]> andersk Git - openssh.git/commit
- markus@cvs.openbsd.org 2003/04/01 10:10:23
authordjm <djm>
Tue, 1 Apr 2003 11:43:39 +0000 (11:43 +0000)
committerdjm <djm>
Tue, 1 Apr 2003 11:43:39 +0000 (11:43 +0000)
commit177f584ba35afb1c73de17faf6035397589fd1c5
tree9c8467bd70c4ec91dac0da8cb774f53f83730166
parenta4e5acef6829a709c3c5f3ae8b26cc9bf96db33a
   - markus@cvs.openbsd.org 2003/04/01 10:10:23
     [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
     [readconf.h serverloop.c sshconnect2.c]
     rekeying bugfixes and automatic rekeying:
     * both client and server rekey _automatically_
           (a) after 2^31 packets, because after 2^32 packets
               the sequence number for packets wraps
           (b) after 2^(blocksize_in_bits/4) blocks
       (see: draft-ietf-secsh-newmodes-00.txt)
       (a) and (b) are _enabled_ by default, and only disabled for known
       openssh versions, that don't support rekeying properly.
     * client option 'RekeyLimit'
     * do not reply to requests during rekeying
   - markus@cvs.openbsd.org 2003/04/01 10:22:21
     [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
     [readconf.h serverloop.c sshconnect2.c]
     backout rekeying changes (for 3.6.1)
ChangeLog
clientloop.c
monitor.c
monitor_wrap.c
packet.c
packet.h
readconf.c
readconf.h
serverloop.c
sshconnect2.c
This page took 0.118938 seconds and 5 git commands to generate.