Displaying 20 results from an estimated 10000 matches similar to: "so-called-hang-on-exit"
2002 Aug 07
1
Unrelated (was RE: so-called-hang-on-exit)
Add -n to the ssh command line - see if that fixes it.
Nico
--
> -----Original Message-----
> From: Eric Garff [mailto:egarff at omniture.com]
> Sent: Wednesday, August 07, 2002 11:15 AM
> To: openssh-unix-dev at mindrot.org
> Subject: Re: so-called-hang-on-exit
>
>
> That may be, but it only "hangs" when run from cron, if I run it
> manually it executes
2002 May 06
6
SCP file corruptions
Hi,
I apparently was asleep at the wheel using scp, and accidentally copied a
file onto itself. Scp generated an Input/Output error and did not perform
the copy. However, now the file is corrupt. Is this a but? Is there anyway
to fix the file I messed up?
Thanks,
Don Gathman
208.396.6675
2001 Aug 16
4
Idletimeout patch
While I was updating our ssh-servers, I rewrote my old patch that adds
idletimeout (just like in old ssh1) parameter to openssh. Since reapplying
the patch for all new versions of openssh is not fun at all, I would like
to have it included in the official openssh, if you consider the patch
worthy.
Unlike ClientAlive, idletimeout works for both protocol versions. It also
works together with
2001 Oct 03
5
hang on exit - bug or no bug?
The hang on exit has become quite an issue in my organization(Sun and HP
hosts). I see this note in the changelog which indicates that there
will not be a fix for this problem:
20001129
- (djm) Back out all the serverloop.c hacks. sshd will now hang again
if there are background children with open fds.
Also, I am aware of the workaround as noted in the FAQ. However this
workaround is not
2001 Aug 20
1
Idletimeout patch, third attempt
Here is my third attempt at the idletimeout patch. I tried to address
the points which Marcus Friedl brought up.
It is actually bigger than the previous patches, but not as intrusive.
It is big because it moves some stuff from serverloop.c to packet.c.
- I moved all the logic to packet.c. This means that I also had to move
the actual select() call, which used to be in serverloop.c to packet.c.
2002 Sep 10
8
[Bug 369] Inconsistant exiit status from scp
http://bugzilla.mindrot.org/show_bug.cgi?id=369
------- Additional Comments From devel at pitux.com 2002-09-10 19:19 -------
I confirm that this bug does exist. It's especially annoying since we use here
a lot of scripts which check for the return values of scp to indicate success
or failure.
In fact it does the good thing on nonexistent files/dirs/etc, but fails in case
of auth
2001 Oct 31
2
OpenStep (NeXT) and TTY modes
OpenStep, apparently, does not initialize new pty/tty modes to a sane
default.
I'm thinking this code snippet, added to tty_parse_modes() before the
for(;;) loop should suffice:
#ifdef HAVE_NEXT
tio.c_oflag |= ONLCR;
tio.c_lflag |= ECHO;
#endif /* HAVE_NEXT */
Also, I've noticed that "ssh -t next_host stty" gives different output
than an interactive session to the same
2001 Oct 31
2
suggested fix for the sigchld race
comments?
alternatives: sigsetjmp(ugly) and pselect(not portable, available)
drawback: additional filedescriptors.
Index: serverloop.c
===================================================================
RCS file: /home/markus/cvs/ssh/serverloop.c,v
retrieving revision 1.82
diff -u -r1.82 serverloop.c
--- serverloop.c 10 Oct 2001 22:18:47 -0000 1.82
+++ serverloop.c 11 Oct 2001 18:06:33 -0000
@@
2002 Jan 24
3
Configure script
Hello,
Why does the configure scipt include -I/usr/local/include for
CPPFLAGS
and -L/usr/local/lib -R/usr/local/lib for LDFLAGS in the Makefile?
Is this nesscesary? I take them out for security concerns
Thanks
Doug
2002 Jul 15
10
Patch: Solaris packages don't create privsep user or group
Hi.
Solaris packages created by buildpkg.sh don't create privsep user or
group and sshd won't start until they are created (or privsep is
disabled):
## Executing postinstall script.
starting /usr/local/sbin/sshd... Privilege separation user sshd does not
exist
/etc/init.d/opensshd: Error 255 starting /usr/local/sbin/sshd...
bailing.
The attached patch (against -cvs) ports the relevant
2002 Jul 01
9
scp not tolerant of extraneous shell messages
I spent some time debugging a failing Scp that turned out to be caused
by the remote shell producing messages on Standard Output that aren't
part of the SCP protocol.
Scp from a remote system works by running another Scp on the remote
system. The remote Scp writes SCP protocol messages (and file data)
to its Standard Output, which the local Scp sees as Standard Input.
But it's
2002 May 17
3
OpenSSH 3.2.2 released : chroot
You must mean your most wanted feature. Mine is the integration of Simon's GSS patches.
Nico
--
> -----Original Message-----
> From: Jean-Michel POURE [mailto:jm.poure at freesurf.fr]
> Sent: Friday, May 17, 2002 7:35 AM
> To: Markus Friedl; openssh-unix-dev at mindrot.org
> Subject: OpenSSH 3.2.2 released : chroot
>
>
> Le Vendredi 17 Mai 2002 00:36, Markus
2002 Nov 04
2
Sweave - documenting a long function
Hi,
I would like to use Sweave to document a long function.
Is it possible to split the function's code into chunks
such that Sweave will accept each chunk without complaining.
I have tried various approaches without sucess
but I feel sure that someone has done this already.
Here is one attempt
==============
% First, define the funciton header
<<defFunHdr, eval=FALSE>>=
x <-
2002 Jun 07
2
SIGCHLD may be inherited blocked
So, we just found some ugly behaviour of OpenSSH on Solaris.
Sometimes, it seems, sshd gets started with SIGCHLD blocked, this,
apparently, being the setting of sshd's parent (a shell no doubt);
signal blocking is inherited across exec*(). I don't know exactly which
shell, or what really is at fault, but it happens.
The problem is that the code in collect_children() first blocks SIGCHLD
2002 Aug 07
2
so called hang-on-exit bug
>
> Yes, you can "police" these things as a sysadmin. How? Use
> /usr/proc/bin/ptree, ps, lsof and what not to find all sshd
> processes and their associated ptys - the sshds that have no
> children processes but whose master pty's slave pty still has
> processes associated with said pty, those are the sshds that must be
> killed in order to clean up (or you
2001 Oct 26
2
SSHv2 sshd exit criteria
When should sshd disconnect an SSHv2 connection?
Markus Friedl says "for protocol v2 the client decides when to close the
connection."
In principle, I agree, because SSHv2 supports multiple sessions over the
same connection, with the client able to launch new sessions anytime
then it should be upto the client.
But this would be a major cultural change for most users, and would
break
2001 Oct 25
2
SIGCHLD race *trivial* patch
Yes, this is a patch against an older version of OpenSSH with other
stuff anyways, BUT, it's so TRIVIAL(*), that you can see how it would
apply to newer versions (which I've not tried).
Here's the gist: server_loop2() has a race condition with respect to
reception of SIGCHLD and checking/setting child_terminated. This patch
does two things: wait_until_can_do_something() adds a 1
2002 Jan 31
4
signal transmission in ssh2
does somebody like this?
Index: Makefile.inc
===================================================================
RCS file: /cvs/src/usr.bin/ssh/Makefile.inc,v
retrieving revision 1.21
diff -u -r1.21 Makefile.inc
--- Makefile.inc 30 Oct 2001 20:32:31 -0000 1.21
+++ Makefile.inc 16 Nov 2001 12:07:22 -0000
@@ -10,7 +10,7 @@
CDIAGFLAGS+= -Wmissing-prototypes
CDIAGFLAGS+= -Wunused
-#DEBUG=-g
2001 Oct 16
1
[Fwd: Re: Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2]
Nicolas,
The timing attack described in the paper by Dawn Song et al. works by
examining the timing of keystrokes. Currently OpenSSH sends a packet
every time you press a key, thus it is possible to capture the
approximate inter-keystroke timing of a user (they found minimal
overhead
in time from a key press to packet sent). Our patch causes a packet to
be sent every 50 ms regardless of whether
2002 Feb 08
3
SCP Problem with OpenSSH 3.0.2p1 linux->solaris
Hello,
i am experiencing scp hangs. This command is executed:
system("/usr/bin/scp -v -v -v -C
root\@$ip:$LOG_DIR_CLIENT$SYSTEM_LOG"."_transfer $LOG_DIR_SERVER$SYSTEM_LOG-$ip >$SSH_STEP3_LOG 2>&1");
from within a perl script.