[Bug 2473] sshd and -R port forwardings on 127.0.0.0/8
bugzilla-daemon at bugzilla.mindrot.org
bugzilla-daemon at bugzilla.mindrot.org
Tue May 2 21:14:27 AEST 2017
https://bugzilla.mindrot.org/show_bug.cgi?id=2473
Gerik Bonaert <gbo at escaux.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |gbo at escaux.com
--- Comment #3 from Gerik Bonaert <gbo at escaux.com> ---
I have tested this patch against the version of OpenSSH distributed in
Ubuntu 16.04 (7.2p2). It works quite well, but I had to make some small
changes:
On line 1353, I believe it should be:
if (arg == NULL || *arg == '\0')
instead of:
if (arg == NULL || *arg != '\0')
I was also wondering why we cannot enforce these limitations for the
loopback addresses as well?
if (type == SSH_CHANNEL_RPORT_LISTENER && !is_loopback &&
fwd_opts->gateway_ports_explicit != NULL &&
addr_match_cidr_list(ntop,
fwd_opts->gateway_ports_explicit) != 1) {
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
More information about the openssh-bugs
mailing list