Displaying 14 results from an estimated 14 matches for "connect_host".
2012 May 03
5
[PATCH/RFC 0/6] New mux client request to list open tcp forwardings.
These patches implement a new mux client request to list the currently opened
TCP forwardings. It also removes some todos regarding keeping the list
of forwardings in the options up-to-date.
Bert Wesarg (6):
attach the forwarding type to struct Forward
merge local and remote forward lists
generate unique ids for forwardings to be used for identification
remove closed forwardings from
2007 Oct 22
15
[Bug 1380] New: incorrect check for strlen(fwd->connect_host) in parse_forward()
https://bugzilla.mindrot.org/show_bug.cgi?id=1380
Summary: incorrect check for strlen(fwd->connect_host) in
parse_forward()
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.7p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P3
Component: ssh
AssignedT...
2002 Jul 17
2
[Patch] SSH through HTTP proxy using CONNECT
...ssh/sshconnect.c src/sshconnect.c
--- /usr/src/crypto/openssh/sshconnect.c Thu Sep 27 18:33:35 2001
+++ src/sshconnect.c Wed Jul 17 16:14:44 2002
@@ -198,7 +198,9 @@
int gaierr;
int on = 1;
int sock = -1, attempt;
+ int connect_port;
char ntop[NI_MAXHOST], strport[NI_MAXSERV];
+ const char *connect_host;
struct addrinfo hints, *ai, *aitop;
struct linger linger;
struct servent *sp;
@@ -218,14 +220,21 @@
if (proxy_command != NULL)
return ssh_proxy_connect(host, port, pw, proxy_command);
- /* No proxy command. */
+ /* If an HTTP proxy is given, connect to it first. */
+ if (options.proxy...
2010 Jan 14
1
ssh(1) multiplexing rewrite
...ER_NO:
+ switch (ftype) {
+ case MUX_FWD_LOCAL:
+ xasprintf(&ret, "local forward %.200s:%d -> %.200s:%d",
+ (fwd->listen_host == NULL) ?
+ (options.gateway_ports ? "*" : "LOCALHOST") :
+ fwd->listen_host, fwd->listen_port,
+ fwd->connect_host, fwd->connect_port);
+ break;
+ case MUX_FWD_DYNAMIC:
+ xasprintf(&ret, "dynamic forward %.200s:%d -> *",
+ (fwd->listen_host == NULL) ?
+ (options.gateway_ports ? "*" : "LOCALHOST") :
+ fwd->listen_host, fwd->listen_port);
+ break...
2007 Oct 22
3
[Bug 1379] New: memory leak in process_cmdline()
...Priority: P3
Component: ssh
AssignedTo: bitbucket at mindrot.org
ReportedBy: Jan.Pechanec at Sun.COM
Created an attachment (id=1366)
--> (http://bugzilla.mindrot.org/attachment.cgi?id=1366)
fix for the bug
if anything goes wrong and Fwd was filled then listen_host/connect_host
are not freed.
patch attached.
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
2015 May 30
2
FWD: enable forwarding to remote named sockets in ssh
...========
RCS file: /cvs/src/usr.bin/ssh/channels.c,v
retrieving revision 1.336
diff -u -p -r1.336 channels.c
--- channels.c 15 Jul 2014 15:54:14 -0000 1.336
+++ channels.c 8 Aug 2014 20:31:29 -0000
@@ -2771,13 +2770,18 @@ channel_setup_fwd_listener_tcpip(int typ
fwd->listen_host : fwd->connect_host;
is_client = (type == SSH_CHANNEL_PORT_LISTENER);
- if (host == NULL) {
- error("No forward host name.");
- return 0;
- }
- if (strlen(host) >= NI_MAXHOST) {
- error("Forward host name too long.");
- return 0;
+ if (type == SSH_CHANNEL_PORT_LISTENER &&
+ f...
2011 Dec 30
7
[Bug 1967] New: Potential memory leak
https://bugzilla.mindrot.org/show_bug.cgi?id=1967
Bug #: 1967
Summary: Potential memory leak
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.9p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at
2008 Nov 23
4
[Bug 1539] New: double-free when failing to parse a forwarding specification given using ~C
...ls
Arthur de Jong reported that ssh can be made to crash with a
double-free as follows:
% ssh somehost
[...]
% ~C
ssh> -L *.80:localhost:80
Bad forwarding specification.
*** glibc detected *** ssh: double free or corruption (fasttop):
0xb95431b0 ***
This is because parse_forward frees fwd->connect_host and
fwd->listen_host but doesn't set them to NULL, and so process_cmdline
tries to free them again. Patch attached.
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
2017 Jun 16
2
[PATCH] allow relative path in streamlocal forwarding
...t before bind */
+ char *streamlocal_bind_root_directory;
};
/* misc.c */
diff --git a/readconf.c b/readconf.c
index b11c628..13ab320 100644
--- a/readconf.c
+++ b/readconf.c
@@ -2234,6 +2234,22 @@ parse_forward(struct Forward *fwd, const char *fwdspec, int dynamicfwd, int remo
if (fwd->connect_host != NULL &&
strlen(fwd->connect_host) >= NI_MAXHOST)
goto fail_free;
+ /* The path starting with "./" means that it will be resolved
+ * on the server side */
+ if (!dynamicfwd) {
+ if (!remotefwd && fwd->connect_path != NULL &&
+ strncmp(fw...
2019 Jun 07
1
Problem with opusfile & ndk
Hi Xiph.org Team.
We are using opusfile library <https://github.com/xiph/opusfile> for
streaming *.opus* audio in our projects.
But now we have a problem with building opusfile library for android with
*ndk-build*.
In particular, with arm64-v8a platform: Google removed <sys/timeb.h> from
android.
And now building opusfile with nkd-build crashes with error "fatal error:
2011 Jan 07
1
[RFC/PATCH] ssh: config directive to modify the local environment
...len == 0)
+ return 0;
+
+ mod->name = xstrdup(cp);
+ mod->value = xstrdup(eq);
+
+ xfree(p);
+
+ return 1;
+}
diff --git a/readconf.h b/readconf.h
index ee160df..166631f 100644
--- a/readconf.h
+++ b/readconf.h
@@ -25,6 +25,13 @@ typedef struct {
int connect_port; /* Port to connect on connect_host. */
int allocated_port; /* Dynamically allocated listen port */
} Forward;
+/* Data structure for representing a local env modification. */
+
+typedef struct {
+ char *name; /* The name of the variable. */
+ int operation; /* The operation (\0 for set, other chars for append with thi...
2012 Dec 21
0
File Attachments for previous bug report
...TAILQ_REMOVE(&global_confirms, gc, entry);
- bzero(gc, sizeof(*gc));
+ memset(gc, 0, sizeof(*gc));
xfree(gc);
}
@@ -867,7 +867,7 @@
int cancel_port, ok;
Forward fwd;
- bzero(&fwd, sizeof(fwd));
+ memset(&fwd, 0, sizeof(fwd));
fwd.listen_host = fwd.connect_host = NULL;
leave_raw_mode(options.request_tty == REQUEST_TTY_FORCE);
-------------- next part --------------
--- hostfile.c.orig 2012-12-19 17:19:15.393667218 -0800
+++ hostfile.c 2012-12-19 17:19:50.752556571 -0800
@@ -330,7 +330,7 @@
xfree(hostkeys->entries[i].host);
xfree(hostkeys->...
2002 May 11
4
socks5 support
> Winton--
>
> Excellent! Absolutely wonderful.
>
> I'm wondering which apps/encapsulators support 4A? This gets me
> around
> the DNS leakage problem quite nicely.
>
> Incidentally, we do need SOCKS5 support -- if for no other
> reason, the
> fact that there's *operating system* level support in OSX for SOCKS5
> redirection. So
2012 Dec 20
4
Deprecated calls to bzero() and index() found in OpenSSH 6.1p1
...bzero(gc, sizeof(*gc));
+ memset(gc, 0, sizeof(*gc));
xfree(gc);
}
@@ -867,7 +867,7 @@
int cancel_port, ok;
Forward fwd;
- bzero(&fwd, sizeof(fwd));
+ memset(&fwd, 0, sizeof(fwd));
fwd.listen_host = fwd.connect_host = NULL;
leave_raw_mode(options.request_tty == REQUEST_TTY_FORCE);
In file 'hostfile.c', I've replaced the bzero() call with
the equivalent memset() call. The patch file is below in
(diff -u) format:
--- hostfile.c.orig 2012-12-19 17:19:15.393667218 -0800
+++ hostfile.c 2...