-20030923
- - (dtucker) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/09/18 07:52:54
- [sshconnect.c]
- missing {}; bug #656; jclonguet at free.fr
- - markus@cvs.openbsd.org 2003/09/18 07:54:48
- [buffer.c]
- protect against double free; #660; zardoz at users.sf.net
- - markus@cvs.openbsd.org 2003/09/18 08:49:45
- [deattack.c misc.c session.c ssh-agent.c]
- more buffer allocation fixes; from Solar Designer; CAN-2003-0682;
- ok millert@
- - markus@cvs.openbsd.org 2003/09/19 09:02:02
- [packet.c]
- buffer_dump only if PACKET_DEBUG is defined; Jedi/Sector One; pr 3471
- - (djm) Fix SSH1 challenge kludge
- - (djm) Bug #671: Fix builds on OpenBSD
- - (djm) Bug #676: Fix PAM stack corruption
- - (djm) Fix bad free() in PAM code
- - (djm) Don't call pam_end before pam_init
- - (djm) Enable build with old OpenSSL again
- - (djm) Trim deprecated options from INSTALL. Mention UsePAM
- - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
- - (djm) Crank version.h and spec version numbers
- - (djm) Release 3.7.1p2
-
-20030922
- - (dtucker) [Makefile.in] Bug #644: Fix "make clean" for out-of-tree
- builds. Portability corrections from tim@.
- - (dtucker) [configure.ac] Bug #665: uid swapping issues on Mac OS X.
- Patch from max at quendi.de.
- - (dtucker) [configure.ac] Bug #657: uid swapping issues on BSDi.
- - (dtucker) [configure.ac] Bug #653: uid swapping issues on Tru64.
- - (dtucker) [configure.ac] Bug #693: uid swapping issues on NCR MP-RAS.
- Patch from david.haughton at ncr.com
- - (dtucker) [configure.ac] Bug #659: uid swapping issues on IRIX 6.
- Part of patch supplied by bugzilla-openssh at thewrittenword.com
- - (dtucker) [configure.ac openbsd-compat/fake-rfc2553.c
- openbsd-compat/fake-rfc2553.h] Bug #659: Test for and handle systems with
- where gai_strerror is defined as "const char *". Part of patch supplied
- by bugzilla-openssh at thewrittenword.com
- - (dtucker) [contrib/cygwin/README contrib/cygwin/ssh-host-config] Update
- ssh-host-config to match current defaults, bump README version. Patch from
- vinschen at redhat.com.
- - (dtucker) [uidswap.c] Don't test restoration of uid on Cygwin since the
- OS does not support permanently dropping privileges. Patch from
- vinschen at redhat.com.
- - (dtucker) [openbsd-compat/port-aix.c] Use correct include for xmalloc.h,
- add canohost.h to stop warning. Based on patch from openssh-unix-dev at
- thewrittenword.com
- - (dtucker) [INSTALL] Bug #686: Document requirement for zlib 1.1.4 or
- higher.
- - (tim) Fix typo. s/SETEIUD_BREAKS_SETUID/SETEUID_BREAKS_SETUID/
- - (tim) [configure.ac] Bug 665: move 3 new AC_DEFINES outside of AC_TRY_RUN.
- Report by distler AT golem ph utexas edu.
- - (dtucker) [contrib/aix/pam.conf] Include example pam.conf for AIX from
- article by genty at austin.ibm.com, included with the author's permission.
- - (tim) [configure.ac] add --disable-etc-default-login option. ok djm
-
-20030919
- - (djm) Bug #683: Remove reference to --with-ipv4-default from INSTALL;
- djast AT cs.toronto.edu
- - (djm) Bug #680: Remove missing inet_ntoa.h header reference
- - (djm) Bug #646: Fix location of x11-ssh-askpass; Jim
- - (dtucker) [openbsd-compat/port-aix.h] Bug #640: Don't include audit.h
- unless required. Reorder to reduce warnings.
- - (dtucker) [session.c] Bug #643: Fix size_t -> u_int and fix null deref
- when /etc/default/login doesn't exist or isn't readable. Fixes from
- jparsons-lists at saffron.net and georg.oppenberg at deu mci com.
-
-20030918
- - (djm) Bug #652: Fix empty password auth
-
-20030917
- - (djm) OpenBSD Sync
- - markus@cvs.openbsd.org 2003/09/16 21:02:40
- [buffer.c channels.c version.h]
- more malloc/fatal fixes; ok millert/deraadt; ghudson at MIT.EDU
- - (djm) Crank RPM spec versions
- - (djm) Release 3.7.1p1
-
-20030916
- - (dtucker) [acconfig.h configure.ac defines.h session.c] Bug #252: Retrieve
- PATH (or SUPATH) and UMASK from /etc/default/login on platforms that have it
- (eg Solaris, Reliant Unix). Patch from Robert.Dahlem at siemens.com.
- ok djm@
- - (bal) OpenBSD Sync
- - deraadt@cvs.openbsd.org 2003/09/16 03:03:47
- [buffer.c]
- do not expand buffer before attempting to reallocate it; markus ok
- - (djm) Crank spec versions
- - (djm) Banish (safe) sprintf from auth-pam.c. Patch from bal
- - (tim) [configure.ac] Fix portability issues.
- - (djm) Release 3.7p1
-
-20030914
- - (dtucker) [Makefile regress/Makefile] Fix portability issues preventing
- the regression tests from running with Solaris' make. Patch from Brian
- Poole (raj at cerias.purdue.edu).
- - (dtucker) [regress/Makefile] AIX's make doesn't like " +=", so replace
- with vanilla "=".
-
-20030913
- - (dtucker) [regress/agent-timeout.sh] Timeout of 5 sec is borderline for
- slower hosts, increase to 10 sec.
- - (dtucker) [auth-passwd.c] On AIX, call setauthdb() before loginsuccess(),
- required to correctly reset failed login count when using a password
- registry other than "files" (eg LDAP, see bug #543).
- - (tim) [configure.ac] define WITH_ABBREV_NO_TTY for SCO.
- Report by Roger Cornelius.
- - (dtucker) [auth-pam.c] Use SSHD_PAM_SERVICE for PAM service name, patch
- from cjwatson at debian.org.
-
-20030912
- - (tim) [regress/agent-ptrace.sh] sh doesn't like "if ! shell_function; then".
- - (tim) [Makefile.in] only mkdir regress if it does not exist.
- - (tim) [regress/yes-head.sh] shell portability fix.
-
-20030911
- - (dtucker) [configure.ac] Bug #588, #615: Move other libgen tests to after
- the dirname test, to allow a broken dirname to be detected correctly.
- Based partially on patch supplied by alex.kiernan at thus.net. ok djm@
- - (tim) [configure.ac] Move libgen tests to before libwrap to unbreak
- UnixWare 2.03 using --with-tcp-wrappers.
- - (tim) [configure.ac] Prefer setuid/setgid on UnixWare and Open Server.
- - (tim) [regress/agent-ptrace.sh regress/dynamic-forward.sh
- regress/sftp-cmds.sh regress/stderr-after-eof.sh regress/test-exec.sh]
- no longer depends on which(1). patch by dtucker@
-
-20030910
- - (dtucker) [configure.ac] Bug #636: Add support for Cray's new X1 machine.
- Patch from wendyp at cray.com.
- - (dtucker) [configure.ac] Part of bug #615: tcsendbreak might be a macro.
- - (dtucker) [regressh/yes-head.sh] Some platforms (eg Solaris) don't have
- "yes".
-
-20030909
- - (tim) [regress/Makefile] Fixes for building outside of a read-only
- source tree.
- - (tim) [regress/agent-timeout.sh] s/TIMEOUT/SSHAGENT_TIMEOUT/ Fixes conflict
- with shell read-only variable.
- - (tim) [regress/sftp-badcmds.sh regress/sftp-cmds.sh] Fix errors like
- UX:rm: ERROR: Cannot remove '.' or '..'
-
-20030908
- - (tim) [configure.ac openbsd-compat/getrrsetbyname.c] wrap _getshort and
- _getlong in #ifndef
- - (tim) [configure.ac acconfig.h openbsd-compat/getrrsetbyname.c] test for
- HEADER.ad in arpa/nameser.h
- - (tim) [ssh-keygen.c] s/PATH_MAX/MAXPATHLEN/ ok mouring@
-
-20030907
- - (dtucker) [agent-ptrace.sh dynamic-forward.sh (all regress/)]
- Put "which" inside quotes.
- - (dtucker) [dynamic-forward.sh forwarding.sh sftp-batch.sh (all regress/)]
- Add ${EXEEXT}: required to work on Cygwin.
- - (dtucker) [regress/sftp-batch.sh] Make temporary batch file name more
- distinctive, so "rm ${BATCH}.*" doesn't match the script itself.
- - (dtucker) [regress/sftp-cmds.sh] Skip quoted file test on Cygwin.
- - (dtucker) [openbsd-compat/xcrypt.c] #elsif -> #elif
- - (dtucker) [acconfig.h] Typo.
- - (dtucker) [CREDITS Makefile.in configure.ac mdoc2man.awk mdoc2man.pl]
- Replace mdoc2man.pl with mdoc2man.awk, provided by Peter Stuge.
-
-20030906
- - (dtucker) [acconfig.h configure.ac uidswap.c] Prefer setuid/setgid on AIX.
-
-20030905
- - (dtucker) [Makefile.in] Add distclean target for regress/, fix clean target.
-
-20030904
- - (dtucker) Portablize regression tests. Parts contributed by Roumen
- Petrov, David M. Williams and Corinna Vinschen.
- - [Makefile.in] Add "make tests" target and "make clean" hooks.
- - [regress/agent-getpeereid.sh] Skip test on platforms that don't support
- getpeereid.
- - [regress/agent-ptrace.sh] Skip tests if platform doesn't support it or
- gdb cannot be found.
- - [regress/reconfigure/sh] Make path to sshd fully qualified if required.
- - [regress/rekey.sh] Remove dependence on /dev/zero (not all platforms have
- it). The sparse file will take less disk space too.
- - [regress/sftp-cmds.sh] Ensure files used for test are readable.
- - [regress/stderr-after-eof.sh] Search for a usable checksum program.
- - [regress/sftp-badcmds.sh regress/sftp-cmds.sh regress/sftp.sh
- regress/ssh-com-client.sh regress/ssh-com-sftp.sh regress/stderr-data.sh
- regress/transfer.sh] Use ${EXEEXT} where appropriate.
- - [regress/sftp.sh regress/ssh-com-sftp.sh] Remove dependency on /dev/stdin.
- - [regress/agent-ptrace.sh regress/agent-timeout.sh]
- "grep -q" -> "grep >/dev/null"
- - [regress/agent.sh regress/proto-version.sh regress/ssh-com.sh
- regress/test-exec.sh] Handle different ways of echoing without newlines.
- - [regress/dynamic-forward.sh] Some "which" programs output on stderr.
- - [regress/sftp-cmds.sh] Use portable "test" option.
- - [regress/test-exec.sh] Use sudo, search for "whoami" equivalent, always
- use Strictmodes no, wait longer for sshd startup.
- - [regress/Makefile] Remove BSDisms.
- - [regress/README.regress] Add a basic readme.
- - [Makefile.in regress/agent-getpeereid.sh] config.h is now in $BUILDDIR
- not $OBJ.
- - [Makefile.in regress/agent-ptrace] Fix minor regress issues on Cygwin.
-
-20030903
+20090223
- (djm) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/08/26 09:58:43
- [auth-passwd.c auth.c auth.h auth1.c auth2-none.c auth2-passwd.c]
- [auth2.c monitor.c]
- fix passwd auth for 'username leaks via timing'; with djm@, original
- patches from solar
- - markus@cvs.openbsd.org 2003/08/28 12:54:34
- [auth.h]
- remove kerberos support from ssh1, since it has been replaced with GSSAPI;
- but keep kerberos passwd auth for ssh1 and 2; ok djm, hin, henning, ...
- - markus@cvs.openbsd.org 2003/09/02 16:40:29
+ - djm@cvs.openbsd.org 2009/02/22 23:50:57
+ [ssh_config.5 sshd_config.5]
+ don't advertise experimental options
+ - djm@cvs.openbsd.org 2009/02/22 23:59:25
+ [sshd_config.5]
+ missing period
+ - djm@cvs.openbsd.org 2009/02/23 00:06:15
[version.h]
- enter 3.7
- - jmc@cvs.openbsd.org 2003/09/02 18:50:06
- [sftp.1 ssh_config.5]
- escape punctuation;
- ok deraadt@
+ openssh-5.2
+ - (djm) [README] update for 5.2
+ - (djm) Release openssh-5.2p1
-20030902
+20090222
- (djm) OpenBSD CVS Sync
- - deraadt@cvs.openbsd.org 2003/08/24 17:36:51
- [auth2-gss.c]
- 64 bit cleanups; markus ok
- - markus@cvs.openbsd.org 2003/08/28 12:54:34
- [auth-krb5.c auth.h auth1.c monitor.c monitor.h monitor_wrap.c]
- [monitor_wrap.h readconf.c servconf.c session.c ssh_config.5]
- [sshconnect1.c sshd.c sshd_config sshd_config.5]
- remove kerberos support from ssh1, since it has been replaced with GSSAPI;
- but keep kerberos passwd auth for ssh1 and 2; ok djm, hin, henning, ...
- - markus@cvs.openbsd.org 2003/08/29 10:03:15
- [compat.c compat.h]
- SSH_BUG_K5USER is unused; ok henning@
- - markus@cvs.openbsd.org 2003/08/29 10:04:36
- [channels.c nchan.c]
- be less chatty; debug -> debug2, cleanup; ok henning@
- - markus@cvs.openbsd.org 2003/08/31 10:26:04
- [progressmeter.c]
- pass file_size + 1 to snprintf: fixes printing of truncated
- file names; fix based on patch/report from sturm@;
- - markus@cvs.openbsd.org 2003/08/31 12:14:22
- [progressmeter.c]
- do write to buf[-1]
- - markus@cvs.openbsd.org 2003/08/31 13:29:05
- [session.c]
- call ssh_gssapi_storecreds conditionally from do_exec();
- with sxw@inf.ed.ac.uk
- - markus@cvs.openbsd.org 2003/08/31 13:30:18
- [gss-serv.c]
- correct string termination in parse_ename(); sxw@inf.ed.ac.uk
- - markus@cvs.openbsd.org 2003/08/31 13:31:57
- [gss-serv.c]
- whitspace KNF
- - markus@cvs.openbsd.org 2003/09/01 09:50:04
+ - tobias@cvs.openbsd.org 2009/02/21 19:32:04
+ [misc.c sftp-server-main.c ssh-keygen.c]
+ Added missing newlines in error messages.
+ ok dtucker
+
+20090221
+ - (djm) OpenBSD CVS Sync
+ - djm@cvs.openbsd.org 2009/02/17 01:28:32
+ [ssh_config]
+ sync with revised default ciphers; pointed out by dkrause@
+ - djm@cvs.openbsd.org 2009/02/18 04:31:21
+ [schnorr.c]
+ signature should hash over the entire group, not just the generator
+ (this is still disabled code)
+ - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
+ [contrib/suse/openssh.spec] Prepare for 5.2p1
+
+20090216
+ - (djm) [regress/conch-ciphers.sh regress/putty-ciphers.sh]
+ [regress/putty-kex.sh regress/putty-transfer.sh] Downgrade disabled
+ interop tests from FATAL error to a warning. Allows some interop
+ tests to proceed if others are missing necessary prerequisites.
+ - (djm) [configure.ac] support GNU/kFreeBSD and GNU/kOpensolaris
+ systems; patch from Aurelien Jarno via rmh AT aybabtu.com
+
+20090214
+ - (djm) OpenBSD CVS Sync
+ - dtucker@cvs.openbsd.org 2009/02/02 11:15:14
+ [sftp.c]
+ Initialize a few variables to prevent spurious "may be used
+ uninitialized" warnings from newer gcc's. ok djm@
+ - djm@cvs.openbsd.org 2009/02/12 03:00:56
+ [canohost.c canohost.h channels.c channels.h clientloop.c readconf.c]
+ [readconf.h serverloop.c ssh.c]
+ support remote port forwarding with a zero listen port (-R0:...) to
+ dyamically allocate a listen port at runtime (this is actually
+ specified in rfc4254); bz#1003 ok markus@
+ - djm@cvs.openbsd.org 2009/02/12 03:16:01
+ [serverloop.c]
+ tighten check for -R0:... forwarding: only allow dynamic allocation
+ if want_reply is set in the packet
+ - djm@cvs.openbsd.org 2009/02/12 03:26:22
+ [monitor.c]
+ some paranoia: check that the serialised key is really KEY_RSA before
+ diddling its internals
+ - djm@cvs.openbsd.org 2009/02/12 03:42:09
+ [ssh.1]
+ document -R0:... usage
+ - djm@cvs.openbsd.org 2009/02/12 03:44:25
+ [ssh.1]
+ consistency: Dq => Ql
+ - djm@cvs.openbsd.org 2009/02/12 03:46:17
+ [ssh_config.5]
+ document RemoteForward usage with 0 listen port
+ - jmc@cvs.openbsd.org 2009/02/12 07:34:20
+ [ssh_config.5]
+ kill trailing whitespace;
+ - markus@cvs.openbsd.org 2009/02/13 11:50:21
+ [packet.c]
+ check for enc !=NULL in packet_start_discard
+ - djm@cvs.openbsd.org 2009/02/14 06:35:49
+ [PROTOCOL]
+ mention that eow and no-more-sessions extensions are sent only to
+ OpenSSH peers
+
+20090212
+ - (djm) [sshpty.c] bz#1419: OSX uses cloning ptys that automagically
+ set ownership and modes, so avoid explicitly setting them
+ - (djm) [configure.ac loginrec.c] bz#1421: fix lastlog support for OSX.
+ OSX provides a getlastlogxbyname function that automates the reading of
+ a lastlog file. Also, the pututxline function will update lastlog so
+ there is no need for loginrec.c to do it explicitly. Collapse some
+ overly verbose code while I'm in there.
+
+20090201
+ - (dtucker) [defines.h sshconnect.c] INET6_ADDRSTRLEN is now needed in
+ channels.c too, so move the definition for non-IP6 platforms to defines.h
+ where it can be shared.
+
+20090129
+ - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
+ If the CYGWIN environment variable is empty, the installer script
+ should not install the service with an empty CYGWIN variable, but
+ rather without setting CYGWNI entirely.
+ - (tim) [contrib/cygwin/ssh-host-config] Whitespace cleanup. No code changes.
+
+20090128
+ - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
+ Changes to work on Cygwin 1.5.x as well as on the new Cygwin 1.7.x.
+ The information given for the setting of the CYGWIN environment variable
+ is wrong for both releases so I just removed it, together with the
+ unnecessary (Cygwin 1.5.x) or wrong (Cygwin 1.7.x) default setting.
+
+20081228
+ - (djm) OpenBSD CVS Sync
+ - stevesk@cvs.openbsd.org 2008/12/09 03:20:42
+ [channels.c servconf.c]
+ channel_print_adm_permitted_opens() should deal with all the printing
+ for that config option. suggested by markus@; ok markus@ djm@
+ dtucker@
+ - djm@cvs.openbsd.org 2008/12/09 04:32:22
+ [auth2-chall.c]
+ replace by-hand string building with xasprinf(); ok deraadt@
+ - sobrado@cvs.openbsd.org 2008/12/09 15:35:00
+ [sftp.1 sftp.c]
+ update for the synopses displayed by the 'help' command, there are a
+ few missing flags; add 'bye' to the output of 'help'; sorting and spacing.
+ jmc@ suggested replacing .Oo/.Oc with a single .Op macro.
+ ok jmc@
+ - stevesk@cvs.openbsd.org 2008/12/09 22:37:33
+ [clientloop.c]
+ fix typo in error message
+ - stevesk@cvs.openbsd.org 2008/12/10 03:55:20
+ [addrmatch.c]
+ o cannot be NULL here but use xfree() to be consistent; ok djm@
+ - stevesk@cvs.openbsd.org 2008/12/29 01:12:36
+ [ssh-keyscan.1]
+ fix example, default key type is rsa for 3+ years; from
+ frederic.perrin@resel.fr
+ - stevesk@cvs.openbsd.org 2008/12/29 02:23:26
+ [pathnames.h]
+ no need to escape single quotes in comments
+ - okan@cvs.openbsd.org 2008/12/30 00:46:56
[sshd_config.5]
- gss kex is not supported; sxw@inf.ed.ac.uk
- - markus@cvs.openbsd.org 2003/09/01 12:50:46
+ add AllowAgentForwarding to available Match keywords list
+ ok djm
+ - djm@cvs.openbsd.org 2009/01/01 21:14:35
+ [channels.c]
+ call channel destroy callbacks on receipt of open failure messages.
+ fixes client hangs when connecting to a server that has MaxSessions=0
+ set spotted by imorgan AT nas.nasa.gov; ok markus@
+ - djm@cvs.openbsd.org 2009/01/01 21:17:36
+ [kexgexs.c]
+ fix hash calculation for KEXGEX: hash over the original client-supplied
+ values and not the sanity checked versions that we acutally use;
+ bz#1540 reported by john.smith AT arrows.demon.co.uk
+ ok markus@
+ - djm@cvs.openbsd.org 2009/01/14 01:38:06
+ [channels.c]
+ support SOCKS4A protocol, from dwmw2 AT infradead.org via bz#1482;
+ "looks ok" markus@
+ - stevesk@cvs.openbsd.org 2009/01/15 17:38:43
+ [readconf.c]
+ 1) use obsolete instead of alias for consistency
+ 2) oUserKnownHostsFile not obsolete but oGlobalKnownHostsFile2 is
+ so move the comment.
+ 3) reorder so like options are together
+ ok djm@
+ - djm@cvs.openbsd.org 2009/01/22 09:46:01
+ [channels.c channels.h session.c]
+ make Channel->path an allocated string, saving a few bytes here and
+ there and fixing bz#1380 in the process; ok markus@
+ - djm@cvs.openbsd.org 2009/01/22 09:49:57
+ [channels.c]
+ oops! I committed the wrong version of the Channel->path diff,
+ it was missing some tweaks suggested by stevesk@
+ - djm@cvs.openbsd.org 2009/01/22 10:02:34
+ [clientloop.c misc.c readconf.c readconf.h servconf.c servconf.h]
+ [serverloop.c ssh-keyscan.c ssh.c sshd.c]
+ make a2port() return -1 when it encounters an invalid port number
+ rather than 0, which it will now treat as valid (needed for future work)
+ adjust current consumers of a2port() to check its return value is <= 0,
+ which in turn required some things to be converted from u_short => int
+ make use of int vs. u_short consistent in some other places too
+ feedback & ok markus@
+ - djm@cvs.openbsd.org 2009/01/22 10:09:16
+ [auth-options.c]
+ another chunk of a2port() diff that got away. wtfdjm??
+ - djm@cvs.openbsd.org 2009/01/23 07:58:11
+ [myproposal.h]
+ prefer CTR modes and revised arcfour (i.e w/ discard) modes to CBC
+ modes; ok markus@
+ - naddy@cvs.openbsd.org 2009/01/24 17:10:22
+ [ssh_config.5 sshd_config.5]
+ sync list of preferred ciphers; ok djm@
+ - markus@cvs.openbsd.org 2009/01/26 09:58:15
+ [cipher.c cipher.h packet.c]
+ Work around the CPNI-957037 Plaintext Recovery Attack by always
+ reading 256K of data on packet size or HMAC errors (in CBC mode only).
+ Help, feedback and ok djm@
+ Feedback from Martin Albrecht and Paterson Kenny
+
+20090107
+ - (djm) [uidswap.c] bz#1412: Support >16 supplemental groups in OS X.
+ Patch based on one from vgiffin AT apple.com; ok dtucker@
+ - (djm) [channels.c] bz#1419: support "on demand" X11 forwarding via
+ launchd on OS X; patch from vgiffin AT apple.com, slightly tweaked;
+ ok dtucker@
+ - (djm) [contrib/ssh-copy-id.1 contrib/ssh-copy-id] bz#1492: Make
+ ssh-copy-id copy id_rsa.pub by default (instead of the legacy "identity"
+ key). Patch from cjwatson AT debian.org
+
+20090107
+ - (tim) [configure.ac defines.h openbsd-compat/port-uw.c
+ openbsd-compat/xcrypt.c] Add SECUREWARE support to OpenServer 6 SVR5 ABI.
+ OK djm@ dtucker@
+ - (tim) [configure.ac] Move check_for_libcrypt_later=1 in *-*-sysv5*) section.
+ OpenServer 6 doesn't need libcrypt.
+
+20081209
+ - (djm) OpenBSD CVS Sync
+ - djm@cvs.openbsd.org 2008/12/09 02:38:18
+ [clientloop.c]
+ The ~C escape handler does not work correctly for multiplexed sessions -
+ it opens a commandline on the master session, instead of on the slave
+ that requested it. Disable it on slave sessions until such time as it
+ is fixed; bz#1543 report from Adrian Bridgett via Colin Watson
+ ok markus@
+ - djm@cvs.openbsd.org 2008/12/09 02:39:59
+ [sftp.c]
+ Deal correctly with failures in remote stat() operation in sftp,
+ correcting fail-on-error behaviour in batchmode. bz#1541 report and
+ fix from anedvedicky AT gmail.com; ok markus@
+ - djm@cvs.openbsd.org 2008/12/09 02:58:16
[readconf.c]
- rm gssapidelegatecreds alias; never supported before
- - markus@cvs.openbsd.org 2003/09/01 13:52:18
- [ssh.h]
- rm whitespace
- - markus@cvs.openbsd.org 2003/09/01 18:15:50
- [readconf.c readconf.h servconf.c servconf.h ssh.c]
- remove unused kerberos code; ok henning@
- - markus@cvs.openbsd.org 2003/09/01 20:44:54
- [auth2-gss.c]
- fix leak
- - (djm) Don't initialise pam_conv structures inline. Avoids HP/UX compiler
- error. Part of Bug #423, patch from michael_steffens AT hp.com
- - (djm) Bug #423: reorder setting of PAM_TTY and calling of PAM session
- management (now done in do_setusercontext). Largely from
- michael_steffens AT hp.com
- - (djm) Fix openbsd-compat/ again - remove references to strl(cpy|cat).h
-
-20030829
- - (bal) openbsd-compat/ clean up. Considate headers, add in Id on our
- files, and added missing license to header.
+ don't leave junk (free'd) pointers around in Forward *fwd argument on
+ failure; avoids double-free in ~C -L handler when given an invalid
+ forwarding specification; bz#1539 report from adejong AT debian.org
+ via Colin Watson; ok markus@ dtucker@
+ - djm@cvs.openbsd.org 2008/12/09 03:02:37
+ [sftp.1 sftp.c]
+ correct sftp(1) and corresponding usage syntax;
+ bz#1518 patch from imorgan AT nas.nasa.gov; ok deraadt@ improved diff jmc@
+
+20081208
+ - (djm) [configure.ac] bz#1538: better test for ProPolice/SSP: actually
+ use some stack in main().
+ Report and suggested fix from vapier AT gentoo.org
+ - (djm) OpenBSD CVS Sync
+ - markus@cvs.openbsd.org 2008/12/02 19:01:07
+ [clientloop.c]
+ we have to use the recipient's channel number (RFC 4254) for
+ SSH2_MSG_CHANNEL_SUCCESS/SSH2_MSG_CHANNEL_FAILURE messages,
+ otherwise we trigger 'Non-public channel' error messages on sshd
+ systems with clientkeepalive enabled; noticed by sturm; ok djm;
+ - markus@cvs.openbsd.org 2008/12/02 19:08:59
+ [serverloop.c]
+ backout 1.149, since it's not necessary and openssh clients send
+ broken CHANNEL_FAILURE/SUCCESS messages since about 2004; ok djm@
+ - markus@cvs.openbsd.org 2008/12/02 19:09:38
+ [channels.c]
+ s/remote_id/id/ to be more consistent with other code; ok djm@
-20030826
- - (djm) Bug #629: Mark ssh_config option "pamauthenticationviakbdint"
- as deprecated. Remove mention from README.privsep. Patch from
- aet AT cc.hut.fi
+20081201
+ - (dtucker) [contrib/cygwin/{Makefile,ssh-host-config}] Add new doc files
+ and tweak the is-sshd-running check in ssh-host-config. Patch from
+ vinschen at redhat com.
- (dtucker) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/08/22 10:56:09
- [auth2.c auth2-gss.c auth.h compat.c compat.h gss-genr.c gss-serv-krb5.c
- gss-serv.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h readconf.c
- readconf.h servconf.c servconf.h session.c session.h ssh-gss.h
- ssh_config.5 sshconnect2.c sshd_config sshd_config.5]
- support GSS API user authentication; patches from Simon Wilkinson,
- stripped down and tested by Jakob and myself.
- - markus@cvs.openbsd.org 2003/08/22 13:20:03
- [sshconnect2.c]
- remove support for "kerberos-2@ssh.com"
- - markus@cvs.openbsd.org 2003/08/22 13:22:27
- [auth2.c] (auth2-krb5.c removed)
- nuke "kerberos-2@ssh.com"
- - markus@cvs.openbsd.org 2003/08/22 20:55:06
- [LICENCE]
- add Simon Wilkinson
- - deraadt@cvs.openbsd.org 2003/08/24 17:36:52
- [monitor.c monitor_wrap.c sshconnect2.c]
- 64 bit cleanups; markus ok
- - fgsch@cvs.openbsd.org 2003/08/25 08:13:09
- [sftp-int.c]
- fix div by zero when listing for filename lengths longer than width.
- markus@ ok.
- - djm@cvs.openbsd.org 2003/08/25 10:33:33
- [sshconnect2.c]
- fprintf->logit to silence login banner with "ssh -q"; ok markus@
- - (dtucker) [Makefile.in acconfig.h auth-krb5.c auth-pam.c auth-pam.h
- configure.ac defines.h gss-serv-krb5.c session.c ssh-gss.h sshconnect1.c
- sshconnect2.c] Add Portable GSSAPI support, patch by Simon Wilkinson.
- - (dtucker) [Makefile.in] Remove auth2-krb5.
- - (dtucker) [contrib/aix/inventory.sh] Add public domain notice. ok mouring@
- (the original author)
- - (dtucker) [auth.c] Do not check for locked accounts when PAM is enabled.
+ - markus@cvs.openbsd.org 2008/11/21 15:47:38
+ [packet.c]
+ packet_disconnect() on padding error, too. should reduce the success
+ probability for the CPNI-957037 Plaintext Recovery Attack to 2^-18
+ ok djm@
+ - dtucker@cvs.openbsd.org 2008/11/30 11:59:26
+ [monitor_fdpass.c]
+ Retry sendmsg/recvmsg on EAGAIN and EINTR; ok djm@
-20030825
- - (djm) Bug #621: Select OpenSC keys by usage attributes. Patch from
- larsch@trustcenter.de
- - (bal) openbsd-compat/ OpenBSD updates. Mostly licensing, ansifications
- and minor fixes. OK djm@
- - (bal) redo how we handle 'mysignal()'. Move it to
- openbsd-compat/bsd-misc.c, s/mysignal/signal/ and #define signal to
- be our 'mysignal' by default. OK djm@
- - (dtucker) [acconfig.h auth.c configure.ac sshd.8] Bug #422 again: deny
- any access to locked accounts. ok djm@
- - (djm) Bug #564: Perform PAM account checks for all authentications when
- UsePAM=yes; ok dtucker
- - (dtucker) [configure.ac] Bug #533, #551: define BROKEN_GETADDRINFO on
- Tru64, solves getnameinfo and "bad addr or host" errors. ok djm@
- - (dtucker) [README buildbff.sh inventory.sh] (all in contrib/aix)
- Update package builder: correctly handle config variables, use lsuser
- rather than /etc/passwd, fix typos, add Id's.
+20081123
+ - (dtucker) [monitor_fdpass.c] Reduce diff vs OpenBSD by moving some
+ declarations, removing an unnecessary union member and adding whitespace.
+ cmsgbuf.tmp thing spotted by des at des no, ok djm some time ago.
-20030822
- - (djm) s/get_progname/ssh_get_progname/g to avoid conflict with Heimdal
- -lbroken; ok dtucker
- - (dtucker) [contrib/cygwin/ssh-user-config] Put keys in authorized_keys
- rather that authorized_keys2. Patch from vinschen@redhat.com.
+20081118
+ - (tim) [addrmatch.c configure.ac] Some platforms do not have sin6_scope_id
+ member of sockaddr_in6. Also reported in Bug 1491 by David Leonard. OK and
+ feedback by djm@
-20030821
+20081111
- (dtucker) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/08/14 16:08:58
+ - jmc@cvs.openbsd.org 2008/11/05 11:22:54
+ [servconf.c]
+ passord -> password;
+ fixes user/5975 from Rene Maroufi
+ - stevesk@cvs.openbsd.org 2008/11/07 00:42:12
[ssh-keygen.c]
- exit after primetest, ok djm@
- - (dtucker) [defines.h] Put CMSG_DATA, CMSG_FIRSTHDR with other CMSG* macros,
- change CMSG_DATA to use __CMSG_ALIGN (and thus work properly), reformat for
- consistency.
- - (dtucker) [configure.ac] Move openpty/ctty test outside of case statement
- and after normal openpty test.
-
-20030813
- - (dtucker) [session.c] Remove #ifdef TIOCSBRK kludge.
- - (dtucker) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/08/13 08:33:02
- [session.c]
- use more portable tcsendbreak(3) and ignore break_length;
- ok deraadt, millert
- - markus@cvs.openbsd.org 2003/08/13 08:46:31
- [auth1.c readconf.c readconf.h servconf.c servconf.h ssh.c ssh_config
- ssh_config.5 sshconnect1.c sshd.8 sshd.c sshd_config sshd_config.5]
- remove RhostsAuthentication; suggested by djm@ before; ok djm@, deraadt@,
- fgsch@, miod@, henning@, jakob@ and others
- - markus@cvs.openbsd.org 2003/08/13 09:07:10
- [readconf.c ssh.c]
- socks4->socks, since with support both 4 and 5; dtucker@zip.com.au
- - (dtucker) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
- Add a tcsendbreak function for platforms that don't have one, based on the
- one from OpenBSD.
-
-20030811
- - (dtucker) OpenBSD CVS Sync
- (thanks to Simon Wilkinson for help with this -dt)
- - markus@cvs.openbsd.org 2003/07/16 15:02:06
- [auth-krb5.c]
- mcc -> fcc; from Love Hörnquist Åstrand <lha@it.su.se>
- otherwise the kerberos credentinal is stored in a memory cache
- in the privileged sshd. ok jabob@, hin@ (some time ago)
- - (dtucker) [openbsd-compat/xcrypt.c] Remove Cygwin #ifdef block (duplicate
- in bsd-cygwin_util.h).
-
-20030808
- - (dtucker) [openbsd-compat/fake-rfc2553.h] Older Linuxes have AI_PASSIVE and
- AI_CANONNAME in netdb.h but not AI_NUMERICHOST, so check each definition
- separately before defining them.
- - (dtucker) [auth-pam.c] Don't set PAM_TTY if tty is null. ok djm@
-
-20030807
- - (dtucker) [session.c] Have session_break_req not attempt to send a break
- if TIOCSBRK and TIOCCBRK are not defined (eg Cygwin).
- - (dtucker) [canohost.c] Bug #336: Only check ip options if IP_OPTIONS is
- defined (fixes compile error on really old Linuxes).
- - (dtucker) [defines.h] Bug #336: Add CMSG_DATA and CMSG_FIRSTHDR macros if
- not already defined (eg Linux with some versions of libc5), based on those
- from OpenBSD.
- - (dtucker) [openbsd-compat/bsd-cygwin_util.c openbsd-compat/bsd-cygwin_util.h]
- Remove incorrect filenames from comments (file names are in Id tags).
- - (dtucker) [session.c openbsd-compat/bsd-cygwin_util.h] Move Cygwin
- specific defines and includes to bsd-cygwin_util.h. Fixes build error too.
-
-20030802
- - (dtucker) [monitor.h monitor_wrap.h] Remove excess ident tags.
- - (dtucker) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/07/22 13:35:22
- [auth1.c auth.h auth-passwd.c monitor.c monitor.h monitor_wrap.c
- monitor_wrap.h readconf.c readconf.h servconf.c servconf.h session.c ssh.1
- ssh.c ssh_config.5 sshconnect1.c sshd.c sshd_config.5 ssh.h]
- remove (already disabled) KRB4/AFS support, re-enable -k in ssh(1);
- test+ok henning@
- - (dtucker) [Makefile.in acconfig.h configure.ac] Remove KRB4/AFS support.
- - (dtucker) [auth-krb4.c radix.c radix.h] Remove KRB4/AFS specific files.
- - (dtucker) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/07/23 07:42:43
- [sshd_config]
- remove AFS; itojun@
- - djm@cvs.openbsd.org 2003/07/28 09:49:56
- [ssh-keygen.1 ssh-keygen.c]
- Support for generating Diffie-Hellman groups (/etc/moduli) from ssh-keygen.
- Based on code from Phil Karn, William Allen Simpson and Niels Provos.
- ok markus@, thanks jmc@
- - markus@cvs.openbsd.org 2003/07/29 18:24:00
- [LICENCE progressmeter.c]
- replace 4 clause BSD licensed progressmeter code with a replacement
- from Nils Nordman and myself; ok deraadt@
- (copied from OpenBSD an re-applied portable changes)
- - markus@cvs.openbsd.org 2003/07/29 18:26:46
- [progressmeter.c]
- fix length for "- stalled -" (included with previous import)
- - markus@cvs.openbsd.org 2003/07/30 07:44:14
- [progressmeter.c]
- use only 4 digits in format_size (included with previous import)
- - markus@cvs.openbsd.org 2003/07/30 07:53:27
- [progressmeter.c]
- whitespace (included with previous import)
- - markus@cvs.openbsd.org 2003/07/31 09:21:02
- [auth2-none.c]
- check whether passwd auth is allowd, similar to proto 1; rob@pitman.co.za
- ok henning
- - avsm@cvs.openbsd.org 2003/07/31 15:50:16
- [atomicio.c]
- correct comment: atomicio takes vwrite, not write; deraadt@ ok
- - markus@cvs.openbsd.org 2003/07/31 22:34:03
- [progressmeter.c]
- print rate similar old version; round instead truncate;
- (included in previous progressmeter.c commit)
- - (dtucker) [openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
- Add a tcgetpgrp function.
- - (dtucker) [Makefile.in moduli.c moduli.h] Add new files and to Makefile.
- - (dtucker) [openbsd-compat/bsd-misc.c] Fix cut-and-paste bug in tcgetpgrp.
-
-20030730
- - (djm) [auth-pam.c] Don't use crappy APIs like sprintf. Thanks bal
-
-20030726
- - (dtucker) [openbsd-compat/xcrypt.c] Fix typo: DISABLED_SHADOW ->
- DISABLE_SHADOW. Fixes HP-UX compile error.
-
-20030724
- - (bal) [auth-passwd.c openbsd-compat/Makefile.in openbsd-compat/xcrypt.c
- openbsd-compat/xcrypt.h] Split off encryption into xcrypt() interface,
- and isolate shadow password functions. Tested in Solaris, but should
- not break other platforms too badly (except maybe HP =). Also brings
- auth-passwd.c into full sync with OpenBSD tree.
+ spelling/typo in comment
+ - stevesk@cvs.openbsd.org 2008/11/07 18:50:18
+ [nchan.c]
+ add space to some log/debug messages for readability; ok djm@ markus@
+ - dtucker@cvs.openbsd.org 2008/11/07 23:34:48
+ [auth2-jpake.c]
+ Move JPAKE define to make life easier for portable. ok djm@
+ - tobias@cvs.openbsd.org 2008/11/09 12:34:47
+ [session.c ssh.1]
+ typo fixed (overriden -> overridden)
+ ok espie, jmc
+ - stevesk@cvs.openbsd.org 2008/11/11 02:58:09
+ [servconf.c]
+ USE_AFS not referenced so remove #ifdef. fixes sshd -T not printing
+ kerberosgetafstoken. ok dtucker@
+ (Id sync only, we still want the ifdef in portable)
+ - stevesk@cvs.openbsd.org 2008/11/11 03:55:11
+ [channels.c]
+ for sshd -T print 'permitopen any' vs. 'permitopen' for case of no
+ permitopen's; ok and input dtucker@
+ - djm@cvs.openbsd.org 2008/11/10 02:06:35
+ [regress/putty-ciphers.sh]
+ PuTTY supports AES CTR modes, so interop test against them too
-20030723
- - (dtucker) [configure.ac] Back out change for bug #620.
+20081105
+ - OpenBSD CVS Sync
+ - djm@cvs.openbsd.org 2008/11/03 08:59:41
+ [servconf.c]
+ include MaxSessions in sshd -T output; patch from imorgan AT nas.nasa.gov
+ - djm@cvs.openbsd.org 2008/11/04 07:58:09
+ [auth.c]
+ need unistd.h for close() prototype
+ (ID sync only)
+ - djm@cvs.openbsd.org 2008/11/04 08:22:13
+ [auth.h auth2.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h]
+ [readconf.c readconf.h servconf.c servconf.h ssh2.h ssh_config.5]
+ [sshconnect2.c sshd_config.5 jpake.c jpake.h schnorr.c auth2-jpake.c]
+ [Makefile.in]
+ Add support for an experimental zero-knowledge password authentication
+ method using the J-PAKE protocol described in F. Hao, P. Ryan,
+ "Password Authenticated Key Exchange by Juggling", 16th Workshop on
+ Security Protocols, Cambridge, April 2008.
+
+ This method allows password-based authentication without exposing
+ the password to the server. Instead, the client and server exchange
+ cryptographic proofs to demonstrate of knowledge of the password while
+ revealing nothing useful to an attacker or compromised endpoint.
+
+ This is experimental, work-in-progress code and is presently
+ compiled-time disabled (turn on -DJPAKE in Makefile.inc).
+
+ "just commit it. It isn't too intrusive." deraadt@
+ - stevesk@cvs.openbsd.org 2008/11/04 19:18:00
+ [readconf.c]
+ because parse_forward() is now used to parse all forward types (DLR),
+ and it malloc's space for host variables, we don't need to malloc
+ here. fixes small memory leaks.
+
+ previously dynamic forwards were not parsed in parse_forward() and
+ space was not malloc'd in that case.
+
+ ok djm@
+ - stevesk@cvs.openbsd.org 2008/11/05 03:23:09
+ [clientloop.c ssh.1]
+ add dynamic forward escape command line; ok djm@
-20030719
- - (dtucker) [configure.ac] Bug #620: Define BROKEN_GETADDRINFO for
- Solaris/x86. Patch from jrhett at isite.net.
- - (dtucker) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/07/14 12:36:37
- [sshd.c]
- remove undocumented -V option. would be only useful if openssh is used
- as ssh v1 server for ssh.com's ssh v2.
- - markus@cvs.openbsd.org 2003/07/16 10:34:53
- [ssh.c sshd.c]
- don't exit on multiple -v or -d; ok deraadt@
- - markus@cvs.openbsd.org 2003/07/16 10:36:28
- [sshtty.c]
- clear IUCLC in enter_raw_mode; from rob@pitman.co.za; ok deraadt@, fgs@
- - deraadt@cvs.openbsd.org 2003/07/18 01:54:25
+20081103
+ - OpenBSD CVS Sync
+ - sthen@cvs.openbsd.org 2008/07/24 23:55:30
+ [ssh-keygen.1]
+ Add "ssh-keygen -F -l" to synopsis (displays fingerprint from
+ known_hosts). ok djm@
+ - grunk@cvs.openbsd.org 2008/07/25 06:56:35
+ [ssh_config]
+ Add VisualHostKey to example file, ok djm@
+ - grunk@cvs.openbsd.org 2008/07/25 07:05:16
+ [key.c]
+ In random art visualization, make sure to use the end marker only at the
+ end. Initial diff by Dirk Loss, tweaks and ok djm@
+ - markus@cvs.openbsd.org 2008/07/31 14:48:28
+ [sshconnect2.c]
+ don't allocate space for empty banners; report t8m at centrum.cz;
+ ok deraadt
+ - krw@cvs.openbsd.org 2008/08/02 04:29:51
+ [ssh_config.5]
+ whitepsace -> whitespace. From Matthew Clarke via bugs@.
+ - djm@cvs.openbsd.org 2008/08/21 04:09:57
+ [session.c]
+ allow ForceCommand internal-sftp with arguments. based on patch from
+ michael.barabanov AT gmail.com; ok markus@
+ - djm@cvs.openbsd.org 2008/09/06 12:24:13
+ [kex.c]
+ OpenSSL 0.9.8h supplies a real EVP_sha256 so we do not need our
+ replacement anymore
+ (ID sync only for portable - we still need this)
+ - markus@cvs.openbsd.org 2008/09/11 14:22:37
+ [compat.c compat.h nchan.c ssh.c]
+ only send eow and no-more-sessions requests to openssh 5 and newer;
+ fixes interop problems with broken ssh v2 implementations; ok djm@
+ - millert@cvs.openbsd.org 2008/10/02 14:39:35
+ [session.c]
+ Convert an unchecked strdup to xstrdup. OK deraadt@
+ - jmc@cvs.openbsd.org 2008/10/03 13:08:12
+ [sshd.8]
+ do not give an example of how to chmod files: we can presume the user
+ knows that. removes an ambiguity in the permission of authorized_keys;
+ ok deraadt
+ - deraadt@cvs.openbsd.org 2008/10/03 23:56:28
+ [sshconnect2.c]
+ Repair strnvis() buffersize of 4*n+1, with termination gauranteed by the
+ function.
+ spotted by des@freebsd, who commited an incorrect fix to the freebsd tree
+ and (as is fairly typical) did not report the problem to us. But this fix
+ is correct.
+ ok djm
+ - djm@cvs.openbsd.org 2008/10/08 23:34:03
+ [ssh.1 ssh.c]
+ Add -y option to force logging via syslog rather than stderr.
+ Useful for daemonised ssh connection (ssh -f). Patch originally from
+ and ok'd by markus@
+ - djm@cvs.openbsd.org 2008/10/09 03:50:54
+ [servconf.c sshd_config.5]
+ support setting PermitEmptyPasswords in a Match block
+ requested in PR3891; ok dtucker@
+ - jmc@cvs.openbsd.org 2008/10/09 06:54:22
+ [ssh.c]
+ add -y to usage();
+ - stevesk@cvs.openbsd.org 2008/10/10 04:55:16
[scp.c]
- userid is unsigned, but well, force it anyways; andrushock@korovino.net
- - djm@cvs.openbsd.org 2003/07/19 00:45:53
- [sftp-int.c]
- fix sftp filename parsing for arguments with escaped quotes. bz #517;
- ok markus
- - djm@cvs.openbsd.org 2003/07/19 00:46:31
- [regress/sftp-cmds.sh]
- regress test for sftp arguments with escaped quotes; ok markus
-
-20030714
- - (dtucker) [acconfig.h configure.ac port-aix.c] Older AIXes don't declare
- loginfailed at all, so assume 3-arg loginfailed if not declared.
- - (dtucker) [port-aix.h] Work around name collision on AIX for r_type by
- undef'ing it.
- - (dtucker) Bug #543: [configure.ac port-aix.c port-aix.h]
- Call setauthdb() before loginfailed(), which may load password registry-
- specific functions. Based on patch by cawlfiel at us.ibm.com.
- - (dtucker) [port-aix.h] Fix prototypes.
- - (dtucker) OpenBSD CVS Sync
- - avsm@cvs.openbsd.org 2003/07/09 13:58:19
+ spelling in comment; ok djm@
+ - stevesk@cvs.openbsd.org 2008/10/10 05:00:12
[key.c]
- minor tweak: when generating the hex fingerprint, give strlcat the full
- bound to the buffer, and add a comment below explaining why the
- zero-termination is one less than the bound. markus@ ok
- - markus@cvs.openbsd.org 2003/07/10 14:42:28
- [packet.c]
- the 2^(blocksize*2) rekeying limit is too expensive for 3DES,
- blowfish, etc, so enforce a 1GB limit for small blocksizes.
- - markus@cvs.openbsd.org 2003/07/10 20:05:55
- [sftp.c]
- sync usage with manpage, add missing -R
-
-20030708
- - (dtucker) [acconfig.h auth-passwd.c configure.ac session.c port-aix.[ch]]
- Include AIX headers for authentication functions and make calls match
- prototypes. Test for and handle 3-arg and 4-arg variants of loginfailed.
- - (dtucker) [session.c] Check return value of setpcred().
- - (dtucker) [auth-passwd.c auth.c session.c sshd.c port-aix.c port-aix.h]
- Convert aixloginmsg into platform-independant Buffer loginmsg.
-
-20030707
- - (dtucker) [configure.ac] Bug #600: Check that getrusage is declared before
- searching libraries for it. Fixes build errors on NCR MP-RAS.
-
-20030706
- - (dtucker) [ssh-rand-helper.c loginrec.c]
- Apply atomicio typing change to these too.
-
-20030703
- - (dtucker) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2003/06/28 07:48:10
- [sshd.c]
- report pidfile creation errors, based on patch from Roumen Petrov;
- ok markus@
- - deraadt@cvs.openbsd.org 2003/06/28 16:23:06
- [atomicio.c atomicio.h authfd.c clientloop.c monitor_wrap.c msg.c
- progressmeter.c scp.c sftp-client.c ssh-keyscan.c ssh.h sshconnect.c
- sshd.c]
- deal with typing of write vs read in atomicio
- - markus@cvs.openbsd.org 2003/06/29 12:44:38
+ typo in error message; ok djm@
+ - stevesk@cvs.openbsd.org 2008/10/10 16:43:27
+ [ssh_config.5]
+ use 'Privileged ports can be forwarded only when logging in as root on
+ the remote machine.' for RemoteForward just like ssh.1 -R.
+ ok djm@ jmc@
+ - stevesk@cvs.openbsd.org 2008/10/14 18:11:33
[sshconnect.c]
- memset 0, not \0; andrushock@korovino.net
- - markus@cvs.openbsd.org 2003/07/02 12:56:34
- [channels.c]
- deny dynamic forwarding with -R for v1, too; ok djm@
- - markus@cvs.openbsd.org 2003/07/02 14:51:16
- [channels.c ssh.1 ssh_config.5]
- (re)add socks5 suppport to -D; ok djm@
- now ssh(1) can act both as a socks 4 and socks 5 server and
- dynamically forward ports.
- - markus@cvs.openbsd.org 2003/07/02 20:37:48
- [ssh.c]
- convert hostkeyalias to lowercase, otherwise uppercase aliases will
- not match at all; ok henning@
- - markus@cvs.openbsd.org 2003/07/03 08:21:46
- [regress/dynamic-forward.sh]
- add socks5; speedup; reformat; based on patch from dtucker@zip.com.au
- - markus@cvs.openbsd.org 2003/07/03 08:24:13
- [regress/Makefile]
- enable tests for dynamic fwd via socks (-D), uses nc(1)
- - djm@cvs.openbsd.org 2003/07/03 08:09:06
- [readconf.c readconf.h ssh-keysign.c ssh.c]
- fix AddressFamily option in config file, from brent@graveland.net;
- ok markus@
-
-20030630
- - (djm) Search for support functions necessary to build our
- getrrsetbyname() replacement. Patch from Roumen Petrov
-
-20030629
- - (dtucker) [includes.h] Bug #602: move #include of netdb.h to after in.h
- (fixes compiler warnings on Solaris 2.5.1).
- - (dtucker) [configure.ac] Add sanity test after system-dependant compiler
- flag modifications.
-
-20030628
- - (djm) Bug #591: use PKCS#15 private key label as a comment in case
- of OpenSC. Report and patch from larsch@trustcenter.de
- - (djm) Bug #593: Sanity check OpenSC card reader number; patch from
- aj@dungeon.inka.de
- - (dtucker) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/06/23 09:02:44
+ use #define ROQUIET here; no binary change. ok dtucker@
+ - stevesk@cvs.openbsd.org 2008/10/17 18:36:24
[ssh_config.5]
- document EnableSSHKeysign; bugzilla #599; ok deraadt@, jmc@
- - markus@cvs.openbsd.org 2003/06/24 08:23:46
- [auth2-hostbased.c auth2-pubkey.c auth2.c channels.c key.c key.h
- monitor.c packet.c packet.h serverloop.c sshconnect2.c sshd.c]
- int -> u_int; ok djm@, deraadt@, mouring@
- - miod@cvs.openbsd.org 2003/06/25 22:39:36
- [sftp-server.c]
- Typo police: attribute is better written with an 'r'.
- - markus@cvs.openbsd.org 2003/06/26 20:08:33
+ correct and clarify VisualHostKey; ok jmc@
+ - stevesk@cvs.openbsd.org 2008/10/30 19:31:16
+ [clientloop.c sshd.c]
+ don't need to #include "monitor_fdpass.h"
+ - stevesk@cvs.openbsd.org 2008/10/31 15:05:34
+ [dispatch.c]
+ remove unused #define DISPATCH_MIN; ok markus@
+ - djm@cvs.openbsd.org 2008/11/01 04:50:08
+ [sshconnect2.c]
+ sprinkle ARGSUSED on dispatch handlers
+ nuke stale unusued prototype
+ - stevesk@cvs.openbsd.org 2008/11/01 06:43:33
+ [channels.c]
+ fix some typos in log messages; ok djm@
+ - sobrado@cvs.openbsd.org 2008/11/01 11:14:36
+ [ssh-keyscan.1 ssh-keyscan.c]
+ the ellipsis is not an optional argument; while here, improve spacing.
+ - stevesk@cvs.openbsd.org 2008/11/01 17:40:33
+ [clientloop.c readconf.c readconf.h ssh.c]
+ merge dynamic forward parsing into parse_forward();
+ 'i think this is OK' djm@
+ - stevesk@cvs.openbsd.org 2008/11/02 00:16:16
+ [ttymodes.c]
+ protocol 2 tty modes support is now 7.5 years old so remove these
+ debug3()s; ok deraadt@
+ - stevesk@cvs.openbsd.org 2008/11/03 01:07:02
[readconf.c]
- do not dump core for 'ssh -o proxycommand host'; ok deraadt@
- - (dtucker) [regress/dynamic-forward.sh] Import new regression test.
- - (dtucker) [configure.ac] Bug #570: Have ./configure --enable-FEATURE
- actually enable the feature, for those normally disabled. Patch by
- openssh (at) roumenpetrov.info.
-
-20030624
- - (dtucker) Have configure refer the user to config.log and
- contrib/findssl.sh for OpenSSL header/library mismatches.
-
-20030622
- - (dtucker) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/06/21 09:14:05
- [regress/reconfigure.sh]
- missing $SUDO; from dtucker@zip.com.au
- - markus@cvs.openbsd.org 2003/06/18 11:28:11
- [ssh-rsa.c]
- backout last change, since it violates pkcs#1
- switch to share/misc/license.template
- - djm@cvs.openbsd.org 2003/06/20 05:47:58
- [sshd_config.5]
- sync description of protocol 2 cipher proposal; ok markus
- - djm@cvs.openbsd.org 2003/06/20 05:48:21
- [sshd_config]
- sync some implemented options; ok markus@
- - (dtucker) [regress/authorized_keys_root] Remove temp data file from CVS.
- - (dtucker) [openbsd-compat/setproctitle.c] Ensure SPT_TYPE is defined before
- testing its value.
-
-20030618
- - (djm) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/06/12 07:57:38
- [monitor.c sshlogin.c sshpty.c]
- typos; dtucker at zip.com.au
- - djm@cvs.openbsd.org 2003/06/12 12:22:47
- [LICENCE]
- mention more copyright holders; ok markus@
- - nino@cvs.openbsd.org 2003/06/12 15:34:09
- [scp.c]
- Typo. Ok markus@.
- - markus@cvs.openbsd.org 2003/06/12 19:12:03
- [scard.c scard.h ssh-agent.c ssh.c]
- add sc_get_key_label; larsch at trustcenter.de; bugzilla#591
- - markus@cvs.openbsd.org 2003/06/16 08:22:35
- [ssh-rsa.c]
- make sure the signature has at least the expected length (don't
- insist on len == hlen + oidlen, since this breaks some smartcards)
- bugzilla #592; ok djm@
- - markus@cvs.openbsd.org 2003/06/16 10:22:45
- [ssh-add.c]
- print out key comment on each prompt; make ssh-askpass more useable; ok djm@
- - markus@cvs.openbsd.org 2003/06/17 18:14:23
- [cipher-ctr.c]
- use license from /usr/share/misc/license.template for new code
- - (dtucker) [reconfigure.sh rekey.sh sftp-badcmds.sh]
- Import new regression tests from OpenBSD
- - (dtucker) [regress/copy.1 regress/copy.2] Remove temp data files from CVS.
- - (dtucker) OpenBSD CVS Sync (regress/)
- - markus@cvs.openbsd.org 2003/04/02 12:21:13
- [Makefile]
- enable rekey test
- - djm@cvs.openbsd.org 2003/04/04 09:34:22
- [Makefile sftp-cmds.sh]
- More regression tests, including recent directory rename bug; ok markus@
- - markus@cvs.openbsd.org 2003/05/14 22:08:27
- [ssh-com-client.sh ssh-com-keygen.sh ssh-com-sftp.sh ssh-com.sh]
- test against some new commerical versions
- - mouring@cvs.openbsd.org 2003/05/15 04:07:12
- [sftp-cmds.sh]
- Advanced put/get testing for sftp. OK @djm
- - markus@cvs.openbsd.org 2003/06/12 15:40:01
- [try-ciphers.sh]
- add ctr
- - markus@cvs.openbsd.org 2003/06/12 15:43:32
- [Makefile]
- test -HUP; dtucker at zip.com.au
-
-20030614
- - (djm) Update license on fake-rfc2553.[ch]; ok itojun@
-
-20030611
- - (djm) Mention portable copyright holders in LICENSE
- - (djm) Put licenses on substantial header files
- - (djm) Sync LICENSE against OpenBSD
- - (djm) OpenBSD CVS Sync
- - jmc@cvs.openbsd.org 2003/06/10 09:12:11
- [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5]
- [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
- - section reorder
- - COMPATIBILITY merge
- - macro cleanup
- - kill whitespace at EOL
- - new sentence, new line
- ssh pages ok markus@
- - deraadt@cvs.openbsd.org 2003/06/10 22:20:52
- [packet.c progressmeter.c]
- mostly ansi cleanup; pval ok
- - jakob@cvs.openbsd.org 2003/06/11 10:16:16
- [sshconnect.c]
- clean up check_host_key() and improve SSHFP feedback. ok markus@
- - jakob@cvs.openbsd.org 2003/06/11 10:18:47
- [dns.c]
- sync with check_host_key() change
- - djm@cvs.openbsd.org 2003/06/11 11:18:38
- [authfd.c authfd.h ssh-add.c ssh-agent.c]
- make agent constraints (lifetime, confirm) work with smartcard keys;
- ok markus@
-
-
-20030609
- - (djm) Sync README.smartcard with OpenBSD -current
- - (djm) Re-merge OpenSC info into README.smartcard
-
-20030606
- - (dtucker) [uidswap.c] Fix setreuid and add missing args to fatal(). ok djm@
-
-20030605
- - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
- canohost.c changes.
- - (djm) Implement paranoid priv dropping checks, based on:
- "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
- Proceedings of USENIX Security Symposium 2002
- - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
- - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
- - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
- Patch from larsch@trustcenter.de
- - (djm) Bug #589 - scard-opensc: load only keys with a private keys
- Patch from larsch@trustcenter.de
- - (dtucker) Add includes.h to fake-rfc2553.c so it will build.
- - (dtucker) Define EAI_NONAME in fake-rfc2553.h (used by fake-rfc2553.c).
-
-20030604
- - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
- simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
- - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
- Patch from larsch@trustcenter.de; ok markus@
- - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
- larsch@trustcenter.de; ok markus@
+ remove valueless comment
+ - stevesk@cvs.openbsd.org 2008/11/03 02:44:41
+ [readconf.c]
+ fix comment
+ - (djm) [contrib/caldera/ssh-host-keygen contrib/suse/rc.sshd]
+ Make example scripts generate keys with default sizes rather than fixed,
+ non-default 1024 bits; patch from imorgan AT nas.nasa.gov
+ - (djm) [contrib/sshd.pam.generic contrib/caldera/sshd.pam]
+ [contrib/redhat/sshd.pam] Move pam_nologin to account group from
+ incorrect auth group in example files;
+ patch from imorgan AT nas.nasa.gov
+
+20080906
+ - (dtucker) [config.guess config.sub] Update to latest versions from
+ http://git.savannah.gnu.org/gitweb/ (2008-04-14 and 2008-06-16
+ respectively).
+
+20080830
+ - (dtucker) [openbsd-compat/bsd-poll.c] correctly check for number of FDs
+ larger than FD_SETSIZE (OpenSSH only ever uses poll with one fd). Patch
+ from Nicholas Marriott.
+
+20080721
- (djm) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2003/06/04 08:25:18
- [sshconnect.c]
- disable challenge/response and keyboard-interactive auth methods
- upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
- bz #580; ok markus@
- - djm@cvs.openbsd.org 2003/06/04 10:23:48
- [sshd.c]
- remove duplicated group-dropping code; ok markus@
- - djm@cvs.openbsd.org 2003/06/04 12:03:59
- [serverloop.c]
- remove bitrotten commet; ok markus@
- - djm@cvs.openbsd.org 2003/06/04 12:18:49
- [scp.c]
- ansify; ok markus@
- - djm@cvs.openbsd.org 2003/06/04 12:40:39
- [scp.c]
- kill ssh process upon receipt of signal, bz #241.
- based on patch from esb AT hawaii.edu; ok markus@
- - djm@cvs.openbsd.org 2003/06/04 12:41:22
- [sftp.c]
- kill ssh process on receipt of signal; ok markus@
- - (djm) Update to fix of bug #584: lock card before return.
- From larsch@trustcenter.de
- - (djm) Always use mysignal() for SIGALRM
-
-20030603
- - (djm) Replace setproctitle replacement with code derived from
- UCB sendmail
+ - djm@cvs.openbsd.org 2008/07/23 07:36:55
+ [servconf.c]
+ do not try to print options that have been compile-time disabled
+ in config test mode (sshd -T); report from nix-corp AT esperi.org.uk
+ ok dtucker@
+ - (djm) [servconf.c] Print UsePAM option in config test mode (when it
+ has been compiled in); report from nix-corp AT esperi.org.uk
+ ok dtucker@
+
+20080721
- (djm) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/06/02 09:17:34
- [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
- [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
- [sshd_config.5]
- deprecate VerifyReverseMapping since it's dangerous if combined
- with IP based access control as noted by Mike Harding; replace with
- a UseDNS option, UseDNS is on by default and includes the
- VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
- ok deraadt@, djm@
- - millert@cvs.openbsd.org 2003/06/03 02:56:16
- [scp.c]
- Remove the advertising clause in the UCB license which Berkeley
- rescinded 22 July 1999. Proofed by myself and Theo.
- - (djm) Fix portable-specific uses of verify_reverse_mapping too
- - (djm) Sync openbsd-compat with OpenBSD CVS.
- - No more 4-term BSD licenses in linked code
- - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
+ - jmc@cvs.openbsd.org 2008/07/18 22:51:01
+ [sftp-server.8]
+ no need for .Pp before or after .Sh;
+ - djm@cvs.openbsd.org 2008/07/21 08:19:07
+ [version.h]
+ openssh-5.1
+ - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
+ [contrib/suse/openssh.spec] Update version number in README and RPM specs
+ - (djm) Release OpenSSH-5.1
-20030602
- - (djm) Fix segv from bad reordering in auth-pam.c
- - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
- clobber
- - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
- CVS ID.
- - (djm) Remove "noip6" option from RedHat spec file. This may now be
- set at runtime using AddressFamily option.
- - (djm) Fix use of macro before #define in cipher-aes.c
- - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
+20080717
- (djm) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2003/05/26 12:54:40
- [sshconnect.c]
- fix format strings; ok markus@
- - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
- [sshd.c uidswap.c]
- seteuid and setegid; markus ok
- - jakob@cvs.openbsd.org 2003/06/02 08:31:10
- [ssh_config.5]
- VerifyHostKeyDNS is v2 only. ok markus@
-
-20030530
- - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
- roumenpetrov.info
- - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
-
-20030526
- - (djm) Avoid auth2-chall.c warning when compiling without
- PAM, BSD_AUTH and SKEY
-
-20030525
-- (djm) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2003/05/24 09:02:22
- [log.c]
- pass logged data through strnvis; ok markus
- - djm@cvs.openbsd.org 2003/05/24 09:30:40
- [authfile.c monitor.c sftp-common.c sshpty.c]
- cast some types for printing; ok markus@
-
-20030524
- - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
-
-20030523
- - (djm) Use VIS_SAFE on logged strings rather than default strnvis
- encoding (which encodes many more characters)
+ - djm@cvs.openbsd.org 2008/07/17 08:48:00
+ [sshconnect2.c]
+ strnvis preauth banner; pointed out by mpf@ ok markus@
+ - djm@cvs.openbsd.org 2008/07/17 08:51:07
+ [auth2-hostbased.c]
+ strip trailing '.' from hostname when HostbasedUsesNameFromPacketOnly=yes
+ report and patch from res AT qoxp.net (bz#1200); ok markus@
+ - (dtucker) [openbsd-compat/bsd-cygwin_util.c] Remove long-unneeded compat
+ code, replace with equivalent cygwin library call. Patch from vinschen
+ at redhat.com, ok djm@.
+ - (djm) [sshconnect2.c] vis.h isn't available everywhere
+
+20080716
- OpenBSD CVS Sync
- - jmc@cvs.openbsd.org 2003/05/20 12:03:35
+ - djm@cvs.openbsd.org 2008/07/15 02:23:14
[sftp.1]
- - new sentence, new line
- - added .Xr's
- - typos
- ok djm@
- - jmc@cvs.openbsd.org 2003/05/20 12:09:31
- [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
- new sentence, new line
- - djm@cvs.openbsd.org 2003/05/23 08:29:30
- [sshconnect.c]
- fix leak; ok markus@
+ number of pipelined requests is now 64;
+ prodded by Iain.Morgan AT nasa.gov
+ - djm@cvs.openbsd.org 2008/07/16 11:51:14
+ [clientloop.c]
+ rename variable first_gc -> last_gc (since it is actually the last
+ in the list).
+ - djm@cvs.openbsd.org 2008/07/16 11:52:19
+ [channels.c]
+ this loop index should be automatic, not static
-20030520
+20080714
- (djm) OpenBSD CVS Sync
- - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
- [log.c]
- use syslog_r() in a signal handler called place; markus ok
- - (djm) Configure logic to detect syslog_r and friends
-
-20030519
- - (djm) Sync auth-pam.h with what we actually implement
-
-20030518
- - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
- recent merge
+ - sthen@cvs.openbsd.org 2008/07/13 21:22:52
+ [ssh-keygen.c]
+ Change "ssh-keygen -F [host] -l" to not display random art unless
+ -v is also specified, making it consistent with the manual and other
+ uses of -l.
+ ok grunk@
+ - djm@cvs.openbsd.org 2008/07/13 22:13:07
+ [channels.c]
+ use struct sockaddr_storage instead of struct sockaddr for accept(2)
+ address argument. from visibilis AT yahoo.com in bz#1485; ok markus@
+ - djm@cvs.openbsd.org 2008/07/13 22:16:03
+ [sftp.c]
+ increase number of piplelined requests so they properly fill the
+ (recently increased) channel window. prompted by rapier AT psc.edu;
+ ok markus@
+ - djm@cvs.openbsd.org 2008/07/14 01:55:56
+ [sftp-server.8]
+ mention requirement for /dev/log inside chroot when using sftp-server
+ with ChrootDirectory
+ - (djm) [openbsd-compat/bindresvport.c] Rename variables s/sin/in/ to
+ avoid clash with sin(3) function; reported by
+ cristian.ionescu-idbohrn AT axis.com
+ - (djm) [openbsd-compat/rresvport.c] Add unistd.h for missing close()
+ prototype; reported by cristian.ionescu-idbohrn AT axis.com
+ - (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash;
+ reported by cristian.ionescu-idbohrn AT axis.com
+ - (djm) [contrib/cygwin/Makefile contrib/cygwin/ssh-host-config]
+ [contrib/cygwin/ssh-user-config contrib/cygwin/sshd-inetd]
+ Revamped and simplified Cygwin ssh-host-config script that uses
+ unified csih configuration tool. Requires recent Cygwin.
+ Patch from vinschen AT redhat.com
+
+20080712
+ - (djm) OpenBSD CVS Sync
+ - djm@cvs.openbsd.org 2008/07/12 04:52:50
+ [channels.c]
+ unbreak; move clearing of cctx struct to before first use
+ reported by dkrause@
+ - djm@cvs.openbsd.org 2008/07/12 05:33:41
+ [scp.1]
+ better description for -i flag:
+ s/RSA authentication/public key authentication/
+ - (djm) [openbsd-compat/fake-rfc2553.c openbsd-compat/fake-rfc2553.h]
+ return EAI_FAMILY when trying to lookup unsupported address family;
+ from vinschen AT redhat.com
+
+20080711
- (djm) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2003/05/16 03:27:12
- [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
- add AddressFamily option to ssh_config (like -4, -6 on commandline).
- Portable bug #534; ok markus@
- - itojun@cvs.openbsd.org 2003/05/17 03:25:58
- [auth-rhosts.c]
- just in case, put numbers to sscanf %s arg.
- - markus@cvs.openbsd.org 2003/05/17 04:27:52
- [cipher.c cipher-ctr.c myproposal.h]
- experimental support for aes-ctr modes from
- http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
+ - stevesk@cvs.openbsd.org 2008/07/07 00:31:41
+ [ttymodes.c]
+ we don't need arg after the debug3() was removed. from lint.
ok djm@
- - (djm) Remove IPv4 by default hack now that we can specify AF in config
- - (djm) Tidy and trim TODO
- - (djm) Sync openbsd-compat/ with OpenBSD CVS head
- - (djm) Big KNF on openbsd-compat/
- - (djm) KNF on md5crypt.[ch]
- - (djm) KNF on auth-sia.[ch]
-
-20030517
- - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
-
-20030516
+ - stevesk@cvs.openbsd.org 2008/07/07 23:32:51
+ [key.c]
+ /*NOTREACHED*/ for lint warning:
+ warning: function key_equal falls off bottom without returning value
+ ok djm@
+ - markus@cvs.openbsd.org 2008/07/10 18:05:58
+ [channels.c]
+ missing bzero; from mickey; ok djm@
+ - markus@cvs.openbsd.org 2008/07/10 18:08:11
+ [clientloop.c monitor.c monitor_wrap.c packet.c packet.h sshd.c]
+ sync v1 and v2 traffic accounting; add it to sshd, too;
+ ok djm@, dtucker@
+
+20080709
+ - (djm) [Makefile.in] Print "all tests passed" when all regress tests pass
+ - (djm) [auth1.c] Fix format string vulnerability in protocol 1 PAM
+ account check failure path. The vulnerable format buffer is supplied
+ from PAM and should not contain attacker-supplied data.
+ - (djm) [auth.c] Missing unistd.h for close()
+ - (djm) [configure.ac] Add -Wformat-security to CFLAGS for gcc 3.x and 4.x
+
+20080705
+ - (djm) [auth.c] Fixed test for locked account on HP/UX with shadowed
+ passwords disabled. bz#1083 report & patch from senthilkumar_sen AT
+ hotpop.com, w/ dtucker@
+ - (djm) [atomicio.c configure.ac] Disable poll() fallback in atomiciov for
+ Tru64. readv doesn't seem to be a comparable object there.
+ bz#1386, patch from dtucker@ ok me
+ - (djm) [Makefile.in] Pass though pass to conch for interop tests
+ - (djm) [configure.ac] unbreak: remove extra closing brace
- (djm) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2003/05/15 13:52:10
- [ssh.c]
- Make "ssh -V" print the OpenSSL version in a human readable form. Patch
- from Craig Leres (mindrot at ee.lbl.gov); ok markus@
- - jakob@cvs.openbsd.org 2003/05/15 14:02:47
- [readconf.c servconf.c]
- warn for unsupported config option. ok markus@
- - markus@cvs.openbsd.org 2003/05/15 14:09:21
- [auth2-krb5.c]
- fix 64bit issue; report itojun@
- - djm@cvs.openbsd.org 2003/05/15 14:55:25
- [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
- add a ConnectTimeout option to ssh, based on patch from
- Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
- - (djm) Add warning for UsePAM when built without PAM support
- - (djm) A few type mismatch fixes from Bug #565
- - (djm) Guard free_pam_environment against NULL argument. Works around
- HP/UX PAM problems debugged by dtucker
-
-20030515
+ - djm@cvs.openbsd.org 2008/07/04 23:08:25
+ [packet.c]
+ handle EINTR in packet_write_poll()l ok dtucker@
+ - djm@cvs.openbsd.org 2008/07/04 23:30:16
+ [auth1.c auth2.c]
+ Make protocol 1 MaxAuthTries logic match protocol 2's.
+ Do not treat the first protocol 2 authentication attempt as
+ a failure IFF it is for method "none".
+ Makes MaxAuthTries' user-visible behaviour identical for
+ protocol 1 vs 2.
+ ok dtucker@
+ - djm@cvs.openbsd.org 2008/07/05 05:16:01
+ [PROTOCOL]
+ grammar
+
+20080704
+ - (dtucker) OpenBSD CVS Sync
+ - djm@cvs.openbsd.org 2008/07/02 13:30:34
+ [auth2.c]
+ really really remove the freebie "none" auth try for protocol 2
+ - djm@cvs.openbsd.org 2008/07/02 13:47:39
+ [ssh.1 ssh.c]
+ When forking after authentication ("ssh -f") with ExitOnForwardFailure
+ enabled, delay the fork until after replies for any -R forwards have
+ been seen. Allows for robust detection of -R forward failure when
+ using -f (similar to bz#92); ok dtucker@
+ - otto@cvs.openbsd.org 2008/07/03 21:46:58
+ [auth2-pubkey.c]
+ avoid nasty double free; ok dtucker@ djm@
+ - djm@cvs.openbsd.org 2008/07/04 03:44:59
+ [servconf.c groupaccess.h groupaccess.c]
+ support negation of groups in "Match group" block (bz#1315); ok dtucker@
+ - dtucker@cvs.openbsd.org 2008/07/04 03:47:02
+ [monitor.c]
+ Make debug a little clearer. ok djm@
+ - djm@cvs.openbsd.org 2008/06/30 08:07:34
+ [regress/key-options.sh]
+ shell portability: use "=" instead of "==" in test(1) expressions,
+ double-quote string with backslash escaped /
+ - djm@cvs.openbsd.org 2008/06/30 10:31:11
+ [regress/{putty-transfer,putty-kex,putty-ciphers}.sh]
+ remove "set -e" left over from debugging
+ - djm@cvs.openbsd.org 2008/06/30 10:43:03
+ [regress/conch-ciphers.sh]
+ explicitly disable conch options that could interfere with the test
+ - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link
+ returns EXDEV. Patch from Mike Garrison, ok djm@
+ - (djm) [atomicio.c channels.c clientloop.c defines.h includes.h]
+ [packet.c scp.c serverloop.c sftp-client.c ssh-agent.c ssh-keyscan.c]
+ [sshd.c] Explicitly handle EWOULDBLOCK wherever we handle EAGAIN, on
+ some platforms (HP nonstop) it is a distinct errno;
+ bz#1467 reported by sconeu AT yahoo.com; ok dtucker@
+
+20080702
+ - (dtucker) OpenBSD CVS Sync
+ - djm@cvs.openbsd.org 2008/06/30 08:05:59
+ [PROTOCOL.agent]
+ typo: s/constraint_date/constraint_data/
+ - djm@cvs.openbsd.org 2008/06/30 12:15:39
+ [serverloop.c]
+ only pass channel requests on session channels through to the session
+ channel handler, avoiding spurious log messages; ok! markus@
+ - djm@cvs.openbsd.org 2008/06/30 12:16:02
+ [nchan.c]
+ only send eow@openssh.com notifications for session channels; ok! markus@
+ - djm@cvs.openbsd.org 2008/06/30 12:18:34
+ [PROTOCOL]
+ clarify that eow@openssh.com is only sent on session channels
+ - dtucker@cvs.openbsd.org 2008/07/01 07:20:52
+ [sshconnect.c]
+ Check ExitOnForwardFailure if forwardings are disabled due to a failed
+ host key check. ok djm@
+ - dtucker@cvs.openbsd.org 2008/07/01 07:24:22
+ [sshconnect.c sshd.c]
+ Send CR LF during protocol banner exchanges, but only for Protocol 2 only,
+ in order to comply with RFC 4253. bz #1443, ok djm@
+ - stevesk@cvs.openbsd.org 2008/07/01 23:12:47
+ [PROTOCOL.agent]
+ fix some typos; ok djm@
+ - djm@cvs.openbsd.org 2008/07/02 02:24:18
+ [sshd_config sshd_config.5 sshd.8 servconf.c]
+ increase default size of ssh protocol 1 ephemeral key from 768 to 1024
+ bits; prodded by & ok dtucker@ ok deraadt@
+ - dtucker@cvs.openbsd.org 2008/07/02 12:03:51
+ [auth-rsa.c auth.c auth2-pubkey.c auth.h]
+ Merge duplicate host key file checks, based in part on a patch from Rob
+ Holland via bz #1348 . Also checks for non-regular files during protocol
+ 1 RSA auth. ok djm@
+ - djm@cvs.openbsd.org 2008/07/02 12:36:39
+ [auth2-none.c auth2.c]
+ Make protocol 2 MaxAuthTries behaviour a little more sensible:
+ Check whether client has exceeded MaxAuthTries before running
+ an authentication method and skip it if they have, previously it
+ would always allow one try (for "none" auth).
+ Preincrement failure count before post-auth test - previously this
+ checked and postincremented, also to allow one "none" try.
+ Together, these two changes always count the "none" auth method
+ which could be skipped by a malicious client (e.g. an SSH worm)
+ to get an extra attempt at a real auth method. They also make
+ MaxAuthTries=0 a useful way to block users entirely (esp. in a
+ sshd_config Match block).
+ Also, move sending of any preauth banner from "none" auth method
+ to the first call to input_userauth_request(), so worms that skip
+ the "none" method get to see it too.
+
+20080630
- (djm) OpenBSD CVS Sync
- - jmc@cvs.openbsd.org 2003/05/14 13:11:56
- [ssh-agent.1]
- setup -> set up;
- from wiz@netbsd
- - jakob@cvs.openbsd.org 2003/05/14 18:16:20
- [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
- [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
- add experimental support for verifying hos keys using DNS as described
- in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
- ok markus@ and henning@
- - markus@cvs.openbsd.org 2003/05/14 22:24:42
- [clientloop.c session.c ssh.1]
- allow to send a BREAK to the remote system; ok various
- - markus@cvs.openbsd.org 2003/05/15 00:28:28
- [sshconnect2.c]
- cleanup unregister of per-method packet handlers; ok djm@
- - jakob@cvs.openbsd.org 2003/05/15 01:48:10
- [readconf.c readconf.h servconf.c servconf.h]
- always parse kerberos options. ok djm@ markus@
- - jakob@cvs.openbsd.org 2003/05/15 02:27:15
- [dns.c]
- add missing freerrset
- - markus@cvs.openbsd.org 2003/05/15 03:08:29
- [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
- split out custom EVP ciphers
- - djm@cvs.openbsd.org 2003/05/15 03:10:52
- [ssh-keygen.c]
- avoid warning; ok jakob@
- - mouring@cvs.openbsd.org 2003/05/15 03:39:07
- [sftp-int.c]
- Make put/get (globed and nonglobed) code more consistant. OK djm@
- - mouring@cvs.openbsd.org 2003/05/15 03:43:59
- [sftp-int.c sftp.c]
- Teach ls how to display multiple column display and allow users
- to return to single column format via 'ls -1'. OK @djm
- - jakob@cvs.openbsd.org 2003/05/15 04:08:44
- [readconf.c servconf.c]
- disable kerberos when not supported. ok markus@
- - markus@cvs.openbsd.org 2003/05/15 04:08:41
- [ssh.1]
- ~B is ssh2 only
- - (djm) Always parse UsePAM
- - (djm) Configure glue for DNS support (code doesn't work in portable yet)
- - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
- - (djm) Tidy Makefile clean targets
- - (djm) Adapt README.dns for portable
- - (djm) Avoid uuencode.c warnings
- - (djm) Enable UsePAM when built --with-pam
- - (djm) Only build getrrsetbyname replacement when using --with-dns
- - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
- correctly)
- - (djm) Bug #444: Wrong paths after reconfigure
- - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
+ - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
+ [regress/Makefile regress/key-options.sh]
+ Add regress test for key options. ok djm@
+ - dtucker@cvs.openbsd.org 2008/06/11 23:11:40
+ [regress/Makefile]
+ Don't run cipher-speed test by default; mistakenly enabled by me
+ - djm@cvs.openbsd.org 2008/06/28 13:57:25
+ [regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh]
+ very basic regress test against Twisted Conch in "make interop"
+ target (conch is available in ports/devel/py-twisted/conch);
+ ok markus@
+ - (djm) [regress/Makefile] search for conch by path, like we do putty
-20030514
- - (djm) Bug #117: Don't lie to PAM about username
- - (djm) RCSID sync w/ OpenBSD
+20080629
- (djm) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2003/04/09 12:00:37
- [readconf.c]
- strip trailing whitespace from config lines before parsing.
- Fixes bz 528; ok markus@
- - markus@cvs.openbsd.org 2003/04/12 10:13:57
- [cipher.c]
- hide cipher details; ok djm@
- - markus@cvs.openbsd.org 2003/04/12 10:15:36
- [misc.c]
- debug->debug2
- - naddy@cvs.openbsd.org 2003/04/12 11:40:15
+ - martynas@cvs.openbsd.org 2008/06/21 07:46:46
+ [sftp.c]
+ use optopt to get invalid flag, instead of return value of getopt,
+ which is always '?'; ok djm@
+ - otto@cvs.openbsd.org 2008/06/25 11:13:43
+ [key.c]
+ add key length to visual fingerprint; zap magical constants;
+ ok grunk@ djm@
+ - djm@cvs.openbsd.org 2008/06/26 06:10:09
+ [sftp-client.c sftp-server.c]
+ allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky
+ bits. Note that this only affects explicit setting of modes (e.g. via
+ sftp(1)'s chmod command) and not file transfers. (bz#1310)
+ ok deraadt@ at c2k8
+ - djm@cvs.openbsd.org 2008/06/26 09:19:40
+ [dh.c dh.h moduli.c]
+ when loading moduli from /etc/moduli in sshd(8), check that they
+ are of the expected "safe prime" structure and have had
+ appropriate primality tests performed;
+ feedback and ok dtucker@
+ - grunk@cvs.openbsd.org 2008/06/26 11:46:31
+ [readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c]
+ Move SSH Fingerprint Visualization away from sharing the config option
+ CheckHostIP to an own config option named VisualHostKey.
+ While there, fix the behaviour that ssh would draw a random art picture
+ on every newly seen host even when the option was not enabled.
+ prodded by deraadt@, discussions,
+ help and ok markus@ djm@ dtucker@
+ - jmc@cvs.openbsd.org 2008/06/26 21:11:46
+ [ssh.1]
+ add VisualHostKey to the list of options listed in -o;
+ - djm@cvs.openbsd.org 2008/06/28 07:25:07
+ [PROTOCOL]
+ spelling fixes
+ - djm@cvs.openbsd.org 2008/06/28 13:58:23
+ [ssh-agent.c]
+ refuse to add a key that has unknown constraints specified;
+ ok markus
+ - djm@cvs.openbsd.org 2008/06/28 14:05:15
+ [ssh-agent.c]
+ reset global compat flag after processing a protocol 2 signature
+ request with the legacy DSA encoding flag set; ok markus
+ - djm@cvs.openbsd.org 2008/06/28 14:08:30
+ [PROTOCOL PROTOCOL.agent]
+ document the protocol used by ssh-agent; "looks ok" markus@
+
+20080628
+ - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec]
+ RFC.nroff lacks a license, remove it (it is long gone in OpenBSD).
+
+20080626
+ - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD.
+ (bz#1372)
+ - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
+ [contrib/suse/openssh.spec] Include moduli.5 in RPM spec files.
+
+20080616
+ - (dtucker) OpenBSD CVS Sync
+ - dtucker@cvs.openbsd.org 2008/06/16 13:22:53
+ [session.c channels.c]
+ Rename the isatty argument to is_tty so we don't shadow
+ isatty(3). ok markus@
+ - (dtucker) [channels.c] isatty -> is_tty here too.
+
+20080615
+ - (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc.
+ - OpenBSD CVS Sync
+ - dtucker@cvs.openbsd.org 2008/06/14 15:49:48
+ [sshd.c]
+ wrap long line at 80 chars
+ - dtucker@cvs.openbsd.org 2008/06/14 17:07:11
+ [sshd.c]
+ ensure default umask disallows at least group and world write; ok djm@
+ - djm@cvs.openbsd.org 2008/06/14 18:33:43
+ [session.c]
+ suppress the warning message from chdir(homedir) failures
+ when chrooted (bz#1461); ok dtucker
+ - dtucker@cvs.openbsd.org 2008/06/14 19:42:10
+ [scp.1]
+ Mention that scp follows symlinks during -r. bz #1466,
+ from nectar at apple
+ - dtucker@cvs.openbsd.org 2008/06/15 16:55:38
+ [sshd_config.5]
+ MaxSessions is allowed in a Match block too
+ - dtucker@cvs.openbsd.org 2008/06/15 16:58:40
+ [servconf.c sshd_config.5]
+ Allow MaxAuthTries within a Match block. ok djm@
+ - djm@cvs.openbsd.org 2008/06/15 20:06:26
+ [channels.c channels.h session.c]
+ don't call isatty() on a pty master, instead pass a flag down to
+ channel_set_fds() indicating that te fds refer to a tty. Fixes a
+ hang on exit on Solaris (bz#1463) in portable but is actually
+ a generic bug; ok dtucker deraadt markus
+
+20080614
+ - (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction
+ replacement code; patch from ighighi AT gmail.com in bz#1240;
+ ok dtucker
+
+20080613
+ - (dtucker) OpenBSD CVS Sync
+ - deraadt@cvs.openbsd.org 2008/06/13 09:44:36
+ [packet.c]
+ compile on older gcc; no decl after code
+ - dtucker@cvs.openbsd.org 2008/06/13 13:56:59
+ [monitor.c]
+ Clear key options in the monitor on failed authentication, prevents
+ applying additional restrictions to non-pubkey authentications in
+ the case where pubkey fails but another method subsequently succeeds.
+ bz #1472, found by Colin Watson, ok markus@ djm@
+ - dtucker@cvs.openbsd.org 2008/06/13 14:18:51
+ [auth2-pubkey.c auth-rhosts.c]
+ Include unistd.h for close(), prevents warnings in -portable
+ - dtucker@cvs.openbsd.org 2008/06/13 17:21:20
+ [mux.c]
+ Friendlier error messages for mux fallback. ok djm@
+ - dtucker@cvs.openbsd.org 2008/06/13 18:55:22
+ [scp.c]
+ Prevent -Wsign-compare warnings on LP64 systems. bz #1192, ok deraadt@
+ - grunk@cvs.openbsd.org 2008/06/13 20:13:26
[ssh.1]
- document -V switch, fix wording; ok markus@
- - markus@cvs.openbsd.org 2003/04/14 14:17:50
- [channels.c sshconnect.c sshd.c ssh-keyscan.c]
- avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
- - mouring@cvs.openbsd.org 2003/04/14 21:31:27
- [sftp-int.c]
- Missing globfree(&g) in process_put() spotted by Vince Brimhall
- <VBrimhall@novell.com>. ok@ Theo
- - markus@cvs.openbsd.org 2003/04/16 14:35:27
- [auth.h]
- document struct Authctxt; with solar
- - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
- [ssh-keyscan.c]
- -t in usage(); rogier@quaak.org
- - mouring@cvs.openbsd.org 2003/04/30 01:16:20
- [sshd.8 sshd_config.5]
- Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
- Bug #550 and * escaping suggested by jmc@.
- - david@cvs.openbsd.org 2003/04/30 20:41:07
+ Explain the use of SSH fpr visualization using random art, and cite the
+ original scientific paper inspiring that technique.
+ Much help with English and nroff by jmc@, thanks.
+ - (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which
+ despite its name doesn't seem to implement all of GSSAPI. Patch from
+ Jan Engelhardt, sanity checked by Simon Wilkinson.
+
+20080612
+ - (dtucker) OpenBSD CVS Sync
+ - jmc@cvs.openbsd.org 2008/06/11 07:30:37
[sshd.8]
- fix invalid .Pf macro usage introduced in previous commit
- ok jmc@ mouring@
- - markus@cvs.openbsd.org 2003/05/11 16:56:48
- [authfile.c ssh-keygen.c]
- change key_load_public to try to read a public from:
- rsa1 private or rsa1 public and ssh2 keys.
- this makes ssh-keygen -e fail for ssh1 keys more gracefully
- for example; report from itojun (netbsd pr 20550).
- - markus@cvs.openbsd.org 2003/05/11 20:30:25
- [channels.c clientloop.c serverloop.c session.c ssh.c]
- make channel_new() strdup the 'remote_name' (not the caller); ok theo
- - markus@cvs.openbsd.org 2003/05/12 16:55:37
- [sshconnect2.c]
- for pubkey authentication try the user keys in the following order:
- 1. agent keys that are found in the config file
- 2. other agent keys
- 3. keys that are only listed in the config file
- this helps when an agent has many keys, where the server might
- close the connection before the correct key is used. report & ok pb@
- - markus@cvs.openbsd.org 2003/05/12 18:35:18
- [ssh-keyscan.1]
- typo: DSA keys are of type ssh-dss; Brian Poole
- - markus@cvs.openbsd.org 2003/05/14 00:52:59
- [ssh2.h]
- ranges for per auth method messages
- - djm@cvs.openbsd.org 2003/05/14 01:00:44
- [sftp.1]
- emphasise the batchmode functionality and make reference to pubkey auth,
- both of which are FAQs; ok markus@
- - markus@cvs.openbsd.org 2003/05/14 02:15:47
- [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
- implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
- server interops with commercial client; ok jakob@ djm@
- - jmc@cvs.openbsd.org 2003/05/14 08:25:39
- [sftp.1]
- - better formatting in SYNOPSIS
- - whitespace at EOL
+ kill trailing whitespace;
+ - grunk@cvs.openbsd.org 2008/06/11 21:01:35
+ [ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
+ sshconnect.c]
+ Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
+ graphical hash visualization schemes known as "random art", and by
+ Dan Kaminsky's musings on the subject during a BlackOp talk at the
+ 23C3 in Berlin.
+ Scientific publication (original paper):
+ "Hash Visualization: a New Technique to improve Real-World Security",
+ Perrig A. and Song D., 1999, International Workshop on Cryptographic
+ Techniques and E-Commerce (CrypTEC '99)
+ http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
+ The algorithm used here is a worm crawling over a discrete plane,
+ leaving a trace (augmenting the field) everywhere it goes.
+ Movement is taken from dgst_raw 2bit-wise. Bumping into walls
+ makes the respective movement vector be ignored for this turn,
+ thus switching to the other color of the chessboard.
+ Graphs are not unambiguous for now, because circles in graphs can be
+ walked in either direction.
+ discussions with several people,
+ help, corrections and ok markus@ djm@
+ - grunk@cvs.openbsd.org 2008/06/11 21:38:25
+ [ssh-keygen.c]
+ ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub
+ would not display you the random art as intended, spotted by canacar@
+ - grunk@cvs.openbsd.org 2008/06/11 22:20:46
+ [ssh-keygen.c ssh-keygen.1]
+ ssh-keygen would write fingerprints to STDOUT, and random art to STDERR,
+ that is not how it was envisioned.
+ Also correct manpage saying that -v is needed along with -l for it to work.
+ spotted by naddy@
+ - otto@cvs.openbsd.org 2008/06/11 23:02:22
+ [key.c]
+ simpler way of computing the augmentations; ok grunk@
+ - grunk@cvs.openbsd.org 2008/06/11 23:03:56
+ [ssh_config.5]
+ CheckHostIP set to ``fingerprint'' will display both hex and random art
+ spotted by naddy@
+ - grunk@cvs.openbsd.org 2008/06/11 23:51:57
+ [key.c]
+ #define statements that are not atoms need braces around them, else they
+ will cause trouble in some cases.
+ Also do a computation of -1 once, and not in a loop several times.
+ spotted by otto@
+ - dtucker@cvs.openbsd.org 2008/06/12 00:03:49
+ [dns.c canohost.c sshconnect.c]
+ Do not pass "0" strings as ports to getaddrinfo because the lookups
+ can slow things down and we never use the service info anyway. bz
+ #859, patch from YOSHIFUJI Hideaki and John Devitofranceschi. ok
+ deraadt@ djm@
+ djm belives that the reason for the "0" strings is to ensure that
+ it's not possible to call getaddrinfo with both host and port being
+ NULL. In the case of canohost.c host is a local array. In the
+ case of sshconnect.c, it's checked for null immediately before use.
+ In dns.c it ultimately comes from ssh.c:main() and is guaranteed to
+ be non-null but it's not obvious, so I added a warning message in
+ case it is ever passed a null.
+ - grunk@cvs.openbsd.org 2008/06/12 00:13:55
+ [sshconnect.c]
+ Make ssh print the random art also when ssh'ing to a host using IP only.
+ spotted by naddy@, ok and help djm@ dtucker@
+ - otto@cvs.openbsd.org 2008/06/12 00:13:13
+ [key.c]
+ use an odd number of rows and columns and a separate start marker, looks
+ better; ok grunk@
+ - djm@cvs.openbsd.org 2008/06/12 03:40:52
+ [clientloop.h mux.c channels.c clientloop.c channels.h]
+ Enable ~ escapes for multiplex slave sessions; give each channel
+ its own escape state and hook the escape filters up to muxed
+ channels. bz #1331
+ Mux slaves do not currently support the ~^Z and ~& escapes.
+ NB. this change cranks the mux protocol version, so a new ssh
+ mux client will not be able to connect to a running old ssh
+ mux master.
+ ok dtucker@
+ - djm@cvs.openbsd.org 2008/06/12 04:06:00
+ [clientloop.h ssh.c clientloop.c]
+ maintain an ordered queue of outstanding global requests that we
+ expect replies to, similar to the per-channel confirmation queue.
+ Use this queue to verify success or failure for remote forward
+ establishment in a race free way.
+ ok dtucker@
+ - djm@cvs.openbsd.org 2008/06/12 04:17:47
+ [clientloop.c]
+ thall shalt not code past the eightieth column
+ - djm@cvs.openbsd.org 2008/06/12 04:24:06
+ [ssh.c]
+ thal shalt not code past the eightieth column
+ - djm@cvs.openbsd.org 2008/06/12 05:15:41
+ [PROTOCOL]
+ document tun@openssh.com forwarding method
+ - djm@cvs.openbsd.org 2008/06/12 05:32:30
+ [mux.c]
+ some more TODO for me
+ - grunk@cvs.openbsd.org 2008/06/12 05:42:46
+ [key.c]
+ supply the key type (rsa1, rsa, dsa) as a caption in the frame of the
+ random art. while there, stress the fact that the field base should at
+ least be 8 characters for the pictures to make sense.
+ comment and ok djm@
+ - grunk@cvs.openbsd.org 2008/06/12 06:32:59
+ [key.c]
+ We already mark the start of the worm, now also mark the end of the worm
+ in our random art drawings.
ok djm@
- - markus@cvs.openbsd.org 2003/05/14 08:57:49
- [monitor.c]
- http://bugzilla.mindrot.org/show_bug.cgi?id=560
- Privsep child continues to run after monitor killed.
- Pass monitor signals through to child; Darren Tucker
- - (djm) Make portable build with MIT krb5 (some issues remain)
- - (djm) Add new UsePAM configuration directive to allow runtime control
- over usage of PAM. This allows non-root use of sshd when built with
- --with-pam
- - (djm) Die screaming if start_pam() is called when UsePAM=no
- - (djm) Avoid KrbV leak for MIT Kerberos
- - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
- - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
-
-20030512
- - (djm) Redhat spec: Don't install profile.d scripts when not
- building with GNOME/GTK askpass (patch from bet@rahul.net)
-
-20030510
- - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
- "make install". Patch by roth@feep.net.
- - (dtucker) Bug #536: Test for and work around openpty/controlling tty
- problem on Linux (fixes "could not set controlling tty" errors).
- - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
- proper challenge-response module
- - (djm) 2-clause license on loginrec.c, with permission from
- andre@ae-35.com
-
-20030504
- - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
- Patch from vinschen@redhat.com.
-
-20030503
- - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
- by wendyp@cray.com.
-
-20030502
- - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
- privsep should now work.
- - (dtucker) Move handling of bad password authentications into a platform
- specific record_failed_login() function (affects AIX & Unicos). ok mouring@
-
-20030429
- - (djm) Add back radix.o (used by AFS support), after it went missing from
- Makefile many moons ago
- - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
- - (djm) Fix blibpath specification for AIX/gcc
- - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
-
-20030428
- - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
- hacked code.
-
-20030427
- - (bal) Bug #541: return; was dropped by mistake. Reported by
- furrier@iglou.com
- - (bal) Since we don't support platforms lacking u_int_64. We may
- as well clean out some of those evil #ifdefs
- - (bal) auth1.c minor resync while looking at the code.
- - (bal) auth2.c same changed as above.
-
-20030409
- - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
- from matth@eecs.berkeley.edu
- - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
+ - djm@cvs.openbsd.org 2008/06/12 15:19:17
+ [clientloop.h channels.h clientloop.c channels.c mux.c]
+ The multiplexing escape char handler commit last night introduced a
+ small memory leak per session; plug it.
+ - dtucker@cvs.openbsd.org 2008/06/12 16:35:31
+ [ssh_config.5 ssh.c]
+ keyword expansion for localcommand. ok djm@
+ - jmc@cvs.openbsd.org 2008/06/12 19:10:09
+ [ssh_config.5 ssh-keygen.1]
+ tweak the ascii art text; ok grunk
+ - dtucker@cvs.openbsd.org 2008/06/12 20:38:28
+ [sshd.c sshconnect.c packet.h misc.c misc.h packet.c]
+ Make keepalive timeouts apply while waiting for a packet, particularly
+ during key renegotiation (bz #1363). With djm and Matt Day, ok djm@
+ - djm@cvs.openbsd.org 2008/06/12 20:47:04
+ [sftp-client.c]
+ print extension revisions for extensions that we understand
+ - djm@cvs.openbsd.org 2008/06/12 21:06:25
+ [clientloop.c]
+ I was coalescing expected global request confirmation replies at
+ the wrong end of the queue - fix; prompted by markus@
+ - grunk@cvs.openbsd.org 2008/06/12 21:14:46
+ [ssh-keygen.c]
+ make ssh-keygen -lf show the key type just as ssh-add -l would do it
+ ok djm@ markus@
+ - grunk@cvs.openbsd.org 2008/06/12 22:03:36
+ [key.c]
+ add my copyright, ok djm@
+ - ian@cvs.openbsd.org 2008/06/12 23:24:58
+ [sshconnect.c]
+ tweak wording in message, ok deraadt@ jmc@
+ - dtucker@cvs.openbsd.org 2008/06/13 00:12:02
+ [sftp.h log.h]
+ replace __dead with __attribute__((noreturn)), makes things
+ a little easier to port. Also, add it to sigdie(). ok djm@
+ - djm@cvs.openbsd.org 2008/06/13 00:16:49
+ [mux.c]
+ fall back to creating a new TCP connection on most multiplexing errors
+ (socket connect fail, invalid version, refused permittion, corrupted
+ messages, etc.); bz #1329 ok dtucker@
+ - dtucker@cvs.openbsd.org 2008/06/13 00:47:53
+ [mux.c]
+ upcast size_t to u_long to match format arg; ok djm@
+ - dtucker@cvs.openbsd.org 2008/06/13 00:51:47
+ [mac.c]
+ upcast another size_t to u_long to match format
+ - dtucker@cvs.openbsd.org 2008/06/13 01:38:23
+ [misc.c]
+ upcast uid to long with matching %ld, prevents warnings in portable
+ - djm@cvs.openbsd.org 2008/06/13 04:40:22
+ [auth2-pubkey.c auth-rhosts.c]
+ refuse to read ~/.shosts or ~/.ssh/authorized_keys that are not
+ regular files; report from Solar Designer via Colin Watson in bz#1471
+ ok dtucker@ deraadt
+ - (dtucker) [clientloop.c serverloop.c] channel_register_filter now
+ takes 2 more args. with djm@
+ - (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch
+ from Todd Vierling.
+ - (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA
+ systems. Patch from R. Scott Bailey.
+ - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used
+ on big endian machines, so ifdef them for little-endian only to prevent
+ unused function warnings on big-endians.
+ - (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent
+ compiler warnings on some platforms. Based on a discussion with otto@
+
+20080611
+ - (djm) [channels.c configure.ac]
+ Do not set SO_REUSEADDR on wildcard X11 listeners (X11UseLocalhost=no)
+ bz#1464; ok dtucker
+
+20080610
+ - (dtucker) OpenBSD CVS Sync
+ - djm@cvs.openbsd.org 2008/06/10 03:57:27
+ [servconf.c match.h sshd_config.5]
+ support CIDR address matching in sshd_config "Match address" blocks, with
+ full support for negation and fall-back to classic wildcard matching.
+ For example:
+ Match address 192.0.2.0/24,3ffe:ffff::/32,!10.*
+ PasswordAuthentication yes
+ addrmatch.c code mostly lifted from flowd's addr.c
+ feedback and ok dtucker@
+ - djm@cvs.openbsd.org 2008/06/10 04:17:46
+ [sshd_config.5]
+ better reference for pattern-list
+ - dtucker@cvs.openbsd.org 2008/06/10 04:50:25
+ [sshd.c channels.h channels.c log.c servconf.c log.h servconf.h sshd.8]
+ Add extended test mode (-T) and connection parameters for test mode (-C).
+ -T causes sshd to write its effective configuration to stdout and exit.
+ -C causes any relevant Match rules to be applied before output. The
+ combination allows tesing of the parser and config files. ok deraadt djm
+ - jmc@cvs.openbsd.org 2008/06/10 07:12:00
+ [sshd_config.5]
+ tweak previous;
+ - jmc@cvs.openbsd.org 2008/06/10 08:17:40
+ [sshd.8 sshd.c]
+ - update usage()
+ - fix SYNOPSIS, and sort options
+ - some minor additional fixes
+ - dtucker@cvs.openbsd.org 2008/06/09 18:06:32
+ [regress/test-exec.sh]
+ Don't generate putty keys if we're not going to use them. ok djm
+ - dtucker@cvs.openbsd.org 2008/06/10 05:23:32
+ [regress/addrmatch.sh regress/Makefile]
+ Regress test for Match CIDR rules. ok djm@
+ - dtucker@cvs.openbsd.org 2008/06/10 15:21:41
+ [test-exec.sh]
+ Use a more portable construct for checking if we're running a putty test
+ - dtucker@cvs.openbsd.org 2008/06/10 15:28:49
+ [test-exec.sh]
+ Add quotes
+ - dtucker@cvs.openbsd.org 2008/06/10 18:21:24
+ [ssh_config.5]
+ clarify that Host patterns are space-separated. ok deraadt
+ - djm@cvs.openbsd.org 2008/06/10 22:15:23
+ [PROTOCOL ssh.c serverloop.c]
+ Add a no-more-sessions@openssh.com global request extension that the
+ client sends when it knows that it will never request another session
+ (i.e. when session multiplexing is disabled). This allows a server to
+ disallow further session requests and terminate the session.
+ Why would a non-multiplexing client ever issue additional session
+ requests? It could have been attacked with something like SSH'jack:
+ http://www.storm.net.nz/projects/7
+ feedback & ok markus
+ - djm@cvs.openbsd.org 2008/06/10 23:06:19
+ [auth-options.c match.c servconf.c addrmatch.c sshd.8]
+ support CIDR address matching in .ssh/authorized_keys from="..." stanzas
+ ok and extensive testing dtucker@
+ - dtucker@cvs.openbsd.org 2008/06/10 23:21:34
+ [bufaux.c]
+ Use '\0' for a nul byte rather than unadorned 0. ok djm@
+ - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
+ [Makefile regress/key-options.sh]
+ Add regress test for key options. ok djm@
+ - (dtucker) [openbsd-compat/fake-rfc2553.h] Add sin6_scope_id to sockaddr_in6
+ since the new CIDR code in addmatch.c references it.
+ - (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6
+ specific tests on platforms that don't do IPv6.
+ - (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well
+ as environment.
+ - (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now.
+
+20080609
+ - (dtucker) OpenBSD CVS Sync
+ - dtucker@cvs.openbsd.org 2008/06/08 17:04:41
+ [sftp-server.c]
+ Add case for ENOSYS in errno_to_portable; ok deraadt
+ - dtucker@cvs.openbsd.org 2008/06/08 20:15:29
+ [sftp.c sftp-client.c sftp-client.h]
+ Have the sftp client store the statvfs replies in wire format,
+ which prevents problems when the server's native sizes exceed the
+ client's.
+ Also extends the sizes of the remaining 32bit wire format to 64bit,
+ they're specified as unsigned long in the standard.
+ - dtucker@cvs.openbsd.org 2008/06/09 13:02:39
+ [sftp-server.c]
+ Extend 32bit -> 64bit values for statvfs extension missed in previous
+ commit.
+ - dtucker@cvs.openbsd.org 2008/06/09 13:38:46
+ [PROTOCOL]
+ Use a $OpenBSD tag so our scripts will sync changes.
+
+20080608
+ - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c
+ openbsd-compat/Makefile.in openbsd-compat/openbsd-compat.h
+ openbsd-compat/bsd-statvfs.{c,h}] Add a null implementation of statvfs and
+ fstatvfs and remove #defines around statvfs code. ok djm@
+ - (dtucker) [configure.ac defines.h sftp-client.c M sftp-server.c] Add a
+ macro to convert fsid to unsigned long for platforms where fsid is a
+ 2-member array.
+
+20080607
+ - (dtucker) [mux.c] Include paths.h inside ifdef HAVE_PATHS_H.
+ - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c]
+ Do not enable statvfs extensions on platforms that do not have statvfs.
+ - (dtucker) OpenBSD CVS Sync
+ - djm@cvs.openbsd.org 2008/05/19 06:14:02
+ [packet.c] unbreak protocol keepalive timeouts bz#1465; ok dtucker@
+ - djm@cvs.openbsd.org 2008/05/19 15:45:07
+ [sshtty.c ttymodes.c sshpty.h]
+ Fix sending tty modes when stdin is not a tty (bz#1199). Previously
+ we would send the modes corresponding to a zeroed struct termios,
+ whereas we should have been sending an empty list of modes.
+ Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
+ - djm@cvs.openbsd.org 2008/05/19 15:46:31
+ [ssh-keygen.c]
+ support -l (print fingerprint) in combination with -F (find host) to
+ search for a host in ~/.ssh/known_hosts and display its fingerprint;
+ ok markus@
+ - djm@cvs.openbsd.org 2008/05/19 20:53:52
+ [clientloop.c]
+ unbreak tree by committing this bit that I missed from:
+ Fix sending tty modes when stdin is not a tty (bz#1199). Previously
+ we would send the modes corresponding to a zeroed struct termios,
+ whereas we should have been sending an empty list of modes.
+ Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
+
+20080604
+ - (djm) [openbsd-compat/bsd-arc4random.c] Fix math bug that caused bias
+ in arc4random_uniform with upper_bound in (2^30,2*31). Note that
+ OpenSSH did not make requests with upper bounds in this range.
+
+20080519
+ - (djm) [configure.ac mux.c sftp.c openbsd-compat/Makefile.in]
+ [openbsd-compat/fmt_scaled.c openbsd-compat/openbsd-compat.h]
+ Fix compilation on Linux, including pulling in fmt_scaled(3)
+ implementation from OpenBSD's libutil.
+
+20080518
- (djm) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/04/02 09:48:07
- [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
- [readconf.h serverloop.c sshconnect2.c]
- reapply rekeying chage, tested by henning@, ok djm@
- - markus@cvs.openbsd.org 2003/04/02 14:36:26
- [ssh-keysign.c]
- potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
- - itojun@cvs.openbsd.org 2003/04/03 07:25:27
- [progressmeter.c]
- $OpenBSD$
- - itojun@cvs.openbsd.org 2003/04/03 10:17:35
- [progressmeter.c]
- remove $OpenBSD$, as other *.c does not have it.
- - markus@cvs.openbsd.org 2003/04/07 08:29:57
- [monitor_wrap.c]
- typo: get correct counters; introduced during rekeying change.
- - millert@cvs.openbsd.org 2003/04/07 21:58:05
- [progressmeter.c]
- The UCB copyright here is incorrect. This code did not originate
- at UCB, it was written by Luke Mewburn. Updated the copyright at
- the author's request. markus@ OK
- - itojun@cvs.openbsd.org 2003/04/08 20:21:29
- [*.c *.h]
- rename log() into logit() to avoid name conflict. markus ok, from
- netbsd
- - (djm) XXX - Performed locally using:
- "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
- - hin@cvs.openbsd.org 2003/04/09 08:23:52
- [servconf.c]
- Don't include <krb.h> when compiling with Kerberos 5 support
- - (djm) Fix up missing include for packet.c
- - (djm) Fix missed log => logit occurance (reference by function pointer)
-
-20030402
- - (bal) if IP_TOS is not found or broken don't try to compile in
- packet_set_tos() function call. bug #527
-
-20030401
+ - djm@cvs.openbsd.org 2008/04/04 05:14:38
+ [sshd_config.5]
+ ChrootDirectory is supported in Match blocks (in fact, it is most useful
+ there). Spotted by Minstrel AT minstrel.org.uk
+ - djm@cvs.openbsd.org 2008/04/04 06:44:26
+ [sshd_config.5]
+ oops, some unrelated stuff crept into that commit - backout.
+ spotted by jmc@
+ - djm@cvs.openbsd.org 2008/04/05 02:46:02
+ [sshd_config.5]
+ HostbasedAuthentication is supported under Match too
+ - (djm) [openbsd-compat/bsd-arc4random.c openbsd-compat/openbsd-compat.c]
+ [configure.ac] Implement arc4random_buf(), import implementation of
+ arc4random_uniform() from OpenBSD
+ - (djm) [openbsd-compat/bsd-arc4random.c] Warning fixes
+ - (djm) [openbsd-compat/port-tun.c] needs sys/queue.h
- (djm) OpenBSD CVS Sync
- - jmc@cvs.openbsd.org 2003/03/28 10:11:43
- [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
- [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
- - killed whitespace
- - new sentence new line
- - .Bk for arguments
+ - djm@cvs.openbsd.org 2008/04/13 00:22:17
+ [dh.c sshd.c]
+ Use arc4random_buf() when requesting more than a single word of output
+ Use arc4random_uniform() when the desired random number upper bound
+ is not a power of two
+ ok deraadt@ millert@
+ - djm@cvs.openbsd.org 2008/04/18 12:32:11
+ [sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c sftp.h]
+ introduce sftp extension methods statvfs@openssh.com and
+ fstatvfs@openssh.com that implement statvfs(2)-like operations,
+ based on a patch from miklos AT szeredi.hu (bz#1399)
+ also add a "df" command to the sftp client that uses the
+ statvfs@openssh.com to produce a df(1)-like display of filesystem
+ space and inode utilisation
ok markus@
- - markus@cvs.openbsd.org 2003/04/01 10:10:23
- [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
- [readconf.h serverloop.c sshconnect2.c]
- rekeying bugfixes and automatic rekeying:
- * both client and server rekey _automatically_
- (a) after 2^31 packets, because after 2^32 packets
- the sequence number for packets wraps
- (b) after 2^(blocksize_in_bits/4) blocks
- (see: draft-ietf-secsh-newmodes-00.txt)
- (a) and (b) are _enabled_ by default, and only disabled for known
- openssh versions, that don't support rekeying properly.
- * client option 'RekeyLimit'
- * do not reply to requests during rekeying
- - markus@cvs.openbsd.org 2003/04/01 10:22:21
- [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
- [readconf.h serverloop.c sshconnect2.c]
- backout rekeying changes (for 3.6.1)
- - markus@cvs.openbsd.org 2003/04/01 10:31:26
- [compat.c compat.h kex.c]
- bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
- tested by ho@ and myself
- - markus@cvs.openbsd.org 2003/04/01 10:56:46
- [version.h]
- 3.6.1
- - (djm) Crank spec file versions
- - (djm) Release 3.6.1p1
-
-20030326
- - (djm) OpenBSD CVS Sync
- - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
+ - jmc@cvs.openbsd.org 2008/04/18 17:15:47
+ [sftp.1]
+ macro fixage;
+ - djm@cvs.openbsd.org 2008/04/18 22:01:33
+ [session.c]
+ remove unneccessary parentheses
+ - otto@cvs.openbsd.org 2008/04/29 11:20:31
+ [monitor_mm.h]
+ garbage collect two unused fields in struct mm_master; ok markus@
+ - djm@cvs.openbsd.org 2008/04/30 10:14:03
+ [ssh-keyscan.1 ssh-keyscan.c]
+ default to rsa (protocol 2) keys, instead of rsa1 keys; spotted by
+ larsnooden AT openoffice.org
+ - pyr@cvs.openbsd.org 2008/05/07 05:49:37
+ [servconf.c servconf.h session.c sshd_config.5]
+ Enable the AllowAgentForwarding option in sshd_config (global and match
+ context), to specify if agents should be permitted on the server.
+ As the man page states:
+ ``Note that disabling Agent forwarding does not improve security
+ unless users are also denied shell access, as they can always install
+ their own forwarders.''
+ ok djm@, ok and a mild frown markus@
+ - pyr@cvs.openbsd.org 2008/05/07 06:43:35
+ [sshd_config]
+ push the sshd_config bits in, spotted by ajacoutot@
+ - jmc@cvs.openbsd.org 2008/05/07 08:00:14
+ [sshd_config.5]
+ sort;
+ - markus@cvs.openbsd.org 2008/05/08 06:59:01
+ [bufaux.c buffer.h channels.c packet.c packet.h]
+ avoid extra malloc/copy/free when receiving data over the net;
+ ~10% speedup for localhost-scp; ok djm@
+ - djm@cvs.openbsd.org 2008/05/08 12:02:23
+ [auth-options.c auth1.c channels.c channels.h clientloop.c gss-serv.c]
+ [monitor.c monitor_wrap.c nchan.c servconf.c serverloop.c session.c]
+ [ssh.c sshd.c]
+ Implement a channel success/failure status confirmation callback
+ mechanism. Each channel maintains a queue of callbacks, which will
+ be drained in order (RFC4253 guarantees confirm messages are not
+ reordered within an channel).
+ Also includes a abandonment callback to clean up if a channel is
+ closed without sending confirmation messages. This probably
+ shouldn't happen in compliant implementations, but it could be
+ abused to leak memory.
+ ok markus@ (as part of a larger diff)
+ - djm@cvs.openbsd.org 2008/05/08 12:21:16
+ [monitor.c monitor_wrap.c session.h servconf.c servconf.h session.c]
+ [sshd_config sshd_config.5]
+ Make the maximum number of sessions run-time controllable via
+ a sshd_config MaxSessions knob. This is useful for disabling
+ login/shell/subsystem access while leaving port-forwarding working
+ (MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or
+ simply increasing the number of allows multiplexed sessions.
+ Because some bozos are sure to configure MaxSessions in excess of the
+ number of available file descriptors in sshd (which, at peak, might be
+ as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds
+ on error paths, and make it fail gracefully on out-of-fd conditions -
+ sending channel errors instead of than exiting with fatal().
+ bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com
+ ok markus@
+ - djm@cvs.openbsd.org 2008/05/08 13:06:11
+ [clientloop.c clientloop.h ssh.c]
+ Use new channel status confirmation callback system to properly deal
+ with "important" channel requests that fail, in particular command exec,
+ shell and subsystem requests. Previously we would optimistically assume
+ that the requests would always succeed, which could cause hangs if they
+ did not (e.g. when the server runs out of fds) or were unimplemented by
+ the server (bz #1384)
+ Also, properly report failing multiplex channel requests via the mux
+ client stderr (subject to LogLevel in the mux master) - better than
+ silently failing.
+ most bits ok markus@ (as part of a larger diff)
+ - djm@cvs.openbsd.org 2008/05/09 04:55:56
+ [channels.c channels.h clientloop.c serverloop.c]
+ Try additional addresses when connecting to a port forward destination
+ whose DNS name resolves to more than one address. The previous behaviour
+ was to try the first address and give up.
+ Reported by stig AT venaas.com in bz#343
+ great feedback and ok markus@
+ - djm@cvs.openbsd.org 2008/05/09 14:18:44
+ [clientloop.c clientloop.h ssh.c mux.c]
+ tidy up session multiplexing code, moving it into its own file and
+ making the function names more consistent - making ssh.c and
+ clientloop.c a fair bit more readable.
+ ok markus@
+ - djm@cvs.openbsd.org 2008/05/09 14:26:08
+ [ssh.c]
+ dingo stole my diff hunk
+ - markus@cvs.openbsd.org 2008/05/09 16:16:06
+ [session.c]
+ re-add the USE_PIPES code and enable it.
+ without pipes shutdown-read from the sshd does not trigger
+ a SIGPIPE when the forked program does a write.
+ ok djm@
+ (Id sync only, USE_PIPES never left portable OpenSSH)
+ - markus@cvs.openbsd.org 2008/05/09 16:17:51
+ [channels.c]
+ error-fd race: don't enable the error fd in the select bitmask
+ for channels with both in- and output closed, since the channel
+ will go away before we call select();
+ report, lots of debugging help and ok djm@
+ - markus@cvs.openbsd.org 2008/05/09 16:21:13
+ [channels.h clientloop.c nchan.c serverloop.c]
+ unbreak
+ ssh -2 localhost od /bin/ls | true
+ ignoring SIGPIPE by adding a new channel message (EOW) that signals
+ the peer that we're not interested in any data it might send.
+ fixes bz #85; discussion, debugging and ok djm@
+ - pvalchev@cvs.openbsd.org 2008/05/12 20:52:20
+ [umac.c]
+ Ensure nh_result lies on a 64-bit boundary (fixes warnings observed
+ on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@
+ - djm@cvs.openbsd.org 2008/05/15 23:52:24
+ [nchan2.ms]
+ document eow message in ssh protocol 2 channel state machine;
+ feedback and ok markus@
+ - djm@cvs.openbsd.org 2008/05/18 21:29:05
[sftp-server.c]
- one last fix to the tree: race fix broke stuff; pr 3169;
- srp@srparish.net, help from djm
-
-20030325
- - (djm) Fix getpeerid support for 64 bit BE systems. From
- Arnd Bergmann <arndb@de.ibm.com>
-
-20030324
- - (djm) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/03/23 19:02:00
- [monitor.c]
- unbreak rekeying for privsep; ok millert@
- - Release 3.6p1
- - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
- Report from murple@murple.net, diagnosis from dtucker@zip.com.au
-
-$Id$
+ comment extension announcement
+ - djm@cvs.openbsd.org 2008/05/16 08:30:42
+ [PROTOCOL]
+ document our protocol extensions and deviations; ok markus@
+ - djm@cvs.openbsd.org 2008/05/17 01:31:56
+ [PROTOCOL]
+ grammar and correctness fixes from stevesk@
+
+20080403
+ - (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile-
+ time warnings on LynxOS. Patch from ops AT iki.fi
+ - (djm) Force string arguments to replacement setproctitle() though
+ strnvis first. Ok dtucker@
+
+20080403
+ - (djm) OpenBSD CVS sync:
+ - markus@cvs.openbsd.org 2008/04/02 15:36:51
+ [channels.c]
+ avoid possible hijacking of x11-forwarded connections (back out 1.183)
+ CVE-2008-1483; ok djm@
+ - jmc@cvs.openbsd.org 2008/03/27 22:37:57
+ [sshd.8]
+ remove trailing whitespace;
+ - djm@cvs.openbsd.org 2008/04/03 09:50:14
+ [version.h]
+ openssh-5.0
+ - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
+ [contrib/suse/openssh.spec] Crank version numbers in RPM spec files
+ - (djm) [README] Update link to release notes
+ - (djm) Release 5.0p1