Displaying 20 results from an estimated 120 matches similar to: "[PATCH] mux: fix memory leak of control path if bind() fails"
2012 May 03
5
[PATCH/RFC 0/6] New mux client request to list open tcp forwardings.
These patches implement a new mux client request to list the currently opened
TCP forwardings. It also removes some todos regarding keeping the list
of forwardings in the options up-to-date.
Bert Wesarg (6):
attach the forwarding type to struct Forward
merge local and remote forward lists
generate unique ids for forwardings to be used for identification
remove closed forwardings from
2010 Jan 14
1
ssh(1) multiplexing rewrite
Hi,
At the n2k10 OpenBSD network hackathon, I finally got some time to clean
up and rewrite the ssh(1) client multiplexing code. The attached diffs
(one for portable OpenSSH, one for OpenBSD) are the result, and they
need some testing.
The revised multiplexing code uses a better protocol between the master
and slave processes and I even bothered to write it up :) It tracks the
control sockets
2008 Dec 04
0
[patch] muxserver_listen() doesn't restore umask when bind fails
Cheers,
- Salva
$ diff -c mux.c~ mux.c
*** mux.c~ 2008-06-14 01:01:54.000000000 +0200
--- mux.c 2008-12-04 12:24:45.000000000 +0100
***************
*** 148,153 ****
--- 148,154 ----
error("ControlSocket %s already exists, "
"disabling multiplexing", options.control_path);
close(muxserver_sock);
+ umask(old_umask);
2009 Feb 18
1
ssh -f & pid
Hi,
Ssh -f forks itself in the background. Very usefull if you would like to
e.g. tunnel munin over ssh. Now it's tricky to terminate one process if
you have multiple running.
It seems that ssh currently (looked at 5.1p1) has no write-pid-to-file
functionality
So I implemented a patch which do so. Tested it a little and it seems to
work. Hopefully it is of any use in my form or inspires the
2007 Jul 05
14
[Bug 1329] New: stale control sockets prevent connection.
http://bugzilla.mindrot.org/show_bug.cgi?id=1329
Summary: stale control sockets prevent connection.
Product: Portable OpenSSH
Version: 4.6p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: bitbucket at mindrot.org
ReportedBy: dwmw2 at
2007 Jun 22
3
[Bug 1208] ssh fails to remove control socket when ssh is abnormally terminated
http://bugzilla.mindrot.org/show_bug.cgi?id=1208
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |ASSIGNED
AssignedTo|bitbucket at mindrot.org |djm at mindrot.org
--- Comment #17 from Damien
2020 Mar 14
2
ssh -f and -O ControlPersist=yes, ControlMaster=yes leaves stderr open
Hi
I'm trying to wrap ssh in an application using glib. For now, I'm launching the
ssh client in master mode and want it to detach, keeping the control socket around.
I figured I could do that using the -f flag and the usual Control* options to
force ssh to daemonize (ideally without executing any command), but it turns out
that glib doesn't recognize the daemonized process as
2007 Jul 21
2
tincctl patches
(Second try to send this. I wonder if the first one gotten eaten by a
spam filter; I'll link to patches instead of attaching them.)
Here are the tincctl patches I've been working on. They apply to
http://www.tinc-vpn.org/svn/tinc/branches/1.1@1545. I intend to commit
them once the crypto stuff's fixed. Since they're basically done, I'm
emailing them now for review and in case
2011 Mar 28
15
[Bug 1883] New: use setproctitle for persistent mux master
https://bugzilla.mindrot.org/show_bug.cgi?id=1883
Summary: use setproctitle for persistent mux master
Product: Portable OpenSSH
Version: 5.8p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy:
2016 Aug 22
5
[Bug 2607] New: accept location off ssh binary via environment variable or deduce it from /proc/
https://bugzilla.mindrot.org/show_bug.cgi?id=2607
Bug ID: 2607
Summary: accept location off ssh binary via environment
variable or deduce it from /proc/
Product: Portable OpenSSH
Version: 7.3p1
Hardware: All
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
2017 Feb 17
3
[Bug 2679] New: ssh mux process (and maybe others) should perhaps cd /
https://bugzilla.mindrot.org/show_bug.cgi?id=2679
Bug ID: 2679
Summary: ssh mux process (and maybe others) should perhaps cd /
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
Assignee:
2010 Sep 04
4
[Bug 1815] New: RemoteCommand and PseudoTTY config options
https://bugzilla.mindrot.org/show_bug.cgi?id=1815
Summary: RemoteCommand and PseudoTTY config options
Product: Portable OpenSSH
Version: 5.1p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy:
2011 Feb 07
1
[PATCH] ssh: set proctitle for mux master
Preserving the command line from the invoking ssh command doesn't
make much sense, so use setproctitle() to hide the arguments.
---
ssh.c | 20 +++++++++++++++++---
1 files changed, 17 insertions(+), 3 deletions(-)
diff --git a/ssh.c b/ssh.c
index d32ef78..8ebcc88 100644
--- a/ssh.c
+++ b/ssh.c
@@ -230,12 +230,25 @@ main(int ac, char **av)
struct servent *sp;
Forward fwd;
- /* Ensure
2010 Aug 23
3
Announce: OpenSSH 5.6 released
OpenSSH 5.6 has just been released. It will be available from the
mirrors listed at http://www.openssh.com/ shortly.
OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0
implementation and includes sftp client and server support.
Once again, we would like to thank the OpenSSH community for their
continued support of the project, especially those who contributed
code or patches,
2015 Mar 14
3
[Bug 2365] New: openssh client ignores -o Tunnel=ethernet option, creating an IP tunnel device instead of an ethernet tap device
https://bugzilla.mindrot.org/show_bug.cgi?id=2365
Bug ID: 2365
Summary: openssh client ignores -o Tunnel=ethernet option,
creating an IP tunnel device instead of an ethernet
tap device
Product: Portable OpenSSH
Version: 6.6p1
Hardware: amd64
OS: Linux
Status: NEW
2012 May 31
1
ControlMaster, scp and current working directory
Hi,
It seems there is a problem regarding ControlMaster and scp'ing a file
depending on the current working directory:
$ cd ~/Personnel
$ scp -o ControlMaster=yes cox.jpg host.local:
muxserver_listen bind(): No such file or directory
lost connection
$ scp -o ControlMaster=no cox.jpg host.local:
cox.jpg 100% 222KB 222.1KB/s 00:00
$ cd
$ scp -o
2016 Jul 22
2
SSH crash on OpenBSD (pledge related?)
Hello,
I just ran upon this problem and couldn't find it in bugzilla.
SSH crashes (abort trap) if all of the following conditions are met:
(a) option -f is used (crash happens when going to background),
(b) reverse port forwarding is set up (option -R),
(c) option ExitOnForwardFailure is enabled,
(d) there are no actual port-forwarding failures.
The problem can be reproduced by
2019 Jun 27
2
Does ssh need sendfd in pledge() call?
Hi,
I posted this question to the OpenBSD bugs list last week, however
I have had no reply and it was suggested on IRC that I post here
instead. So I must apologise if this is not appropriate.
For a reference here is my previous post:
https://marc.info/?l=openbsd-bugs&m=156080681530337&w=2
I am running OpenBSD 6.5-stable (also tested on -current). When I
ssh somewhere I get a sig abort
2011 Jan 31
1
[PATCH] fix copy'n'paste error in PROTOCOL.mux
---
PROTOCOL.mux | 2 +-
1 files changed, 1 insertions(+), 1 deletions(-)
diff --git a/PROTOCOL.mux b/PROTOCOL.mux
index 3d6f818..88f95b3 100644
--- a/PROTOCOL.mux
+++ b/PROTOCOL.mux
@@ -122,7 +122,7 @@ For dynamically allocated listen port the server replies with
Note: currently unimplemented (server will always reply with MUX_S_FAILURE).
-A client may request the master to establish a
2011 May 06
1
[PATCH/trivial] Fix numbering in PROTOCOL.mux
diff --git i/PROTOCOL.mux w/PROTOCOL.mux
index 05bb146..b53af19 100644 PROTOCOL.mux
--- i/PROTOCOL.mux
+++ w/PROTOCOL.mux
@@ -180,7 +180,7 @@ The MUX_S_PERMISSION_DENIED and MUX_S_FAILURE
include a reason:
uint32 client request id
string reason
-9. Protocol numbers
+10. Protocol numbers
#define MUX_MSG_HELLO 0x00000001
#define MUX_C_NEW_SESSION 0x10000002