[Bug 1344] DISABLE_FD_PASSING does not work if sshd invoked by inetd

bugzilla-daemon at bugzilla.mindrot.org bugzilla-daemon at bugzilla.mindrot.org
Sun Jul 22 13:06:12 EST 2007


http://bugzilla.mindrot.org/show_bug.cgi?id=1344


Darren Tucker <dtucker at zip.com.au> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |dtucker at zip.com.au




--- Comment #2 from Darren Tucker <dtucker at zip.com.au>  2007-07-22 13:06:09 ---
(In reply to comment #1)
> Created an attachment (id=1329)
 --> (http://bugzilla.mindrot.org/attachment.cgi?id=1329) [details]
> Initialize use_privsep based on DISABLE_FD_PASSING
> 
> The attached patch fixes the problem by initializing use_privsep based
> on DISABLE_FD_PASSING.

This does not seem to be a general problem: on Linux, at least, an sshd
built with DISABLE_FD_PASSING still works with inetd mode.  It would be
interesting to know if there's a problem on the other platforms that
normally set DISABLE_FD_PASSING.

Could you please provide the debug output from sshd, either by setting
"LogLevel debug3" in sshd_config and collecting the messages from
wherever syslog puts them, or by running sshd in inetd mode as a
proxycommand, eg

   ssh -o "ProxyCommand sudo /usr/local/sbin/sshd -ddde -i" yourserver

Thanks.


-- 
Configure bugmail: http://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.


More information about the openssh-bugs mailing list