search for: chan_tcp_window_default

Displaying 12 results from an estimated 12 matches for "chan_tcp_window_default".

2002 Feb 06
15
[Bug 105] scp protocol 2 over a hippi interface takes 6 times longer
http://bugzilla.mindrot.org/show_bug.cgi?id=105 markus at openbsd.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- Additional Comments From markus at openbsd.org 2002-02-07 06:54 ------- could you please try this without scp? e.g.
2008 Apr 23
2
CHANNEL SIZE.
...onnect to the switches, however 4.6p1 would. The error I received was. ' channel 0: open failed: resource shortage: Channel open failed' I did some diggin and noticed these two constants where changed between 4.6 and 4.7 #define CHAN_SES_WINDOW_DEFAULT (4*CHAN_SES_PACKET_DEFAULT) #define CHAN_TCP_WINDOW_DEFAULT (4*CHAN_TCP_PACKET_DEFAULT) Changing the new value of 64*, back to 4*, solved the issue. - markus at cvs.openbsd.org 2007/06/11 09:14:00 [channels.h] increase default channel windows; ok djm Its probably an issue with our switches, but that is something I probably cannot get rectif...
2011 Sep 08
1
Dynamic port remote listener - a BUG?
...debug("Allocated listen port %d", *allocated_listen_port); } /* Allocate a channel number for the socket. */ c = channel_new("port listener", type, sock, sock, -1, CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0, "port listener", 1); c->path = xstrdup(host); c->host_port = port_to_connect; c->listening_port = listen_port; success = 1; } if (success == 0)...
2012 Oct 22
1
[PATCH] Implement remote dynamic TCP forwarding
...Channel * +connect_to(const char *host, u_short port, char *ctype, char *rname) +{ + int sock; + struct channel_connect cctx; + Channel *c; + + sock = connect_to_helper(host, port, &cctx); + if (sock == -1) + return NULL; + c = channel_new(ctype, SSH_CHANNEL_CONNECTING, sock, sock, -1, CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0, rname, 1); c->connect_ctx = cctx; @@ -3347,6 +3479,10 @@ channel_connect_by_listen_address(u_short listen_port, char *ctype, char *rname) for (i = 0; i < num_permitted_opens; i++) { if (permitted_opens[i].host_to_connect != NULL && port_match...
2017 Oct 10
3
tunnel device name acquisition?
Numerous how-tos all over the Internet show how one would set up a tunnel using ssh, e.g.: ssh -f -o Tunnel=ethernet <server_ip> true I was wondering if there's a way to subsequently acquire the names of the local and remote tun/tap interfaces (e.g., using the default "-w any:any") for subsequent automatic tunnel configuration, e.g.: ip link set $TapDev up ip link set
2006 Aug 25
2
RFC: non-root ssh tun access
...;); +#if defined(SSH_TUN_LINUX) + if ((fd = tun_open(options.tun_local, + options.tun_open, original_real_uid)) >= 0) { +#else if ((fd = tun_open(options.tun_local, options.tun_open)) >= 0) { +#endif c = channel_new("tun", SSH_CHANNEL_OPENING, fd, fd, -1, CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0, "tun", 1);
2005 Feb 24
7
Question performnace of SSH v1 vs SSH v2
Hello I have ported OpenSSH 3.8p1 to a LynxOS platform. Recently I heard a report from the field that v2 is perceived to be significantly slower than v1. Is this a known issue? Are there any configuration parameters that can be modified to make v2 faster? Thanks in advance for your response Amba
2008 Jun 19
5
Portforwarding using the control master.
Hi all, currently I am considering writing a patch for OpenSSH that will allow portforwarding using the control_master unix domain socket. The idea is to introduce an extra SSHMUX command, SSHMUX_COMMAND_SOCKS, which will then pass control to the normal socks functions used for dynamic forwarding. The main reason for me to write this patch are: - some more control over who gets to connect to
2001 Feb 10
3
Protocol 2 remote forwarding patch
...512,7 +1614,8 @@ } /* Allocate a channel number for the socket. */ ch = channel_new( - "port listener", SSH_CHANNEL_PORT_LISTENER, + "port listener", ssh2_remote_fwd ? + SSH2_CHANNEL_PORT_LISTENER : SSH_CHANNEL_PORT_LISTENER, sock, sock, -1, CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0, xstrdup("port listener"), 1); @@ -1536,15 +1639,12 @@ u_short port_to_connect) { int payload_len; + int type; + int success = 0; /* Record locally that connection to this host/port is permitted. */ if (num_permitted_opens >= SSH_MAX_FOR...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...1482,7 +1620,8 @@ } /* Allocate a channel number for the socket. */ ch = channel_new( - "port listener", SSH_CHANNEL_PORT_LISTENER, + "port listener", + ssh2_remote_fwd ? SSH2_CHANNEL_PORT_LISTENER : SSH_CHANNEL_PORT_LISTENER, sock, sock, -1, CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0, xstrdup("port listener")); @@ -1506,38 +1645,149 @@ u_short port_to_connect) { int payload_len; + int type; + int success = 0; + /* Record locally that connection to this host/port is permitted. */ if (num_permitted_opens >= SSH_MAX_FOR...
2004 Jan 19
3
Security suggestion concering SSH and port forwarding.
Hi, sorry if it is the wrong approuch to suggest improvments to OpenSSH, but here comes my suggestion: I recently stumbled upon the scponly shell which in it's chroot:ed form is an ideal solution when you want to share some files with people you trust more or less. The problem is, if you use the scponlyc as shell, port forwarding is still allowed. This can of course be dissallowed in
2010 Jan 14
1
ssh(1) multiplexing rewrite
...LENO) - close(fd); + if (listen(muxserver_sock, 64) == -1) + fatal("%s listen(): %s", __func__, strerror(errno)); + + set_nonblock(muxserver_sock); + + mux_listener_channel = channel_new("mux listener", + SSH_CHANNEL_MUX_LISTENER, muxserver_sock, muxserver_sock, -1, + CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, + 0, addr.sun_path, 1); + mux_listener_channel->mux_rcb = mux_master_read_cb; + debug3("%s: mux listener channel %d fd %d", __func__, + mux_listener_channel->self, mux_listener_channel->sock); +} + +/* Callback on open confirmation in mux master...