summaryrefslogtreecommitdiff
path: root/clientloop.c
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2018-01-23 05:27:21 +0000
committerDamien Miller <djm@mindrot.org>2018-01-23 16:40:29 +1100
commit14b5c635d1190633b23ac3372379517fb645b0c2 (patch)
tree8ef70b4660b04ba6add4c314d52f84375cb16788 /clientloop.c
parent7c77991f5de5d8475cbeb7cbb06d0c7d1611d7bb (diff)
upstream commit
Drop compatibility hacks for some ancient SSH implementations, including ssh.com <=2.* and OpenSSH <= 3.*. These versions were all released in or before 2001 and predate the final SSH RFCs. The hacks in question aren't necessary for RFC- compliant SSH implementations. ok markus@ OpenBSD-Commit-ID: 4be81c67db57647f907f4e881fb9341448606138
Diffstat (limited to 'clientloop.c')
-rw-r--r--clientloop.c15
1 files changed, 4 insertions, 11 deletions
diff --git a/clientloop.c b/clientloop.c
index c187ae570..ed9bebdfa 100644
--- a/clientloop.c
+++ b/clientloop.c
@@ -1,4 +1,4 @@
1/* $OpenBSD: clientloop.c,v 1.309 2017/12/18 23:16:23 djm Exp $ */ 1/* $OpenBSD: clientloop.c,v 1.310 2018/01/23 05:27:21 djm Exp $ */
2/* 2/*
3 * Author: Tatu Ylonen <ylo@cs.hut.fi> 3 * Author: Tatu Ylonen <ylo@cs.hut.fi>
4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 4 * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -1541,12 +1541,7 @@ client_request_x11(struct ssh *ssh, const char *request_type, int rchan)
1541 return NULL; 1541 return NULL;
1542 } 1542 }
1543 originator = packet_get_string(NULL); 1543 originator = packet_get_string(NULL);
1544 if (datafellows & SSH_BUG_X11FWD) { 1544 originator_port = packet_get_int();
1545 debug2("buggy server: x11 request w/o originator_port");
1546 originator_port = 0;
1547 } else {
1548 originator_port = packet_get_int();
1549 }
1550 packet_check_eom(); 1545 packet_check_eom();
1551 /* XXX check permission */ 1546 /* XXX check permission */
1552 debug("client_request_x11: request from %s %d", originator, 1547 debug("client_request_x11: request from %s %d", originator,
@@ -1678,10 +1673,8 @@ client_input_channel_open(int type, u_int32_t seq, struct ssh *ssh)
1678 packet_start(SSH2_MSG_CHANNEL_OPEN_FAILURE); 1673 packet_start(SSH2_MSG_CHANNEL_OPEN_FAILURE);
1679 packet_put_int(rchan); 1674 packet_put_int(rchan);
1680 packet_put_int(SSH2_OPEN_ADMINISTRATIVELY_PROHIBITED); 1675 packet_put_int(SSH2_OPEN_ADMINISTRATIVELY_PROHIBITED);
1681 if (!(datafellows & SSH_BUG_OPENFAILURE)) { 1676 packet_put_cstring("open failed");
1682 packet_put_cstring("open failed"); 1677 packet_put_cstring("");
1683 packet_put_cstring("");
1684 }
1685 packet_send(); 1678 packet_send();
1686 } 1679 }
1687 free(ctype); 1680 free(ctype);