search for: toremote

Displaying 13 results from an estimated 13 matches for "toremote".

2001 Jan 30
4
Detection of identical file doesn't work for localhost:
...the function "colon" in 984 to check if you should to a remote copy or a local copy. I think it would be possible to add a check to it to see if the name of the remote host will be localhost and then also use the function "tolocal" for doing a local copy instead of calling "toremote". What do you guys think? Would you please add this feature? Ciao Christian P.S.: Would somebody please change s/debain/debian/ in the ChangeLog to fix my email-address? Thanks -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: applic...
2004 Jul 20
8
[Bug 897] scp doesn't clean up forked children when processing multiple files
http://bugzilla.mindrot.org/show_bug.cgi?id=897 Summary: scp doesn't clean up forked children when processing multiple files Product: Portable OpenSSH Version: 3.8p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: scp AssignedTo:
2013 Jul 29
5
[Bug 2133] New: scp failes between two ends using password authentication
...and scp -v -t /tmp/ ... debug1: Next authentication method: password debug1: read_passphrase: can't open /dev/tty: No such device or address debug1: Authentications that can continue: publickey,gssapi-keyex,gssapi-with-mic,password Permission denied, please try again. The problem is in scp.c: toremote() which always uses "-n" for standard remote to remote. Consequently, stdin is redirected to /dev/null and a remote ssh can't ask for another password. As a fix I'd propose to use the patch from RHEL: --- a/scp.c +++ b/scp.c @@ -638,7 +638,10 @@ toremote(char *targ, int argc, ch...
2012 Aug 19
3
Bug Report and patch fix
...txt Index: scp.c =================================================================== RCS file: /cvs/openssh/scp.c,v retrieving revision 1.189 diff -u -r1.189 scp.c --- scp.c 22 Sep 2011 11:38:01 -0000 1.189 +++ scp.c 19 Aug 2012 12:00:35 -0000 @@ -364,6 +364,7 @@ void tolocal(int, char *[]); void toremote(char *, int, char *[]); void usage(void); +void verifypath(char *); int main(int argc, char **argv) @@ -551,6 +552,18 @@ } void +verifypath(char *file) +{ + if (access(file, F_OK) == -1) + { + errno = ENOENT; + run_err("%s: %s",file,strerror(errno)); + killchild(0); + } +} + +...
2005 May 24
1
scp remote-to-remote implementation
...olocal(argc, argv); /* TODO make dest local host from server1 (argc-2 ?) */ verifydir( _tmp_local ); /* FIXME modify argv to have _tmp_local as the copying from source * and the 2ndRemoteHostName as the destination */ toremote(targ, argc, argv); /* TODO make dest remote server2 */ } else if ((targ = colon(argv[argc - 1]))) /* Dest is remote host. */ toremote(targ, argc, argv); else { tolocal(argc, argv); /* Dest is local host. */ if (targetshouldbedirectory) verifydir(argv[argc - 1]); } -- ----)(----...
2008 Jun 14
1
[Bug 1235] [PATCH] scp does unnecessary getpwuid(), breaking chroot
...|Added ---------------------------------------------------------------------------- CC| |djm at mindrot.org --- Comment #3 from Damien Miller <djm at mindrot.org> 2008-06-15 05:56:31 --- I don't think this is correct: pwd is used in toremote() too, probably for remote->remote copies. -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
2006 May 15
0
[PATCH 5/12] bug fix: openssh-4.3p2 scp bugs
...t the real pipes won't get * descriptors 0 and 1 because that will screw up dup2 below. */ - pipe(reserved); + if (pipe(reserved) < 0) + fatal("pipe: %s", strerror(errno)); /* Create a socket pair for communicating with ssh. */ if (pipe(pin) < 0) @@ -490,6 +491,7 @@ toremote(char *targ, int argc, char **ar source(1, argv + i); } } + xfree(arg); } void
2006 Jan 20
1
Bug: Copying several files to non-directory.
Dear openssh people, Here's something to try: $ echo a >a $ echo b >b $ echo c >c $ $ scp a b c $ $ echo $? 1 $ cat a b c a b b Ouch! Also, for comparison: $ cp a b c cp: copying multiple files, but last argument `c' is not a directory Try `cp --help' for more information. $ rcp a b c rcp: c: Not a directory. $ Note that the cp behavior is specified in SuSv2.
2009 Jun 24
1
[Bug 1235] [PATCH] scp does unnecessary getpwuid(), breaking chroot
https://bugzilla.mindrot.org/show_bug.cgi?id=1235 donkishoot at wanadoo.fr changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |donkishoot at wanadoo.fr --- Comment #5 from donkishoot at wanadoo.fr 2009-06-24 23:41:20 --- I have a bug that i think is
2011 Aug 17
1
openssh-unix-dev Digest, Vol 100, Issue 3
...============================================================= > RCS file: /cvs/src/usr.bin/ssh/scp.c,v > retrieving revision 1.170 > diff -u -p -r1.170 scp.c > --- scp.c 9 Dec 2010 14:13:33 -0000 1.170 > +++ scp.c 9 Aug 2011 06:10:08 -0000 > @@ -580,12 +580,14 @@ toremote(char *targ, int argc, char **ar > host = cleanhostname(argv[i]); > suser = NULL; > } > - xasprintf(&bp, "%s -f -- %s", cmd, src); > + xasprin...
2019 Jan 19
2
Status of SCP vulnerability
Hello, I would like to request an update of the progress regarding fixes for the recently disclosed SCP vulnerability (CVE-2018-20685, CVE-2019-6111, CVE-2019-6109, CVE-2019-6110) It has been stated that CVE-2018-20685 has been patched in november but there are currently no information available on the progress of patches regarding the other CVEs. Will there be a patched release any time soon?
2016 Jan 19
6
FWD: [patch] scp + UTF-8
...h> #include <stdarg.h> @@ -501,6 +502,8 @@ main(int argc, char **argv) targetshouldbedirectory ? " -d" : ""); (void) signal(SIGPIPE, lostconn); + + (void) setlocale(LC_CTYPE, ""); if ((targ = colon(argv[argc - 1]))) /* Dest is remote host. */ toremote(targ, argc, argv); ----- End forwarded message -----
2001 Oct 16
6
program-prefix does not work
...t; -v" : "", iamrecursive ? " -r" : "", pflag ? " -p" : "", ! targetshouldbedirectory ? " -d" : ""); (void) signal(SIGPIPE, lostconn); if ((targ = colon(argv[argc - 1]))) /* Dest is remote host. */ ! toremote(targ, argc, argv); else { ! tolocal(argc, argv); /* Dest is local host. */ if (targetshouldbedirectory) verifydir(argv[argc - 1]); } --- 331,349 ---- remin = remout = -1; /* Command to be executed on remote system using "ssh". */ ! if (snprintf(cmd, sizeof c...