Displaying 20 results from an estimated 900 matches similar to: "[PATCH] connect() timeout"
2003 Apr 15
0
Connect timeout patch
This patch avoids spending too much time during connect() when doing an
ssh()/scp() on a down host. It uses a new client option called
ConnectTimeout and is useful for rsync or rdist commands using ssh().
See http://bugzilla.mindrot.org/show_bug.cgi?id=207 for detailled info.
-------------- next part --------------
--- openssh-3.6.1p1/readconf.c.ORIG Tue Apr 15 23:06:30 2003
+++
2002 Oct 17
0
[PATCH] connect() timeout for OpenSSH-3.5p1
Here is the version of this patch for the last portable version of
OpenSSH (3.5p1), as it is not included in the main tree.
The patch avoids waiting to long when using ssh() or scp() on a down host,
it is usefull when you have to update many hosts via rsync or rdist themselves
relying upon ssh(). It enables a new option 'ConnectTimeout' to control
exactly the timeout value, so that it can
2002 Apr 03
1
[PATCH] connect() timeout
Here is a version of this widely used patch specific for OpenSSH 3.1p1,
as it is still not in the main tree (perhap one day...)
The patch avoids spending too much time when doing an ssh()/scp() on a
down host, as it does not depend off the default TCP timeout used
by connect().
Patch was tested on Linux, Solaris and HP-UX.
The patch can also be found on:
2002 Jan 26
5
[PATCH] Connect timeout
The attached patch adds a new 'ConnectTimeout' option (man page updated
in patch) to avoid wasting time when the target host is down. I needed that
because I was using rsync/rdist over ssh for massive files update and the
default connect() took too long for my purpose.
The patch was tested on Linux only, but I used a similar one for ssh 1.2.XX
on Linux, Solaris and HP-UX without
2001 Nov 17
0
[PATCH] Connect timeout
The attached patch adds a new 'ConnectTimeout' option (man page updated
in patch) to avoid wasting time when the target host is down. I needed that
because I was using rsync/rdist over ssh for massive files update and the
default connect() took too long for my purpose.
The patch was tested on Linux only, but I used a similar one for ssh 1.2.XX
on Linux, Solaris and HP-UX without
2018 Feb 23
6
RFC 8305 Happy Eyeballs in OpenSSH
Hello,
I use hosts that are dual stack configured (IPv4 and IPv6) and it
happens that connectivity through one or the other is broken and
timeouts. In these case connection to the SSH server can take quite some
time as ssh waits for the first address to timeout before trying the
next.
So I gave a stab at implementing RFC 8305. This patch implements part of
it in sshconnect.c.
* It does not do
2000 Jun 06
0
connection timeout
Attached is a patch which adds a ConnectionTimeout option, and corrects
the ConnectionAttempts documentation.
Previously, ssh would try to make a connection ConnectionAttempts times,
sleeping 1 second between tries. But each connection attempt could take a
very long time to fail if the packets die before the get to the host. So
if ssh is being run in a script or what-have-you, it might be
2017 Jan 12
3
proposed change to ssh_connect_direct()
On Sat, Jan 7, 2017 at 2:30 PM, Peter Moody <mindrot at hda3.com> wrote:
> so I spent a bit of time looking at this and it seems like the only
> way to go, at least if I want to keep it in ssh_connect_direct(), is
> to use pthreads. further, it seems like getting that accepted is
> something of a long shot:
Sorry, pthreads is a non-starter.
I would have thought that using
2003 May 17
0
opensshd fd_set definition problem
Hello,
I have been playing with valgrind + openssh-3.5p1 as
distributed in Red Hat 9. In the report, I get this:
==1059== Invalid read of size 4
==1059== at 0x40170B7D: vgAllRoadsLeadToRome_select
(vg_intercept.c:612)
==1059== by 0x40170DF2: __select (vg_intercept.c:681)
==1059== by 0x804E4C6: (within /usr/sbin/sshd)
==1059== by 0x403DC5CC: __libc_start_main (in
/lib/libc-2.3.2.so)
2000 Nov 14
1
[PATCH] Added option 'RetryDelay'
Being rather aggrevated when testing at the enforced 1 second
delay between each connection attempt and the useless 1 second delay
done after all connection attempts have failed I wrote a patch to make
the number of seconds delayed between each connection attempt
configurable.
Stephen
-------------- next part --------------
diff -u --recursive openssh-2.3.0p1/ChangeLog
2010 Nov 28
2
[PATCH] Use canonical hostname for DNS SSHFP lookup
In the current implementation, ssh always uses the hostname supplied by
the user directly for the SSHFP DNS record lookup. This causes problems
when using the domain search path, e.g. I have "search example.com" in my
resolv.conf and then do a "ssh host", I will connect to host.example.com,
but ssh will query the DNS for an SSHFP record of "host.", not
2009 Jun 01
2
[PATCH viewer] few minor bugfixes
- perform dns lookup on hostname,
- randomize local tunnel port
- simple autobuild script
- bump rpm spec version
---
autobuild.sh | 41 +++++++++++++++++++++++++++++++++++++++++
main.c | 14 +++++---------
ovirt-viewer.spec | 9 ++++++++-
tunnel.c | 29 ++++++++++++++++++++---------
4 files changed, 74 insertions(+), 19 deletions(-)
create mode 100755
2004 Aug 06
0
Submission: Patch to libshout/sock.c for MacOSX
Hi,
re libshout:
MacOSX doesn't have poll(), which prevents sock.c from
compiling. I've patched sock.c to use select(), which is
supported on MacOSX, and should be elsewhere too.
I've marked my changes with "SKoT" comments in the file below.
Main changes are in sock_write_bytes().
- SKoT
------8<-----
/* sock.c
* - General Socket Functions
*
* Copyright (c) 1999
2009 Jun 08
2
[PATCH] few minor bugfixes
- perform dns lookup on hostname,
- randomize local tunnel port
- bump rpm spec version
updated to include danpb's feedback regarding getaddrinfo
---
main.c | 36 ++++++++++++++++++------------------
ovirt-viewer.spec | 9 ++++++++-
tunnel.c | 29 ++++++++++++++++++++---------
3 files changed, 46 insertions(+), 28 deletions(-)
diff --git a/main.c b/main.c
index
2004 Mar 26
2
Patch for login exchange timeout
Here's a quick patch that adds a timeout (value set
from the connection timeout config parameter) for
identification exchange. The situation that this fixes
is the one where the sshd has a connection open (so
you can make a TCP connection) but does not put up a
banner (e.g. when the disk has crashed or when file
descriptors are exhausted on a machine). Sounds
unusual, but this happens with
2003 Nov 04
0
ServerLiesWarning
I'm trying to replace some sshv1 clients and servers in a modular way,
and the "Server Lies" warning (when the server says the key has one
more bit than it really has) is causing heartache. Per the FAQ, this
is relatively benign. Here's a patch that allows an admin or user to
disable the warning.
- Morty
diff -Nur openssh-3.7.1p2/readconf.c
2002 Jan 27
0
[PATCH] Add an exit delay to Openssh-3.0.2p1 for use in tunneling
Here is a patch to implement an exit delay in OpenSSH-3.0.2p1,
proposed by John Hardin. This is his description of the feature:
New option for OpenSSH: Delay before exit.
Command line option: -S delay
Config file option: sleep {delay}
Purpose: Wait the specified number of seconds after last traffic before
dropping the connection and exiting. If ports are forwarded, this causes
the ssh client
2014 Dec 05
2
[PATCH] p2v: wait for qemu-nbd before starting conversion (RHBZ#1167774)
Wait up to 10 seconds for qemu-nbd to start up and respond to clients.
Otherwise the conversion server may attempt to connect before qemu-nbd
is ready to serve it.
---
p2v/conversion.c | 72 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++
p2v/p2v.h | 1 +
2 files changed, 73 insertions(+)
diff --git a/p2v/conversion.c b/p2v/conversion.c
index cb2deed..1aefcc6 100644
---
2008 Sep 05
0
[PATCH] Janitorial work on xc_save.c
# HG changeset patch
# User Brendan Cully <brendan@cs.ubc.ca>
# Date 1220640849 25200
# Node ID 6e53036deb06fdbaa55489610ea8fc9c9b67ca64
# Parent 0eab1869ef6649878e7f2f5f5af534122aca3a4c
Janitorial work on xc_save.c
Remove an unused variable.
Replace errx by warnx when cleanup code follows.
diff --git a/tools/xcutils/xc_save.c b/tools/xcutils/xc_save.c
--- a/tools/xcutils/xc_save.c
+++
2003 Nov 27
2
Question about adding another parameter for OpenSSH
Hello,
I need to allow for some people to execute ssh with one shared private
key for remote executing command on various machines. However, it is not
possible to set group permissions for private keys and it is possible
to have just one private key file for one user. Please, is it possible
to add patches into openssh development tree like these, so that standard
behavior of ssh is not changed,