Displaying 20 results from an estimated 700 matches similar to: "Protocol 2 and fork"
2000 Aug 23
1
Protocol 2 remote forwarding patch
Hi !
Here's a patch to add remote port forwarding support (protocol 2) for
openssh. I have tried to test that it works like it should but a more
thorough testing is needed. This patch adds both client/server support.
The patch should be applied to openssh-2.1.1p4 source tree.
Also included is a PortForwarding sshd_config option, new ./configure
option --disable-forwarding that should make it
2000 Aug 15
0
Experimental -R support patch for openssh client
Hi !
Here's an experimental patch for openssh-2.1.1p4 to add support
(to openssh client) for -R (protocol 2).
So if you have access to a commercial ssh2 server (that allows port
forwardings) could you test this patch.
(Note the openssh server doesn't have support for -R with protocol 2 so
testing with openssh server won't do much good).
To test remember to use -o "Protocol
2000 Aug 13
1
Patches for openssh port forwarding
Hi !
I hacked together a couple of patches for Openssh 2.1.1p4 port forwarding.
It is a one patch file that does the following two things:
First:
If the server is configured not to allow port forwardings it sends
SSH_SMSG_FAILURE (protocol 1) while openssh client expects SSH_SMSG_SUCCESS.
When the client gets the failure it exists with protocol error message.
This patch will accept both failure
2000 Aug 07
1
--with-ipaddr-display patch
Hi !
I think that the configure option --with-ipaddr-display doesn't set
the IPADDR_IN_DISPLAY define in config.h
Here's a small patch to configure.in that should enable the feature (after
running autoconf again).
-Jarno
--- openssh-2.1.1p4-orig/configure.in Sat Jul 15 07:59:14 2000
+++ openssh-2.1.1p4/configure.in Mon Aug 7 08:18:15 2000
@@ -1026,7 +1026,7 @@
2000 Aug 13
1
Anybody working on -R support for proto 2 ?
Hi !
Is anyone working on getting -R (remote port forwarding) working with
protocol 2 ?
I might be interested in helping but don't want to duplicate any
previous work.
-Jarno
--
Jarno Huuskonen - System Administrator | Jarno.Huuskonen at uku.fi
University of Kuopio - Computer Center | Work: +358 17 162822
PO BOX 1627, 70211 Kuopio, Finland | Mobile: +358 40 5388169
2000 Nov 27
0
/var/log/btmp logging ?
Hi,
Openssh doesn't log failed logins to /var/log/btmp like login does
(if btmp exists). This is on RH6.2.
Is there a specific reason for not logging to btmp ?
I think that logging to btmp would be a 'good thing'(tm). What about
other unices ? Do they have /var/log/btmp or something similar (AIX has
something like that and I think openssh already logs the failed attempts).
AFAIK
2001 Jan 03
0
AIX loginsuccess and aixloginmsg ?
Hi,
I noticed that the AIX specific loginsuccess call uses
char *aixloginmsg to retrieve login information. Later this message is
printed in session.c (around line 753). Loginsuccess mallocs space for
this message and according to the aix docs it's the responsibility of the
calling program to free this message.
I didn't notice any code in openssh that would free the aixloginmsg.
Can
2001 Jan 12
1
Key fingerprint feature request
Hi,
Does anyone know what algorithm the commercial ssh-2.3.0 uses to display
the key fingerprints ? On the manual it says the algorithm is
'bubble babble' but I didn't find out how to actually create this
bubble string (I guess I could find out from the sources).
I think that it would be a nice option if OpenSSH could print out
the host keys fingerprint in same format as the
2001 Jun 20
1
openssh and port forwarding as root
Hi,
Openssh sshd opens the socket that forwards users requested port
forwards as root, so the connection seems to come from root. Is it
enough to open the socket as normal user so the connection would appear
to come from that user ? (On Linux this seems to work, but what about
other OS's ?)
I tested this briefly by wrapping the
channel_connect_to(target,target_port);
(in
2000 Nov 07
4
RedHat sshd.init script typo ?
Hi,
I noticed one small possible error in the
openssh-2.3.0p1/contrib/redhat/sshd.init script.
In the stop option:
stop)
echo -n "Shutting down sshd: "
if [ -f $PID_FILE ] ; then
killproc sshd
[ $RETVAL -eq 0 ] && rm -f /var/lock/subsys/sshd
fi
echo
2001 Feb 08
1
ssh1 keyexchange problem ?
Hi,
Has anybody produced diffs for openssh-2.3.0p1 for the rsa keyexchange
problem that Core-SDI described ? ( I noticed that fix is already
in openbsd tree ).
-Jarno
--
Jarno Huuskonen - System Administrator | Jarno.Huuskonen at uku.fi
University of Kuopio - Computer Center | Work: +358 17 162822
PO BOX 1627, 70211 Kuopio, Finland | Mobile: +358 40 5388169
2001 Sep 04
3
2.9p2 behaves different from 2.5.2p2 on tunneling issue
Hi,
I have a problem with a Linux box which I updated from 2.5.2p2
to 2.9p2 recently. It's running a tunnel started via inittab
using a script which starts
ssh -2 -N -o 'ConnectionAttempts 3600' -L <tunnel> $host
This has run reliable with 2.5.2 over the last months. Now, after
I have upgraded to 2.9p2, the tunnel is closed right after each
attempt of an application to use
2002 Feb 01
1
FEATURE: -f -f - fork after successful open of fwd port/display/agent
Background
==========
"ssh -f ..." causes ssh to fork into the background when userauth
successfully completes.
WHAT
===
With this patch "ssh -f -f ..." causes ssh to fork into the background
when the first forwarded port/x11 display/agent is successfully opened.
WHY
===
This feature makes launching remote X11 apps more reliable: when ssh
exits it must have exited because
2001 Feb 10
3
Protocol 2 remote forwarding patch
Hi all,
I'm very new in this list, as looking for codes to plug up the lack of
functionality of "Protocol 2 Remote Forwardig".
Fortunately, I could find it in MARC's archive. Mr. Jarno Huuskonen
posted the codes in Sept, last year, and I tried applying it to my
FreeBSD box environment.
I couldn't apply an original patch, of course, for incompatibility of
virsion. The
2007 Aug 03
1
race condition with ControlMaster=auto
There is a race in the setup of the ControlMaster socket in auto mode, as
illustrated by the following command line:
ssh -oControlMaster=auto -oControlPath=sock localhost 'sleep 1; echo 1' &
ssh -oControlMaster=auto -oControlPath=sock localhost 'sleep 2; echo 2' &
Both of the commands will try to start up as a control client, find that
sock does not exist, and switch into
2000 Aug 24
0
Force pseudo-tty allocation option "-t"
Please Cc: me on the reply as I am not on the list.
>From the ssh(1) man page:
-t Force pseudo-tty allocation. This can be used to execute arbi
trary screen-based programs on a remote machine, which can be
very useful, e.g., when implementing menu services.
This is similiar to what I am trying to do, use "-t" flag to ssh from my
application,
2020 Mar 14
2
ssh -f and -O ControlPersist=yes, ControlMaster=yes leaves stderr open
Hi
I'm trying to wrap ssh in an application using glib. For now, I'm launching the
ssh client in master mode and want it to detach, keeping the control socket around.
I figured I could do that using the -f flag and the usual Control* options to
force ssh to daemonize (ideally without executing any command), but it turns out
that glib doesn't recognize the daemonized process as
2010 Jan 14
1
ssh(1) multiplexing rewrite
Hi,
At the n2k10 OpenBSD network hackathon, I finally got some time to clean
up and rewrite the ssh(1) client multiplexing code. The attached diffs
(one for portable OpenSSH, one for OpenBSD) are the result, and they
need some testing.
The revised multiplexing code uses a better protocol between the master
and slave processes and I even bothered to write it up :) It tracks the
control sockets
2005 Dec 16
1
Force TTY
Hi all,
I'm having problems with getting a tty against an extreme switch. I've tried
with the -t flag that is supposed to force a tty but it's not working.
I checked the code in ssh.c where this option is parsed:
case 't':
if (tty_flag)
force_tty_flag = 1;
tty_flag = 1;
break;
The tty_flag is initialized to 0 and what I can see this flag is always 0 at
this
2000 Aug 30
1
assorted issues with 2.1.1p4...
I've just finished compiling OpenSSH version 2.1.1p4 for Red Hat Linux
6.2 (i386) with recent patches, using OpenSSL version 0.9.5a, which
was compiled to use RSAREF.
There are a couple of issues I noticed immediately:
1. The ssh-agent program can only store RSA keys, not DSA keys.
2. Only ssh-add knows to invoke ssh-askpass (if it is not attached to
a tty and DISPLAY is set).