Skip to content

Commit 8f42a2f

Browse files
committed
ssh client roaming bug fix applied.
Disable experimental client-side roaming support. Server side was disabled/gutted for years already, but this aspect was surprisingly forgotten. openssh lists this bug as CVE-2016-0777 It is described in: http://undeadly.org/cgi?action=article&sid=20160114142733
1 parent 5bc1a58 commit 8f42a2f

File tree

2 files changed

+2
-5
lines changed

2 files changed

+2
-5
lines changed

readconf.c

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1723,7 +1723,7 @@ initialize_options(Options * options)
17231723
options->tun_remote = -1;
17241724
options->local_command = NULL;
17251725
options->permit_local_command = -1;
1726-
options->use_roaming = -1;
1726+
options->use_roaming = 0;
17271727
options->visual_host_key = -1;
17281728
options->ip_qos_interactive = -1;
17291729
options->ip_qos_bulk = -1;
@@ -1941,8 +1941,7 @@ void fill_default_options(Options * options, struct passwd *pw)
19411941
options->tun_remote = SSH_TUNID_ANY;
19421942
if (options->permit_local_command == -1)
19431943
options->permit_local_command = 0;
1944-
if (options->use_roaming == -1)
1945-
options->use_roaming = 1;
1944+
options->use_roaming = 0;
19461945
if (options->visual_host_key == -1)
19471946
options->visual_host_key = 0;
19481947
if (options->ip_qos_interactive == -1)

ssh.c

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2163,8 +2163,6 @@ ssh_session2(void)
21632163
fork_postauth();
21642164
}
21652165

2166-
if (options.use_roaming)
2167-
request_roaming();
21682166

21692167
return client_loop(tty_flag, tty_flag ?
21702168
options.escape_char : SSH_ESCAPECHAR_NONE, id);

0 commit comments

Comments
 (0)