[openssh-commits] [openssh] 02/07: upstream: correct section numbers; from Ed Maste
git+noreply at mindrot.org
git+noreply at mindrot.org
Mon Jan 8 13:26:52 AEDT 2024
This is an automated email from the git hooks/post-receive script.
djm pushed a commit to branch master
in repository openssh.
commit 5413b1c7ff5a19c6a7d44bd98c5a83eb47819ba6
Author: djm at openbsd.org <djm at openbsd.org>
Date: Tue Dec 19 06:41:14 2023 +0000
upstream: correct section numbers; from Ed Maste
OpenBSD-Commit-ID: e289576ee5651528404cb2fb68945556052cf83f
---
PROTOCOL | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git a/PROTOCOL b/PROTOCOL
index 1894d573..b2708953 100644
--- a/PROTOCOL
+++ b/PROTOCOL
@@ -137,7 +137,7 @@ than as a named global or channel request to allow pings with very
short packet lengths, which would not be possible with other
approaches.
-1.9 transport: strict key exchange extension
+1.10 transport: strict key exchange extension
OpenSSH supports a number of transport-layer hardening measures under
a "strict KEX" feature. This feature is signalled similarly to the
@@ -163,7 +163,7 @@ b) After sending or receiving a SSH2_MSG_NEWKEYS message, reset the
duration of the connection (i.e. not just the first
SSH2_MSG_NEWKEYS).
-1.10 transport: SSH2_MSG_EXT_INFO during user authentication
+1.11 transport: SSH2_MSG_EXT_INFO during user authentication
This protocol extension allows the SSH2_MSG_EXT_INFO to be sent
during user authentication. RFC8308 does allow a second
@@ -790,4 +790,4 @@ master instance and later clients.
OpenSSH extends the usual agent protocol. These changes are documented
in the PROTOCOL.agent file.
-$OpenBSD: PROTOCOL,v 1.51 2023/12/18 14:45:49 djm Exp $
+$OpenBSD: PROTOCOL,v 1.52 2023/12/19 06:41:14 djm Exp $
--
To stop receiving notification emails like this one, please contact
djm at mindrot.org.
More information about the openssh-commits
mailing list