Displaying 20 results from an estimated 400 matches similar to: "LocalForward and RemoteForward bind patch"
2004 May 18
0
use of -D at EscapeChar command line
Greetings,
Here's a small patch to allow adding dynamic port forwards during a
session using the ~C command line. Local and remote port forwards are
already supported in a similar manner, but we thought this would be useful
as well -- hope it finds its way to the official distribution.
Best,
Cody Raspen
John Mishanski
-------------- next part --------------
diff -aur
2004 Sep 08
0
[PATCH]Extending user@host syntax
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
the following patch extends the user at host syntax on the ssh command line to
allow an additional HostKeyAlias and Port to be given as a single argument, eg:
ssh user at localhost%8022,www.tdl.com
is equivalent to
ssh -o 'HostKeyAlias www.tdl.com' -p 8022 user at localhost
The patch is particularly useful when ssh is called from
2002 Jan 05
2
new feature w/ patch
I've attached a patch to OpenSSH 3.0.2p1 that will allow the client
side of local port forwarding to be bound to a single address. For
my purposes, binding to 127.0.0.1 or (via GatewayPorts) all addresses
would not work. I overloaded the "-b local_host" option so that
it's address will be used when "-L port:remote_host:remote_port"
is also specified.
Today is the first
2001 Sep 20
1
Patch to allow local port forwarding from an existing connection
Hi. Attached is a patch that introduces a new escape character (~c) that
opens a command line. From the command line, a command of the form:
-L port:host:hostport
can be entered, which will forward the local port, as if the same option
has been provided on the command line. I attempted to allow remote port
forwards to be specified similarly, but the server disconnects with a
protocol error
2010 Jan 14
1
ssh(1) multiplexing rewrite
Hi,
At the n2k10 OpenBSD network hackathon, I finally got some time to clean
up and rewrite the ssh(1) client multiplexing code. The attached diffs
(one for portable OpenSSH, one for OpenBSD) are the result, and they
need some testing.
The revised multiplexing code uses a better protocol between the master
and slave processes and I even bothered to write it up :) It tracks the
control sockets
2001 May 18
0
PATCH: implement delay (sleep) after last tunnelled connection exits
Here is a patch to implement a handy new feature proposed by
John Hardin <johnh at aproposretail.com>. This is his description of the feature:
New option for OpenSSH: Delay before exit.
Command line option: -S delay
Config file option: sleep {delay}
Purpose: Wait the specified number of seconds after last traffic before
dropping the connection and exiting. If ports are forwarded, this
2003 Aug 12
1
[PATCH] Minor nit: -D is now "socks" not "socks4"
Hi all.
I was getting something working over socks5 and was trying to figure out
why it kept using socks4. It wasn't, it was just a misleading debug
message....
Patch applies to either OpenBSD or Portable.
--
Darren Tucker (dtucker at zip.com.au)
GPG key 8FF4FA69 / D9A3 86E9 7EEE AF4B B2D4 37C9 C982 80C7 8FF4 FA69
Good judgement comes with experience. Unfortunately, the experience
2002 May 27
0
[Bug 258] New: scanf format not portable
http://bugzilla.mindrot.org/show_bug.cgi?id=258
Summary: scanf format not portable
Product: Portable OpenSSH
Version: -current
Platform: Other
OS/Version: other
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo: openssh-unix-dev at mindrot.org
ReportedBy: liug at
2001 Feb 10
3
Protocol 2 remote forwarding patch
Hi all,
I'm very new in this list, as looking for codes to plug up the lack of
functionality of "Protocol 2 Remote Forwardig".
Fortunately, I could find it in MARC's archive. Mr. Jarno Huuskonen
posted the codes in Sept, last year, and I tried applying it to my
FreeBSD box environment.
I couldn't apply an original patch, of course, for incompatibility of
virsion. The
2002 Jul 17
2
[Patch] SSH through HTTP proxy using CONNECT
Hi,
I'm not a subscriber to this list so please CC: me in any replies.
I found myself in a situation where I was behind a corporate firewall
that allowed only web requests to the outside world (and furthermore
those requests had to be via their proxy server). Therefore, I couldn't
SSH to the outside world.
However, the HTTP proxy 'CONNECT' method, which is normally used to
2000 Aug 23
1
Protocol 2 remote forwarding patch
Hi !
Here's a patch to add remote port forwarding support (protocol 2) for
openssh. I have tried to test that it works like it should but a more
thorough testing is needed. This patch adds both client/server support.
The patch should be applied to openssh-2.1.1p4 source tree.
Also included is a PortForwarding sshd_config option, new ./configure
option --disable-forwarding that should make it
2012 May 03
5
[PATCH/RFC 0/6] New mux client request to list open tcp forwardings.
These patches implement a new mux client request to list the currently opened
TCP forwardings. It also removes some todos regarding keeping the list
of forwardings in the options up-to-date.
Bert Wesarg (6):
attach the forwarding type to struct Forward
merge local and remote forward lists
generate unique ids for forwardings to be used for identification
remove closed forwardings from
2002 Jan 27
0
[PATCH] Add an exit delay to Openssh-3.0.2p1 for use in tunneling
Here is a patch to implement an exit delay in OpenSSH-3.0.2p1,
proposed by John Hardin. This is his description of the feature:
New option for OpenSSH: Delay before exit.
Command line option: -S delay
Config file option: sleep {delay}
Purpose: Wait the specified number of seconds after last traffic before
dropping the connection and exiting. If ports are forwarded, this causes
the ssh client
2005 Mar 10
6
[Bug 996] Fatal error in xfree() when scp invokes ssh with a LocalForward config
http://bugzilla.mindrot.org/show_bug.cgi?id=996
Summary: Fatal error in xfree() when scp invokes ssh with a
LocalForward config
Product: Portable OpenSSH
Version: 4.0p1
Platform: All
OS/Version: FreeBSD
Status: NEW
Severity: normal
Priority: P2
Component: ssh
AssignedTo:
2001 Sep 28
1
[PATCH] fix for Linux hang on exit bug in 2.9.9p2
As you are now probably aware, the portability team for openssh still
has not fixed the hang-on-exit bug in the 2.9.9p2 release.
Attached is a patch for 2.9.9p2 that fixes the hang-on-exit bug for Linux
systems. It also adds a useful exit delay feature that has also not yet been
incorporated into the main sources.
For more information, see the SNFS (secure NFS) web page:
2002 Jul 04
1
[PATCH]: Remove HAVE_CYGWIN in favor of NO_IPPORT_RESERVED_CONCEPT
Hi,
I've sent that patch once already but it seems more or less forgotten
in the tumultuous days of the latest vulnerability.
It adds a new define NO_IPPORT_RESERVED_CONCEPT which can be defined
on platforms not supporting the concept of "privileged" ports only
accessible by privileged users but which allow everyone to use these
ports.
This patch removes some Cygwin dependencies
2001 Nov 14
6
[PATCH]: Patch to fix hang on exit bug under Linux and add optional exit delay
The hang-on-exit bug still hasn't been fixed in OpenSSH-3.0p1... :-(
Here again is the patch to fix this bug under Linux, updated for OpenSSH-3.0p1.
This has been exhaustively tested for six months now. It also add an exit
delay option that can be useful.
The patch does not lead to data loss under Linux.
Please see the Secure NFS page (SNFS) for further details:
2003 Jan 29
0
[PATCH] features for restricted shell environments
The patch below implements a couple of features which are useful
in an environment where users do not have a regular shell login.
It allows you to selectively disable certain features on a
system-wide level for users with a certain shell; it also allows
you to control and audit TCP forwarding in more detail.
Our system is an email server with a menu for the login shell;
we selectively allow port
2005 Feb 22
0
TR: 3.8.1p1 option "permitopennet" added
Patch is below :
diff -nru openssh-3.8.1p1/auth-options.c openssh-3.8.1p1-devs//auth-options.c
--- openssh-3.8.1p1/auth-options.c Tue Jun 3 02:25:48 2003
+++ openssh-3.8.1p1-devs//auth-options.c Mon Feb 21 16:56:49 2005
@@ -265,6 +265,81 @@
xfree(patterns);
goto next_option;
}
+
+/* e.g: permitopenned="158.156.0.0/255.255.255.0:25[-1024]"
+ * note that part between [] is
2003 Apr 14
1
OpenSSH 3.6.1p1 "Proxy-None" patch
Hi OpenSSH'lers!
While using OpenSSH for quite a while, I became annoyed with the
inflexible config-file parsing algorithm. I special it did not
alow me to express: "Use *no* proxy for host xyz, but *this* proxy
for all other hosts".
So I had a look at the source an make a quick-n-dirty change, allowing
me to use the special ProxyCommand "None" to express "don't