Displaying 8 results from an estimated 8 matches for "server_request_direct_tcpip".
2001 Jun 20
1
openssh and port forwarding as root
...e connection seems to come from root. Is it
enough to open the socket as normal user so the connection would appear
to come from that user ? (On Linux this seems to work, but what about
other OS's ?)
I tested this briefly by wrapping the
channel_connect_to(target,target_port);
(in serverloop.c:server_request_direct_tcpip) with
temporarily_use_uid and restore_uid calls and it seems to work (I used
hardcoded values for temporarily_use_uid). Is it possible to acquire
the username/uid/gid info in server_request_direct_tcpip (and where the
socket is opened with protocol 1) to add temporarily_use_uid /
restore_uid call...
2001 Jul 23
1
2.9p2: sshd -6, port fwd of ipv4 fails
...ddresses, port forwarding will not
work; just running plain ol' IPv4 fixes this of course.
The server error, when forwarding from the client '143:localhost:143' and
connecting to localhost 143 is:
debug1: server_input_channel_open: ctype direct-tcpip rchan 1 win 20480 max 2048
debug1: server_request_direct_tcpip: originator 127.0.0.1 port 1340, target 127.0.0.1 port 143
connect_to 127.0.0.1: unknown host (Address family for hostname not supported)
debug1: server_input_channel_open: failure direct-tcpip
The problem is that the connecting clients might not know a thing about
IPv6, so it wouldn't even be...
2009 Feb 17
2
Idea: reverse socks proxy
Hi,
Just a usecase that I'm sure has been covered before but just in case
its not an openssh solution would be very helpful.
I was trying to install software on a server that was firewalled so no
outbound http connections would work. I was also tunnelling via
another server. Outbound ssh connections also were a convenient option.
What would have been nice would be a remote version of
2004 Jan 15
0
two minor memory leaks
...enSSH 3.7.1p2 that should probably be
addressed.
In serverloop.c, function server_input_channel_open(), the ctype
variable is a char *, dynamically allocated in packet_get_string. It's
xfree'd at the end of the function. However, before that, it's passed
to server_request_session/server_request_direct_tcpip, which call
either channel_new or channel_connect_to, passing in ctype. The channel
structure keeps a pointer to ctype, so when server_input_channel_open
returns, and xfree's the ctype pointer, the pointer held by the channel
structure is now pointing at free'd memory. The channel nev...
2003 Sep 26
0
(no subject)
...ver which don't have
personal firewalls installed, et al.
We didn't find anything that would make OpenSSH server behave like this. So we
edited the code and added a config file option called
"allow_nonlocal_port_forward_destinations" and corresponding code in
serverloop.c in the server_request_direct_tcpip function:
if (((strcmp(target, "localhost") == 0) &&
(!options.allow_nonlocal_port_forward_destinations)) ||
(options.allow_nonlocal_port_forward_destinations)) {
debug("port forwarding to target %s allowed", target);...
2001 Oct 24
2
disable features
.../markus/cvs/ssh/serverloop.c,v
retrieving revision 1.82
diff -u -r1.82 serverloop.c
--- serverloop.c 10 Oct 2001 22:18:47 -0000 1.82
+++ serverloop.c 22 Oct 2001 18:24:43 -0000
@@ -790,6 +790,7 @@
pty_change_window_size(fdin, row, col, xpixel, ypixel);
}
+#ifdef WITH_TCPFWD
static Channel *
server_request_direct_tcpip(char *ctype)
{
@@ -822,6 +823,7 @@
}
return c;
}
+#endif
static Channel *
server_request_session(char *ctype)
@@ -874,8 +876,10 @@
if (strcmp(ctype, "session") == 0) {
c = server_request_session(ctype);
+#ifdef WITH_TCPFWD
} else if (strcmp(ctype, "direct-tcpip&quo...
2003 Jan 29
0
[PATCH] features for restricted shell environments
...(1) is used */
int compression; /* If true, compression is allowed */
int allow_tcp_forwarding;
--- serverloop.c 28 Jan 2003 18:06:52 -0000 1.1.1.2
+++ serverloop.c 29 Jan 2003 21:26:12 -0000 1.5
@@ -863,8 +865,7 @@
originator_port = packet_get_int();
packet_check_eom();
- debug("server_request_direct_tcpip: originator %s port %d, target %s port %d",
- originator, originator_port, target, target_port);
+ log("TCP forwarding connection to %s port %d", target, target_port);
/* XXX check permission */
sock = channel_connect_to(target, target_port);
@@ -973,12 +974,10 @@
fatal(...
2003 Oct 08
4
OS/390 openssh
...oop.c Tue Oct 7 08:22:02 2003
@@ -926,9 +926,9 @@
ctype, rchan, rwindow, rmaxpack);
if (strcmp(ctype, "session") == 0) {
- c = server_request_session(ctype);
+ c = server_request_session("session");
} else if (strcmp(ctype, "direct-tcpip") == 0) {
- c = server_request_direct_tcpip(ctype);
+ c = server_request_direct_tcpip("direct-tcpip");
}
if (c != NULL) {
debug("server_input_channel_open: confirm %s", ctype);
diff -bur openssh-3.7.1p2.orig/session.c openssh-3.7.1p2/session.c
--- openssh-3.7.1p2.orig/session.c Tue Sep 23 10:59:08 2003
+++ openssh...