[Bug 2521] subtract buffer size from computed rekey limit to avoid exceeding it
bugzilla-daemon at bugzilla.mindrot.org
bugzilla-daemon at bugzilla.mindrot.org
Fri Jan 8 13:33:03 AEDT 2016
https://bugzilla.mindrot.org/show_bug.cgi?id=2521
Darren Tucker <dtucker at zip.com.au> changed:
What |Removed |Added
----------------------------------------------------------------------------
Attachment #2778|0 |1
is obsolete| |
Attachment #2779| |ok?(djm at mindrot.org)
Flags| |
--- Comment #4 from Darren Tucker <dtucker at zip.com.au> ---
Created attachment 2779
--> https://bugzilla.mindrot.org/attachment.cgi?id=2779&action=edit
Account for actual contents of buffers when calculating rekeying
Patch #2778 solves the problem with the large rekeylimit ciphers but it
still potentially leaves the problems with the others, and using the
same approach on those will rekey significantly more than requested.
An alternative patch that checks the actual buffer usage which should
be more accurate. Can you confirm that this also solves the problem
you have observed?
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
More information about the openssh-bugs
mailing list