"Bad public key options" (Was: Dropbear 2020.79)
Guilhem Moulin
guilhem at fripost.org
Tue Jun 16 09:58:07 AWST 2020
Hi Matt,
On Mon, 15 Jun 2020 at 23:52:51 +0800, Matt Johnston wrote:
> Dropbear 2020.79 is now released.
\o/ congrats!
> - […] x11 forwarding are now disabled by default.
I have no opinion about disabling this at compile-time, however the
current implementation locks out (“Bad public key options”) users with
‘no-X11-forwarding’ in their authorized_keys(5) files.
Wouldn't it make sense to move the #ifdefs to make the option a no-op
instead? (Same thing for ‘no-agent-forwarding’ actually.) Attached is
the patch I applied to “fix” the regression in the Debian package.
Cheers
--
Guilhem.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: authorized_keys-options-parsing.patch
Type: text/x-diff
Size: 1367 bytes
Desc: not available
Url : https://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/attachments/20200616/9cf6e39c/attachment.patch
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
Url : https://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/attachments/20200616/9cf6e39c/attachment.sig
More information about the Dropbear
mailing list