summaryrefslogtreecommitdiffstats
path: root/usr.bin/ssh/serverloop.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* move #include <sys/wait.h> out of includes.h; ok markus@stevesk2006-02-101-1/+4
|
* move #include <termios.h> out of includes.h; ok markus@stevesk2006-02-071-1/+3
|
* if forced_tun_device is not set, it is -1 and not SSH_TUNID_ANYreyk2005-12-131-2/+2
|
* two changes to the new ssh tunnel support. this breaks compatibilityreyk2005-12-081-7/+18
| | | | | | | | | | | | with the initial commit but is required for a portable approach. - make the tunnel id u_int and platform friendly, use predefined types. - support configuration of layer 2 (ethernet) or layer 3 (point-to-point, default) modes. configuration is done using the Tunnel (yes|point-to-point|ethernet|no) option is ssh_config(5) and restricted by the PermitTunnel (yes|point-to-point|ethernet|no) option in sshd_config(5). ok djm@, man page bits by jmc@
* Add support for tun(4) forwarding over OpenSSH, based on an idea andreyk2005-12-061-1/+33
| | | | | | | | | | | | initial channel code bits by markus@. This is a simple and easy way to use OpenSSH for ad hoc virtual private network connections, e.g. administrative tunnels or secure wireless access. It's based on a new ssh channel and works similar to the existing TCP forwarding support, except that it depends on the tun(4) network interface on both ends of the connection for layer 2 or layer 3 tunneling. This diff also adds support for LocalCommand in the ssh(1) client. ok djm@, markus@, jmc@ (manpages), tested and discussed with others
* make sure we clean up wtmp, etc. file when we receive a SIGTERM,djm2005-10-311-1/+35
| | | | | | SIGINT or SIGQUIT when running without privilege separation (the normal privsep case is already OK). Patch mainly by dtucker@ and senthilkumar_sen AT hotpop.com; ok dtucker@
* no need to escape single quotes in comments, no binary changedjm2005-10-301-2/+2
|
* fix regression I introduced in 4.2: X11 forwardings initiated afterdjm2005-10-101-2/+2
| | | | | a session has exited (e.g. "(sleep 5; xterm) &") would not start. bz #1086 reported by t8m AT centrum.cz; ok markus@ dtucker@
* knf says that a 2nd level indent is four (not three or five) spacesdjm2005-07-171-2/+2
|
* some signed/unsigned int comparison cleanups; markus@ okavsm2004-08-111-3/+4
|
* bz #756: add support for the cancel-tcpip-forward request for the server anddjm2004-05-211-1/+12
| | | | | the client (through the ~C commandline). reported by z3p AT twistedmatrix.com; ok markus@
* fix mem leaks; some fixes from Pete Flugstad; tested dtucker@markus2004-01-191-7/+7
|
* make ClientKeepAlive work for ssh -N, too (no login shell requested).markus2003-12-091-17/+15
| | | | | | 1) send a bogus channel request if we find a channel 2) send a bogus global request if we don't have a channel ok + test beck@
* Correct check for authctxt->valid. ok djm@dtucker2003-11-181-2/+2
|
* standardise arguments to auth methods - they should all take authctxt.djm2003-11-041-3/+3
| | | | check authctxt->valid rather then pw != NULL; ok markus@
* replace fatal_cleanup() and linked list of fatal callbacks with staticmarkus2003-09-231-8/+6
| | | | | | cleanup_exit() function. re-refine cleanup_exit() where appropriate, allocate sshd's authctxt eary to allow simpler cleanup in sshd. tested by many, ok deraadt@
* int -> u_int; ok djm@, deraadt@, mouring@markus2003-06-241-3/+3
|
* remove bitrotten commet; ok markus@djm2003-06-041-2/+2
|
* make channel_new() strdup the 'remote_name' (not the caller); ok theomarkus2003-05-111-3/+3
|
* reapply rekeying chage, tested by henning@, ok djm@markus2003-04-021-2/+8
|
* backout rekeying changes (for 3.6.1)markus2003-04-011-8/+2
|
* rekeying bugfixes and automatic rekeying:markus2003-04-011-2/+8
| | | | | | | | | | | | * both client and server rekey _automatically_ (a) after 2^31 packets, because after 2^32 packets the sequence number for packets wraps (b) after 2^(blocksize_in_bits/4) blocks (see: http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt) (a) and (b) are _enabled_ by default, and only disabled for known openssh versions, that don't support rekeying properly. * client option 'RekeyLimit' * do not reply to requests during rekeying
* log IP address also; ok markus@stevesk2002-09-191-3/+7
|
* move channel counter to u_intmarkus2002-06-241-4/+2
|
* pid_t cleanup. Markus need this now to keep hacking.mpech2002-06-111-3/+3
| | | | | | | markus@, millert@ ok Note: big usr.bin/ cleanup is comming. Now I'm waiting Ok from espie@ for make/.
* check waitpid for EINTR; based on patch from peter@ifm.liu.semarkus2002-03-301-7/+9
|
* remove unused debugmarkus2002-03-241-4/+1
|
* integrate privilege separated openssh; its turned off by default for now.provos2002-03-181-2/+2
| | | | work done by me and markus@
* channel_new never returns NULL, mouring@; ok djm@markus2002-02-061-9/+1
|
* don't use channel_input_channel_request and callbackmarkus2002-02-031-4/+29
| | | | | | | use new server_input_channel_req() instead: server_input_channel_req does generic request parsing on server side session_input_channel_req handles just session specific things now ok djm@
* no need for WNOHANG; ok stevesk@markus2002-01-311-2/+2
|
* wrapper for channel_setup_fwd_listenermarkus2002-01-161-6/+3
|
* skip client_alive_check until there are channels; ok beck@markus2002-01-101-4/+10
|
* remove plen from the dispatch fn. it's no longer used.markus2001-12-281-7/+7
|
* packet_read* no longer return the packet length, since it's not used.markus2001-12-281-3/+2
|
* s/packet_done/packet_check_eom/ (end-of-message); ok djm@markus2001-12-281-6/+6
|
* get rid of packet_integrity_check, use packet_done() instead.markus2001-12-271-4/+4
|
* remove ifdef for USE_PIPES since fdin != fdout; ok djm@markus2001-12-211-9/+1
|
* Conformance fix: we should send failing packet sequence number whendjm2001-12-201-7/+7
| | | | | responding with a SSH_MSG_UNIMPLEMENTED message. Spotted by yakk@yakk.dot.net; ok markus@
* fix race between SIGCHLD and select with an additional pipe. writingmarkus2001-12-191-1/+57
| | | | | | to the pipe on SIGCHLD wakes up select(). using pselect() is not portable and siglongjmp() ugly. W. R. Stevens suggests similar solution. initial idea by pmenage@ensim.com; ok deraadt@, djm@
* basic KNF done while i was looking for something elsederaadt2001-12-191-6/+6
|
* deal with LP64 printf issue with sig_atomic_t. from thorpejitojun2001-12-051-2/+3
|
* volatile sig_atomic_tmarkus2001-11-221-2/+2
|
* don't memset too much memory, ok millert@markus2001-11-091-3/+3
| | | | original patch from jlk@kamens.brookline.ma.us via nalin@redhat.com
* try to keep channels open until an exit-status message is sent.markus2001-10-101-28/+29
| | | | | | don't kill the login shells if the shells stdin/out/err is closed. this should now work: ssh -2n localhost 'exec > /dev/null 2>&1; sleep 10; exit 5'; echo ?
* simplify session close: no more delayed session_close, no more blocking wait() calls.markus2001-10-091-23/+15
|
* close all channels if the connection to the remote host has been closed,markus2001-10-091-4/+8
| | | | should fix sshd's hanging with WCHAN==wait
* client_alive_check cleanupmarkus2001-10-041-27/+24
|
* comment out bogus conditions for selecting on connection_inmarkus2001-10-041-2/+4
|
* don't send fake dummy packets on CR (\r)markus2001-09-171-4/+8
| | | | bugreport from yyua@cs.sfu.ca via solar@@openwall.com