Displaying 20 results from an estimated 1000 matches similar to: "[Bug 2373] New: memory leak in sshd.c:2262"
2013 Oct 17
8
[Bug 2162] New: Log needs to contain the port on which connection is made
https://bugzilla.mindrot.org/show_bug.cgi?id=2162
Bug ID: 2162
Summary: Log needs to contain the port on which connection is
made
Product: Portable OpenSSH
Version: 6.2p1
Hardware: All
OS: FreeBSD
Status: NEW
Severity: normal
Priority: P5
Component: sshd
2002 Sep 21
4
OpenSSH -current fails regression on Solaris 8, sshd dumps core
Hi All.
While working on something I noticed a regression failure on Solaris 8.
It turned out to be present in -cvs and wasn't due to my changes.
One of the tests that fail is basically:
ssh -2 -F $build/regress/ssh_proxy 999.999.999.999 true
The server reports:
sshd[20529]: Disconnecting: Command terminated on signal 11.
The culprit seems to be session.c line 1019 or so:
snprintf(buf,
2003 Jul 10
2
sshd also talking HTTP
(I'm not subscribed to the list, please Cc me on replies).
We have configured sshd to listen on port 80 for some of our users who
are behind sufficiently paranoid firewalls. However, others are now
confused since they're expecting a web server on port 80.
So, I created a small patch (just as proof-of-concept so far), that
determines the type of client connecting. A web client will start
2018 Dec 03
3
[PATCH] removing an old API.
While looking for leaks I came across two old packet APIs which are easy
to remove. I'm sending patches for each separately.
First, there is the packet_set_connection(int fd_in, int fd_out)
function in opacket.c
The function relies on a behavior in ssh_packet_set_connection() where,
when it is passed a NULL pointer, it will implicitely allocate a struct
ssh and return it after then set
2014 Jun 06
1
Patch: Ciphers, MACs and KexAlgorithms on Match
Hi all,
this is a patch to make Ciphers, MACs and KexAlgorithms available in
Match blocks. Now I can reach a -current machine with some Android
terminal app without changing the default ciphers for all clients:
Match Address 192.168.1.2
Ciphers aes128-cbc
MACs hmac-sha1
KexAlgorithms diffie-hellman-group-exchange-sha1
Index: servconf.c
2002 Jan 06
3
sftp/scp performance testing
Folks, I've noticed poor performance using sftp. If anyone has any
advice on how to improve performance, I'd like to hear it. Test simply
involved transferring a single 143MB MP3 file using defaults for all the
program configs. The opensshd 3.0.2p1 server is used in all tests.
Software:
openssh suite 3.0.2p1
psftp (putty sftp client) latest dev snapshot
pscp (putty scp client) latest
2002 Jun 25
7
[Bug 294] tcp wrapper access changed between 2.9.9p2 and 3.3p1
http://bugzilla.mindrot.org/show_bug.cgi?id=294
------- Additional Comments From ktaylor at daac.gsfc.nasa.gov 2002-06-26 00:53 -------
This is what's reported in the syslog from openssh-2.9.9p2 - with an ip address
range listed in hosts.allow
Jun 25 10:50:08 6D:server sshd[30123536]: Failed keyboard-interactive for
ktaylor from xxx.xxx.xxx.xxx port 40333 ssh2
Jun 25 10:50:13 6D:server
2020 Jan 21
3
Instrumentation for metrics
> This makes me think that the syslog approach is probably the way to go
Yeah, right.
Another idea is to mirror the current preauth load via setproctitle()...
That makes that data accessible even without a syscall (at least the
writing of the data - quering needs syscalls, right), so that can be
kept up-to-date and allows a high monitoring frequency as well.
Multiple instances of SSHd (on
2017 May 07
3
[Bug 2714] New: Allow specifying a key description when loading from stdin
https://bugzilla.mindrot.org/show_bug.cgi?id=2714
Bug ID: 2714
Summary: Allow specifying a key description when loading from
stdin
Product: Portable OpenSSH
Version: 7.5p1
Hardware: All
OS: All
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh-add
2004 Aug 25
6
sshd 3.9p1 under Reliant Unix 5.45: getpeername: Operation not supported on transport endpoint
The following is special to sshd 3.9p1 under ReliantUnix 5.45. It does
not occur under ReliantUnix 5.43 nor under Solaris 5.8:
`pwd`/sshd-3.9 -e -D -d -d -d
Now connecting from outside
[...]
debug1: inetd sockets after dupping: 3, 3
debug1: get_port() calls get_sock_port(3)
debug1: getpeername failed:
Operation not supported on transport endpoint
lsof proves FD 3 is an established TCP
2007 Mar 14
1
sshd gets stuck: select() in packet_read_seqnr waits indefinitely
Dear OpenSSH Portable sshd developers,
I'm having a problem where sshd login sessions are occasionally
(as often as once a day) getting stuck indefinitely. I enabled debug
messages and got a backtrace of a stuck sshd, and I think I've found
the bug. I wanted to run it by the list once before filing.
sshd version:
OpenSSH_4.2p1 FreeBSD-20050903, OpenSSL 0.9.7e-p1 25 Oct 2004
2002 Sep 04
4
Determining Local IP Address within .profile
Hi !
I haven't found an easy solution to determine the local IP to which the remote SSH client is connected to the local SSHD. We use MC/Serviceguard which can create many Interfaces where a remote client could connect and we like to know within .profile which interface the client has connected to.
I've looked at the sourcecode and maybe the following could do something I described :
2020 Jul 02
8
[Bug 3190] New: Inconsistent handling of private keys without accompanying public keys
https://bugzilla.mindrot.org/show_bug.cgi?id=3190
Bug ID: 3190
Summary: Inconsistent handling of private keys without
accompanying public keys
Product: Portable OpenSSH
Version: 8.3p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component:
2015 May 05
3
[Bug 2394] New: Provide a global configuration option to disable ControlPersist
https://bugzilla.mindrot.org/show_bug.cgi?id=2394
Bug ID: 2394
Summary: Provide a global configuration option to disable
ControlPersist
Product: Portable OpenSSH
Version: 6.8p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
2018 Jul 31
11
[Bug 2890] New: ssh-agent should not fail after removing and inserting smart card
https://bugzilla.mindrot.org/show_bug.cgi?id=2890
Bug ID: 2890
Summary: ssh-agent should not fail after removing and inserting
smart card
Product: Portable OpenSSH
Version: 7.7p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component:
2018 Jan 05
11
[Bug 2817] New: Add support for PKCS#11 URIs (RFC 7512)
https://bugzilla.mindrot.org/show_bug.cgi?id=2817
Bug ID: 2817
Summary: Add support for PKCS#11 URIs (RFC 7512)
Product: Portable OpenSSH
Version: 7.6p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: Smartcard
Assignee: unassigned-bugs at
2020 Aug 26
10
[Bug 3202] New: Ed25519 key on HSM is not getting listed in ssh-add -l command
https://bugzilla.mindrot.org/show_bug.cgi?id=3202
Bug ID: 3202
Summary: Ed25519 key on HSM is not getting listed in ssh-add -l
command
Product: Portable OpenSSH
Version: 8.2p1
Hardware: ARM64
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh-add
2015 Jan 09
12
[Bug 2335] New: Config parser accepts ip/port in ListenAddress and PermitOpen
https://bugzilla.mindrot.org/show_bug.cgi?id=2335
Bug ID: 2335
Summary: Config parser accepts ip/port in ListenAddress and
PermitOpen
Product: Portable OpenSSH
Version: 6.7p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
2017 Feb 03
5
[PATCH 0/5] Support socket activation in virt-p2v.
As the subject says, support socket activation in virt-p2v.
I have added upstream support for socket activation to nbdkit already:
https://github.com/libguestfs/nbdkit/commit/7ff39d028c6359f5c0925ed2cf4a2c4c751af2e4
I posted a patch for qemu-nbd, still waiting on more reviews for that
one:
https://www.mail-archive.com/qemu-devel@nongnu.org/msg427246.html
I tested this against old and new qemu
2016 Dec 24
30
[Bug 2652] New: PKCS11 login skipped if login required and no pin set
https://bugzilla.mindrot.org/show_bug.cgi?id=2652
Bug ID: 2652
Summary: PKCS11 login skipped if login required and no pin set
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: Smartcard
Assignee: