Displaying 17 results from an estimated 17 matches for "parse_forward".
2012 May 03
5
[PATCH/RFC 0/6] New mux client request to list open tcp forwardings.
These patches implement a new mux client request to list the currently opened
TCP forwardings. It also removes some todos regarding keeping the list
of forwardings in the options up-to-date.
Bert Wesarg (6):
attach the forwarding type to struct Forward
merge local and remote forward lists
generate unique ids for forwardings to be used for identification
remove closed forwardings from
2007 Oct 22
2
[Bug 1378] New: incorrect port check in parse_forward()
https://bugzilla.mindrot.org/show_bug.cgi?id=1378
Summary: incorrect port check in parse_forward()
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.7p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P3
Component: ssh
AssignedTo: bitbucket at mindrot.org
Re...
2007 Oct 22
15
[Bug 1380] New: incorrect check for strlen(fwd->connect_host) in parse_forward()
https://bugzilla.mindrot.org/show_bug.cgi?id=1380
Summary: incorrect check for strlen(fwd->connect_host) in
parse_forward()
Classification: Unclassified
Product: Portable OpenSSH
Version: 4.7p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P3
Component: ssh
AssignedTo: bitbucket at mindrot.org
Re...
2009 Feb 17
2
Idea: reverse socks proxy
Hi,
Just a usecase that I'm sure has been covered before but just in case
its not an openssh solution would be very helpful.
I was trying to install software on a server that was firewalled so no
outbound http connections would work. I was also tunnelling via
another server. Outbound ssh connections also were a convenient option.
What would have been nice would be a remote version of
2002 Nov 21
3
[Bug 413] Port forwarding: [localhost:]localport:remotehost:remoteport
http://bugzilla.mindrot.org/show_bug.cgi?id=413
markus at openbsd.org changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |sjc at makalumedia.com
------- Additional Comments From markus at openbsd.org 2002-11-22 09:48 -------
*** Bug 441 has been marked as
2012 Oct 22
1
[PATCH] Implement remote dynamic TCP forwarding
...HANNEL_RDYNAMIC 17 /* reversed SSH_CHANNEL_DYNAMIC */
+#define SSH_CHANNEL_MAX_TYPE 18
#define CHANNEL_CANCEL_PORT_STATIC -1
diff --git a/ssh.c b/ssh.c
index 3f61eb0..a407aaa 100644
--- a/ssh.c
+++ b/ssh.c
@@ -549,7 +549,8 @@ main(int ac, char **av)
break;
case 'R':
- if (parse_forward(&fwd, optarg, 0, 1)) {
+ if (parse_forward(&fwd, optarg, 1, 1) ||
+ parse_forward(&fwd, optarg, 0, 1)) {
add_remote_forward(&options, &fwd);
} else {
fprintf(stderr,
--
1.7.12.3
2011 Dec 30
7
[Bug 1967] New: Potential memory leak
https://bugzilla.mindrot.org/show_bug.cgi?id=1967
Bug #: 1967
Summary: Potential memory leak
Classification: Unclassified
Product: Portable OpenSSH
Version: 5.9p1
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: unassigned-bugs at
2006 Apr 18
0
SSH_CHANNEL_UNIX_LISTENER
I'm creating a patch to support Unix domain socket forwarding. I hadn't
intended to initally support specifying remote Unix domain sockets (#ifdef'd
that code out in the parse_forward() work), but now that I've gotten as far
as channel_setup_fwd_listener() it seems like it makes sense to add the
support now, rather than later. Any comments on adding to channels.h
the following (w/ accompanying support)?
#define SSH_CHANNEL_UNIX_LISTENER 15
#define SSH_CHANNEL_RUNIX_LISTENER...
2008 Nov 23
4
[Bug 1539] New: double-free when failing to parse a forwarding specification given using ~C
...forwarding specification fails
Arthur de Jong reported that ssh can be made to crash with a
double-free as follows:
% ssh somehost
[...]
% ~C
ssh> -L *.80:localhost:80
Bad forwarding specification.
*** glibc detected *** ssh: double free or corruption (fasttop):
0xb95431b0 ***
This is because parse_forward frees fwd->connect_host and
fwd->listen_host but doesn't set them to NULL, and so process_cmdline
tries to free them again. Patch attached.
--
Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching th...
2003 Feb 03
8
[Bug 413] Port forwarding: [localhost:]localport:remotehost:remoteport
http://bugzilla.mindrot.org/show_bug.cgi?id=413
markus at openbsd.org changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |ASSIGNED
------- Additional Comments From markus at openbsd.org 2003-02-03 19:50 -------
i'll look into this.
------- You are
2011 Jan 07
1
[RFC/PATCH] ssh: config directive to modify the local environment
...@@ -1157,6 +1243,8 @@ initialize_options(Options * options)
options->zero_knowledge_password_authentication = -1;
options->ip_qos_interactive = -1;
options->ip_qos_bulk = -1;
+ options->local_env_mods = NULL;
+ options->num_local_env_mods = 0;
}
/*
@@ -1420,3 +1508,85 @@ parse_forward(Forward *fwd, const char *fwdspec, int dynamicfwd, int remotefwd)
}
return (0);
}
+
+/*
+ * variablename[whitespace][{+,%}[separator]]=[whitespace]value
+ * value may be optional for set command (ie. w/o +)
+ * SSHFS_MOUNT += mars-fastfs:/fastfs
+ * SOME_PATH +:= /some/bin
+ * SOME_PATH %:= /s...
2024 May 06
1
Feature request/EOI: Match interactive config?
... and I guess your next question will be about compilation environment, so:
```
$ gcc --version
gcc (Gentoo 13.2.1_p20240210 p14) 13.2.1 20240210
Copyright (C) 2023 Free Software Foundation, Inc.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
```
I'm running on gentoo. I tested that the
2024 May 06
1
Feature request/EOI: Match interactive config?
...har *, char *, const char *, int, int *, int);
+ const char *, struct sshbuf *, char *, const char *, int, int *, int);
int read_config_file(const char *, struct passwd *, const char *,
- const char *, Options *, int, int *);
+ const char *, struct sshbuf *, Options *, int, int *);
int parse_forward(struct Forward *, const char *, int, int);
int parse_jump(const char *, Options *, int);
int parse_ssh_uri(const char *, char **, char **, int *);
diff --git a/ssh-keysign.c b/ssh-keysign.c
index 968344e79..4913b540d 100644
--- a/ssh-keysign.c
+++ b/ssh-keysign.c
@@ -222,7 +222,7 @@ main(int ar...
2024 May 06
3
Feature request/EOI: Match interactive config?
...har *, char *, const char *, int, int *, int);
+ const char *, struct sshbuf *, char *, const char *, int, int *, int);
int read_config_file(const char *, struct passwd *, const char *,
- const char *, Options *, int, int *);
+ const char *, struct sshbuf *, Options *, int, int *);
int parse_forward(struct Forward *, const char *, int, int);
int parse_jump(const char *, Options *, int);
int parse_ssh_uri(const char *, char **, char **, int *);
diff --git a/ssh-keysign.c b/ssh-keysign.c
index 968344e79..4913b540d 100644
--- a/ssh-keysign.c
+++ b/ssh-keysign.c
@@ -222,7 +222,7 @@ main(int ar...
2017 Jun 16
2
[PATCH] allow relative path in streamlocal forwarding
...al_bind_mask; /* umask for streamlocal binds */
int streamlocal_bind_unlink; /* unlink socket before bind */
+ char *streamlocal_bind_root_directory;
};
/* misc.c */
diff --git a/readconf.c b/readconf.c
index b11c628..13ab320 100644
--- a/readconf.c
+++ b/readconf.c
@@ -2234,6 +2234,22 @@ parse_forward(struct Forward *fwd, const char *fwdspec, int dynamicfwd, int remo
if (fwd->connect_host != NULL &&
strlen(fwd->connect_host) >= NI_MAXHOST)
goto fail_free;
+ /* The path starting with "./" means that it will be resolved
+ * on the server side */
+ if (!dynami...
2024 May 04
3
Feature request/EOI: Match interactive config?
Hey there,
I often want different behavior in my ssh client depending on whether I'm logging into an interactive session or running a remote non-interactive command. We can see at, say, https://unix.stackexchange.com/a/499562/305714 that this isn't a unique wish, and existing solutions are kind of baroque. Typical reasons to do this are to immediately go into a screen or tmux session; for
2010 Aug 09
8
Call for testing: OpenSSH-5.6
Hi,
OpenSSH 5.6 is almost ready for release, so we would appreciate testing
on as many platforms and systems as possible. This is a moderately large
release, with a number of new features and bug fixes.
Snapshot releases for portable OpenSSH are available from
http://www.mindrot.org/openssh_snap/
The OpenBSD version is available in CVS HEAD:
http://www.openbsd.org/anoncvs.html
Portable OpenSSH