]> andersk Git - openssh.git/commitdiff
- markus@cvs.openbsd.org 2001/04/04 15:50:55
authormouring <mouring>
Wed, 4 Apr 2001 23:43:26 +0000 (23:43 +0000)
committermouring <mouring>
Wed, 4 Apr 2001 23:43:26 +0000 (23:43 +0000)
     [compat.c]
     f-secure 1.3.2 does not handle IGNORE; from milliondl@ornl.gov

ChangeLog
compat.c

index 7974406818f6ea2a2fd91b9a876ab1836aaa683b..11dafeac576952ff2ba0fefef1d742128265ee67 100644 (file)
--- a/ChangeLog
+++ b/ChangeLog
@@ -9,6 +9,9 @@
      [clientloop.c kex.c kex.h serverloop.c sshconnect2.c sshd.c]       
      enable server side rekeying + some rekey related clientup.         
      todo: we should not send any non-KEX messages after we send KEXINIT
+   - markus@cvs.openbsd.org 2001/04/04 15:50:55
+     [compat.c]
+     f-secure 1.3.2 does not handle IGNORE; from milliondl@ornl.gov
 
 20010404
  - OpenBSD CVS Sync
index 686016f82f164a5cdc834cfa85fcba095ff229bd..4dfab90cedacc73a37cdb64da0a4ee6d716f2286 100644 (file)
--- a/compat.c
+++ b/compat.c
@@ -23,7 +23,7 @@
  */
 
 #include "includes.h"
-RCSID("$OpenBSD: compat.c,v 1.42 2001/03/27 17:46:49 provos Exp $");
+RCSID("$OpenBSD: compat.c,v 1.43 2001/04/04 15:50:55 markus Exp $");
 
 #ifdef HAVE_LIBPCRE
 #  include <pcreposix.h>
@@ -101,6 +101,7 @@ compat_datafellows(const char *version)
                { "^1\\.7 SecureFX",    SSH_OLD_SESSIONID },
                { "^1\\.2\\.1[89]",     SSH_BUG_IGNOREMSG },
                { "^1\\.2\\.2[012]",    SSH_BUG_IGNOREMSG },
+               { "^1\\.3\\.2",         SSH_BUG_IGNOREMSG },    /* f-secure */
                { "^SSH Compatible Server",                     /* Netscreen */
                                        SSH_BUG_PASSWORDPAD },
                { "^OSU_0",             SSH_BUG_PASSWORDPAD },
This page took 0.043782 seconds and 5 git commands to generate.