Skip to content

Commit a636f8f

Browse files
committed
Use proper CHAN_TCP_PACKET_DEFAULT for agent forwarding when HPN disabled.
The use of CHAN_TCP_WINDOW_DEFAULT here was fixed in upstream OpenSSH in CVS 1.4810, git 5baa170d771de9e95cf30b4c469ece684244cf3e: - [email protected] 2007/12/28 22:34:47 [clientloop.c] Use the correct packet maximum sizes for remote port and agent forwarding. Prevents the server from killing the connection if too much data is queued and an excessively large packet gets sent. bz freebsd#1360, ok djm@. The change was lost due to the the way the original upstream HPN patch modified this code. It was re-adding the original OpenSSH code and never was properly fixed to use the new value. MFC after: 2 weeks
1 parent 97599fc commit a636f8f

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

crypto/openssh/clientloop.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -1923,7 +1923,7 @@ client_request_agent(const char *request_type, int rchan)
19231923
if (options.hpn_disabled)
19241924
c = channel_new("authentication agent connection",
19251925
SSH_CHANNEL_OPEN, sock, sock, -1,
1926-
CHAN_X11_WINDOW_DEFAULT, CHAN_TCP_WINDOW_DEFAULT, 0,
1926+
CHAN_X11_WINDOW_DEFAULT, CHAN_TCP_PACKET_DEFAULT, 0,
19271927
"authentication agent connection", 1);
19281928
else
19291929
c = channel_new("authentication agent connection",

0 commit comments

Comments
 (0)