[Bug 2183] New: ssh -g has no effect if master socket already open

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Thu Dec 12 02:36:36 EST 2013


https://bugzilla.mindrot.org/show_bug.cgi?id=2183

            Bug ID: 2183
           Summary: ssh -g has no effect if master socket already open
           Product: Portable OpenSSH
           Version: 6.4p1
          Hardware: amd64
                OS: Linux
            Status: NEW
          Severity: minor
          Priority: P5
         Component: ssh
          Assignee: unassigned-bugs at mindrot.org
          Reporter: imwellcushtymelike at gmail.com

>From the man page:
 -g      Allows remote hosts to connect to local forwarded ports.

When working with a control socket, this works fine if -g is included
with the initial connect attempt, for example:

$ cat ~/.ssh/config
Host *
ControlMaster        auto
ControlPath        ~/.ssh/%r@%h:%p

$ ssh -gTfNL 12345:localhost:12345 host
$ netstat -tln

tcp        0      0 0.0.0.0:12345             0.0.0.0:*              
LISTEN      -

$ lsof -n

ssh       182446        user    3u     IPv4           76397177      
0t0      TCP 192.168.0.9:51181->192.168.0.15:ssh (ESTABLISHED)
ssh       182446        user    4u     IPv4           76397181      
0t0      TCP *:3128 (LISTEN)
ssh       182446        user    5u     IPv6           76397182      
0t0      TCP *:3128 (LISTEN)

and similarly:

$ ssh -g host
user at host:~$ exit
$ ssh -gTfNL 12345:localhost:12345 host
$ netstat -tln

tcp        0      0 0.0.0.0:12345             0.0.0.0:*              
LISTEN      -

However, if it isn't then -g is ignored on subsequent attempts to
forward ports:

$ ssh host
user at host:~$ exit
$ ssh -g -L 12345:localhost:12345 host
$ netstat -tln

tcp        0      0 127.0.0.1:12345             0.0.0.0:*              
LISTEN      -

$ lsof -n

ssh       182399        user    3u     IPv4           76390396      
0t0      TCP 192.168.0.9:51178->192.168.0.15:ssh (ESTABLISHED)
ssh       182399        user    4u     unix 0x0000000000000000      
0t0 76390976 /home/user/.ssh/user at host
ssh       182399        user    6u     IPv6           76392394      
0t0      TCP [::1]:3128 (LISTEN)
ssh       182399        user    7u     IPv4           76392395      
0t0      TCP 127.0.0.1:3128 (LISTEN)

This doesn't really make sense: ssh should still be capable of binding
to the correct address as requested.

From:
https://bugs.launchpad.net/debian/+source/openssh/+bug/1259939
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731950

-- 
You are receiving this mail because:
You are watching the assignee of the bug.


More information about the openssh-bugs mailing list