Displaying 20 results from an estimated 92 matches for "bind_addresses".
Did you mean:
  bind_address
  
2009 Jul 09
0
[PATCH] Allow binding to a local port (OpenSSH 5.2)
OpenSSH supports the -b bind_address argument for binding to a local
IP address when connecting to a remote host.
It's however currently not possible to specify a local port to bind
to, something I've found useful at several occasions.
Below is an unified diff that introduces the [-B bind_port] option to
ssh(1) and a ssh_config(5) style option "BindPort bind_port".
This allows
2014 Jun 23
1
-h, --help option
Hi,
tmux author refuses to add -h, --help option, because OpenSSH
does not have it [1]. I don't see why convenience features of tmux
should depend on OpenSSH, but because I have no other choice
(and got curious) I ask here - why OpenSSH doesn't provide -h or
--help option?
I use PuTTY as my client, which processes --help option, and for
`ssh` binary I usually use Google + StackOverflow.
2012 Feb 12
0
PATCH: multiple BindAddress
...p1/readconf.c	2011-05-29 14:42:31.000000000 +0300
+++ openssh-5.9p1/readconf.c	2012-02-12 15:43:43.302048950 +0200
@@ -641,8 +641,10 @@ parse_char_array:
 		goto parse_string;
 	case oBindAddress:
-		charptr = &options->bind_address;
-		goto parse_string;
+		cpptr = (char**)&options->bind_addresses;
+		uintptr = &options->num_bind_address;
+		max_entries =SSH_MAX_BIND_ADDRESSES;
+		goto parse_char_array;
 	case oPKCS11Provider:
 		charptr = &options->pkcs11_provider;
@@ -1176,7 +1178,7 @@ initialize_options(Options * options)
 	options->clear_forwardings = -1;
 	options->...
2011 Jul 17
2
openSSH 5.8p2 BindPort patch
Hi, i have written a patch for openSSH 5.8p2 which allows the user to
set the local source port. The patch is as follows:
diff -rupN openssh-5.8p2//readconf.c openssh-5.8p2-srcport//readconf.c
--- openssh-5.8p2//readconf.c	2010-11-20 04:19:38.000000000 +0000
+++ openssh-5.8p2-srcport//readconf.c	2011-07-17 20:57:52.385044096 +0100
@@ -125,7 +125,7 @@ typedef enum {
 	oGlobalKnownHostsFile2,
2005 Sep 01
1
[Bug 1077] Descriptions for "ssh -D" and DynamicForward should mention they can specify "bind_address" optionally
http://bugzilla.mindrot.org/show_bug.cgi?id=1077
           Summary: Descriptions for "ssh -D" and DynamicForward should
                    mention they can specify "bind_address" optionally
           Product: Portable OpenSSH
           Version: -current
          Platform: All
        OS/Version: All
            Status: NEW
          Severity: trivial
          Priority:
2004 Apr 30
1
Code question (canohost.c)
On Fri, 30 Apr 2004, YOSHIFUJI Hideaki / [iso-2022-jp] $B5HF#1QL@(B wrote:
> In article <Pine.BSO.4.44.0404292059520.953-100000 at etoh.eviladmin.org> (at Thu, 29 Apr 2004 21:00:26 -0500 (CDT)), Ben Lindstrom <mouring at etoh.eviladmin.org> says:
>
> > Be that true.. then one should review the usage of it in sshconnect.c
> > which is the other place we do it.
>
2010 Dec 02
0
[PATCH] ssh.1: Clarify remote bind_address usage
Hi all,
A server with [GatewayPorts "yes"] also ignores client's remote
bind_address parameter, contrary to what is implied by the current
description.
Cheers!
Index: src/usr.bin/ssh/ssh.1
===================================================================
RCS file: /cvs/src/usr.bin/ssh/ssh.1,v
retrieving revision 1.316
diff -u src/usr.bin/ssh/ssh.1
--- src/usr.bin/ssh/ssh.1	18
2014 Dec 04
4
[Bug 2324] New: remote port forward w/ empty bind_address via multiplexed connection: doc violation
https://bugzilla.mindrot.org/show_bug.cgi?id=2324
            Bug ID: 2324
           Summary: remote port forward w/ empty bind_address via
                    multiplexed connection: doc violation
           Product: Portable OpenSSH
           Version: 6.7p1
          Hardware: amd64
                OS: Linux
            Status: NEW
          Severity: trivial
          Priority: P5
        
2010 Aug 14
1
bind_address ignored? as in "ssh -R [bind_address]:12491:127.0.0.1:500"
No answers on secureshell at securityfocus.com
I must be doing something wrong or the server seems to ignore my bind request.
Port forwarding is working it just bind to all ips and ignores my bind
request. I've also tried this with an rfc1918 address opposed to a
loopback and had the same results.
Google and the archive haven't helped.
Thanks in advance for your time and consideration.
2016 Jun 20
2
[Bug 2592] New: -R bind_address not working, always bind 0.0.0.0
https://bugzilla.mindrot.org/show_bug.cgi?id=2592
            Bug ID: 2592
           Summary: -R bind_address not working, always bind 0.0.0.0
           Product: Portable OpenSSH
           Version: 7.2p1
          Hardware: amd64
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P5
         Component: sshd
          Assignee: unassigned-bugs at
2008 Sep 07
1
"on-the-fly" SSH Port Forwarding
Hi,
I am using the following version of OpenSSH for reference:
root at proxy:/root# ssh -V
OpenSSH_4.8, OpenSSL 0.9.7j 04 May 2006
root at proxy:/root# uname -a
OpenBSD proxy.localdomain 4.3 GENERIC#698 i386
I am developing an application which uses on-the-fly SSH port forwarding
by using the "~C" escape sequence to add local port forwards when needed
(through Expect). It would
2018 Oct 19
2
OpenSSH socket forwarding in ssh_config file?
On 19Oct2018 17:12, Damien Miller <djm at mindrot.org> wrote:
>On Fri, 19 Oct 2018, Cameron Simpson wrote:
>> The ssh command line's -L option has supported socket forwarding for 
>> a while,
>> but as far as I can tell the ssh_config file does not, even in 7.9.
>
>It does, look for LocalForward
Pardon me, I've been unclear.
I don't mean TCP forwards
2003 Mar 05
0
"rsync --daemon" and IPv4/v6 dual stack
on systems that has separate IPv4/v6 socket layer (i.e. IPv4 packet
	does not get routed to AF_INET6 socket) rsync --daemon would accept
	IPv6 sessions only.  open_socket_in() tries to deal with the
	situation, but it was not enough.  here's the patch.
	(it is required on all *BSDs to accept both IPv4 and IPv6 connections
	with --daemon mode)
itojun
---
? configure.lineno
? lib/dummy
2002 Jan 07
1
rsync-2.5.1 / socket.c - unititialized variable breaks build.
In socket.c, the variable error is unitilialzed.
Also the variable length should be an unsigned int.
EAGLE> type socket.gdiff
--- ref_src:socket.c    Sat Jan  5 13:27:07 2002
+++ lcl_src:socket.c    Sun Jan  6 08:40:51 2002
@@ -1,3 +1,4 @@
+/* Converted by prj_src:unix_c_to_vms_c.tpu AND prj_src:socket.tpu on 
6-JAN-20
02 08:40:51.01 OPENVMS_AXP */
  /* -*- c-file-style: "linux"
2012 Sep 15
2
ssh(1) documentation for -L and -R
I found that the documentation for -L and -R was hard to understand.
So I made some changes to try to make it clearer.  I started with Revision 
1.328 from http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/ssh.1
Comments welcome.
================ ssh.1.patch ================
--- ssh.1	2012/09/15 16:08:48	1.1
+++ ssh.1	2012/09/15 20:23:35
@@ -51,13 +51,13 @@
 .Op Fl F Ar configfile
 .Op Fl I
2014 Jan 30
1
Announce: OpenSSH 6.5 released
Changes since OpenSSH 6.4
=========================
This is a feature-focused release.
New features:
 * ssh(1), sshd(8): Add support for key exchange using elliptic-curve
   Diffie Hellman in Daniel Bernstein's Curve25519. This key exchange
   method is the default when both the client and server support it.
 * ssh(1), sshd(8): Add support for Ed25519 as a public key type.
   Ed25519 is a
2020 Sep 29
4
[Bug 3214] New: Man page should specify which switches are incompatible with a 'command'
https://bugzilla.mindrot.org/show_bug.cgi?id=3214
            Bug ID: 3214
           Summary: Man page should specify which switches are
                    incompatible with a 'command'
           Product: Portable OpenSSH
           Version: 8.3p1
          Hardware: Other
                OS: Linux
            Status: NEW
          Severity: enhancement
          Priority: P5
        
2013 Nov 23
2
[Bug 2174] New: no-pty in authorized_keys does not prevent and interactive shell
https://bugzilla.mindrot.org/show_bug.cgi?id=2174
            Bug ID: 2174
           Summary: no-pty in authorized_keys does not prevent and
                    interactive shell
           Product: Portable OpenSSH
           Version: 6.4p1
          Hardware: All
                OS: Linux
            Status: NEW
          Severity: security
          Priority: P5
         Component: sshd
     
2022 Jul 05
8
[Bug 3456] New: provide a way to have forwardings killed, when the remote command/shell finishes
https://bugzilla.mindrot.org/show_bug.cgi?id=3456
            Bug ID: 3456
           Summary: provide a way to have forwardings killed, when the
                    remote command/shell finishes
           Product: Portable OpenSSH
           Version: v9.0p1
          Hardware: Other
                OS: All
            Status: NEW
          Severity: enhancement
          Priority: P5
        
2004 Aug 06
0
[PATCH] IceCast2 - socket-based default mount
I wrote a patch which makes client connections retain info about which
socket they connected to - this way, you can change the server's behavior
based on which <listen-socket> is being connected to.
In addition, I added a field to the <listen-socket> section of the config
file called <default-mount> which specifies a default file in the
case that one isn't specified (it