search for: add_local_forward

Displaying 13 results from an estimated 13 matches for "add_local_forward".

2004 Aug 05
1
LocalForward and RemoteForward bind patch
...; void unset_nonblock(int); void set_nodelay(int); diff -u -r openssh-3.8p1/readconf.c openssh-3.8p1-localbind/readconf.c --- openssh-3.8p1/readconf.c 2004-08-05 08:59:24.775159000 -0700 +++ openssh-3.8p1-localbind/readconf.c 2004-08-05 12:53:24.203841440 -0700 @@ -203,8 +203,8 @@ */ void -add_local_forward(Options *options, u_short port, const char *host, - u_short host_port) +add_local_forward(Options *options, const char *listen_host, u_short port, + const char *host, u_short host_port) { Forward *fwd; #ifndef NO_IPPORT_RESERVED_CONCEPT @@ -215,6 +215,7 @@ if (options->num_local_for...
2003 Aug 12
1
[PATCH] Minor nit: -D is now "socks" not "socks4"
...dconf.c,v retrieving revision 1.90 diff -u -p -r1.90 readconf.c --- readconf.c 2 Aug 2003 12:24:49 -0000 1.90 +++ readconf.c 12 Aug 2003 07:21:16 -0000 @@ -676,7 +676,7 @@ parse_int: fatal("%.200s line %d: Badly formatted port number.", filename, linenum); if (*activep) - add_local_forward(options, fwd_port, "socks4", 0); + add_local_forward(options, fwd_port, "socks", 0); break; case oClearAllForwardings: Index: ssh.c =================================================================== RCS file: /usr/local/src/security/openssh/cvs/openssh_cvs/ssh.c,v retr...
2003 Feb 03
8
[Bug 413] Port forwarding: [localhost:]localport:remotehost:remoteport
http://bugzilla.mindrot.org/show_bug.cgi?id=413 markus at openbsd.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- Additional Comments From markus at openbsd.org 2003-02-03 19:50 ------- i'll look into this. ------- You are
2002 Jul 04
1
[PATCH]: Remove HAVE_CYGWIN in favor of NO_IPPORT_RESERVED_CONCEPT
..._NOOP) ;; Index: readconf.c =================================================================== RCS file: /cvs/openssh_cvs/readconf.c,v retrieving revision 1.75 diff -u -p -r1.75 readconf.c --- readconf.c 21 Jun 2002 00:41:52 -0000 1.75 +++ readconf.c 4 Jul 2002 09:13:31 -0000 @@ -199,7 +199,7 @@ add_local_forward(Options *options, u_sh u_short host_port) { Forward *fwd; -#ifndef HAVE_CYGWIN +#ifndef NO_IPPORT_RESERVED_CONCEPT extern uid_t original_real_uid; if (port < IPPORT_RESERVED && original_real_uid != 0) fatal("Privileged ports can only be forwarded by root."); Inde...
2012 May 03
5
[PATCH/RFC 0/6] New mux client request to list open tcp forwardings.
These patches implement a new mux client request to list the currently opened TCP forwardings. It also removes some todos regarding keeping the list of forwardings in the options up-to-date. Bert Wesarg (6): attach the forwarding type to struct Forward merge local and remote forward lists generate unique ids for forwardings to be used for identification remove closed forwardings from
2009 Feb 17
2
Idea: reverse socks proxy
Hi, Just a usecase that I'm sure has been covered before but just in case its not an openssh solution would be very helpful. I was trying to install software on a server that was firewalled so no outbound http connections would work. I was also tunnelling via another server. Outbound ssh connections also were a convenient option. What would have been nice would be a remote version of
2008 Aug 12
0
IPPORT_RESERVED
FreeBSD doesn't have a fixed range of reserved ports, although it still has IPPORT_RESERVED for compatibility; instead, the last reserved port number is indicated by the net.inet.ip.portrange.reservedhigh sysctl, which defaults to IPPORT_RESERVED - 1. The attached patch modifies add_local_forward() to use this sysctl instead of IPPORT_RESERVED on FreeBSD. DES -- Dag-Erling Sm?rgrav - des at des.no -------------- next part -------------- A non-text attachment was scrubbed... Name: ssh-ipport-reserved.diff Type: text/x-patch Size: 1090 bytes Desc: not available Url : http://lists.mindrot.o...
2010 Jul 07
0
ssh client and privileged ports
Hello, The ssh client checks for privileged ports when a local forward is about to be set. This is done in readconf.c's function "add_local_forward": ??? if (newfwd->listen_port < IPPORT_RESERVED && original_real_uid != 0) ??? ??? fatal("Privileged ports can only be forwarded by root."); The constant IPPORT_RESERVED is system wide and fixed at make time. This test is not compatible with local and dynamic strategi...
2001 May 18
0
PATCH: implement delay (sleep) after last tunnelled connection exits
...usage(); - if (strchr("eilcmpLRDo", opt)) { /* options with arguments */ + if (strchr("eilcmpLRSDo", opt)) { /* options with arguments */ optarg = av[optind] + 2; if (strcmp(optarg, "") == 0) { if (optind >= ac - 1) @@ -488,7 +489,13 @@ } add_local_forward(&options, fwd_port, buf, fwd_host_port); break; - + case 'S': + options.sleep = atoi(optarg); + if (options.sleep < 0) { + fprintf(stderr, "Bad delay value '%s'\n", optarg); + exit(1); + } + break; case 'D': fwd_port = a2port(optarg...
2002 Jul 17
2
[Patch] SSH through HTTP proxy using CONNECT
...hr("eilcmpLRDo", opt)) { /* options with arguments */ + if (strchr("eilcmpLRDor", opt)) { /* options with arguments */ optarg = av[optind] + 2; if (strcmp(optarg, "") == 0) { if (optind >= ac - 1) @@ -481,6 +482,15 @@ /* NOTREACHED */ } add_local_forward(&options, fwd_port, buf, fwd_host_port); + break; + case 'r': + if (sscanf(optarg, "%255[^:]:%u", buf, + &options.proxy_port) != 2) { + fprintf(stderr, "Bad HTTP proxy '%s'.\n", optarg); + usage(); + /* NOTREACHED */ + } + options....
2001 Sep 05
2
sshd hangs on logout -- is this a bug?
In the changelog, there is an entry: 20001129 - (djm) Back out all the serverloop.c hacks. sshd will now hang again if there are background children with open fds. Does this mean that this is regarded as expected (and correct) behavior, that should not change in the future, or does it mean that this behavior is a known problem that someone will eventually fix? --Adam -- Adam McKenna
2015 Jul 29
2
[PATCH] ssh: Add option to present certificates on command line
...MAX_CERTIFICATE_FILES]; + int certificate_file_userprovided[SSH_MAX_CERTIFICATE_FILES]; + struct sshkey *certificates[SSH_MAX_CERTIFICATE_FILES]; /* Local TCP/IP forward requests. */ int num_local_forwards; @@ -194,5 +199,6 @@ void dump_client_config(Options *o, const char *host); void add_local_forward(Options *, const struct Forward *); void add_remote_forward(Options *, const struct Forward *); void add_identity_file(Options *, const char *, const char *, int); +void add_certificate_file(Options *, const char *, const char *, int); #endif /* READCONF_H */ diff --git a/regress/Makefil...
2010 Jan 14
1
ssh(1) multiplexing rewrite
...en_host, + fwd.listen_port, fwd.connect_host, fwd.connect_port, + options.gateway_ports) < 0) { + fail: + logit("slave-requested %s failed", fwd_desc); + buffer_put_int(r, MUX_S_FAILURE); + buffer_put_cstring(r, "Port forwarding failed"); + goto out; + } + add_local_forward(&options, &fwd); + freefwd = 0; + } else { + /* XXX wait for remote to confirm */ + if (options.num_remote_forwards + 1 >= + SSH_MAX_FORWARDS_PER_DIRECTION || + channel_request_remote_forwarding(fwd.listen_host, + fwd.listen_port, fwd.connect_host, fwd.connect_port) &lt...