zeek/testing/btest/scripts/base/protocols/ssh
Arne Welzel 5dfff4492c ssh: Revert half-duplex robustness
This reverts part of commit a0888b7e36 due
to inhibiting analyzer violations when parsing non SSH traffic when
the &restofdata path is entered.

@J-Gras reported the analyzer not being disabled when sending HTTP
traffic on port 22.

This adds the verbose analyzer.log baselines such that future improvements
of these scenarios become visible.
2024-06-19 16:04:51 +02:00
..
basic.test GH-239: Rename bro to zeek, bro-config to zeek-config, and bro-path-dev to zeek-path-dev. 2019-05-01 21:43:45 +00:00
curve25519_kex.test GH-239: Rename bro to zeek, bro-config to zeek-config, and bro-path-dev to zeek-path-dev. 2019-05-01 21:43:45 +00:00
fingerprints.zeek Deprecate "ssh1_server_host_key" parameters *e* and *p* 2020-11-13 22:58:56 -08:00
half-duplex-client.zeek ssh: Revert half-duplex robustness 2024-06-19 16:04:51 +02:00
half-duplex-server.zeek ssh: Revert half-duplex robustness 2024-06-19 16:04:51 +02:00
one-auth-fail-only.test General btest cleanup 2020-08-11 11:26:22 -07:00
set_version.zeek Change SSH version field to be &optional. 2021-06-17 09:24:46 +02:00
ssh-reverse-connection.zeek Added several events for detailed info on the SSH2 key init directions 2022-12-05 12:35:05 +01:00
ssh_dh_gex_direction.zeek Added several events for detailed info on the SSH2 key init directions 2022-12-05 12:35:05 +01:00
ssh_segmented_encryption_transition.zeek GH-566: fix cases where ssh_encrypted_packet event wasn't raised 2019-09-03 17:34:24 -07:00
ssh_version_199.zeek [SSH] Handle SSH version 1.99 2020-11-14 15:33:34 +01:00