summaryrefslogtreecommitdiffstats
path: root/crypto/openssh/compat.h
diff options
context:
space:
mode:
authorgreen <green@FreeBSD.org>2001-03-20 02:06:40 +0000
committergreen <green@FreeBSD.org>2001-03-20 02:06:40 +0000
commite1c06db9614adac5dbc0db3be048e6d3bb916b61 (patch)
treefe71e102a08e22c9c3eee0426a45576c1899fff7 /crypto/openssh/compat.h
parent67cc54d757c106c29d0172b918a9dde0ffa3bddf (diff)
downloadFreeBSD-src-e1c06db9614adac5dbc0db3be048e6d3bb916b61.zip
FreeBSD-src-e1c06db9614adac5dbc0db3be048e6d3bb916b61.tar.gz
Make password attacks based on traffic analysis harder by requiring that
"non-echoed" characters are still echoed back in a null packet, as well as pad passwords sent to not give hints to the length otherwise. Obtained from: OpenBSD
Diffstat (limited to 'crypto/openssh/compat.h')
-rw-r--r--crypto/openssh/compat.h2
1 files changed, 2 insertions, 0 deletions
diff --git a/crypto/openssh/compat.h b/crypto/openssh/compat.h
index f14efaf..2b3e5aa 100644
--- a/crypto/openssh/compat.h
+++ b/crypto/openssh/compat.h
@@ -21,6 +21,7 @@
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
* THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
+/* RCSID("$FreeBSD$"); */
/* RCSID("$OpenBSD: compat.h,v 1.11 2000/10/14 12:16:56 markus Exp $"); */
#ifndef COMPAT_H
@@ -36,6 +37,7 @@
#define SSH_BUG_HMAC 0x04
#define SSH_BUG_X11FWD 0x08
#define SSH_OLD_SESSIONID 0x10
+#define SSH_BUG_IGNOREMSG 0x20
void enable_compat13(void);
void enable_compat20(void);
OpenPOWER on IntegriCloud