Hello,

Thanks for the report. Mosh does need to have working UDP passing in
both directions. In the documentation (http://mosh.mit.edu), we
recommend just opening UDP ports 60000-61000, but you can open a
smaller range if you like (e.g. 60000-60010) or just open a single
port and request it with the -p option.

Unfortunately, at least with the current design, we can't rely on your
proposed strategy of having the server initiate the connection,
because this won't work after the client has roamed to a new IP
address. (How will the firewall know to allow UDP packets from the new
client IP?)

Best regards,
Keith

On Sun, Apr 22, 2012 at 2:22 PM, Colin Turner <[email protected]> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
>
> Package: mosh
> Version: 1.1.3-1
> Severity: normal
>
> Dear Maintainer,
>
> Thanks very much for packaging this very interesting application, I
> could really do with it.
>
> I found some problems getting it to connect to my "main" server, which
> evaporated when I disabled the firewall. My firewall essentially
> disables most access and then opens it for specific ports. But it
> includes this section.
>
> === Start Clip ===
>
> # Anything on the external interface which is related to, or otherwise
> to do
>
> # with an existing connection is allowed. Also allow new outbound
> connections.
>
> iptables -A OUTPUT  -o $DMZ_INTERFACE -m state --state
> NEW,ESTABLISHED,RELATED -j ACCEPT
> iptables -A INPUT   -i $DMZ_INTERFACE -m state --state
> ESTABLISHED,RELATED -j ACCEPT
> #iptables -A FORWARD -i $DMZ_INTERFACE -o $LAN_INTERFACE -m state
> - --state ESTABLISHED,RELATED -j ACCEPT
>
> === End Clip ===
>
> which I would have expected would have allowed mosh through.
>
> Indeed, I switched off the firewall, initiated a mosh connection and
> brought the firewall back up. That connection is still live as I type,
> and working; but another mosh session I just tried failed. This
> suggests to me that the bypass may be partially working after the
> initial connect.
>
> Perhaps mosh starts the connection on SSH, and then relies on the
> client to contact the server process - if the server process initiated
> this first it would solve this problem without having to open hundreds
> of UDP ports on the firewall.
>
> Kind regards,
>
> CT.
>
> - -- System Information:
> Debian Release: wheezy/sid
>  APT prefers testing
>  APT policy: (990, 'testing'), (500, 'unstable'), (500, 'stable'),
> (1, 'experimental')
> Architecture: amd64 (x86_64)
>
> Kernel: Linux 3.2.0-2-amd64 (SMP w/4 CPU cores)
> Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8)
> Shell: /bin/sh linked to /bin/dash
>
> Versions of packages mosh depends on:
> ii  libc6           2.13-27
> ii  libgcc1         1:4.7.0-1
> ii  libio-pty-perl  1:1.08-1+b2
> ii  libncurses5     5.9-4
> ii  libprotobuf7    2.4.1-1
> ii  libstdc++6      4.7.0-1
> ii  libtinfo5       5.9-4
> ii  libutempter0    1.1.5-4
> ii  openssh-client  1:5.9p1-5
> ii  zlib1g          1:1.2.6.dfsg-2
>
> mosh recommends no packages.
>
> mosh suggests no packages.
>
> - -- no debconf information
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.12 (GNU/Linux)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
>
> iQIcBAEBCAAGBQJPlEyDAAoJEJhSfHbQK6t7RsUP/ia7NGsJ+8sUWPsAPZf/fQo8
> A98sAyWV2D8Fb6hM+9aYDHTfRck00CW5f5KzEyE7w8dVLCzQk2dtp5p/knyiWW69
> FWjZ90FcodYxUAwYHLyxm23RpjJNLAuj10pcLlkivb5T4+azrHQsubZs5VwuJEPW
> I2Kor59n8ozbKvaExhwDWFsT5srxN76n2xhHKx65C2H50D1DV3L4ryR26rWbjWhC
> nm6LG0BdEaihU8f1rNBzOFme0whKJQaFy1KtUVKR6C8iNWaAIXfQNj7HvgxKDDLi
> IvRrTfJ3gN20GpZX+a+v6+JdLEBDJ0SbCQSKgoOmf3xAlgB7LWyedecLdn2OHIKM
> LfhgAJz8xw204juwIJoUIvgqwtTMzzFfL5mjWl4/1DxGGrpTi3mwSds/6jPiIE4x
> AKkeHC/0Y6bLF+Z7267bHcspCGV05RUbfeeF/aC1P+PA6kazFIYbgO8HqS7XGPSK
> fP62hh2BRfY1PYyjvbmpiPZ3gCgv3rVWByNfBxby0QnO0DLFKNDehzrfr2ICLOnE
> ckU1a6WjZbxJ2dpR2eJevb2M9KOmzUQFiFVY60UW05QJG2SjTTa7YB/up0pCqbsz
> qj5D7hPhEjEAuvHxndC0dgxB4g1IDziQubEKCiYTUN9VVcmsyA79lHjrJWHlBgrL
> 6J/A5XegzEp3+Eax1mQk
> =SrX3
> -----END PGP SIGNATURE-----
>
>



--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to