search for: use_privileged_port

Displaying 17 results from an estimated 17 matches for "use_privileged_port".

2002 Jan 25
1
bug in readconf.c
Hi, there is a tiny bug in readconf.c: options->use_privileged_port is always set to 0 regardless of whether -P is specified or not. This has the effect that RhostsAuthentication is disabled even if "RhostsAuthentication yes" is specified. The (trivial) patch is appended below. Martin ====================================================================...
2002 Jun 07
4
openssh for UWIN
...root."); *** ssh.c.orig Mon Feb 18 23:20:58 2002 --- ssh.c Thu May 30 16:40:07 2002 *************** *** 640,646 **** host = options.hostname; /* Disable rhosts authentication if not running as root. */ ! #ifdef HAVE_CYGWIN /* Ignore uid if running under Windows */ if (!options.use_privileged_port) { #else --- 640,646 ---- host = options.hostname; /* Disable rhosts authentication if not running as root. */ ! #if define(HAVE_CYGWIN) || defined(_UWIN) /* Ignore uid if running under Windows */ if (!options.use_privileged_port) { #else *** sshpty.c.orig Thu Dec 20 22:45:52 20...
2002 Jun 11
4
ssh setuid changes.
Ok, I'm doing a heads up here. I just applied: - markus at cvs.openbsd.org 2002/06/11 04:14:26 [ssh.c sshconnect.c sshconnect.h] no longer use uidswap.[ch] from the ssh client run less code with euid==0 if ssh is installed setuid root just switch the euid, don't switch the complete set of groups (this is only needed by sshd). ok provos@ A few comments about
2010 Nov 28
2
[PATCH] Use canonical hostname for DNS SSHFP lookup
...--- openssh/roaming_client.c 2010-01-26 02:53:06.000000000 +0100 +++ openssh-sshfp/roaming_client.c 2010-11-28 09:49:06.626052834 +0100 @@ -263,7 +263,7 @@ if (ssh_connect(host, &hostaddr, options.port, options.address_family, 1, &timeout_ms, options.tcp_keep_alive, options.use_privileged_port, - options.proxy_command) == 0 && roaming_resume() == 0) { + options.proxy_command, NULL) == 0 && roaming_resume() == 0) { packet_restore_state(); reenter_guard = 0; fprintf(stderr, "[connection resumed]\n"); diff -ur openssh/ssh.c openssh-sshfp/ssh.c...
2002 May 22
0
[PATCH] connect() timeout
...e May 21 15:40:06 2002 @@ -677,7 +677,7 @@ /* Open a connection to the remote host. */ cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6, - options.connection_attempts, + options.connection_attempts, options.connection_timeout, original_effective_uid != 0 || !options.use_privileged_port, pw, options.proxy_command); --- openssh-3.2.2p1/sshconnect.c.ORIG Tue Mar 5 19:59:46 2002 +++ openssh-3.2.2p1/sshconnect.c Tue May 21 15:40:06 2002 @@ -222,6 +222,63 @@ return sock; } +int +timeout_connect(int sockfd, const struct sockaddr *serv_addr, + socklen_t addrlen, int time...
2005 May 31
0
ssh exit_status not 255 for many errors
...timed out $ echo $? 1 <-- Return value of ssh The following fixes my problem --- openssh-3.8.1p1/ssh.c 2005-05-26 13:25:16.000000000 -0700 +++ openssh-3.8.1p1.mine/ssh.c 2005-05-26 13:24:51.000000000 -0700 @@ -579,7 +579,7 @@ original_effective_uid == 0 && options.use_privileged_port, #endif options.proxy_command) != 0) - exit(1); + exit(255); /* * If we successfully made the connection, load the host * private key but `grep exit\( *.c` (both in 3.8.1p1 and cvs ssh.c -r1.255) reveals that ssh frequently return...
2002 Jan 26
5
[PATCH] Connect timeout
...t Jan 26 21:44:35 2002 @@ -674,7 +674,7 @@ /* Open a connection to the remote host. */ cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6, - options.connection_attempts, + options.connection_attempts, options.connection_timeout, original_effective_uid != 0 || !options.use_privileged_port, pw, options.proxy_command); --- sshconnect.c.OK Wed Oct 10 07:07:45 2001 +++ sshconnect.c Sat Jan 26 21:44:35 2002 @@ -35,6 +35,8 @@ char *client_version_string = NULL; char *server_version_string = NULL; +static jmp_buf jmpenv; + extern Options options; extern char *__progname; @@...
2013 Oct 07
4
Feature request: FQDN Host match
Hello! I'm hoping that Gmail won't HTML format this mail so that I'll get flamed :) Anyway, my question relates to ssh_config. The problem I find is that the Host pattern is only applied to the argument given on the command line, as outlined in the man page: "The host is the hostname argument given on the command line (i.e. the name is not converted to a canonicalized host name
2000 Oct 30
2
RhostsAuthentication + nondefault port doesn't work?
Hello all, It seems that RhostsAuthentication does not work on non-default port no matter what when connecting from OpenSSH (2.1.1, 2.2.0 tried) either with protocol 1 or protocol 2 (shouldn't work either..). _However_ when connecting with SSH.COM Ltd's ssh, RhostsAuthentication works just fine! Checking the port number of ssh client you can see that OpenSSH doesn't assign
2001 Nov 17
0
[PATCH] Connect timeout
...t Nov 17 22:49:47 2001 @@ -674,7 +674,7 @@ /* Open a connection to the remote host. */ cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6, - options.connection_attempts, + options.connection_attempts, options.connection_timeout, original_effective_uid != 0 || !options.use_privileged_port, pw, options.proxy_command); --- openssh-3.0.1p1/sshconnect.c.ORIG Sat Nov 17 22:49:09 2001 +++ openssh-3.0.1p1/sshconnect.c Sat Nov 17 23:02:27 2001 @@ -35,6 +35,8 @@ char *client_version_string = NULL; char *server_version_string = NULL; +static jmp_buf jmpenv; + extern Options optio...
2003 Apr 15
0
Connect timeout patch
....6.1p1/ssh.c Tue Apr 15 23:08:28 2003 @@ -619,7 +619,7 @@ /* Open a connection to the remote host. */ if (ssh_connect(host, &hostaddr, options.port, IPv4or6, - options.connection_attempts, + options.connection_attempts, options.connection_timeout, #ifdef HAVE_CYGWIN options.use_privileged_port, #else --- openssh-3.6.1p1/ssh_config.0.ORIG Tue Apr 15 23:06:30 2003 +++ openssh-3.6.1p1/ssh_config.0 Tue Apr 15 23:11:06 2003 @@ -112,6 +112,13 @@ exiting. The argument must be an integer. This may be useful in scripts if the connection sometimes fails. The default...
2002 Apr 03
1
[PATCH] connect() timeout
...d Apr 3 23:33:48 2002 @@ -674,7 +674,7 @@ /* Open a connection to the remote host. */ cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6, - options.connection_attempts, + options.connection_attempts, options.connection_timeout, original_effective_uid != 0 || !options.use_privileged_port, pw, options.proxy_command); --- openssh-3.1p1/sshconnect.c.ORIG Tue Mar 5 19:59:46 2002 +++ openssh-3.1p1/sshconnect.c Wed Apr 3 23:33:48 2002 @@ -222,6 +222,64 @@ return sock; } +int +timeout_connect(int sockfd, const struct sockaddr *serv_addr, + socklen_t addrlen, int timeout)...
2002 Oct 17
0
[PATCH] connect() timeout for OpenSSH-3.5p1
...-3.5p1/ssh.c Wed Oct 16 14:59:12 2002 @@ -616,7 +616,7 @@ /* Open a connection to the remote host. */ if (ssh_connect(host, &hostaddr, options.port, IPv4or6, - options.connection_attempts, + options.connection_attempts, options.connection_timeout, #ifdef HAVE_CYGWIN options.use_privileged_port, #else --- openssh-3.5p1/ssh_config.0.ORIG Fri Oct 4 03:31:47 2002 +++ openssh-3.5p1/ssh_config.0 Wed Oct 16 14:59:12 2002 @@ -112,6 +112,13 @@ exiting. The argument must be an integer. This may be useful in scripts if the connection sometimes fails. The default is...
2001 Oct 26
2
Patch to add "warn" value to ForwardX11 and ForwardAgent
...arg, "no") == 0 || strcmp(arg, "false") == 0) + value = 0; + else + fatal("%.200s line %d: Bad yes/no argument.", filename, linenum); + if (*activep && *intptr == -1) + *intptr = value; + break; case oUsePrivilegedPort: intptr = &options->use_privileged_port; --- clientloop.c.O Fri Oct 26 11:47:19 2001 +++ clientloop.c Fri Oct 26 13:32:26 2001 @@ -1234,6 +1234,40 @@ } xfree(rtype); } +static void +client_input_agent_open(int type, int plen, void *ctxt) +{ + if (!options.forward_agent) { + deny_input_open(type, plen, ctxt); + return; + } + if (op...
2000 Nov 14
1
[PATCH] Added option 'RetryDelay'
Being rather aggrevated when testing at the enforced 1 second delay between each connection attempt and the useless 1 second delay done after all connection attempts have failed I wrote a patch to make the number of seconds delayed between each connection attempt configurable. Stephen -------------- next part -------------- diff -u --recursive openssh-2.3.0p1/ChangeLog
2016 Oct 17
20
[Bug 2625] New: Support Capabilities for ssh client port forwarding
https://bugzilla.mindrot.org/show_bug.cgi?id=2625 Bug ID: 2625 Summary: Support Capabilities for ssh client port forwarding Product: Portable OpenSSH Version: 7.3p1 Hardware: All OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: ssh Assignee: unassigned-bugs
2006 Nov 15
11
OpenSSH Certkey (PKI)
...@@ *charptr = xstrdup(arg); break; + case oCAKeyFile: + charptr = &options->ca_key_file; + goto parse_string; + case oGlobalKnownHostsFile: charptr = &options->system_hostfile; goto parse_string; @@ -1002,6 +1013,8 @@ options->gateway_ports = -1; options->use_privileged_port = -1; options->rsa_authentication = -1; + options->certkey_authentication = -1; + options->ca_key_file = NULL; options->pubkey_authentication = -1; options->challenge_response_authentication = -1; options->gss_authentication = -1; @@ -1088,6 +1101,10 @@ options->use_...