Displaying 16 results from an estimated 16 matches for "clientspecified".
2010 Aug 07
7
[Bug 1804] New: ssh option -R 127.0.0.2:10443:<dest ip>:443 does not work
https://bugzilla.mindrot.org/show_bug.cgi?id=1804
Summary: ssh option -R 127.0.0.2:10443:<dest ip>:443 does not
work
Product: Portable OpenSSH
Version: 5.5p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: sshd
AssignedTo:
2010 Aug 14
1
bind_address ignored? as in "ssh -R [bind_address]:12491:127.0.0.1:500"
...to bind to non-loopback addresses, thus allowing other hosts to con-
? ? ? ? ? ? nect. ?The argument may be "no" to force remote port
forwardings to be available to the local host only, "yes" to force
remote
? ? ? ? ? ? port forwardings to bind to the wildcard address, or
"clientspecified" to allow the client to select the address to which
the
? ? ? ? ? ? forwarding is bound. ?The default is "no".
2015 Sep 26
5
[Bug 2473] New: sshd and -R port forwardings on 127.0.0.0/8
...rivkey -R 127.0.0.3:2222:127.0.0.1:22 user at host
client C is going to open a channel by:
autossh -i privkey -R 127.0.0.4:2222:127.0.0.1:22 user at host
But none of this clients is going to work this way as sshd is going to
force each socket to 127.0.0.1.
This works well if I set GatewayPorts to clientspecified.
The documentation states:
GatewayPorts can be used to specify that sshd should allow remote port
forwardings to bind to non-loopback addresses, thus allowing other
hosts to connect.
tl;dr;
Is it supposed by you to have sshd going to refuse a listening socket
on other lo addresses than 127.0.0...
2006 May 03
1
BUG: opens all interfaces.
Summary: the newish fourth forwarding argument does not correctly
specify the interface on the remote machine for a tunnel in -R
On OpenSSH_4.3p2 OpenSSL 0.9.7g 11 Apr 2005,
on Kanotix 2.9 kernel 2.6.16.2
and Cygwin 1.5.19(0.150/4/2)
and (old) FreeBSD 4.6-RELEASE
sshd_config file:
AllowTcpForwarding yes
GatewayPorts yes
Set up a forwarding tunnel:
From a Kanotix box inside my firewall:
2016 Jun 20
2
[Bug 2592] New: -R bind_address not working, always bind 0.0.0.0
https://bugzilla.mindrot.org/show_bug.cgi?id=2592
Bug ID: 2592
Summary: -R bind_address not working, always bind 0.0.0.0
Product: Portable OpenSSH
Version: 7.2p1
Hardware: amd64
OS: Linux
Status: NEW
Severity: normal
Priority: P5
Component: sshd
Assignee: unassigned-bugs at
2005 May 11
5
[Bug 1037] Man page for -L and -R should mention -g
http://bugzilla.mindrot.org/show_bug.cgi?id=1037
Summary: Man page for -L and -R should mention -g
Product: Portable OpenSSH
Version: 4.0p1
Platform: All
OS/Version: All
Status: NEW
Severity: trivial
Priority: P5
Component: Documentation
AssignedTo: bitbucket at mindrot.org
ReportedBy:
2013 Dec 19
3
[Bug 2189] New: Client fails to consider hostname when matching rfwd channel opens
...the current openssh client code doesn't actually try to match on
> the hostname at all when matching which remote listener it is -- it
> only matches on port! So, if you try to set up multiple listeners
> at once from a client on the same server-side port (by setting
> GatewayPorts=clientspecified in the server config and binding to
> different addresses), the client always matches on the first listener
> with that port, as seen in the following code snippet:
>
> Channel *
> channel_connect_by_listen_address(u_short listen_port, char *ctype, char *rname)
> {
> in...
2005 Mar 09
0
OpenSSH 4.0 released
...ssh_config(5) manpage. (Bugzilla #413)
* To control remote bindings while retaining backwards compatibility,
sshd(8)'s GatewayPorts option has been extended. To allow client
specified bind addresses for remote (-R) port forwardings, the server
must be configured with "GatewayPorts clientspecified".
* ssh(1) and ssh-keyscan(1) now support hashing of host names and
addresses added to known_hosts files, controlled by the ssh(1)
HashKnownHosts configuration directive. This option improves user
privacy by hiding which hosts have been visited. At present this
option is off by de...
2005 Mar 09
0
[djm@cvs.openbsd.org: OpenSSH 4.0 released]
...ssh_config(5) manpage. (Bugzilla #413)
* To control remote bindings while retaining backwards compatibility,
sshd(8)'s GatewayPorts option has been extended. To allow client
specified bind addresses for remote (-R) port forwardings, the server
must be configured with "GatewayPorts clientspecified".
* ssh(1) and ssh-keyscan(1) now support hashing of host names and
addresses added to known_hosts files, controlled by the ssh(1)
HashKnownHosts configuration directive. This option improves user
privacy by hiding which hosts have been visited. At present this
option is off by de...
2005 May 26
1
OpenSSH 4.1 released
...ssh_config(5) manpage. (Bugzilla #413)
* To control remote bindings while retaining backwards compatibility,
sshd(8)'s GatewayPorts option has been extended. To allow client
specified bind addresses for remote (-R) port forwardings, the server
must be configured with "GatewayPorts clientspecified".
* ssh(1) and ssh-keyscan(1) now support hashing of host names and
addresses added to known_hosts files, controlled by the ssh(1)
HashKnownHosts configuration directive. This option improves user
privacy by hiding which hosts have been visited. At present this
option is off by de...
2005 May 26
4
OpenSSH 4.1 released
...ssh_config(5) manpage. (Bugzilla #413)
* To control remote bindings while retaining backwards compatibility,
sshd(8)'s GatewayPorts option has been extended. To allow client
specified bind addresses for remote (-R) port forwardings, the server
must be configured with "GatewayPorts clientspecified".
* ssh(1) and ssh-keyscan(1) now support hashing of host names and
addresses added to known_hosts files, controlled by the ssh(1)
HashKnownHosts configuration directive. This option improves user
privacy by hiding which hosts have been visited. At present this
option is off by de...
2005 Mar 09
7
OpenSSH 4.0 released
...ssh_config(5) manpage. (Bugzilla #413)
* To control remote bindings while retaining backwards compatibility,
sshd(8)'s GatewayPorts option has been extended. To allow client
specified bind addresses for remote (-R) port forwardings, the server
must be configured with "GatewayPorts clientspecified".
* ssh(1) and ssh-keyscan(1) now support hashing of host names and
addresses added to known_hosts files, controlled by the ssh(1)
HashKnownHosts configuration directive. This option improves user
privacy by hiding which hosts have been visited. At present this
option is off by de...
2013 Aug 31
11
[Bug 2147] New: OpenSSH remote forwarding of dynamic ports doesn't work when you create more than one
https://bugzilla.mindrot.org/show_bug.cgi?id=2147
Bug ID: 2147
Summary: OpenSSH remote forwarding of dynamic ports doesn't
work when you create more than one
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
2005 Mar 02
12
Call for release testing
...ons in ssh_config(5). (Bugzilla #413)
* To control remote bindings while retaining backwards compatibility,
sshd(8)'s GatewayPorts option has been extended. To allow client
specified bind addresses for remote (-R) port forwardings, the server
must be configured with "GatewayPorts clientspecified".
* To support better selection of binding addresses for remote port
forwardings, sshd(8) now supports the new address specification
methods in draft-ietf-secsh-connect-24.txt section 7.1. In
particular, the empty "" address_to_bind is recognised as meaning
a wildcard bi...
2012 May 14
14
[Bug 2008] New: IPV6 Bind to port 22 failed
https://bugzilla.mindrot.org/show_bug.cgi?id=2008
Bug #: 2008
Summary: IPV6 Bind to port 22 failed
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.9p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: critical
Priority: P2
Component: sshd
AssignedTo:
2011 Jun 22
3
sandbox pre-auth privsep child
...return "UNKNOWN";
}
+ default:
+ switch (val) {
+ case -1:
+ return "unset";
+ case 0:
+ return "no";
+ case 1:
+ return "yes";
+ default:
+ return "UNKNOWN";
+ }
}
- if (code == sGatewayPorts && val == 2)
- return "clientspecified";
- if (code == sCompression && val == COMP_DELAYED)
- return "delayed";
- switch (val) {
- case -1:
- return "unset";
- case 0:
- return "no";
- case 1:
- return "yes";
- }
- return "UNKNOWN";
}
static const char *
Index: servc...