Displaying 17 results from an estimated 17 matches for "muxclient".
2014 Apr 01
1
[Bug 2219] New: Can't use -Ocancel on forward of dynamically allocated remote port
...there is no way to
cancel it afterward.
Example:
> ssh -Oforward -R 0:127.0.0.1:56789 user at remote
Allocated port 12345 for remote forward to 127.0.0.1:56789
12345
> ssh -Ocancel -R 0:127.0.0.1:56789 user at remote
mux_client_forward: forwarding request failed: port not in permitted
opens
muxclient: master cancel forward request failed
> ssh -Ocancel -R 12345:127.0.0.1:56789 user at remote
mux_client_forward: forwarding request failed: port not forwarded
muxclient: master cancel forward request failed
At least the second one should work, but OpenSSH doesn't check the
cancel request ag...
2014 Mar 28
1
Using -Ocancel on dynamically allocated ports
....1:56789 user at remote
But this is not so good:
> ssh -Oforward -R 0:127.0.0.1:56789 user at remote
Allocated port 12345 for remote forward to 127.0.0.1:56789
12345
> ssh -Ocancel -R 0:127.0.0.1:56789 user at remote
mux_client_forward: forwarding request failed: port not in permitted opens
muxclient: master cancel forward request failed
> ssh -Ocancel -R 12345:127.0.0.1:56789 user at remote
mux_client_forward: forwarding request failed: port not forwarded
muxclient: master cancel forward request failed
I'm not sure whether this is a "bug" or not, because I really don't
un...
2008 Jul 06
11
OpenSSH 5.1: call for testing
Hi,
OpenSSH 5.1 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This release is one of
the biggest in recent years, with two hackathons' worth of improvements
and fixes for some of our most recalcitrant bugs.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is
2011 Nov 01
7
[Bug 1948] New: ssh -f doesn't terminate when muxing connections.
...Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at mindrot.org
ReportedBy: peter.chubb at nicta.com.au
Created attachment 2101
--> https://bugzilla.mindrot.org/attachment.cgi?id=2101
Obey -f even when a muxclient.
To repeat:
Set up to use a master connection to some host. I have
Host *
ControlMaster auto
ControlPath /tmp/%r@%h:%p
in ~/.ssh/config
Then do:
ssh -f -X somehost xterm
ssh -f -X somehost xterm
The first invocation establishes a connexion, and starts a terminal,
then exits. T...
2010 Jun 04
2
[Bug 1775] New: RFE: Would like to use 'abstract' unix sockets for ControlPath
https://bugzilla.mindrot.org/show_bug.cgi?id=1775
Summary: RFE: Would like to use 'abstract' unix sockets for
ControlPath
Product: Portable OpenSSH
Version: 5.5p1
Platform: All
OS/Version: All
Status: NEW
Severity: enhancement
Priority: P2
Component: ssh
AssignedTo:
2009 Jul 08
4
Feature request: "SetupCommand" invoked before connecting
Hi,
(I'm not subscribed to the list, so please CC me on reply.)
I'd like to request adding a feature to OpenSSH:
Task:
~~~~~
It is quite sometime useful to invoke a program prior to connecting to
an ssh server. The most common use case will probably be port knocking.
That is a small program sends certain packets to a server and the server
reacts to this by unlocking the ssh port, which
2009 Feb 18
1
ssh -f & pid
...mac_spec] [-O ctl_cmd] [-o option] [-p port]\n"
" [-R [bind_address:]port:host:hostport] [-S ctl_path]\n"
" [-w local_tun[:remote_tun]] [user@]hostname [command]\n"
+" [-z pid_file]\n"
);
exit(255);
}
@@ -197,6 +201,26 @@
void muxclient(const char *);
void muxserver_listen(void);
+int write_pid_file(char *pid_file)
+{
+ char buffer[16];
+ int len;
+ int fd = open(pid_file, O_WRONLY | O_EXCL | O_CREAT, 0644);
+ if (fd == -1)
+ return -1;
+
+ len = snprintf(buffer, sizeof(buffer), "%d\n", getpid());
+ if (write(fd, buf...
2007 Jul 05
5
[Bug 1328] New: ControlClient uses wrong $DISPLAY.
http://bugzilla.mindrot.org/show_bug.cgi?id=1328
Summary: ControlClient uses wrong $DISPLAY.
Product: Portable OpenSSH
Version: 4.6p1
Platform: Other
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: bitbucket at mindrot.org
ReportedBy: dwmw2 at
2020 Mar 14
2
ssh -f and -O ControlPersist=yes, ControlMaster=yes leaves stderr open
...----------->snip<------------------------------------
static void control_persist_detach(void) {
[...]
switch ((pid = fork())) {
[...]
case 0:
/* Child: master process continues mainloop */
break;
default:
/* Parent: set up mux slave to connect to backgrounded master */
[...]
/* muxclient() doesn't return on success. */
fatal("Failed to connect to new control master");
}
[...]
keep_stderr = log_is_on_stderr() && debug_flag;
if (dup2(devnull, STDIN_FILENO) == -1 ||
dup2(devnull, STDOUT_FILENO) == -1 ||
(!keep_stderr && dup2(devnull, S...
2010 Feb 09
5
[Bug 1711] New: openssh-client: recreate mux control socket
...if it's dead before recreating the socket, and disable multiplexing
as before if it's still alive? That way there'd be no question about
whether it's appropriate to recreate the socket. You could do the same
kind of thing as 'ssh -O check' does.
===
It seems that ssh does muxclient() call before trying to create the new
socket, so this should not be issue, but please re-check this.
Thanks.
--
WBR, Andrew
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.
2007 Dec 31
28
[Bug 1424] New: Cannot signal a process over a channel (rfc 4254, section 6 .9)
https://bugzilla.mindrot.org/show_bug.cgi?id=1424
Summary: Cannot signal a process over a channel (rfc 4254,
section 6.9)
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.7p1
Platform: ix86
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sshd
2010 Jan 14
1
ssh(1) multiplexing rewrite
...tocol version */
-#define SSHMUX_VER 2
+#define SSHMUX_VER 4
/* Multiplexing control protocol flags */
#define SSHMUX_COMMAND_OPEN 1 /* Open new connection */
@@ -71,3 +71,4 @@ void client_register_global_confirm(glo
void muxserver_listen(void);
int muxserver_accept_control(void);
void muxclient(const char *);
+void mux_exit_message(Channel *, int);
Index: mux.c
===================================================================
RCS file: /cvs/src/usr.bin/ssh/mux.c,v
retrieving revision 1.9
diff -u -p -r1.9 mux.c
--- mux.c 9 Jan 2010 05:04:24 -0000 1.9
+++ mux.c 14 Jan 2010 03:07:49 -0000...
2011 Jan 07
1
[RFC/PATCH] ssh: config directive to modify the local environment
...ail "$tid"
+
+diff localenvmods.expect localenvmods.out || fail "$tid"
+
+# reset tid
+tid="localenvmod"
diff --git a/ssh.c b/ssh.c
index 9409fa7..48ba7b2 100644
--- a/ssh.c
+++ b/ssh.c
@@ -751,6 +751,63 @@ main(int ac, char **av)
if (options.control_path != NULL)
muxclient(options.control_path);
+ if (options.num_local_env_mods > 0) {
+ char thishost[NI_MAXHOST];
+
+ if (gethostname(thishost, sizeof(thishost)) == -1)
+ fatal("gethostname: %s", strerror(errno));
+ snprintf(buf, sizeof(buf), "%d", options.port);
+
+ for (i = 0; i < opt...
2015 Jul 29
2
[PATCH] ssh: Add option to present certificates on command line
...[user@]hostname [command]\n"
);
exit(255);
}
@@ -215,6 +216,7 @@ usage(void)
static int ssh_session(void);
static int ssh_session2(void);
static void load_public_identity_files(void);
+static void load_certificate_files(void);
static void main_sigchld_handler(int);
/* from muxclient.c */
@@ -595,7 +597,7 @@ main(int ac, char **av)
again:
while ((opt = getopt(ac, av, "1246ab:c:e:fgi:kl:m:no:p:qstvx"
- "ACD:E:F:GI:KL:MNO:PQ:R:S:TVw:W:XYy")) != -1) {
+ "ACD:E:F:GI:KL:MNO:PQ:R:S:TVw:W:XYyz:")) != -1) {
switch (opt) {
case '1...
2009 Feb 16
9
Call for testing: openssh-5.2
Hi,
OpenSSH 5.2 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This is primarily a bug-fix
release, to follow the feature-focused 5.1 release.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable
2020 Sep 21
4
Call for testing: OpenSSH 8.4
On Mon, 21 Sep 2020 at 09:53, Hisashi T Fujinaka <htodd at twofifty.com> wrote:
> OK, NetBSD-current amd64, NetBSD-9-amd64, and NetBSD-9-i386 all pass all
> tests. MacOS, well, I always try it but it has problems.
What's the problem on OS X? We test on it regularly (El Capitan and
High Sierra) and the only problem I'm aware of is that the native
libcrypto on High Sierra is
2020 May 12
9
Call for testing: OpenSSH 8.3
Hi,
OpenSSH 8.3p1 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This is a bugfix release.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH is also available via git using the
instructions at