Hi,

I've noticed that outbound open-ssh clients are getting denied by a
firewall, because the server side attempts to open a tcp connection on
some port in the 512 - 1024 range.  Is there some way I can constrain it
to a narrow range of ports, so that the firewall can be taught to not
spaz?  

Why write back to priveleged ports anyway?  Why not a port >= 1024?

Reply via email to