Displaying 20 results from an estimated 1000 matches similar to: "3.0.1p1 losing tty modes?"
2001 Mar 14
3
OpenSSH 2.3.0p1: HP-UX 11.00 64-bit
I have encountered a problem with using OpenSSH 2.3.0p1 on 64-bit HP-UX
11.00 systems. This bug does not exhibit itself on any 32-bit HP-UX
11.00 or HP-UX 10.20 systems that I have built 2.3.0p1 on. OpenSSH
2.3.0p1 was built with HPs ANSI C compiler with OpenSSL 0.9.6 and zlib
1.1.3.
The problem is with the call to vhangup(2) in sshd when interactive
sessions are started. The problem does not
2002 Dec 10
5
[PATCH] Password expiry with Privsep and PAM
Hi All.
Attached is a patch that implements password expiry with PAM and
privsep. It works by passing a descriptor to the tty to the monitor,
which sets up a child with that tty as stdin/stdout/stderr, then runs
chauthtok(). No setuid helpers.
I used some parts of Michael Steffens' patch (bugid #423) to make it
work on HP-UX.
It's still rough but it works. Tested on Solaris 8 and
2002 Dec 21
6
[PATCH] PAM chauthtok + Privsep
Hello All.
Attached is an update to my previous patch to make do_pam_chauthtok and
privsep play nicely together.
First, a question: does anybody care about these or the password
expiration patches?
Anyway, the "PRIVSEP(do_pam_hauthtok())" has been moved to just after
the pty has been allocated but before it's made the controlling tty.
This allows the child running chauthtok to
2001 Oct 31
2
OpenStep (NeXT) and TTY modes
OpenStep, apparently, does not initialize new pty/tty modes to a sane
default.
I'm thinking this code snippet, added to tty_parse_modes() before the
for(;;) loop should suffice:
#ifdef HAVE_NEXT
tio.c_oflag |= ONLCR;
tio.c_lflag |= ECHO;
#endif /* HAVE_NEXT */
Also, I've noticed that "ssh -t next_host stty" gives different output
than an interactive session to the same
2010 Jan 14
9
[Bug 1698] New: Connection stalls on PTY allocation failure
https://bugzilla.mindrot.org/show_bug.cgi?id=1698
Summary: Connection stalls on PTY allocation failure
Product: Portable OpenSSH
Version: 5.3p1
Platform: Other
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy:
2002 May 09
4
make distprep broken?
Hello All,
Doing a make distprep doesn't seem to work anymore:
$ make -f Makefile.in distprep
make: @SH@: Command not found
make: *** [catman-do] Error 127
I've seen this on AIX & Redhat (gnu make) and Solaris (native make). I
suspect this occurs on most platforms. Is this still the recommended way
of autoreconf'ing CVS releases for building?
-Daz.
2000 Aug 01
2
[2.1.1p4] utmp patch for SunOS 4.1.x
Follow-on to Charles Levert's <charles at comm.polymtl.ca> work on
utmp_write_direct.
Fixed:
-- At logout, the utmp entry is cleared. Tested on SunOS 4.1.4.
The code I added to loginrec.c is restricted to SUNOS4 pending
QA testing on other platforms.
This patch incorporates the work done by Charles Levert on
7/25/2000 00:43:22. (Do any of us sleep at
2000 Sep 02
2
[PATCH]: Cygwin port of 2.2.0p1
Attached is the patch for the Cygwin port of 2.2.0p1. As usual I didn't
attach the patch to `configure' but only the patch to `configure.in'.
BTW: I have attached a gzip'd version of the patch since it's size
is > 20K and I thought that it might be too big. The gzip'd diff is
< 8K.
What are "Small attachments (such as diff files) within the bounds
of common
2002 Jun 21
0
[Bug 282] New: ttymodes sent can be invalid
http://bugzilla.mindrot.org/show_bug.cgi?id=282
Summary: ttymodes sent can be invalid
Product: Portable OpenSSH
Version: -current
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: Miscellaneous
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: todd
2003 Aug 24
2
[Bug 628] Review usage of mysignal() vs signal()
http://bugzilla.mindrot.org/show_bug.cgi?id=628
Summary: Review usage of mysignal() vs signal()
Product: Portable OpenSSH
Version: 3.6.1p2
Platform: All
OS/Version: OpenBSD
Status: NEW
Severity: normal
Priority: P2
Component: Miscellaneous
AssignedTo: openssh-bugs at mindrot.org
ReportedBy:
2002 Feb 12
1
openssh + pam errors (fwd)
heres a fix for pam support im openssh, inline and attached.. openssh
calls do_pam_session early, before a fork(). it does this on the proc
still running as root, so it checks the users limits, against what root
has running, and depending on limits can fail at the fork() (and almost
always does). this patch moves it past the fork. ive been running it for
a couple of weeks and everything seems
2003 Sep 22
1
openssh on NeXTstep
Hi all,
I've been running OpenSSH portable on NeXTstep 3.3 since version
2.5.something with no/little problems. 3.7.1p1 still compiles fine but
sshd hangs at startup. I've tried to debug it but when stepping through
sshd using gdb it segfaults in mysignal in bsd-misc.c instead of hanging.
Before I dig any deeper into this I'd like to know if there's anybody else
running
2001 Jun 07
0
Patch for systems with no setreuid()
Sorry if I'm duplicating an existing patch, but...
On systems with no seteuid() that have setreuid() there is an
emulation, but if both are lacking (but we do have setresuid()),
nothing is done. The following seems to be right, but I've only got
one machine (running an ancient version of HP-UX) which needs this so
it may not be general:
--cut-here--
--- config.h.in.orig Thu Jun 7
2002 Jun 25
2
Linux 2.2 + borken mmap() round 1
The following is just a simple 'if ANON|SHARE is broken, disable
compression'. We don't have time for fancy stuff until we have time for
long term testing.
I have one friend of mine testing this. Can I get a few other people to
test. This is against --current, but maybe work against 3.3p1. Unsure.
BTW.. those on NeXT platform (if you have autoreconf) should also test
this. this
2002 May 09
0
functions : server_input_channel_req userauth_pubkey
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Greetings,
I am not sure if this is the correct place to ask these question,
if I am at the wrong place please advise.
I am currently working on some modifications to openssh
which record the users rsa/dsa identity comment file to
a log file when the user logs in (password authentication
is disabled).
The ssh1 portion of the modification works
2004 Apr 12
1
Regarding SSH_ASKPASS
I've been giving SSH_ASKPASS a hard look, and it's not clear to
me how it's supposed to work. The documentation (ssh.1) seems
explicit enough:
SSH_ASKPASS
If ssh needs a passphrase, it will read the passphrase from the
current terminal if it was run from a terminal. If ssh does not
have a terminal associated with it but DISPLAY and SSH_ASKPASS
are set, it will execute
1997 Sep 26
1
tty chowning
About a year ago I outlined a scheme for arranging chowning of the tty
end of ptys without needing root privileges. Since then, I haven''t had
time to actually implement it.
I was thinking about the problem again today, and, having learned a
bit about sessions and controlling ttys and stuff, was able to come up
with a simpler mechanism.
First, observe that the POSIX session mechanism, if
2000 Jun 15
1
SCO OpenServer 5.0.5, issues with MAXPATHLEN and tty devices
These issues affected previous 2. versions of openssh and still
affects openssh-2.1.1p1. The environment is SCO OS 5.0.5 with
the SCO development environment (not gcc, gmake, etc.)
There are two issues, the first is a compilation problem,
and the second is a run-time problem.
The first problem is simply that MAXPATHLEN is not defined. I
found it to be defined in
2001 Jun 18
2
Patch for changing expired passwords
The primary purpose of the attached patches is for portable OpenSSH to
support changing expired passwords as specified in shadow password files.
To support that, I did a couple enhancements to the base OpenBSD OpenSSH
code. They are:
1. Consolidated the handling of "forced_command" into a do_exec()
function in session.c. These were being handled inconsistently and
allocated
2002 Jun 28
3
AIX usrinfo() cleanup.
Can we do this? Or should we drop the whole char *tty; ? There will
be no way of setting the TTY= correctly while using privsep (Mainly for
multiple streams over single session).
The only thing we really could do is do:
In do_setusercontext()
if (use_privsep)
aix_usrinfo(pw, NULL);
and back in the old spot put:
if (!use_privsep)
aix_usrinfo(pw, s->ttyfd == -1 ? NULL : s->tty);