[Bug 2473] sshd and -R port forwardings on

bugzilla-daemon at bugzilla.mindrot.org bugzilla-daemon at bugzilla.mindrot.org
Tue May 2 21:14:27 AEST 2017


Gerik Bonaert <gbo at escaux.com> changed:

           What    |Removed                     |Added
                 CC|                            |gbo at escaux.com

--- Comment #3 from Gerik Bonaert <gbo at escaux.com> ---
I have tested this patch against the version of OpenSSH distributed in
Ubuntu 16.04 (7.2p2). It works quite well, but I had to make some small

On line 1353, I believe it should be:

if (arg == NULL || *arg == '\0') 

instead of:

if (arg == NULL || *arg != '\0') 

I was also wondering why we cannot enforce these limitations for the
loopback addresses as well?

if (type == SSH_CHANNEL_RPORT_LISTENER && !is_loopback &&
    fwd_opts->gateway_ports_explicit != NULL &&
    fwd_opts->gateway_ports_explicit) != 1) {

You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.

More information about the openssh-bugs mailing list