Displaying 20 results from an estimated 7000 matches similar to: "Pseudo-terminal notification and quiet logging"
2001 Apr 12
1
ssh's readconf.c debug() goes to /dev/null
Hi,
Related to:
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/ssh.c.diff?r1=1.100&r2=1.101
It'd appear that logging in readconf.c:
---
debug("Applying options for %.100s", arg);
debug("Reading configuration data %.200s", filename);
---
Goes to /dev/null.
This is caused by the fact, that in ssh.c there is:
---
/*
* Initialize
2002 Dec 18
2
patch for openssh3.5p1 - adds logging option
this patch adds a LogFile option to sshd_config. it just logs messages
directly to a file instead of stderr or syslog. the largest change
is an additional argument to log_init() in log.c for the log file name
(and then changes to the rest of the tools to add a NULL arg).
galt
-------------- next part --------------
diff -urN openssh-3.5p1-orig/log.c openssh-3.5p1/log.c
---
2003 Aug 16
0
sftp-server (secure) chroot patch, comment fix
Accidently removed XXX comment. New patch below.
Regards
Magnus
--- openssh-3.6.1p2/sftp-server.c.org 2003-08-11 22:07:47.098650000 +0200
+++ openssh-3.6.1p2/sftp-server.c 2003-08-16 19:07:14.273582000 +0200
@@ -24,15 +24,24 @@
#include "includes.h"
RCSID("$OpenBSD: sftp-server.c,v 1.41 2003/03/26 04:02:51 deraadt Exp $");
+#define CHROOT
#include "buffer.h"
2003 Aug 16
0
sftp-server (secure) chroot patch?
Hello,
I know this chroot issue has been brought up many times before on this list. I saw that the contribibuted chroot-patch was removed from the contrib directory because it always was out of date. The main reason was of course was that sftp-server has to be run as root to be able to do the chroot() call? Most of you are against chroot (since it isnt in the src) but I believe a lot of users
2008 Feb 22
3
Problem with cut
Hi All,
I might misunderstood how cut works. But following behaviour surprises
me.
vv <- seq(150, 346, by= 4)
cc <- cut(vv, 12)
cc[vv == 330]
Results [1] (330,346]
I would have expected 330 to fall into (313,330] category.
Can you please advice what do I do wrong?
Many Thanks,
Jussi Lehto
-------------- next part --------------
Visit our website at http://www.ubs.com
This message
2007 Jun 18
0
[PATCH] sftp-server argument error handling
When you give sftp-server a bogus -l or -f parameter, it logs a useful
error message then blunders on to call log_init() with the bogus value.
log_init() then prints a less useful message to stderr and exits. The
following patch tidies this up by only printing the more useful error to
stderr and not blundering on afterwards.
--- sftp-server.c.orig Mon Jun 18 16:37:46 2007
+++ sftp-server.c Mon
2001 Jan 04
2
Patch to allow openssh-2.2.0-p1 to be started from /etc/inittab
The following patch allows OpenSSH 2.2.0-p1 to be started (and managed)
from /etc/inittab (by "init") on systems which support that. This is
useful when you *really* want SSHD to always run since it will be
automatically restarted by "init" if it dies (and if "init" dies the
the systems dies :-).
I use a line (in /etc/inittab) like this on Solaris systems:
2011 Jun 02
2
preauth privsep logging via monitor
Hi,
This diff (for portable) makes the chrooted preauth privsep process
log via the monitor using a shared socketpair. It removes the need
for /dev/log inside /var/empty and makes mandatory sandboxing of the
privsep child easier down the road (no more socket() syscall required).
Please test.
-d
Index: log.c
===================================================================
RCS file:
2001 Jun 20
1
SFTP Logging Redux.
Sorry to repost, but I finally have the code on a machine that has
diff -u, and I've updated it for 2.9p2. Attached is the unified
diff to add logging of SFTP activity to auth.info.
If there is a more proper way to contrib patches, please let me
know.
Cheers,
Jason
# "Jason A. Dour" <jason at dour.org> http://dour.org/
# Founder / Executive Producer - PJ
2002 Mar 26
1
Two patches for OpenSSH 3.1p1
Please find enclosed two patches for OpenSSH 3.1p1.
The first patch solves a problem where sessions will be left "hanging"
when you normally exit from a ssh shell (for example by logging out from
the remote host via "exit" or "logout"). The problem seems to be that sshd
(and some other parts of OpenSSH) doesn't check the return code and errno
from waitpid() for
2003 Sep 30
1
[PATCH] sftp-server (secure) chroot patch, 3.7.1p2 update
Hello all,
Here is an updated patch. I published the original patch published on
august 16.
--- openssh-3.7.1p2/sftp-server.c.org 2003-08-22 01:34:41.000000000
+0200
+++ openssh-3.7.1p2/sftp-server.c 2003-09-30 17:22:43.730402000 +0200
@@ -24,6 +24,7 @@
#include \"includes.h\"
RCSID(\"$OpenBSD: sftp-server.c,v 1.43 2003/06/25 22:39:36 miod Exp
$\");
+#define CHROOT
1999 Nov 20
1
openssh and DOS
It appears that openssh has inherited the dos attack that ssh is
susceptible to. This has been discussed on Bugtraq (see
http://securityportal.com/list-archive/bugtraq/1999/Sep/0124.html
for the thread). There does not appear to be an official for ssh.
Attached below is a simple, proof of concept, patch that adds a
MaxConnections to sshd_config that sets the maximum number of
simultaneous
2006 Jun 20
2
[PATCH] openssh pseudo-terminal bug
hello
short description:
ssh client sends a wrong all-zero terminal info when requesting forced pseudo-terminal
allocation while stdin is not a terminal.
sshd then sets the terminals ospeed to 0 because it receives this information from the
client. on solaris this means that the pseudo-terminal is closed and output of any
remote command is dropped.
longer description:
what we're doing is
2013 Jun 20
0
Issue with Pseudo terminal allocation with Openssh6.1p1
Hi Openssh users ,
I am working on a client server application that involves extensive client
server interaction in a single ssh session. The application is also
required to capture all the Read , Write and Error Filehandles to work on
them separately as per the requirements of the application.
The ssh session had been using the flag '-T' to disable the message
'Pseudo-terminal will
2002 Mar 15
4
PATCH: sftp-server logging.
This is another take on logging for sftp-server. Given the number
of private email requests I've received for this patch, I assume
there is signifigant enough interest to request it be reviewed for
inclusion into the release.
The patch is against 3.1p1, and is completely disabled by default.
To enable logging, one must use compile time directives
(-DSFTP_LOGGING). This was done due to prior
2001 Feb 01
0
warnings on aix325
Hi,
I'm trying to compile openssh2.3.0p1 on aix3.2.5.
Can I ignore this list of warning messages?
bsd-bindresvport.c: In function `bindresvport_af':
bsd-bindresvport.c:94: warning: implicit declaration of function `bind'
bsd-rresvport.c: In function `rresvport_af':
bsd-rresvport.c:64: warning: implicit declaration of function `bzero'
bsd-rresvport.c:82: warning: implicit
2001 Dec 18
1
chroot howto for sftp-server
Using OpenSSH SFTP with chroot
==============================
Several people have been asking now for some kind of documentation on how to
use the chroot-patch for the sftp-server. So here it comes. I hope nobody minds
that i post this in the developer list.
The patch has been provided to the list some time ago. I'm sorry not giving
credit to the author, but I really don't know who
2002 Jun 05
1
Trailing comma in enum for 3.2.3p1
A trailing comma in an enum generates an error with the IBM C
compiler, xlc, on AIX 4.3.2:
$ gmake
...
xlc -O2 -qmaxmem=-1 -qarch=com -I/opt/TWWfsw/tcpwrap/include -I. -I.
-I/opt/TWWfsw/libopenssl09s/include -I/opt/TWWfsw/zlib11s/include
-DSSHDIR=\"/etc/opt/TWWfsw/openssh323\"
-D_PATH_SSH_PROGRAM=\"/opt/TWWfsw/openssh323/bin/ssh\"
2007 Sep 12
0
PATCH: fix incorrect checking of syslog facility in sftp-server
hi, there is a typo like error in sftp-server.c - obviously
"log_facility" should be used in the comparison for '-f' option, not
"log_level". That way the error can't be ever printed because log_level is
always not equal to -1 there. However, using incorrect facility will trigger
"Unrecognized internal syslog level code ..." in log_init() later though
2000 Aug 05
0
Protocol 2 and fork
Hello !
Like Edmund EVANS reported openssh-2.1.1p4 won't fork to background when
using protocol 2.
I managed to hack a little patch that might work ...
What is the -N command line option supposed to do ? I gather it should work
only with protocol2 and without any command to run on the server (and with
some port forwardings ??)
Anyway in the patch I put some code to check that -N is used