]> andersk Git - gssapi-openssh.git/blame - openssh/ChangeLog
Import of OpenSSH 3.2.2p1
[gssapi-openssh.git] / openssh / ChangeLog
CommitLineData
700318f3 120020515
2 - (bal) CVS ID fix up on auth-passwd.c
e9a17296 3 - (bal) OpenBSD CVS Sync
700318f3 4 - deraadt@cvs.openbsd.org 2002/05/07 19:54:36
5 [ssh.h]
6 use ssh uid
7 - deraadt@cvs.openbsd.org 2002/05/08 21:06:34
8 [ssh.h]
9 move to sshd.sshd instead
10 - stevesk@cvs.openbsd.org 2002/05/11 20:24:48
11 [ssh.h]
e9a17296 12 typo in comment
700318f3 13 - itojun@cvs.openbsd.org 2002/05/13 02:37:39
14 [auth-skey.c auth2.c]
15 less warnings. skey_{respond,query} are public (in auth.h)
16 - markus@cvs.openbsd.org 2002/05/13 20:44:58
17 [auth-options.c auth.c auth.h]
18 move the packet_send_debug handling from auth-options.c to auth.c;
e9a17296 19 ok provos@
700318f3 20 - millert@cvs.openbsd.org 2002/05/13 15:53:19
21 [sshd.c]
22 Call setsid() in the child after sshd accepts the connection and forks.
23 This is needed for privsep which calls setlogin() when it changes uids.
24 Without this, there is a race where the login name of an existing
25 connection, as returned by getlogin(), may be changed to the privsep
26 user (sshd). markus@ OK
27 - markus@cvs.openbsd.org 2002/05/13 21:26:49
28 [auth-rhosts.c]
29 handle debug messages during rhosts-rsa and hostbased authentication;
e9a17296 30 ok provos@
700318f3 31 - mouring@cvs.openbsd.org 2002/05/15 15:47:49
32 [kex.c monitor.c monitor_wrap.c sshd.c]
33 'monitor' variable clashes with at least one lame platform (NeXT). i
34 Renamed to 'pmonitor'. provos@
35 - deraadt@cvs.openbsd.org 2002/05/04 02:39:35
36 [servconf.c sshd.8 sshd_config]
37 enable privsep by default; provos ok
38 - millert@cvs.openbsd.org 2002/05/06 23:34:33
39 [ssh.1 sshd.8]
40 Kill/adjust r(login|exec)d? references now that those are no longer in
41 the tree.
42 - markus@cvs.openbsd.org 2002/05/15 21:02:53
43 [servconf.c sshd.8 sshd_config]
44 disable privsep and enable setuid for the 3.2.2 release
45 - (bal) Fixed up PAM case. I think.
46 - (bal) Clarified openbsd-compat/*-cray.* Licence provided by Wendy
e9a17296 47 - (bal) OpenBSD CVS Sync
700318f3 48 - markus@cvs.openbsd.org 2002/05/15 21:05:29
e9a17296 49 [version.h]
700318f3 50 enter OpenSSH_3.2.2
51 - (bal) Caldara, Suse, and Redhat openssh.specs updated.
3c0ef626 52
700318f3 5320020514
54 - (stevesk) [README.privsep] PAM+privsep works with Solaris 8.
55 - (tim) [sshpty.c] set tty modes when allocating old style bsd ptys to
56 match what newer style ptys have when allocated. Based on a patch by
57 Roger Cornelius <rac@tenzing.org>
58 - (tim) [README.privsep] UnixWare 7 and OpenUNIX 8 work.
59 - (tim) [README.privsep] remove reference to UnixWare 7 and OpenUNIX 8
60 from PAM-enabled pragraph. UnixWare has no PAM.
61 - (tim) [contrib/caldera/openssh.spec] update version.
62
6320020513
64 - (stevesk) add initial README.privsep
65 - (stevesk) [configure.ac] nicer message: --with-privsep-user=user
66 - (djm) Add --with-superuser-path=xxx configure option to specify
67 what $PATH the superuser receives.
68 - (djm) Bug #231: UsePrivilegeSeparation turns off Banner.
69 - (djm) Add --with-privsep-path configure option
70 - (djm) Update RPM spec file: different superuser path, use
71 /var/empty/sshd for privsep
72 - (djm) Bug #234: missing readpassphrase declaration and defines
73 - (djm) Add INSTALL warning about SSH protocol 1 blowfish w/
74 OpenSSL < 0.9.6
75
7620020511
77 - (tim) [configure.ac] applied a rework of djm's OpenSSL search cleanup patch.
78 Now only searches system and /usr/local/ssl (OpenSSL's default install path)
79 Others must use --with-ssl-dir=....
80 - (tim) [monitor_fdpass.c] fix for systems that have both
81 HAVE_ACCRIGHTS_IN_MSGHDR and HAVE_CONTROL_IN_MSGHDR. Ie. sys/socket.h
82 has #define msg_accrights msg_control
83
8420020510
85 - (stevesk) [auth.c] Shadow account and expiration cleanup. Now
86 check for root forced expire. Still don't check for inactive.
87 - (djm) Rework RedHat RPM files. Based on spec from Nalin
88 Dahyabhai <nalin@redhat.com> and patches from
89 Pekka Savola <pekkas@netcore.fi>
90 - (djm) Try to drop supplemental groups at daemon startup. Patch from
91 RedHat
92 - (bal) Back all the way out of auth-passwd.c changes. Breaks too many
93 things that don't set pw->pw_passwd.
94
9520020509
96 - (tim) [Makefile.in] Unbreak make -f Makefile.in distprep
97
9820020508
99 - (tim) [openbsd-compat/bsd-arc4random.c] fix logic on when seed_rng() is
100 called. Report by Chris Maxwell <maxwell@cs.dal.ca>
101 - (tim) [Makefile.in configure.ac] set SHELL variable in Makefile
102 - (djm) Disable PAM kbd-int auth if privsep is turned on (it doesn't work)
103
10420020507
105 - (tim) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
106 Add truncate() emulation to address Bug 208
107
10820020506
109 - (djm) Unbreak auth-passwd.c for PAM and SIA
110 - (djm) Unbreak PAM auth for protocol 1. Report from Pekka Savola
111 <pekkas@netcore.fi>
112 - (djm) Don't reinitialise PAM credentials before we have started PAM.
113 Report from Pekka Savola <pekkas@netcore.fi>
114
11520020506
116 - (bal) Fixed auth-passwd.c to resolve PermitEmptyPassword issue
117
11820020501
119 - (djm) Import OpenBSD regression tests. Requires BSD make to run
120 - (djm) Fix readpassphase compilation for systems which have it
121
12220020429
123 - (tim) [contrib/caldera/openssh.spec] update fixUP to reflect changes in
124 sshd_config.
125 - (tim) [contrib/cygwin/README] remove reference to regex.
126 patch from Corinna Vinschen <vinschen@redhat.com>
127
12820020426
129 - (djm) Bug #137, #209: fix make problems for scard/Ssh.bin, do uudecode
130 during distprep only
131 - (djm) Disable PAM password expiry until a complete fix for bug #188
132 exists
133 - (djm) Bug #180: Set ToS bits on IPv4-in-IPv6 mapped addresses. Based on
134 patch from openssh@misc.tecq.org
135
13620020425
137 - (stevesk) [defines.h] remove USE_TIMEVAL; unused
138 - (stevesk) [acconfig.h auth-passwd.c configure.ac sshd.c] HP-UX 10.26
139 support. bug #184. most from dcole@keysoftsys.com.
140
14120020424
3c0ef626 142 - (djm) OpenBSD CVS Sync
700318f3 143 - markus@cvs.openbsd.org 2002/04/23 12:54:10
3c0ef626 144 [version.h]
700318f3 145 3.2.1
146 - djm@cvs.openbsd.org 2002/04/23 22:16:29
147 [sshd.c]
148 Improve error message; ok markus@ stevesk@
149
15020020423
151 - (stevesk) [acconfig.h configure.ac session.c] LOGIN_NO_ENDOPT for HP-UX
152 - (stevesk) [acconfig.h] NEED_IN_SYSTM_H unused
153 - (markus) OpenBSD CVS Sync
154 - markus@cvs.openbsd.org 2002/04/23 12:58:26
155 [radix.c]
156 send complete ticket; semerad@ss1000.ms.mff.cuni.cz
157 - (djm) Trim ChangeLog to include only post-3.1 changes
158 - (djm) Update RPM spec file versions
159 - (djm) Redhat spec enables KrbV by default
160 - (djm) Applied OpenSC smartcard updates from Markus &
161 Antti Tapaninen <aet@cc.hut.fi>
162 - (djm) Define BROKEN_REALPATH for AIX, patch from
163 Antti Tapaninen <aet@cc.hut.fi>
164 - (djm) Bug #214: Fix utmp for Irix (don't strip "tty"). Patch from
165 Kevin Taylor <no@nowhere.org> (??) via Philipp Grau
166 <phgrau@zedat.fu-berlin.de>
167 - (djm) Bug #213: Simplify CMSG_ALIGN macros to avoid symbol clashes.
168 Reported by Doug Manton <dmanton@emea.att.com>
169 - (djm) Bug #222: Fix tests for getaddrinfo on OSF/1. Spotted by
170 Robert Urban <urban@spielwiese.de>
171 - (djm) Bug #206 - blibpath isn't always needed for AIX ld, avoid
172 sizeof(long long int) == 4 breakage. Patch from Matthew Clarke
173 <Matthew_Clarke@mindlink.bc.ca>
174 - (djm) Make privsep work with PAM (still experimental)
3c0ef626 175 - (djm) OpenBSD CVS Sync
700318f3 176 - deraadt@cvs.openbsd.org 2002/04/20 09:02:03
177 [servconf.c]
178 No, afs requires explicit enabling
179 - markus@cvs.openbsd.org 2002/04/20 09:14:58
180 [bufaux.c bufaux.h]
181 add buffer_{get,put}_short
182 - markus@cvs.openbsd.org 2002/04/20 09:17:19
183 [radix.c]
184 rewrite using the buffer_* API, fixes overflow; ok deraadt@
185 - stevesk@cvs.openbsd.org 2002/04/21 16:19:27
186 [sshd.8 sshd_config]
187 document default AFSTokenPassing no; ok deraadt@
188 - stevesk@cvs.openbsd.org 2002/04/21 16:25:06
189 [sshconnect1.c]
190 spelling in error message; ok markus@
191 - markus@cvs.openbsd.org 2002/04/22 06:15:47
192 [radix.c]
193 fix check for overflow
194 - markus@cvs.openbsd.org 2002/04/22 16:16:53
195 [servconf.c sshd.8 sshd_config]
196 do not auto-enable KerberosAuthentication; ok djm@, provos@, deraadt@
197 - markus@cvs.openbsd.org 2002/04/22 21:04:52
198 [channels.c clientloop.c clientloop.h ssh.c]
199 request reply (success/failure) for -R style fwd in protocol v2,
200 depends on ordered replies.
201 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=215; ok provos@
202
20320020421
204 - (tim) [entropy.c.] Portability fix for SCO Unix 3.2v4.x (SCO OSR 3.0).
205 entropy.c needs seteuid(getuid()) for the setuid(original_uid) to
206 succeed. Patch by gert@greenie.muc.de. This fixes one part of Bug 208
207
20820020418
209 - (djm) Avoid SIGCHLD breakage when run from rsync. Fix from
210 Sturle Sunde <sturle.sunde@usit.uio.no>
211
21220020417
213 - (djm) Tell users to configure /dev/random support into OpenSSL in
214 INSTALL
215 - (djm) Fix .Nm in mdoc2man.pl from pspencer@fields.utoronto.ca
216 - (tim) [configure.ac] Issue warning on --with-default-path=/some_path
217 if LOGIN_CAP is enabled. Report & testing by Tuc <tuc@ttsg.com>
218
21920020415
220 - (djm) Unbreak "make install". Fix from Darren Tucker
221 <dtucker@zip.com.au>
222 - (stevesk) bsd-cygwin_util.[ch] BSD license from Corinna Vinschen
223 - (tim) [configure.ac] add tests for recvmsg and sendmsg.
224 [monitor_fdpass.c] add checks for HAVE_SENDMSG and HAVE_RECVMSG for
225 systems that HAVE_ACCRIGHTS_IN_MSGHDR but no recvmsg or sendmsg.
226
22720020414
228 - (djm) ssh-rand-helper improvements
229 - Add commandline debugging options
230 - Don't write binary data if stdout is a tty (use hex instead)
231 - Give it a manpage
232 - (djm) Random number collection doc fixes from Ben
233
23420020413
235 - (djm) Add KrbV support patch from Simon Wilkinson <simon@sxw.org.uk>
236
23720020412
238 - (stevesk) [auth-sia.[ch]] add BSD license from Chris Adams
239 - (tim) [configure.ac] add <sys/types.h> to msghdr tests. Change -L
240 to -h on testing for /bin being symbolic link
241 - (bal) Mistaken in Cygwin scripts for ssh starting. Patch by
242 Corinna Vinschen <vinschen@redhat.com>
243 - (bal) disable privsep if no MAP_ANON. We can re-enable it
244 after the release when we can do more testing.
245
24620020411
247 - (stevesk) [auth-sia.c] cleanup
248 - (tim) [acconfig.h defines.h includes.h] put includes in includes.h and
249 defines in defines.h [rijndael.c openbsd-compat/fake-socket.h
250 openbsd-compat/inet_aton.c] include "includes.h" instead of "config.h"
251 ok stevesk@
252
25320020410
254 - (stevesk) [configure.ac monitor.c] HAVE_SOCKETPAIR
255 - (stevesk) [auth-sia.c] compile fix Chris Adams <cmadams@hiwaay.net>
3c0ef626 256 - (bal) OpenBSD CVS Sync
700318f3 257 - markus@cvs.openbsd.org 2002/04/10 08:21:47
258 [auth1.c compat.c compat.h]
259 strip '@' from username only for KerbV and known broken clients,
260 bug #204
261 - markus@cvs.openbsd.org 2002/04/10 08:56:01
262 [version.h]
263 OpenSSH_3.2
264 - Added p1 to idenify Portable release version.
265
26620020408
267 - (bal) Minor OpenSC updates. Fix up header locations and update
268 README.smartcard provided by Juha Yrjölä <jyrjola@cc.hut.fi>
269
27020020407
271 - (stevesk) HAVE_CONTROL_IN_MSGHDR; not used right now.
272 Future: we may want to test if fd passing works correctly.
273 - (stevesk) [monitor_fdpass.c] fatal() for UsePrivilegeSeparation=yes
274 and no fd passing support.
275 - (stevesk) HAVE_MMAP and HAVE_SYS_MMAN_H and use them in
276 monitor_mm.c
277 - (stevesk) remove configure support for poll.h; it was removed
278 from sshd.c a long time ago.
279 - (stevesk) --with-privsep-user; default sshd
280 - (stevesk) wrap munmap() with HAVE_MMAP also.
281
28220020406
283 - (djm) Typo in Suse SPEC file. Fix from Carsten Grohmann
284 <carsten.grohmann@dr-baldeweg.de>
285 - (bal) Added MAP_FAILED to allow AIX and Trusted HP to compile.
3c0ef626 286 - (bal) OpenBSD CVS Sync
700318f3 287 - djm@cvs.openbsd.org 2002/04/06 00:30:08
288 [sftp-client.c]
289 Fix occasional corruption on upload due to bad reuse of request
290 id, spotted by chombier@mac.com; ok markus@
291 - mouring@cvs.openbsd.org 2002/04/06 18:24:09
292 [scp.c]
293 Fixes potental double // within path.
294 http://bugzilla.mindrot.org/show_bug.cgi?id=76
295 - (bal) Slight update to OpenSC support. Better version checking. patch
296 by Juha Yrjölä <jyrjola@cc.hut.fi>
297 - (bal) Revered out of runtime IRIX detection of joblimits. Code is
298 incomplete.
299 - (bal) Quiet down configure.ac if /bin/test does not exist.
300 - (bal) We no longer use atexit()/xatexit()/on_exit()
301
30220020405
303 - (bal) Patch for OpenSC SmartCard library; ok markus@; patch by
304 Juha Yrjölä <jyrjola@cc.hut.fi>
305 - (bal) Minor documentation update to reflect smartcard library
306 support changes.
307 - (bal) Too many <sys/queue.h> issues. Remove all workarounds and
308 using internal version only.
3c0ef626 309 - (bal) OpenBSD CVS Sync
700318f3 310 - stevesk@cvs.openbsd.org 2002/04/05 20:56:21
311 [sshd.8]
312 clarify sshrc some and handle X11UseLocalhost=yes; ok markus@
3c0ef626 313
700318f3 31420020404
315 - (stevesk) [auth-pam.c auth-pam.h auth-passwd.c auth-sia.c auth-sia.h
316 auth1.c auth2.c] PAM, OSF_SIA password auth cleanup; from djm.
3c0ef626 317 - (bal) OpenBSD CVS Sync
700318f3 318 - markus@cvs.openbsd.org 2002/04/03 09:26:11
319 [cipher.c myproposal.h]
320 re-add rijndael-cbc@lysator.liu.se for MacSSH; ash@lab.poc.net
321
32220020402
323 - (bal) Hand Sync of scp.c (reverted to upstream code)
324 - deraadt@cvs.openbsd.org 2002/03/30 17:45:46
325 [scp.c]
326 stretch banners
327 - (bal) CVS ID sync of uidswap.c
328 - (bal) OpenBSD CVS Sync (now for the real sync)
329 - markus@cvs.openbsd.org 2002/03/27 22:21:45
330 [ssh-keygen.c]
331 try to import keys with extra trailing === (seen with ssh.com <
332 2.0.12)
333 - markus@cvs.openbsd.org 2002/03/28 15:34:51
3c0ef626 334 [session.c]
700318f3 335 do not call record_login twice (for use_privsep)
336 - markus@cvs.openbsd.org 2002/03/29 18:59:32
337 [session.c session.h]
338 retrieve last login time before the pty is allocated, store per
339 session
340 - stevesk@cvs.openbsd.org 2002/03/29 19:16:22
341 [sshd.8]
342 RSA key modulus size minimum 768; ok markus@
343 - stevesk@cvs.openbsd.org 2002/03/29 19:18:33
344 [auth-rsa.c ssh-rsa.c ssh.h]
345 make RSA modulus minimum #define; ok markus@
346 - markus@cvs.openbsd.org 2002/03/30 18:51:15
347 [monitor.c serverloop.c sftp-int.c sftp.c sshd.c]
348 check waitpid for EINTR; based on patch from peter@ifm.liu.se
349 - markus@cvs.openbsd.org 2002/04/01 22:02:16
350 [sftp-client.c]
351 20480 is an upper limit for older server
352 - markus@cvs.openbsd.org 2002/04/01 22:07:17
353 [sftp-client.c]
354 fallback to stat if server does not support lstat
355 - markus@cvs.openbsd.org 2002/04/02 11:49:39
356 [ssh-agent.c]
357 check $SHELL for -k and -d, too;
358 http://bugzilla.mindrot.org/show_bug.cgi?id=199
359 - markus@cvs.openbsd.org 2002/04/02 17:37:48
360 [sftp.c]
361 always call log_init()
362 - markus@cvs.openbsd.org 2002/04/02 20:11:38
363 [ssh-rsa.c]
364 ignore SSH_BUG_SIGBLOB for ssh-rsa; #187
365 - (bal) mispelling in uidswap.c (portable only)
366
36720020401
368 - (stevesk) [monitor.c] PAM should work again; will *not* work with
369 UsePrivilegeSeparation=yes.
370 - (stevesk) [auth1.c] fix password auth for protocol 1 when
371 !USE_PAM && !HAVE_OSF_SIA; merge issue.
372
37320020331
374 - (tim) [configure.ac] use /bin/test -L to work around broken builtin on
375 Solaris 8
376 - (tim) [sshconnect2.c] change uint32_t to u_int32_t
377
37820020330
379 - (stevesk) [configure.ac] remove header check for sys/ttcompat.h
380 bug 167
381
38220020327
383 - (bal) 'pw' should be 'authctxt->pw' in auth1.c spotted by
384 kent@lysator.liu.se
3c0ef626 385 - (bal) OpenBSD CVS Sync
700318f3 386 - markus@cvs.openbsd.org 2002/03/26 11:34:49
3c0ef626 387 [ssh.1 sshd.8]
700318f3 388 update to recent drafts
389 - markus@cvs.openbsd.org 2002/03/26 11:37:05
390 [ssh.c]
391 update Copyright
392 - markus@cvs.openbsd.org 2002/03/26 15:23:40
393 [bufaux.c]
394 do not talk about packets in bufaux
395 - rees@cvs.openbsd.org 2002/03/26 18:46:59
396 [scard.c]
397 try_AUT0 in read_pubkey too, for those paranoid few who want to
398 acl 'sh'
399 - markus@cvs.openbsd.org 2002/03/26 22:50:39
400 [channels.h]
401 CHANNEL_EFD_OUTPUT_ACTIVE is false for CHAN_CLOSE_RCVD, too
402 - markus@cvs.openbsd.org 2002/03/26 23:13:03
403 [auth-rsa.c]
404 disallow RSA keys < 768 for protocol 1, too (rhosts-rsa and rsa auth)
405 - markus@cvs.openbsd.org 2002/03/26 23:14:51
406 [kex.c]
407 generate a new cookie for each SSH2_MSG_KEXINIT message we send out
408 - mouring@cvs.openbsd.org 2002/03/27 11:45:42
409 [monitor.c]
410 monitor_allowed_key() returns int instead of pointer. ok markus@
411
41220020325
413 - (stevesk) import OpenBSD <sys/tree.h> as "openbsd-compat/tree.h"
414 - (bal) OpenBSD CVS Sync
415 - stevesk@cvs.openbsd.org 2002/03/23 20:57:26
3c0ef626 416 [sshd.c]
700318f3 417 setproctitle() after preauth child; ok markus@
418 - markus@cvs.openbsd.org 2002/03/24 16:00:27
419 [serverloop.c]
420 remove unused debug
421 - markus@cvs.openbsd.org 2002/03/24 16:01:13
422 [packet.c]
423 debug->debug3 for extra padding
424 - stevesk@cvs.openbsd.org 2002/03/24 17:27:03
425 [kexgex.c]
426 typo; ok markus@
427 - stevesk@cvs.openbsd.org 2002/03/24 17:53:16
428 [monitor_fdpass.c]
429 minor cleanup and more error checking; ok markus@
430 - markus@cvs.openbsd.org 2002/03/24 18:05:29
431 [scard.c]
432 we need to figure out AUT0 for sc_private_encrypt, too
433 - stevesk@cvs.openbsd.org 2002/03/24 23:20:00
434 [monitor.c]
435 remove "\n" from fatal()
436 - markus@cvs.openbsd.org 2002/03/25 09:21:13
437 [auth-rsa.c]
438 return 0 (not NULL); tomh@po.crl.go.jp
439 - markus@cvs.openbsd.org 2002/03/25 09:25:06
440 [auth-rh-rsa.c]
441 rm bogus comment
442 - markus@cvs.openbsd.org 2002/03/25 17:34:27
443 [scard.c scard.h ssh-agent.c ssh-keygen.c ssh.c]
444 change sc_get_key to sc_get_keys and hide smartcard details in scard.c
445 - stevesk@cvs.openbsd.org 2002/03/25 20:12:10
446 [monitor_mm.c monitor_wrap.c]
447 ssize_t args use "%ld" and cast to (long)
448 size_t args use "%lu" and cast to (u_long)
449 ok markus@ and thanks millert@
450 - markus@cvs.openbsd.org 2002/03/25 21:04:02
3c0ef626 451 [ssh.c]
700318f3 452 simplify num_identity_files handling
453 - markus@cvs.openbsd.org 2002/03/25 21:13:51
454 [channels.c channels.h compat.c compat.h nchan.c]
455 don't send stderr data after EOF, accept this from older known
456 (broken) sshd servers only, fixes
457 http://bugzilla.mindrot.org/show_bug.cgi?id=179
458 - stevesk@cvs.openbsd.org 2002/03/26 03:24:01
459 [monitor.h monitor_fdpass.h monitor_mm.h monitor_wrap.h]
460 $OpenBSD$
3c0ef626 461
700318f3 46220020324
463 - (stevesk) [session.c] disable LOGIN_NEEDS_TERM until we are sure
464 it can be removed. only used on solaris. will no longer compile with
465 privsep shuffling.
466
46720020322
468 - (stevesk) HAVE_ACCRIGHTS_IN_MSGHDR configure support
469 - (stevesk) [monitor.c monitor_wrap.c] #ifdef HAVE_PW_CLASS_IN_PASSWD
470 - (stevesk) configure and cpp __FUNCTION__ gymnastics to handle nielsisms
471 - (stevesk) [monitor_fdpass.c] support for access rights style file
472 descriptor passing
473 - (stevesk) [auth2.c] merge cleanup/sync
474 - (stevesk) [defines.h] hp-ux 11 has ancillary data style fd passing, but
475 is missing CMSG_LEN() and CMSG_SPACE() macros.
476 - (stevesk) [defines.h] #define MAP_ANON MAP_ANONYMOUS for HP-UX; other
477 platforms may need this--I'm not sure. mmap() issues will need to be
478 addressed further.
479 - (tim) [cipher.c] fix problem with OpenBSD sync
480 - (stevesk) [LICENCE] OpenBSD sync
481
48220020321
483 - (bal) OpenBSD CVS Sync
484 - itojun@cvs.openbsd.org 2002/03/08 06:10:16
485 [sftp-client.c]
486 printf type mismatch
487 - itojun@cvs.openbsd.org 2002/03/11 03:18:49
488 [sftp-client.c]
489 correct type mismatches (u_int64_t != unsigned long long)
490 - itojun@cvs.openbsd.org 2002/03/11 03:19:53
491 [sftp-client.c]
492 indent
493 - markus@cvs.openbsd.org 2002/03/14 15:24:27
494 [sshconnect1.c]
495 don't trust size sent by (rogue) server; noted by
496 s.esser@e-matters.de
497 - markus@cvs.openbsd.org 2002/03/14 16:38:26
498 [sshd.c]
499 split out ssh1 session key decryption; ok provos@
500 - markus@cvs.openbsd.org 2002/03/14 16:56:33
501 [auth-rh-rsa.c auth-rsa.c auth.h]
502 split auth_rsa() for better readability and privsep; ok provos@
503 - itojun@cvs.openbsd.org 2002/03/15 11:00:38
504 [auth.c]
505 fix file type checking (use S_ISREG). ok by markus
506 - markus@cvs.openbsd.org 2002/03/16 11:24:53
507 [compress.c]
508 skip inflateEnd if inflate fails; ok provos@
509 - markus@cvs.openbsd.org 2002/03/16 17:22:09
510 [auth-rh-rsa.c auth.h]
511 split auth_rhosts_rsa(), ok provos@
512 - stevesk@cvs.openbsd.org 2002/03/16 17:41:25
513 [auth-krb5.c]
514 BSD license. from Daniel Kouril via Dug Song. ok markus@
515 - provos@cvs.openbsd.org 2002/03/17 20:25:56
516 [auth.c auth.h auth1.c auth2.c]
517 getpwnamallow returns struct passwd * only if user valid;
518 okay markus@
519 - provos@cvs.openbsd.org 2002/03/18 01:12:14
520 [auth.h auth1.c auth2.c sshd.c]
521 have the authentication functions return the authentication context
522 and then do_authenticated; okay millert@
523 - dugsong@cvs.openbsd.org 2002/03/18 01:30:10
524 [auth-krb4.c]
525 set client to NULL after xfree(), from Rolf Braun
526 <rbraun+ssh@andrew.cmu.edu>
527 - provos@cvs.openbsd.org 2002/03/18 03:41:08
528 [auth.c session.c]
529 move auth_approval into getpwnamallow with help from millert@
530 - markus@cvs.openbsd.org 2002/03/18 17:13:15
531 [cipher.c cipher.h]
532 export/import cipher states; needed by ssh-privsep
533 - markus@cvs.openbsd.org 2002/03/18 17:16:38
534 [packet.c packet.h]
535 export/import cipher state, iv and ssh2 seqnr; needed by ssh-privsep
536 - markus@cvs.openbsd.org 2002/03/18 17:23:31
537 [key.c key.h]
538 add key_demote() for ssh-privsep
539 - provos@cvs.openbsd.org 2002/03/18 17:25:29
540 [bufaux.c bufaux.h]
541 buffer_skip_string and extra sanity checking; needed by ssh-privsep
542 - provos@cvs.openbsd.org 2002/03/18 17:31:54
543 [compress.c]
544 export compression streams for ssh-privsep
545 - provos@cvs.openbsd.org 2002/03/18 17:50:31
546 [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c]
547 [auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c]
548 [kexgex.c servconf.c]
549 [session.h servconf.h serverloop.c session.c sshd.c]
550 integrate privilege separated openssh; its turned off by default
551 for now. work done by me and markus@
552 - provos@cvs.openbsd.org 2002/03/18 17:53:08
553 [sshd.8]
554 credits for privsep
555 - provos@cvs.openbsd.org 2002/03/18 17:59:09
556 [sshd.8]
557 document UsePrivilegeSeparation
558 - stevesk@cvs.openbsd.org 2002/03/18 23:52:51
559 [servconf.c]
560 UnprivUser/UnprivGroup usable now--specify numeric user/group; ok
561 provos@
562 - stevesk@cvs.openbsd.org 2002/03/19 03:03:43
563 [pathnames.h servconf.c servconf.h sshd.c]
564 _PATH_PRIVSEP_CHROOT_DIR; ok provos@
565 - stevesk@cvs.openbsd.org 2002/03/19 05:23:08
566 [sshd.8]
567 Banner has no default.
568 - mpech@cvs.openbsd.org 2002/03/19 06:32:56
569 [sftp-int.c]
570 use xfree() after xstrdup().
571
572 markus@ ok
573 - markus@cvs.openbsd.org 2002/03/19 10:35:39
574 [auth-options.c auth.h session.c session.h sshd.c]
575 clean up prototypes
576 - markus@cvs.openbsd.org 2002/03/19 10:49:35
577 [auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h]
578 [packet.c session.c sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c]
579 [sshconnect2.c sshd.c ttymodes.c]
580 KNF whitespace
581 - markus@cvs.openbsd.org 2002/03/19 14:27:39
582 [auth.c auth1.c auth2.c]
583 make getpwnamallow() allways call pwcopy()
584 - markus@cvs.openbsd.org 2002/03/19 15:31:47
585 [auth.c]
586 check for NULL; from provos@
587 - stevesk@cvs.openbsd.org 2002/03/20 19:12:25
588 [servconf.c servconf.h ssh.h sshd.c]
589 for unprivileged user, group do:
590 pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@
591 - stevesk@cvs.openbsd.org 2002/03/20 21:08:08
592 [sshd.c]
593 strerror() on chdir() fail; ok provos@
594 - markus@cvs.openbsd.org 2002/03/21 10:21:20
595 [ssh-add.c]
596 ignore errors for nonexisting default keys in ssh-add,
597 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158
598 - jakob@cvs.openbsd.org 2002/03/21 15:17:26
599 [clientloop.c ssh.1]
600 add built-in command line for adding new port forwardings on the fly.
601 based on a patch from brian wellington. ok markus@.
602 - markus@cvs.openbsd.org 2002/03/21 16:38:06
3c0ef626 603 [scard.c]
700318f3 604 make compile w/ openssl 0.9.7
605 - markus@cvs.openbsd.org 2002/03/21 16:54:53
606 [scard.c scard.h ssh-keygen.c]
607 move key upload to scard.[ch]
608 - markus@cvs.openbsd.org 2002/03/21 16:57:15
3c0ef626 609 [scard.c]
700318f3 610 remove const
611 - markus@cvs.openbsd.org 2002/03/21 16:58:13
612 [clientloop.c]
613 remove unused
614 - rees@cvs.openbsd.org 2002/03/21 18:08:15
3c0ef626 615 [scard.c]
700318f3 616 In sc_put_key(), sc_reader_id should be id.
617 - markus@cvs.openbsd.org 2002/03/21 20:51:12
3c0ef626 618 [sshd_config]
700318f3 619 add privsep (off)
620 - markus@cvs.openbsd.org 2002/03/21 21:23:34
621 [sshd.c]
622 add privsep_preauth() and remove 1 goto; ok provos@
623 - rees@cvs.openbsd.org 2002/03/21 21:54:34
624 [scard.c scard.h ssh-keygen.c]
625 Add PIN-protection for secret key.
626 - rees@cvs.openbsd.org 2002/03/21 22:44:05
627 [authfd.c authfd.h ssh-add.c ssh-agent.c ssh.c]
628 Add PIN-protection for secret key.
629 - markus@cvs.openbsd.org 2002/03/21 23:07:37
3c0ef626 630 [clientloop.c]
700318f3 631 remove unused, sync w/ cmdline patch in my tree.
632
63320020317
634 - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is
635 wanted, warn if directory does not exist. Put system directories in
636 front of PATH for finding entorpy commands.
637 - (tim) [contrib/aix/buildbff.sh contrib/aix/inventory.sh] AIX package
638 build fixes. Patch by Darren Tucker <dtucker@zip.com.au>
639 [contrib/solaris/buildpkg.sh] add missing dirs to SYSTEM_DIR. Have
640 postinstall check for $piddir and add if necessary.
641
64220020311
643 - (tim) [contrib/solaris/buildpkg.sh, contrib/solaris/README] Updated to
644 build on all platforms that support SVR4 style package tools. Now runs
645 from build dir. Parts are based on patches from Antonio Navarro, and
646 Darren Tucker.
647
64820020308
649 - (djm) Revert bits of Markus' OpenSSL compat patch which was
650 accidentally committed.
651 - (djm) Add Markus' patch for compat wih OpenSSL < 0.9.6.
652 Known issue: Blowfish for SSH1 does not work
653 - (stevesk) entropy.c: typo in debug message
654 - (djm) ssh-keygen -i needs seeded RNG; report from markus@
3c0ef626 655
656$Id$
This page took 0.524976 seconds and 5 git commands to generate.