Results 524 comments of TJ Saunders

If there's nothing more to add to this issue, I'd like to close it.

With https://github.com/Castaglia/proftpd-mod_proxy/issues/56 being addressed, using a different approach than I'd anticipated when I first opened _this_ ticket, I'm now going to close this. The main use case (SSH/SFTP support in...

Interestingly, I just re-ran these `scan-build` instructions on the latest code in `master`: ``` scan-build: Analysis run complete. scan-build: Removing directory '/tmp/scan-build-2023-09-16-165057-16475-1' because it contains no reports. scan-build: No bugs...

There have been some other improvements for SFTP uploads in the 1.3.9 development cycle; in particular, we now avoid an expensive (and unnecessary) memory copy for each SFTP `WRITE` request:...

@cfiehe FYI, I've now implemented the "[email protected]" SFTP extension in `mod_sftp`, per Issue #1798. This should help the interactions with SSHFS. With this, you should no longer need any client-side...

> That is awesome. Thank you very much @Castaglia. I did some testing. The handshake succeeds and I can login, but the upload fails with `Outbound message too long 523301`:...

> > That is awesome. Thank you very much @Castaglia. I did some testing. The handshake succeeds and I can login, but the upload fails with `Outbound message too long...

Ah-ha! Looks like this OpenSSH behavior (of not respecting its own limits) _did_ get fixed, but in a later version than that you appear to be using @cfiehe see https://github.com/openssh/openssh-portable/commit/48bf234322e639d279c5a28435eae50155e9b514...

@cfiehe https://github.com/proftpd/proftpd/pull/1800 should help address this interoperability for older OpenSSH clients.

> Hi @Castaglia. Pretty cool. I did a quick test with the sftp client and build ProFTPD based on your workaround `sftp-limits-ext-compat-issue1288`. It is working. Great job 👏! Thank you...