Displaying 20 results from an estimated 10000 matches similar to: "[Bug 656] ConnectTimeout option broken"
2003 Sep 17
0
ConnectTimeout option is broken
Some code was added which break this functionnality. Patches are
attached and details are on http://bugzilla.mindrot.org/show_bug.cgi?id=656
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: openssh-3.7.1p1-timeout-1.00.patch.txt
Url: http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20030917/561aa41f/attachment.txt
2003 Apr 21
6
[Bug 207] Connect timeout patch
http://bugzilla.mindrot.org/show_bug.cgi?id=207
------- Additional Comments From jclonguet at free.fr 2003-04-22 05:08 -------
Created an attachment (id=273)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=273&action=view)
Patch for OpenSSH-3.6.1p1
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2004 Jan 08
3
[Bug 785] ssh client socket may have O_NONBLOCK flag set
http://bugzilla.mindrot.org/show_bug.cgi?id=785
Summary: ssh client socket may have O_NONBLOCK flag set
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: minor
Priority: P2
Component: ssh
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2009 Jan 07
2
Question about documentation for ConnectTimeout
Hello OpenSSH folks,
This was a really minor knit, but I noted while I was developing a
pexpect module for ssh that setting ConnectTimeout to 0 in the options
to ssh sets the login timeout to infinite time.
I was wondering whether or not this was a documentation bug and/or
potential clarification that could to be made, or if this was a
software bug that needs to be fixed. I don't see
2024 Jan 10
1
[Bug 3653] New: ConnectTimeout causes issue when connecting to an host via tsocks
https://bugzilla.mindrot.org/show_bug.cgi?id=3653
Bug ID: 3653
Summary: ConnectTimeout causes issue when connecting to an host
via tsocks
Product: Portable OpenSSH
Version: 9.6p1
Hardware: Other
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: ssh
2018 Dec 09
2
[PATCH] Enable ConnectTimeout with ConnectionAttempts
Fix bug ConnectTimeout=N only works on the first ConnectionAttempts
https://bugzilla.mindrot.org/show_bug.cgi?id=2918
---
sshconnect.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/sshconnect.c b/sshconnect.c
index 4862da5e..b837a83a 100644
--- a/sshconnect.c
+++ b/sshconnect.c
@@ -454,11 +454,12 @@ waitrfd(int fd, int *timeoutp)
{
struct pollfd pfd;
struct timeval
2002 Apr 06
0
[Bug 207] Connect timeout patch
http://bugzilla.mindrot.org/show_bug.cgi?id=207
------- Additional Comments From jclonguet at free.fr 2002-04-07 06:19 -------
Created an attachment (id=63)
ConnectTimeout patch
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2009 Dec 24
3
ConnectTimeout=2 not working for me
Hi all,
I have somewhat a strange problem that I could not figure out, maybe someone
here can lelp.
I have a script that uses scp to distribute files to many servers, I use '-o
BatchMode=yes -o ConnectTimeout=2 options so the scp will not get stuck if
something is wrong with the remote host.
If the remote host is down (non-pingable) or sshd is down the timeout option
works and the scp
2002 May 22
1
[Bug 207] Connect timeout patch
http://bugzilla.mindrot.org/show_bug.cgi?id=207
------- Additional Comments From jclonguet at free.fr 2002-05-23 05:02 -------
Created an attachment (id=101)
Patch for OpenSSH-3.2.2p1
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Oct 17
0
[PATCH] connect() timeout for OpenSSH-3.5p1
Here is the version of this patch for the last portable version of
OpenSSH (3.5p1), as it is not included in the main tree.
The patch avoids waiting to long when using ssh() or scp() on a down host,
it is usefull when you have to update many hosts via rsync or rdist themselves
relying upon ssh(). It enables a new option 'ConnectTimeout' to control
exactly the timeout value, so that it can
2001 Nov 17
0
[PATCH] Connect timeout
The attached patch adds a new 'ConnectTimeout' option (man page updated
in patch) to avoid wasting time when the target host is down. I needed that
because I was using rsync/rdist over ssh for massive files update and the
default connect() took too long for my purpose.
The patch was tested on Linux only, but I used a similar one for ssh 1.2.XX
on Linux, Solaris and HP-UX without
2002 May 22
0
[PATCH] connect() timeout
Here are the new versions of this widely used patch for OpenSSH 3.2.2p1
and 3.2.3p1.
The patch avoids waiting to long when using ssh() or scp() on a down host,
it is usefull when you have to update many hosts via rsync or rdist themselves
relying upon ssh(). It enables a new option 'ConnectTimeout' to control
exactly the timeout value, so that it can be used even on slow links.
These
2002 Jan 26
5
[PATCH] Connect timeout
The attached patch adds a new 'ConnectTimeout' option (man page updated
in patch) to avoid wasting time when the target host is down. I needed that
because I was using rsync/rdist over ssh for massive files update and the
default connect() took too long for my purpose.
The patch was tested on Linux only, but I used a similar one for ssh 1.2.XX
on Linux, Solaris and HP-UX without
2002 Apr 06
0
[Bug 207] New: Connect timeout patch
http://bugzilla.mindrot.org/show_bug.cgi?id=207
Summary: Connect timeout patch
Product: Portable OpenSSH
Version: 3.1p1
Platform: All
URL: http://charts.free.fr/openssh-3.1p1-timeout-1.02.patch
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
AssignedTo:
2002 Apr 03
1
[PATCH] connect() timeout
Here is a version of this widely used patch specific for OpenSSH 3.1p1,
as it is still not in the main tree (perhap one day...)
The patch avoids spending too much time when doing an ssh()/scp() on a
down host, as it does not depend off the default TCP timeout used
by connect().
Patch was tested on Linux, Solaris and HP-UX.
The patch can also be found on:
2016 Oct 29
2
-e escape rule
> The point is that the original escaping DOUBLE escapes an equals sign:
> foo\\\=bar
> It shouldn't, there's no reason to.
If you paste into your command line:
rsync -e ssh\ -l\ backup\ -i\ /etc/synco/id_rsa\ -o\
ConnectTimeout\\\=60\ -o\ BatchMode\\\=yes
The list of arguments would be (i.e. the values in ARGV):
['rsync', '-e', 'ssh -l backup -i
2006 Feb 10
0
OpenSSH ControlAllowUsers, et al Patch
Attached (and inline) is a patch to add the following config options:
ControlBindMask
ControlAllowUsers
ControlAllowGroups
ControlDenyUsers
ControlDenyGroups
It pulls the peer credential check from client_process_control() in ssh.c,
and expounds upon it in a new function, client_control_grant().
Supplemental groups are not checked in this patch. I didn't feel comfortable
taking a shot
2011 Jan 21
1
End of NSS port
Hi all,
I am pleased to announce that NSS port of NUT is finished.
Port is fully functionnal (same functionnalities as openssl, and a
not-activated-by-default client certificate validation function) and
successfully tested by myself (external tests are pending, Frederic Bohe
is planned for) with a test matrix which will be uploaded to the web
site soon (by Arnaud), tested functionnality by
2016 Oct 20
0
-e escape rule
On 2016-10-20 10:24, Samuel Williams wrote:
> Hello,
>
> I'm using Ruby's Shellwords module, which generates a string from an
> array, suitable for shell evaluation.
>
> Ruby's implementation prefers escaping whitespace with a backslash
> rather than quotes. However, this appears to cause some kind of issue
> in Rsync when it computes argv from -e option.
The
2003 Sep 18
11
[Bug 684] ssh cannot access keys stored in agent
http://bugzilla.mindrot.org/show_bug.cgi?id=684
Summary: ssh cannot access keys stored in agent
Product: Portable OpenSSH
Version: 3.7.1p1
Platform: UltraSparc
OS/Version: Solaris
Status: NEW
Severity: major
Priority: P2
Component: ssh
AssignedTo: openssh-bugs at mindrot.org
ReportedBy: