*/
#include "includes.h"
-RCSID("$Id: ssh.c,v 1.6 1999/11/12 04:19:27 damien Exp $");
+RCSID("$Id: ssh.c,v 1.7 1999/11/13 02:28:45 damien Exp $");
#include "xmalloc.h"
#include "ssh.h"
/* Close connection cleanly after attack. */
cipher_attack_detected = packet_disconnect;
- /* If requested, fork and let ssh continue in the background. */
- if (fork_after_authentication_flag)
- {
- int ret = fork();
- if (ret == -1)
- fatal("fork failed: %.100s", strerror(errno));
- if (ret != 0)
- exit(0);
- setsid();
- }
-
/* Enable compression if requested. */
if (options.compression)
{
options.remote_forwards[i].host_port);
}
+ /* If requested, fork and let ssh continue in the background. */
+ if (fork_after_authentication_flag)
+ {
+ int ret = fork();
+ if (ret == -1)
+ fatal("fork failed: %.100s", strerror(errno));
+ if (ret != 0)
+ exit(0);
+ setsid();
+ }
+
/* If a command was specified on the command line, execute the command now.
Otherwise request the server to start a shell. */
if (buffer_len(&command) > 0)