[Bug 3639] server thread aborts during client login after receiving SSH2_MSG_KEXINIT due to ssh_sandbox_violation

2023-12-04 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=3639

--- Comment #10 from Darren Tucker  ---
(In reply to Damien Miller from comment #9)
> It's likely that something is trying to use the epoll(3) API.
> OpenSSH itself doesn't use epoll, so it's likely to be something in
> libc, libcrypto or another library.

That's possible.  I checked /etc/os-release on my device, and it's
stock Debian not Raspbian.   My guess would be something in libcrypto,
in which case configuring --without-openssl and retesting would be a
good indicator).

-- 
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 1323] ssh-add: add an option to disable passphrase querying (batch mode)

2023-12-04 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=1323

--- Comment #3 from Damien Miller  ---
This is possible now using SSH_ASKPASS_REQUIRE:

env SSH_ASKPASS_REQUIRE=force SSH_ASKPASS=/bin/false ssh-add ...
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 3639] server thread aborts during client login after receiving SSH2_MSG_KEXINIT due to ssh_sandbox_violation

2023-12-04 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=3639

--- Comment #9 from Damien Miller  ---
hmm, it looks like I might have been wrong with the syscall number:

> [djm@djm linux]$ grep ' 20$' include/uapi/asm-generic/unistd.h
> #define __NR_epoll_create1 20

It's likely that something is trying to use the epoll(3) API. OpenSSH
itself doesn't use epoll, so it's likely to be something in libc,
libcrypto or another library.

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 3640] New: Document scp wildcards working only in one direction

2023-12-04 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=3640

Bug ID: 3640
   Summary: Document scp wildcards working only in one direction
   Product: Portable OpenSSH
   Version: 9.5p1
  Hardware: Other
OS: Linux
Status: NEW
  Severity: enhancement
  Priority: P5
 Component: scp
  Assignee: unassigned-b...@mindrot.org
  Reporter: jida...@jidanni.org

On the scp man page, perhaps mention that wildcards only work in one
direction:

$ set notes.txt
$ scp neurdpro.org:m.j*.o*/X/$@ .
notes.txt 100% 497615.5KX/s   00:00
$ scp $@ neurdpro.org:m.j*.o*/X/
scp: dest open "m.j*.o*/X/": No such file or directory
scp: failed to upload file notes.txt to m.j*.o*/X/

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs