summaryrefslogtreecommitdiff
path: root/opacket.h
diff options
context:
space:
mode:
authordjm@openbsd.org <djm@openbsd.org>2016-09-28 16:33:06 +0000
committerDamien Miller <djm@mindrot.org>2016-09-29 03:11:32 +1000
commit0082fba4efdd492f765ed4c53f0d0fbd3bdbdf7f (patch)
treeb0271896ec4d6c0e716821954212677438824a05 /opacket.h
parent27c3a9c2aede2184856b5de1e6eca414bb751c38 (diff)
upstream commit
Remove support for pre-authentication compression. Doing compression early in the protocol probably seemed reasonable in the 1990s, but today it's clearly a bad idea in terms of both cryptography (cf. multiple compression oracle attacks in TLS) and attack surface. Moreover, to support it across privilege-separation zlib needed the assistance of a complex shared-memory manager that made the required attack surface considerably larger. Prompted by Guido Vranken pointing out a compiler-elided security check in the shared memory manager found by Stack (http://css.csail.mit.edu/stack/); ok deraadt@ markus@ NB. pre-auth authentication has been disabled by default in sshd for >10 years. Upstream-ID: 32af9771788d45a0779693b41d06ec199d849caf
Diffstat (limited to 'opacket.h')
-rw-r--r--opacket.h3
1 files changed, 0 insertions, 3 deletions
diff --git a/opacket.h b/opacket.h
index 16322ec6f..d2a63a355 100644
--- a/opacket.h
+++ b/opacket.h
@@ -133,9 +133,6 @@ void packet_disconnect(const char *, ...)
133 ssh_packet_get_input(active_state) 133 ssh_packet_get_input(active_state)
134#define packet_get_output() \ 134#define packet_get_output() \
135 ssh_packet_get_output(active_state) 135 ssh_packet_get_output(active_state)
136#define packet_set_compress_hooks(ctx, allocfunc, freefunc) \
137 ssh_packet_set_compress_hooks(active_state, ctx, \
138 allocfunc, freefunc);
139#define packet_check_eom() \ 136#define packet_check_eom() \
140 ssh_packet_check_eom(active_state) 137 ssh_packet_check_eom(active_state)
141#define set_newkeys(mode) \ 138#define set_newkeys(mode) \