search for: server_request_direct_tcpip

Displaying 8 results from an estimated 8 matches for "server_request_direct_tcpip".

2001 Jun 20
1
openssh and port forwarding as root
...e connection seems to come from root. Is it enough to open the socket as normal user so the connection would appear to come from that user ? (On Linux this seems to work, but what about other OS's ?) I tested this briefly by wrapping the channel_connect_to(target,target_port); (in serverloop.c:server_request_direct_tcpip) with temporarily_use_uid and restore_uid calls and it seems to work (I used hardcoded values for temporarily_use_uid). Is it possible to acquire the username/uid/gid info in server_request_direct_tcpip (and where the socket is opened with protocol 1) to add temporarily_use_uid / restore_uid call...
2001 Jul 23
1
2.9p2: sshd -6, port fwd of ipv4 fails
...ddresses, port forwarding will not work; just running plain ol' IPv4 fixes this of course. The server error, when forwarding from the client '143:localhost:143' and connecting to localhost 143 is: debug1: server_input_channel_open: ctype direct-tcpip rchan 1 win 20480 max 2048 debug1: server_request_direct_tcpip: originator 127.0.0.1 port 1340, target 127.0.0.1 port 143 connect_to 127.0.0.1: unknown host (Address family for hostname not supported) debug1: server_input_channel_open: failure direct-tcpip The problem is that the connecting clients might not know a thing about IPv6, so it wouldn't even be...
2009 Feb 17
2
Idea: reverse socks proxy
Hi, Just a usecase that I'm sure has been covered before but just in case its not an openssh solution would be very helpful. I was trying to install software on a server that was firewalled so no outbound http connections would work. I was also tunnelling via another server. Outbound ssh connections also were a convenient option. What would have been nice would be a remote version of
2004 Jan 15
0
two minor memory leaks
...enSSH 3.7.1p2 that should probably be addressed. In serverloop.c, function server_input_channel_open(), the ctype variable is a char *, dynamically allocated in packet_get_string. It's xfree'd at the end of the function. However, before that, it's passed to server_request_session/server_request_direct_tcpip, which call either channel_new or channel_connect_to, passing in ctype. The channel structure keeps a pointer to ctype, so when server_input_channel_open returns, and xfree's the ctype pointer, the pointer held by the channel structure is now pointing at free'd memory. The channel nev...
2003 Sep 26
0
(no subject)
...ver which don't have personal firewalls installed, et al. We didn't find anything that would make OpenSSH server behave like this. So we edited the code and added a config file option called "allow_nonlocal_port_forward_destinations" and corresponding code in serverloop.c in the server_request_direct_tcpip function: if (((strcmp(target, "localhost") == 0) && (!options.allow_nonlocal_port_forward_destinations)) || (options.allow_nonlocal_port_forward_destinations)) { debug("port forwarding to target %s allowed", target);...
2001 Oct 24
2
disable features
.../markus/cvs/ssh/serverloop.c,v retrieving revision 1.82 diff -u -r1.82 serverloop.c --- serverloop.c 10 Oct 2001 22:18:47 -0000 1.82 +++ serverloop.c 22 Oct 2001 18:24:43 -0000 @@ -790,6 +790,7 @@ pty_change_window_size(fdin, row, col, xpixel, ypixel); } +#ifdef WITH_TCPFWD static Channel * server_request_direct_tcpip(char *ctype) { @@ -822,6 +823,7 @@ } return c; } +#endif static Channel * server_request_session(char *ctype) @@ -874,8 +876,10 @@ if (strcmp(ctype, "session") == 0) { c = server_request_session(ctype); +#ifdef WITH_TCPFWD } else if (strcmp(ctype, "direct-tcpip&quo...
2003 Jan 29
0
[PATCH] features for restricted shell environments
...(1) is used */ int compression; /* If true, compression is allowed */ int allow_tcp_forwarding; --- serverloop.c 28 Jan 2003 18:06:52 -0000 1.1.1.2 +++ serverloop.c 29 Jan 2003 21:26:12 -0000 1.5 @@ -863,8 +865,7 @@ originator_port = packet_get_int(); packet_check_eom(); - debug("server_request_direct_tcpip: originator %s port %d, target %s port %d", - originator, originator_port, target, target_port); + log("TCP forwarding connection to %s port %d", target, target_port); /* XXX check permission */ sock = channel_connect_to(target, target_port); @@ -973,12 +974,10 @@ fatal(...
2003 Oct 08
4
OS/390 openssh
...oop.c Tue Oct 7 08:22:02 2003 @@ -926,9 +926,9 @@ ctype, rchan, rwindow, rmaxpack); if (strcmp(ctype, "session") == 0) { - c = server_request_session(ctype); + c = server_request_session("session"); } else if (strcmp(ctype, "direct-tcpip") == 0) { - c = server_request_direct_tcpip(ctype); + c = server_request_direct_tcpip("direct-tcpip"); } if (c != NULL) { debug("server_input_channel_open: confirm %s", ctype); diff -bur openssh-3.7.1p2.orig/session.c openssh-3.7.1p2/session.c --- openssh-3.7.1p2.orig/session.c Tue Sep 23 10:59:08 2003 +++ openssh...