-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for AllowTcpForwarding to hosts. #6783
Comments
tcsc
added a commit
that referenced
this issue
May 21, 2021
Prior to this change, TCP forwarding over SSH could only be disallowed by user-based rules, rather than by individual target nodes. This change adds * the `allow_tcp_forwarding` key to the yaml SSH config block, with values compatable with the equivalent setting for OpenSSH `sshd`, i.e. "yes", "no", "all" and "local" * Plumbing to pipe the resulting config value through to the SSH server * A predicate check in the SSH server to [dis]allow port forwarding based on the setting. See-Also: Issue #6783
tcsc
added a commit
that referenced
this issue
May 28, 2021
Prior to this change, TCP forwarding over SSH could only be disallowed by user-based rules, rather than by individual target nodes. This change adds * the `allow_tcp_forwarding` key to the yaml SSH config block, with values compatable with the equivalent setting for OpenSSH `sshd`, i.e. "yes", "no", "all" and "local" * Plumbing to pipe the resulting config value through to the SSH server * A predicate check in the SSH server to [dis]allow port forwarding based on the setting. See-Also: Issue #6783
tcsc
added a commit
that referenced
this issue
Jun 9, 2021
Prior to this change, TCP forwarding over SSH could only be disallowed by user-based rules, rather than by individual target nodes. This change adds * the `allow_tcp_forwarding` key to the yaml SSH config block, with values compatable with the equivalent setting for OpenSSH `sshd`, i.e. "yes", "no", "all" and "local" * Plumbing to pipe the resulting config value through to the SSH server * A predicate check in the SSH server to [dis]allow port forwarding based on the setting. See-Also: Issue #6783
tcsc
added a commit
that referenced
this issue
Jun 17, 2021
Prior to this change, TCP forwarding over SSH could only be disallowed by user-based rules, rather than by individual target nodes. This change adds: * the`port_forwarding` key to the yaml SSH config block, with a boolean value * Plumbing to pipe the resulting config value through to the SSH server * A predicate check in the SSH server to [dis]allow port forwarding based on the setting. This change also: * adds a common way for integration tests to await the establishment of an SSH session * refactors several integration tests to use this new method rather than manually waiting * adds some marshaling code to move errors from spawned goroutines back into the main test routine in verifySessionJoin() See-Also: Issue #6783
tcsc
added a commit
that referenced
this issue
Jun 18, 2021
Prior to this change, TCP forwarding over SSH could only be disallowed by user-based rules, rather than by individual target nodes. This change adds: * the`port_forwarding` key to the yaml SSH config block, with a boolean value * Plumbing to pipe the resulting config value through to the SSH server * A predicate check in the SSH server to [dis]allow port forwarding based on the setting. This change also: * adds a common way for integration tests to await the establishment of an SSH session * refactors several integration tests to use this new method rather than manually waiting * adds some marshaling code to move errors from spawned goroutines back into the main test routine in verifySessionJoin() See-Also: Issue #6783
tcsc
added a commit
that referenced
this issue
Jun 18, 2021
Prior to this change, TCP forwarding over SSH could only be disallowed by user-based rules, rather than by individual target nodes. This change adds: * the`port_forwarding` key to the yaml SSH config block, with a boolean value * Plumbing to pipe the resulting config value through to the SSH server * A predicate check in the SSH server to [dis]allow port forwarding based on the setting. This change also: * adds a common way for integration tests to await the establishment of an SSH session * refactors several integration tests to use this new method rather than manually waiting * adds some marshaling code to move errors from spawned goroutines back into the main test routine in verifySessionJoin() See-Also: Issue #6783
tcsc
added a commit
that referenced
this issue
Jun 18, 2021
Prior to this change, TCP forwarding over SSH could only be disallowed by user-based rules, rather than by individual target nodes. This change adds: * the`port_forwarding` key to the yaml SSH config block, with a boolean value * Plumbing to pipe the resulting config value through to the SSH server * A predicate check in the SSH server to [dis]allow port forwarding based on the setting. This change also: * adds a common way for integration tests to await the establishment of an SSH session * refactors several integration tests to use this new method rather than manually waiting * adds some marshaling code to move errors from spawned goroutines back into the main test routine in verifySessionJoin() See-Also: Issue #6783
tcsc
added a commit
that referenced
this issue
Jun 18, 2021
Prior to this change, TCP forwarding over SSH could only be disallowed by user-based rules, rather than by individual target nodes. This change adds: * the`port_forwarding` key to the yaml SSH config block, with a boolean value * Plumbing to pipe the resulting config value through to the SSH server * A predicate check in the SSH server to [dis]allow port forwarding based on the setting. This change also: * adds a common way for integration tests to await the establishment of an SSH session * refactors several integration tests to use this new method rather than manually waiting * adds some marshaling code to move errors from spawned goroutines back into the main test routine in verifySessionJoin() See-Also: Issue #6783
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
A customer has asked to add support for
AllowTcpForwarding
on a per-host basis. This would allow customers to enable port forwarding for a user within their role but not allow forwarding for specific hosts.For example, for the hosts whose
teleport.yaml
contains the below, in effect this function would return an error: reexec.go#L256-L337.From
man sshd_config
:The text was updated successfully, but these errors were encountered: