packages/net/openssh/patches/200-dscp-qos.patch
tripolar 96d659bf35 [packages] openssh: update to 6.4p1
This release fixes a security bug:

 * sshd(8): fix a memory corruption problem triggered during rekeying
   when an AES-GCM cipher is selected. Full details of the vulnerability
   are available at: http://www.openssh.com/txt/gcmrekey.adv

Signed-off-by: Peter Wagner <tripolar@gmx.at>


git-svn-id: svn://svn.openwrt.org/openwrt/packages@38693 3c298f89-4303-0410-b956-a3cf2f4a3e73
2013-11-08 15:52:08 +00:00

22 lines
491 B
Diff

--- a/ssh_config
+++ b/ssh_config
@@ -46,3 +46,6 @@
# VisualHostKey no
# ProxyCommand ssh -q -W %h:%p gateway.example.com
# RekeyLimit 1G 1h
+
+# enable DSCP QoS values (per RFC-4594)
+#IPQoS AF21 AF11
--- a/sshd_config
+++ b/sshd_config
@@ -120,6 +120,9 @@ UsePrivilegeSeparation sandbox # Defaul
# no default banner path
#Banner none
+# enable DSCP QoS values (per RFC-4594)
+#IPQoS AF21 AF11
+
# override default of no subsystems
Subsystem sftp /usr/libexec/sftp-server