Displaying 12 results from an estimated 12 matches for "chan_tcp_window_default".
2002 Feb 06
15
[Bug 105] scp protocol 2 over a hippi interface takes 6 times longer
http://bugzilla.mindrot.org/show_bug.cgi?id=105
markus at openbsd.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |ASSIGNED
------- Additional Comments From markus at openbsd.org 2002-02-07 06:54 -------
could you please try this without scp? e.g.
2008 Apr 23
2
CHANNEL SIZE.
...onnect to the switches, however 4.6p1
would. The error I received was.
' channel 0: open failed: resource shortage: Channel open failed'
I did some diggin and noticed these two constants where changed between
4.6 and 4.7
#define CHAN_SES_WINDOW_DEFAULT (4*CHAN_SES_PACKET_DEFAULT)
#define CHAN_TCP_WINDOW_DEFAULT (4*CHAN_TCP_PACKET_DEFAULT)
Changing the new value of 64*, back to 4*, solved the issue.
- markus at cvs.openbsd.org 2007/06/11 09:14:00
[channels.h]
increase default channel windows; ok djm
Its probably an issue with our switches, but that is something I
probably cannot get rectif...
2011 Sep 08
1
Dynamic port remote listener - a BUG?
...debug("Allocated listen port %d",
*allocated_listen_port);
}
/* Allocate a channel number for the socket. */
c = channel_new("port listener", type, sock, sock, -1,
CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT,
0, "port listener", 1);
c->path = xstrdup(host);
c->host_port = port_to_connect;
c->listening_port = listen_port;
success = 1;
}
if (success == 0)...
2012 Oct 22
1
[PATCH] Implement remote dynamic TCP forwarding
...Channel *
+connect_to(const char *host, u_short port, char *ctype, char *rname)
+{
+ int sock;
+ struct channel_connect cctx;
+ Channel *c;
+
+ sock = connect_to_helper(host, port, &cctx);
+ if (sock == -1)
+ return NULL;
+
c = channel_new(ctype, SSH_CHANNEL_CONNECTING, sock, sock, -1,
CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0, rname, 1);
c->connect_ctx = cctx;
@@ -3347,6 +3479,10 @@ channel_connect_by_listen_address(u_short listen_port, char *ctype, char *rname)
for (i = 0; i < num_permitted_opens; i++) {
if (permitted_opens[i].host_to_connect != NULL &&
port_match...
2017 Oct 10
3
tunnel device name acquisition?
Numerous how-tos all over the Internet show how one would set up
a tunnel using ssh, e.g.:
ssh -f -o Tunnel=ethernet <server_ip> true
I was wondering if there's a way to subsequently acquire the names
of the local and remote tun/tap interfaces (e.g., using the default
"-w any:any") for subsequent automatic tunnel configuration, e.g.:
ip link set $TapDev up
ip link set
2006 Aug 25
2
RFC: non-root ssh tun access
...;);
+#if defined(SSH_TUN_LINUX)
+ if ((fd = tun_open(options.tun_local,
+ options.tun_open, original_real_uid)) >= 0) {
+#else
if ((fd = tun_open(options.tun_local,
options.tun_open)) >= 0) {
+#endif
c = channel_new("tun", SSH_CHANNEL_OPENING, fd, fd, -1,
CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT,
0, "tun", 1);
2005 Feb 24
7
Question performnace of SSH v1 vs SSH v2
Hello
I have ported OpenSSH 3.8p1 to a LynxOS platform. Recently I heard a
report from the field that v2 is perceived to be significantly slower
than v1. Is this a known issue? Are there any configuration parameters
that can be modified to make v2 faster?
Thanks in advance for your response
Amba
2008 Jun 19
5
Portforwarding using the control master.
Hi all,
currently I am considering writing a patch for OpenSSH that will allow
portforwarding using the control_master unix domain socket. The idea is
to introduce an extra SSHMUX command, SSHMUX_COMMAND_SOCKS, which will
then pass control to the normal socks functions used for dynamic
forwarding.
The main reason for me to write this patch are:
- some more control over who gets to connect to
2001 Feb 10
3
Protocol 2 remote forwarding patch
...512,7 +1614,8 @@
}
/* Allocate a channel number for the socket. */
ch = channel_new(
- "port listener", SSH_CHANNEL_PORT_LISTENER,
+ "port listener", ssh2_remote_fwd ?
+ SSH2_CHANNEL_PORT_LISTENER : SSH_CHANNEL_PORT_LISTENER,
sock, sock, -1,
CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT,
0, xstrdup("port listener"), 1);
@@ -1536,15 +1639,12 @@
u_short port_to_connect)
{
int payload_len;
+ int type;
+ int success = 0;
/* Record locally that connection to this host/port is permitted. */
if (num_permitted_opens >= SSH_MAX_FOR...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...1482,7 +1620,8 @@
}
/* Allocate a channel number for the socket. */
ch = channel_new(
- "port listener", SSH_CHANNEL_PORT_LISTENER,
+ "port listener",
+ ssh2_remote_fwd ? SSH2_CHANNEL_PORT_LISTENER : SSH_CHANNEL_PORT_LISTENER,
sock, sock, -1,
CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT,
0, xstrdup("port listener"));
@@ -1506,38 +1645,149 @@
u_short port_to_connect)
{
int payload_len;
+ int type;
+ int success = 0;
+
/* Record locally that connection to this host/port is permitted. */
if (num_permitted_opens >= SSH_MAX_FOR...
2004 Jan 19
3
Security suggestion concering SSH and port forwarding.
Hi,
sorry if it is the wrong approuch to suggest improvments to OpenSSH,
but here comes my suggestion:
I recently stumbled upon the scponly shell which in it's chroot:ed form is
an ideal solution when you want to share some files with people you trust
more or less.
The problem is, if you use the scponlyc as shell, port forwarding is still
allowed. This can of course be dissallowed in
2010 Jan 14
1
ssh(1) multiplexing rewrite
...LENO)
- close(fd);
+ if (listen(muxserver_sock, 64) == -1)
+ fatal("%s listen(): %s", __func__, strerror(errno));
+
+ set_nonblock(muxserver_sock);
+
+ mux_listener_channel = channel_new("mux listener",
+ SSH_CHANNEL_MUX_LISTENER, muxserver_sock, muxserver_sock, -1,
+ CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT,
+ 0, addr.sun_path, 1);
+ mux_listener_channel->mux_rcb = mux_master_read_cb;
+ debug3("%s: mux listener channel %d fd %d", __func__,
+ mux_listener_channel->self, mux_listener_channel->sock);
+}
+
+/* Callback on open confirmation in mux master...