[Bug 2521] subtract buffer size from computed rekey limit to avoid exceeding it
bugzilla-daemon at bugzilla.mindrot.org
bugzilla-daemon at bugzilla.mindrot.org
Mon Feb 8 22:00:27 AEDT 2016
https://bugzilla.mindrot.org/show_bug.cgi?id=2521
Damien Miller <djm at mindrot.org> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|ASSIGNED |RESOLVED
Blocks| |2451
Resolution|--- |FIXED
--- Comment #9 from Damien Miller <djm at mindrot.org> ---
Fix applied, this will be in OpenSSH 7.2
commit 19bcf2ea2d17413f2d9730dd2a19575ff86b9b6a
Author: djm at openbsd.org <djm at openbsd.org>
Date: Mon Feb 8 10:57:07 2016 +0000
upstream commit
refactor activation of rekeying
This makes automatic rekeying internal to the packet code
(previously
the server and client loops needed to assist). In doing to it makes
application of rekey limits more accurate by accounting for packets
about to be sent as well as packets queued during rekeying events
themselves.
Based on a patch from dtucker@ which was in turn based on a patch
Aleksander Adamowski in bz#2521; ok markus@
Upstream-ID: a441227fd64f9739850ca97b4cf794202860fcd8
Referenced Bugs:
https://bugzilla.mindrot.org/show_bug.cgi?id=2451
[Bug 2451] Bugs intended to be fixed in 7.2
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
More information about the openssh-bugs
mailing list