Displaying 20 results from an estimated 5000 matches similar to: "ControlMaster and ControlPersist leads to zombie processes"
2012 Apr 25
4
[Bug 2000] New: when using ssh with ControlMaster/ControlPersist, one may get zombie processes
https://bugzilla.mindrot.org/show_bug.cgi?id=2000
Bug #: 2000
Summary: when using ssh with ControlMaster/ControlPersist, one
may get zombie processes
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.9p1
Platform: All
OS/Version: All
Status: NEW
Severity: major
2016 Apr 28
0
[Bug 2000] when using ssh with ControlMaster/ControlPersist, one may get zombie processes
https://bugzilla.mindrot.org/show_bug.cgi?id=2000
--- Comment #10 from Christoph Anton Mitterer <calestyo at scientia.net> ---
Hmm AFAIU, when not using ControlPersist, that would simply mean that
if the last session is closed, the mux closes either, right?
This is however undesirable as well for the above use-case:
First, considers hosts where only one check runs (i.e. executed via
2016 Apr 28
0
[Bug 2000] when using ssh with ControlMaster/ControlPersist, one may get zombie processes
https://bugzilla.mindrot.org/show_bug.cgi?id=2000
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|--- |DUPLICATE
Status|REOPENED |RESOLVED
--- Comment #9 from Damien Miller <djm at
2016 Apr 27
0
[Bug 2000] when using ssh with ControlMaster/ControlPersist, one may get zombie processes
https://bugzilla.mindrot.org/show_bug.cgi?id=2000
Christoph Anton Mitterer <calestyo at scientia.net> changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|INVALID |---
Status|CLOSED |REOPENED
--- Comment #6 from Christoph Anton
2016 Apr 28
0
[Bug 2000] when using ssh with ControlMaster/ControlPersist, one may get zombie processes
https://bugzilla.mindrot.org/show_bug.cgi?id=2000
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |djm at mindrot.org
--- Comment #7 from Damien Miller <djm at mindrot.org> ---
If ControlPersist's stderr
2016 Apr 28
0
[Bug 2000] when using ssh with ControlMaster/ControlPersist, one may get zombie processes
https://bugzilla.mindrot.org/show_bug.cgi?id=2000
--- Comment #8 from Christoph Anton Mitterer <calestyo at scientia.net> ---
Uhm? Well I thought that was obvious... using SSH to remotely execute
checks seems desirable because it's a) the protocol meant for doing
this b) secure (unlike e.g. NRPE).
But without control channel muxing, it's much slower than e.g. NRPE, as
all the
2020 Oct 06
5
[Bug 3220] New: Possible bug if ControlMaster + ControlPersist and `-t`
https://bugzilla.mindrot.org/show_bug.cgi?id=3220
Bug ID: 3220
Summary: Possible bug if ControlMaster + ControlPersist and
`-t`
Product: Portable OpenSSH
Version: 8.4p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
2015 Aug 11
0
[Bug 2000] when using ssh with ControlMaster/ControlPersist, one may get zombie processes
https://bugzilla.mindrot.org/show_bug.cgi?id=2000
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |CLOSED
--- Comment #5 from Damien Miller <djm at mindrot.org> ---
Set all RESOLVED bugs to CLOSED with release
2015 Jul 03
6
[Bug 2420] New: Race condition regarding ControlPersist and ControlMaster=auto
https://bugzilla.mindrot.org/show_bug.cgi?id=2420
Bug ID: 2420
Summary: Race condition regarding ControlPersist and
ControlMaster=auto
Product: Portable OpenSSH
Version: 6.6p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: ssh
2013 Jun 06
5
[Bug 1917] Escape sequence (~) doesn't work right with ControlMaster/ControlPersist connections
https://bugzilla.mindrot.org/show_bug.cgi?id=1917
Darren Tucker <dtucker at zip.com.au> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |dtucker at zip.com.au
--- Comment #10 from Darren Tucker <dtucker at zip.com.au> ---
Created attachment
2015 Feb 21
3
[Bug 2356] New: inheritance of options not working as documented + HostName leads to recursive reparsing isn't documented
https://bugzilla.mindrot.org/show_bug.cgi?id=2356
Bug ID: 2356
Summary: inheritance of options not working as documented +
HostName leads to recursive reparsing isn't documented
Product: Portable OpenSSH
Version: 6.7p1
Hardware: All
OS: All
Status: NEW
Severity: normal
[Bug 1917] New: Escape sequence (~) doesn't work right with ControlMaster/ControlPersist connections
2011 Jul 04
10
[Bug 1917] New: Escape sequence (~) doesn't work right with ControlMaster/ControlPersist connections
https://bugzilla.mindrot.org/show_bug.cgi?id=1917
Bug #: 1917
Summary: Escape sequence (~) doesn't work right with
ControlMaster/ControlPersist connections
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.8p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
2010 Aug 31
2
[Bug 1812] New: ControlPersist causes defunct/zombie processes
https://bugzilla.mindrot.org/show_bug.cgi?id=1812
Summary: ControlPersist causes defunct/zombie processes
Product: Portable OpenSSH
Version: 5.6p1
Platform: All
URL: http://bugs.debian.org/594687
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo:
2015 May 25
3
ssh closing file descriptors for ControlPersist
Hi all,
we were discussing internally how to make openssh leave open file
descriptors that were open before main using LD_PRELOAD. Lately I filled
upstream bugzilla [1] with proposed solution, that could be acceptable
by upstream, but I'm also posting on this list to get more attention,
other points of view or ideas for this case.
I understand well, that closing FDs is important for
2011 Sep 19
2
[Bug 1938] New: EscapeChar sometimes don't work when using ControlMaster
https://bugzilla.mindrot.org/show_bug.cgi?id=1938
Bug #: 1938
Summary: EscapeChar sometimes don't work when using
ControlMaster
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.8p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
2020 Mar 14
2
ssh -f and -O ControlPersist=yes, ControlMaster=yes leaves stderr open
Hi
I'm trying to wrap ssh in an application using glib. For now, I'm launching the
ssh client in master mode and want it to detach, keeping the control socket around.
I figured I could do that using the -f flag and the usual Control* options to
force ssh to daemonize (ideally without executing any command), but it turns out
that glib doesn't recognize the daemonized process as
2005 Sep 04
2
ControlPersist and multiple X11 forwarding.
Three patches attached.
One implements a 'ControlPersist' option, which when used with
'ControlMaster auto' or 'ControlMaster 'yes' make makes the master
background itself and stick around after its own primary session is
completed.
The second causes control clients to pass X11 display, auth proto and
auth data over the control socket so that appropriate X11
2023 Aug 31
6
[Bug 3610] New: Using ControlPath and the -J option
https://bugzilla.mindrot.org/show_bug.cgi?id=3610
Bug ID: 3610
Summary: Using ControlPath and the -J option
Product: Portable OpenSSH
Version: 8.9p1
Hardware: All
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
2007 Jul 05
36
[Bug 1330] New: RFE: 'ControlPersist' support -- automatically fork and leave ControlMaster behind as a dæmon
http://bugzilla.mindrot.org/show_bug.cgi?id=1330
Summary: RFE: 'ControlPersist' support -- automatically fork and
leave ControlMaster behind as a d?mon
Product: Portable OpenSSH
Version: 4.6p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component:
2020 Jan 20
4
Security implications of using ControlMaster
Dear Mailing List
We are using a ControlMaster with a short ControlPersist to access the
bastion host which then gives access to customer hosts.
Our Information Security Manager would like to disallow the
ControlMaster. His attack scenario is an admin workstation with a
compromised root account. An attacker can then use the ControlMaster to
trivially get shell access on the bastion host