You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by ji...@apache.org on 2007/08/28 19:22:08 UTC
svn commit: r570492 - /httpd/mod_ftp/trunk/modules/ftp/ftp_commands.c
Author: jim
Date: Tue Aug 28 10:22:07 2007
New Revision: 570492
URL: http://svn.apache.org/viewvc?rev=570492&view=rev
Log:
Some FTP clients, like Glut still send PBSZ even with
Imp SSL... it's "safe" to ignore this badness
Modified:
httpd/mod_ftp/trunk/modules/ftp/ftp_commands.c
Modified: httpd/mod_ftp/trunk/modules/ftp/ftp_commands.c
URL: http://svn.apache.org/viewvc/httpd/mod_ftp/trunk/modules/ftp/ftp_commands.c?rev=570492&r1=570491&r2=570492&view=diff
==============================================================================
--- httpd/mod_ftp/trunk/modules/ftp/ftp_commands.c (original)
+++ httpd/mod_ftp/trunk/modules/ftp/ftp_commands.c Tue Aug 28 10:22:07 2007
@@ -1579,8 +1579,12 @@
ftp_connection *fc = ftp_get_module_config(r->request_config);
char *endp;
- /* Check if we have completed the security exchange */
- if (fc->auth == FTP_AUTH_NONE) {
+ /*
+ * Check if we have completed the security exchange. Note, some
+ * clients still send PBSZ even with Implicit SSL. So we
+ * allow this misbehavior...
+ */
+ if (fc->auth == FTP_AUTH_NONE && !fsc->implicit_ssl) {
return FTP_REPLY_BAD_SEQUENCE;
}