Displaying 6 results from an estimated 6 matches for "get_peer_ipaddr".
Did you mean:
get_peer_addr
2014 Jul 16
1
ssh - Connection closed by UNKNOWN
Hi,
ssh clients shows "closed by UNKNOWN" message when a socket is closed by a
remote side while ssh is waiting for user's password:
$ ssh user at localhost
user at localhost's password:
Connection closed by UNKNOWN
When the packet_read_seqnr() calls get_remote_ipaddr(), a connection's
socket is already closed and there's not been any other call of this function
yet
2002 Sep 21
4
OpenSSH -current fails regression on Solaris 8, sshd dumps core
...}
char *
Index: canohost.h
===================================================================
RCS file: /cvs/openssh/canohost.h,v
retrieving revision 1.8
diff -u -r1.8 canohost.h
--- canohost.h 4 Jul 2001 04:46:57 -0000 1.8
+++ canohost.h 21 Sep 2002 14:28:42 -0000
@@ -18,7 +18,7 @@
char *get_peer_ipaddr(int);
int get_peer_port(int);
-char *get_local_ipaddr(int);
+const char *get_local_ipaddr(void);
char *get_local_name(int);
int get_remote_port(void);
Index: session.c
===================================================================
RCS file: /cvs/openssh/session.c,v
retrieving revisi...
2001 Oct 13
0
local IP in environment
...57 2001
--- openssh-2.9.9p2/canohost.h Fri Oct 12 16:52:12 2001
***************
*** 14,19 ****
--- 14,20 ----
const char *get_canonical_hostname(int);
const char *get_remote_ipaddr(void);
+ const char *get_local_ipaddr2(void);
const char *get_remote_name_or_ip(u_int, int);
char *get_peer_ipaddr(int);
*** openssh-2.9.9p2/session.c.bak Sun Sep 16 15:17:15 2001
--- openssh-2.9.9p2/session.c Fri Oct 12 16:52:09 2001
***************
*** 1255,1260 ****
--- 1255,1263 ----
snprintf(buf, sizeof buf, "%.50s %d %d",
get_remote_ipaddr(), get_remote_port(), get_local_port());
chil...
2010 Jan 28
1
Possible issue with stdio forwarding
Greetings,
I've been doing a little testing with the stdio forwarding support added
in recent snapshots and have encountered one possible issue. First, I
should say that this feature generally seems to work. However, I haven't
been able to get it to work when connecting to a server running
SSH.COM's product.
The config file I am using is fairly simple:
Host sfe1
LogLevel debug3
2001 Nov 27
1
[PATCH] tcp-wrappers support extended to x11 forwards
...{
+ syslog(deny_severity, "refused fwd-X11 connect from %s", eval_client(&req));
+ close(newsock);
+
+ return;
+ }
+ syslog(allow_severity, "fwd-X11 connect from %s", eval_client(&req));
+
+ }
+#endif /* LIBWRAP */
+
remote_ipaddr = get_peer_ipaddr(newsock);
remote_port = get_peer_port(newsock);
snprintf(buf, sizeof buf, "X11 connection from %.200s port %d",
diff -u openssh-3.0.1p1/ssh-keyscan.c openssh-modified/ssh-keyscan.c
--- openssh-3.0.1p1/ssh-keyscan.c Wed Nov 14 23:40:45 2001
+++ openssh-modified/ssh-keyscan.c Mon Nov...
2005 Jun 09
3
[Bug 1054] Nmap Causing SSH Session to Prematurely End
...eply:
This appears to be a bug in OpenSSH, which only shows up when a TCP
connection to a forwarded port is closed extremely quickly after being
opened. The problem is here:
[channels.c]
static void
port_open_helper(Channel *c, char *rtype)
{
int direct;
char buf[1024];
char *remote_ipaddr = get_peer_ipaddr(c->sock);
>>>>>> u_short remote_port = get_peer_port(c->sock);
This is called very shortly after processing a connection opened on a
forwarded port, channel_post_port_listener(). I couldn't replicate this
by telnetting to the port, or even with a simple Perl program...