Mirrors | Updates | Feedback | Changes | Wishlist | Team
In SSH-2, the local-to-remote port-forwarding request is defined by secsh-connect to contain an "originator IP address" and "originator port", which identify to the server where the connection the client received came from.
PuTTY has always taken the view that this is none of the server's business, and sent the bogus IP address client-side-connection and port 0.
Apparently, some servers take exception to this (with some justification) and refuse the forwarding. Specifically, a problem has reported with SSH Tectia Server (T) for Windows, version 5.0.0-844, and also with F-Secure SSH for Unix, version 3.1.0. Using 0.0.0.0 instead appears to mollify these servers.
Audit trail for this semi-bug.