summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--ChangeLog6
-rw-r--r--PROTOCOL13
2 files changed, 17 insertions, 2 deletions
diff --git a/ChangeLog b/ChangeLog
index a2d2045af..d4b454fc3 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -33,6 +33,10 @@
33 - markus@cvs.openbsd.org 2009/02/13 11:50:21 33 - markus@cvs.openbsd.org 2009/02/13 11:50:21
34 [packet.c] 34 [packet.c]
35 check for enc !=NULL in packet_start_discard 35 check for enc !=NULL in packet_start_discard
36 - djm@cvs.openbsd.org 2009/02/14 06:35:49
37 [PROTOCOL]
38 mention that eow and no-more-sessions extensions are sent only to
39 OpenSSH peers
36 40
3720090212 4120090212
38 - (djm) [sshpty.c] bz#1419: OSX uses cloning ptys that automagically 42 - (djm) [sshpty.c] bz#1419: OSX uses cloning ptys that automagically
@@ -5159,5 +5163,5 @@
5159 OpenServer 6 and add osr5bigcrypt support so when someone migrates 5163 OpenServer 6 and add osr5bigcrypt support so when someone migrates
5160 passwords between UnixWare and OpenServer they will still work. OK dtucker@ 5164 passwords between UnixWare and OpenServer they will still work. OK dtucker@
5161 5165
5162$Id: ChangeLog,v 1.5194 2009/02/14 05:35:01 djm Exp $ 5166$Id: ChangeLog,v 1.5195 2009/02/14 07:00:52 djm Exp $
5163 5167
diff --git a/PROTOCOL b/PROTOCOL
index 37fd536d9..5aada630d 100644
--- a/PROTOCOL
+++ b/PROTOCOL
@@ -64,6 +64,12 @@ remain open after a "eow@openssh.com" has been sent and more data may
64still be sent in the other direction. This message does not consume 64still be sent in the other direction. This message does not consume
65window space and may be sent even if no window space is available. 65window space and may be sent even if no window space is available.
66 66
67NB. due to certain broken SSH implementations aborting upon receipt
68of this message (in contravention of RFC4254 section 5.4), this
69message is only sent to OpenSSH peers (identified by banner).
70Other SSH implementations may be whitelisted to receive this message
71upon request.
72
674. connection: disallow additional sessions extension 734. connection: disallow additional sessions extension
68 "no-more-sessions@openssh.com" 74 "no-more-sessions@openssh.com"
69 75
@@ -87,6 +93,11 @@ connection.
87Note that this is not a general defence against compromised clients 93Note that this is not a general defence against compromised clients
88(that is impossible), but it thwarts a simple attack. 94(that is impossible), but it thwarts a simple attack.
89 95
96NB. due to certain broken SSH implementations aborting upon receipt
97of this message, the no-more-sessions request is only sent to OpenSSH
98servers (identified by banner). Other SSH implementations may be
99whitelisted to receive this message upon request.
100
905. connection: Tunnel forward extension "tun@openssh.com" 1015. connection: Tunnel forward extension "tun@openssh.com"
91 102
92OpenSSH supports layer 2 and layer 3 tunnelling via the "tun@openssh.com" 103OpenSSH supports layer 2 and layer 3 tunnelling via the "tun@openssh.com"
@@ -240,4 +251,4 @@ The values of the f_flag bitmask are as follows:
240Both the "statvfs@openssh.com" and "fstatvfs@openssh.com" extensions are 251Both the "statvfs@openssh.com" and "fstatvfs@openssh.com" extensions are
241advertised in the SSH_FXP_VERSION hello with version "2". 252advertised in the SSH_FXP_VERSION hello with version "2".
242 253
243$OpenBSD: PROTOCOL,v 1.11 2008/07/05 05:16:01 djm Exp $ 254$OpenBSD: PROTOCOL,v 1.12 2009/02/14 06:35:49 djm Exp $