[Bug 1344] DISABLE_FD_PASSING does not work if sshd invoked by inetd
bugzilla-daemon at bugzilla.mindrot.org
bugzilla-daemon at bugzilla.mindrot.org
Sun Jul 22 13:06:12 EST 2007
http://bugzilla.mindrot.org/show_bug.cgi?id=1344
Darren Tucker <dtucker at zip.com.au> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |dtucker at zip.com.au
--- Comment #2 from Darren Tucker <dtucker at zip.com.au> 2007-07-22 13:06:09 ---
(In reply to comment #1)
> Created an attachment (id=1329)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=1329) [details]
> Initialize use_privsep based on DISABLE_FD_PASSING
>
> The attached patch fixes the problem by initializing use_privsep based
> on DISABLE_FD_PASSING.
This does not seem to be a general problem: on Linux, at least, an sshd
built with DISABLE_FD_PASSING still works with inetd mode. It would be
interesting to know if there's a problem on the other platforms that
normally set DISABLE_FD_PASSING.
Could you please provide the debug output from sshd, either by setting
"LogLevel debug3" in sshd_config and collecting the messages from
wherever syslog puts them, or by running sshd in inetd mode as a
proxycommand, eg
ssh -o "ProxyCommand sudo /usr/local/sbin/sshd -ddde -i" yourserver
Thanks.
--
Configure bugmail: http://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
More information about the openssh-bugs
mailing list