/0 (e=0)
debug1: trying public key file /root/.ssh/authorized_keys2
debug1: restore_uid
Failed publickey for root from 192.168.1.5 port 1743 ssh2
debug1: userauth-request fo...
2005 Feb 19
0
[PATCH]: uidswap.c: Drop uid 0 check on Cygwin
Hi,
the below patch drops another test for uid 0 on Cygwin. It's embarassing
that I never found it. Actually temporarily_use_uid never worked on
Cygwin due to that.
So far that had no influence, but now that we have activated another
feature which makes Cygwin more POSIX-like, somebody on the Cygwin list
found that agent forwarding didn't work anymore. The reason is that
due to the uid == 0 check in temporarily_use_uid...
2001 Apr 25
0
NeXT // Broken _POSIX_SAVED_ID patch
...d ids also work with seteuid, even though that
is not part of the posix specification. */
-
+#define SAVED_IDS_WORK_WITH_SETEUID
+/* Saved effective uid. */
+static uid_t saved_euid = 0;
+static gid_t saved_egid = 0;
+#endif
+
/* Saved effective uid. */
static int privileged = 0;
static int temporarily_use_uid_effective = 0;
-static uid_t saved_euid = 0;
-static gid_t saved_egid;
static gid_t saved_egroups[NGROUPS_MAX], user_groups[NGROUPS_MAX];
static int saved_egroupslen = -1, user_groupslen = -1;
-
+
/*
* Temporarily changes to the given uid. If the effective user
* id is not root, this does n...
2005 Apr 28
1
ssh 4.0 under AIX 5.3 password expiration
...empt 0 failures 0
Failed none for dummy from 192.168.247.63 port 34762
ssh2
Failed none for dummy from 192.168.247.63 port 34762
ssh2
debug1: userauth-request for user dummy service
ssh-connection method publickey
debug1: attempt 1 failures 1
debug1: test whether pkalg/pkblob are acceptable
debug1: temporarily_use_uid: 203/1 (e=0/0)
debug1: trying public key file
/home/dummy/.ssh/authorized_keys
debug1: restore_uid: 0/0
debug1: temporarily_use_uid: 203/1 (e=0/0)
debug1: trying public key file
/home/dummy/.ssh/authorized_keys2
debug1: restore_uid: 0/0
Failed publickey for dummy from 192.168.247.63 port
34762 ssh2...
2001 Aug 03
1
Disconnecting: protocol error: rcvd type 98
...h/ssh_config
debug1: Applying options for *
debug1: Seeding random number generator
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 1000 geteuid 1000 anon 1
debug1: Connecting to polaris [129.234.2.123] port 2222.
debug1: temporarily_use_uid: 1000/1000 (e=1000)
debug1: restore_uid
debug1: temporarily_use_uid: 1000/1000 (e=1000)
debug1: restore_uid
debug1: Connection established.
debug1: identity file /home/ads/.ssh/identity type 0
debug1: Remote protocol version 1.99, remote software version OpenSSH_2.9p1
debug1: match: OpenSSH_2.9p1 p...
2001 May 04
0
Exit status strangeness
...g1: Reading configuration data /etc/ssh/ssh_config
debug1: Seeding random number generator
debug1: Rhosts Authentication disabled, originating port will not be
trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 504 geteuid 504 anon 1
debug1: Connecting to qacrmdb [10.43.0.61] port 22.
debug1: temporarily_use_uid: 504/504 (e=504)
debug1: restore_uid
debug1: temporarily_use_uid: 504/504 (e=504)
debug1: restore_uid
debug1: Connection established.
debug1: identity file /home/ipopovet/.ssh/identity type 0
debug1: identity file /home/ipopovet/.ssh/id_rsa type -1
debug1: identity file /home/ipopovet/.ssh/id_dsa t...
2001 Jun 05
1
OpenSSH tmp cleanup
Hi,
I noticed that Markus has fixed the temporary file cleanup problems in
OpenSSH cvs. What files need patching for this ? I only noticed
changes in: session.c, channels.h and channels.c.
-Jarno
--
Jarno Huuskonen <Jarno.Huuskonen at uku.fi>
2001 May 04
1
ssh_exchange_identification
...SSH protocols 1.5/2.0, OpenSSL 0x0090581f
debug1: Reading configuration data /etc/ssh_config
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: restore_uid
debug1: ssh_connect: getuid 0 geteuid 0 anon 1
debug1: Connecting to localhost [127.0.0.1] port 22.
debug1: temporarily_use_uid: 0/0 (e=0)
debug1: restore_uid
debug1: temporarily_use_uid: 0/0 (e=0)
debug1: restore_uid
debug1: Connection established.
debug1: read PEM private key done: type DSA
debug1: PEM_read_PrivateKey failed
debug1: read PEM private key done: type <unknown>
debug1: identity file /root/.ssh/identity...
2009 Dec 03
1
Winbind + SSH + AIX - Connection to aixserver01 closed by remote host
...to aixserver01 closed by remote host.
Connection to aixserver01 closed.
Transferred: sent 1648, received 1544 bytes, in 0.0 seconds
Bytes per second: sent 105932.7, received 99247.6
debug1: Exit status -1
On the server aixserver01:
Dec 3 11:23:15 aixserver01 authpriv:debug sshd[467118]: debug1:
temporarily_use_uid: 150302/100513 (e=0/0)
Dec 3 11:23:15 aixserver01 authpriv:debug sshd[467118]: debug1: trying
public key file /home/users/robertobouza/.ssh/authorized_keys
Dec 3 11:23:15 aixserver01 authpriv:debug sshd[467118]: debug1:
restore_uid: 0/0
Dec 3 11:23:15 aixserver01 authpriv:debug sshd[467118]: d...
2002 May 16
3
uidswap
All,
Could someone explain the purpose of the uidswap functions with
respect to ssh ( the client ). From what I gathered , ssh installs as
setuid root and swaps ids when reading potential key files that may be read
only by root. Also , I think when binding to a privileged port ssh swaps
id. Is that so? What are the consequnences if you do not install ssh setuid
root? ( As far I as know no uid
2002 Mar 16
4
[Bug 165] Problem with SSH1 Keys on RedHat7.2
http://bugzilla.mindrot.org/show_bug.cgi?id=165
------- Additional Comments From markus at openbsd.org 2002-03-17 04:31 -------
never seen this. what does sshd -ddd say?
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2003 Feb 28
1
Hostbased Authentication Question
..._keyallowed entering
debug3: mm_answer_keyallowed: key_from_blob: 0x80a4e88
debug2: userauth_hostbased: chost mckinley. resolvedname mckinley ipaddr
192.168.10.1
debug2: stripping trailing dot from chost mckinley.
debug2: auth_rhosts2: clientuser root hostname mckinley ipaddr
192.168.10.1
debug1: temporarily_use_uid: 0/0 (e=0/0)
debug1: restore_uid: 0/0
debug1: temporarily_use_uid: 0/0 (e=0/0)
debug1: restore_uid: 0/0
debug3: mm_answer_keyallowed: key 0x80a4e88 is disallowed
debug3: mm_request_send entering: type 21
debug3: mm_request_receive entering
debug3: mm_key_allowed: waiting for MONITOR_ANS_KEYALLOWED...