Displaying 17 results from an estimated 17 matches for "use_privileged_port".
2002 Jan 25
1
bug in readconf.c
Hi,
there is a tiny bug in readconf.c: options->use_privileged_port is always
set to 0 regardless of whether -P is specified or not. This has the effect
that RhostsAuthentication is disabled even if "RhostsAuthentication yes"
is specified.
The (trivial) patch is appended below.
Martin
====================================================================...
2002 Jun 07
4
openssh for UWIN
...root.");
*** ssh.c.orig Mon Feb 18 23:20:58 2002
--- ssh.c Thu May 30 16:40:07 2002
***************
*** 640,646 ****
host = options.hostname;
/* Disable rhosts authentication if not running as root. */
! #ifdef HAVE_CYGWIN
/* Ignore uid if running under Windows */
if (!options.use_privileged_port) {
#else
--- 640,646 ----
host = options.hostname;
/* Disable rhosts authentication if not running as root. */
! #if define(HAVE_CYGWIN) || defined(_UWIN)
/* Ignore uid if running under Windows */
if (!options.use_privileged_port) {
#else
*** sshpty.c.orig Thu Dec 20 22:45:52 20...
2002 Jun 11
4
ssh setuid changes.
Ok, I'm doing a heads up here.
I just applied:
- markus at cvs.openbsd.org 2002/06/11 04:14:26
[ssh.c sshconnect.c sshconnect.h]
no longer use uidswap.[ch] from the ssh client
run less code with euid==0 if ssh is installed setuid root
just switch the euid, don't switch the complete set of groups
(this is only needed by sshd). ok provos@
A few comments about
2010 Nov 28
2
[PATCH] Use canonical hostname for DNS SSHFP lookup
...--- openssh/roaming_client.c 2010-01-26 02:53:06.000000000 +0100
+++ openssh-sshfp/roaming_client.c 2010-11-28 09:49:06.626052834 +0100
@@ -263,7 +263,7 @@
if (ssh_connect(host, &hostaddr, options.port,
options.address_family, 1, &timeout_ms,
options.tcp_keep_alive, options.use_privileged_port,
- options.proxy_command) == 0 && roaming_resume() == 0) {
+ options.proxy_command, NULL) == 0 && roaming_resume() == 0) {
packet_restore_state();
reenter_guard = 0;
fprintf(stderr, "[connection resumed]\n");
diff -ur openssh/ssh.c openssh-sshfp/ssh.c...
2002 May 22
0
[PATCH] connect() timeout
...e May 21 15:40:06 2002
@@ -677,7 +677,7 @@
/* Open a connection to the remote host. */
cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6,
- options.connection_attempts,
+ options.connection_attempts, options.connection_timeout,
original_effective_uid != 0 || !options.use_privileged_port,
pw, options.proxy_command);
--- openssh-3.2.2p1/sshconnect.c.ORIG Tue Mar 5 19:59:46 2002
+++ openssh-3.2.2p1/sshconnect.c Tue May 21 15:40:06 2002
@@ -222,6 +222,63 @@
return sock;
}
+int
+timeout_connect(int sockfd, const struct sockaddr *serv_addr,
+ socklen_t addrlen, int time...
2005 May 31
0
ssh exit_status not 255 for many errors
...timed out
$ echo $?
1 <-- Return value of ssh
The following fixes my problem
--- openssh-3.8.1p1/ssh.c 2005-05-26 13:25:16.000000000 -0700
+++ openssh-3.8.1p1.mine/ssh.c 2005-05-26 13:24:51.000000000 -0700
@@ -579,7 +579,7 @@
original_effective_uid == 0 &&
options.use_privileged_port,
#endif
options.proxy_command) != 0)
- exit(1);
+ exit(255);
/*
* If we successfully made the connection, load the host
* private key
but `grep exit\( *.c` (both in 3.8.1p1 and cvs ssh.c -r1.255) reveals that
ssh frequently return...
2002 Jan 26
5
[PATCH] Connect timeout
...t Jan 26 21:44:35 2002
@@ -674,7 +674,7 @@
/* Open a connection to the remote host. */
cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6,
- options.connection_attempts,
+ options.connection_attempts, options.connection_timeout,
original_effective_uid != 0 || !options.use_privileged_port,
pw, options.proxy_command);
--- sshconnect.c.OK Wed Oct 10 07:07:45 2001
+++ sshconnect.c Sat Jan 26 21:44:35 2002
@@ -35,6 +35,8 @@
char *client_version_string = NULL;
char *server_version_string = NULL;
+static jmp_buf jmpenv;
+
extern Options options;
extern char *__progname;
@@...
2013 Oct 07
4
Feature request: FQDN Host match
Hello!
I'm hoping that Gmail won't HTML format this mail so that I'll get flamed :)
Anyway, my question relates to ssh_config. The problem I find is that
the Host pattern is only applied to the argument given on the command
line, as outlined in the man page:
"The host is the hostname argument given on the command line (i.e. the
name is not converted to a canonicalized host name
2000 Oct 30
2
RhostsAuthentication + nondefault port doesn't work?
Hello all,
It seems that RhostsAuthentication does not work on non-default port no
matter what when connecting from OpenSSH (2.1.1, 2.2.0 tried) either with
protocol 1 or protocol 2 (shouldn't work either..).
_However_ when connecting with SSH.COM Ltd's ssh, RhostsAuthentication
works just fine!
Checking the port number of ssh client you can see that OpenSSH doesn't
assign
2001 Nov 17
0
[PATCH] Connect timeout
...t Nov 17 22:49:47 2001
@@ -674,7 +674,7 @@
/* Open a connection to the remote host. */
cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6,
- options.connection_attempts,
+ options.connection_attempts, options.connection_timeout,
original_effective_uid != 0 || !options.use_privileged_port,
pw, options.proxy_command);
--- openssh-3.0.1p1/sshconnect.c.ORIG Sat Nov 17 22:49:09 2001
+++ openssh-3.0.1p1/sshconnect.c Sat Nov 17 23:02:27 2001
@@ -35,6 +35,8 @@
char *client_version_string = NULL;
char *server_version_string = NULL;
+static jmp_buf jmpenv;
+
extern Options optio...
2003 Apr 15
0
Connect timeout patch
....6.1p1/ssh.c Tue Apr 15 23:08:28 2003
@@ -619,7 +619,7 @@
/* Open a connection to the remote host. */
if (ssh_connect(host, &hostaddr, options.port, IPv4or6,
- options.connection_attempts,
+ options.connection_attempts, options.connection_timeout,
#ifdef HAVE_CYGWIN
options.use_privileged_port,
#else
--- openssh-3.6.1p1/ssh_config.0.ORIG Tue Apr 15 23:06:30 2003
+++ openssh-3.6.1p1/ssh_config.0 Tue Apr 15 23:11:06 2003
@@ -112,6 +112,13 @@
exiting. The argument must be an integer. This may be useful in
scripts if the connection sometimes fails. The default...
2002 Apr 03
1
[PATCH] connect() timeout
...d Apr 3 23:33:48 2002
@@ -674,7 +674,7 @@
/* Open a connection to the remote host. */
cerr = ssh_connect(host, &hostaddr, options.port, IPv4or6,
- options.connection_attempts,
+ options.connection_attempts, options.connection_timeout,
original_effective_uid != 0 || !options.use_privileged_port,
pw, options.proxy_command);
--- openssh-3.1p1/sshconnect.c.ORIG Tue Mar 5 19:59:46 2002
+++ openssh-3.1p1/sshconnect.c Wed Apr 3 23:33:48 2002
@@ -222,6 +222,64 @@
return sock;
}
+int
+timeout_connect(int sockfd, const struct sockaddr *serv_addr,
+ socklen_t addrlen, int timeout)...
2002 Oct 17
0
[PATCH] connect() timeout for OpenSSH-3.5p1
...-3.5p1/ssh.c Wed Oct 16 14:59:12 2002
@@ -616,7 +616,7 @@
/* Open a connection to the remote host. */
if (ssh_connect(host, &hostaddr, options.port, IPv4or6,
- options.connection_attempts,
+ options.connection_attempts, options.connection_timeout,
#ifdef HAVE_CYGWIN
options.use_privileged_port,
#else
--- openssh-3.5p1/ssh_config.0.ORIG Fri Oct 4 03:31:47 2002
+++ openssh-3.5p1/ssh_config.0 Wed Oct 16 14:59:12 2002
@@ -112,6 +112,13 @@
exiting. The argument must be an integer. This may be useful in
scripts if the connection sometimes fails. The default is...
2001 Oct 26
2
Patch to add "warn" value to ForwardX11 and ForwardAgent
...arg, "no") == 0 || strcmp(arg, "false") == 0)
+ value = 0;
+ else
+ fatal("%.200s line %d: Bad yes/no argument.", filename, linenum);
+ if (*activep && *intptr == -1)
+ *intptr = value;
+ break;
case oUsePrivilegedPort:
intptr = &options->use_privileged_port;
--- clientloop.c.O Fri Oct 26 11:47:19 2001
+++ clientloop.c Fri Oct 26 13:32:26 2001
@@ -1234,6 +1234,40 @@
}
xfree(rtype);
}
+static void
+client_input_agent_open(int type, int plen, void *ctxt)
+{
+ if (!options.forward_agent) {
+ deny_input_open(type, plen, ctxt);
+ return;
+ }
+ if (op...
2000 Nov 14
1
[PATCH] Added option 'RetryDelay'
Being rather aggrevated when testing at the enforced 1 second
delay between each connection attempt and the useless 1 second delay
done after all connection attempts have failed I wrote a patch to make
the number of seconds delayed between each connection attempt
configurable.
Stephen
-------------- next part --------------
diff -u --recursive openssh-2.3.0p1/ChangeLog
2016 Oct 17
20
[Bug 2625] New: Support Capabilities for ssh client port forwarding
https://bugzilla.mindrot.org/show_bug.cgi?id=2625
Bug ID: 2625
Summary: Support Capabilities for ssh client port forwarding
Product: Portable OpenSSH
Version: 7.3p1
Hardware: All
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee: unassigned-bugs
2006 Nov 15
11
OpenSSH Certkey (PKI)
...@@
*charptr = xstrdup(arg);
break;
+ case oCAKeyFile:
+ charptr = &options->ca_key_file;
+ goto parse_string;
+
case oGlobalKnownHostsFile:
charptr = &options->system_hostfile;
goto parse_string;
@@ -1002,6 +1013,8 @@
options->gateway_ports = -1;
options->use_privileged_port = -1;
options->rsa_authentication = -1;
+ options->certkey_authentication = -1;
+ options->ca_key_file = NULL;
options->pubkey_authentication = -1;
options->challenge_response_authentication = -1;
options->gss_authentication = -1;
@@ -1088,6 +1101,10 @@
options->use_...