summaryrefslogtreecommitdiff
path: root/sshconnect.c
diff options
context:
space:
mode:
authorMatthew Vernon <matthew@debian.org>2014-02-09 16:10:05 +0000
committerColin Watson <cjwatson@debian.org>2014-02-09 23:43:41 +0000
commit893bd5a6f70b58e1ed98d496c4f465d8c1df71a7 (patch)
treee006ae9c8fe6e1682f2af88f0f23875a7ef59d06 /sshconnect.c
parent6a137c3718ea1afab92b25a018e393cfede4d6a8 (diff)
Include the Debian version in our identification
This makes it easier to audit networks for versions patched against security vulnerabilities. It has little detrimental effect, as attackers will generally just try attacks rather than bothering to scan for vulnerable-looking version strings. (However, see debian-banner.patch.) Forwarded: not-needed Last-Update: 2013-09-14 Patch-Name: package-versioning.patch
Diffstat (limited to 'sshconnect.c')
-rw-r--r--sshconnect.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/sshconnect.c b/sshconnect.c
index bda83b25e..ad960fdbf 100644
--- a/sshconnect.c
+++ b/sshconnect.c
@@ -442,10 +442,10 @@ send_client_banner(int connection_out, int minor1)
442 /* Send our own protocol version identification. */ 442 /* Send our own protocol version identification. */
443 if (compat20) { 443 if (compat20) {
444 xasprintf(&client_version_string, "SSH-%d.%d-%.100s\r\n", 444 xasprintf(&client_version_string, "SSH-%d.%d-%.100s\r\n",
445 PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_VERSION); 445 PROTOCOL_MAJOR_2, PROTOCOL_MINOR_2, SSH_RELEASE);
446 } else { 446 } else {
447 xasprintf(&client_version_string, "SSH-%d.%d-%.100s\n", 447 xasprintf(&client_version_string, "SSH-%d.%d-%.100s\n",
448 PROTOCOL_MAJOR_1, minor1, SSH_VERSION); 448 PROTOCOL_MAJOR_1, minor1, SSH_RELEASE);
449 } 449 }
450 if (roaming_atomicio(vwrite, connection_out, client_version_string, 450 if (roaming_atomicio(vwrite, connection_out, client_version_string,
451 strlen(client_version_string)) != strlen(client_version_string)) 451 strlen(client_version_string)) != strlen(client_version_string))