Displaying 20 results from an estimated 1000 matches similar to: "getnameinfo failed"
2018 Feb 23
6
RFC 8305 Happy Eyeballs in OpenSSH
Hello,
I use hosts that are dual stack configured (IPv4 and IPv6) and it
happens that connectivity through one or the other is broken and
timeouts. In these case connection to the SSH server can take quite some
time as ssh waits for the first address to timeout before trying the
next.
So I gave a stab at implementing RFC 8305. This patch implements part of
it in sshconnect.c.
* It does not do
2001 Feb 17
2
Important fix (sshd && binding). Portable version only.
If bind() fails we _always_ should close socket. I sent this patch while ago
to djm but I still don't see this fix in openssh_cvs.
diff -urN openssh-2.3.0p1.org/sshd.c openssh-2.3.0p1/sshd.c
--- openssh-2.3.0p1.org/sshd.c Sat Jan 6 19:54:11 2001
+++ openssh-2.3.0p1/sshd.c Sat Jan 6 19:55:48 2001
@@ -782,10 +782,10 @@
debug("Bind to port %s on %s.", strport, ntop);
/*
2002 Oct 30
1
connect() timeout patch.
Hello all,
I am wondering where one would submit a patch to OpenSSH cvs
version? I have written a patch that allows the user to set a timeout the
ssh clients connection attempt. I added this because many of us use ssh
in automated scripts and in some cases machines may no longer be reachable,
rather than wait you can set the timeout to say 3 seconds (-z switch).
-- Larry Cashdollar
2008 Oct 24
0
Name lookup failures and CIDR regression under cygwin ( patch attached )
Just updated to 3.0.4 under cygwin and I'm now getting lookup
failures in the log.
2008/10/24 00:13:23 [1984] name lookup failed for X.X.X.X: Unknown server error
Looking at the code it seems the call will never succeed?
/* reverse lookup */
name_err = getnameinfo((struct sockaddr *) ss, ss_len,
name_buf, name_buf_size,
port_buf, port_buf_size,
2008 Oct 24
5
DO NOT REPLY [Bug 5851] New: Name lookup failures and CIDR regression
https://bugzilla.samba.org/show_bug.cgi?id=5851
Summary: Name lookup failures and CIDR regression
Product: rsync
Version: 3.0.4
Platform: All
OS/Version: Windows XP
Status: NEW
Severity: major
Priority: P3
Component: core
AssignedTo: wayned@samba.org
ReportedBy:
2000 Dec 27
2
patch to support hurd-i386
Hi,
here's a patch so that ssh also supports hurd-i386. Thanks for
incorporating. The patch comes from Robert Bihlmeyer <robbe at orcus.priv.at>.
> openssh 2.2.0p1-1.1 does not build on the Hurd. The appended patch
> fixes that. Changes in detail:
> * PAM is not (yet?) supported, so the PAM dependencies are only put into
> the control file on architectures != hurd-i386.
2014 Jun 23
2
ListenAdress Exclusion
I was wondering what everyone's thoughts were on a simpler way to exclude
addresses from having listeners on them.
I know a lot of people have multiple subnets, especially larger
corporations.
Some networks are non-route-able, and therefor unsuitable for use with SSH,
aside from communication between other servers on the same subnet.
Given that we may want to exclude those non-route-able
2002 Sep 06
0
use of setsockopt(SO_LINGER)
I would like to remove setsockopt(SO_LINGER), as there does not seem
to be a reason for its use. If you know of specific reasons we should
keep any of these let me know, or run this patch in local test trees
where possible.
This is against OpenBSD, but should apply to portable with some
fuzz.
Index: channels.c
===================================================================
RCS file:
2002 May 20
0
Openssh 3.2.2p1 KRB5 addition
The Kerberos V support may still fail on hosts with two or more
interfaces.
Regards
Markus
-------------- next part --------------
*** auth-krb5.c.orig Mon May 20 11:51:57 2002
--- auth-krb5.c Mon May 20 11:53:34 2002
***************
*** 38,43 ****
--- 38,44 ----
#include "servconf.h"
#include "uidswap.h"
#include "auth.h"
+ #include "canohost.h"
2005 Jan 20
0
AllowUsers - proposal for useful variations on the theme
A short while ago, I looked at using the AllowUsers configuration option
in openssh (v3.8p1 , but I believe this to be unchanged in 3.9p1) to
restrict access such that only specific remote machines could access
specific local accounts.
I swiftly discovered that
a) specifying wildcarded IP numbers to try to allow a useful IP range
was pointless: if I specified
AllowUsers joe at
2000 Mar 07
2
patch for openssh-1.2.2p1
Hi,
openssh-1.2.2p1 seems to have 2 problems on ipv6 (and
ipv4 mapped addresses).
1. "BREAKIN ATTEMPT" warnings from ipv4 node
2. X forwarding
The following patche fixes them.
Thanks.
diff -ru openssh-1.2.2p1/canohost.c openssh-1.2.2p1-20000308/canohost.c
--- openssh-1.2.2p1/canohost.c Fri Jan 14 13:45:48 2000
+++ openssh-1.2.2p1-20000308/canohost.c Wed Mar 8 00:25:18 2000
@@
2003 Dec 09
1
Make Fails on Cobalt Qube 2
All;
I am using the cobalt Qube 2 which uses a Cobalt OS with is supposedly a RedHat Linux 4.2 variant. I can not compile the new rsync version 2.5.7 as I always fail my make with the following error:
clientname.c: In function `client_addr':
clientname.c:72: warning: implicit declaration of function `getnameinfo'
clientname.c:73: `NI_NUMERICHOST' undeclared (first use this function)
2005 Jun 12
2
%h,%p,%u expansion for ControlPath
This allows me to set 'ControlPath ~/.ssh/sockets/%h.%p.%u' for example.
Have I missed a good reason why ssh_connect finds the default port
number for itself instead of just having it in options.port (like we do
for the the default in options.user)?
--- openssh-4.1p1/ssh.c~ 2005-06-12 09:47:18.000000000 +0100
+++ openssh-4.1p1/ssh.c 2005-06-12 09:40:53.000000000 +0100
@@ -604,6 +604,17
2002 Jul 17
2
[Patch] SSH through HTTP proxy using CONNECT
Hi,
I'm not a subscriber to this list so please CC: me in any replies.
I found myself in a situation where I was behind a corporate firewall
that allowed only web requests to the outside world (and furthermore
those requests had to be via their proxy server). Therefore, I couldn't
SSH to the outside world.
However, the HTTP proxy 'CONNECT' method, which is normally used to
2015 Nov 13
0
[Bug 1860] UseDNS option ignored
https://bugzilla.mindrot.org/show_bug.cgi?id=1860
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|--- |WORKSFORME
Status|NEW |RESOLVED
--- Comment #6 from Damien Miller <djm at
2002 Apr 08
1
compilation fails on Cobalt RaQ2
Configure seems to work fine with no options passed, but a make attempt
fails in clientname.c:
gcc -I. -I. -g -O2 -DHAVE_CONFIG_H -Wall -W -c clientname.c -o clientname.o
clientname.c: In function `client_addr':
clientname.c:55: warning: implicit declaration of function `getnameinfo'
clientname.c:56: `NI_NUMERICHOST' undeclared (first use this function)
clientname.c:56: (Each
2003 Jul 24
0
make fails all versions > 2.4.8 on older linux machine (clientname.o)
hi
i'm trying to update an older rsync version due to some minor errors
during syncing with an up to date version (2.5.6) of rsync.
my problem is that the make process actually won't finish, here is the
output:
clientname.c: In function `client_addr':
clientname.c:72: warning: implicit declaration of function `getnameinfo'
clientname.c:73: `NI_NUMERICHOST' undeclared
2002 Jan 05
2
new feature w/ patch
I've attached a patch to OpenSSH 3.0.2p1 that will allow the client
side of local port forwarding to be bound to a single address. For
my purposes, binding to 127.0.0.1 or (via GatewayPorts) all addresses
would not work. I overloaded the "-b local_host" option so that
it's address will be used when "-L port:remote_host:remote_port"
is also specified.
Today is the first
2000 Jun 06
0
connection timeout
Attached is a patch which adds a ConnectionTimeout option, and corrects
the ConnectionAttempts documentation.
Previously, ssh would try to make a connection ConnectionAttempts times,
sleeping 1 second between tries. But each connection attempt could take a
very long time to fail if the packets die before the get to the host. So
if ssh is being run in a script or what-have-you, it might be
2002 May 22
0
[PATCH] connect() timeout
Here are the new versions of this widely used patch for OpenSSH 3.2.2p1
and 3.2.3p1.
The patch avoids waiting to long when using ssh() or scp() on a down host,
it is usefull when you have to update many hosts via rsync or rdist themselves
relying upon ssh(). It enables a new option 'ConnectTimeout' to control
exactly the timeout value, so that it can be used even on slow links.
These