[Bug 3061] requesting invalid terminal modes no longer aborts connection

bugzilla-daemon at bugzilla.mindrot.org bugzilla-daemon at bugzilla.mindrot.org
Thu Aug 29 14:26:45 AEST 2019


https://bugzilla.mindrot.org/show_bug.cgi?id=3061

--- Comment #1 from Darren Tucker <dtucker at dtucker.net> ---
FWIW since your example uses opcode 255, the current behaviour seems
more in compliance with RFC4254 than the previous behaviour:
https://tools.ietf.org/html/rfc4254#page-19:

   Opcodes 160 to 255 are not yet
   defined, and cause parsing to stop (they should only be used after
   any other data).

other than that it doesn't take a strong stance on unknown opcodes:

   the server MAY ignore any modes it does not know about

-- 
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.


More information about the openssh-bugs mailing list