Displaying 20 results from an estimated 1000 matches similar to: "ssh not using priv port if target prot not priv"
2000 Feb 15
0
tiny bug fix
Hi,
when IPv4-only client connect to a server which have IPv4 and IPv6
addresses, the client can't connect to the server via IPv4 because
the client give up on first rresevport_af().
the below patch fixes it.
---
Munechika SUMIKAWA @ KAME Project / FreeBSD.org
Index: sshconnect.c
===================================================================
RCS file:
2000 Jan 19
3
AIX openssh patches
I have a few patches for AIX. The patchfile is attached below. The patch
has been tested on AIX4.2 and AIX4.3. The patch is on openssh-1.2.1pre25,
with openssl-0.94, using RSAref.
1) authenticate support - this function allows the system to determine
authentification. Whatever the system allows for login, authenticate
will too. It doesn't matter whether it is AFS, DFS, SecureID, local.
2002 Jun 07
4
openssh for UWIN
I am enclosing a context diff of the changes that I made to get
openssh working on UWIN. UWIN is a UNIX operating system layer
that runs on Win32 systems. For more information on UWIN
go to http://www.research.att.com/sw/tools/uwin/.
I also ran configure using -with-cppflags=-D_BSDCOMP=2. I don't
know where that information would go with the source code.
Let me know if you need more
2001 Feb 01
0
warnings on aix325
Hi,
I'm trying to compile openssh2.3.0p1 on aix3.2.5.
Can I ignore this list of warning messages?
bsd-bindresvport.c: In function `bindresvport_af':
bsd-bindresvport.c:94: warning: implicit declaration of function `bind'
bsd-rresvport.c: In function `rresvport_af':
bsd-rresvport.c:64: warning: implicit declaration of function `bzero'
bsd-rresvport.c:82: warning: implicit
2002 Jul 04
1
[PATCH]: Remove HAVE_CYGWIN in favor of NO_IPPORT_RESERVED_CONCEPT
Hi,
I've sent that patch once already but it seems more or less forgotten
in the tumultuous days of the latest vulnerability.
It adds a new define NO_IPPORT_RESERVED_CONCEPT which can be defined
on platforms not supporting the concept of "privileged" ports only
accessible by privileged users but which allow everyone to use these
ports.
This patch removes some Cygwin dependencies
2001 Oct 07
3
socks and misc patch to 2.9.9p2
Attached is a very small patch that allows the ssh clients to use the
socks5 library. It should work with socks4 but is untested.
Tested on linux only
configure --with-socks
configure --with-socks5
Also included is a configure option to disable scp statistics
--disable-scp-stats
modified files
openssh-2.9.9p2/acconfig.h
openssh-2.9.9p2/channels.c
openssh-2.9.9p2/configure.in
2002 May 11
4
socks5 support
> Winton--
>
> Excellent! Absolutely wonderful.
>
> I'm wondering which apps/encapsulators support 4A? This gets me
> around
> the DNS leakage problem quite nicely.
>
> Incidentally, we do need SOCKS5 support -- if for no other
> reason, the
> fact that there's *operating system* level support in OSX for SOCKS5
> redirection. So
2011 Jul 17
2
openSSH 5.8p2 BindPort patch
Hi, i have written a patch for openSSH 5.8p2 which allows the user to
set the local source port. The patch is as follows:
diff -rupN openssh-5.8p2//readconf.c openssh-5.8p2-srcport//readconf.c
--- openssh-5.8p2//readconf.c 2010-11-20 04:19:38.000000000 +0000
+++ openssh-5.8p2-srcport//readconf.c 2011-07-17 20:57:52.385044096 +0100
@@ -125,7 +125,7 @@ typedef enum {
oGlobalKnownHostsFile2,
2010 Jul 07
0
ssh client and privileged ports
Hello,
The ssh client checks for privileged ports when a local forward is about to be set. This is done in readconf.c's function "add_local_forward":
??? if (newfwd->listen_port < IPPORT_RESERVED && original_real_uid != 0)
??? ??? fatal("Privileged ports can only be forwarded by root.");
The constant IPPORT_RESERVED is system wide and fixed at make time.
2001 Jun 25
1
Apparent SSH-1.2.27 Rootkit
Hello,
I found this lurking around the web, and thought people who are
running SSH-1.2.27 might be interested.
--
Kevin Sindhu <kevin at tgivan dot com>
Systems Engineer
TGI Technologies Inc. Tel: (604) 872-6676 Ext 321
107 E 3rd Avenue Fax: (604) 872-6601
Vancouver,BC V5T 1C7
Canada.
-------------- next part --------------
Welcome Root Kit SSH distribution v5.0 (by Zelea)
This
2012 Feb 12
0
PATCH: multiple BindAddress
Hello all,
I recently have a problem with multiple addresses and address
families. Problem is simple, i have some hosts with IPv4 access only
and some with IPv6 access. This wouldn't be big problem if I had a
stable IP addresses. But sometimes I move to another network with
complete different addresses. So I created patch which on option
BindAddress accept list of addresses. With ip I solved
2000 Nov 29
0
ssh problem
It was simple, I left out /usr/ccs/bin out of my path during compilation.
Thanks,
Christian
-----Original Message-----
From: mdb at juniper.net [mailto:mdb at juniper.net]
Sent: Tuesday, November 28, 2000 2:03 PM
To: Christian Chiaverini
Subject: Re:
It looks to me like the $(AR) make macro is giving the empty
string. You probably want it to be /usr/ccs/bin/ar
Let openssh-unix-dev at
2000 Nov 28
2
No subject
I have a problem compiling openssh 2.3.0p1
The configure script runs fine then if you see below; when I compile it
dies:
Manual pages: /usr/local/man/manX
PID file: /usr/local/etc
Random number collection: Builtin (timeout 200)
Manpage format: man
PAM support: yes
KerberosIV support: no
2004 Aug 24
1
Possible problem with hostbased protocol 1 rhosts authentication
I found this problem when working with the Suse9.1 distribution, but have
since reproduced it with a vanilla build of Openssh
(openssh-3.9p1.tar.gz). Basically I cannot get a command like this:
XXXX>ssh -vvv -1 -o "RhostsAuthentication yes" AAAA
to work. Yes the appropriate settings are in the servers sshd_config file.
Hostbased protocol 1 ssh using rhosts between computers is
2011 May 10
1
[Bug 1903] New: bindresvport_sa() does not validate non-zero struct sockaddr * port is within intended range
https://bugzilla.mindrot.org/show_bug.cgi?id=1903
Summary: bindresvport_sa() does not validate non-zero struct
sockaddr * port is within intended range
Product: Portable OpenSSH
Version: 5.8p2
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component:
2014 Jan 30
1
Announce: OpenSSH 6.5 released
Changes since OpenSSH 6.4
=========================
This is a feature-focused release.
New features:
* ssh(1), sshd(8): Add support for key exchange using elliptic-curve
Diffie Hellman in Daniel Bernstein's Curve25519. This key exchange
method is the default when both the client and server support it.
* ssh(1), sshd(8): Add support for Ed25519 as a public key type.
Ed25519 is a
2004 Oct 03
3
[PATCH] PreferAskpass in ssh_config
Moin,
attached is a patch, which adds a new configuration option
"PreferAskpass" to the ssh config.
ssh{,-add,-keygen,-agent} will use ssh-askpass to prompt for passwords, if
this option is set to "yes", and if ssh-askpass is available.
Default for "PreferAskpass" is "no".
Pacth is against current CVS.
Sebastian
--
signature intentionally left blank.
2002 Mar 15
1
Problems compiling on Redhat
Hello,
I have a x86 Red Hat Linux release 7.0 (Guinness) box.
OpenSSL 0.9.6b
I downloaded the most recent version of OpenSSH (3.1p1).
Attached is the result of ./configure and make.
Thanks in advance
-------------- next part --------------
# ./configure
checking for gcc... gcc
checking for C compiler default output... a.out
checking whether the C compiler works... yes
checking whether we are
2000 Oct 30
2
RhostsAuthentication + nondefault port doesn't work?
Hello all,
It seems that RhostsAuthentication does not work on non-default port no
matter what when connecting from OpenSSH (2.1.1, 2.2.0 tried) either with
protocol 1 or protocol 2 (shouldn't work either..).
_However_ when connecting with SSH.COM Ltd's ssh, RhostsAuthentication
works just fine!
Checking the port number of ssh client you can see that OpenSSH doesn't
assign
2003 Jan 18
0
[Patch] User-dependent IdentityFile
Here is the user-dependent IdentityFile patch for openssh3.5 (BSD version),
which allows private key files to be placed system wide (for all users) in
a secure (non-NFS) mounted location.
This addresses an important security hole on systems where home directories
are NFS mounted, particularly if there are users who use blank passphrases
(or when lpd is tunneled through ssh on systems running lpd