search for: parse_forward

Displaying 17 results from an estimated 17 matches for "parse_forward".

2012 May 03
5
[PATCH/RFC 0/6] New mux client request to list open tcp forwardings.
These patches implement a new mux client request to list the currently opened TCP forwardings. It also removes some todos regarding keeping the list of forwardings in the options up-to-date. Bert Wesarg (6): attach the forwarding type to struct Forward merge local and remote forward lists generate unique ids for forwardings to be used for identification remove closed forwardings from
2007 Oct 22
2
[Bug 1378] New: incorrect port check in parse_forward()
https://bugzilla.mindrot.org/show_bug.cgi?id=1378 Summary: incorrect port check in parse_forward() Classification: Unclassified Product: Portable OpenSSH Version: 4.7p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P3 Component: ssh AssignedTo: bitbucket at mindrot.org Re...
2007 Oct 22
15
[Bug 1380] New: incorrect check for strlen(fwd->connect_host) in parse_forward()
https://bugzilla.mindrot.org/show_bug.cgi?id=1380 Summary: incorrect check for strlen(fwd->connect_host) in parse_forward() Classification: Unclassified Product: Portable OpenSSH Version: 4.7p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P3 Component: ssh AssignedTo: bitbucket at mindrot.org Re...
2009 Feb 17
2
Idea: reverse socks proxy
Hi, Just a usecase that I'm sure has been covered before but just in case its not an openssh solution would be very helpful. I was trying to install software on a server that was firewalled so no outbound http connections would work. I was also tunnelling via another server. Outbound ssh connections also were a convenient option. What would have been nice would be a remote version of
2002 Nov 21
3
[Bug 413] Port forwarding: [localhost:]localport:remotehost:remoteport
http://bugzilla.mindrot.org/show_bug.cgi?id=413 markus at openbsd.org changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |sjc at makalumedia.com ------- Additional Comments From markus at openbsd.org 2002-11-22 09:48 ------- *** Bug 441 has been marked as
2012 Oct 22
1
[PATCH] Implement remote dynamic TCP forwarding
...HANNEL_RDYNAMIC 17 /* reversed SSH_CHANNEL_DYNAMIC */ +#define SSH_CHANNEL_MAX_TYPE 18 #define CHANNEL_CANCEL_PORT_STATIC -1 diff --git a/ssh.c b/ssh.c index 3f61eb0..a407aaa 100644 --- a/ssh.c +++ b/ssh.c @@ -549,7 +549,8 @@ main(int ac, char **av) break; case 'R': - if (parse_forward(&fwd, optarg, 0, 1)) { + if (parse_forward(&fwd, optarg, 1, 1) || + parse_forward(&fwd, optarg, 0, 1)) { add_remote_forward(&options, &fwd); } else { fprintf(stderr, -- 1.7.12.3
2011 Dec 30
7
[Bug 1967] New: Potential memory leak
https://bugzilla.mindrot.org/show_bug.cgi?id=1967 Bug #: 1967 Summary: Potential memory leak Classification: Unclassified Product: Portable OpenSSH Version: 5.9p1 Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: ssh AssignedTo: unassigned-bugs at
2006 Apr 18
0
SSH_CHANNEL_UNIX_LISTENER
I'm creating a patch to support Unix domain socket forwarding. I hadn't intended to initally support specifying remote Unix domain sockets (#ifdef'd that code out in the parse_forward() work), but now that I've gotten as far as channel_setup_fwd_listener() it seems like it makes sense to add the support now, rather than later. Any comments on adding to channels.h the following (w/ accompanying support)? #define SSH_CHANNEL_UNIX_LISTENER 15 #define SSH_CHANNEL_RUNIX_LISTENER...
2008 Nov 23
4
[Bug 1539] New: double-free when failing to parse a forwarding specification given using ~C
...forwarding specification fails Arthur de Jong reported that ssh can be made to crash with a double-free as follows: % ssh somehost [...] % ~C ssh> -L *.80:localhost:80 Bad forwarding specification. *** glibc detected *** ssh: double free or corruption (fasttop): 0xb95431b0 *** This is because parse_forward frees fwd->connect_host and fwd->listen_host but doesn't set them to NULL, and so process_cmdline tries to free them again. Patch attached. -- Configure bugmail: https://bugzilla.mindrot.org/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are watching th...
2003 Feb 03
8
[Bug 413] Port forwarding: [localhost:]localport:remotehost:remoteport
http://bugzilla.mindrot.org/show_bug.cgi?id=413 markus at openbsd.org changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |ASSIGNED ------- Additional Comments From markus at openbsd.org 2003-02-03 19:50 ------- i'll look into this. ------- You are
2011 Jan 07
1
[RFC/PATCH] ssh: config directive to modify the local environment
...@@ -1157,6 +1243,8 @@ initialize_options(Options * options) options->zero_knowledge_password_authentication = -1; options->ip_qos_interactive = -1; options->ip_qos_bulk = -1; + options->local_env_mods = NULL; + options->num_local_env_mods = 0; } /* @@ -1420,3 +1508,85 @@ parse_forward(Forward *fwd, const char *fwdspec, int dynamicfwd, int remotefwd) } return (0); } + +/* + * variablename[whitespace][{+,%}[separator]]=[whitespace]value + * value may be optional for set command (ie. w/o +) + * SSHFS_MOUNT += mars-fastfs:/fastfs + * SOME_PATH +:= /some/bin + * SOME_PATH %:= /s...
2024 May 06
1
Feature request/EOI: Match interactive config?
... and I guess your next question will be about compilation environment, so: ``` $ gcc --version gcc (Gentoo 13.2.1_p20240210 p14) 13.2.1 20240210 Copyright (C) 2023 Free Software Foundation, Inc. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. ``` I'm running on gentoo. I tested that the
2024 May 06
1
Feature request/EOI: Match interactive config?
...har *, char *, const char *, int, int *, int); + const char *, struct sshbuf *, char *, const char *, int, int *, int); int read_config_file(const char *, struct passwd *, const char *, - const char *, Options *, int, int *); + const char *, struct sshbuf *, Options *, int, int *); int parse_forward(struct Forward *, const char *, int, int); int parse_jump(const char *, Options *, int); int parse_ssh_uri(const char *, char **, char **, int *); diff --git a/ssh-keysign.c b/ssh-keysign.c index 968344e79..4913b540d 100644 --- a/ssh-keysign.c +++ b/ssh-keysign.c @@ -222,7 +222,7 @@ main(int ar...
2024 May 06
3
Feature request/EOI: Match interactive config?
...har *, char *, const char *, int, int *, int); + const char *, struct sshbuf *, char *, const char *, int, int *, int); int read_config_file(const char *, struct passwd *, const char *, - const char *, Options *, int, int *); + const char *, struct sshbuf *, Options *, int, int *); int parse_forward(struct Forward *, const char *, int, int); int parse_jump(const char *, Options *, int); int parse_ssh_uri(const char *, char **, char **, int *); diff --git a/ssh-keysign.c b/ssh-keysign.c index 968344e79..4913b540d 100644 --- a/ssh-keysign.c +++ b/ssh-keysign.c @@ -222,7 +222,7 @@ main(int ar...
2017 Jun 16
2
[PATCH] allow relative path in streamlocal forwarding
...al_bind_mask; /* umask for streamlocal binds */ int streamlocal_bind_unlink; /* unlink socket before bind */ + char *streamlocal_bind_root_directory; }; /* misc.c */ diff --git a/readconf.c b/readconf.c index b11c628..13ab320 100644 --- a/readconf.c +++ b/readconf.c @@ -2234,6 +2234,22 @@ parse_forward(struct Forward *fwd, const char *fwdspec, int dynamicfwd, int remo if (fwd->connect_host != NULL && strlen(fwd->connect_host) >= NI_MAXHOST) goto fail_free; + /* The path starting with "./" means that it will be resolved + * on the server side */ + if (!dynami...
2024 May 04
3
Feature request/EOI: Match interactive config?
Hey there, I often want different behavior in my ssh client depending on whether I'm logging into an interactive session or running a remote non-interactive command. We can see at, say, https://unix.stackexchange.com/a/499562/305714 that this isn't a unique wish, and existing solutions are kind of baroque. Typical reasons to do this are to immediately go into a screen or tmux session; for
2010 Aug 09
8
Call for testing: OpenSSH-5.6
Hi, OpenSSH 5.6 is almost ready for release, so we would appreciate testing on as many platforms and systems as possible. This is a moderately large release, with a number of new features and bug fixes. Snapshot releases for portable OpenSSH are available from http://www.mindrot.org/openssh_snap/ The OpenBSD version is available in CVS HEAD: http://www.openbsd.org/anoncvs.html Portable OpenSSH