similar to: OpenSSH Bug / Fix

Displaying 20 results from an estimated 2000 matches similar to: "OpenSSH Bug / Fix"

2003 May 07
4
[Bug 556] TCP_NODELAY not set completely for port forwarding
http://bugzilla.mindrot.org/show_bug.cgi?id=556 Summary: TCP_NODELAY not set completely for port forwarding Product: Portable OpenSSH Version: -current Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: openssh-unix-dev at mindrot.org
2002 Oct 31
1
TCP_NODELAY in Cygwin port
Hello SSH developers, I am sorry if this is not really a bug, and I am missing something, but I am running into an issue with port forwarding in SSH. I am using 3.4p1 of SSH on both sides. I am running the ssh daemon on a Slackware Linux 8.0 machine, and the ssh client is running in Cywgin version 1.3.13. The ssh client is creating about 7 port forwards in a mix of local and remote forwarding
2003 Dec 31
0
Problem with port forwarding on Mac OS X
I have found a problem with port forwarding on Mac OS X (10.2 and 10.3). When I forward a port to localhost, as in ssh -R 40404:localhost:40404 somehost ...and the remote system makes a connection on this port, I get the message getsockopt TCP_NODELAY: Connection reset by peer I have tracked this down to the loop in connect_to that gets a list of addresses from getaddrinfo and tries them
2003 Apr 09
1
[Bug 541] packet_set_interactive typo
http://bugzilla.mindrot.org/show_bug.cgi?id=541 Summary: packet_set_interactive typo Product: Portable OpenSSH Version: -current Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo: openssh-unix-dev at mindrot.org ReportedBy: furrier at
2001 Aug 24
2
[PATCH] SO_KEEPALIVE for port forwards
Attached is a patch to allow a user to turn on TCP keepalives for port forwarded connections. It's mainly useful when the connections to the ssh listener are coming from many different boxes, some of which crash, leaving the service on the other side of the port forwarder waiting on connections indefinitely. It creates a new option named "KeepAliveForward" to control this behavior.
2000 Oct 07
2
[PATCH]: Add tcp_wrappers protection to port forwarding
Hi, attached is a patch by Chris Faylor <cgf at cygnus.com> relative to 2.2.0p1. Description: OpenSSH does not allow port gatewaying by default. This means that only the local host can access forwarded ports. Adding "GatewayPorts yes" to .ssh/config usually does this job. Unfortunately, OpenSSH does not recognize the same hosts.allow/ hosts.deny options as ssh.com's sshd
1999 Nov 20
1
openssh and DOS
It appears that openssh has inherited the dos attack that ssh is susceptible to. This has been discussed on Bugtraq (see http://securityportal.com/list-archive/bugtraq/1999/Sep/0124.html for the thread). There does not appear to be an official for ssh. Attached below is a simple, proof of concept, patch that adds a MaxConnections to sshd_config that sets the maximum number of simultaneous
2003 Oct 26
1
getsockopt TCP_NODELAY: Socket operation on non-socket
We get the warning above whenever we use a ProxyCommand. We _know_ it's a pipe, so we can't use sockopts on it. So we shouldn't bitch about it. This breaks all kinds of things which use SSH transparently; including pine, which really wants the first thing it receives from an IMAP server to be a valid imap greeting... which $subject is not. $ ssh -o "proxycommand sh -c '(
2001 Nov 27
1
[PATCH] tcp-wrappers support extended to x11 forwards
Hi! Here is the patch to support tcp wrappers with x11-forwarded connections. The patch is for openssh-3.0.1p1 but it works fine with 2.9.9p2 too. I've understood that this will not be included in the official version because it adds complexity (?!) to openssh. Binding the forwarded port to localhost doesn't solve all problems. I've understood that you should also implement
2000 Jun 27
1
openssh-2.1.1p1 on Irix6.2 report
I've had fairly good sucecss with the portable OpenSSH 2.1.1p1 on Irix 6.2. There's one major nit, and a few things that configure got wrong. I'm kinda deep in real work at the moment, so I don't have time to delve heavily, but since configure specifically asked for feedback on this port, I'm obliging. The biggest problem I've run into so far is in the builtin PRNG
2003 Aug 26
2
[Bug 556] TCP_NODELAY not set completely for port forwarding
http://bugzilla.mindrot.org/show_bug.cgi?id=556 ------- Additional Comments From markus at openbsd.org 2003-08-27 02:56 ------- sshd already sets nodelay for the connection, but conditionally, and only for interactive sessions, so this is the well known problem: why does sshd traditionally set no delay only for interactive sessions. ------- You are receiving this mail because: -------
2011 Jun 20
3
Bug#631102: xen: Xen guests on Squeeze lose networking randomly
Package: xen-hypervisor-4.0-amd64 Version: 4.0.1-2 Severity: grave File: xen Justification: renders package unusable Debian Squeeze Dom0, up to date. Networking is handled by OS scripts, such that br0 and br1 are bridge interfaces. Without warning, the DomU (Ubuntu 10.04 LTS) loses inbound connectivity. It tends to happen after several hours. It doesn't seem to be affected by throughput
2002 May 29
2
[PATCH] Add config option disabling drop_connection() behavior
The patch below (against openssh 3.2.3p1) adds a CheckMaxStartups option, defaulting to yes, to determine whether sshd calls drop_connection(). The motivation behind this is twofold. In our environment, our timesharing machines get enough incoming connections that will trigger spuriously with the default value (10 forked unauthenticated connections) as well as some significantly higher values,
2014 Feb 10
0
[PATCH] Basic SCTP support for OpenSSH client and server
This patch allows the OpenSSH client to make connections over SCTP, and allows the OpenSSH server to listen for connections over SCTP. SCTP is a robust transport-layer protocol which supports, amongst other things, the changing of endpoint IPs without breaking the connection. To connect via SCTP, pass -H or set "ConnectViaSCTP yes". To listen via SCTP as well as TCP, set
2003 May 10
1
OpenSSH_3.6.1p2 getsockopt TCP_NODELAY bogus message on Solaris 8
I ran into the following problem the first time I used OpenSSH_3.6.1p2 on Solaris 8 (sparc, 32-bit): $ ssh kiwi Enter passphrase for RSA key '/net/sic/export/ford/home/eggert/.ssh/identity': getsockopt TCP_NODELAY: Socket operation on non-socket Last login: Sat May 10 14:27:01 2003 from ip-66-80-53-59.d Sun Microsystems Inc. SunOS 5.8 Generic Patch October 2001
2003 Apr 01
0
minor cosmetic fix when using a proxy
First, apologies for not testing this before release. I've been spoiled by such a useful and stable tool. When using a proxy script to connect (I'm using the connect.c code found thru google) I get an error message trying to set TCP_NODELAY on a non-socket. I silenced the message by skipping the call to error only if errno == ENOTSOCK. There is probably a better way to handle this,
2003 Apr 03
0
minor cosmetic fix hwen using a proxy
I think following patch is better for "TCP_NODELAY on a non-socket" bug. Nobuo Sakiyama <nobuo at isl.rdc.toshiba.co.jp> diff -u packet.c.dist packet.c --- packet.c.dist Mon Dec 23 11:42:53 2002 +++ packet.c Thu Apr 3 18:06:12 2003 @@ -1344,6 +1344,7 @@ /* Only set socket options if using a socket. */ if (!packet_connection_is_on_socket()) + return; if
2003 Jun 16
1
[Bug 594] SSH tries to set nodelay on non-sockets
http://bugzilla.mindrot.org/show_bug.cgi?id=594 Summary: SSH tries to set nodelay on non-sockets Product: Portable OpenSSH Version: -current Platform: All OS/Version: Linux Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo: openssh-bugs at mindrot.org ReportedBy: jimb at
2020 Jan 21
2
Instrumentation for metrics
On 21/01/20 8:44 pm, Damien Miller wrote: > On Tue, 21 Jan 2020, Philipp Marek wrote: > >>> This makes me think that the syslog approach is probably the way to go >> >> Yeah, right. >> Another idea is to mirror the current preauth load via setproctitle()... >> That makes that data accessible even without a syscall (at least the >> writing of the
2000 Sep 28
0
Announcement
Hello- I'm writing to you for a request to see our new site, http://www.buyitpc.com/signup.html and the add your name to our list if you like to know about computer components and software! http://www.buyitpc.com Thank you for your time! There is a legal way of sending large ammounts of e-mails. If you want to show that you are in full compliance with the law and are completely legal,