similar to: [Bug 2654] New: regress/agent-getpeereid.sh uses wrong ssh-add program

Displaying 20 results from an estimated 10000 matches similar to: "[Bug 2654] New: regress/agent-getpeereid.sh uses wrong ssh-add program"

2006 Sep 25
1
[PATCH] implementation of getpeereid() for Solaris
hi, Solaris doesn't have getpeereid() or SO_PEERCRED. However, getpeerucred() is perfectly usable for that; and it's in Solaris 10 and OpenSolaris. So, ssh-agent(1) security there so far depends only on permissions of the socket directory and with this patch it checks peer's credentials, too. I patched following files using a snapshot from 20060921: openssh/config.h.in
2003 Jun 20
0
[PATCH] Regression test portabilization.
Hi All. Attached is a patch (against OpenSSH Portable -current) to portablize the regression tests. It will also apply to OpenBSD's (with a couple of rejects). They are based on work by Roumen Petrov and myself, with contributions from Corinna Vinschen and David M Williams. My goal is to have the tests work out of the box on as many of our supported platforms as possible so running the
2016 Dec 31
2
Baffling regress/forwarding.sh failure, new in 7.4p1
I have the OpenSSH regression tests hooked up to run in Debian and Ubuntu's "autopkgtest" system, so that they're automatically run on uploads of OpenSSH itself or any of its dependencies. This is especially good for enforcing interoperability between it and other SSH implementations, but it's also pretty good for throwing up occasional extremely-hard-to-debug failures since
2017 Jan 03
14
[Bug 2660] New: Create mux socket for regress in temp directory
https://bugzilla.mindrot.org/show_bug.cgi?id=2660 Bug ID: 2660 Summary: Create mux socket for regress in temp directory Product: Portable OpenSSH Version: 7.4p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: Regression tests Assignee:
2005 Feb 23
1
getpeereid
Hi, I've just implemented getpeereid in Cygwin and I found that there's something I don't understand. In ssh-agent.c and in clientloop.c, getpeereid is used to ask for the effective uid of the peer side of the connected socket. So far so good, but why does the test look like this: if ((euid != 0) && (getuid() != euid)) ? Is there any good reason why root should be able
2005 Mar 01
7
[Bug 989] openssh-3.9p1 on Solaris 8 - multiplex.sh NOK
http://bugzilla.mindrot.org/show_bug.cgi?id=989 Summary: openssh-3.9p1 on Solaris 8 - multiplex.sh NOK Product: Portable OpenSSH Version: 3.9p1 Platform: UltraSparc OS/Version: Solaris Status: NEW Keywords: patch, help-wanted Severity: normal Priority: P5 Component: Build system
2005 Feb 25
0
Openssh AIX 5.2 Symbol getpeereid (number 34) is not exported
Hello I've compiled OpenSSH 3.9p1 on AIX <source Dir>/contrib/findssl.sh Searching for OpenSSL header files. 0x009060dfL /opt/freeware/include/openssl/opensslv.h Searching for OpenSSL shared library files. Searching for OpenSSL static library files. 0x009060dfL /opt/freeware/lib/libcrypto.a 0x009060dfL /opt/freeware/64/lib/libcrypto.a 0x009060dfL /usr/local/lib/libcrypto.a
2005 Feb 25
1
ssh client Symbol getpeereid (number 34) is not exported from dependent module /usr/lib/libc.a(shr.o).
Hello I've Compiled openssh 3.9.p1 on AIX 5.2: <source Dir>/contrib/findssl.sh Searching for OpenSSL header files. 0x009060dfL /opt/freeware/include/openssl/opensslv.h Searching for OpenSSL shared library files. Searching for OpenSSL static library files. 0x009060dfL /opt/freeware/lib/libcrypto.a 0x009060dfL /opt/freeware/64/lib/libcrypto.a 0x009060dfL /usr/local/lib/libcrypto.a
2017 Jan 01
7
[Bug 2658] New: Make integrity tests more robust against timeouts
https://bugzilla.mindrot.org/show_bug.cgi?id=2658 Bug ID: 2658 Summary: Make integrity tests more robust against timeouts Product: Portable OpenSSH Version: 7.4p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: Regression tests Assignee:
2017 Jan 15
2
[Bug 2665] New: Remove vestige of LOGIN_PROGRAM
https://bugzilla.mindrot.org/show_bug.cgi?id=2665 Bug ID: 2665 Summary: Remove vestige of LOGIN_PROGRAM Product: Portable OpenSSH Version: 7.4p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: sshd Assignee: unassigned-bugs at mindrot.org
2017 Jan 29
2
[Bug 2672] New: Typo with dynamically removing port forward
https://bugzilla.mindrot.org/show_bug.cgi?id=2672 Bug ID: 2672 Summary: Typo with dynamically removing port forward Product: Portable OpenSSH Version: 7.4p1 Hardware: Other URL: https://bugs.launchpad.net/ubuntu/+source/openssh/+bug /1421075 OS: Linux Status: NEW
2017 Jan 02
12
[Bug 2659] New: Fix race conditions in forwarding tests
https://bugzilla.mindrot.org/show_bug.cgi?id=2659 Bug ID: 2659 Summary: Fix race conditions in forwarding tests Product: Portable OpenSSH Version: 7.4p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: Regression tests Assignee:
2016 Dec 16
107
[Bug 2647] New: Tracking bug for OpenSSH 7.5 release
https://bugzilla.mindrot.org/show_bug.cgi?id=2647 Bug ID: 2647 Summary: Tracking bug for OpenSSH 7.5 release Product: Portable OpenSSH Version: -current Hardware: Other OS: Linux Status: NEW Keywords: meta Severity: enhancement Priority: P5 Component: Miscellaneous
2005 Feb 25
0
Antwort: Re: ssh client Symbol getpeereid (number 34) is not exported from dependent module /usr/lib/libc.a(shr.o).
Hi Darren Thanks for your fast reply thats the rease wy it doesn't work.... I have ML4 on my Developement Machine and ML3 on the Quality System...;-> Thanks from Switzerland
2011 May 18
2
Might a patch to ssh-agent to allow relaxing of peer euid check be accepted?
Hi everyone. I have a system where I'd like to give certain users time-limited access to the use of certain SSH private keys without actually exposing the keys. I have the idea of using ssh-agent to do this. The agent would run as a "keyholder" user, and group permissions on the UNIX-domain socket would allow read-write by both that account and the actual ssh user. Right now,
2017 Feb 21
5
[Bug 2682] New: ssh-agent is unable to remove smartcard after introducing whitelist
https://bugzilla.mindrot.org/show_bug.cgi?id=2682 Bug ID: 2682 Summary: ssh-agent is unable to remove smartcard after introducing whitelist Product: Portable OpenSSH Version: 7.4p1 Hardware: Other OS: Linux Status: NEW Keywords: patch Severity: enhancement Priority:
2002 Oct 25
2
[Bug 421] compile error on Debian slink
http://bugzilla.mindrot.org/show_bug.cgi?id=421 ------- Additional Comments From mouring at eviladmin.org 2002-10-25 14:03 ------- [.. Important part from URL..] gcc -g -O2 -Wall -Wpointer-arith -Wno-uninitialized -I. -I.. -I. -I./.. - I/usr/local/ssl/include -DHAVE_CONFIG_H -c bsd-getpeereid.c bsd-getpeereid.c: In function `getpeereid': bsd-getpeereid.c:35: storage size of `cred'
2018 Aug 17
3
Call for testing: OpenSSH 7.8
On SPARC Solaris 10, using Solaris' native OpenSSL and Solaris Studio 12.2, I got the following errors: run test agent-getpeereid.sh ... ssh-add did not fail for nobody: 1 < 2 failed disallow agent attach from other uid gmake[1]: *** [t-exec] Error 1 gmake[1]: Leaving directory `/scratch/wieland/src/openssh/openssh-SNAP-20180817/regress' gmake: *** [tests] Error 2 -- Jeff Wieland,
2024 Oct 06
1
Wrong version for ext-info-s in https://www.openssh.com/specs.html
Hi, https://www.openssh.com/specs.html says that RFC8308 support was added in OpenSSH 7.2, and it specifically calls out both ext-info-s and ext-info-c: "Extension Negotiation in the Secure Shell (SSH) Protocol (ext-info-s, ext-info-c)". However, while ext-info-c was indeed added in 7.2 as part of server-sig-algs support
2011 Apr 07
6
new option ssh-add -v to verify if key is loaded into the agent
Dear openssh developers In a shell script I need to verify if a key belonging to a given public key file is already loaded into the agent. To achieve this, I added a new option -v to ssh-add which does this verification. The patch bases on openssh v5.8p1. The regression test agent.sh was extended to test this new feature. Is there any chance for inclusion of attached patch? Cheers Konrad --