diff options
author | djm@openbsd.org <djm@openbsd.org> | 2019-02-23 08:20:43 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2019-02-24 10:51:46 +1100 |
commit | 9b61130fbd95d196bce81ebeca94a4cb7c0d5ba0 (patch) | |
tree | 3ad20b470660a2193096586ccbf8acf6f580da4a /regress/unittests/hostkeys/testdata/rsa1_1.pub | |
parent | 37638c752041d591371900df820f070037878a2d (diff) |
upstream: openssh-7.9 accidentally reused the server's algorithm lists
in the client for KEX, ciphers and MACs. The ciphers and MACs were identical
between the client and server, but the error accidentially disabled the
diffie-hellman-group-exchange-sha1 KEX method.
This fixes the client code to use the correct method list, but
because nobody complained, it also disables the
diffie-hellman-group-exchange-sha1 KEX method.
Reported by nuxi AT vault24.org via bz#2697; ok dtucker
OpenBSD-Commit-ID: e30c33a23c10fd536fefa120e86af1842e33fd57
Diffstat (limited to 'regress/unittests/hostkeys/testdata/rsa1_1.pub')
0 files changed, 0 insertions, 0 deletions