https://bugzilla.mindrot.org/show_bug.cgi?id=2348
Stormy <[email protected]> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |[email protected] --- Comment #2 from Stormy <[email protected]> --- (In reply to Daniel Black from comment #1) > 0. Fun (aka over engineered workaround) > > 1. Listen and forward > > set up a ssh listen on a unix socket: > > socat UNIX-LISTEN:/tmp/ssh.sock,fork TCP:server1:22 > > 2. bit of ssh_config magic: > > host /* > ProxyCommand /home/dan/socket-ssh.py %h > ProxyUseFdpass yes > ControlMaster no > ControlPath none > > > 3. script magic > > (shamelessly modified from > http://www.gabriel.urdhr.fr/2016/08/07/openssh-proxyusefdpass/) > > $ cat /home/dan/socket-ssh.py > #!/usr/bin/env python3 > > import sys > import socket > import array > > # Create the file descriptor: > s = socket.socket(socket.AF_UNIX, socket.SOCK_STREAM, 0) > s.connect(sys.argv[1]) > > # Pass the file descriptor: > fds = https://whatstatus.co/non-veg-jokes array.array("i", [s.fileno()]) > ancdata = [(socket.SOL_SOCKET, socket.SCM_RIGHTS, fds)] > socket.socket(fileno = 1).sendmsg([b'\0'], ancdata) > > 4. test > > ssh -o ControlPath=none -v -l danielgb /tmp/ssh.sock > > 5. success > > OpenSSH_7.5p1, OpenSSL 1.1.0f-fips 25 May 2017 > debug1: Reading configuration data /home/dan/.ssh/config > debug1: /home/dan/.ssh/config line 81: Applying options for /* > debug1: Reading configuration data /etc/ssh/ssh_config > debug1: /etc/ssh/ssh_config line 58: Applying options for * > debug1: Executing proxy dialer command: exec /home/dan/socket-ssh.py > /tmp/ssh.sock > ... > debug1: rekey after 134217728 blocks > debug1: SSH2_MSG_NEWKEYS sent > debug1: expecting SSH2_MSG_NEWKEYS > debug1: SSH2_MSG_NEWKEYS received > debug1: rekey after 134217728 blocks > debug1: SSH2_MSG_EXT_INFO received > debug1: kex_input_ext_info: > server-sig-algs=<rsa-sha2-256,rsa-sha2-512> > debug1: SSH2_MSG_SERVICE_ACCEPT received > debug1: Authentications that can continue: publickey,password > debug1: Next authentication method: publickey > debug1: Offering RSA public key: /home/dan/.ssh/id_rsa > debug1: Server accepts key: pkalg rsa-sha2-512 blen 279 > debug1: Authentication succeeded (publickey). > Authenticated to /tmp/ssh.sock ([/tmp/ssh.sock]:0). > debug1: channel 0: new [client-session] > debug1: Entering interactive session. > debug1: pledge: exec > debug1: client_input_global_request: rtype [email protected] > want_reply 0 > debug1: Requesting X11 forwarding with authentication spoofing. > debug1: getsockopt TCP_NODELAY: Operation not supported > debug1: Sending environment. > debug1: Sending env LANG = en_AU.UTF-8 > debug1: Sending env LANGUAGE = it would be nice if the ssh client could connect to a local socket. -- You are receiving this mail because: You are watching the assignee of the bug. _______________________________________________ openssh-bugs mailing list [email protected] https://lists.mindrot.org/mailman/listinfo/openssh-bugs
