]> andersk Git - gssapi-openssh.git/blame - openssh/ChangeLog
Import of OpenSSH 3.2.3p1
[gssapi-openssh.git] / openssh / ChangeLog
CommitLineData
7435de97 120020522
2 - (djm) Fix spelling mistakes, spotted by Solar Designer i
3 <solar@openwall.com>
4 - Sync scard/ (not sure when it drifted)
5 - (djm) OpenBSD CVS Sync:
6 [auth.c]
7 Fix typo/thinko. Pass in as to auth_approval(), not NULL.
8 Closes PR 2659.
9 - Crank version
10 - Crank RPM spec versions
11
1220020521
13 - (stevesk) [sshd.c] bug 245; disable setsid() for now
14 - (stevesk) [sshd.c] #ifndef HAVE_CYGWIN for setgroups()
15
1620020517
17 - (tim) [configure.ac] remove extra MD5_MSG="no" line.
18
700318f3 1920020515
20 - (bal) CVS ID fix up on auth-passwd.c
e9a17296 21 - (bal) OpenBSD CVS Sync
700318f3 22 - deraadt@cvs.openbsd.org 2002/05/07 19:54:36
23 [ssh.h]
24 use ssh uid
25 - deraadt@cvs.openbsd.org 2002/05/08 21:06:34
26 [ssh.h]
27 move to sshd.sshd instead
28 - stevesk@cvs.openbsd.org 2002/05/11 20:24:48
29 [ssh.h]
e9a17296 30 typo in comment
700318f3 31 - itojun@cvs.openbsd.org 2002/05/13 02:37:39
32 [auth-skey.c auth2.c]
33 less warnings. skey_{respond,query} are public (in auth.h)
34 - markus@cvs.openbsd.org 2002/05/13 20:44:58
35 [auth-options.c auth.c auth.h]
36 move the packet_send_debug handling from auth-options.c to auth.c;
e9a17296 37 ok provos@
700318f3 38 - millert@cvs.openbsd.org 2002/05/13 15:53:19
39 [sshd.c]
40 Call setsid() in the child after sshd accepts the connection and forks.
41 This is needed for privsep which calls setlogin() when it changes uids.
42 Without this, there is a race where the login name of an existing
43 connection, as returned by getlogin(), may be changed to the privsep
44 user (sshd). markus@ OK
45 - markus@cvs.openbsd.org 2002/05/13 21:26:49
46 [auth-rhosts.c]
47 handle debug messages during rhosts-rsa and hostbased authentication;
e9a17296 48 ok provos@
700318f3 49 - mouring@cvs.openbsd.org 2002/05/15 15:47:49
50 [kex.c monitor.c monitor_wrap.c sshd.c]
51 'monitor' variable clashes with at least one lame platform (NeXT). i
52 Renamed to 'pmonitor'. provos@
53 - deraadt@cvs.openbsd.org 2002/05/04 02:39:35
54 [servconf.c sshd.8 sshd_config]
55 enable privsep by default; provos ok
56 - millert@cvs.openbsd.org 2002/05/06 23:34:33
57 [ssh.1 sshd.8]
58 Kill/adjust r(login|exec)d? references now that those are no longer in
59 the tree.
60 - markus@cvs.openbsd.org 2002/05/15 21:02:53
61 [servconf.c sshd.8 sshd_config]
62 disable privsep and enable setuid for the 3.2.2 release
63 - (bal) Fixed up PAM case. I think.
64 - (bal) Clarified openbsd-compat/*-cray.* Licence provided by Wendy
e9a17296 65 - (bal) OpenBSD CVS Sync
700318f3 66 - markus@cvs.openbsd.org 2002/05/15 21:05:29
e9a17296 67 [version.h]
700318f3 68 enter OpenSSH_3.2.2
69 - (bal) Caldara, Suse, and Redhat openssh.specs updated.
3c0ef626 70
700318f3 7120020514
72 - (stevesk) [README.privsep] PAM+privsep works with Solaris 8.
73 - (tim) [sshpty.c] set tty modes when allocating old style bsd ptys to
74 match what newer style ptys have when allocated. Based on a patch by
75 Roger Cornelius <rac@tenzing.org>
76 - (tim) [README.privsep] UnixWare 7 and OpenUNIX 8 work.
77 - (tim) [README.privsep] remove reference to UnixWare 7 and OpenUNIX 8
78 from PAM-enabled pragraph. UnixWare has no PAM.
79 - (tim) [contrib/caldera/openssh.spec] update version.
80
8120020513
82 - (stevesk) add initial README.privsep
83 - (stevesk) [configure.ac] nicer message: --with-privsep-user=user
84 - (djm) Add --with-superuser-path=xxx configure option to specify
85 what $PATH the superuser receives.
86 - (djm) Bug #231: UsePrivilegeSeparation turns off Banner.
87 - (djm) Add --with-privsep-path configure option
88 - (djm) Update RPM spec file: different superuser path, use
89 /var/empty/sshd for privsep
90 - (djm) Bug #234: missing readpassphrase declaration and defines
91 - (djm) Add INSTALL warning about SSH protocol 1 blowfish w/
92 OpenSSL < 0.9.6
93
9420020511
95 - (tim) [configure.ac] applied a rework of djm's OpenSSL search cleanup patch.
96 Now only searches system and /usr/local/ssl (OpenSSL's default install path)
97 Others must use --with-ssl-dir=....
98 - (tim) [monitor_fdpass.c] fix for systems that have both
99 HAVE_ACCRIGHTS_IN_MSGHDR and HAVE_CONTROL_IN_MSGHDR. Ie. sys/socket.h
100 has #define msg_accrights msg_control
101
10220020510
103 - (stevesk) [auth.c] Shadow account and expiration cleanup. Now
104 check for root forced expire. Still don't check for inactive.
105 - (djm) Rework RedHat RPM files. Based on spec from Nalin
106 Dahyabhai <nalin@redhat.com> and patches from
107 Pekka Savola <pekkas@netcore.fi>
108 - (djm) Try to drop supplemental groups at daemon startup. Patch from
109 RedHat
110 - (bal) Back all the way out of auth-passwd.c changes. Breaks too many
111 things that don't set pw->pw_passwd.
112
11320020509
114 - (tim) [Makefile.in] Unbreak make -f Makefile.in distprep
115
11620020508
117 - (tim) [openbsd-compat/bsd-arc4random.c] fix logic on when seed_rng() is
118 called. Report by Chris Maxwell <maxwell@cs.dal.ca>
119 - (tim) [Makefile.in configure.ac] set SHELL variable in Makefile
120 - (djm) Disable PAM kbd-int auth if privsep is turned on (it doesn't work)
121
12220020507
123 - (tim) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
124 Add truncate() emulation to address Bug 208
125
12620020506
127 - (djm) Unbreak auth-passwd.c for PAM and SIA
128 - (djm) Unbreak PAM auth for protocol 1. Report from Pekka Savola
129 <pekkas@netcore.fi>
130 - (djm) Don't reinitialise PAM credentials before we have started PAM.
131 Report from Pekka Savola <pekkas@netcore.fi>
132
13320020506
134 - (bal) Fixed auth-passwd.c to resolve PermitEmptyPassword issue
135
13620020501
137 - (djm) Import OpenBSD regression tests. Requires BSD make to run
138 - (djm) Fix readpassphase compilation for systems which have it
139
14020020429
141 - (tim) [contrib/caldera/openssh.spec] update fixUP to reflect changes in
142 sshd_config.
143 - (tim) [contrib/cygwin/README] remove reference to regex.
144 patch from Corinna Vinschen <vinschen@redhat.com>
145
14620020426
147 - (djm) Bug #137, #209: fix make problems for scard/Ssh.bin, do uudecode
148 during distprep only
149 - (djm) Disable PAM password expiry until a complete fix for bug #188
150 exists
151 - (djm) Bug #180: Set ToS bits on IPv4-in-IPv6 mapped addresses. Based on
152 patch from openssh@misc.tecq.org
153
15420020425
155 - (stevesk) [defines.h] remove USE_TIMEVAL; unused
156 - (stevesk) [acconfig.h auth-passwd.c configure.ac sshd.c] HP-UX 10.26
157 support. bug #184. most from dcole@keysoftsys.com.
158
15920020424
3c0ef626 160 - (djm) OpenBSD CVS Sync
700318f3 161 - markus@cvs.openbsd.org 2002/04/23 12:54:10
3c0ef626 162 [version.h]
700318f3 163 3.2.1
164 - djm@cvs.openbsd.org 2002/04/23 22:16:29
165 [sshd.c]
166 Improve error message; ok markus@ stevesk@
167
16820020423
169 - (stevesk) [acconfig.h configure.ac session.c] LOGIN_NO_ENDOPT for HP-UX
170 - (stevesk) [acconfig.h] NEED_IN_SYSTM_H unused
171 - (markus) OpenBSD CVS Sync
172 - markus@cvs.openbsd.org 2002/04/23 12:58:26
173 [radix.c]
174 send complete ticket; semerad@ss1000.ms.mff.cuni.cz
175 - (djm) Trim ChangeLog to include only post-3.1 changes
176 - (djm) Update RPM spec file versions
177 - (djm) Redhat spec enables KrbV by default
178 - (djm) Applied OpenSC smartcard updates from Markus &
179 Antti Tapaninen <aet@cc.hut.fi>
180 - (djm) Define BROKEN_REALPATH for AIX, patch from
181 Antti Tapaninen <aet@cc.hut.fi>
182 - (djm) Bug #214: Fix utmp for Irix (don't strip "tty"). Patch from
183 Kevin Taylor <no@nowhere.org> (??) via Philipp Grau
184 <phgrau@zedat.fu-berlin.de>
185 - (djm) Bug #213: Simplify CMSG_ALIGN macros to avoid symbol clashes.
186 Reported by Doug Manton <dmanton@emea.att.com>
187 - (djm) Bug #222: Fix tests for getaddrinfo on OSF/1. Spotted by
188 Robert Urban <urban@spielwiese.de>
189 - (djm) Bug #206 - blibpath isn't always needed for AIX ld, avoid
190 sizeof(long long int) == 4 breakage. Patch from Matthew Clarke
191 <Matthew_Clarke@mindlink.bc.ca>
192 - (djm) Make privsep work with PAM (still experimental)
3c0ef626 193 - (djm) OpenBSD CVS Sync
700318f3 194 - deraadt@cvs.openbsd.org 2002/04/20 09:02:03
195 [servconf.c]
196 No, afs requires explicit enabling
197 - markus@cvs.openbsd.org 2002/04/20 09:14:58
198 [bufaux.c bufaux.h]
199 add buffer_{get,put}_short
200 - markus@cvs.openbsd.org 2002/04/20 09:17:19
201 [radix.c]
202 rewrite using the buffer_* API, fixes overflow; ok deraadt@
203 - stevesk@cvs.openbsd.org 2002/04/21 16:19:27
204 [sshd.8 sshd_config]
205 document default AFSTokenPassing no; ok deraadt@
206 - stevesk@cvs.openbsd.org 2002/04/21 16:25:06
207 [sshconnect1.c]
208 spelling in error message; ok markus@
209 - markus@cvs.openbsd.org 2002/04/22 06:15:47
210 [radix.c]
211 fix check for overflow
212 - markus@cvs.openbsd.org 2002/04/22 16:16:53
213 [servconf.c sshd.8 sshd_config]
214 do not auto-enable KerberosAuthentication; ok djm@, provos@, deraadt@
215 - markus@cvs.openbsd.org 2002/04/22 21:04:52
216 [channels.c clientloop.c clientloop.h ssh.c]
217 request reply (success/failure) for -R style fwd in protocol v2,
218 depends on ordered replies.
219 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=215; ok provos@
220
22120020421
222 - (tim) [entropy.c.] Portability fix for SCO Unix 3.2v4.x (SCO OSR 3.0).
223 entropy.c needs seteuid(getuid()) for the setuid(original_uid) to
224 succeed. Patch by gert@greenie.muc.de. This fixes one part of Bug 208
225
22620020418
227 - (djm) Avoid SIGCHLD breakage when run from rsync. Fix from
228 Sturle Sunde <sturle.sunde@usit.uio.no>
229
23020020417
231 - (djm) Tell users to configure /dev/random support into OpenSSL in
232 INSTALL
233 - (djm) Fix .Nm in mdoc2man.pl from pspencer@fields.utoronto.ca
234 - (tim) [configure.ac] Issue warning on --with-default-path=/some_path
235 if LOGIN_CAP is enabled. Report & testing by Tuc <tuc@ttsg.com>
236
23720020415
238 - (djm) Unbreak "make install". Fix from Darren Tucker
239 <dtucker@zip.com.au>
240 - (stevesk) bsd-cygwin_util.[ch] BSD license from Corinna Vinschen
241 - (tim) [configure.ac] add tests for recvmsg and sendmsg.
242 [monitor_fdpass.c] add checks for HAVE_SENDMSG and HAVE_RECVMSG for
243 systems that HAVE_ACCRIGHTS_IN_MSGHDR but no recvmsg or sendmsg.
244
24520020414
246 - (djm) ssh-rand-helper improvements
247 - Add commandline debugging options
248 - Don't write binary data if stdout is a tty (use hex instead)
249 - Give it a manpage
250 - (djm) Random number collection doc fixes from Ben
251
25220020413
253 - (djm) Add KrbV support patch from Simon Wilkinson <simon@sxw.org.uk>
254
25520020412
256 - (stevesk) [auth-sia.[ch]] add BSD license from Chris Adams
257 - (tim) [configure.ac] add <sys/types.h> to msghdr tests. Change -L
258 to -h on testing for /bin being symbolic link
259 - (bal) Mistaken in Cygwin scripts for ssh starting. Patch by
260 Corinna Vinschen <vinschen@redhat.com>
261 - (bal) disable privsep if no MAP_ANON. We can re-enable it
262 after the release when we can do more testing.
263
26420020411
265 - (stevesk) [auth-sia.c] cleanup
266 - (tim) [acconfig.h defines.h includes.h] put includes in includes.h and
267 defines in defines.h [rijndael.c openbsd-compat/fake-socket.h
268 openbsd-compat/inet_aton.c] include "includes.h" instead of "config.h"
269 ok stevesk@
270
27120020410
272 - (stevesk) [configure.ac monitor.c] HAVE_SOCKETPAIR
273 - (stevesk) [auth-sia.c] compile fix Chris Adams <cmadams@hiwaay.net>
3c0ef626 274 - (bal) OpenBSD CVS Sync
700318f3 275 - markus@cvs.openbsd.org 2002/04/10 08:21:47
276 [auth1.c compat.c compat.h]
277 strip '@' from username only for KerbV and known broken clients,
278 bug #204
279 - markus@cvs.openbsd.org 2002/04/10 08:56:01
280 [version.h]
281 OpenSSH_3.2
282 - Added p1 to idenify Portable release version.
283
28420020408
285 - (bal) Minor OpenSC updates. Fix up header locations and update
286 README.smartcard provided by Juha Yrjölä <jyrjola@cc.hut.fi>
287
28820020407
289 - (stevesk) HAVE_CONTROL_IN_MSGHDR; not used right now.
290 Future: we may want to test if fd passing works correctly.
291 - (stevesk) [monitor_fdpass.c] fatal() for UsePrivilegeSeparation=yes
292 and no fd passing support.
293 - (stevesk) HAVE_MMAP and HAVE_SYS_MMAN_H and use them in
294 monitor_mm.c
295 - (stevesk) remove configure support for poll.h; it was removed
296 from sshd.c a long time ago.
297 - (stevesk) --with-privsep-user; default sshd
298 - (stevesk) wrap munmap() with HAVE_MMAP also.
299
30020020406
301 - (djm) Typo in Suse SPEC file. Fix from Carsten Grohmann
302 <carsten.grohmann@dr-baldeweg.de>
303 - (bal) Added MAP_FAILED to allow AIX and Trusted HP to compile.
3c0ef626 304 - (bal) OpenBSD CVS Sync
700318f3 305 - djm@cvs.openbsd.org 2002/04/06 00:30:08
306 [sftp-client.c]
307 Fix occasional corruption on upload due to bad reuse of request
308 id, spotted by chombier@mac.com; ok markus@
309 - mouring@cvs.openbsd.org 2002/04/06 18:24:09
310 [scp.c]
311 Fixes potental double // within path.
312 http://bugzilla.mindrot.org/show_bug.cgi?id=76
313 - (bal) Slight update to OpenSC support. Better version checking. patch
314 by Juha Yrjölä <jyrjola@cc.hut.fi>
315 - (bal) Revered out of runtime IRIX detection of joblimits. Code is
316 incomplete.
317 - (bal) Quiet down configure.ac if /bin/test does not exist.
318 - (bal) We no longer use atexit()/xatexit()/on_exit()
319
32020020405
321 - (bal) Patch for OpenSC SmartCard library; ok markus@; patch by
322 Juha Yrjölä <jyrjola@cc.hut.fi>
323 - (bal) Minor documentation update to reflect smartcard library
324 support changes.
325 - (bal) Too many <sys/queue.h> issues. Remove all workarounds and
326 using internal version only.
3c0ef626 327 - (bal) OpenBSD CVS Sync
700318f3 328 - stevesk@cvs.openbsd.org 2002/04/05 20:56:21
329 [sshd.8]
330 clarify sshrc some and handle X11UseLocalhost=yes; ok markus@
3c0ef626 331
700318f3 33220020404
333 - (stevesk) [auth-pam.c auth-pam.h auth-passwd.c auth-sia.c auth-sia.h
334 auth1.c auth2.c] PAM, OSF_SIA password auth cleanup; from djm.
3c0ef626 335 - (bal) OpenBSD CVS Sync
700318f3 336 - markus@cvs.openbsd.org 2002/04/03 09:26:11
337 [cipher.c myproposal.h]
338 re-add rijndael-cbc@lysator.liu.se for MacSSH; ash@lab.poc.net
339
34020020402
341 - (bal) Hand Sync of scp.c (reverted to upstream code)
342 - deraadt@cvs.openbsd.org 2002/03/30 17:45:46
343 [scp.c]
344 stretch banners
345 - (bal) CVS ID sync of uidswap.c
346 - (bal) OpenBSD CVS Sync (now for the real sync)
347 - markus@cvs.openbsd.org 2002/03/27 22:21:45
348 [ssh-keygen.c]
349 try to import keys with extra trailing === (seen with ssh.com <
350 2.0.12)
351 - markus@cvs.openbsd.org 2002/03/28 15:34:51
3c0ef626 352 [session.c]
700318f3 353 do not call record_login twice (for use_privsep)
354 - markus@cvs.openbsd.org 2002/03/29 18:59:32
355 [session.c session.h]
356 retrieve last login time before the pty is allocated, store per
357 session
358 - stevesk@cvs.openbsd.org 2002/03/29 19:16:22
359 [sshd.8]
360 RSA key modulus size minimum 768; ok markus@
361 - stevesk@cvs.openbsd.org 2002/03/29 19:18:33
362 [auth-rsa.c ssh-rsa.c ssh.h]
363 make RSA modulus minimum #define; ok markus@
364 - markus@cvs.openbsd.org 2002/03/30 18:51:15
365 [monitor.c serverloop.c sftp-int.c sftp.c sshd.c]
366 check waitpid for EINTR; based on patch from peter@ifm.liu.se
367 - markus@cvs.openbsd.org 2002/04/01 22:02:16
368 [sftp-client.c]
369 20480 is an upper limit for older server
370 - markus@cvs.openbsd.org 2002/04/01 22:07:17
371 [sftp-client.c]
372 fallback to stat if server does not support lstat
373 - markus@cvs.openbsd.org 2002/04/02 11:49:39
374 [ssh-agent.c]
375 check $SHELL for -k and -d, too;
376 http://bugzilla.mindrot.org/show_bug.cgi?id=199
377 - markus@cvs.openbsd.org 2002/04/02 17:37:48
378 [sftp.c]
379 always call log_init()
380 - markus@cvs.openbsd.org 2002/04/02 20:11:38
381 [ssh-rsa.c]
382 ignore SSH_BUG_SIGBLOB for ssh-rsa; #187
383 - (bal) mispelling in uidswap.c (portable only)
384
38520020401
386 - (stevesk) [monitor.c] PAM should work again; will *not* work with
387 UsePrivilegeSeparation=yes.
388 - (stevesk) [auth1.c] fix password auth for protocol 1 when
389 !USE_PAM && !HAVE_OSF_SIA; merge issue.
390
39120020331
392 - (tim) [configure.ac] use /bin/test -L to work around broken builtin on
393 Solaris 8
394 - (tim) [sshconnect2.c] change uint32_t to u_int32_t
395
39620020330
397 - (stevesk) [configure.ac] remove header check for sys/ttcompat.h
398 bug 167
399
40020020327
401 - (bal) 'pw' should be 'authctxt->pw' in auth1.c spotted by
402 kent@lysator.liu.se
3c0ef626 403 - (bal) OpenBSD CVS Sync
700318f3 404 - markus@cvs.openbsd.org 2002/03/26 11:34:49
3c0ef626 405 [ssh.1 sshd.8]
700318f3 406 update to recent drafts
407 - markus@cvs.openbsd.org 2002/03/26 11:37:05
408 [ssh.c]
409 update Copyright
410 - markus@cvs.openbsd.org 2002/03/26 15:23:40
411 [bufaux.c]
412 do not talk about packets in bufaux
413 - rees@cvs.openbsd.org 2002/03/26 18:46:59
414 [scard.c]
415 try_AUT0 in read_pubkey too, for those paranoid few who want to
416 acl 'sh'
417 - markus@cvs.openbsd.org 2002/03/26 22:50:39
418 [channels.h]
419 CHANNEL_EFD_OUTPUT_ACTIVE is false for CHAN_CLOSE_RCVD, too
420 - markus@cvs.openbsd.org 2002/03/26 23:13:03
421 [auth-rsa.c]
422 disallow RSA keys < 768 for protocol 1, too (rhosts-rsa and rsa auth)
423 - markus@cvs.openbsd.org 2002/03/26 23:14:51
424 [kex.c]
425 generate a new cookie for each SSH2_MSG_KEXINIT message we send out
426 - mouring@cvs.openbsd.org 2002/03/27 11:45:42
427 [monitor.c]
428 monitor_allowed_key() returns int instead of pointer. ok markus@
429
43020020325
431 - (stevesk) import OpenBSD <sys/tree.h> as "openbsd-compat/tree.h"
432 - (bal) OpenBSD CVS Sync
433 - stevesk@cvs.openbsd.org 2002/03/23 20:57:26
3c0ef626 434 [sshd.c]
700318f3 435 setproctitle() after preauth child; ok markus@
436 - markus@cvs.openbsd.org 2002/03/24 16:00:27
437 [serverloop.c]
438 remove unused debug
439 - markus@cvs.openbsd.org 2002/03/24 16:01:13
440 [packet.c]
441 debug->debug3 for extra padding
442 - stevesk@cvs.openbsd.org 2002/03/24 17:27:03
443 [kexgex.c]
444 typo; ok markus@
445 - stevesk@cvs.openbsd.org 2002/03/24 17:53:16
446 [monitor_fdpass.c]
447 minor cleanup and more error checking; ok markus@
448 - markus@cvs.openbsd.org 2002/03/24 18:05:29
449 [scard.c]
450 we need to figure out AUT0 for sc_private_encrypt, too
451 - stevesk@cvs.openbsd.org 2002/03/24 23:20:00
452 [monitor.c]
453 remove "\n" from fatal()
454 - markus@cvs.openbsd.org 2002/03/25 09:21:13
455 [auth-rsa.c]
456 return 0 (not NULL); tomh@po.crl.go.jp
457 - markus@cvs.openbsd.org 2002/03/25 09:25:06
458 [auth-rh-rsa.c]
459 rm bogus comment
460 - markus@cvs.openbsd.org 2002/03/25 17:34:27
461 [scard.c scard.h ssh-agent.c ssh-keygen.c ssh.c]
462 change sc_get_key to sc_get_keys and hide smartcard details in scard.c
463 - stevesk@cvs.openbsd.org 2002/03/25 20:12:10
464 [monitor_mm.c monitor_wrap.c]
465 ssize_t args use "%ld" and cast to (long)
466 size_t args use "%lu" and cast to (u_long)
467 ok markus@ and thanks millert@
468 - markus@cvs.openbsd.org 2002/03/25 21:04:02
3c0ef626 469 [ssh.c]
700318f3 470 simplify num_identity_files handling
471 - markus@cvs.openbsd.org 2002/03/25 21:13:51
472 [channels.c channels.h compat.c compat.h nchan.c]
473 don't send stderr data after EOF, accept this from older known
474 (broken) sshd servers only, fixes
475 http://bugzilla.mindrot.org/show_bug.cgi?id=179
476 - stevesk@cvs.openbsd.org 2002/03/26 03:24:01
477 [monitor.h monitor_fdpass.h monitor_mm.h monitor_wrap.h]
478 $OpenBSD$
3c0ef626 479
700318f3 48020020324
481 - (stevesk) [session.c] disable LOGIN_NEEDS_TERM until we are sure
482 it can be removed. only used on solaris. will no longer compile with
483 privsep shuffling.
484
48520020322
486 - (stevesk) HAVE_ACCRIGHTS_IN_MSGHDR configure support
487 - (stevesk) [monitor.c monitor_wrap.c] #ifdef HAVE_PW_CLASS_IN_PASSWD
488 - (stevesk) configure and cpp __FUNCTION__ gymnastics to handle nielsisms
489 - (stevesk) [monitor_fdpass.c] support for access rights style file
490 descriptor passing
491 - (stevesk) [auth2.c] merge cleanup/sync
492 - (stevesk) [defines.h] hp-ux 11 has ancillary data style fd passing, but
493 is missing CMSG_LEN() and CMSG_SPACE() macros.
494 - (stevesk) [defines.h] #define MAP_ANON MAP_ANONYMOUS for HP-UX; other
495 platforms may need this--I'm not sure. mmap() issues will need to be
496 addressed further.
497 - (tim) [cipher.c] fix problem with OpenBSD sync
498 - (stevesk) [LICENCE] OpenBSD sync
499
50020020321
501 - (bal) OpenBSD CVS Sync
502 - itojun@cvs.openbsd.org 2002/03/08 06:10:16
503 [sftp-client.c]
504 printf type mismatch
505 - itojun@cvs.openbsd.org 2002/03/11 03:18:49
506 [sftp-client.c]
507 correct type mismatches (u_int64_t != unsigned long long)
508 - itojun@cvs.openbsd.org 2002/03/11 03:19:53
509 [sftp-client.c]
510 indent
511 - markus@cvs.openbsd.org 2002/03/14 15:24:27
512 [sshconnect1.c]
513 don't trust size sent by (rogue) server; noted by
514 s.esser@e-matters.de
515 - markus@cvs.openbsd.org 2002/03/14 16:38:26
516 [sshd.c]
517 split out ssh1 session key decryption; ok provos@
518 - markus@cvs.openbsd.org 2002/03/14 16:56:33
519 [auth-rh-rsa.c auth-rsa.c auth.h]
520 split auth_rsa() for better readability and privsep; ok provos@
521 - itojun@cvs.openbsd.org 2002/03/15 11:00:38
522 [auth.c]
523 fix file type checking (use S_ISREG). ok by markus
524 - markus@cvs.openbsd.org 2002/03/16 11:24:53
525 [compress.c]
526 skip inflateEnd if inflate fails; ok provos@
527 - markus@cvs.openbsd.org 2002/03/16 17:22:09
528 [auth-rh-rsa.c auth.h]
529 split auth_rhosts_rsa(), ok provos@
530 - stevesk@cvs.openbsd.org 2002/03/16 17:41:25
531 [auth-krb5.c]
532 BSD license. from Daniel Kouril via Dug Song. ok markus@
533 - provos@cvs.openbsd.org 2002/03/17 20:25:56
534 [auth.c auth.h auth1.c auth2.c]
535 getpwnamallow returns struct passwd * only if user valid;
536 okay markus@
537 - provos@cvs.openbsd.org 2002/03/18 01:12:14
538 [auth.h auth1.c auth2.c sshd.c]
539 have the authentication functions return the authentication context
540 and then do_authenticated; okay millert@
541 - dugsong@cvs.openbsd.org 2002/03/18 01:30:10
542 [auth-krb4.c]
543 set client to NULL after xfree(), from Rolf Braun
544 <rbraun+ssh@andrew.cmu.edu>
545 - provos@cvs.openbsd.org 2002/03/18 03:41:08
546 [auth.c session.c]
547 move auth_approval into getpwnamallow with help from millert@
548 - markus@cvs.openbsd.org 2002/03/18 17:13:15
549 [cipher.c cipher.h]
550 export/import cipher states; needed by ssh-privsep
551 - markus@cvs.openbsd.org 2002/03/18 17:16:38
552 [packet.c packet.h]
553 export/import cipher state, iv and ssh2 seqnr; needed by ssh-privsep
554 - markus@cvs.openbsd.org 2002/03/18 17:23:31
555 [key.c key.h]
556 add key_demote() for ssh-privsep
557 - provos@cvs.openbsd.org 2002/03/18 17:25:29
558 [bufaux.c bufaux.h]
559 buffer_skip_string and extra sanity checking; needed by ssh-privsep
560 - provos@cvs.openbsd.org 2002/03/18 17:31:54
561 [compress.c]
562 export compression streams for ssh-privsep
563 - provos@cvs.openbsd.org 2002/03/18 17:50:31
564 [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c]
565 [auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c]
566 [kexgex.c servconf.c]
567 [session.h servconf.h serverloop.c session.c sshd.c]
568 integrate privilege separated openssh; its turned off by default
569 for now. work done by me and markus@
570 - provos@cvs.openbsd.org 2002/03/18 17:53:08
571 [sshd.8]
572 credits for privsep
573 - provos@cvs.openbsd.org 2002/03/18 17:59:09
574 [sshd.8]
575 document UsePrivilegeSeparation
576 - stevesk@cvs.openbsd.org 2002/03/18 23:52:51
577 [servconf.c]
578 UnprivUser/UnprivGroup usable now--specify numeric user/group; ok
579 provos@
580 - stevesk@cvs.openbsd.org 2002/03/19 03:03:43
581 [pathnames.h servconf.c servconf.h sshd.c]
582 _PATH_PRIVSEP_CHROOT_DIR; ok provos@
583 - stevesk@cvs.openbsd.org 2002/03/19 05:23:08
584 [sshd.8]
585 Banner has no default.
586 - mpech@cvs.openbsd.org 2002/03/19 06:32:56
587 [sftp-int.c]
588 use xfree() after xstrdup().
589
590 markus@ ok
591 - markus@cvs.openbsd.org 2002/03/19 10:35:39
592 [auth-options.c auth.h session.c session.h sshd.c]
593 clean up prototypes
594 - markus@cvs.openbsd.org 2002/03/19 10:49:35
595 [auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h]
596 [packet.c session.c sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c]
597 [sshconnect2.c sshd.c ttymodes.c]
598 KNF whitespace
599 - markus@cvs.openbsd.org 2002/03/19 14:27:39
600 [auth.c auth1.c auth2.c]
601 make getpwnamallow() allways call pwcopy()
602 - markus@cvs.openbsd.org 2002/03/19 15:31:47
603 [auth.c]
604 check for NULL; from provos@
605 - stevesk@cvs.openbsd.org 2002/03/20 19:12:25
606 [servconf.c servconf.h ssh.h sshd.c]
607 for unprivileged user, group do:
608 pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@
609 - stevesk@cvs.openbsd.org 2002/03/20 21:08:08
610 [sshd.c]
611 strerror() on chdir() fail; ok provos@
612 - markus@cvs.openbsd.org 2002/03/21 10:21:20
613 [ssh-add.c]
614 ignore errors for nonexisting default keys in ssh-add,
615 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158
616 - jakob@cvs.openbsd.org 2002/03/21 15:17:26
617 [clientloop.c ssh.1]
618 add built-in command line for adding new port forwardings on the fly.
619 based on a patch from brian wellington. ok markus@.
620 - markus@cvs.openbsd.org 2002/03/21 16:38:06
3c0ef626 621 [scard.c]
700318f3 622 make compile w/ openssl 0.9.7
623 - markus@cvs.openbsd.org 2002/03/21 16:54:53
624 [scard.c scard.h ssh-keygen.c]
625 move key upload to scard.[ch]
626 - markus@cvs.openbsd.org 2002/03/21 16:57:15
3c0ef626 627 [scard.c]
700318f3 628 remove const
629 - markus@cvs.openbsd.org 2002/03/21 16:58:13
630 [clientloop.c]
631 remove unused
632 - rees@cvs.openbsd.org 2002/03/21 18:08:15
3c0ef626 633 [scard.c]
700318f3 634 In sc_put_key(), sc_reader_id should be id.
635 - markus@cvs.openbsd.org 2002/03/21 20:51:12
3c0ef626 636 [sshd_config]
700318f3 637 add privsep (off)
638 - markus@cvs.openbsd.org 2002/03/21 21:23:34
639 [sshd.c]
640 add privsep_preauth() and remove 1 goto; ok provos@
641 - rees@cvs.openbsd.org 2002/03/21 21:54:34
642 [scard.c scard.h ssh-keygen.c]
643 Add PIN-protection for secret key.
644 - rees@cvs.openbsd.org 2002/03/21 22:44:05
645 [authfd.c authfd.h ssh-add.c ssh-agent.c ssh.c]
646 Add PIN-protection for secret key.
647 - markus@cvs.openbsd.org 2002/03/21 23:07:37
3c0ef626 648 [clientloop.c]
700318f3 649 remove unused, sync w/ cmdline patch in my tree.
650
65120020317
652 - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is
653 wanted, warn if directory does not exist. Put system directories in
654 front of PATH for finding entorpy commands.
655 - (tim) [contrib/aix/buildbff.sh contrib/aix/inventory.sh] AIX package
656 build fixes. Patch by Darren Tucker <dtucker@zip.com.au>
657 [contrib/solaris/buildpkg.sh] add missing dirs to SYSTEM_DIR. Have
658 postinstall check for $piddir and add if necessary.
659
66020020311
661 - (tim) [contrib/solaris/buildpkg.sh, contrib/solaris/README] Updated to
662 build on all platforms that support SVR4 style package tools. Now runs
663 from build dir. Parts are based on patches from Antonio Navarro, and
664 Darren Tucker.
665
66620020308
667 - (djm) Revert bits of Markus' OpenSSL compat patch which was
668 accidentally committed.
669 - (djm) Add Markus' patch for compat wih OpenSSL < 0.9.6.
670 Known issue: Blowfish for SSH1 does not work
671 - (stevesk) entropy.c: typo in debug message
672 - (djm) ssh-keygen -i needs seeded RNG; report from markus@
3c0ef626 673
674$Id$
This page took 5.1975 seconds and 5 git commands to generate.