Displaying 20 results from an estimated 600 matches similar to: "sshd gets stuck: select() in packet_read_seqnr waits indefinitely"
2007 Sep 17
18
[Bug 1363] New: sshd gets stuck: select() in packet_read_seqnr waits indefinitely
http://bugzilla.mindrot.org/show_bug.cgi?id=1363
Summary: sshd gets stuck: select() in packet_read_seqnr waits
indefinitely
Product: Portable OpenSSH
Version: 4.2p1
Platform: All
URL: http://marc.info/?t=117394251600035
OS/Version: All
Status: NEW
Keywords: patch
Severity: major
2018 Dec 03
3
[PATCH] removing an old API.
While looking for leaks I came across two old packet APIs which are easy
to remove. I'm sending patches for each separately.
First, there is the packet_set_connection(int fd_in, int fd_out)
function in opacket.c
The function relies on a behavior in ssh_packet_set_connection() where,
when it is passed a NULL pointer, it will implicitely allocate a struct
ssh and return it after then set
2001 Aug 20
1
Idletimeout patch, third attempt
Here is my third attempt at the idletimeout patch. I tried to address
the points which Marcus Friedl brought up.
It is actually bigger than the previous patches, but not as intrusive.
It is big because it moves some stuff from serverloop.c to packet.c.
- I moved all the logic to packet.c. This means that I also had to move
the actual select() call, which used to be in serverloop.c to packet.c.
2012 Nov 24
0
ssh-keyscan continuity patch --
I apologize, this patch should have been sent awhile ago. Between a lot
of things that needed to be completed at work as a sysadmin for the
Research Computing group at Purdue University and retiring from work
after 38 years at the end of May (2012), I basically ignored it. This
patch is from a clone of my workstation that I just activated at home.
The patch was primarily written to fix the
2014 Jul 16
1
ssh - Connection closed by UNKNOWN
Hi,
ssh clients shows "closed by UNKNOWN" message when a socket is closed by a
remote side while ssh is waiting for user's password:
$ ssh user at localhost
user at localhost's password:
Connection closed by UNKNOWN
When the packet_read_seqnr() calls get_remote_ipaddr(), a connection's
socket is already closed and there's not been any other call of this function
yet
2001 May 14
2
openssh-2.9p1
Hi,
1. I think you should apply the attached patch to openssh-2.9p1,
otherwise ssh-keyscan on linux boxes with glibc-2.1 will experience enormous
timeout delays.
2. Is there a program like ssh-keyscan for the Version2 (dsa and rsa) keys??
regards
Peter Breitenlohner <peb at mppmu.mpg.de>
-------------- next part --------------
diff -ur openssh-2.9p1.orig/ssh-keyscan.c
2013 Jul 10
1
connection_in and connection_out
Hi,
I'm a newbie to openssh and was trying to read the source code recently.
Could anyone tell me why in sshd the connection_in and connection_out are the same(seems to be integer 3 in my machine).
connection_in is used in process_input(readset), and connection_out is used in process_output(writeset);
But how does it work if it tries to read and write from the same file descriptor?
/Bob
2007 Jul 24
1
ssh client does not timeout if the network fails after ssh_connect but before ssh_exchange_identification, even with Alive options set
Hello,
I am testing ssh with occasional network disconnection between server and
client during these days. I found ssh sometimes hangs if the disconnection
happens after the connection is established but before
ssh_exchange_identification completes. The ssh configuration files show that
both client and server alive options are set.
In /etc/ssh/ssh_config:
# Send keepalive messages to the server.
2006 Apr 22
2
bug & patch in ServerAliveInterval (openssh 4.3-p2)
Hi openssh-unix-dev subscribers :)
I have found that ServerAliveInterval & ServerAliveCountMax have
some bug. Basically the ssh-alive check function (that verify the
peer is alive) is called only if no data at all gets into ssh (when it
should work only for server channel).I am pretty sure developers know
about this ..anyway I have tried to fix this issue. Here is the patch:
diff -rNu
2001 Oct 31
2
suggested fix for the sigchld race
comments?
alternatives: sigsetjmp(ugly) and pselect(not portable, available)
drawback: additional filedescriptors.
Index: serverloop.c
===================================================================
RCS file: /home/markus/cvs/ssh/serverloop.c,v
retrieving revision 1.82
diff -u -r1.82 serverloop.c
--- serverloop.c 10 Oct 2001 22:18:47 -0000 1.82
+++ serverloop.c 11 Oct 2001 18:06:33 -0000
@@
2000 Oct 30
1
Compatibility with 1.2.16 (commercial)?
Hi folks,
I'm currently trying to connect to version 1.2.16 of the commercial
server. The server says it supports protocol version 1.4 and that that
is incompatible with protocol version 1.5. Is that actually true? The
complete output from "ssh -v xxxxxxx" is:
$ ./ssh -v xxxxxxx
SSH Version OpenSSH_2.3.0p1, protocol versions 1.5/2.0.
Compiled with SSL (0x0090581f).
debug:
2018 Dec 10
2
[PATCH] cleanup of global variables server/client_version_string in sshconnect.c
In sshconnect.c there are two global variables for server_version_string
client_version_string.
These are used just in a few functions and can easily be passed as
parameters.
Also, there is a strange construct, where their memory is allocated to
the global pointers, then copies of these pointers are assigned to the
kex structure. The kex_free finally frees them via cleanup of the kex
2013 Aug 02
9
[Bug 2139] New: re-exec fallback problem
https://bugzilla.mindrot.org/show_bug.cgi?id=2139
Bug ID: 2139
Summary: re-exec fallback problem
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: FreeBSD
Status: NEW
Severity: minor
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
2014 Jul 18
2
[Bug 2256] New: ssh - Connection closed by UNKNOWN
https://bugzilla.mindrot.org/show_bug.cgi?id=2256
Bug ID: 2256
Summary: ssh - Connection closed by UNKNOWN
Product: Portable OpenSSH
Version: 6.6p1
Hardware: All
OS: Linux
Status: NEW
Severity: minor
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
2013 Oct 07
4
Feature request: FQDN Host match
Hello!
I'm hoping that Gmail won't HTML format this mail so that I'll get flamed :)
Anyway, my question relates to ssh_config. The problem I find is that
the Host pattern is only applied to the argument given on the command
line, as outlined in the man page:
"The host is the hostname argument given on the command line (i.e. the
name is not converted to a canonicalized host name
2007 Oct 19
2
[LLVMdev] llvm_fcmp_ord and llvm_fcmp_uno and assembly code generation
Hi,
The C backend in llc generates code like:
static inline int llvm_fcmp_ord(double X, double Y) { return X == X && Y == Y; }
static inline int llvm_fcmp_uno(double X, double Y) { return X != X || Y != Y; }
First of all it generates a warning by clang and gcc (with certain flags):
x.cbe.c:130: warning: comparing floating point with == or != is unsafe
Now, C99 provides a macro for this
2014 Jul 18
6
[Bug 2257] New: ssh - Connection closed by UNKNOWN
https://bugzilla.mindrot.org/show_bug.cgi?id=2257
Bug ID: 2257
Summary: ssh - Connection closed by UNKNOWN
Product: Portable OpenSSH
Version: 6.6p1
Hardware: All
OS: Linux
Status: NEW
Severity: minor
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
2014 Oct 24
3
[LLVMdev] IndVar widening in IndVarSimplify causing performance regression on GPU programs
Hi,
I noticed a significant performance regression (up to 40%) on some internal
CUDA benchmarks (a reduced example presented below). The root cause of this
regression seems that IndVarSimpilfy widens induction variables assuming
arithmetics on wider integer types are as cheap as those on narrower ones.
However, this assumption is wrong at least for the NVPTX64 target.
Although the NVPTX64 target
2013 Mar 01
4
[LLVMdev] NVPTX CUDA_ERROR_NO_BINARY_FOR_GPU
I'm building this with llvm-c, and accessing these intrinsics via calling
the intrinsic as if it were a function.
class F_SREG<string OpStr, NVPTXRegClass regclassOut, Intrinsic IntOp> :
NVPTXInst<(outs regclassOut:$dst), (ins),
OpStr,
[(set regclassOut:$dst, (IntOp))]>;
def INT_PTX_SREG_TID_X : F_SREG<"mov.u32 \t$dst, %tid.x;",
2001 Sep 05
2
sshd hangs on logout -- is this a bug?
In the changelog, there is an entry:
20001129
- (djm) Back out all the serverloop.c hacks. sshd will now hang again
if there are background children with open fds.
Does this mean that this is regarded as expected (and correct) behavior, that
should not change in the future, or does it mean that this behavior is a
known problem that someone will eventually fix?
--Adam
--
Adam McKenna