Thanks for instant answering,

I was still aware of SO_REUSEADDR in dbutil.c, but could not quickly determine whether this also applies to forwarding channels. In any case, reconnect goes OK when the embedded system gets a reboot prior to poweroff (as could be expected).

In the problem case, the host netstat shows up
tcp 0 0 localhost.localdo:51225 localhost.localdo:10526 CLOSE_WAIT

BTW: I'm using 0.52 on a blackfin platform.

Regarding strace: Must be prepared. Is not yet built into the root file system. I'll return later to it.

Rob

Note: I also noticed
    http://comments.gmane.org/gmane.network.ssh.dropbear/962
before, and the suggestions in that thread will probably be realised after the current problem has been solved.



Am 23.07.2012, 14:32 Uhr, schrieb Matt Johnston <[email protected]>:

Hi,

Dropbear already does SO_REUSEADDR for all listening
sockets, see
https://secure.ucc.asn.au/hg/dropbear/file/983a817f8e41/dbutil.c#l254

Can you run strace on dbclient to see what's failing? Does
the server log anything?

Cheers,
Matt

On Mon, Jul 23, 2012 at 02:13:05PM +0200, Maris, Rob wrote:
Use case:
- embedded system running dbclient with server connection that
includes a port forwarding.
- system is powered off, and powered on again
- upon next boot, the following message is given:
dbclient: Remote TCP forward request failed (port 10526 -> 127.0.0.1:22)

I'd believe that doing a SO_REUSEADDR via setsockopt() would resolve
this issue.
However, I'm not sure and where to implement this (in cli_tcpfwd.c?)

Thanks for any suggestions.

Rob

Reply via email to