Displaying 20 results from an estimated 1000 matches similar to: "SSHD_PROBLEM"
2008 Sep 15
0
No subject
hello..
i am running openssh-3.7.1p2. on linux.It is working successfully..and daemon is running &client also connecting.But the problem is with the mips architecture when i connecting this server from remote syytem.?i got an error of buufer_get:trying to get more bytes 1 than buffer0.And client is not connecting from remote system.My out is as follows on my server
?in sshd main
before
2012 Oct 22
1
[PATCH] Implement remote dynamic TCP forwarding
Hi all,
This is a client side only implementation of reversed dynamic (SOCKS) TCP
forwarding, which means it is compatible with any existing servers
have 'remote forward' capability.
To establish such forward, use "ssh -R [BIND_ADDRESS:]PORT ...".
The server will listen on that port and address and accept SOCKS
traffics.
Hope this will be useful for you.
There was an
2008 Jul 01
1
[PATCH] SOCKS4A support
This provides SOCKS4A support, which allows a SOCKS4 client to provide a
host name instead of an IP address. It indicates that it's doing so by
using a known-invalid IP address 0.0.0.x (where x != 0), and then
appending the NUL-terminated hostname to the connection request.
Although we check for the terminating NUL manually and the
'fatal(len %d > have %d)' should never happen, the
2011 Jun 02
2
preauth privsep logging via monitor
Hi,
This diff (for portable) makes the chrooted preauth privsep process
log via the monitor using a shared socketpair. It removes the need
for /dev/log inside /var/empty and makes mandatory sandboxing of the
privsep child easier down the road (no more socket() syscall required).
Please test.
-d
Index: log.c
===================================================================
RCS file:
2003 Oct 08
4
OS/390 openssh
Hello Steve, Hello OpenSSH-portable developers,
I am building OpenSSH for our (EBCDIC-based) BS2000 mainframe
operating system, and I noticed you do the same for OS/390.
Because my initial ssh port was based on IBM's OSS port (ssh-1.2.2
or some such), I thought it was fair enough to help with a little
co-operation; we might come up with a unified EBCDIC patch which could
be contributed to
2007 Jul 26
1
Channel Handling Patch
The current code for channel.c creates an array of Channel structs
(initially set to NULL) which is then iterated through, in full, every
time a channel needs to be dealt with. If only one channel is in use,
which is relatively common, the code still loops through the entire array.
This patch creates a linked list of pointers to these structs and the
code steps through the linked list. Since
2003 Jun 25
1
socks5 support for -D
here's an up-to-date patch, should apply to both
openbsd and non-openbsd versions of openssh.
i did only test ipv4 addresses.
Index: channels.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/channels.c,v
retrieving revision 1.191
diff -u -r1.191 channels.c
--- channels.c 24 Jun 2003 08:23:46 -0000 1.191
+++ channels.c 25 Jun 2003 12:14:19
2010 Jan 14
1
ssh(1) multiplexing rewrite
Hi,
At the n2k10 OpenBSD network hackathon, I finally got some time to clean
up and rewrite the ssh(1) client multiplexing code. The attached diffs
(one for portable OpenSSH, one for OpenBSD) are the result, and they
need some testing.
The revised multiplexing code uses a better protocol between the master
and slave processes and I even bothered to write it up :) It tracks the
control sockets
2005 May 19
1
ssh-keygen private keys export - new feature
Hello,
I had some difficulties in order to convert private keys between different
implementations of SSH.
So, I wrote the following patch to allow export of SSH2 RSA and DSA private
keys into IETF SECSH format.
Note that I also slightly revised the IETF SECSH key import code.
Usage: use of the "-e" option on a private key file generates an unencrypted
private key file in IETF SECSH
2001 Oct 17
3
Bug when flushing data in openssh 2.9
Hi!
I am use SuSe 7.2 x86 and openssh-2.9p1-7.rpm
I got a problem using bitkeeper on my laptop where bitkeeper
reported an I/O error while reading data from 'ssh'.
After much debugging, and some help from the bitkeeper people, I found
out that that clientloop.c doesn't handle interrupts gracefully.
(It died when it got an EAGAIN error when writing to the application)
After applying
2007 Nov 13
1
Help with openssh: ssh application writing data > 131071 to socket causing message too long error
Hi,
I am facing an issue with openssh-4.5p1. I am not sure whether its an
openssh issue or a tcp stack issue since I am using a simulated tcp/ip
stack.
While copying a file of around 1GB using sftp/scp I am getting a
send:Message too long error.
I did a bit of debugging and found that ssh code was sending packet of
size greater than 131072 bytes from the application level to the
socket and
2002 May 10
1
Patch for SOCKS4A in OpenSsh
I love SSH's ability to dynamically forward ports using SOCKS (either -D or
DynamicForward) (ie "ssh -D 1081 private.mine.net"). But the thing that has
caused me some pain, is that only SOCKS4 is supported. The SOCKS4 proxy
specification does not permit hostnames, but only IP addresses. This isn't
much of a problem if the target host is a public Internet host or otherwise
DNS
2006 Feb 16
2
PAM and passwd age warnings again.
Hi all,
This is a patch against 4.2p1 (compiling for a Linux --- an old, highly
customized 7.2 to be specific). When I compiled it from your original
source, installed it, and turned on PAM (for passwd aging), I couldn't
get the passwd expiration warnings as specified in /etc/shadow to work
at all (the message that is supposed to warn you as you're logging in
that your passwd will expire
2001 Oct 24
2
disable features
this (uncomplete) patch makes various features compile time
options and saves up to 24K in the resulting
ssh/sshd binaries. i don't know whether this
should be added to the CVS since it makes
the code less readable.
perhaps WITH_COMPRESSION should be added, since
it removes the dependency on libz
-m
Index: Makefile.inc
===================================================================
RCS
2014 Mar 03
6
[Bug 2207] New: Potential NULL deference, found using coverity
https://bugzilla.mindrot.org/show_bug.cgi?id=2207
Bug ID: 2207
Summary: Potential NULL deference, found using coverity
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: FreeBSD
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee:
2000 Apr 26
1
http://marc.theaimsgroup.com/?l=openssh-unix-dev&m=95669367427640&w=2 (fwd)
--
| "Bombay is 250ms from New York in the new world order" - Alan Cox
| Damien Miller - http://www.mindrot.org/
| Email: djm at mindrot.org (home) -or- djm at ibs.com.au (work)
---------- Forwarded message ----------
Date: Tue, 25 Apr 2000 19:55:56 -0600 (MDT)
From: Theo de Raadt <deraadt at cvs.openbsd.org>
To: djm at cvs.openbsd.org, markus at cvs.openbsd.org, provos at
2001 Jun 20
1
SFTP Logging Redux.
Sorry to repost, but I finally have the code on a machine that has
diff -u, and I've updated it for 2.9p2. Attached is the unified
diff to add logging of SFTP activity to auth.info.
If there is a more proper way to contrib patches, please let me
know.
Cheers,
Jason
# "Jason A. Dour" <jason at dour.org> http://dour.org/
# Founder / Executive Producer - PJ
2013 Sep 24
9
[PATCH] curve25519-sha256@libssh.org key exchange proposal
Dear OpenSSH developers,
I've worked this week on an alternative key exchange mechanism, in
reaction to the whole NSA leaks and claims over cryptographic backdoors
and/or cracking advances. The key exchange is in my opinion the most
critical defense against passive eavesdropping attacks.
I believe Curve25519 from DJB can give users a secure alternative to
classical Diffie-Hellman (with fixed
2012 Jan 28
1
PATCH: Support for encrypted host keys
Hello all,
I recently found myself wanting to run sshd with passphrase-protected host keys rather than the usual unencrypted format, and was somewhat surprised to discover that sshd did not support this. I'm not sure if there's any particular reason for that, but I've developed the below patch (relative to current CVS at time of writing) that implements this. It prompts for the
2005 Feb 11
0
[Bug 896] Inproper Input buffer handleing
http://bugzilla.mindrot.org/show_bug.cgi?id=896
------- Additional Comments From dtucker at zip.com.au 2005-02-11 12:05 -------
Created an attachment (id=817)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=817&action=view)
Hack client to reproduce problem in sshd.
After some discussion off-line with Chris Rapier, I am able to reproduce the
problem by in the server with a hacked