[openssh-commits] [openssh] 04/05: upstream: Set a default RekeyLimit of 256k.

git+noreply at mindrot.org git+noreply at mindrot.org
Tue Aug 20 23:02:40 AEST 2024


This is an automated email from the git hooks/post-receive script.

dtucker pushed a commit to branch master
in repository openssh.

commit 829976a63fd1efae3a4c3e7c16fded59d92edb67
Author: dtucker at openbsd.org <dtucker at openbsd.org>
AuthorDate: Tue Aug 20 09:02:45 2024 +0000

    upstream: Set a default RekeyLimit of 256k.
    
    Used unless overridden by a command-line flag, which simplifies some of
    the ssh command lines.
    
    OpenBSD-Regress-ID: e7cffa57027088e10336e412b34113969f88cb87
---
 regress/rekey.sh | 7 ++++---
 1 file changed, 4 insertions(+), 3 deletions(-)

diff --git a/regress/rekey.sh b/regress/rekey.sh
index f1ed4c56..24c5a380 100644
--- a/regress/rekey.sh
+++ b/regress/rekey.sh
@@ -1,4 +1,4 @@
-#	$OpenBSD: rekey.sh,v 1.23 2024/08/20 07:52:43 dtucker Exp $
+#	$OpenBSD: rekey.sh,v 1.24 2024/08/20 09:02:45 dtucker Exp $
 #	Placed in the Public Domain.
 
 tid="rekey"
@@ -9,6 +9,7 @@ rm -f ${LOG}
 cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak
 
 echo "Compression no" >> $OBJ/ssh_proxy
+echo "RekeyLimit 256k" >> $OBJ/ssh_proxy
 
 # Test rekeying based on data volume only.
 # Arguments will be passed to ssh.
@@ -57,7 +58,7 @@ done
 
 for opt in $opts; do
 	verbose "client rekey $opt"
-	ssh_data_rekeying "$opt" -oRekeyLimit=256k
+	ssh_data_rekeying "$opt"
 done
 
 # AEAD ciphers are magical so test with all KexAlgorithms
@@ -65,7 +66,7 @@ if ${SSH} -Q cipher-auth | grep '^.*$' >/dev/null 2>&1 ; then
   for c in `${SSH} -Q cipher-auth`; do
     for kex in `${SSH} -Q kex`; do
 	verbose "client rekey $c $kex"
-	ssh_data_rekeying "KexAlgorithms=$kex" -oRekeyLimit=256k -oCiphers=$c
+	ssh_data_rekeying "KexAlgorithms=$kex" -oCiphers=$c
     done
   done
 fi

-- 
To stop receiving notification emails like this one, please contact
djm at mindrot.org.


More information about the openssh-commits mailing list