search for: listen_host

Displaying 17 results from an estimated 17 matches for "listen_host".

2012 May 03
5
[PATCH/RFC 0/6] New mux client request to list open tcp forwardings.
These patches implement a new mux client request to list the currently opened TCP forwardings. It also removes some todos regarding keeping the list of forwardings in the options up-to-date. Bert Wesarg (6): attach the forwarding type to struct Forward merge local and remote forward lists generate unique ids for forwardings to be used for identification remove closed forwardings from
2004 Aug 05
1
LocalForward and RemoteForward bind patch
...-r openssh-3.8p1/channels.c openssh-3.8p1-localbind/channels.c --- openssh-3.8p1/channels.c 2004-01-20 16:02:09.000000000 -0800 +++ openssh-3.8p1-localbind/channels.c 2004-08-05 12:55:16.101830360 -0700 @@ -86,6 +86,7 @@ * network (which might be behind a firewall). */ typedef struct { + char *listen_host; /* Address to listen on */ char *host_to_connect; /* Connect to 'host'. */ u_short port_to_connect; /* Connect to 'port'. */ u_short listen_port; /* Remote side should listen port number. */ @@ -2146,8 +2147,7 @@ char ntop[NI_MAXHOST], strport[NI_MAXSERV]; success =...
2009 Jan 19
1
Bug CVE-2005-2797
...ated, GatewayPorts is also unconditionally enabled). I am trying to backport the fix for this from 4.2 to 4.0. I have been finding the difference between 4.2 and 4.1 and the only change that looks relevant to this bug, to me is the changes made in the file readconf.c with the following change +fwd.listen_host = NULL; -fwd.listen_host = ""; Could you please tell me if this was indeed the fix made for this bug? Or if there is a patch for this, could you please point me that patch? Thanks in advance. -karthik
2010 Jan 14
1
ssh(1) multiplexing rewrite
...ter) { - case SSHCTL_MASTER_AUTO: - case SSHCTL_MASTER_AUTO_ASK: - debug("auto-mux: Trying existing master"); - /* FALLTHROUGH */ - case SSHCTL_MASTER_NO: + switch (ftype) { + case MUX_FWD_LOCAL: + xasprintf(&ret, "local forward %.200s:%d -> %.200s:%d", + (fwd->listen_host == NULL) ? + (options.gateway_ports ? "*" : "LOCALHOST") : + fwd->listen_host, fwd->listen_port, + fwd->connect_host, fwd->connect_port); + break; + case MUX_FWD_DYNAMIC: + xasprintf(&ret, "dynamic forward %.200s:%d -> *", + (fw...
2002 Jan 05
2
new feature w/ patch
...Feature/channels.c Sat Jan 5 15:36:10 2002 @@ -2057,11 +2057,11 @@ * channel to host:port from remote side. */ int -channel_request_local_forwarding(u_short listen_port, const char *host_to_connect, - u_short port_to_connect, int gateway_ports) +channel_request_local_forwarding(const char *listen_host, u_short listen_port, + const char *host_to_connect, u_short port_to_connect, int gateway_ports) { return channel_request_forwarding( - NULL, listen_port, + listen_host, listen_port, host_to_connect, port_to_connect, gateway_ports, /*remote_fwd*/ 0); } @@ -2080,7 +2080,7...
2005 Mar 10
6
[Bug 996] Fatal error in xfree() when scp invokes ssh with a LocalForward config
...Forward 12345 localhost:54321 This seems to happen with ssh when scp invokes it to connect to the remote host, for example: % scp mindrot.org:.cshrc /dev/null xfree: NULL pointer given as argument gdb shows this happens on this line in readconf.c: xfree(options->local_forwards[i].listen_host); It's possible (perhaps likely) there are other similar problems in this routine. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2005 Jan 24
17
[Bug 413] Port forwarding: [localhost:]localport:remotehost:remoteport
http://bugzilla.mindrot.org/show_bug.cgi?id=413 ------- Additional Comments From dtucker at zip.com.au 2005-01-24 14:27 ------- Created an attachment (id=782) --> (http://bugzilla.mindrot.org/attachment.cgi?id=782&action=view) forward-bind.sh: regression test for binding port forwards to addresses Current limitations of test: - no testing of IPv6 - no testing of backwards compat
2007 Oct 22
3
[Bug 1379] New: memory leak in process_cmdline()
...rmal Priority: P3 Component: ssh AssignedTo: bitbucket at mindrot.org ReportedBy: Jan.Pechanec at Sun.COM Created an attachment (id=1366) --> (http://bugzilla.mindrot.org/attachment.cgi?id=1366) fix for the bug if anything goes wrong and Fwd was filled then listen_host/connect_host are not freed. patch attached. -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug.
2007 Oct 22
15
[Bug 1380] New: incorrect check for strlen(fwd->connect_host) in parse_forward()
...AssignedTo: bitbucket at mindrot.org ReportedBy: Jan.Pechanec at Sun.COM there are 2 issues for hostname len check in parse_forward() (a) the len is checked against NI_MAXHOST while it should be checked against (SSH_CHANNEL_PATH_LEN - 1). (b) the check should be also performed against listen_host when in remote fwd mode; otherwise hostname of any length is sent over The check against connect_host is already in channel_setup_fwd_listener(). I think that correct way is to remove the check from parse_forward() completely and put a new check against listen_host to channel_request_remote_forwar...
2015 May 30
2
FWD: enable forwarding to remote named sockets in ssh
...============================== RCS file: /cvs/src/usr.bin/ssh/channels.c,v retrieving revision 1.336 diff -u -p -r1.336 channels.c --- channels.c 15 Jul 2014 15:54:14 -0000 1.336 +++ channels.c 8 Aug 2014 20:31:29 -0000 @@ -2771,13 +2770,18 @@ channel_setup_fwd_listener_tcpip(int typ fwd->listen_host : fwd->connect_host; is_client = (type == SSH_CHANNEL_PORT_LISTENER); - if (host == NULL) { - error("No forward host name."); - return 0; - } - if (strlen(host) >= NI_MAXHOST) { - error("Forward host name too long."); - return 0; + if (type == SSH_CHANNEL_PORT_LIST...
2005 Apr 07
4
[Bug 1012] Trouble creating remote port forwarding to ssh.com 2.4.0 server.
http://bugzilla.mindrot.org/show_bug.cgi?id=1012 Summary: Trouble creating remote port forwarding to ssh.com 2.4.0 server. Product: Portable OpenSSH Version: 4.0p1 Platform: All OS/Version: All Status: NEW Keywords: patch Severity: normal Priority: P2 Component: ssh
2003 Jun 04
2
[Bug 413] Port forwarding: [localhost:]localport:remotehost:remoteport
http://bugzilla.mindrot.org/show_bug.cgi?id=413 dtucker at zip.com.au changed: What |Removed |Added ---------------------------------------------------------------------------- Attachment #229 is|0 |1 obsolete| | ------- Additional Comments From dtucker at zip.com.au 2003-06-04 21:37 -------
2005 Sep 01
1
[Bug 1077] Descriptions for "ssh -D" and DynamicForward should mention they can specify "bind_address" optionally
...atus: NEW Severity: trivial Priority: P5 Component: Documentation AssignedTo: bitbucket at mindrot.org ReportedBy: haruyama at queen-ml.org According to the source codes(readconf.c, ssh.c), "ssh -D" and DynamicForward can specify bind_address(listen_host) optionally, in addition to listen_port (like -L, -R, LocalForward and RemoteForward). But man pages don't mention that they can specify bind_address optionally. ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.
2008 Nov 23
4
[Bug 1539] New: double-free when failing to parse a forwarding specification given using ~C
...ed that ssh can be made to crash with a double-free as follows: % ssh somehost [...] % ~C ssh> -L *.80:localhost:80 Bad forwarding specification. *** glibc detected *** ssh: double free or corruption (fasttop): 0xb95431b0 *** This is because parse_forward frees fwd->connect_host and fwd->listen_host but doesn't set them to NULL, and so process_cmdline tries to free them again. Patch attached. -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching the assignee of the bug.
2009 Feb 17
2
Idea: reverse socks proxy
Hi, Just a usecase that I'm sure has been covered before but just in case its not an openssh solution would be very helpful. I was trying to install software on a server that was firewalled so no outbound http connections would work. I was also tunnelling via another server. Outbound ssh connections also were a convenient option. What would have been nice would be a remote version of
2012 Dec 21
0
File Attachments for previous bug report
...f_count <= 0) { TAILQ_REMOVE(&global_confirms, gc, entry); - bzero(gc, sizeof(*gc)); + memset(gc, 0, sizeof(*gc)); xfree(gc); } @@ -867,7 +867,7 @@ int cancel_port, ok; Forward fwd; - bzero(&fwd, sizeof(fwd)); + memset(&fwd, 0, sizeof(fwd)); fwd.listen_host = fwd.connect_host = NULL; leave_raw_mode(options.request_tty == REQUEST_TTY_FORCE); -------------- next part -------------- --- hostfile.c.orig 2012-12-19 17:19:15.393667218 -0800 +++ hostfile.c 2012-12-19 17:19:50.752556571 -0800 @@ -330,7 +330,7 @@ xfree(hostkeys->entries[i].host);...
2012 Dec 20
4
Deprecated calls to bzero() and index() found in OpenSSH 6.1p1
...gc, entry); - bzero(gc, sizeof(*gc)); + memset(gc, 0, sizeof(*gc)); xfree(gc); } @@ -867,7 +867,7 @@ int cancel_port, ok; Forward fwd; - bzero(&fwd, sizeof(fwd)); + memset(&fwd, 0, sizeof(fwd)); fwd.listen_host = fwd.connect_host = NULL; leave_raw_mode(options.request_tty == REQUEST_TTY_FORCE); In file 'hostfile.c', I've replaced the bzero() call with the equivalent memset() call. The patch file is below in (diff -u) format: --- hostfile.c.orig 2012-12-19 17:19:15.393667218 -080...