search for: address_to_bind

Displaying 13 results from an estimated 13 matches for "address_to_bind".

2005 Apr 07
4
[Bug 1012] Trouble creating remote port forwarding to ssh.com 2.4.0 server.
http://bugzilla.mindrot.org/show_bug.cgi?id=1012 Summary: Trouble creating remote port forwarding to ssh.com 2.4.0 server. Product: Portable OpenSSH Version: 4.0p1 Platform: All OS/Version: All Status: NEW Keywords: patch Severity: normal Priority: P2 Component: ssh
2001 Feb 10
3
Protocol 2 remote forwarding patch
...cpip-forward" requests. + */ +void +channel_server_global_request(int type, int plen, void *ctxt) +{ + char *rtype; + char want_reply; + int success = 0; + + rtype = packet_get_string(NULL); + want_reply = packet_get_char(); + + if ( strcmp(rtype, "tcpip-forward") == 0 ) { + char *address_to_bind; + int port_to_bind; + + address_to_bind = packet_get_string(NULL); + port_to_bind = packet_get_int(); + + /* Check if the client is allowed to forward (this port) */ + if ( port_to_bind < IPPORT_RESERVED && !user_authenticated_as_root ) { + log("User tries to forward privile...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...int plen) +{ + char *rtype; + char want_reply; + int success = 0; + + rtype = packet_get_string(NULL); + want_reply = packet_get_char(); + debug("server received: %.100s request (reply=%d)",rtype, + (int)want_reply); + + if ( strcmp(rtype, "tcpip-forward") == 0 ) { + char *address_to_bind; + int port_to_bind; + address_to_bind = packet_get_string(NULL); + port_to_bind = packet_get_int(); + + /* Check if the client is allowed to forward (this port) */ + if ( allow_remote_forwarding(address_to_bind, port_to_bind) ) { + /* Start listening on the port */ + channel_request_local...
2003 Jun 04
2
[Bug 413] Port forwarding: [localhost:]localport:remotehost:remoteport
http://bugzilla.mindrot.org/show_bug.cgi?id=413 dtucker at zip.com.au changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #229 is|0 |1 obsolete| | ------- Additional Comments From dtucker at zip.com.au 2003-06-04 21:37 -------
2003 Aug 06
2
'cancel-tcpip-forward' is not supported.
...at | A port forwarding can be cancelled with the following message. | Note that channel open requests may be received until a reply to | this message is received. | | byte SSH_MSG_GLOBAL_REQUEST | string "cancel-tcpip-forward" | boolean want reply | string address_to_bind (e.g. "127.0.0.1") | uint32 port number to bind Is there a plan to support that request? Without that, ssh clients can not cancel '-R' port forwardings dynamically. Thanks, -- ymnk
2005 May 11
5
[Bug 1037] Man page for -L and -R should mention -g
http://bugzilla.mindrot.org/show_bug.cgi?id=1037 Summary: Man page for -L and -R should mention -g Product: Portable OpenSSH Version: 4.0p1 Platform: All OS/Version: All Status: NEW Severity: trivial Priority: P5 Component: Documentation AssignedTo: bitbucket at mindrot.org ReportedBy:
2000 Aug 15
0
Experimental -R support patch for openssh client
...s].host_to_connect = xstrdup(host_to_connect); - permitted_opens[num_permitted_opens].port_to_connect = port_to_connect; - permitted_opens[num_permitted_opens].listen_port = listen_port; - num_permitted_opens++; - /* Send the forward request to the remote side. */ if (compat20) { const char *address_to_bind = "0.0.0.0"; packet_start(SSH2_MSG_GLOBAL_REQUEST); packet_put_cstring("tcpip-forward"); - packet_put_char(0); /* boolean: want reply */ + /* Ask for reply so we know to expect 'forwarded-tcpip' messages */ + packet_put_char(1); /* Boolean 1 asks for reply */...
2009 Feb 17
2
Idea: reverse socks proxy
Hi, Just a usecase that I'm sure has been covered before but just in case its not an openssh solution would be very helpful. I was trying to install software on a server that was firewalled so no outbound http connections would work. I was also tunnelling via another server. Outbound ssh connections also were a convenient option. What would have been nice would be a remote version of
2005 Apr 05
1
problem with remote forward and SSH 2.4.0 server
...0000:localhost:50000 server although these commands work just fine: ~ ssh -R 127.0.0.1:50000:localhost:50000 server ~ ssh -R 0.0.0.0:50000:localhost:50000 server ~ ssh -R 192.168.1.1:50000:localhost:50000 server The attached patch solves the problem for me. It sends "0.0.0.0" as the address_to_bind for these cases ~ ssh -R 50000:localhost:50000 server ~ ssh -R :50000:localhost:50000 server ~ ssh -R \*:50000:localhost:50000 server but still passes through the specified address for ~ ssh -R 192.168.1.1:50000:localhost:50000 server David - -- David Rothenberger spammer? -...
2004 Aug 05
1
LocalForward and RemoteForward bind patch
...(u_short listen_port, +channel_request_remote_forwarding(const char *listen_host, u_short listen_port, const char *host_to_connect, u_short port_to_connect) { int type, success = 0; @@ -2263,7 +2264,8 @@ /* Send the forward request to the remote side. */ if (compat20) { - const char *address_to_bind = "0.0.0.0"; + const char *address_to_bind = + listen_host == NULL ? "0.0.0.0" : listen_host; packet_start(SSH2_MSG_GLOBAL_REQUEST); packet_put_cstring("tcpip-forward"); packet_put_char(1); /* boolean: want reply */ @@ -2297,6 +2299,7 @@ } } if (su...
2000 Aug 13
1
Patches for openssh port forwarding
...s].host_to_connect = xstrdup(host_to_connect); - permitted_opens[num_permitted_opens].port_to_connect = port_to_connect; - permitted_opens[num_permitted_opens].listen_port = listen_port; - num_permitted_opens++; - /* Send the forward request to the remote side. */ if (compat20) { const char *address_to_bind = "0.0.0.0"; @@ -1534,7 +1534,28 @@ * Wait for response from the remote side. It will send a disconnect * message on failure, and we will never see it here. */ - packet_read_expect(&payload_len, SSH_SMSG_SUCCESS); + + /* Jarno: Server can send SSH_SMSG_FAILURE if it won...
2005 Jan 24
17
[Bug 413] Port forwarding: [localhost:]localport:remotehost:remoteport
http://bugzilla.mindrot.org/show_bug.cgi?id=413 ------- Additional Comments From dtucker at zip.com.au 2005-01-24 14:27 ------- Created an attachment (id=782) --> (http://bugzilla.mindrot.org/attachment.cgi?id=782&action=view) forward-bind.sh: regression test for binding port forwards to addresses Current limitations of test: - no testing of IPv6 - no testing of backwards compat
2005 Mar 02
12
Call for release testing
...ust be configured with "GatewayPorts clientspecified". * To support better selection of binding addresses for remote port forwardings, sshd(8) now supports the new address specification methods in draft-ietf-secsh-connect-24.txt section 7.1. In particular, the empty "" address_to_bind is recognised as meaning a wildcard bind for all supported protocols (IPv4 and IPv6) whereas "localhost" means an all-protocols loopback bind. * ssh(1) and ssh-keyscan(1) now support hashing of host names and addresses added to known_hosts files, controlled by the ssh(1) Hash...