Displaying 20 results from an estimated 800 matches similar to: "SIGHUP fails to restart (3.6.1p2 -> 3.7p1)"
2007 Feb 21
0
sshd unhandled SIGALRM (resend)
sshd will die from an unhandled SIGALRM if you allow SSH1 connections,
ssh in, HUP sshd, and don't ssh in again for KeyRegenerationInterval.
The HUP handler calls exec which resets signal handlers but persists
alarm timers. Chapter and verse:
2007 Jan 25
0
sshd unhandled SIGALRM
sshd will die from an unhandled SIGALRM if you allow SSH1 connections,
ssh in, HUP sshd, and don't ssh in again for KeyRegenerationInterval.
The HUP handler calls exec which resets signal handlers but persists
alarm timers. Chapter and verse:
http://www.opengroup.org/onlinepubs/000095399/functions/alarm.html
--
Andrew Gaul
http://gaul.org/
-------------- next part --------------
Index:
2003 Apr 02
0
[Bug 529] sshd doesn't work correctly after SIGHUP
http://bugzilla.mindrot.org/show_bug.cgi?id=529
Summary: sshd doesn't work correctly after SIGHUP
Product: Portable OpenSSH
Version: 3.6p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy:
2001 Feb 19
0
Restarting with kill -HUP
Hi,
If sshd is started with 'sshd', restarting with kill -HUP
will fail.
I've included the most obvious patch, but making sure
that the full pathname is in saved_argv[0] just might be
more secure.
Cheers,
Han Holl
--- sshd.c.orig Mon Feb 19 10:55:54 2001
+++ sshd.c Mon Feb 19 10:56:15 2001
@@ -208,7 +208,7 @@
{
log("Received SIGHUP; restarting.");
2004 Feb 24
3
[Bug 529] sshd doesn't work correctly after SIGHUP
http://bugzilla.mindrot.org/show_bug.cgi?id=529
postadal at suse.cz changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |REOPENED
Resolution|FIXED |
------- Additional Comments From postadal at suse.cz 2004-02-24 21:28 -------
2011 Feb 07
1
[PATCH] ssh: set proctitle for mux master
Preserving the command line from the invoking ssh command doesn't
make much sense, so use setproctitle() to hide the arguments.
---
ssh.c | 20 +++++++++++++++++---
1 files changed, 17 insertions(+), 3 deletions(-)
diff --git a/ssh.c b/ssh.c
index d32ef78..8ebcc88 100644
--- a/ssh.c
+++ b/ssh.c
@@ -230,12 +230,25 @@ main(int ac, char **av)
struct servent *sp;
Forward fwd;
- /* Ensure
2000 Oct 15
1
Patch for Digital Unix SIA authentication
A while back, I sent in a patch that added Digital Unix SIA
authentication to OpenSSH. Well, I just figured out that it didn't
handle everything correctly (locked accounts could still log in). I
thought I had checked that, but I guess I missed it.
Anyway, here is a patch against OpenSSH 2.2.0p1 that fixes this.
--
Chris Adams <cmadams at hiwaay.net>
Systems and Network Administrator
2000 Oct 07
0
OpenSSH changes for BSD/OS
The following are patches against openssh 2.1.1p4 to add
support for the BSD_AUTH authentication mechanisms. It allows the
use of non-challenge/response style mechanisms (which styles are
allowed my be limited by appropriate auth-ssh entries in login.conf).
The patches also add support for calling setusercontext for the
appropriate class when called with a command (so that the PATH, limits,
2001 Dec 19
0
Patch for DU SIA auth
Hello. The following is a patch against OpenSSH 3.0.2p1 to fix OpenSSH's
handling of Tru64 SIA authentication. The main changes are to make the
SIAENTITY a global variable (so that it remains persistent across function
calls), initialization only happens once, the session is only released
once. This makes SIA modules that require authentication in order to
perform certain actions during the
2003 Feb 27
0
Update for Tru64 Unix
Here is a long-overdue (sorry about that) patch for Tru64. It is pretty
minor mostly (minor formatting and removal of a couple of unneeded
calls), and it disables post-auth privsep (so that OpenSSH will work
"out of the box" on Tru64, avoiding the many questions).
I'm also looking at getting setproctitle working. For Tru64 4.x, it
isn't a big deal (normal PS_USE_CLOBBER_ARGV
2006 May 04
2
xmalloc(foo*bar) -> xcalloc(foo, bar) for Portable
Hi All.
While wandering in auth-pam.c I noticed that there's a few Portable-specific
escapees from the xmalloc(foo * bar) cleanup.
There's also a "probably can't happen" integer overflow in
ssh-rand-helper.c with the memset:
num_cmds = 64;
- entcmd = xmalloc(num_cmds * sizeof(entropy_cmd_t));
+ entcmd = xcalloc(num_cmds, sizeof(entropy_cmd_t));
2002 Sep 04
2
uid transition and post-auth privsep (WAS Re: possible fundamental problem with tru64 patch) (fwd)
What do we loose by not having post-auth privsep?
What code is executed between authorization and actual setting of the
effective uid?
On Tue, 3 Sep 2002, Chris Adams wrote:
> Once upon a time, Toni L. Harbaugh-Blackford <harbaugh at nciaxp.ncifcrf.gov> said:
> > It appears that the integration of the sia session setup will either
> > have to be rethought or abandoned
2003 Sep 24
1
Patches for compatibility with Heimdal's libsia_krb5 SIA module
I have found the following patches to be desirable for using sshd on a
Tru64 UNIX system with the Kerberos 5 SIA module (libsia_krb5.so) from
Heimdal.
These patches do the following:
1) preserve context between the password authentication and the session
setup phases. This is necessary because the Heimdal SIA module stores
Kerberos context information as mechanism-specific data in
2004 Jan 03
1
rsync 2.6.0: ./configure goes into a loop
After doing a fresh extraction of the source for 2.6.0, I execute ./configure
and it enters a loop with no output before or during. I let run 20 minutes
just to see if it would ever do anything and it did nothing else.
Host system has:
Linux: 2.4.23
Slakcware: 9.0
bash: 2.05b.0
gcc: 3.2.2
glibc: 2.3.1
I have a big (huge) strace of it here:
2003 Sep 16
3
Compilation of 3.7p1 failed on IRIX (missing file)
Version 3.7p1 of OpenSSH can't be compiled on IRIX 6.5 because the file
openbsd-compat/inet_ntoa.h
is missing. It is possible to compile successfully using this file out of
version 3.6.1p2.
Heiko
Heiko Schlichting | Freie Universit?t Berlin
heiko at FU-Berlin.DE | Zentraleinrichtung f?r Datenverarbeitung (ZEDAT)
Telefon +49 30 838-54327 | Fabeckstra?e 32
Telefax +49 30
2007 Feb 04
2
klibc 1.4 won't build with linux 2.6.19.1
I get this error:
=============================================================================
KLIBCCC usr/kinit/resume.o
usr/kinit/resume.c:15:66: linux/config.h: No such file or directory
make[2]: *** [usr/kinit/resume.o] Error 1
make[1]: *** [all] Error 2
make: *** [klibc] Error 2
=============================================================================
There is no linux/config.h in
2007 Mar 07
1
syncronizing file content into device content
I have repeatable cases where a (very large) file contents are the
intended content of a device (partition) of that exact size. The
target device is already mostly of that content, but a few block
have been changed. I want to restore the device contents back to
what the file originally was. I'm trying to find a way to have
rsync's write end open the device as a file and do its thing to
2000 Jul 05
0
openssh compile error on TRU64 4.0D
L.S
We have a problem compiling the latest ssh (openssh2.1.1p2) on TRU64 Unix
4.0D
we got the following error message
...
auth1.c:507: `saved_argv' undeclared (first use in this function)
....
auth1.c:509: warning: passing arg 4 of `sia_validate_user' discards
qualifiers from pointer target type
*** Exit 1
where line 509 ===>
(sia_validate_user(NULL, saved_argc, saved_argv,
2001 Mar 01
1
Bug report against openssh-2.3.0p1
I am writing to report a bug in openssh-2.3.0p1, and to suggest
a fix.
I have OpenSSH installed on a Solaris 8 box. The output of
uname -a is:
> SunOS dipper.csi.cam.ac.uk 5.8 Generic_108528-06 sun4u sparc SUNW,Ultra-5_10
OpenSSH was configured with the following options:
> ./configure --prefix=/jackdaw --with-default-path=/jackdaw/bin:/usr/bin
On this OS, with this configuration, it
2005 Dec 02
2
parallel tree recursion
How hard would it be to have rsync do the file recursion scan on both the
source tree and the destination tree at the same time in parallel? Would
that require a protocol change, or could just a program change be enough?
I have some very large directories I'd like to syncronize. Total time to
scan through these millions of files is a substantial portion of an hour
or even exceeds it. It