Displaying 20 results from an estimated 10000 matches similar to: "[Bug 2654] New: regress/agent-getpeereid.sh uses wrong ssh-add program"
2006 Sep 25
1
[PATCH] implementation of getpeereid() for Solaris
hi, Solaris doesn't have getpeereid() or SO_PEERCRED. However,
getpeerucred() is perfectly usable for that; and it's in Solaris 10 and
OpenSolaris. So, ssh-agent(1) security there so far depends only on
permissions of the socket directory and with this patch it checks peer's
credentials, too. I patched following files using a snapshot from 20060921:
openssh/config.h.in
2003 Jun 20
0
[PATCH] Regression test portabilization.
Hi All.
Attached is a patch (against OpenSSH Portable -current) to portablize the
regression tests. It will also apply to OpenBSD's (with a couple of
rejects). They are based on work by Roumen Petrov and myself, with
contributions from Corinna Vinschen and David M Williams.
My goal is to have the tests work out of the box on as many of our
supported platforms as possible so running the
2016 Dec 31
2
Baffling regress/forwarding.sh failure, new in 7.4p1
I have the OpenSSH regression tests hooked up to run in Debian and
Ubuntu's "autopkgtest" system, so that they're automatically run on
uploads of OpenSSH itself or any of its dependencies. This is
especially good for enforcing interoperability between it and other SSH
implementations, but it's also pretty good for throwing up occasional
extremely-hard-to-debug failures since
2017 Jan 03
14
[Bug 2660] New: Create mux socket for regress in temp directory
https://bugzilla.mindrot.org/show_bug.cgi?id=2660
Bug ID: 2660
Summary: Create mux socket for regress in temp directory
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: Regression tests
Assignee:
2005 Feb 23
1
getpeereid
Hi,
I've just implemented getpeereid in Cygwin and I found that there's
something I don't understand.
In ssh-agent.c and in clientloop.c, getpeereid is used to ask for the
effective uid of the peer side of the connected socket. So far so good,
but why does the test look like this:
if ((euid != 0) && (getuid() != euid))
? Is there any good reason why root should be able
2005 Mar 01
7
[Bug 989] openssh-3.9p1 on Solaris 8 - multiplex.sh NOK
http://bugzilla.mindrot.org/show_bug.cgi?id=989
Summary: openssh-3.9p1 on Solaris 8 - multiplex.sh NOK
Product: Portable OpenSSH
Version: 3.9p1
Platform: UltraSparc
OS/Version: Solaris
Status: NEW
Keywords: patch, help-wanted
Severity: normal
Priority: P5
Component: Build system
2005 Feb 25
0
Openssh AIX 5.2 Symbol getpeereid (number 34) is not exported
Hello
I've compiled OpenSSH 3.9p1 on AIX
<source Dir>/contrib/findssl.sh
Searching for OpenSSL header files.
0x009060dfL /opt/freeware/include/openssl/opensslv.h
Searching for OpenSSL shared library files.
Searching for OpenSSL static library files.
0x009060dfL /opt/freeware/lib/libcrypto.a
0x009060dfL /opt/freeware/64/lib/libcrypto.a
0x009060dfL /usr/local/lib/libcrypto.a
2005 Feb 25
1
ssh client Symbol getpeereid (number 34) is not exported from dependent module /usr/lib/libc.a(shr.o).
Hello
I've Compiled openssh 3.9.p1 on AIX 5.2:
<source Dir>/contrib/findssl.sh
Searching for OpenSSL header files.
0x009060dfL /opt/freeware/include/openssl/opensslv.h
Searching for OpenSSL shared library files.
Searching for OpenSSL static library files.
0x009060dfL /opt/freeware/lib/libcrypto.a
0x009060dfL /opt/freeware/64/lib/libcrypto.a
0x009060dfL /usr/local/lib/libcrypto.a
2017 Jan 01
7
[Bug 2658] New: Make integrity tests more robust against timeouts
https://bugzilla.mindrot.org/show_bug.cgi?id=2658
Bug ID: 2658
Summary: Make integrity tests more robust against timeouts
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: Regression tests
Assignee:
2017 Jan 15
2
[Bug 2665] New: Remove vestige of LOGIN_PROGRAM
https://bugzilla.mindrot.org/show_bug.cgi?id=2665
Bug ID: 2665
Summary: Remove vestige of LOGIN_PROGRAM
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
2017 Jan 29
2
[Bug 2672] New: Typo with dynamically removing port forward
https://bugzilla.mindrot.org/show_bug.cgi?id=2672
Bug ID: 2672
Summary: Typo with dynamically removing port forward
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
URL: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug
/1421075
OS: Linux
Status: NEW
2017 Jan 02
12
[Bug 2659] New: Fix race conditions in forwarding tests
https://bugzilla.mindrot.org/show_bug.cgi?id=2659
Bug ID: 2659
Summary: Fix race conditions in forwarding tests
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: Regression tests
Assignee:
2016 Dec 16
107
[Bug 2647] New: Tracking bug for OpenSSH 7.5 release
https://bugzilla.mindrot.org/show_bug.cgi?id=2647
Bug ID: 2647
Summary: Tracking bug for OpenSSH 7.5 release
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Keywords: meta
Severity: enhancement
Priority: P5
Component: Miscellaneous
2005 Feb 25
0
Antwort: Re: ssh client Symbol getpeereid (number 34) is not exported from dependent module /usr/lib/libc.a(shr.o).
Hi Darren
Thanks for your fast reply
thats the rease wy it doesn't work....
I have ML4 on my Developement Machine and ML3 on the Quality System...;->
Thanks from Switzerland
2011 May 18
2
Might a patch to ssh-agent to allow relaxing of peer euid check be accepted?
Hi everyone. I have a system where I'd like to give certain users
time-limited access to the use of certain SSH private keys without actually
exposing the keys. I have the idea of using ssh-agent to do this. The agent
would run as a "keyholder" user, and group permissions on the UNIX-domain
socket would allow read-write by both that account and the actual ssh user.
Right now,
2017 Feb 21
5
[Bug 2682] New: ssh-agent is unable to remove smartcard after introducing whitelist
https://bugzilla.mindrot.org/show_bug.cgi?id=2682
Bug ID: 2682
Summary: ssh-agent is unable to remove smartcard after
introducing whitelist
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
OS: Linux
Status: NEW
Keywords: patch
Severity: enhancement
Priority:
2002 Oct 25
2
[Bug 421] compile error on Debian slink
http://bugzilla.mindrot.org/show_bug.cgi?id=421
------- Additional Comments From mouring at eviladmin.org 2002-10-25 14:03 -------
[.. Important part from URL..]
gcc -g -O2 -Wall -Wpointer-arith -Wno-uninitialized -I. -I.. -I. -I./.. -
I/usr/local/ssl/include
-DHAVE_CONFIG_H -c bsd-getpeereid.c
bsd-getpeereid.c: In function `getpeereid':
bsd-getpeereid.c:35: storage size of `cred'
2018 Aug 17
3
Call for testing: OpenSSH 7.8
On SPARC Solaris 10, using Solaris' native OpenSSL and Solaris
Studio 12.2, I got the following errors:
run test agent-getpeereid.sh ...
ssh-add did not fail for nobody: 1 < 2
failed disallow agent attach from other uid
gmake[1]: *** [t-exec] Error 1
gmake[1]: Leaving directory
`/scratch/wieland/src/openssh/openssh-SNAP-20180817/regress'
gmake: *** [tests] Error 2
--
Jeff Wieland,
2024 Oct 06
1
Wrong version for ext-info-s in https://www.openssh.com/specs.html
Hi,
https://www.openssh.com/specs.html says that RFC8308 support was added
in OpenSSH 7.2, and it specifically calls out both ext-info-s and
ext-info-c: "Extension Negotiation in the Secure Shell (SSH) Protocol
(ext-info-s, ext-info-c)".
However, while ext-info-c was indeed added in 7.2 as part of
server-sig-algs support
2011 Apr 07
6
new option ssh-add -v to verify if key is loaded into the agent
Dear openssh developers
In a shell script I need to verify if a key belonging to a given public
key file is already loaded into the agent. To achieve this, I added a
new option -v to ssh-add which does this verification.
The patch bases on openssh v5.8p1. The regression test agent.sh was
extended to test this new feature.
Is there any chance for inclusion of attached patch?
Cheers
Konrad
--