Displaying 20 results from an estimated 5000 matches similar to: "[Bug 1356] New: X11 forwarding broken."
2011 Nov 12
5
[Bug 1950] New: sshd tries to bind over and over to ::1 for several seconds
https://bugzilla.mindrot.org/show_bug.cgi?id=1950
Bug #: 1950
Summary: sshd tries to bind over and over to ::1 for several
seconds
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.9p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
2013 Aug 24
12
[Bug 2143] New: X11 forwarding for ipv4 is broken when ipv6 is disabled on the loopback interface
https://bugzilla.mindrot.org/show_bug.cgi?id=2143
Bug ID: 2143
Summary: X11 forwarding for ipv4 is broken when ipv6 is
disabled on the loopback interface
Product: Portable OpenSSH
Version: 5.3p1
Hardware: All
OS: Linux
Status: NEW
Severity: minor
Priority: P5
2010 May 24
3
5.2: Solaris 10 x86 x-11 forwarding fails, assign requested address
This is on Solaris 10 x86, do not see this behavior on Solaris 10 sparc. Seen on multiple machines.
Sshd debug:
debug1: server_input_channel_open: ctype session rchan 256 win 16384 max 16384
debug1: input_session_request
debug1: channel 0: new [server-session]
debug2: session_new: allocate (allocated 0 max 10)
debug3: session_unused: session id 0 unused
debug1: session_new: session 0
debug1:
2003 May 18
1
OpenSSH -current segfaults on HP-UX+gcc
Hi All.
As of last night, sshd now segfaults on HP-UX (11.00, gcc 3.2.2) on
startup.
I've single-stepped through the code in freeaddrinfo and it's called with
a valid *addrinfo, follows ai_next once then for some reason attempts to
deref the second pointer which is NULL.
Suspecting a compiler/optimization bug I recompiled fake-getaddrinfo.c
without optimization but that made no
2017 Mar 29
2
X11 forwarding with IPv6 disabled
Hello all,
one more (ever-returning) bug [1] reported recently caught my eye. The
problem is that disabling IPv6 in kernel leads to OpenSSH failing to
bind localhost IPv6 address and after the fix for CVE-2008-1483 [2]
leads to the whole X11 forwarding fail.
If I read the description of the CVE in question correctly, we should
care only of the case when the address is already used (errno =
2001 Jun 09
2
[PATCH] Make "-L" local ports bind to "127.0.0.1" in openssh-2.9p1
diff -u -r -N openssh-2.9p1/channels.c openssh-2.9p1-ajf.1/channels.c
--- openssh-2.9p1/channels.c Tue Apr 17 14:14:35 2001
+++ openssh-2.9p1-ajf.1/channels.c Wed Jun 6 23:25:36 2001
@@ -1815,13 +1815,25 @@
/*
* getaddrinfo returns a loopback address if the hostname is
* set to NULL and hints.ai_flags is not AI_PASSIVE
+ *
+ * Oh yeah? Setting hostname to NULL and hints.ai_flags to
+
2017 Feb 03
5
[PATCH 0/5] Support socket activation in virt-p2v.
As the subject says, support socket activation in virt-p2v.
I have added upstream support for socket activation to nbdkit already:
https://github.com/libguestfs/nbdkit/commit/7ff39d028c6359f5c0925ed2cf4a2c4c751af2e4
I posted a patch for qemu-nbd, still waiting on more reviews for that
one:
https://www.mail-archive.com/qemu-devel@nongnu.org/msg427246.html
I tested this against old and new qemu
2016 Nov 09
7
[Bug 2636] New: Fix X11 forwarding, when ::1 is not configured
https://bugzilla.mindrot.org/show_bug.cgi?id=2636
Bug ID: 2636
Summary: Fix X11 forwarding, when ::1 is not configured
Product: Portable OpenSSH
Version: 7.3p1
Hardware: Sparc
OS: Solaris
Status: NEW
Severity: minor
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2008 Jul 16
3
openssh 5.0p1: Solaris - Failed to allocate internet-domain X11 display socket.
On Solaris 10 (SPARC & x86), I'm seeing the following error:
error: Failed to allocate internet-domain X11 display socket.
I tracked this down to this code change between openssh 4.7p1 and
5.0p1:
*** openssh-4.7p1/channels.c Mon Jun 25 03:04:47 2007
--- openssh-5.0p1/channels.c Wed Apr 2 15:43:57 2008
***************
*** 1,4 ****
! /* $OpenBSD: channels.c,v 1.270 2007/06/25 08:20:03
2019 May 28
2
samba-tool group removemembers, not working
On Tue, 28 May 2019 11:04:01 +0200 Denis Cardon <dcardon at tranquil.it> wrote:
> Hi Mark,
>
> > Because of other issues using ADUC, I tried to remove a domain member using:
> >
> >> samba-tool group removemembers "Domain Computers" MARKA\$
> > Removed members from group Domain Computers
> >
> > As shown, it say it "Removed
2019 May 27
4
samba-tool group removemembers, not working
Because of other issues using ADUC, I tried to remove a domain member using:
> samba-tool group removemembers "Domain Computers" MARKA\$
Removed members from group Domain Computers
As shown, it say it "Removed members", but ...
> samba-tool group listmembers "Domain Computers"
:
LABRAT$
:
OHPRSSTORAGE$
MARKA$
:
COMMON$
:
listmembers still shows the computer
2008 Apr 05
5
[Bug 1457] New: X11 Forwarding doesn't work anymore on a solaris 10 host where ipv6 has not been enabled
https://bugzilla.mindrot.org/show_bug.cgi?id=1457
Summary: X11 Forwarding doesn't work anymore on a solaris 10
host where ipv6 has not been enabled
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.9p1
2000 Jan 18
4
AIX- 'Host not found' in getaddrinfo("0.0.0.0", "22" , ...)
Hello,
while openssh-1.2.1pre25 ran out-of-the box, in openssh-1.2.1pre27 the
sshd fails to start with: "Host not found" returned...
(gcc 2.9.5.2 under AIX 4.3.2 ML 2)
Incompatibility of AIX-getaddrinfo ????
Since I'm not familiar with getaddrinfo, I've got no idea what goes wrong
??? Does the code below work on other architectures?
Demo-Code built with values taken from a
2003 May 12
2
[Bug 563] getaddrinfo() in libopenbsd-compat.a breaks heimdal-linked pam_krb5
http://bugzilla.mindrot.org/show_bug.cgi?id=563
Summary: getaddrinfo() in libopenbsd-compat.a breaks heimdal-
linked pam_krb5
Product: Portable OpenSSH
Version: -current
Platform: Sparc
OS/Version: Solaris
Status: NEW
Severity: normal
Priority: P2
Component: Miscellaneous
2017 Mar 06
2
Suspicious code in net_socket.c
Good afternoon!
Module - net_socket.c
Function - get_known_addresses
---------------------------------------------------
struct addrinfo *nai = xzalloc(sizeof *nai);
if(ai)
ai->ai_next = nai;
ai = nai;
--------------------------------------------------
For my opinion, possible causes:
1. Lost trails (ai_next)
2. ai_next not initialized
3. Possible segfault during
2014 Jun 23
2
ListenAdress Exclusion
I was wondering what everyone's thoughts were on a simpler way to exclude
addresses from having listeners on them.
I know a lot of people have multiple subnets, especially larger
corporations.
Some networks are non-route-able, and therefor unsuitable for use with SSH,
aside from communication between other servers on the same subnet.
Given that we may want to exclude those non-route-able
2018 Feb 23
6
RFC 8305 Happy Eyeballs in OpenSSH
Hello,
I use hosts that are dual stack configured (IPv4 and IPv6) and it
happens that connectivity through one or the other is broken and
timeouts. In these case connection to the SSH server can take quite some
time as ssh waits for the first address to timeout before trying the
next.
So I gave a stab at implementing RFC 8305. This patch implements part of
it in sshconnect.c.
* It does not do
2019 Apr 29
3
[nbdkit PATCH 0/2] Let nbd plugin connect to TCP socket
Accepting only Unix sockets can be a bit limiting; let's be more flexible.
Eric Blake (2):
nbd: Refactor Unix socket connection
nbd: Support TCP socket
plugins/nbd/nbdkit-nbd-plugin.pod | 36 ++++--
plugins/nbd/nbd.c | 175 ++++++++++++++++++++++--------
TODO | 3 -
3 files changed, 161 insertions(+), 53 deletions(-)
--
2.20.1
2000 Jan 16
1
Report on openssh-1.2.1pre26.tar.gz
Dear developers,
I tried to make openssh-1.2.1pre26 on my Linux box with kernel 2.2.13
and libc 5.4.46.
First I needed to modify the file "fake-getaddrinfo.h" as attached
diff. Then I tried again, and gave up with the error:
gcc -g -O2 -Wall -I/usr/local/ssl/include \
-DETCDIR=\"/usr/local/openssh/etc\" \
-DSSH_PROGRAM=\"/usr/local/openssh/bin/ssh\" \
2001 Feb 17
2
Important fix (sshd && binding). Portable version only.
If bind() fails we _always_ should close socket. I sent this patch while ago
to djm but I still don't see this fix in openssh_cvs.
diff -urN openssh-2.3.0p1.org/sshd.c openssh-2.3.0p1/sshd.c
--- openssh-2.3.0p1.org/sshd.c Sat Jan 6 19:54:11 2001
+++ openssh-2.3.0p1/sshd.c Sat Jan 6 19:55:48 2001
@@ -782,10 +782,10 @@
debug("Bind to port %s on %s.", strport, ntop);
/*