From 5413b1c7ff5a19c6a7d44bd98c5a83eb47819ba6 Mon Sep 17 00:00:00 2001 From: "djm@openbsd.org" Date: Tue, 19 Dec 2023 06:41:14 +0000 Subject: upstream: correct section numbers; from Ed Maste OpenBSD-Commit-ID: e289576ee5651528404cb2fb68945556052cf83f --- PROTOCOL | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) (limited to 'PROTOCOL') diff --git a/PROTOCOL b/PROTOCOL index 1894d573d..b2708953a 100644 --- a/PROTOCOL +++ b/PROTOCOL @@ -137,7 +137,7 @@ than as a named global or channel request to allow pings with very short packet lengths, which would not be possible with other approaches. -1.9 transport: strict key exchange extension +1.10 transport: strict key exchange extension OpenSSH supports a number of transport-layer hardening measures under a "strict KEX" feature. This feature is signalled similarly to the @@ -163,7 +163,7 @@ b) After sending or receiving a SSH2_MSG_NEWKEYS message, reset the duration of the connection (i.e. not just the first SSH2_MSG_NEWKEYS). -1.10 transport: SSH2_MSG_EXT_INFO during user authentication +1.11 transport: SSH2_MSG_EXT_INFO during user authentication This protocol extension allows the SSH2_MSG_EXT_INFO to be sent during user authentication. RFC8308 does allow a second @@ -790,4 +790,4 @@ master instance and later clients. OpenSSH extends the usual agent protocol. These changes are documented in the PROTOCOL.agent file. -$OpenBSD: PROTOCOL,v 1.51 2023/12/18 14:45:49 djm Exp $ +$OpenBSD: PROTOCOL,v 1.52 2023/12/19 06:41:14 djm Exp $ -- cgit v1.2.3