| Commit message (Collapse) | Author | Age | Files | Lines |
| ... | |
| |
|
|
|
|
|
|
| |
may be forwarded to a local Unix domain socket and vice versa or
both ends may be a Unix domain socket. This is a reimplementation
of the streamlocal patches by William Ahern from:
http://www.25thandclement.com/~william/projects/streamlocal.html
OK djm@ markus@
|
| |
|
|
|
| |
have sent a close already; analysis and patch from Simon Tatham;
ok markus@
|
| | |
|
| |
|
|
|
| |
max_time_milliseconds to avoid potential integer overflow in the timeout.
bz#2170, patch from Loganaden Velvindron, ok djm@
|
| | |
|
| | |
|
| | |
|
| |
|
|
| |
based on traffic volume or time. ok djm@, help & ok jmc@ for the man page.
|
| |
|
|
| |
but will prevent warnings in portable. ok djm@
|
| |
|
|
|
| |
current "yes"/"no" to allow the server to specify whether just local or
remote TCP forwarding is enabled. ok markus@
|
| |
|
|
| |
rekeying
|
| |
|
|
| |
while; ok deraadt@ markus@
|
| | |
|
| |
|
|
|
| |
changes. Most code from Martin Forssen, maf at appgate dot com.
ok markus@
|
| |
|
|
|
| |
from other files. No functional changes.
ok markus@ djm@
|
| |
|
|
| |
want_reply is set in the packet
|
| |
|
|
|
| |
dyamically allocate a listen port at runtime (this is actually
specified in rfc4254); bz#1003 ok markus@
|
| |
|
|
|
|
|
|
|
|
|
| |
rather than 0, which it will now treat as valid (needed for future work)
adjust current consumers of a2port() to check its return value is <= 0,
which in turn required some things to be converted from u_short => int
make use of int vs. u_short consistent in some other places too
feedback & ok markus@
|
| |
|
|
| |
broken CHANNEL_FAILURE/SUCCESS messages since about 2004; ok djm@
|
| |
|
|
| |
channel handler, avoiding spurious log messages; ok! markus@
|
| |
|
|
|
|
|
|
|
|
|
|
| |
client sends when it knows that it will never request another session
(i.e. when session multiplexing is disabled). This allows a server to
disallow further session requests and terminate the session.
Why would a non-multiplexing client ever issue additional session
requests? It could have been attacked with something like SSH'jack:
http://www.storm.net.nz/projects/7
feedback & ok markus
|
| |
|
|
|
|
|
| |
ssh -2 localhost od /bin/ls | true
ignoring SIGPIPE by adding a new channel message (EOW) that signals
the peer that we're not interested in any data it might send.
fixes bz #85; discussion, debugging and ok djm@
|
| |
|
|
|
|
|
|
|
| |
whose DNS name resolves to more than one address. The previous behaviour
was to try the first address and give up.
Reported by stig AT venaas.com in bz#343
great feedback and ok markus@
|
| |
|
|
|
|
|
|
|
|
|
|
|
| |
mechanism. Each channel maintains a queue of callbacks, which will
be drained in order (RFC4253 guarantees confirm messages are not
reordered within an channel).
Also includes a abandonment callback to clean up if a channel is
closed without sending confirmation messages. This probably
shouldn't happen in compliant implementations, but it could be
abused to leak memory.
ok markus@ (as part of a larger diff)
|
| |
|
|
| |
keepalive timer (bz #1307). ok markus@
|
| |
|
|
|
| |
packet arrives while we're waiting in packet_read_expect (and possibly
elsewhere).
|
| |
|
|
|
|
| |
ServerAlive and ClientAlive timers. Prevents dropping a connection
when these are enabled but the peer does not support our keepalives.
bz #1307, ok djm@.
|
| |
|
|
| |
since the tcp sendqueue might be already full (of alive requests); ok dtucker, report mpf
|
| |
|
|
|
| |
ok djm, sort of ok stevesk
makes the pain stop in one easy step
|
| | |
|
| | |
|
| | |
|
| |
|
|
| |
massimo@cedoc.mo.it
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
|
|
| |
Theo nuked - our scripts to sync -portable need them in the files
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
|
|
| |
ok deraadt@ dtucker@
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
|
|
|
|
|
|
|
| |
with the initial commit but is required for a portable approach.
- make the tunnel id u_int and platform friendly, use predefined types.
- support configuration of layer 2 (ethernet) or layer 3
(point-to-point, default) modes. configuration is done using the
Tunnel (yes|point-to-point|ethernet|no) option is ssh_config(5) and
restricted by the PermitTunnel (yes|point-to-point|ethernet|no) option
in sshd_config(5).
ok djm@, man page bits by jmc@
|