Hi, I've noticed that outbound open-ssh clients are getting denied by a firewall, because the server side attempts to open a tcp connection on some port in the 512 - 1024 range. Is there some way I can constrain it to a narrow range of ports, so that the firewall can be taught to not spaz? Why write back to priveleged ports anyway? Why not a port >= 1024?
- Re: open-ssh client binding to random ports < 1024 Dave Morse
- Re: open-ssh client binding to random ports < 10... Markus Friedl
- Re: open-ssh client binding to random ports <... carson
- Re: open-ssh client binding to random ports... Markus Friedl
- Re: open-ssh client binding to random p... carson
- Re: open-ssh client binding to ran... Robert O'Callahan
- Re: open-ssh client binding to... Sami Lehtinen