Displaying 20 results from an estimated 1000 matches similar to: "remote vs local window discrepancy"
2004 Jul 14
1
New dynamic window patch (with limits)
As before, it is described on our website. This should apply fairly
cleanly to both portable and openbsd ssh.
http://www.psc.edu/networking/hpn-ssh/
Only in openssh-3.8.1p1-dynwindow: Makefile
diff -u openssh-3.8.1p1/buffer.c openssh-3.8.1p1-dynwindow/buffer.c
--- openssh-3.8.1p1/buffer.c 2003-11-21 07:56:47.000000000 -0500
+++ openssh-3.8.1p1-dynwindow/buffer.c 2004-07-12 07:49:29.000000000
2004 Jul 07
3
DynamicWindow Patch
We have developed a patch that enables changing the SSH window size
using the tcp window size as the source. This allows SSH to obtain
maximum use of the bandwidth on high BDP links.
We also have a page that describes the changes and performance.
http://www.psc.edu/~rapier/hpn-ssh/
The patch against CVS is included here.
Common subdirectories: src/usr.bin/ssh/CVS and ssh/CVS
diff -u
2007 Nov 03
0
Yet another question on window computations
A couple of weeks ago I made an inquiry on window computation
details that has so far gone unanswered - unsurprisingly so, I now
realize, for it was way too involved. Let me try again with a
simplified version, in the hope that some nice OpenSSH developer could
please provide an answer.
What is the rationale underpinning the sending of a window adjust
packet, as implemented in channels.c? Until
2001 Feb 22
3
intermittent stderr
The command "ssh ls -l /doesnotexist" gives various responses:
Running from a 200 MHz PentiumPro with dsa key added to ssh-agent:
Mistakes worst to fast machine:
To a faster 600 MHz dual processor i686 600 MHz machine:
ls: /doesnotexist: No such file or directory -- correct
nothing at all -- wrong
ls: select: Bad file descriptor -- wrong
2004 Jul 13
1
channel->input buffer bug and patch
In our work with enabling large windows for openssh we found
1) that if a window > 0x10000 is advertised to openssh's sshd
2) the sshd tries to send more than 0x10000 bytes of data
3) the receiver does not consume them
4) the input buffer will grow larger than the size allowed by buffer.c
and fatal().
We believe the correct behavior is to limit reading into the channel
input buffer to
2007 Oct 18
0
Window computation
I am trying to make sense of the way in which OpenSSH computes
window size, so far without much success :-(
My understanding is that when a client specifies a window size N at
the beginning of a session, it is letting the server know that it (the
server) can send, on a given channel, up to N bytes worth of data that
consumes window space (essentially the payload of SSH_MSG_CHANNEL_DATA
and one
2001 Nov 09
4
keystroke timing attack
I'm reading this fine article on O'Reilly:
http://linux.oreillynet.com/lpt/a//linux/2001/11/08/ssh_keystroke.html
<quote>
The paper concludes that the keystroke timing data observable from
today's SSH implementations reveals a dangerously significant amount of
information about user terminal sessions--enough to locate typed
passwords in the session data stream and reduce the
2007 Nov 13
1
Help with openssh: ssh application writing data > 131071 to socket causing message too long error
Hi,
I am facing an issue with openssh-4.5p1. I am not sure whether its an
openssh issue or a tcp stack issue since I am using a simulated tcp/ip
stack.
While copying a file of around 1GB using sftp/scp I am getting a
send:Message too long error.
I did a bit of debugging and found that ssh code was sending packet of
size greater than 131072 bytes from the application level to the
socket and
2001 Oct 16
1
Defeating Timing Attacks Patch for OpenSSH 2.9.9p2 and 2.9p2
Hello,
In response to the timing analysis attacks presented by Dawn Song et.
al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html
we
at Silicon Defense developed a patch for openssh to avoid such
measures.
Timing Analysis Evasion changes were developed by C. Jason Coit and Roel
Jonkman of Silicon Defense.
These changes cause SSH to send packets unless request not to,
2003 Dec 16
1
[Bug 773] OpenSSH hangs or silently exits on write failure on stdout/stderr
http://bugzilla.mindrot.org/show_bug.cgi?id=773
Summary: OpenSSH hangs or silently exits on write failure on
stdout/stderr
Product: Portable OpenSSH
Version: -current
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: openssh-bugs
2004 Jan 15
3
[Bug 790] Connection stall when client output fails and server has a lot more to send
http://bugzilla.mindrot.org/show_bug.cgi?id=790
Summary: Connection stall when client output fails and server has
a lot more to send
Product: Portable OpenSSH
Version: 3.7.1p1
Platform: All
OS/Version: FreeBSD
Status: NEW
Severity: normal
Priority: P3
Component: ssh
AssignedTo:
2005 Feb 24
7
Question performnace of SSH v1 vs SSH v2
Hello
I have ported OpenSSH 3.8p1 to a LynxOS platform. Recently I heard a
report from the field that v2 is perceived to be significantly slower
than v1. Is this a known issue? Are there any configuration parameters
that can be modified to make v2 faster?
Thanks in advance for your response
Amba
2001 Oct 06
1
Defeating Timing Attacks
Hello,
In response to the timing analysis attacks presented by Dawn Song et.
al. in her paper http://paris.cs.berkeley.edu/~dawnsong/ssh-timing.html
we
at Silicon Defense developed a patch for openssh to avoid such
measures.
Timing Analysis Evasion changes were developed by C. Jason Coit and Roel
Jonkman of Silicon Defense.
These changes cause SSH to send packets unless request not to,
2007 Jul 26
1
Channel Handling Patch
The current code for channel.c creates an array of Channel structs
(initially set to NULL) which is then iterated through, in full, every
time a channel needs to be dealt with. If only one channel is in use,
which is relatively common, the code still loops through the entire array.
This patch creates a linked list of pointers to these structs and the
code steps through the linked list. Since
2020 Oct 14
2
Connection hang, can't stop SSH
Using OpenSSH_8.3p1 I had an open (working) connection to some other
box; after a bit of inactivity, some device in the middle seems to have
forgotten about the TCP connection (NAT) and broke it.
I've got an EscapeChar defined, though; so first I tried to send a BREAK
and, when that didn't help (TCP already gone, packets get lost!), I
tried (just out of curiosity) a Rekey.
Now I can see
2022 Nov 27
2
[Bug 3505] New: SSH_MSG_CHANNEL_WINDOW_ADJUST bottleneck
https://bugzilla.mindrot.org/show_bug.cgi?id=3505
Bug ID: 3505
Summary: SSH_MSG_CHANNEL_WINDOW_ADJUST bottleneck
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: All
Status: NEW
Severity: normal
Priority: P5
Component: Miscellaneous
Assignee: unassigned-bugs at
2008 Aug 04
1
Hanging ssh sessions with openssh-5.1p1 and Solaris 8 & 10
Since we upgraded OpenSSH from 5.0p1 to 5.1p1 on our Solaris 8 boxes
(I know, I know, we should upgrade or retire them...), we've started
experiencing problems with slogin'ing into these boxes, running vi,
and pasting text into the vi session.
As long as we are pasting in less that 1024 characters it's fine.
With >= 1024 characters, the session hangs.
If you run
2006 Jan 14
2
CentOS 4.2 x86_64
I have a couple of 64-Bit Xeon's with CentOS 4.2 x86_64 installed on
them. They don't all have the same motherboards.
I've having a difficult time getting CentOS 4.2 x86_64 to boot on some
of them in SMP mode (UP works fine). After the installation of CD, it
boots up but kernel panics with the following error:
Badness in i8042_panic_blink at drivers/input/serio/i8042.c:992
This is
2023 Nov 08
2
Delay in starting programs on FreeBSD via ssh after upgrade OpenBSD from 7.3 to 7.4
On Wed, 8 Nov 2023, Roger Marsh wrote:
> Damien,
>
> Sorry about distributed context.
>
> Those discussions told me about the new ObscureKeystrokeTiming
> argument to the ssh command. One reply suggested I try that because it
> is easy to test.
>
> Most of my xterm ssh command combinations in fvwm configuration file
> are expressed 'Exec exec xterm -title ... -e
2001 Nov 20
3
problem with AFS token forwarding
Hello,
I came across an interoperability problem in OpenSSH 3.0p1 and 3.0.1p1
concerning the AFS token forwarding. That means that the new versions are
not able to exchange AFS tokens (and Kerberos TGTs) with older OpenSSH
releases (including 2.9p2) and with the old SSH 1.2.2x. In my opinion this
problem already existed in Openssh 2.9.9p1, but I have never used this
version (I only looked at the