summaryrefslogtreecommitdiff
path: root/serverloop.c
Commit message (Collapse)AuthorAgeFilesLines
* - avsm@cvs.openbsd.org 2004/08/11 21:43:05Darren Tucker2004-08-131-3/+4
| | | | | [channels.c channels.h clientloop.c misc.c misc.h serverloop.c ssh-agent.c] some signed/unsigned int comparison cleanups; markus@ ok
* - djm@cvs.openbsd.org 2004/05/21 11:33:11Darren Tucker2004-05-241-1/+12
| | | | | | | [channels.c channels.h clientloop.c serverloop.c ssh.1] bz #756: add support for the cancel-tcpip-forward request for the server and the client (through the ~C commandline). reported by z3p AT twistedmatrix.com; ok markus@
* - markus@cvs.openbsd.org 2004/01/19 21:25:15Damien Miller2004-01-211-7/+7
| | | | | [auth2-hostbased.c auth2-pubkey.c serverloop.c ssh-keysign.c sshconnect2.c] fix mem leaks; some fixes from Pete Flugstad; tested dtucker@
* 20031217Damien Miller2003-12-171-17/+15
| | | | | | | | | | - (djm) OpenBSD CVS Sync - markus@cvs.openbsd.org 2003/12/09 15:28:43 [serverloop.c] make ClientKeepAlive work for ssh -N, too (no login shell requested). 1) send a bogus channel request if we find a channel 2) send a bogus global request if we don't have a channel ok + test beck@
* - (djm) OpenBSD CVS SyncDamien Miller2003-11-181-2/+2
| | | | | | - dtucker@cvs.openbsd.org 2003/11/18 00:40:05 [serverloop.c] Correct check for authctxt->valid. ok djm@
* - djm@cvs.openbsd.org 2003/11/04 08:54:09Damien Miller2003-11-171-3/+3
| | | | | | | | [auth1.c auth2.c auth2-pubkey.c auth.h auth-krb5.c auth-passwd.c] [auth-rhosts.c auth-rh-rsa.c auth-rsa.c monitor.c serverloop.c] [session.c] standardise arguments to auth methods - they should all take authctxt. check authctxt->valid rather then pw != NULL; ok markus@
* - markus@cvs.openbsd.org 2003/09/23 20:17:11Darren Tucker2003-10-021-8/+6
| | | | | | | | | | | [Makefile.in auth1.c auth2.c auth.c auth.h auth-krb5.c canohost.c cleanup.c clientloop.c fatal.c gss-serv.c log.c log.h monitor.c monitor.h monitor_wrap.c monitor_wrap.h packet.c serverloop.c session.c session.h ssh-agent.c sshd.c] replace fatal_cleanup() and linked list of fatal callbacks with static cleanup_exit() function. re-refine cleanup_exit() where appropriate, allocate sshd's authctxt eary to allow simpler cleanup in sshd. tested by many, ok deraadt@
* - markus@cvs.openbsd.org 2003/06/24 08:23:46Darren Tucker2003-06-281-3/+3
| | | | | | [auth2-hostbased.c auth2-pubkey.c auth2.c channels.c key.c key.h monitor.c packet.c packet.h serverloop.c sshconnect2.c sshd.c] int -> u_int; ok djm@, deraadt@, mouring@
* - djm@cvs.openbsd.org 2003/06/04 12:03:59Damien Miller2003-06-041-2/+2
| | | | | [serverloop.c] remove bitrotten commet; ok markus@
* - markus@cvs.openbsd.org 2003/05/11 20:30:25Damien Miller2003-05-141-3/+3
| | | | | [channels.c clientloop.c serverloop.c session.c ssh.c] make channel_new() strdup the 'remote_name' (not the caller); ok theo
* - (djm) OpenBSD CVS SyncDamien Miller2003-04-091-2/+8
| | | | | | | - markus@cvs.openbsd.org 2003/04/02 09:48:07 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c] [readconf.h serverloop.c sshconnect2.c] reapply rekeying chage, tested by henning@, ok djm@
* - markus@cvs.openbsd.org 2003/04/01 10:10:23Damien Miller2003-04-011-1/+1
| | | | | | | | | | | | | | | | | | | [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c] [readconf.h serverloop.c sshconnect2.c] rekeying bugfixes and automatic rekeying: * both client and server rekey _automatically_ (a) after 2^31 packets, because after 2^32 packets the sequence number for packets wraps (b) after 2^(blocksize_in_bits/4) blocks (see: draft-ietf-secsh-newmodes-00.txt) (a) and (b) are _enabled_ by default, and only disabled for known openssh versions, that don't support rekeying properly. * client option 'RekeyLimit' * do not reply to requests during rekeying - markus@cvs.openbsd.org 2003/04/01 10:22:21 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c] [readconf.h serverloop.c sshconnect2.c] backout rekeying changes (for 3.6.1)
* Cray fixes (bug 367) based on patch from Wendy Palm @ cray.Tim Rice2002-09-251-0/+2
| | | | This does not include the deattack.c fixes.
* - stevesk@cvs.openbsd.org 2002/09/19 16:03:15Damien Miller2002-09-221-3/+7
| | | | | [serverloop.c] log IP address also; ok markus@
* - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platformsBen Lindstrom2002-07-091-2/+5
| | | | lacking that concept can share it. Patch by vinschen@redhat.com
* - markus@cvs.openbsd.org 2002/06/24 14:33:27Ben Lindstrom2002-06-251-4/+2
| | | | | [channels.c channels.h clientloop.c serverloop.c] move channel counter to u_int
* - mpech@cvs.openbsd.org 2002/06/11 05:46:20Ben Lindstrom2002-06-111-3/+3
| | | | | | [auth-krb4.c monitor.h serverloop.c session.c ssh-agent.c sshd.c] pid_t cleanup. Markus need this now to keep hacking. markus@, millert@ ok
* - markus@cvs.openbsd.org 2002/03/30 18:51:15Ben Lindstrom2002-04-021-7/+9
| | | | | [monitor.c serverloop.c sftp-int.c sftp.c sshd.c] check waitpid for EINTR; based on patch from peter@ifm.liu.se
* - markus@cvs.openbsd.org 2002/03/24 16:00:27Ben Lindstrom2002-03-261-4/+1
| | | | | [serverloop.c] remove unused debug
* - provos@cvs.openbsd.org 2002/03/18 17:50:31Ben Lindstrom2002-03-221-2/+2
| | | | | | | | | | | [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c kexgex.c servconf.c session.h servconf.h serverloop.c session.c sshd.c] integrate privilege separated openssh; its turned off by default for now. work done by me and markus@ applied, but outside of ensure that smaller code bits migrated with their owners.. no work was tried to 'fix' it to work. =) Later project!
* - markus@cvs.openbsd.org 2002/02/06 14:55:16Damien Miller2002-02-081-9/+1
| | | | | [channels.c clientloop.c serverloop.c ssh.c] channel_new never returns NULL, mouring@; ok djm@
* - markus@cvs.openbsd.org 2002/02/03 17:53:25Damien Miller2002-02-051-4/+29
| | | | | | | | | [auth1.c serverloop.c session.c session.h] don't use channel_input_channel_request and callback use new server_input_channel_req() instead: server_input_channel_req does generic request parsing on server side session_input_channel_req handles just session specific things now ok djm@
* - markus@cvs.openbsd.org 2002/01/31 15:00:05Damien Miller2002-02-051-2/+2
| | | | | [serverloop.c] no need for WNOHANG; ok stevesk@
* - markus@cvs.openbsd.org 2002/01/16 13:17:51Damien Miller2002-01-221-6/+3
| | | | | [channels.c channels.h serverloop.c ssh.c] wrapper for channel_setup_fwd_listener
* - markus@cvs.openbsd.org 2002/01/10 11:13:29Damien Miller2002-01-221-4/+10
| | | | | [serverloop.c] skip client_alive_check until there are channels; ok beck@
* - markus@cvs.openbsd.org 2001/12/28 15:06:00Damien Miller2002-01-221-7/+7
| | | | | [auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c dispatch.h kex.c kex.h serverloop.c ssh.c sshconnect2.c] remove plen from the dispatch fn. it's no longer used.
* - markus@cvs.openbsd.org 2001/12/28 14:50:54Damien Miller2002-01-221-3/+2
| | | | | [auth1.c auth-rsa.c channels.c dispatch.c kex.c kexdh.c kexgex.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshconnect2.c sshd.c] packet_read* no longer return the packet length, since it's not used.
* - markus@cvs.openbsd.org 2001/12/27 20:39:58Damien Miller2002-01-221-6/+6
| | | | | [auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c] get rid of packet_integrity_check, use packet_done() instead.
* - markus@cvs.openbsd.org 2001/12/27 20:39:58Damien Miller2002-01-221-4/+4
| | | | | [auth1.c auth-rsa.c channels.c clientloop.c packet.c packet.h serverloop.c session.c ssh.c sshconnect1.c sshd.c ttymodes.c] get rid of packet_integrity_check, use packet_done() instead.
* - markus@cvs.openbsd.org 2001/12/21 12:17:33Damien Miller2002-01-221-9/+1
| | | | | [serverloop.c] remove ifdef for USE_PIPES since fdin != fdout; ok djm@
* - djm@cvs.openbsd.org 2001/12/20 22:50:24Damien Miller2001-12-211-7/+7
| | | | | | | | | [auth2.c auth2-chall.c channels.c channels.h clientloop.c dispatch.c] [dispatch.h kex.c kex.h packet.c packet.h serverloop.c ssh.c] [sshconnect2.c] Conformance fix: we should send failing packet sequence number when responding with a SSH_MSG_UNIMPLEMENTED message. Spotted by yakk@yakk.dot.net; ok markus@
* - markus@cvs.openbsd.org 2001/12/19 16:09:39Damien Miller2001-12-211-1/+57
| | | | | | | | [serverloop.c] fix race between SIGCHLD and select with an additional pipe. writing to the pipe on SIGCHLD wakes up select(). using pselect() is not portable and siglongjmp() ugly. W. R. Stevens suggests similar solution. initial idea by pmenage@ensim.com; ok deraadt@, djm@
* - deraadt@cvs.openbsd.org 2001/12/19 07:18:56Damien Miller2001-12-211-6/+6
| | | | | | | | | | | | [auth1.c auth2.c auth2-chall.c auth-bsdauth.c auth.c authfile.c auth.h] [auth-krb4.c auth-rhosts.c auth-skey.c bufaux.c canohost.c channels.c] [cipher.c clientloop.c compat.c compress.c deattack.c key.c log.c mac.c] [match.c misc.c nchan.c packet.c readconf.c rijndael.c rijndael.h scard.c] [servconf.c servconf.h serverloop.c session.c sftp.c sftp-client.c] [sftp-glob.c sftp-int.c sftp-server.c ssh-add.c ssh-agent.c ssh.c] [sshconnect1.c sshconnect2.c sshconnect.c sshd.8 sshd.c sshd_config] [ssh-keygen.c sshlogin.c sshpty.c sshtty.c ttymodes.c uidswap.c] basic KNF done while i was looking for something else
* - itojun@cvs.openbsd.org 2001/12/05 03:50:01Ben Lindstrom2001-12-061-2/+3
| | | | | [clientloop.c serverloop.c sshd.c] deal with LP64 printf issue with sig_atomic_t. from thorpej
* - markus@cvs.openbsd.org 2001/11/22 12:34:22Ben Lindstrom2001-12-061-2/+2
| | | | | [clientloop.c serverloop.c sshd.c] volatile sig_atomic_t
* - markus@cvs.openbsd.org 2001/11/09 18:59:23Damien Miller2001-11-121-3/+3
| | | | | | [clientloop.c serverloop.c] don't memset too much memory, ok millert@ original patch from jlk@kamens.brookline.ma.us via nalin@redhat.com
* - (djm) OpenBSD CVS SyncDamien Miller2001-10-121-28/+29
| | | | | | | | | | - markus@cvs.openbsd.org 2001/10/10 22:18:47 [channels.c channels.h clientloop.c nchan.c serverloop.c] [session.c session.h] try to keep channels open until an exit-status message is sent. don't kill the login shells if the shells stdin/out/err is closed. this should now work: ssh -2n localhost 'exec > /dev/null 2>&1; sleep 10; exit 5'; echo ?
* - markus@cvs.openbsd.org 2001/10/09 21:59:41Damien Miller2001-10-101-23/+15
| | | | | [channels.c channels.h serverloop.c session.c session.h] simplify session close: no more delayed session_close, no more blocking wait() calls.
* - markus@cvs.openbsd.org 2001/10/09 19:51:18Damien Miller2001-10-101-4/+8
| | | | | | [serverloop.c] close all channels if the connection to the remote host has been closed, should fix sshd's hanging with WCHAN==wait
* - markus@cvs.openbsd.org 2001/10/04 15:12:37Damien Miller2001-10-101-27/+24
| | | | | [serverloop.c] client_alive_check cleanup
* - markus@cvs.openbsd.org 2001/10/04 15:05:40Damien Miller2001-10-101-2/+4
| | | | | [channels.c serverloop.c] comment out bogus conditions for selecting on connection_in
* - markus@cvs.openbsd.org 2001/09/17 21:04:02Ben Lindstrom2001-09-181-4/+8
| | | | | | [channels.c serverloop.c] don't send fake dummy packets on CR (\r) bugreport from yyua@cs.sfu.ca via solar@@openwall.com
* - (stevesk) use mysignal() in protocol 1 loop now that the SIGCHLDKevin Steves2001-07-261-3/+3
| | | | handler has converged.
* - markus@cvs.openbsd.org 2001/07/17 21:04:58Ben Lindstrom2001-07-181-10/+17
| | | | | | [channels.c channels.h clientloop.c nchan.c serverloop.c] keep track of both maxfd and the size of the malloc'ed fdsets. update maxfd if maxfd gets closed.
* - markus@cvs.openbsd.org 2001/07/15 16:17:08Ben Lindstrom2001-07-181-5/+4
| | | | | [serverloop.c] schedule client alive for ssh2 only, greg@cheers.bungi.com
* - markus@cvs.openbsd.org 2001/07/02 22:52:57Ben Lindstrom2001-07-041-2/+4
| | | | | | | | [channels.c channels.h serverloop.c] improve cleanup/exit logic in ssh2: stop listening to channels, detach channel users (e.g. sessions). wait for children (i.e. dying sessions), send exit messages, cleanup all channels.
* - markus@cvs.openbsd.org 2001/07/02 13:59:15Ben Lindstrom2001-07-041-3/+17
| | | | | | [serverloop.c session.c session.h] wait until !session_have_children(); bugreport from Lutz.Jaenicke@aet.TU-Cottbus.DE
* - markus@cvs.openbsd.org 2001/06/27 02:12:54Ben Lindstrom2001-07-041-3/+5
| | | | | [serverloop.c serverloop.h session.c session.h] quick hack to make ssh2 work again.
* - markus@cvs.openbsd.org 2001/06/25 08:25:41Ben Lindstrom2001-07-041-2/+2
| | | | | | | [channels.c channels.h cipher.c clientloop.c compat.c compat.h hostfile.c kex.c kex.h key.c key.h nchan.c packet.c serverloop.c session.c session.h sftp-server.c ssh-add.c ssh-agent.c uuencode.h] update copyright for 2001
* - itojun@cvs.openbsd.org 2001/06/23 15:12:20Ben Lindstrom2001-06-251-22/+24
| | | | | | | | | | | | | [auth1.c auth2.c auth2-chall.c authfd.c authfile.c auth-rhosts.c canohost.c channels.c cipher.c clientloop.c deattack.c dh.c hostfile.c kex.c kexdh.c kexgex.c key.c nchan.c packet.c radix.c readpass.c scp.c servconf.c serverloop.c session.c sftp.c sftp-client.c sftp-glob.c sftp-int.c sftp-server.c ssh-add.c ssh-agent.c ssh.c sshconnect1.c sshconnect2.c sshconnect.c sshd.c ssh-keygen.c ssh-keyscan.c] more strict prototypes. raise warning level in Makefile.inc. markus ok'ed TODO; cleanup headers