Displaying 15 results from an estimated 15 matches for "port_to_connect".
2000 Aug 15
0
Experimental -R support patch for openssh client
...obile: +358 40 5388169
-------------- next part --------------
diff -u -r openssh-2.1.1p4/channels.c openssh-2.1.1p4-jhchanges/channels.c
--- openssh-2.1.1p4/channels.c Mon Jun 26 03:22:53 2000
+++ openssh-2.1.1p4-jhchanges/channels.c Tue Aug 15 19:10:49 2000
@@ -1506,38 +1509,139 @@
u_short port_to_connect)
{
int payload_len;
+ int type;
+ int success = 0;
+
/* Record locally that connection to this host/port is permitted. */
if (num_permitted_opens >= SSH_MAX_FORWARDS_PER_DIRECTION)
fatal("channel_request_remote_forwarding: too many forwards");
- permitted_opens[num_permitte...
2000 Aug 13
1
Patches for openssh port forwarding
...0
@@ -59,6 +59,9 @@
*/
static int channels_alloc = 0;
+/* Jarno: Needed to check if port_forwarding is allowed */
+extern ServerOptions options;
+
/*
* Maximum file descriptor value used in any of the channels. This is
* updated in channel_allocate.
@@ -1506,15 +1509,12 @@
u_short port_to_connect)
{
int payload_len;
+ int type;
+
/* Record locally that connection to this host/port is permitted. */
if (num_permitted_opens >= SSH_MAX_FORWARDS_PER_DIRECTION)
fatal("channel_request_remote_forwarding: too many forwards");
- permitted_opens[num_permitted_opens].host_to_co...
2004 Aug 05
1
LocalForward and RemoteForward bind patch
...9.000000000 -0800
+++ openssh-3.8p1-localbind/channels.c 2004-08-05 12:55:16.101830360 -0700
@@ -86,6 +86,7 @@
* network (which might be behind a firewall).
*/
typedef struct {
+ char *listen_host; /* Address to listen on */
char *host_to_connect; /* Connect to 'host'. */
u_short port_to_connect; /* Connect to 'port'. */
u_short listen_port; /* Remote side should listen port number. */
@@ -2146,8 +2147,7 @@
char ntop[NI_MAXHOST], strport[NI_MAXSERV];
success = 0;
- host = (type == SSH_CHANNEL_RPORT_LISTENER) ?
- listen_addr : host_to_connect;
+ host = host_to_connect;...
2001 Feb 10
3
Protocol 2 remote forwarding patch
..._PORT_LISTENER,
+ "port listener", ssh2_remote_fwd ?
+ SSH2_CHANNEL_PORT_LISTENER : SSH_CHANNEL_PORT_LISTENER,
sock, sock, -1,
CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT,
0, xstrdup("port listener"), 1);
@@ -1536,15 +1639,12 @@
u_short port_to_connect)
{
int payload_len;
+ int type;
+ int success = 0;
/* Record locally that connection to this host/port is permitted. */
if (num_permitted_opens >= SSH_MAX_FORWARDS_PER_DIRECTION)
fatal("channel_request_remote_forwarding: too many forwards");
- permitted_opens[num_permitted_...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...NEL_PORT_LISTENER,
+ "port listener",
+ ssh2_remote_fwd ? SSH2_CHANNEL_PORT_LISTENER : SSH_CHANNEL_PORT_LISTENER,
sock, sock, -1,
CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT,
0, xstrdup("port listener"));
@@ -1506,38 +1645,149 @@
u_short port_to_connect)
{
int payload_len;
+ int type;
+ int success = 0;
+
/* Record locally that connection to this host/port is permitted. */
if (num_permitted_opens >= SSH_MAX_FORWARDS_PER_DIRECTION)
fatal("channel_request_remote_forwarding: too many forwards");
- permitted_opens[num_permitte...
2015 Jun 24
8
[Bug 2416] New: [PATCH] Allow forwarding of stdio to streamlocal end points
https://bugzilla.mindrot.org/show_bug.cgi?id=2416
Bug ID: 2416
Summary: [PATCH] Allow forwarding of stdio to streamlocal end
points
Product: Portable OpenSSH
Version: -current
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: ssh
2011 Sep 08
1
Dynamic port remote listener - a BUG?
...r the socket. */
c = channel_new("port listener", type, sock, sock, -1,
CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT,
0, "port listener", 1);
c->path = xstrdup(host);
c->host_port = port_to_connect;
c->listening_port = listen_port;
success = 1;
}
if (success == 0)
error("channel_setup_fwd_listener: cannot listen to port:
%d",
listen_port);
freeaddrinfo(aitop);
return success;
}
As...
2002 Jan 05
2
new feature w/ patch
....c
--- openssh-3.0.2p1/channels.c Thu Oct 11 20:35:05 2001
+++ openssh-3.0.2p1-NewFeature/channels.c Sat Jan 5 15:36:10 2002
@@ -2057,11 +2057,11 @@
* channel to host:port from remote side.
*/
int
-channel_request_local_forwarding(u_short listen_port, const char *host_to_connect,
- u_short port_to_connect, int gateway_ports)
+channel_request_local_forwarding(const char *listen_host, u_short listen_port,
+ const char *host_to_connect, u_short port_to_connect, int gateway_ports)
{
return channel_request_forwarding(
- NULL, listen_port,
+ listen_host, listen_port,
host_to_connect, p...
2012 Oct 22
1
[PATCH] Implement remote dynamic TCP forwarding
...7,6 +3479,10 @@ channel_connect_by_listen_address(u_short listen_port, char *ctype, char *rname)
for (i = 0; i < num_permitted_opens; i++) {
if (permitted_opens[i].host_to_connect != NULL &&
port_match(permitted_opens[i].listen_port, listen_port)) {
+ if (permitted_opens[i].port_to_connect == FWD_PERMIT_ANY_PORT)
+ return channel_new(ctype, SSH_CHANNEL_RDYNAMIC, -1, -1, -1,
+ CHAN_TCP_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0, rname, 1);
+
return connect_to(
permitted_opens[i].host_to_connect,
permitted_opens[i].port_to_connect, ctype, rname);
diff --gi...
2014 Feb 20
1
Regression in 6.5p1 when using -W option
...in port_open_helper (c=c at entry=0x600074700,
rtype=rtype at entry=0x10045fe0d <log_facilities+301> "direct-tcpip")
at /usr/src/debug/openssh-6.5p1-1/channels.c:1388
#3 0x000000010041dc07 in channel_connect_stdio_fwd (
host_to_connect=0x600039800 "machine2", port_to_connect=22, in=in at entry=4,
out=5) at /usr/src/debug/openssh-6.5p1-1/channels.c:1269
#4 0x0000000100401566 in ssh_init_stdio_forwarding ()
at /usr/src/debug/openssh-6.5p1-1/ssh.c:1260
#5 0x0000000100454171 in ssh_session2 ()
at /usr/src/debug/openssh-6.5p1-1/ssh.c:1606
#6 main (ac=<opti...
2013 Dec 19
3
[Bug 2189] New: Client fails to consider hostname when matching rfwd channel opens
...ed_opens[i].host_to_connect != NULL &&
> port_match(permitted_opens[i].listen_port, listen_port)) {
> return connect_to(
> permitted_opens[i].host_to_connect,
> permitted_opens[i].port_to_connect, ctype, rname);
> }
> }
> error("WARNING: Server requests forwarding for unknown listen_port %d",
> listen_port);
> return NULL;
> }
>
> Note that it checks here that a host_to_connect is set, but it doesn't
&...
2009 Feb 17
2
Idea: reverse socks proxy
Hi,
Just a usecase that I'm sure has been covered before but just in case
its not an openssh solution would be very helpful.
I was trying to install software on a server that was firewalled so no
outbound http connections would work. I was also tunnelling via
another server. Outbound ssh connections also were a convenient option.
What would have been nice would be a remote version of
2005 Feb 22
0
TR: 3.8.1p1 option "permitopennet" added
...t * ctxt = a_ctxt;
+ struct passwd *pw = ctxt->pw;
permit = all_opens_permitted;
if (!permit) {
- for (i = 0; i < num_permitted_opens; i++)
+ /* check against "permitopen" option */
+ for (i = 0; i < num_permitted_opens && !permit; i++)
if (permitted_opens[i].port_to_connect == port &&
strcmp(permitted_opens[i].host_to_connect, host) == 0)
permit = 1;
-
}
if (!permit) {
- logit("Received request to connect to host %.100s port %d, "
- "but the request was denied.", host, port);
+ /* last check : against "permitope...
2013 Aug 31
11
[Bug 2147] New: OpenSSH remote forwarding of dynamic ports doesn't work when you create more than one
https://bugzilla.mindrot.org/show_bug.cgi?id=2147
Bug ID: 2147
Summary: OpenSSH remote forwarding of dynamic ports doesn't
work when you create more than one
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: normal
Priority: P5
2017 Mar 02
64
[Bug 2687] New: Coverity scan fixes
https://bugzilla.mindrot.org/show_bug.cgi?id=2687
Bug ID: 2687
Summary: Coverity scan fixes
Product: Portable OpenSSH
Version: 7.4p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
Component: Miscellaneous
Assignee: unassigned-bugs at mindrot.org