Displaying 20 results from an estimated 700 matches similar to: "sshd's -e doesn't work as expected"
2002 Mar 26
1
Two patches for OpenSSH 3.1p1
Please find enclosed two patches for OpenSSH 3.1p1.
The first patch solves a problem where sessions will be left "hanging"
when you normally exit from a ssh shell (for example by logging out from
the remote host via "exit" or "logout"). The problem seems to be that sshd
(and some other parts of OpenSSH) doesn't check the return code and errno
from waitpid() for
2001 Jan 04
2
Patch to allow openssh-2.2.0-p1 to be started from /etc/inittab
The following patch allows OpenSSH 2.2.0-p1 to be started (and managed)
from /etc/inittab (by "init") on systems which support that. This is
useful when you *really* want SSHD to always run since it will be
automatically restarted by "init" if it dies (and if "init" dies the
the systems dies :-).
I use a line (in /etc/inittab) like this on Solaris systems:
2002 Nov 05
2
[Bug 414] sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
http://bugzilla.mindrot.org/show_bug.cgi?id=414
------- Additional Comments From markus at openbsd.org 2002-11-06 07:01 -------
Created an attachment (id=164)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=164&action=view)
proposed patch
what about this? (more in line with the rest of the code).
------- You are receiving this mail because: -------
You are the assignee for the
2002 Dec 18
2
patch for openssh3.5p1 - adds logging option
this patch adds a LogFile option to sshd_config. it just logs messages
directly to a file instead of stderr or syslog. the largest change
is an additional argument to log_init() in log.c for the log file name
(and then changes to the rest of the tools to add a NULL arg).
galt
-------------- next part --------------
diff -urN openssh-3.5p1-orig/log.c openssh-3.5p1/log.c
---
2002 Oct 15
0
[Bug 414] New: sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
http://bugzilla.mindrot.org/show_bug.cgi?id=414
Summary: sshd initially ignores -e (log_stderr) if -i
(inetd_flag) is given
Product: Portable OpenSSH
Version: -current
Platform: All
URL: http://marc.theaimsgroup.com/?l=openssh-unix-
dev&m=102469253706346&w=2
OS/Version: Linux
2002 Jun 21
0
sshd initially ignores -e (log_stderr) if -i (inetd_flag) is given
A non-text attachment was scrubbed...
Name: sshd-stderr.patch
Type: text/x-patch
Size: 424 bytes
Desc: make sshd honor -e even with -i
Url : http://lists.mindrot.org/pipermail/openssh-unix-dev/attachments/20020621/b29eef76/attachment.bin
2016 Nov 21
42
[Bug 2641] New: Add systemd notify code to to track running server
https://bugzilla.mindrot.org/show_bug.cgi?id=2641
Bug ID: 2641
Summary: Add systemd notify code to to track running server
Product: Portable OpenSSH
Version: 7.3p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee:
2004 Apr 12
1
Regarding SSH_ASKPASS
I've been giving SSH_ASKPASS a hard look, and it's not clear to
me how it's supposed to work. The documentation (ssh.1) seems
explicit enough:
SSH_ASKPASS
If ssh needs a passphrase, it will read the passphrase from the
current terminal if it was run from a terminal. If ssh does not
have a terminal associated with it but DISPLAY and SSH_ASKPASS
are set, it will execute
2017 Oct 09
5
Why dup()?
Hello all,
My scripts, which read stdout from ssh, weren't seeing EOF from the
remote session.? It was being sent, but lost.? I tracked it down to the
following code, in ssh.c, at ssh_session2_open:
??????? if (stdin_null_flag) {
??????????????? in = open(_PATH_DEVNULL, O_RDONLY);
??????? } else {
??????????????? in = dup(STDIN_FILENO);
??????? }
??????? out = dup(STDOUT_FILENO);
1999 Nov 22
3
status of openssh for solaris?
In message <19991122110826.A23851 at wdawson-sun.sbs.siemens.com>, Willard Dawson
writes:
>I just tried to compile, this time with openssh-1.2pre14, openssl-0.9.4
>and egd-0.6. I get considerably further along, but still not completely
>compiled. Here are the last bits:
>
>gcc -g -O2 -Wall -I/usr/local/ssl/include -DETCDIR=\"/usr/local/etc\" -DSSH_PR
2018 Apr 27
4
[PATCH] allow indefinite ForwardX11Timeout by setting it to 0
This change allows use of untrusted X11 forwarding (which is more
secure) without
requiring users to choose a finite timeout after which to refuse new
connections.
This matches the semantics of the X11 security extension itself, which
also treat a
validity timeout of 0 on an authentication cookie as indefinite.
Signed-off-by: Trixie Able <table at inventati.org>
---
clientloop.c | 12
2006 Jan 03
2
Bug ? on ssh-agent
Hi,
I fell on this using openssh on cygwin. Though it may be a cygwin
related issue, I think it's may be a bug on the main openssh tree. Thus
my posting here. I'm CC'ing to the public list for information.
The part of code I'm refering to is :
/* XXX might close listen socket */
(void)dup2(fd, STDIN_FILENO);
(void)dup2(fd, STDOUT_FILENO);
2002 Mar 12
2
sys/queue.h
removes HAVE_BOGUS_SYS_QUEUE_H and always use our queue.h. ok?
Index: acconfig.h
===================================================================
RCS file: /var/cvs/openssh/acconfig.h,v
retrieving revision 1.122
diff -u -r1.122 acconfig.h
--- acconfig.h 26 Feb 2002 16:40:49 -0000 1.122
+++ acconfig.h 12 Mar 2002 02:11:39 -0000
@@ -14,7 +14,6 @@
/* SCO workaround */
#undef
2004 Feb 20
1
NGROUPS_MAX on Linux
Linux has just raised the NGROUPS_MAX limit from 32 to 64k. In doing an
audit of various tools, openssh turned up as having incorrect groups
handling. Almost no user-space apps really care about NGROUPS_MAX.
A proposed patch (untested, since the CVS build won't compile on my RH box..
:-/) :
What think?
Index: uidswap.c
===================================================================
1999 Nov 23
2
Fixes for Solaris
Attached is a small patch that should fix most of the problems
reported.
I am adding a recommendation to use GNU make to the INSTALL
document.
Regards,
Damien
--
| "Bombay is 250ms from New York in the new world order" - Alan Cox
| Damien Miller - http://www.mindrot.org/
| Email: djm at mindrot.org (home) -or- djm at ibs.com.au (work)
-------------- next part --------------
Index:
2002 Feb 04
1
forkoff()
Please review the function below, forkoff(), meant to be used in
clientloop.c instead of daemon() and the code in process_escapes().
The intention is to make ~D ( like ~& but also detach) possible and to
make it possible for ssh -f (or ssh -f -f - see other thread on this)
to detach, not just forkoff().
I also intend to use the same detach technique in a feature patch for
the hang-on-exit
2002 Feb 28
0
[Bug 131] New: Problems with sshd's compiled in default PATH.
http://bugzilla.mindrot.org/show_bug.cgi?id=131
Summary: Problems with sshd's compiled in default PATH.
Product: Portable OpenSSH
Version: 3.0.2p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: enhancement
Priority: P2
Component: Build system
AssignedTo: openssh-unix-dev at mindrot.org
2007 Mar 05
0
[Bug 1293] sshd's -r option undocumented
http://bugzilla.mindrot.org/show_bug.cgi?id=1293
Summary: sshd's -r option undocumented
Product: Portable OpenSSH
Version: 4.5p1
Platform: Other
OS/Version: All
Status: NEW
Severity: minor
Priority: P2
Component: Documentation
AssignedTo: bitbucket at mindrot.org
ReportedBy:
2003 Mar 03
1
vorbis patch for latest code
Here are files that need to be modified for win32 systems to compile with
the latest changes (ov_crosslap, vorbis_window) by xiphmont:
Index: include/vorbis/codec.h
===================================================================
RCS file: /usr/local/cvsroot/vorbis/include/vorbis/codec.h,v
retrieving revision 1.42
diff -r1.42 codec.h
211a212
> extern float* vorbis_window(vorbis_dsp_state
2000 Dec 28
1
Error in sshd's manpage
Hi,
I just confirmed this bug for openssh 2.2.0p1. Could you please fix this
upstream? Thanks.
> The manpage for sshd lists the option 'PrintLastLogin' as being enabled by
> default, but in fact the option is called 'PrintLastLog'. I encountered
> this problem when upgrading, after customizing my sshd_config file, and not
> accepting the Debian version upon upgrade