Displaying 20 results from an estimated 600 matches similar to: "connection timeout"
2000 Nov 14
1
[PATCH] Added option 'RetryDelay'
Being rather aggrevated when testing at the enforced 1 second
delay between each connection attempt and the useless 1 second delay
done after all connection attempts have failed I wrote a patch to make
the number of seconds delayed between each connection attempt
configurable.
Stephen
-------------- next part --------------
diff -u --recursive openssh-2.3.0p1/ChangeLog
2002 May 22
0
[PATCH] connect() timeout
Here are the new versions of this widely used patch for OpenSSH 3.2.2p1
and 3.2.3p1.
The patch avoids waiting to long when using ssh() or scp() on a down host,
it is usefull when you have to update many hosts via rsync or rdist themselves
relying upon ssh(). It enables a new option 'ConnectTimeout' to control
exactly the timeout value, so that it can be used even on slow links.
These
2001 Nov 17
0
[PATCH] Connect timeout
The attached patch adds a new 'ConnectTimeout' option (man page updated
in patch) to avoid wasting time when the target host is down. I needed that
because I was using rsync/rdist over ssh for massive files update and the
default connect() took too long for my purpose.
The patch was tested on Linux only, but I used a similar one for ssh 1.2.XX
on Linux, Solaris and HP-UX without
2003 Apr 15
0
Connect timeout patch
This patch avoids spending too much time during connect() when doing an
ssh()/scp() on a down host. It uses a new client option called
ConnectTimeout and is useful for rsync or rdist commands using ssh().
See http://bugzilla.mindrot.org/show_bug.cgi?id=207 for detailled info.
-------------- next part --------------
--- openssh-3.6.1p1/readconf.c.ORIG Tue Apr 15 23:06:30 2003
+++
2002 Apr 03
1
[PATCH] connect() timeout
Here is a version of this widely used patch specific for OpenSSH 3.1p1,
as it is still not in the main tree (perhap one day...)
The patch avoids spending too much time when doing an ssh()/scp() on a
down host, as it does not depend off the default TCP timeout used
by connect().
Patch was tested on Linux, Solaris and HP-UX.
The patch can also be found on:
2002 Oct 17
0
[PATCH] connect() timeout for OpenSSH-3.5p1
Here is the version of this patch for the last portable version of
OpenSSH (3.5p1), as it is not included in the main tree.
The patch avoids waiting to long when using ssh() or scp() on a down host,
it is usefull when you have to update many hosts via rsync or rdist themselves
relying upon ssh(). It enables a new option 'ConnectTimeout' to control
exactly the timeout value, so that it can
2002 Jan 26
5
[PATCH] Connect timeout
The attached patch adds a new 'ConnectTimeout' option (man page updated
in patch) to avoid wasting time when the target host is down. I needed that
because I was using rsync/rdist over ssh for massive files update and the
default connect() took too long for my purpose.
The patch was tested on Linux only, but I used a similar one for ssh 1.2.XX
on Linux, Solaris and HP-UX without
2004 Mar 26
2
Patch for login exchange timeout
Here's a quick patch that adds a timeout (value set
from the connection timeout config parameter) for
identification exchange. The situation that this fixes
is the one where the sshd has a connection open (so
you can make a TCP connection) but does not put up a
banner (e.g. when the disk has crashed or when file
descriptors are exhausted on a machine). Sounds
unusual, but this happens with
2001 Oct 11
0
[patch] option to prevent connection timeout
Hi,
The firewall at work doesn't allow me to make a direct SSH connection
to the Internet, so I use the ProxyCommand to tunnel SSH through a
HTTP proxy. This works fine, except for the fact that the HTTP proxy
server closes the connection after 60 seconds of inactivity. Attached
below is a patch that implements a new configuration option called
"Idle" that lets you specify the
2001 Aug 24
2
[PATCH] SO_KEEPALIVE for port forwards
Attached is a patch to allow a user to turn on TCP keepalives for port
forwarded connections. It's mainly useful when the connections to the
ssh listener are coming from many different boxes, some of which
crash, leaving the service on the other side of the port forwarder
waiting on connections indefinitely.
It creates a new option named "KeepAliveForward" to control this
behavior.
2015 Nov 19
2
[Bug 2500] New: ConnectionAttempts=0 causes ssh to output uninitialised data on stdout
https://bugzilla.mindrot.org/show_bug.cgi?id=2500
Bug ID: 2500
Summary: ConnectionAttempts=0 causes ssh to output
uninitialised data on stdout
Product: Portable OpenSSH
Version: 7.1p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: ssh
2004 Aug 26
2
OpenSSH PATCH: OpenCommand and CloseCommand
Hi,
the attached patch adds support for the keywords "OpenCommand" and
"CloseCommand" to ssh_config. They are commands which are executed before
the connection is established (or ProxyCommand started) and after the
connection has been closed (or ProxyCommand ended).
this is usefull for stuff like portknocking or (that's what I wrote the
patch for) talking with trapdoor2
2001 Mar 14
1
[PATCH] Added Null packet keepalive option
I have attached a patch which adds null packet keepalive
functionality to the client. This patch is made against the
current CVS tree as of 3/14/01.
Please consider this patch for inclusion in the OpenSSH main tree.
This patch is based upon and includes code from the Chris Lightfoot
(chris at ex-parrot.com) patch posted 2/23.
The original patch from Chris is at:
2002 Apr 22
9
Password from open filedescriptor
The included patch adds a new option to the ssh client:
-d fd Read the password from file descriptor fd. If you use 0 for fd,
the passphrase will be read from stdin.
This is basically the same as GPG:s parameter --passphrase-fd.
Flames about why this is a bad idea goes into /dev/null. I really need to
do this. There are lots of ugly Expect-hacks out there, but I want a more
clean
2002 Jul 17
2
[Patch] SSH through HTTP proxy using CONNECT
Hi,
I'm not a subscriber to this list so please CC: me in any replies.
I found myself in a situation where I was behind a corporate firewall
that allowed only web requests to the outside world (and furthermore
those requests had to be via their proxy server). Therefore, I couldn't
SSH to the outside world.
However, the HTTP proxy 'CONNECT' method, which is normally used to
2000 Mar 03
7
[PATCH] Add a Maximum Idle Time (1.2.2)
The attached patch adds an option (off by default to preserve current
behavior) to set a timeout on the select() statement that waits for input
in clientloop.c. This fixes a timeout issue for me (explained below) and
probably also fixes the timeouts mentioned in last month's thread "Idle
time out". The patch is also available by http from:
2001 Sep 26
1
[PATCH] random SSH_MSG_IGNORE packets
Hi!
The following patch adds ability to configure the ssh client to
send SSH[2]_MSG_IGNORE packets of random length at random times
whithin a user-specified interval. The function is configured by
setting the config-file options BogusTrafficIntervalMax and
BogusTrafficIntervalMin, which defines the interval in seconds in
which the packets are randomly sent. It is disabled by default. It
suffices
2018 Feb 23
6
RFC 8305 Happy Eyeballs in OpenSSH
Hello,
I use hosts that are dual stack configured (IPv4 and IPv6) and it
happens that connectivity through one or the other is broken and
timeouts. In these case connection to the SSH server can take quite some
time as ssh waits for the first address to timeout before trying the
next.
So I gave a stab at implementing RFC 8305. This patch implements part of
it in sshconnect.c.
* It does not do
1999 Dec 10
2
[David Huggins-Daines <dhd@plcom.on.ca>] Bug#52414: ssh-add uses ssh-askpass, but ssh doesn't
Damien,
Here's a forwarded bug for you.
Cheers, Phil.
--[[message/rfc822]]
Subject: Bug#52414: ssh-add uses ssh-askpass, but ssh doesn't
Reply-To: David Huggins-Daines <dhd at plcom.on.ca>, 52414 at bugs.debian.org
Resent-From: David Huggins-Daines <dhd at plcom.on.ca>
Resent-To: debian-bugs-dist at lists.debian.org
Resent-CC: Philip Hands <phil at hands.com>
2001 Mar 11
0
patch to allow client to select rsa/dss
Here is a quick patch against openssh-2.5.1p1 to add a new config
option (pkalg) for the ssh client allowing the selection of which
public keys are obtained/verified.
--cut-here-
diff -c3 -r orig/openssh-2.5.1p1/key.c openssh-2.5.1p1/key.c
*** orig/openssh-2.5.1p1/key.c Mon Feb 5 18:16:28 2001
--- openssh-2.5.1p1/key.c Sun Mar 11 23:10:10 2001
***************
*** 534,539 ****
--- 534,567 ----