Displaying 13 results from an estimated 13 matches for "toremote".
2001 Jan 30
4
Detection of identical file doesn't work for localhost:
...the function "colon" in 984 to check if you should to a remote copy or a
local copy. I think it would be possible to add a check to it to see if
the name of the remote host will be localhost and then also use the
function "tolocal" for doing a local copy instead of calling "toremote".
What do you guys think? Would you please add this feature?
Ciao
Christian
P.S.: Would somebody please change s/debain/debian/ in the ChangeLog to
fix my email-address? Thanks
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: applic...
2004 Jul 20
8
[Bug 897] scp doesn't clean up forked children when processing multiple files
http://bugzilla.mindrot.org/show_bug.cgi?id=897
Summary: scp doesn't clean up forked children when processing
multiple files
Product: Portable OpenSSH
Version: 3.8p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: scp
AssignedTo:
2013 Jul 29
5
[Bug 2133] New: scp failes between two ends using password authentication
...and scp -v -t /tmp/
...
debug1: Next authentication method: password
debug1: read_passphrase: can't open /dev/tty: No such device or address
debug1: Authentications that can continue:
publickey,gssapi-keyex,gssapi-with-mic,password
Permission denied, please try again.
The problem is in scp.c: toremote() which always uses "-n" for standard
remote to remote. Consequently, stdin is redirected to /dev/null and a
remote ssh can't ask for another password.
As a fix I'd propose to use the patch from RHEL:
--- a/scp.c
+++ b/scp.c
@@ -638,7 +638,10 @@ toremote(char *targ, int argc, ch...
2012 Aug 19
3
Bug Report and patch fix
...txt
Index: scp.c
===================================================================
RCS file: /cvs/openssh/scp.c,v
retrieving revision 1.189
diff -u -r1.189 scp.c
--- scp.c 22 Sep 2011 11:38:01 -0000 1.189
+++ scp.c 19 Aug 2012 12:00:35 -0000
@@ -364,6 +364,7 @@
void tolocal(int, char *[]);
void toremote(char *, int, char *[]);
void usage(void);
+void verifypath(char *);
int
main(int argc, char **argv)
@@ -551,6 +552,18 @@
}
void
+verifypath(char *file)
+{
+ if (access(file, F_OK) == -1)
+ {
+ errno = ENOENT;
+ run_err("%s: %s",file,strerror(errno));
+ killchild(0);
+ }
+}
+
+...
2005 May 24
1
scp remote-to-remote implementation
...olocal(argc, argv); /* TODO make dest local host from
server1 (argc-2 ?) */
verifydir( _tmp_local );
/* FIXME modify argv to have _tmp_local as the copying
from source
* and the 2ndRemoteHostName as the destination
*/
toremote(targ, argc, argv); /* TODO make dest remote server2 */
} else if ((targ = colon(argv[argc - 1]))) /* Dest is remote host. */
toremote(targ, argc, argv);
else {
tolocal(argc, argv); /* Dest is local host. */
if (targetshouldbedirectory)
verifydir(argv[argc - 1]);
}
--
----)(----...
2008 Jun 14
1
[Bug 1235] [PATCH] scp does unnecessary getpwuid(), breaking chroot
...|Added
----------------------------------------------------------------------------
CC| |djm at mindrot.org
--- Comment #3 from Damien Miller <djm at mindrot.org> 2008-06-15 05:56:31 ---
I don't think this is correct: pwd is used in toremote() too, probably
for remote->remote copies.
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
2006 May 15
0
[PATCH 5/12] bug fix: openssh-4.3p2 scp bugs
...t the real pipes won't get
* descriptors 0 and 1 because that will screw up dup2 below.
*/
- pipe(reserved);
+ if (pipe(reserved) < 0)
+ fatal("pipe: %s", strerror(errno));
/* Create a socket pair for communicating with ssh. */
if (pipe(pin) < 0)
@@ -490,6 +491,7 @@ toremote(char *targ, int argc, char **ar
source(1, argv + i);
}
}
+ xfree(arg);
}
void
2006 Jan 20
1
Bug: Copying several files to non-directory.
Dear openssh people,
Here's something to try:
$ echo a >a
$ echo b >b
$ echo c >c
$
$ scp a b c
$
$ echo $?
1
$ cat a b c
a
b
b
Ouch! Also, for comparison:
$ cp a b c
cp: copying multiple files, but last argument `c' is not a directory
Try `cp --help' for more information.
$ rcp a b c
rcp: c: Not a directory.
$
Note that the cp behavior is specified in SuSv2.
2009 Jun 24
1
[Bug 1235] [PATCH] scp does unnecessary getpwuid(), breaking chroot
https://bugzilla.mindrot.org/show_bug.cgi?id=1235
donkishoot at wanadoo.fr changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |donkishoot at wanadoo.fr
--- Comment #5 from donkishoot at wanadoo.fr 2009-06-24 23:41:20 ---
I have a bug that i think is
2011 Aug 17
1
openssh-unix-dev Digest, Vol 100, Issue 3
...=============================================================
> RCS file: /cvs/src/usr.bin/ssh/scp.c,v
> retrieving revision 1.170
> diff -u -p -r1.170 scp.c
> --- scp.c 9 Dec 2010 14:13:33 -0000 1.170
> +++ scp.c 9 Aug 2011 06:10:08 -0000
> @@ -580,12 +580,14 @@ toremote(char *targ, int argc, char **ar
> host = cleanhostname(argv[i]);
> suser = NULL;
> }
> - xasprintf(&bp, "%s -f -- %s", cmd, src);
> + xasprin...
2019 Jan 19
2
Status of SCP vulnerability
Hello,
I would like to request an update of the progress regarding fixes for the recently disclosed SCP vulnerability (CVE-2018-20685, CVE-2019-6111, CVE-2019-6109, CVE-2019-6110)
It has been stated that CVE-2018-20685 has been patched in november but there are currently no information available on the progress of patches regarding the other CVEs.
Will there be a patched release any time soon?
2016 Jan 19
6
FWD: [patch] scp + UTF-8
...h>
#include <stdarg.h>
@@ -501,6 +502,8 @@ main(int argc, char **argv)
targetshouldbedirectory ? " -d" : "");
(void) signal(SIGPIPE, lostconn);
+
+ (void) setlocale(LC_CTYPE, "");
if ((targ = colon(argv[argc - 1]))) /* Dest is remote host. */
toremote(targ, argc, argv);
----- End forwarded message -----
2001 Oct 16
6
program-prefix does not work
...t; -v" : "",
iamrecursive ? " -r" : "", pflag ? " -p" : "",
! targetshouldbedirectory ? " -d" : "");
(void) signal(SIGPIPE, lostconn);
if ((targ = colon(argv[argc - 1]))) /* Dest is remote host. */
! toremote(targ, argc, argv);
else {
! tolocal(argc, argv); /* Dest is local host. */
if (targetshouldbedirectory)
verifydir(argv[argc - 1]);
}
--- 331,349 ----
remin = remout = -1;
/* Command to be executed on remote system using "ssh". */
! if (snprintf(cmd, sizeof c...