Displaying 13 results from an estimated 13 matches for "address_to_bind".
2005 Apr 07
4
[Bug 1012] Trouble creating remote port forwarding to ssh.com 2.4.0 server.
http://bugzilla.mindrot.org/show_bug.cgi?id=1012
Summary: Trouble creating remote port forwarding to ssh.com 2.4.0
server.
Product: Portable OpenSSH
Version: 4.0p1
Platform: All
OS/Version: All
Status: NEW
Keywords: patch
Severity: normal
Priority: P2
Component: ssh
2001 Feb 10
3
Protocol 2 remote forwarding patch
...cpip-forward" requests.
+ */
+void
+channel_server_global_request(int type, int plen, void *ctxt)
+{
+ char *rtype;
+ char want_reply;
+ int success = 0;
+
+ rtype = packet_get_string(NULL);
+ want_reply = packet_get_char();
+
+ if ( strcmp(rtype, "tcpip-forward") == 0 ) {
+ char *address_to_bind;
+ int port_to_bind;
+
+ address_to_bind = packet_get_string(NULL);
+ port_to_bind = packet_get_int();
+
+ /* Check if the client is allowed to forward (this port) */
+ if ( port_to_bind < IPPORT_RESERVED && !user_authenticated_as_root ) {
+ log("User tries to forward privile...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...int plen)
+{
+ char *rtype;
+ char want_reply;
+ int success = 0;
+
+ rtype = packet_get_string(NULL);
+ want_reply = packet_get_char();
+ debug("server received: %.100s request (reply=%d)",rtype,
+ (int)want_reply);
+
+ if ( strcmp(rtype, "tcpip-forward") == 0 ) {
+ char *address_to_bind;
+ int port_to_bind;
+ address_to_bind = packet_get_string(NULL);
+ port_to_bind = packet_get_int();
+
+ /* Check if the client is allowed to forward (this port) */
+ if ( allow_remote_forwarding(address_to_bind, port_to_bind) ) {
+ /* Start listening on the port */
+ channel_request_local...
2003 Jun 04
2
[Bug 413] Port forwarding: [localhost:]localport:remotehost:remoteport
http://bugzilla.mindrot.org/show_bug.cgi?id=413
dtucker at zip.com.au changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #229 is|0 |1
obsolete| |
------- Additional Comments From dtucker at zip.com.au 2003-06-04 21:37 -------
2003 Aug 06
2
'cancel-tcpip-forward' is not supported.
...at
| A port forwarding can be cancelled with the following message.
| Note that channel open requests may be received until a reply to
| this message is received.
|
| byte SSH_MSG_GLOBAL_REQUEST
| string "cancel-tcpip-forward"
| boolean want reply
| string address_to_bind (e.g. "127.0.0.1")
| uint32 port number to bind
Is there a plan to support that request? Without that,
ssh clients can not cancel '-R' port forwardings dynamically.
Thanks,
--
ymnk
2005 May 11
5
[Bug 1037] Man page for -L and -R should mention -g
http://bugzilla.mindrot.org/show_bug.cgi?id=1037
Summary: Man page for -L and -R should mention -g
Product: Portable OpenSSH
Version: 4.0p1
Platform: All
OS/Version: All
Status: NEW
Severity: trivial
Priority: P5
Component: Documentation
AssignedTo: bitbucket at mindrot.org
ReportedBy:
2000 Aug 15
0
Experimental -R support patch for openssh client
...s].host_to_connect = xstrdup(host_to_connect);
- permitted_opens[num_permitted_opens].port_to_connect = port_to_connect;
- permitted_opens[num_permitted_opens].listen_port = listen_port;
- num_permitted_opens++;
-
/* Send the forward request to the remote side. */
if (compat20) {
const char *address_to_bind = "0.0.0.0";
packet_start(SSH2_MSG_GLOBAL_REQUEST);
packet_put_cstring("tcpip-forward");
- packet_put_char(0); /* boolean: want reply */
+ /* Ask for reply so we know to expect 'forwarded-tcpip' messages */
+ packet_put_char(1); /* Boolean 1 asks for reply */...
2009 Feb 17
2
Idea: reverse socks proxy
Hi,
Just a usecase that I'm sure has been covered before but just in case
its not an openssh solution would be very helpful.
I was trying to install software on a server that was firewalled so no
outbound http connections would work. I was also tunnelling via
another server. Outbound ssh connections also were a convenient option.
What would have been nice would be a remote version of
2005 Apr 05
1
problem with remote forward and SSH 2.4.0 server
...0000:localhost:50000 server
although these commands work just fine:
~ ssh -R 127.0.0.1:50000:localhost:50000 server
~ ssh -R 0.0.0.0:50000:localhost:50000 server
~ ssh -R 192.168.1.1:50000:localhost:50000 server
The attached patch solves the problem for me. It sends "0.0.0.0" as the
address_to_bind for these cases
~ ssh -R 50000:localhost:50000 server
~ ssh -R :50000:localhost:50000 server
~ ssh -R \*:50000:localhost:50000 server
but still passes through the specified address for
~ ssh -R 192.168.1.1:50000:localhost:50000 server
David
- --
David Rothenberger spammer? -...
2004 Aug 05
1
LocalForward and RemoteForward bind patch
...(u_short listen_port,
+channel_request_remote_forwarding(const char *listen_host, u_short listen_port,
const char *host_to_connect, u_short port_to_connect)
{
int type, success = 0;
@@ -2263,7 +2264,8 @@
/* Send the forward request to the remote side. */
if (compat20) {
- const char *address_to_bind = "0.0.0.0";
+ const char *address_to_bind =
+ listen_host == NULL ? "0.0.0.0" : listen_host;
packet_start(SSH2_MSG_GLOBAL_REQUEST);
packet_put_cstring("tcpip-forward");
packet_put_char(1); /* boolean: want reply */
@@ -2297,6 +2299,7 @@
}
}
if (su...
2000 Aug 13
1
Patches for openssh port forwarding
...s].host_to_connect = xstrdup(host_to_connect);
- permitted_opens[num_permitted_opens].port_to_connect = port_to_connect;
- permitted_opens[num_permitted_opens].listen_port = listen_port;
- num_permitted_opens++;
-
/* Send the forward request to the remote side. */
if (compat20) {
const char *address_to_bind = "0.0.0.0";
@@ -1534,7 +1534,28 @@
* Wait for response from the remote side. It will send a disconnect
* message on failure, and we will never see it here.
*/
- packet_read_expect(&payload_len, SSH_SMSG_SUCCESS);
+
+ /* Jarno: Server can send SSH_SMSG_FAILURE if it won...
2005 Jan 24
17
[Bug 413] Port forwarding: [localhost:]localport:remotehost:remoteport
http://bugzilla.mindrot.org/show_bug.cgi?id=413
------- Additional Comments From dtucker at zip.com.au 2005-01-24 14:27 -------
Created an attachment (id=782)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=782&action=view)
forward-bind.sh: regression test for binding port forwards to addresses
Current limitations of test:
- no testing of IPv6
- no testing of backwards compat
2005 Mar 02
12
Call for release testing
...ust be configured with "GatewayPorts clientspecified".
* To support better selection of binding addresses for remote port
forwardings, sshd(8) now supports the new address specification
methods in draft-ietf-secsh-connect-24.txt section 7.1. In
particular, the empty "" address_to_bind is recognised as meaning
a wildcard bind for all supported protocols (IPv4 and IPv6) whereas
"localhost" means an all-protocols loopback bind.
* ssh(1) and ssh-keyscan(1) now support hashing of host names and
addresses added to known_hosts files, controlled by the ssh(1)
Hash...