Displaying 20 results from an estimated 200 matches similar to: "ssh-keyscan continuity patch --"
2001 Jul 27
0
Updated ssh-keyscan patch for ssh2 support
In the past 2 months another change occurred in the CVS code that
broke my ssh-keyscan patch. Here's an updated version that tweaks the
changed name (in the Kex struct) and also causes an attempt to grab an
ssh2 key from an older server (without ssh2 support) to fail earlier
and without an error message (Stuart Pearlman emailed me some code for
this).
This patch is based on the BSD CVS
2017 Jun 29
5
[Bug 2734] New: close() is called twice in confree()
https://bugzilla.mindrot.org/show_bug.cgi?id=2734
Bug ID: 2734
Summary: close() is called twice in confree()
Product: Portable OpenSSH
Version: 7.5p1
Hardware: Other
OS: Other
Status: NEW
Severity: minor
Priority: P5
Component: ssh-keyscan
Assignee: unassigned-bugs at
2001 May 14
2
openssh-2.9p1
Hi,
1. I think you should apply the attached patch to openssh-2.9p1,
otherwise ssh-keyscan on linux boxes with glibc-2.1 will experience enormous
timeout delays.
2. Is there a program like ssh-keyscan for the Version2 (dsa and rsa) keys??
regards
Peter Breitenlohner <peb at mppmu.mpg.de>
-------------- next part --------------
diff -ur openssh-2.9p1.orig/ssh-keyscan.c
2002 Mar 21
2
bug in ssh-keyscan.c --
=====
Ladies/Gents,
"ssh-keyscan.c" can't be linked statically against "libssh.a". You end
up with `fatal()' being doubly defined.
The patch below deletes the new "ssh-keyscan.c:fatal()" function and
and restores the "ssh-keyscan.c:fatal_callback()" function with modifi-
cations. The problem that both attempt to alleviate is the setting of
the
2010 Mar 06
1
ssh-keyscan bug (not really exploitable)
ssh-keyscan may, under very specific circumstances, be vulnerable to
something akin to a buffer overflow. It's probably impossible to
exploit, though, if only because ssh-keyscan is not usually run on very
large untrusted input files.
ssh-keyscan uses an fgets() wrapper that uses an unsigned int to keep
track of the length of a buffer holding the current line. On machines
with sufficient
2002 Jan 22
2
ssh-keyscan: xmalloc out of memory error
hi all,
I got "xmalloc: out of memory" when i used
ssh-keyscan to a remote host that is using
SSH protocol 2 and only protocol 2 (no fallback
to SSH protocol 1).
Looks to me more like ssh-keyscan doesn't talk
SSH protocol 2 to the server.
Please help.
Here is the exact error:
# /usr/local/bin/ssh-keyscan -v miad_1
# miad_1 SSH-2.0-OpenSSH_3.0.2p1
xmalloc: out of memory
2006 Mar 03
3
Using DTrace to locate memory leak
Howdy,
I am attempting to isolate the location of a memory leak in a 4GL program,
and have hit a bit of a snag. When I LD_PRELOAD libumem and run the
application server, "::findleaks -fdv" reports numerous leaks:
CACHE LEAKED BUFCTL CALLER
0000000100b49068 15 0000000100ef2d50 fdcon+0x6c4
0000000100b50028 1 0000000100b72ac0 fdcon+0x6c4
0000000100b49068
2024 Apr 25
1
[PATCH] Enable ssh_config to set LogPath option (-E)
ssh client has the ability to set the destination of debug logs via the `-E` flag. ssh_config lacks an equivalent keyword to set the same option via configs.
This patch follows the same semantics of other `*Path` type keywords and creates a new ssh_config keyword `LogPath`.
[0] Bugzilla: https://bugzilla.mindrot.org/show_bug.cgi?id=3683
[1] GitHub PR:
2007 Mar 14
1
sshd gets stuck: select() in packet_read_seqnr waits indefinitely
Dear OpenSSH Portable sshd developers,
I'm having a problem where sshd login sessions are occasionally
(as often as once a day) getting stuck indefinitely. I enabled debug
messages and got a backtrace of a stuck sshd, and I think I've found
the bug. I wanted to run it by the list once before filing.
sshd version:
OpenSSH_4.2p1 FreeBSD-20050903, OpenSSL 0.9.7e-p1 25 Oct 2004
2012 Sep 09
2
Patch for ssh-keygen to allow conversion of public key to openssh format
Hi,
I needed to convert a public RSA key to autorized_keys format and found
ssh-keygen lacking this feature.
I made the option -Q publicfile to allow an conversion like
ssh-keygen -Q pubrsa.pem -y
The patch is produced using unified diff and made on latest release.
If you like it and can make a patch for the man-page also!
Regards,
/Lars
-------------- next part --------------
diff -u
2013 Jan 31
2
OpenSSH NoPty patch
Hey everyone,
I wanted to add support for denying PTY allocation through OpenSSH. I'm
not certain if this is quite thorough enough for all cases, but for me
it might work for the moment.
I know that you can currently do this through authorized_keys, but as
far as I know that only works for an actual key. In my use case, I
wanted a user with no password which is forced to run a specific
2013 Jun 04
7
[Bug 2116] New: SSH to Nortel/Avaya switch fails
https://bugzilla.mindrot.org/show_bug.cgi?id=2116
Bug ID: 2116
Summary: SSH to Nortel/Avaya switch fails
Product: Portable OpenSSH
Version: 6.2p1
Hardware: All
OS: All
Status: NEW
Severity: major
Priority: P5
Component: ssh
Assignee: unassigned-bugs at mindrot.org
2013 Jan 08
0
[PATCH] avoid undefined behavior in fmt_scaled()
fmt_scaled() computes the absolute value of its argument, and returns an
error if the result is still negative (i.e., when the value is LLONG_MIN).
However, taking the negative of LLONG_MIN is undefined behavior in C, and
some compilers (e.g., gcc-4.7.2) will optimize away the 'abval < 0' check
as being always false (since it can only be true with undefined behavior).
The patch
2013 Feb 24
0
scp progress bar: wrong truncation of long multibyte file names
Hi.
I have:
[fva at localhost ~]$ rpm -qi openssh-clients
Name : openssh-clients
Version : 6.1p1
Release : 5.fc18
Architecture: x86_64
Install Date: ??. 13 ????. 2013 16:15:25
Group : Applications/Internet
Size : 1331287
License : BSD
Signature : RSA/SHA256, ??. 09 ????. 2013 01:34:32, Key ID ff01125cde7f38bd
Source RPM : openssh-6.1p1-5.fc18.src.rpm
Build Date
2012 Dec 03
3
[Bug 1213] ssh-keyscan exits in mid-way
https://bugzilla.mindrot.org/show_bug.cgi?id=1213
--- Comment #43 from Daniel Richard G. <skunk at iSKUNK.ORG> ---
And a year later, this issue still afflicts OpenSSH 6.1p1 (as packaged
by Ubuntu). Aab's patch still applies, if fuzzily, and still hardens up
ssh-keyscan so that it can deal with my company's network.
--
You are receiving this mail because:
You are watching the
2007 Nov 21
9
Trouble with DNAT After Upgrade
I''ve upgraded a 3-interface system from 2.0.8 to 3.2.6 on Debian, and I''m not
able to make DNAT work anymore. If someone could offer a suggestion of where
to look to fix this, it would be very much appreciated.
Problem Summary:
If I set DETECT_DNAT_IPADDRS=Yes, then I can''t access anything on my DMZ via
DNAT.
If I set DETECT_DNAT_IPADDRS=No, then **EVERYTHING**
2007 Nov 21
9
Trouble with DNAT After Upgrade
I''ve upgraded a 3-interface system from 2.0.8 to 3.2.6 on Debian, and I''m not
able to make DNAT work anymore. If someone could offer a suggestion of where
to look to fix this, it would be very much appreciated.
Problem Summary:
If I set DETECT_DNAT_IPADDRS=Yes, then I can''t access anything on my DMZ via
DNAT.
If I set DETECT_DNAT_IPADDRS=No, then **EVERYTHING**
2013 Nov 08
5
Re: VPN MTU limit breaks ssh connection to openssh 6.2p2 server
On Thu, 7 Nov 2013, Ernst Kratschmer wrote:
> Dear openssh developer,
>
> I want to use a Win7 client with putty to access a Linux host running an
> openssh 6.2p2 through a VPN connection. These connection worked relatively
> flawless with all versions of openssh up until openssh 6.1p1. Since the
> openssh 6.2p2 upgrade the ssh connection fail consistently with a message:
2013 Feb 23
5
[Bug 2074] New: Host key verification incorrectly handles IPv6 addresses
https://bugzilla.mindrot.org/show_bug.cgi?id=2074
Bug ID: 2074
Summary: Host key verification incorrectly handles IPv6
addresses
Classification: Unclassified
Product: Portable OpenSSH
Version: 6.1p1
Hardware: All
OS: Linux
Status: NEW
Keywords: needs-release-note
2012 Aug 31
6
[Bug 2039] New: Give proper credits for ECDSA patch
https://bugzilla.mindrot.org/show_bug.cgi?id=2039
Priority: P5
Bug ID: 2039
Assignee: unassigned-bugs at mindrot.org
Summary: Give proper credits for ECDSA patch
Severity: normal
Classification: Unclassified
OS: All
Reporter: ondrej at sury.org
Hardware: All
Status: NEW
Version: