You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by ji...@apache.org on 2007/08/28 19:22:08 UTC

svn commit: r570492 - /httpd/mod_ftp/trunk/modules/ftp/ftp_commands.c

Author: jim
Date: Tue Aug 28 10:22:07 2007
New Revision: 570492

URL: http://svn.apache.org/viewvc?rev=570492&view=rev
Log:
Some FTP clients, like Glut still send PBSZ even with
Imp SSL... it's "safe" to ignore this badness

Modified:
    httpd/mod_ftp/trunk/modules/ftp/ftp_commands.c

Modified: httpd/mod_ftp/trunk/modules/ftp/ftp_commands.c
URL: http://svn.apache.org/viewvc/httpd/mod_ftp/trunk/modules/ftp/ftp_commands.c?rev=570492&r1=570491&r2=570492&view=diff
==============================================================================
--- httpd/mod_ftp/trunk/modules/ftp/ftp_commands.c (original)
+++ httpd/mod_ftp/trunk/modules/ftp/ftp_commands.c Tue Aug 28 10:22:07 2007
@@ -1579,8 +1579,12 @@
     ftp_connection *fc = ftp_get_module_config(r->request_config);
     char *endp;
 
-    /* Check if we have completed the security exchange */
-    if (fc->auth == FTP_AUTH_NONE) {
+    /*
+     * Check if we have completed the security exchange. Note, some
+     * clients still send PBSZ even with Implicit SSL. So we
+     * allow this misbehavior...
+     */
+    if (fc->auth == FTP_AUTH_NONE && !fsc->implicit_ssl) {
         return FTP_REPLY_BAD_SEQUENCE;
     }