Displaying 20 results from an estimated 26 matches for "ssh_channel_open".
2001 Jul 04
1
remote forwarding in 2.9p2
...with SSH v2 is not working
on my Solaris machines (and from what I understand from the
source, it may not work elsewhere either).
When looking at channel_post_port_listener() in channels.c,
I found that nextstate was defined as :
nextstate = (c->host_port == 0) ? SSH_CHANNEL_DYNAMIC :
SSH_CHANNEL_OPENING;
And later comes the call :
if (nextstate != SSH_CHANNEL_DYNAMIC)
port_open_helper(nc, rtype);
It turns out that on the server-side, for a channel type
of SSH_CHANNEL_RPORT_LISTENER, c->host_port is 0 and therefore,
per the above code, nextstate == SSH_CHANNEL_DYNAMIC and
port_open_he...
2012 Oct 22
1
[PATCH] Implement remote dynamic TCP forwarding
...el_connect *);
+static int connect_to_helper(const char *host, u_short port, struct channel_connect *cctx);
/* -- channel core */
@@ -209,6 +210,7 @@ channel_lookup(int id)
case SSH_CHANNEL_LARVAL:
case SSH_CHANNEL_CONNECTING:
case SSH_CHANNEL_DYNAMIC:
+ case SSH_CHANNEL_RDYNAMIC:
case SSH_CHANNEL_OPENING:
case SSH_CHANNEL_OPEN:
case SSH_CHANNEL_INPUT_DRAINING:
@@ -534,6 +536,7 @@ channel_still_open(void)
case SSH_CHANNEL_CLOSED:
case SSH_CHANNEL_AUTH_SOCKET:
case SSH_CHANNEL_DYNAMIC:
+ case SSH_CHANNEL_RDYNAMIC:
case SSH_CHANNEL_CONNECTING:
case SSH_CHANNEL_ZOMBIE:
contin...
2000 Jan 07
2
possible clue on tcp forwarding problems
When I encounter the problem with TCP port forwarding locking up, I'll
see this on the client window (if I haven't invoked ssh with -q):
chan_shutdown_read failed for #1/fd6: Transport endpoint is not connected
chan_shutdown_read failed for #1/fd6: Transport endpoint is not connected
This is with Blowfish encryption. I have to kill and restart the client
when this happens.
Phil
2013 Mar 16
5
[Bug 2079] New: openssh 6.1/6.2 disconnect due to channel bug
https://bugzilla.mindrot.org/show_bug.cgi?id=2079
Bug ID: 2079
Summary: openssh 6.1/6.2 disconnect due to channel bug
Classification: Unclassified
Product: Portable OpenSSH
Version: 6.1p1
Hardware: amd64
OS: FreeBSD
Status: NEW
Severity: normal
Priority: P5
Component: ssh
2001 Oct 24
2
disable features
...7 @@
channel_check_window(c);
}
+#ifdef WITH_PROTO13
static void
channel_post_output_drain_13(Channel *c, fd_set * readset, fd_set * writeset)
{
@@ -1437,67 +1463,118 @@
buffer_consume(&c->output, len);
}
}
+#endif
static void
channel_handler_init_20(void)
{
channel_pre[SSH_CHANNEL_OPEN] = &channel_pre_open_20;
- channel_pre[SSH_CHANNEL_X11_OPEN] = &channel_pre_x11_open;
+#ifdef WITH_TCPFWD
channel_pre[SSH_CHANNEL_PORT_LISTENER] = &channel_pre_listener;
channel_pre[SSH_CHANNEL_RPORT_LISTENER] = &channel_pre_listener;
- channel_pre[SSH_CHANNEL_X11_LISTENER] =...
2001 Aug 16
1
port-forwarding problem!?
Using OpenSSH_2.9p2 on Linux and Sparc Solaris.
Trying to connect from Linux to Solaris, with remote port-forwarding
i.e. On Linux, ssh -R 3000:Linux:23 Solaris
The connection is established okay, but the port-forwarding does not
work; on Solaris, the connection to localhost port 3000 is accepted, but it
appears as if no data makes it back to port 23 on Linux. If an older 1.2.30
sshd is used
2001 Sep 26
1
Protocol 2 remote port forwarding
Hi all,
I'm using openssh-2.9p2 on Solaris 2.8. I can get remote port forwarding to
work using the -R flag, but only with ssh protocol 1 not ssh protocol 2.
I've read that remote forwarding protocol 2 was not supported in earlier
versions of openssh, but I'm wondering if this is still the case. Jarno
Huuskonen [Jarno.Huuskonen at uku.fi], posted a patch in 2000 to add support
for
2001 Apr 05
1
bug in channel_still_open() ?
...30 2001
+++ channels.c.new Thu Apr 5 03:54:56 2001
@@ -1503,7 +1503,6 @@
case SSH_CHANNEL_LARVAL:
if (!compat20)
fatal("cannot happen: SSH_CHANNEL_LARVAL");
- continue;
case SSH_CHANNEL_OPENING:
case SSH_CHANNEL_OPEN:
case SSH_CHANNEL_X11_OPEN:
(That is, remove the "continue" statement.)
I'm not 100% sure this is the right fix, though; I'm going to post to the
OpenSSH developers list and see what they say.
--
Richard Silverman
sl...
2001 Feb 10
3
Protocol 2 remote forwarding patch
...port %d",
c->listening_port, c->path, c->host_port,
remote_hostname, remote_port);
- newch = channel_new("direct-tcpip",
+ newch = channel_new((c->type == SSH2_CHANNEL_PORT_LISTENER) ?
+ "forwarded-tcpip" : "direct-tcpip",
SSH_CHANNEL_OPENING, newsock, newsock, -1,
c->local_window_max, c->local_maxpacket,
0, xstrdup(buf), 1);
if (compat20) {
packet_start(SSH2_MSG_CHANNEL_OPEN);
- packet_put_cstring("direct-tcpip");
+ if (c->type == SSH2_CHANNEL_PORT_LISTENER)
+ packet_put_cstring("f...
2000 Aug 23
1
Protocol 2 remote forwarding patch
...newch = channel_new("direct-tcpip",
+ /* Jarno: If the channel is SSH2 port listener (server) then send
+ * forwarded-tcpip message.
+ */
+ newch = channel_new( (c->type == SSH2_CHANNEL_PORT_LISTENER) ?
+ "forwarded-tcpip" : "direct-tcpip",
SSH_CHANNEL_OPENING, newsock, newsock, -1,
c->local_window_max, c->local_maxpacket,
0, xstrdup(buf));
if (compat20) {
packet_start(SSH2_MSG_CHANNEL_OPEN);
- packet_put_cstring("direct-tcpip");
+ if (c->type == SSH2_CHANNEL_PORT_LISTENER)
+ packet_put_cstring("forw...
2023 Nov 08
2
Delay in starting programs on FreeBSD via ssh after upgrade OpenBSD from 7.3 to 7.4
...en(struct ssh *ssh)
return 0;
}
+/* Returns true if a channel with a TTY is open. */
+int
+channel_tty_open(struct ssh *ssh)
+{
+ u_int i;
+ Channel *c;
+
+ for (i = 0; i < ssh->chanctxt->channels_alloc; i++) {
+ c = ssh->chanctxt->channels[i];
+ if (c == NULL || c->type != SSH_CHANNEL_OPEN)
+ continue;
+ if (c->client_tty)
+ return 1;
+ }
+ return 0;
+}
+
/* Returns the id of an open channel suitable for keepaliving */
int
channel_find_open(struct ssh *ssh)
diff --git a/channels.h b/channels.h
index 7cfba92..c31733f 100644
--- a/channels.h
+++ b/channels.h
@@ -337,6 +337,7...
2006 Aug 25
2
RFC: non-root ssh tun access
...-941,7 +941,11 @@
goto done;
tun = forced_tun_device;
}
- sock = tun_open(tun, mode);
+#if defined(SSH_TUN_LINUX)
+ sock = tun_open(tun, mode, the_authctxt->pw->pw_uid);
+#else
+ sock = tun_open(tun, mode);
+#endif
if (sock < 0)
goto done;
c = channel_new("tun", SSH_CHANNEL_OPEN, sock, sock, -1,
diff -Nurd openssh-4.3p2.orig/ssh.c openssh-4.3p2/ssh.c
--- openssh-4.3p2.orig/ssh.c 2005-12-31 00:33:37.000000000 -0500
+++ openssh-4.3p2/ssh.c 2006-08-25 08:32:57.000000000 -0400
@@ -1073,8 +1073,13 @@
int fd;
debug("Requesting tun.");
+#if defined(SSH_TUN_LINUX...
2005 Feb 24
7
Question performnace of SSH v1 vs SSH v2
Hello
I have ported OpenSSH 3.8p1 to a LynxOS platform. Recently I heard a
report from the field that v2 is perceived to be significantly slower
than v1. Is this a known issue? Are there any configuration parameters
that can be modified to make v2 faster?
Thanks in advance for your response
Amba
2004 Jul 07
3
DynamicWindow Patch
...eyscan and ssh/ssh-keyscan
Common subdirectories: src/usr.bin/ssh/ssh-keysign and ssh/ssh-keysign
diff -u src/usr.bin/ssh/ssh.c ssh/ssh.c
--- src/usr.bin/ssh/ssh.c 2004-06-13 11:03:02.000000000 -0400
+++ ssh/ssh.c 2004-07-07 10:02:24.000000000 -0400
@@ -1125,7 +1125,11 @@
"session", SSH_CHANNEL_OPENING, in, out, err,
window, packetmax, CHAN_EXTENDED_WRITE,
"client-session", /*nonblock*/0);
-
+ if (!tty_flag) {
+ c->dynamic_window = 1;
+ set_unlimited(&c->input,1);
+ set_unlimited(&c->output,1);
+ }
debug3("ssh_session2_open: channel_new: %d"...
2010 Jan 14
1
ssh(1) multiplexing rewrite
..._still_open(void)
case SSH_CHANNEL_X11_LISTENER:
case SSH_CHANNEL_PORT_LISTENER:
case SSH_CHANNEL_RPORT_LISTENER:
+ case SSH_CHANNEL_MUX_LISTENER:
case SSH_CHANNEL_CLOSED:
case SSH_CHANNEL_AUTH_SOCKET:
case SSH_CHANNEL_DYNAMIC:
@@ -531,6 +531,7 @@ channel_still_open(void)
case SSH_CHANNEL_OPENING:
case SSH_CHANNEL_OPEN:
case SSH_CHANNEL_X11_OPEN:
+ case SSH_CHANNEL_MUX_CLIENT:
return 1;
case SSH_CHANNEL_INPUT_DRAINING:
case SSH_CHANNEL_OUTPUT_DRAINING:
@@ -562,6 +563,8 @@ channel_find_open(void)
case SSH_CHANNEL_X11_LISTENER:
case SSH_CHANNEL_PORT_LISTENER:
case...
2001 Jul 02
1
Forwarding race resulting in lost data in openssh-2.9p2
...)) > 0)
write(1, buf, n);
close(sock);
return 0;
}
-------------- next part --------------
--- channels.c.orig Wed Jun 13 21:18:05 2001
+++ channels.c Mon Jul 2 19:00:09 2001
@@ -1302,7 +1302,8 @@
/* Ignore any data for non-open channels (might happen on close) */
if (c->type != SSH_CHANNEL_OPEN &&
- c->type != SSH_CHANNEL_X11_OPEN)
+ c->type != SSH_CHANNEL_X11_OPEN &&
+ c->type != SSH_CHANNEL_CONNECTING)
return;
/* same for protocol 1.5 if output end is no longer open */
2004 Jun 30
1
"break"/SIGINT handling
...hen an IAC/IP is received by the telnet daemon. It seems an SSH break could/should perform a similar function (tcsendbreak() in session_break_req() would cause this) but my application is started as part of the users .profile - i.e. after a 'shell' request and the channel type is changed to SSH_CHANNEL_OPEN.
Is there any way I can get a signal through to my server application from the client?
Thanks
Darren Warner
2001 Feb 22
3
intermittent stderr
The command "ssh ls -l /doesnotexist" gives various responses:
Running from a 200 MHz PentiumPro with dsa key added to ssh-agent:
Mistakes worst to fast machine:
To a faster 600 MHz dual processor i686 600 MHz machine:
ls: /doesnotexist: No such file or directory -- correct
nothing at all -- wrong
ls: select: Bad file descriptor -- wrong
2004 Jul 14
1
New dynamic window patch (with limits)
...ee channel %d", c->self);
channel_free(c);
diff -u openssh-3.8.1p1/ssh.c openssh-3.8.1p1-dynwindow/ssh.c
--- openssh-3.8.1p1/ssh.c 2004-03-21 17:36:01.000000000 -0500
+++ openssh-3.8.1p1-dynwindow/ssh.c 2004-07-07 09:54:03.000000000 -0400
@@ -1117,7 +1117,11 @@
"session", SSH_CHANNEL_OPENING, in, out, err,
window, packetmax, CHAN_EXTENDED_WRITE,
"client-session", /*nonblock*/0);
-
+ if (!tty_flag) {
+ c->dynamic_window = 1;
+ set_unlimited(&c->input,1);
+ set_unlimited(&c->output,1);
+ }
debug3("ssh_session2_open: channel_new: %d"...
2017 Oct 10
3
tunnel device name acquisition?
Numerous how-tos all over the Internet show how one would set up
a tunnel using ssh, e.g.:
ssh -f -o Tunnel=ethernet <server_ip> true
I was wondering if there's a way to subsequently acquire the names
of the local and remote tun/tap interfaces (e.g., using the default
"-w any:any") for subsequent automatic tunnel configuration, e.g.:
ip link set $TapDev up
ip link set