[Bug 2521] subtract buffer size from computed rekey limit to avoid exceeding it

bugzilla-daemon at bugzilla.mindrot.org bugzilla-daemon at bugzilla.mindrot.org
Mon Feb 8 22:00:27 AEDT 2016


https://bugzilla.mindrot.org/show_bug.cgi?id=2521

Damien Miller <djm at mindrot.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|ASSIGNED                    |RESOLVED
             Blocks|                            |2451
         Resolution|---                         |FIXED

--- Comment #9 from Damien Miller <djm at mindrot.org> ---
Fix applied, this will be in OpenSSH 7.2

commit 19bcf2ea2d17413f2d9730dd2a19575ff86b9b6a
Author: djm at openbsd.org <djm at openbsd.org>
Date:   Mon Feb 8 10:57:07 2016 +0000

    upstream commit

    refactor activation of rekeying

    This makes automatic rekeying internal to the packet code
(previously
    the server and client loops needed to assist). In doing to it makes
    application of rekey limits more accurate by accounting for packets
    about to be sent as well as packets queued during rekeying events
    themselves.

    Based on a patch from dtucker@ which was in turn based on a patch
    Aleksander Adamowski in bz#2521; ok markus@

    Upstream-ID: a441227fd64f9739850ca97b4cf794202860fcd8


Referenced Bugs:

https://bugzilla.mindrot.org/show_bug.cgi?id=2451
[Bug 2451] Bugs intended to be fixed in 7.2
-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.


More information about the openssh-bugs mailing list