Displaying 20 results from an estimated 300 matches similar to: "http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=95669367427640&w=2 (fwd)"
2001 Oct 17
3
Bug when flushing data in openssh 2.9
Hi!
I am use SuSe 7.2 x86 and openssh-2.9p1-7.rpm
I got a problem using bitkeeper on my laptop where bitkeeper
reported an I/O error while reading data from 'ssh'.
After much debugging, and some help from the bitkeeper people, I found
out that that clientloop.c doesn't handle interrupts gracefully.
(It died when it got an EAGAIN error when writing to the application)
After applying
2001 Mar 26
1
duplicated lines in serverloop.c? (openssh252p2)
Hi,
I was looking through the source, and I noticed that the following
code appears twice in the file serverloop.c. Is it supposed to, and
if not, would there be any ill effect?
+289
+290 /* Read and buffer any available stdout data from the
program. */
+291 if (!fdout_eof && FD_ISSET(fdout, readset)) {
+292 len = read(fdout, buf,
2000 Aug 08
0
v2 connection logging vs v1
When connecting with v1, the server logs a message when I exit my login
shell:
Closing connection to 130.207.167.32
However, when connecting with v2, it only ever logs:
Connection closed by remote host.
Tracing through the code, it appears that instead of breaking in
serverloop.c:server_loop2() at:
if (had_channel && !channel_still_open()) {
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
Hello,
In response to the timing analysis attacks presented by Dawn Song et.
al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html
we
at Silicon Defense developed a patch for openssh to avoid such
measures.
Timing Analysis Evasion changes were developed by C. Jason Coit and Roel
Jonkman of Silicon Defense.
These changes cause SSH to send packets unless request not to,
2019 Dec 30
24
[Bug 1392] New: nft stalls on EGAIN upon repeatedly flushing and populating a set
https://bugzilla.netfilter.org/show_bug.cgi?id=1392
Bug ID: 1392
Summary: nft stalls on EGAIN upon repeatedly flushing and
populating a set
Product: nftables
Version: unspecified
Hardware: x86_64
OS: Gentoo
Status: NEW
Severity: normal
Priority: P5
Component: nft
2000 Mar 27
1
scp: write stdout: Broken pipe error (Tru64 UNIX)
I'm working on adding SIA authentication support to OpenSSH for use on
Tru64 UNIX. The authentication bits are working but there's more work to be
done including checking for locked accounts and setting resource limits.
Anyway, most things seem to be working fine except for scp and I'm looking
for a little help. Here's some output:
% scp -v lopan:sl.tar .
Executing: host lopan,
2001 May 18
0
PATCH: implement delay (sleep) after last tunnelled connection exits
Here is a patch to implement a handy new feature proposed by
John Hardin <johnh at aproposretail.com>. This is his description of the feature:
New option for OpenSSH: Delay before exit.
Command line option: -S delay
Config file option: sleep {delay}
Purpose: Wait the specified number of seconds after last traffic before
dropping the connection and exiting. If ports are forwarded, this
2000 Jul 05
0
openssh compile error on TRU64 4.0D
L.S
We have a problem compiling the latest ssh (openssh2.1.1p2) on TRU64 Unix
4.0D
we got the following error message
...
auth1.c:507: `saved_argv' undeclared (first use in this function)
....
auth1.c:509: warning: passing arg 4 of `sia_validate_user' discards
qualifiers from pointer target type
*** Exit 1
where line 509 ===>
(sia_validate_user(NULL, saved_argc, saved_argv,
2008 Sep 15
0
No subject
hello..
i am running openssh-3.7.1p2. on linux.It is working successfully..and daemon is running &client also connecting.But the problem is with the mips architecture when i connecting this server from remote syytem.?i got an error of buufer_get:trying to get more bytes 1 than buffer0.And client is not connecting from remote system.My out is as follows on my server
?in sshd main
before
2008 Sep 18
2
SSHD_PROBLEM
hello..
i am running openssh-3.7.1p2. on linux.It is working
successfully.and daemon is running &client also connecting.But the
problem is with the mips architecture when i connecting this server
from remote syytem. i got an error of buufer_get:trying to get more
bytes 1 than buffer0.And client is not connecting from remote system.My
out is as follows on my server
in sshd main
before
2001 Sep 28
1
[PATCH] fix for Linux hang on exit bug in 2.9.9p2
As you are now probably aware, the portability team for openssh still
has not fixed the hang-on-exit bug in the 2.9.9p2 release.
Attached is a patch for 2.9.9p2 that fixes the hang-on-exit bug for Linux
systems. It also adds a useful exit delay feature that has also not yet been
incorporated into the main sources.
For more information, see the SNFS (secure NFS) web page:
2001 Mar 05
0
AIX 4.3.3 + sshd = bug
Hello,
I believe that there is a bug in OpenSSH that affects its usage on
AIX 4.3.3 - Maintenance Level 3 and higher. This bug was introduced
by a change by IBM in the "/usr/lib/drivers/ptydd" driver, and it
affected IBM's own telnetd daemon (reference
2001 Nov 14
6
[PATCH]: Patch to fix hang on exit bug under Linux and add optional exit delay
The hang-on-exit bug still hasn't been fixed in OpenSSH-3.0p1... :-(
Here again is the patch to fix this bug under Linux, updated for OpenSSH-3.0p1.
This has been exhaustively tested for six months now. It also add an exit
delay option that can be useful.
The patch does not lead to data loss under Linux.
Please see the Secure NFS page (SNFS) for further details:
2002 Jan 27
0
[PATCH] Fix for hang-on-exit bug in OpenSSH-3.0.2p1
Here is a simpler patch (based on Markus Friedl's suggestion posted to this
list) to OpenSSH-3.0.2p1 to fix the hang-on-exit bug (Protocol 2 only). To
date, no data loss has been reported with this patch: it does not break ssh
or scp.
This patch should make OpenSSH work on all operating systems exactly as it
does under FreeBSD.
This patch and others are maintained on the
2002 Jan 31
0
[Bug 89] New: [PATCH] make the Waiting for forwarded connecti ons to terminate... message more helpful
Shouldn't that acutally pull the value of EscapeChar out of the users
environment (and possibly default to the old message if they don't have one
defined at all)?
Thanks,
--Jason Lacoss-Arnold, Systems Technical Specialist
Technical Services - Unix Arch.
314-955-8501
-----Original Message-----
From: bugzilla-daemon at mindrot.org [mailto:bugzilla-daemon at mindrot.org]
Sent: Thursday,
2001 Jul 09
1
sshd problem on Solaris 7: Control-C hangs shell
I have a strange problem with sshd (from openssh-2.9p2) on Solaris 7. My shell is bash. When I open an ssh session , and type a Control-C to bash's prompt, the shell hangs. (But, if I for instance run "sleep 10" (during which time the pty is in cooked mode) and press Control-C, the sleep command is interrupted quite normally, and the bash prompt returns.)
Adding some debugging
2000 Feb 01
3
logging RSA key IDs
Hi. To compartmentalize things a bit (e.g., to help limit the damage
should one of my machines be hacked and my private RSA keys stolen) I
use different RSA key pairs on my different client machines.
So it occurs to me that it would be nice if ssh could log which key
was used when logging in to a particular account that has more than
one entry in .ssh/authorized_keys. Right now it simply says
2012 Oct 22
1
[PATCH] Implement remote dynamic TCP forwarding
Hi all,
This is a client side only implementation of reversed dynamic (SOCKS) TCP
forwarding, which means it is compatible with any existing servers
have 'remote forward' capability.
To establish such forward, use "ssh -R [BIND_ADDRESS:]PORT ...".
The server will listen on that port and address and accept SOCKS
traffics.
Hope this will be useful for you.
There was an
2008 Jul 01
1
[PATCH] SOCKS4A support
This provides SOCKS4A support, which allows a SOCKS4 client to provide a
host name instead of an IP address. It indicates that it's doing so by
using a known-invalid IP address 0.0.0.x (where x != 0), and then
appending the NUL-terminated hostname to the connection request.
Although we check for the terminating NUL manually and the
'fatal(len %d > have %d)' should never happen, the
2001 Mar 14
1
[PATCH] Added Null packet keepalive option
I have attached a patch which adds null packet keepalive
functionality to the client. This patch is made against the
current CVS tree as of 3/14/01.
Please consider this patch for inclusion in the OpenSSH main tree.
This patch is based upon and includes code from the Chris Lightfoot
(chris at ex-parrot.com) patch posted 2/23.
The original patch from Chris is at: