On 1/8/22 3:06 PM, Tzafrir Cohen wrote:
On Sat, Jan 08, 2022 at 01:24:18PM +0200, Shachar Shemesh wrote:
   You can probably find it under /proc/$SSH_AGENT_PID/fd.

I see there:

lrwx------ 1 root root 64 Jan  8 15:00 0 -> /dev/null
lrwx------ 1 root root 64 Jan  8 15:00 1 -> /dev/null
lrwx------ 1 root root 64 Jan  8 15:00 2 -> /dev/null
lrwx------ 1 root root 64 Jan  8 15:00 3 -> 'socket:[14326]'


   With that said, I'm not sure whether that brings you any closer
     to recovering it. Maybe a move (the syscall, not the command line)
     from there to $SSH_AUTH_SOCK?

Also, to answer Uri:

Because it's there.


the only way i can think about, is:

1. create a new socket file with the same ownership and permissions as before under /tmp 2. attach gdb to your running ssh-agent, with a script to make it open a new file descriptor to the new file, and use 'dup' to duplicate it on top of the existing file descriptor. the reason that it should be a dup, is in case ssh-agent uses select() or poll() or something similar to learn of that socket being active.

i'm not sure this will work - you may want to check this on a stand-alone ssh-agent that will listen on a different socket file in a different path.

--guy

_______________________________________________
Linux-il mailing list
Linux-il@cs.huji.ac.il
http://mailman.cs.huji.ac.il/mailman/listinfo/linux-il

Reply via email to