Displaying 20 results from an estimated 3000 matches similar to: "[Bug 160] New: Race condition in clientloop.c?"
2002 Mar 12
2
[Bug 160] Race condition in clientloop.c?
http://bugzilla.mindrot.org/show_bug.cgi?id=160
------- Additional Comments From Nicolas.Williams at ubsw.com 2002-03-13 09:10 -------
Created an attachment (id=40)
Debug output, lsof output, etc...
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2002 Jan 25
0
[Bug 79] New: A race with select() in SIGCHLD handling causes hangs occasionally
http://bugzilla.mindrot.org/show_bug.cgi?id=79
Summary: A race with select() in SIGCHLD handling causes hangs
occasionally
Product: Portable OpenSSH
Version: 3.0.2p1
Platform: All
URL: http://marc.theaimsgroup.com/?l=openssh-unix-
dev&m=100454673601558&w=2
OS/Version: All
2002 Jan 25
0
[Bug 78] New: Support use of named (krb4, krb5, gsi, x.509) keys in auth_keys entries
http://bugzilla.mindrot.org/show_bug.cgi?id=78
Summary: Support use of named (krb4, krb5, gsi, x.509) keys in
auth_keys entries
Product: Portable OpenSSH
Version: 3.0.2p1
Platform: All
URL: http://marc.theaimsgroup.com/?l=openssh-unix-
dev&m=101189381805982&w=2
OS/Version: All
2009 Jul 07
1
Read buffer size in clientloop.c
Hi,
when trying to optimize socket transfer rates under Cygwin, it turned
out that the underlying WinSock implementation is surprisingly sensitive
to buffer sizes. The latest Cygwin from CVS is now setting the socket
receive/send buffers (SO_RCVBUF/SO_SNDBUF) to 64K, rather than keeping
them at their default values of 8K which thwarts data transfers a lot.
While testing I still had the problem
2002 Jan 16
0
OpenSSH: Solaris login and utmpx
We're trying to build OpenSSH 3.0.2p1 for Solaris 8 (among others) and are
running into a problem with UseLogin and utmpx.
If we set "UseLogin no" then we can login okay. finger or who won't find
us, even with a TTY allocated altough "who /etc/wtmpx" will find us.
But the real problem is if we set "UseLogin true" which we must do for BSM
support on some
2000 Apr 26
1
http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=95669367427640&w=2 (fwd)
--
| "Bombay is 250ms from New York in the new world order" - Alan Cox
| Damien Miller - http://www.mindrot.org/
| Email: djm at mindrot.org (home) -or- djm at ibs.com.au (work)
---------- Forwarded message ----------
Date: Tue, 25 Apr 2000 19:55:56 -0600 (MDT)
From: Theo de Raadt <deraadt at cvs.openbsd.org>
To: djm at cvs.openbsd.org, markus at cvs.openbsd.org, provos at
2007 Apr 19
1
Is it possible to add %u for local user to ControlPath's argument in the portable version of OpenSSH?
Hi!
>From man 5 ssh_config
> ControlPath
> Specify the path to the control socket used for connection sharing as described in the
> ControlMaster section above or the string ``none'' to disable connection sharing. In
> the path, `%l' will be substituted by the local host name, `%h' will be substituted by
>
2002 Mar 09
0
krb5 problem: KRB5CCNAME is ""; possible fix for OpenSSH 3.0.2p1
I'm using a OpenSSH 3.0.2p1 with the krb5 patch from
<http://www.sxw.org.uk/computing/patches/openssh.html>.
I'm getting KRB5CCNAME set to "" even though
<http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=98269278629018&w=2>
mentions fixing it. This causes things like kinit to
fail with a somewhat uninformative error message.
The relevant sshd_config lines
2006 Sep 25
2
[Bug 1155] [META] Bug planned to be fixed for the 4.4 release
http://bugzilla.mindrot.org/show_bug.cgi?id=1155
dtucker at zip.com.au changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |ASSIGNED
------- Comment #5 from dtucker at zip.com.au 2006-09-25 18:24 -------
For the record, I believe all of the outstanding
2005 Jun 16
1
SSH 2.4.0 remote forward patch in next release?
I [1]reported a problem on 5-April-2005 about a problem with the 4.0p1
version and remote port forwarding to SSH 2.4.0 servers. I provided a
patch for the problem but [2]was told that no more patches were being
considered until 4.1 was released and that I should attach my patch to a
new Bugzilla bug. This [3]I did.
Is there any chance it will be included in the next release?
1.
2006 Sep 21
5
Testing for the 4.4p1 release, round 2
Hi all.
As most of you know, we are preparing OpenSSH 4.4p1 for release. We have
had one round of testing and I would like to thank all who responded.
We believe that most of the problems reported have been resolved.
If you are so inclined, we would appreciate a quick retest to ensure
that the fixed ones remain fixed and the working ones remain working.
Of the problems identitified, I am only
2000 Sep 16
0
openssh-2.2.0p1-2 issue
I have checked the FAQ and the mailing list archives, but I haven't
been able to RTFM to solve my problem. Thus turning to the dev list.
2.2.0p1 Changelog includes:
20000207
- Removed SOCKS code. Will support through a ProxyCommand.
Relevant Mailing list archives:
http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=95803710921359&w=2
and
2002 May 31
0
[Bug 261] New: AIX capabilities + port-aix.c cleanup
http://bugzilla.mindrot.org/show_bug.cgi?id=261
Summary: AIX capabilities + port-aix.c cleanup
Product: Portable OpenSSH
Version: -current
Platform: Other
OS/Version: other
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy:
2002 Sep 28
0
Portability patch for regression tests
Hi All,
As threatened, I have rolled up the various portability patches for the
regression tests. Assuming all is well, running the tests is as simple
as "make tests", although some platforms (eg AIX) require "SUDO=sudo"
first.
I took the tests from OpenBSD CVS written by Markus and incorporated
the patches written by Roumen Petrov and myself as well as various
suggestions
2002 Oct 15
0
[Bug 414] New: sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
http://bugzilla.mindrot.org/show_bug.cgi?id=414
Summary: sshd initially ignores -e (log_stderr) if -i
(inetd_flag) is given
Product: Portable OpenSSH
Version: -current
Platform: All
URL: http://marc.theaimsgroup.com/?l=openssh-unix-
dev&m=102469253706346&w=2
OS/Version: Linux
2003 May 12
0
[Bug 502] sshd fails when "Compression yes" set on HPUX
http://bugzilla.mindrot.org/show_bug.cgi?id=502
------- Additional Comments From dtucker at zip.com.au 2003-05-12 19:12 -------
Is there an older libz in you library path? Mark Janssen reported an identical
problem (all the way down to the number after "alloc") which was solved by
recompiling zlib. See:
http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=104487220204506
2002 Dec 02
0
Invitation to e-attend an NYU e-business seminar!
Dear Dr. Samba:
NEW YORK UNIVERSITY's Director of Graduate Programs in Management & Systems
at the School of Continuing and Professional Studies,
Prof. Anthony R. Davidson PhD EDP, invites you to e-attend
the next SYNCHRONOUS VoiceOverIP lecture
in the "DISTINGUISHED e-LECTURER ON e-BUSINESS" series.
TUTORIAL ON DATAMINING FOR E-BUSINESS
by
PROF. DR. VELJKO MILUTINOVIC, Fellow
2001 Aug 02
0
patch: properly zeroing fd_set in clientloop
Hello all,
This is a problem and patch reported to Red Hat Bugzilla by
Jonathan Kamens <jik at kamens.brookline.ma.us>. I'm just acting as a relay
:-)
jik has experienced some weird crashes relating to window size changes or
some similar activity. These are rather hard to trace.
Problem was fixed by patching clientloop, where fd_set structures appear
to be improperly zeroed (bytes vs
2013 Jul 29
1
user input in clientloop.c
Hi folks,
Could you tell me which function in clientloop.c is responsible for reading user keyboard input?
What I found are client_make_packets_from_stdin_data() and client_process_input(), but they not for 'compat20' mode. My app runs in 'compat20'.
Thanks,
Bob
2009 Jan 06
3
[Bug 1548] New: Double free in OpenSSH clientloop.c/xmalloc.c via cmdline port forwarding
https://bugzilla.mindrot.org/show_bug.cgi?id=1548
Summary: Double free in OpenSSH clientloop.c/xmalloc.c via
cmdline port forwarding
Product: Portable OpenSSH
Version: 5.1p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: