similar to: [Bug 1883] New: use setproctitle for persistent mux master

Displaying 20 results from an estimated 2000 matches similar to: "[Bug 1883] New: use setproctitle for persistent mux master"

2011 Feb 07
1
[PATCH] ssh: set proctitle for mux master
Preserving the command line from the invoking ssh command doesn't make much sense, so use setproctitle() to hide the arguments. --- ssh.c | 20 +++++++++++++++++--- 1 files changed, 17 insertions(+), 3 deletions(-) diff --git a/ssh.c b/ssh.c index d32ef78..8ebcc88 100644 --- a/ssh.c +++ b/ssh.c @@ -230,12 +230,25 @@ main(int ac, char **av) struct servent *sp; Forward fwd; - /* Ensure
2012 May 03
5
[PATCH/RFC 0/6] New mux client request to list open tcp forwardings.
These patches implement a new mux client request to list the currently opened TCP forwardings. It also removes some todos regarding keeping the list of forwardings in the options up-to-date. Bert Wesarg (6): attach the forwarding type to struct Forward merge local and remote forward lists generate unique ids for forwardings to be used for identification remove closed forwardings from
2006 May 04
2
xmalloc(foo*bar) -> xcalloc(foo, bar) for Portable
Hi All. While wandering in auth-pam.c I noticed that there's a few Portable-specific escapees from the xmalloc(foo * bar) cleanup. There's also a "probably can't happen" integer overflow in ssh-rand-helper.c with the memset: num_cmds = 64; - entcmd = xmalloc(num_cmds * sizeof(entropy_cmd_t)); + entcmd = xcalloc(num_cmds, sizeof(entropy_cmd_t));
2011 Jan 31
1
[PATCH] fix copy'n'paste error in PROTOCOL.mux
--- PROTOCOL.mux | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/PROTOCOL.mux b/PROTOCOL.mux index 3d6f818..88f95b3 100644 --- a/PROTOCOL.mux +++ b/PROTOCOL.mux @@ -122,7 +122,7 @@ For dynamically allocated listen port the server replies with Note: currently unimplemented (server will always reply with MUX_S_FAILURE). -A client may request the master to establish a
2011 May 06
1
[PATCH/trivial] Fix numbering in PROTOCOL.mux
diff --git i/PROTOCOL.mux w/PROTOCOL.mux index 05bb146..b53af19 100644 PROTOCOL.mux --- i/PROTOCOL.mux +++ w/PROTOCOL.mux @@ -180,7 +180,7 @@ The MUX_S_PERMISSION_DENIED and MUX_S_FAILURE include a reason: uint32 client request id string reason -9. Protocol numbers +10. Protocol numbers #define MUX_MSG_HELLO 0x00000001 #define MUX_C_NEW_SESSION 0x10000002
2017 Feb 17
3
[Bug 2679] New: ssh mux process (and maybe others) should perhaps cd /
https://bugzilla.mindrot.org/show_bug.cgi?id=2679 Bug ID: 2679 Summary: ssh mux process (and maybe others) should perhaps cd / Product: Portable OpenSSH Version: 7.4p1 Hardware: Other OS: All Status: NEW Severity: enhancement Priority: P5 Component: ssh Assignee:
2012 Apr 27
2
[PATCH] mux: fix memory leak of control path if bind() fails
--- mux.c | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/mux.c b/mux.c index d90605e..fa796bd 100644 --- a/mux.c +++ b/mux.c @@ -1195,6 +1195,7 @@ muxserver_listen(void) close(muxserver_sock); muxserver_sock = -1; } + xfree(orig_control_path); xfree(options.control_path); options.control_path = NULL; options.control_master = SSHCTL_MASTER_NO;
2009 Jul 08
4
Feature request: "SetupCommand" invoked before connecting
Hi, (I'm not subscribed to the list, so please CC me on reply.) I'd like to request adding a feature to OpenSSH: Task: ~~~~~ It is quite sometime useful to invoke a program prior to connecting to an ssh server. The most common use case will probably be port knocking. That is a small program sends certain packets to a server and the server reacts to this by unlocking the ssh port, which
2001 Jun 05
2
setproctitle
The portable OpenSSH source comes with an implementation of setproctitle() that on some systems (Solaris for example) does nothing. The current sendmail distributions have an alternate setproctitle() that tries to get the effect on a wide range of systems. Would there be any interest in a patch for the portable OpenSSH that uses the sendmail setproctitle as a starting point to get setproctitle
2017 Mar 15
1
samba: setproctitle not initialized, please either call setproctitle_init() or link against libbsd-ctor.
Try : apt-get remove libbsd-dev restart samba, now is the message gone? Gr. Louis > -----Oorspronkelijk bericht----- > Van: samba [mailto:samba-bounces at lists.samba.org] Namens BasSamba via > samba > Verzonden: woensdag 15 maart 2017 16:09 > Aan: samba at lists.samba.org > Onderwerp: [Samba] samba: setproctitle not initialized, please either call >
2001 Feb 16
1
OpenSSH 2.3.0p1 port to BSDI BSD/OS
BSD/OS 4.2 comes with OpenSSH 2.1.1p4, patched to support BSDI's authentication library. However, BSDI's patches have several problems: 1. They don't run the approval phase, so they can allow users to login who aren't supposed to be able to. 2. They don't patch configure to automatically detect the BSDI auth system, so they're not ready to use in a general portable
2002 Jun 07
1
Setproctitle && HPUX, patch/fix included
Hello, I've asked this on the openssh (regular) list before, but was directed here. I've been trying to get the 'setproctitle' part working on HPUX systems (11.00). I've figured out that on HP setproctitle requires sys/pstat.h and some other settings. I can locate sys/pstat.h on my system, but the ./configure won't find it (it's in /usr/include/sys/pstat.h). When I
2016 Sep 20
2
setproctitle not initialized, please either call setproctitle_init() or link against libbsd-ctor
Hi for all! I have Samba 4.3.9-Ubuntu DC in ADDC_Mode and it's working perfectly But in Samba Log have this: "samba: setproctitle not initialized, please either call setproctitle_init() or link against libbsd-ctor." The libbsd-dev package is installed Is this a problem? SAMBA.CONF: # Global parameters [global] workgroup = TESTEAD realm = testead.xxxxx.xxx netbios name = GTESTE2
2003 Jan 09
8
[Bug 236] No setproctitle() replacement for many unices
http://bugzilla.mindrot.org/show_bug.cgi?id=236 ------- Additional Comments From djm at mindrot.org 2003-01-09 11:22 ------- This seems to work on Linux and I have had reports of it working on other platforms too. Please test this patch and report here or on the list. I'd like to get this in for the next version. ------- You are receiving this mail because: ------- You are the
2002 May 08
2
[Bug 236] No setproctitle() replacement for many unices
http://bugzilla.mindrot.org/show_bug.cgi?id=236 ------- Additional Comments From djm at mindrot.org 2002-05-08 11:41 ------- Created an attachment (id=93) setproctitle() replacement for more OSs ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2004 Jul 20
3
[Bug 899] sshd displays illegal usernames through setproctitle()
http://bugzilla.mindrot.org/show_bug.cgi?id=899 Summary: sshd displays illegal usernames through setproctitle() Product: Portable OpenSSH Version: 3.8.1p1 Platform: All OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: openssh-bugs at mindrot.org
2015 Dec 04
1
setproctitle Errors
Hi List I've spun up a fresh Debian 8 VM to test out the upgrade steps for a Debian samba 4.1.17 package deployment to a compiled samba 4.2.5. All seem s to work fine (apt-get remove samba first, followed by configure/make/install), but I get the following errors in my samba.log: samba: setproctitle not initialized, please either call setproctitle_init() or link against libbsd-ctor Is this
2003 Jan 19
1
OpenSSH build failure on NetBSD 1.5.2
Hi All. The recent setproctitle changes don't seem to work on NetBSD. Some of the variables are still used when the definitions are #ifdef'ed out. Attached patch fixes it, but I'm not sure it does it the right way. -Daz. gcc -g -O2 -Wall -Wpointer-arith -Wno-uninitialized -I. -I.. -I../../openbsd-compat -I../../openbsd-compat/.. -DHAVE_CONFIG_H -c
2000 Oct 15
1
Patch for Digital Unix SIA authentication
A while back, I sent in a patch that added Digital Unix SIA authentication to OpenSSH. Well, I just figured out that it didn't handle everything correctly (locked accounts could still log in). I thought I had checked that, but I guess I missed it. Anyway, here is a patch against OpenSSH 2.2.0p1 that fixes this. -- Chris Adams <cmadams at hiwaay.net> Systems and Network Administrator
2001 Feb 12
2
OSF_SIA bug in 2.3.0p1
Is anyone maintaining the OSF_SIA support in openssh? This seems to be an obvious bug triggered if you try to connect as a non-existant user. >From auth1.c line 459 #elif defined(HAVE_OSF_SIA) (sia_validate_user(NULL, saved_argc, saved_argv, get_canonical_hostname(), pw->pw_name, NULL, 0, NULL, "") == SIASUCCESS)) { #else /*