mirror of
https://github.com/clearml/dropbear
synced 2025-06-26 18:17:32 +00:00
A hack to make dbclient to tcp forwarding netcat style.
eg ./dbclient -i testkey -L 1234:remotehost:remoteport tunnelhost will ssh to tunnelhost (using testkey, there's no way to ask for a password) and then tcpfwd to remotehost:remoteport on stdin/stdout. There's no way to give a cmdline password, so -i for a keyfile will have to do. Yet another reason for agent forwarding. The 1234 is a dummy var, I think it has to be a valid portnumber though. --HG-- branch : dbclient-netcat-alike extra : convert_revision : d1f69334581dc4c35f9ca16aa5355074c9dd315d
This commit is contained in:
@@ -213,10 +213,10 @@ static void cli_sessionloop() {
|
||||
|
||||
case USERAUTH_SUCCESS_RCVD:
|
||||
#ifdef ENABLE_CLI_LOCALTCPFWD
|
||||
setup_localtcp();
|
||||
//setup_localtcp();
|
||||
#endif
|
||||
#ifdef ENABLE_CLI_REMOTETCPFWD
|
||||
setup_remotetcp();
|
||||
//setup_remotetcp();
|
||||
#endif
|
||||
cli_send_chansess_request();
|
||||
TRACE(("leave cli_sessionloop: cli_send_chansess_request"))
|
||||
|
||||
Reference in New Issue
Block a user