[Bug 2473] sshd and -R port forwardings on 127.0.0.0/8

bugzilla-daemon at bugzilla.mindrot.org bugzilla-daemon at bugzilla.mindrot.org
Tue May 2 21:14:27 AEST 2017


https://bugzilla.mindrot.org/show_bug.cgi?id=2473

Gerik Bonaert <gbo at escaux.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |gbo at escaux.com

--- Comment #3 from Gerik Bonaert <gbo at escaux.com> ---
I have tested this patch against the version of OpenSSH distributed in
Ubuntu 16.04 (7.2p2). It works quite well, but I had to make some small
changes:

On line 1353, I believe it should be:

if (arg == NULL || *arg == '\0') 

instead of:

if (arg == NULL || *arg != '\0') 

I was also wondering why we cannot enforce these limitations for the
loopback addresses as well?

if (type == SSH_CHANNEL_RPORT_LISTENER && !is_loopback &&
    fwd_opts->gateway_ports_explicit != NULL &&
    addr_match_cidr_list(ntop,
    fwd_opts->gateway_ports_explicit) != 1) {

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.


More information about the openssh-bugs mailing list