[Bug 113] input_userauth_request: illegal user ...

2017-02-03 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=113

--- Comment #9 from Damien Miller  ---
btw I removed the log message that was the source of the original
complain in the same commit

-- 
You are receiving this mail because:
You are the assignee for the bug.
You are watching someone on the CC list of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2647] Tracking bug for OpenSSH 7.5 release

2017-02-03 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2647

Damien Miller  changed:

   What|Removed |Added

 Depends on||113


Referenced Bugs:

https://bugzilla.mindrot.org/show_bug.cgi?id=113
[Bug 113] input_userauth_request: illegal user ...
-- 
You are receiving this mail because:
You are watching the reporter of the bug.
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2647] Tracking bug for OpenSSH 7.5 release

2017-02-03 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2647
Bug 2647 depends on bug 113, which changed state.

Bug 113 Summary: input_userauth_request: illegal user ...
https://bugzilla.mindrot.org/show_bug.cgi?id=113

   What|Removed |Added

 Status|REOPENED|RESOLVED
 Resolution|--- |FIXED

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching the reporter of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2647] Tracking bug for OpenSSH 7.5 release

2017-02-03 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2647

Damien Miller  changed:

   What|Removed |Added

 Depends on||2671


Referenced Bugs:

https://bugzilla.mindrot.org/show_bug.cgi?id=2671
[Bug 2671] make possible to remove default ciphers/kexalgorithms/mac
algorithms
-- 
You are receiving this mail because:
You are watching the reporter of the bug.
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 113] input_userauth_request: illegal user ...

2017-02-03 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=113

Damien Miller  changed:

   What|Removed |Added

 Blocks||2647
 Status|REOPENED|RESOLVED
 Resolution|--- |FIXED
 CC||d...@mindrot.org

--- Comment #8 from Damien Miller  ---
Resolved in:

commit f1a193464a7b77646f0d0cedc929068e4a413ab4
Author: d...@openbsd.org 
Date:   Fri Feb 3 23:05:57 2017 +

upstream commit

use ssh_packet_set_log_preamble() to include connection
username in packet log messages, e.g.

Connection closed by invalid user foo 10.1.1.1 port 44056 [preauth]

ok markus@ bz#113

Upstream-ID: 3591b88bdb5416d6066fb3d49d8fff2375bf1a15

commit 07edd7e9537ab32aa52abb5fb2a915c350fcf441
Author: d...@openbsd.org 
Date:   Fri Feb 3 23:03:33 2017 +

upstream commit

add ssh_packet_set_log_preamble() to allow inclusion of a
preamble string in disconnect messages; ok markus@

Upstream-ID: 34cb41182cd76d414c214ccb01c01707849afead


Referenced Bugs:

https://bugzilla.mindrot.org/show_bug.cgi?id=2647
[Bug 2647] Tracking bug for OpenSSH 7.5 release
-- 
You are receiving this mail because:
You are the assignee for the bug.
You are watching someone on the CC list of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2671] make possible to remove default ciphers/kexalgorithms/mac algorithms

2017-02-03 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2671

Damien Miller  changed:

   What|Removed |Added

 Blocks||2647
 Status|ASSIGNED|RESOLVED
 Resolution|--- |FIXED

--- Comment #2 from Damien Miller  ---
applied in:

commit 68bc8cfa7642d3ccbf2cd64281c16b8b9205be59
Author: d...@openbsd.org 
Date:   Fri Feb 3 23:01:19 2017 +

upstream commit

support =- for removing methods from algorithms lists,
e.g. Ciphers=-*cbc; suggested by Cristian Ionescu-Idbohrn in
bz#2671 "I like
it" markus@

Upstream-ID: c78c38f9f81a963b33d0eade559f6048add24a6d


Referenced Bugs:

https://bugzilla.mindrot.org/show_bug.cgi?id=2647
[Bug 2647] Tracking bug for OpenSSH 7.5 release
-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2647] Tracking bug for OpenSSH 7.5 release

2017-02-03 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2647
Bug 2647 depends on bug 2671, which changed state.

Bug 2671 Summary: make possible to remove default ciphers/kexalgorithms/mac 
algorithms
https://bugzilla.mindrot.org/show_bug.cgi?id=2671

   What|Removed |Added

 Status|ASSIGNED|RESOLVED
 Resolution|--- |FIXED

-- 
You are receiving this mail because:
You are watching the reporter of the bug.
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs


[Bug 2641] Add systemd notify code to to track running server

2017-02-03 Thread bugzilla-daemon
https://bugzilla.mindrot.org/show_bug.cgi?id=2641

--- Comment #5 from Jakub Jelen  ---
The test if the process is daemon passes for every process that is run
as a systemd service so it does not solve the problem for us. As the
result with the pushed change the 7.4p1 will not write PID file when
running as a systemd service.

I would consider a bit different approach. We can remember if we
already called daemon() using environment variable and prevent the
repeated calls if this variable is already set. This finally made it
working for me. The patch can look somehow like this:

diff -up openssh-7.4p1/misc.c.daemon openssh-7.4p1/misc.c
--- openssh-7.4p1/misc.c.daemon 2017-02-03 13:08:14.751282516 +0100
+++ openssh-7.4p1/misc.c2017-02-03 13:08:14.778282474 +0100
@@ -1273,6 +1273,9 @@ daemonized(void)
return 0;   /* parent is not init */
if (getsid(0) != getpid())
return 0;   /* not session leader */
+   if (getenv("_SSH_DAEMONIZED") == NULL)
+   return 0;   /* already reexeced */
+
debug3("already daemonized");
return 1;
 }
diff -up openssh-7.4p1/sshd.c.daemon openssh-7.4p1/sshd.c
--- openssh-7.4p1/sshd.c.daemon 2017-02-03 13:08:14.755282510 +0100
+++ openssh-7.4p1/sshd.c2017-02-03 13:09:29.765164356 +0100
@@ -1866,6 +1866,7 @@ main(int ac, char **av)
if (daemon(0, 0) < 0)
fatal("daemon() failed: %.200s",
strerror(errno));

+   setenv("_SSH_DAEMONIZED", "1", 1);
disconnect_controlling_tty();
}
/* Reinitialize the log (because of the fork above). */

-- 
You are receiving this mail because:
You are watching someone on the CC list of the bug.
You are watching the assignee of the bug.
___
openssh-bugs mailing list
openssh-bugs@mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-bugs