Displaying 9 results from an estimated 9 matches for "port_open_helper".
2001 Jul 04
1
remote forwarding in 2.9p2
...e, it may not work elsewhere either).
When looking at channel_post_port_listener() in channels.c,
I found that nextstate was defined as :
nextstate = (c->host_port == 0) ? SSH_CHANNEL_DYNAMIC :
SSH_CHANNEL_OPENING;
And later comes the call :
if (nextstate != SSH_CHANNEL_DYNAMIC)
port_open_helper(nc, rtype);
It turns out that on the server-side, for a channel type
of SSH_CHANNEL_RPORT_LISTENER, c->host_port is 0 and therefore,
per the above code, nextstate == SSH_CHANNEL_DYNAMIC and
port_open_helper() is not called.
I am not sure what the function of SSH_CHANNEL_DYNAMIC is but
it looks...
2014 Feb 20
1
Regression in 6.5p1 when using -W option
...en)
(gdb) bt
#0 get_socket_address (sock=-1, remote=remote at entry=0, flags=flags at entry=2)
at /usr/src/debug/openssh-6.5p1-1/canohost.c:256
#1 0x0000000100432213 in get_local_ipaddr (sock=<optimized out>)
at /usr/src/debug/openssh-6.5p1-1/canohost.c:292
#2 0x0000000100418db5 in port_open_helper (c=c at entry=0x600074700,
rtype=rtype at entry=0x10045fe0d <log_facilities+301> "direct-tcpip")
at /usr/src/debug/openssh-6.5p1-1/channels.c:1388
#3 0x000000010041dc07 in channel_connect_stdio_fwd (
host_to_connect=0x600039800 "machine2", port_to_connect=22,...
2016 Dec 22
3
[Bug 2649] New: Problem with reverse tunnel between SSH client 5.5p1 and SSH server > 6.4p1
...o dynamic port):
$ /usr/bin/ssh -t -t -R *:54321:localhost:443 user at server somecommand
everything works fine, independent of the OpenSSH server version.
Reverting part of the change above solves the problem:
--- openssh-7.3p1.orig/channels.c
+++ openssh-7.3p1/channels.c
@@ -1458,7 +1458,7 @@ port_open_helper(Channel *c, char *rtype
} else {
/* listen address, port */
packet_put_cstring(c->path);
- packet_put_int(local_port);
+ packet_put_int(c->listening_port);
}...
2001 Oct 24
2
disable features
...@@ -131,12 +133,15 @@
/* Name and directory of socket for authentication agent forwarding. */
static char *auth_sock_name = NULL;
static char *auth_sock_dir = NULL;
+#endif
/* AF_UNSPEC or AF_INET or AF_INET6 */
static int IPv4or6 = AF_UNSPEC;
+#ifdef WITH_TCPFWD
/* helper */
static void port_open_helper(Channel *c, char *rtype);
+#endif
/* -- channel core */
@@ -678,6 +683,7 @@
chan_fn *channel_pre[SSH_CHANNEL_MAX_TYPE];
chan_fn *channel_post[SSH_CHANNEL_MAX_TYPE];
+#ifdef WITH_TCPFWD
static void
channel_pre_listener(Channel *c, fd_set * readset, fd_set * writeset)
{
@@ -690,7 +696,9 @...
2014 Feb 12
5
[Bug 2200] New: ssh -W causes "getsockname failed: Bad file descriptor" errors
...watson at debian.org
Marco d'Itri reports in http://bugs.debian.org/738693 that "ssh -W" has
started causing "getsockname failed: Bad file descriptor" errors; these
are new in 6.5p1 and reported via error(). I think this was triggered
by the new calls to get_sock_port from port_open_helper in
https://anongit.mindrot.org/openssh.git/commit/?id=4def184; gdb shows
that c->sock is -1 here.
Full -vvv output in the Debian bug; relevant-looking excerpt:
debug3: ssh_init_stdio_forwarding: server2.example.net:22
debug1: channel_connect_stdio_fwd server2.example.net:22
debug1: channel 0:...
2005 Jun 09
3
[Bug 1054] Nmap Causing SSH Session to Prematurely End
...rge.4
irish at osgiliath:~$ dpkg -s openssl | grep Version
Version: 0.9.7e-3
--
Richard's reply:
This appears to be a bug in OpenSSH, which only shows up when a TCP
connection to a forwarded port is closed extremely quickly after being
opened. The problem is here:
[channels.c]
static void
port_open_helper(Channel *c, char *rtype)
{
int direct;
char buf[1024];
char *remote_ipaddr = get_peer_ipaddr(c->sock);
>>>>>> u_short remote_port = get_peer_port(c->sock);
This is called very shortly after processing a connection opened on a
forwarded port, channel_post_port_listener(...
2010 Jan 28
1
Possible issue with stdio forwarding
Greetings,
I've been doing a little testing with the stdio forwarding support added
in recent snapshots and have encountered one possible issue. First, I
should say that this feature generally seems to work. However, I haven't
been able to get it to work when connecting to a server running
SSH.COM's product.
The config file I am using is fairly simple:
Host sfe1
LogLevel debug3
2012 Oct 22
1
[PATCH] Implement remote dynamic TCP forwarding
....c | 222 +++++++++++++++++++++++++++++++++++++++++++++++++------------
channels.h | 3 +-
ssh.c | 3 +-
3 files changed, 183 insertions(+), 45 deletions(-)
diff --git a/channels.c b/channels.c
index 7791feb..6e46229 100644
--- a/channels.c
+++ b/channels.c
@@ -172,6 +172,7 @@ static void port_open_helper(Channel *c, char *rtype);
/* non-blocking connect helpers */
static int connect_next(struct channel_connect *);
static void channel_connect_ctx_free(struct channel_connect *);
+static int connect_to_helper(const char *host, u_short port, struct channel_connect *cctx);
/* -- channel core */...
2013 Aug 31
11
[Bug 2147] New: OpenSSH remote forwarding of dynamic ports doesn't work when you create more than one
https://bugzilla.mindrot.org/show_bug.cgi?id=2147
Bug ID: 2147
Summary: OpenSSH remote forwarding of dynamic ports doesn't
work when you create more than one
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5