summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authordjm <djm@openbsd.org>2020-01-26 00:14:45 +0000
committerdjm <djm@openbsd.org>2020-01-26 00:14:45 +0000
commit0306c1d0956aed19fe0c06535ad5d1914492625e (patch)
treeb420666260d68ed25fe9fed81f1d87603d3e9edc
parentdowngrade error() for missing subsequent known_hosts files to debug() (diff)
downloadwireguard-openbsd-0306c1d0956aed19fe0c06535ad5d1914492625e.tar.xz
wireguard-openbsd-0306c1d0956aed19fe0c06535ad5d1914492625e.zip
for UpdateHostKeys, don't report errors for unsupported key types -
just ignore them. spotted by and ok dtucker@
-rw-r--r--usr.bin/ssh/clientloop.c8
1 files changed, 5 insertions, 3 deletions
diff --git a/usr.bin/ssh/clientloop.c b/usr.bin/ssh/clientloop.c
index b95c16f3e4d..9bf69b1f74d 100644
--- a/usr.bin/ssh/clientloop.c
+++ b/usr.bin/ssh/clientloop.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: clientloop.c,v 1.334 2020/01/26 00:13:20 djm Exp $ */
+/* $OpenBSD: clientloop.c,v 1.335 2020/01/26 00:14:45 djm Exp $ */
/*
* Author: Tatu Ylonen <ylo@cs.hut.fi>
* Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
@@ -2098,8 +2098,10 @@ client_input_hostkeys(struct ssh *ssh)
goto out;
}
if ((r = sshkey_from_blob(blob, len, &key)) != 0) {
- error("%s: parse key: %s", __func__, ssh_err(r));
- goto out;
+ do_log2(r == SSH_ERR_KEY_TYPE_UNKNOWN ?
+ SYSLOG_LEVEL_DEBUG1 : SYSLOG_LEVEL_ERROR,
+ "%s: parse key: %s", __func__, ssh_err(r));
+ continue;
}
fp = sshkey_fingerprint(key, options.fingerprint_hash,
SSH_FP_DEFAULT);