96d659bf35
This release fixes a security bug: * sshd(8): fix a memory corruption problem triggered during rekeying when an AES-GCM cipher is selected. Full details of the vulnerability are available at: http://www.openssh.com/txt/gcmrekey.adv Signed-off-by: Peter Wagner <tripolar@gmx.at> git-svn-id: svn://svn.openwrt.org/openwrt/packages@38693 3c298f89-4303-0410-b956-a3cf2f4a3e73
22 lines
491 B
Diff
22 lines
491 B
Diff
--- a/ssh_config
|
|
+++ b/ssh_config
|
|
@@ -46,3 +46,6 @@
|
|
# VisualHostKey no
|
|
# ProxyCommand ssh -q -W %h:%p gateway.example.com
|
|
# RekeyLimit 1G 1h
|
|
+
|
|
+# enable DSCP QoS values (per RFC-4594)
|
|
+#IPQoS AF21 AF11
|
|
--- a/sshd_config
|
|
+++ b/sshd_config
|
|
@@ -120,6 +120,9 @@ UsePrivilegeSeparation sandbox # Defaul
|
|
# no default banner path
|
|
#Banner none
|
|
|
|
+# enable DSCP QoS values (per RFC-4594)
|
|
+#IPQoS AF21 AF11
|
|
+
|
|
# override default of no subsystems
|
|
Subsystem sftp /usr/libexec/sftp-server
|
|
|