Displaying 9 results from an estimated 9 matches for "add_one_listen_addr".
2014 Feb 10
0
[PATCH] Basic SCTP support for OpenSSH client and server
...ect_via_sctp;
char *ignored_unknown; /* Pattern list of unknown tokens to ignore */
} Options;
diff --git a/servconf.c b/servconf.c
index 7ba65d5..b106458 100644
--- a/servconf.c
+++ b/servconf.c
@@ -57,6 +57,8 @@
static void add_listen_addr(ServerOptions *, char *, int);
static void add_one_listen_addr(ServerOptions *, char *, int);
+static void add_one_listen_addr_proto(ServerOptions *, char *,
+ int, int);
/* Use of privilege separation or not */
extern int use_privsep;
@@ -153,6 +155,7 @@ initialize_server_options(ServerOptions *options)
options->ip_qos_interactive = -1;
options->...
2001 Nov 12
4
Please test -current
Could people please test -current? We will be making a release fairly
soon.
-d
--
| By convention there is color, \\ Damien Miller <djm at mindrot.org>
| By convention sweetness, By convention bitterness, \\ www.mindrot.org
| But in reality there are atoms and space - Democritus (c. 400 BCE)
2014 Dec 28
2
Compiling a static openssh server
...aries from the glibc version used for linking
sshd.o: In function `main':
/home/john/Downloads/openssh-6.6p1/sshd.c:1677: warning: Using 'endpwent'
in statically linked applications requires at runtime the shared libraries
from the glibc version used for linking
servconf.o: In function `add_one_listen_addr':
/home/john/Downloads/openssh-6.6p1/servconf.c:582: warning: Using
'getaddrinfo' in statically linked applications requires at runtime the
shared libraries from the glibc version used for linking
auth.o: In function `allowed_user':
/home/john/Downloads/openssh-6.6p1/auth.c:112: war...
2002 Aug 13
1
[PATCH] global port forwarding restriction
...ervconf.c 26 Jul 2002 11:02:28 -0000 1.3
+++ servconf.c 13 Aug 2002 18:50:33 -0000
@@ -41,6 +41,7 @@
#include "cipher.h"
#include "kex.h"
#include "mac.h"
+#include "channels.h"
static void add_listen_addr(ServerOptions *, char *, u_short);
static void add_one_listen_addr(ServerOptions *, char *, u_short);
@@ -236,6 +237,7 @@
options->allow_tcp_forwarding = 1;
if (options->gateway_ports == -1)
options->gateway_ports = 0;
+ channel_fix_permitted_opens();
if (options->max_startups == -1)
options->max_startups = 10;
if (options->max_sta...
2012 Mar 06
6
openssh static build - mission impossible?
...ries from the glibc version used for linking
sshd.o: In function `main':
/builddir/build/BUILD/openssh-5.6p1/sshd.c:1555: warning: Using 'endpwent' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking
servconf.o: In function `add_one_listen_addr':
/builddir/build/BUILD/openssh-5.6p1/servconf.c:515: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking
./libssh.a(canohost.o): In function `check_ip_options':
/builddir/build/BUILD/openssh...
2006 Mar 29
7
sshd config parser
Hi All.
For various reasons, we're currently looking at extending (or even
overhauling) the config parser used for sshd_config.
Right now the syntax I'm looking at is a cumulative "Match" keyword that
matches when all of the specified criteria are met. This would be
similar the the Host directive used in ssh_config, although it's still
limiting (eg you can't easily
2001 Nov 20
3
problem with AFS token forwarding
Hello,
I came across an interoperability problem in OpenSSH 3.0p1 and 3.0.1p1
concerning the AFS token forwarding. That means that the new versions are
not able to exchange AFS tokens (and Kerberos TGTs) with older OpenSSH
releases (including 2.9p2) and with the old SSH 1.2.2x. In my opinion this
problem already existed in Openssh 2.9.9p1, but I have never used this
version (I only looked at the
2003 Jan 29
0
[PATCH] features for restricted shell environments
...c 28 Jan 2003 18:06:52 -0000 1.1.1.2
+++ servconf.c 29 Jan 2003 21:26:11 -0000 1.8
@@ -39,6 +41,7 @@
#include "cipher.h"
#include "kex.h"
#include "mac.h"
+#include "channels.h"
static void add_listen_addr(ServerOptions *, char *, u_short);
static void add_one_listen_addr(ServerOptions *, char *, u_short);
@@ -102,6 +105,9 @@
options->challenge_response_authentication = -1;
options->permit_empty_passwd = -1;
options->permit_user_env = -1;
+ options->permit_tcp_listen = -1;
+ options->restricted_shell = NULL;
+ options->restrictions = -1;
op...
2004 Jan 19
3
Security suggestion concering SSH and port forwarding.
Hi,
sorry if it is the wrong approuch to suggest improvments to OpenSSH,
but here comes my suggestion:
I recently stumbled upon the scponly shell which in it's chroot:ed form is
an ideal solution when you want to share some files with people you trust
more or less.
The problem is, if you use the scponlyc as shell, port forwarding is still
allowed. This can of course be dissallowed in