search for: clientspecifi

Displaying 16 results from an estimated 16 matches for "clientspecifi".

Did you mean: clientspecified
2010 Aug 07
7
[Bug 1804] New: ssh option -R 127.0.0.2:10443:<dest ip>:443 does not work
https://bugzilla.mindrot.org/show_bug.cgi?id=1804 Summary: ssh option -R 127.0.0.2:10443:<dest ip>:443 does not work Product: Portable OpenSSH Version: 5.5p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: sshd AssignedTo:
2010 Aug 14
1
bind_address ignored? as in "ssh -R [bind_address]:12491:127.0.0.1:500"
...to bind to non-loopback addresses, thus allowing other hosts to con- ? ? ? ? ? ? nect. ?The argument may be "no" to force remote port forwardings to be available to the local host only, "yes" to force remote ? ? ? ? ? ? port forwardings to bind to the wildcard address, or "clientspecified" to allow the client to select the address to which the ? ? ? ? ? ? forwarding is bound. ?The default is "no".
2015 Sep 26
5
[Bug 2473] New: sshd and -R port forwardings on 127.0.0.0/8
...rivkey -R 127.0.0.3:2222:127.0.0.1:22 user at host client C is going to open a channel by: autossh -i privkey -R 127.0.0.4:2222:127.0.0.1:22 user at host But none of this clients is going to work this way as sshd is going to force each socket to 127.0.0.1. This works well if I set GatewayPorts to clientspecified. The documentation states: GatewayPorts can be used to specify that sshd should allow remote port forwardings to bind to non-loopback addresses, thus allowing other hosts to connect. tl;dr; Is it supposed by you to have sshd going to refuse a listening socket on other lo addresses than 127.0...
2006 May 03
1
BUG: opens all interfaces.
Summary: the newish fourth forwarding argument does not correctly specify the interface on the remote machine for a tunnel in -R On OpenSSH_4.3p2 OpenSSL 0.9.7g 11 Apr 2005, on Kanotix 2.9 kernel 2.6.16.2 and Cygwin 1.5.19(0.150/4/2) and (old) FreeBSD 4.6-RELEASE sshd_config file: AllowTcpForwarding yes GatewayPorts yes Set up a forwarding tunnel: From a Kanotix box inside my firewall:
2016 Jun 20
2
[Bug 2592] New: -R bind_address not working, always bind 0.0.0.0
https://bugzilla.mindrot.org/show_bug.cgi?id=2592 Bug ID: 2592 Summary: -R bind_address not working, always bind 0.0.0.0 Product: Portable OpenSSH Version: 7.2p1 Hardware: amd64 OS: Linux Status: NEW Severity: normal Priority: P5 Component: sshd Assignee: unassigned-bugs at
2005 May 11
5
[Bug 1037] Man page for -L and -R should mention -g
http://bugzilla.mindrot.org/show_bug.cgi?id=1037 Summary: Man page for -L and -R should mention -g Product: Portable OpenSSH Version: 4.0p1 Platform: All OS/Version: All Status: NEW Severity: trivial Priority: P5 Component: Documentation AssignedTo: bitbucket at mindrot.org ReportedBy:
2013 Dec 19
3
[Bug 2189] New: Client fails to consider hostname when matching rfwd channel opens
...the current openssh client code doesn't actually try to match on > the hostname at all when matching which remote listener it is -- it > only matches on port! So, if you try to set up multiple listeners > at once from a client on the same server-side port (by setting > GatewayPorts=clientspecified in the server config and binding to > different addresses), the client always matches on the first listener > with that port, as seen in the following code snippet: > > Channel * > channel_connect_by_listen_address(u_short listen_port, char *ctype, char *rname) > { >...
2005 Mar 09
0
OpenSSH 4.0 released
...ssh_config(5) manpage. (Bugzilla #413) * To control remote bindings while retaining backwards compatibility, sshd(8)'s GatewayPorts option has been extended. To allow client specified bind addresses for remote (-R) port forwardings, the server must be configured with "GatewayPorts clientspecified". * ssh(1) and ssh-keyscan(1) now support hashing of host names and addresses added to known_hosts files, controlled by the ssh(1) HashKnownHosts configuration directive. This option improves user privacy by hiding which hosts have been visited. At present this option is off by...
2005 Mar 09
0
[djm@cvs.openbsd.org: OpenSSH 4.0 released]
...ssh_config(5) manpage. (Bugzilla #413) * To control remote bindings while retaining backwards compatibility, sshd(8)'s GatewayPorts option has been extended. To allow client specified bind addresses for remote (-R) port forwardings, the server must be configured with "GatewayPorts clientspecified". * ssh(1) and ssh-keyscan(1) now support hashing of host names and addresses added to known_hosts files, controlled by the ssh(1) HashKnownHosts configuration directive. This option improves user privacy by hiding which hosts have been visited. At present this option is off by...
2005 May 26
1
OpenSSH 4.1 released
...ssh_config(5) manpage. (Bugzilla #413) * To control remote bindings while retaining backwards compatibility, sshd(8)'s GatewayPorts option has been extended. To allow client specified bind addresses for remote (-R) port forwardings, the server must be configured with "GatewayPorts clientspecified". * ssh(1) and ssh-keyscan(1) now support hashing of host names and addresses added to known_hosts files, controlled by the ssh(1) HashKnownHosts configuration directive. This option improves user privacy by hiding which hosts have been visited. At present this option is off by...
2005 May 26
4
OpenSSH 4.1 released
...ssh_config(5) manpage. (Bugzilla #413) * To control remote bindings while retaining backwards compatibility, sshd(8)'s GatewayPorts option has been extended. To allow client specified bind addresses for remote (-R) port forwardings, the server must be configured with "GatewayPorts clientspecified". * ssh(1) and ssh-keyscan(1) now support hashing of host names and addresses added to known_hosts files, controlled by the ssh(1) HashKnownHosts configuration directive. This option improves user privacy by hiding which hosts have been visited. At present this option is off by...
2005 Mar 09
7
OpenSSH 4.0 released
...ssh_config(5) manpage. (Bugzilla #413) * To control remote bindings while retaining backwards compatibility, sshd(8)'s GatewayPorts option has been extended. To allow client specified bind addresses for remote (-R) port forwardings, the server must be configured with "GatewayPorts clientspecified". * ssh(1) and ssh-keyscan(1) now support hashing of host names and addresses added to known_hosts files, controlled by the ssh(1) HashKnownHosts configuration directive. This option improves user privacy by hiding which hosts have been visited. At present this option is off by...
2013 Aug 31
11
[Bug 2147] New: OpenSSH remote forwarding of dynamic ports doesn't work when you create more than one
https://bugzilla.mindrot.org/show_bug.cgi?id=2147 Bug ID: 2147 Summary: OpenSSH remote forwarding of dynamic ports doesn't work when you create more than one Product: Portable OpenSSH Version: -current Hardware: All OS: All Status: NEW Severity: normal Priority: P5
2005 Mar 02
12
Call for release testing
...ons in ssh_config(5). (Bugzilla #413) * To control remote bindings while retaining backwards compatibility, sshd(8)'s GatewayPorts option has been extended. To allow client specified bind addresses for remote (-R) port forwardings, the server must be configured with "GatewayPorts clientspecified". * To support better selection of binding addresses for remote port forwardings, sshd(8) now supports the new address specification methods in draft-ietf-secsh-connect-24.txt section 7.1. In particular, the empty "" address_to_bind is recognised as meaning a wildcard...
2012 May 14
14
[Bug 2008] New: IPV6 Bind to port 22 failed
https://bugzilla.mindrot.org/show_bug.cgi?id=2008 Bug #: 2008 Summary: IPV6 Bind to port 22 failed Classification: Unclassified Product: Portable OpenSSH Version: 5.9p1 Platform: ix86 OS/Version: Linux Status: NEW Severity: critical Priority: P2 Component: sshd AssignedTo:
2011 Jun 22
3
sandbox pre-auth privsep child
...return "UNKNOWN"; } + default: + switch (val) { + case -1: + return "unset"; + case 0: + return "no"; + case 1: + return "yes"; + default: + return "UNKNOWN"; + } } - if (code == sGatewayPorts && val == 2) - return "clientspecified"; - if (code == sCompression && val == COMP_DELAYED) - return "delayed"; - switch (val) { - case -1: - return "unset"; - case 0: - return "no"; - case 1: - return "yes"; - } - return "UNKNOWN"; } static const char * Index: ser...