Displaying 20 results from an estimated 200 matches similar to: "New dynamic window patch (with limits)"
2004 Jul 07
3
DynamicWindow Patch
We have developed a patch that enables changing the SSH window size
using the tcp window size as the source. This allows SSH to obtain
maximum use of the bandwidth on high BDP links.
We also have a page that describes the changes and performance.
http://www.psc.edu/~rapier/hpn-ssh/
The patch against CVS is included here.
Common subdirectories: src/usr.bin/ssh/CVS and ssh/CVS
diff -u
2007 Nov 03
0
Yet another question on window computations
A couple of weeks ago I made an inquiry on window computation
details that has so far gone unanswered - unsurprisingly so, I now
realize, for it was way too involved. Let me try again with a
simplified version, in the hope that some nice OpenSSH developer could
please provide an answer.
What is the rationale underpinning the sending of a window adjust
packet, as implemented in channels.c? Until
2010 Jul 22
1
remote vs local window discrepancy
I am utilizing an openssh tunnel between two Linux boxes. On the client
box I issue the following commands to set up the tunnel;
- ssh -w0:0 root at x.x.x.x -v where x.x.x.x is the IP address of the Linux
system running sshd
- ip addr add 10.0.5.1/32 peer 10.0.5.2 dev tun0
- ip link set tun0 up
On the box running sshd I issue the following commands:
- ip addr add 10.0.5.2/32 peer 10.0.5.1 dev
2007 Oct 18
0
Window computation
I am trying to make sense of the way in which OpenSSH computes
window size, so far without much success :-(
My understanding is that when a client specifies a window size N at
the beginning of a session, it is letting the server know that it (the
server) can send, on a given channel, up to N bytes worth of data that
consumes window space (essentially the payload of SSH_MSG_CHANNEL_DATA
and one
2003 Dec 16
1
[Bug 773] OpenSSH hangs or silently exits on write failure on stdout/stderr
http://bugzilla.mindrot.org/show_bug.cgi?id=773
Summary: OpenSSH hangs or silently exits on write failure on
stdout/stderr
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: openssh-bugs
2012 Jul 02
0
[klibc:master] [MEMALLOC] Avoid gcc warning: variable ' oldstackp' set but not used
Commit-ID: cf9ea962f1fb310a92efd184f14df2c04b30f75a
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=cf9ea962f1fb310a92efd184f14df2c04b30f75a
Author: Jim Meyering <meyering at redhat.com>
AuthorDate: Fri, 8 Jul 2011 16:12:20 +0800
Committer: maximilian attems <max at stro.at>
CommitDate: Mon, 2 Jul 2012 10:44:23 +0200
[klibc] [MEMALLOC] Avoid gcc warning:
2020 Mar 28
0
[klibc:update-dash] dash: memalloc: Avoid looping in growstackto
Commit-ID: 21ceb151c758eb2384962b9ee8abc33b5bd674e9
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=21ceb151c758eb2384962b9ee8abc33b5bd674e9
Author: Herbert Xu <herbert at gondor.apana.org.au>
AuthorDate: Thu, 31 May 2018 01:51:48 +0800
Committer: Ben Hutchings <ben at decadent.org.uk>
CommitDate: Sat, 28 Mar 2020 21:42:55 +0000
[klibc] dash: memalloc: Avoid
2003 Sep 16
1
OpenSSH Security Advisory: buffer.adv
This is the 1st revision of the Advisory.
This document can be found at: http://www.openssh.com/txt/buffer.adv
1. Versions affected:
All versions of OpenSSH's sshd prior to 3.7 contain a buffer
management error. It is uncertain whether this error is
potentially exploitable, however, we prefer to see bugs
fixed proactively.
2. Solution:
Upgrade to OpenSSH
2004 Jan 15
3
[Bug 790] Connection stall when client output fails and server has a lot more to send
http://bugzilla.mindrot.org/show_bug.cgi?id=790
Summary: Connection stall when client output fails and server has
a lot more to send
Product: Portable OpenSSH
Version: 3.7.1p1
Platform: All
OS/Version: FreeBSD
Status: NEW
Severity: normal
Priority: P3
Component: ssh
AssignedTo:
2003 Sep 16
1
[alambert@quickfire.org: Heads up -- potential problems in 3.7, too? [Fwd: OpenSSH Security Advisory: buffer.adv]]
Is anybody aware of this?
-hc
----- Forwarded message from Alex Lambert <alambert@quickfire.org> -----
3.7.1 was just released.
Two patches for similar issues in a very short timeframe. Who do they
think they are -- Microsoft? <grin>
apl
-------- Original Message --------
Subject: OpenSSH Security Advisory: buffer.adv
Date: Wed, 17 Sep 2003 01:13:30 +0200
From: Markus Friedl
2003 Sep 16
5
OpenSSH Security Advisory: buffer.adv
This is the 1st revision of the Advisory.
This document can be found at: http://www.openssh.com/txt/buffer.adv
1. Versions affected:
All versions of OpenSSH's sshd prior to 3.7 contain a buffer
management error. It is uncertain whether this error is
potentially exploitable, however, we prefer to see bugs
fixed proactively.
2. Solution:
Upgrade to OpenSSH
2003 Sep 16
9
OpenSSH heads-up
OK, an official OpenSSH advisory was released, see here:
<URL: http://www.mindrot.org/pipermail/openssh-unix-announce/2003-September/000063.html >
The fix is currently in FreeBSD -CURRENT and -STABLE. It will be
applied to the security branches as well today. Attached are patches:
buffer46.patch -- For FreeBSD 4.6-RELEASE and later
buffer45.patch -- For FreeBSD 4.5-RELEASE and
2020 Mar 28
0
[klibc:update-dash] dash: memalloc: Add growstackto helper
Commit-ID: 1df4e2a6786b049decbc6ab1683108da86479891
Gitweb: http://git.kernel.org/?p=libs/klibc/klibc.git;a=commit;h=1df4e2a6786b049decbc6ab1683108da86479891
Author: Herbert Xu <herbert at gondor.apana.org.au>
AuthorDate: Sat, 19 May 2018 02:39:46 +0800
Committer: Ben Hutchings <ben at decadent.org.uk>
CommitDate: Sat, 28 Mar 2020 21:42:55 +0000
[klibc] dash: memalloc: Add
2005 Feb 24
7
Question performnace of SSH v1 vs SSH v2
Hello
I have ported OpenSSH 3.8p1 to a LynxOS platform. Recently I heard a
report from the field that v2 is perceived to be significantly slower
than v1. Is this a known issue? Are there any configuration parameters
that can be modified to make v2 faster?
Thanks in advance for your response
Amba
2011 Nov 30
1
[PATCH] [MEMALLOC] remove unused variable
Since commit 6ee30a14afac681adb1d62361ebcb0c9b6ba3153 ([klibc]
[MEMALLOC] Add pushstackmark), the 'oldstackp' local variable has been
unused. This change deletes the unused variable.
Signed-off-by: Greg Thelen <gthelen at google.com>
---
usr/dash/memalloc.c | 2 --
1 files changed, 0 insertions(+), 2 deletions(-)
diff --git a/usr/dash/memalloc.c b/usr/dash/memalloc.c
index
2009 Feb 19
1
NUT 2.4.1 crashes on FreeBSD - additional info
Hi Volker,
I forward your request to the user list since I don't currently have much
time to process it.
quickly testing 2.4.1, I wasn't able to reproduce it.
a question: was it working with the exact same context/config with 2.2.2?
cheers,
Arnaud
--
Linux / Unix Expert R&D - Eaton - http://www.eaton.com/mgeops
Network UPS Tools (NUT) Project Leader -
2007 Feb 18
8
[Bug 1286] SFTP keeps reading input until it runs out of buffer space
http://bugzilla.mindrot.org/show_bug.cgi?id=1286
Summary: SFTP keeps reading input until it runs out of buffer
space
Product: Portable OpenSSH
Version: v4.5p1
Platform: All
OS/Version: Linux
Status: NEW
Keywords: patch
Severity: normal
Priority: P2
Component: sftp
2007 May 02
1
FW: Cannot receive more that ~64k from host? (solution)
FYI:
I needed to update local_consumed when I pulled data out for display...
Steve
-----Original Message-----
From: openssh-unix-dev-bounces+stevec=futuresoft.com at mindrot.org
[mailto:openssh-unix-dev-bounces+stevec=futuresoft.com at mindrot.org]On
Behalf Of Cooper, Steve
Sent: Friday, April 20, 2007 3:40 PM
To: openssh-unix-dev at mindrot.org
Subject: Cannot receive more that ~64k from
2022 Nov 27
2
[Bug 3505] New: SSH_MSG_CHANNEL_WINDOW_ADJUST bottleneck
https://bugzilla.mindrot.org/show_bug.cgi?id=3505
Bug ID: 3505
Summary: SSH_MSG_CHANNEL_WINDOW_ADJUST bottleneck
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: Miscellaneous
Assignee: unassigned-bugs at
2001 Feb 10
3
Protocol 2 remote forwarding patch
Hi all,
I'm very new in this list, as looking for codes to plug up the lack of
functionality of "Protocol 2 Remote Forwardig".
Fortunately, I could find it in MARC's archive. Mr. Jarno Huuskonen
posted the codes in Sept, last year, and I tried applying it to my
FreeBSD box environment.
I couldn't apply an original patch, of course, for incompatibility of
virsion. The