]> git.ipfire.org Git - thirdparty/openssh-portable.git/commit
upstream: Enforce maximum packet/block limit during
authordjm@openbsd.org <djm@openbsd.org>
Tue, 30 Dec 2025 00:22:58 +0000 (00:22 +0000)
committerDamien Miller <djm@mindrot.org>
Tue, 30 Dec 2025 00:36:51 +0000 (11:36 +1100)
commitca313fef2deed90668fe0706da8529310092d1dd
treed7be50ecbbdfb291cde46df2790ba205c6ae7b01
parent55b6b1697433eca98052f5c45281133ca793a9c8
upstream: Enforce maximum packet/block limit during

pre-authentication phase

OpenSSH doesn't support rekeying before authentication completes to
minimise pre-auth attack surface.

Given LoginGraceTime, MaxAuthTries and strict KEX, it would be
difficult to send enough data or packets before authentication
completes to reach a point where rekeying is required, but we'd
prefer it to be completely impossible.

So this applies the default volume/packet rekeying limits to the
pre-auth phase. If these limits are exceeded the connection will
simply be closed.

ok dtucker markus

OpenBSD-Commit-ID: 70415098db739058006e4ebd1630b6bae8cc8bf6
packet.c