I made a setup where several road warriors (varying IP's) connect to home base and forward one port each to their local SSH ports, i.e: "ssh rw1002@homebase -n -N -R 5002:localhost:22" "ssh rw1003@homebase -n -N -R 5003:localhost:22" I can not find an option to restrict user rw1002 from forwarding port 5003, or for that matter stealing port 1080 or 8080 or whatever else local services might be configured to use if they're not running at the time. Several important things use ports >=1024 these days. PermitOpen restricts destinations for forwarding with -L I'm missing a similar option for -R Example: Match User rw1002 PermitListen 5002 Match User rw1003 PermitListen 0.0.0.0:5003 Match User rw1004 PermitListen localhost:5004 Similarly, having the option to do this in authorized_keys files would, I think, be awesome.
Isn't this solved by the patch proposed in the bug #2038 ?
It does indeed seem like that would take care of this issue. My search-fu needs more practice, it would seem. Thanks. *** This bug has been marked as a duplicate of bug 2038 ***
closing resolved bugs as of 8.6p1 release