-20040817
- - (dtucker) [regress/README.regress] Note compatibility issues with GNU head.
+20090223
- (djm) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2004/08/16 08:17:01
+ - djm@cvs.openbsd.org 2009/02/22 23:50:57
+ [ssh_config.5 sshd_config.5]
+ don't advertise experimental options
+ - djm@cvs.openbsd.org 2009/02/22 23:59:25
+ [sshd_config.5]
+ missing period
+ - djm@cvs.openbsd.org 2009/02/23 00:06:15
[version.h]
- 3.9
- - (djm) Crank RPM spec version numbers
- - (djm) Release 3.9p1
-
-20040816
- - (dtucker) [acconfig.h auth-pam.c configure.ac] Set real uid to non-root
- to convince Solaris PAM to honour password complexity rules. ok djm@
-
-20040815
- - (dtucker) [Makefile.in ssh-keysign.c ssh.c] Use permanently_set_uid() since
- it does the right thing on all platforms. ok djm@
- - (djm) [acconfig.h configure.ac openbsd-compat/Makefile.in
- openbsd-compat/bsd-closefrom.c openbsd-compat/bsd-misc.c
- openbsd-compat/bsd-misc.h openbsd-compat/openbsd-compat.h] Use smarter
- closefrom() replacement from sudo; ok dtucker@
- - (djm) [loginrec.c] Check that seek succeeded here too; ok dtucker
- - (dtucker) [Makefile.in] Fix typo.
-
-20040814
- - (dtucker) [auth-krb5.c gss-serv-krb5.c openbsd-compat/xmmap.c]
- Explicitly set umask for mkstemp; ok djm@
- - (dtucker) [includes.h] Undef _INCLUDE__STDC__ on HP-UX, otherwise
- prot.h and shadow.h provide conflicting declarations of getspnam. ok djm@
- - (dtucker) [loginrec.c openbsd-compat/port-aix.c openbsd-compat/port-aix.h]
- Plug AIX login recording into login_write so logins will be recorded for
- all auth types.
-
-20040813
- - (dtucker) [openbsd-compat/bsd-misc.c] Typo in #ifdef; from vinschen at
- redhat.com
-- (dtucker) OpenBSD CVS Sync
- - avsm@cvs.openbsd.org 2004/08/11 21:43:05
- [channels.c channels.h clientloop.c misc.c misc.h serverloop.c ssh-agent.c]
- some signed/unsigned int comparison cleanups; markus@ ok
- - avsm@cvs.openbsd.org 2004/08/11 21:44:32
- [authfd.c scp.c ssh-keyscan.c]
- use atomicio instead of homegrown equivalents or read/write.
- markus@ ok
- - djm@cvs.openbsd.org 2004/08/12 09:18:24
- [sshlogin.c]
- typo in error message, spotted by moritz AT jodeit.org (Id sync only)
- - jakob@cvs.openbsd.org 2004/08/12 21:41:13
- [ssh-keygen.1 ssh.1]
- improve SSHFP documentation; ok deraadt@
- - jmc@cvs.openbsd.org 2004/08/13 00:01:43
- [ssh-keygen.1]
- kill whitespace at eol;
- - djm@cvs.openbsd.org 2004/08/13 02:51:48
- [monitor_fdpass.c]
- extra check for no message case; ok markus, deraadt, hshoexer, henning
- - dtucker@cvs.openbsd.org 2004/08/13 11:09:24
- [servconf.c]
- Fix line numbers off-by-one in error messages, from tortay at cc.in2p3.fr
- ok markus@, djm@
-
-20040812
- - (dtucker) [sshd.c] Remove duplicate variable imported during sync.
- - (dtucker) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2004/07/28 08:56:22
- [sshd.c]
- call setsid() _before_ re-exec
- - markus@cvs.openbsd.org 2004/07/28 09:40:29
- [auth.c auth1.c auth2.c cipher.c cipher.h key.c session.c ssh.c
- sshconnect1.c]
- more s/illegal/invalid/
- - djm@cvs.openbsd.org 2004/08/04 10:37:52
- [dh.c]
- return group14 when no primes found - fixes hang on empty /etc/moduli;
- ok markus@
- - dtucker@cvs.openbsd.org 2004/08/11 11:09:54
- [servconf.c]
- Fix minor leak; "looks right" deraadt@
- - dtucker@cvs.openbsd.org 2004/08/11 11:50:09
- [sshd.c]
- Don't try to close startup_pipe if it's not open; ok djm@
- - djm@cvs.openbsd.org 2004/08/11 11:59:22
- [sshlogin.c]
- check that lseek went were we told it to; ok markus@
- (Id sync only, but similar changes are needed in loginrec.c)
- - djm@cvs.openbsd.org 2004/08/11 12:01:16
- [sshlogin.c]
- make store_lastlog_message() static to appease -Wall; ok markus
- - (dtucker) [sshd.c] Clear loginmsg in postauth monitor, prevents doubling
- messages generated before the postauth privsep split.
+ openssh-5.2
+ - (djm) [README] update for 5.2
+ - (djm) Release openssh-5.2p1
-20040720
+20090222
- (djm) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2004/07/21 08:56:12
- [auth.c]
- s/Illegal user/Invalid user/; many requests; ok djm, millert, niklas,
- miod, ...
- - djm@cvs.openbsd.org 2004/07/21 10:33:31
- [auth1.c auth2.c]
- bz#899: Don't display invalid usernames in setproctitle
- from peak AT argo.troja.mff.cuni.cz; ok markus@
- - djm@cvs.openbsd.org 2004/07/21 10:36:23
- [gss-serv-krb5.c]
- fix function declaration
- - djm@cvs.openbsd.org 2004/07/21 11:51:29
- [canohost.c]
- bz#902: cache remote port so we don't fatal() in auth_log when remote
- connection goes away quickly. from peak AT argo.troja.mff.cuni.cz;
- ok markus@
- - (djm) [auth-pam.c] Portable parts of bz#899: Don't display invalid
- usernames in setproctitle from peak AT argo.troja.mff.cuni.cz;
-
-20040720
- - (djm) [log.c] bz #111: Escape more control characters when sending data
- to syslog; from peak AT argo.troja.mff.cuni.cz
- - (djm) [contrib/redhat/sshd.pam] bz #903: Remove redundant entries; from
- peak AT argo.troja.mff.cuni.cz
- - (djm) [regress/README.regress] Remove caveat regarding TCP wrappers, now
- that sshd is fixed to behave better; suggested by tim
+ - tobias@cvs.openbsd.org 2009/02/21 19:32:04
+ [misc.c sftp-server-main.c ssh-keygen.c]
+ Added missing newlines in error messages.
+ ok dtucker
-20040719
- - (djm) [openbsd-compat/bsd-arc4random.c] Discard early keystream, like OpenBSD
- ok dtucker@
- - (djm) [auth-pam.c] Avoid use of xstrdup and friends in conversation function,
- instead return PAM_CONV_ERR, avoiding another path to fatal(); ok dtucker@
- - (tim) [configure.ac] updwtmpx() on OpenServer seems to add duplicate entry.
- Report by rac AT tenzing.org
-
-20040717
- - (dtucker) [logintest.c scp.c sftp-server.c sftp.c ssh-add.c ssh-agent.c
- ssh-keygen.c ssh-keyscan.c ssh-keysign.c ssh-rand-helper.c ssh.c sshd.c
- openbsd-compat/bsd-misc.c] Move "char *__progname" to bsd-misc.c. Reduces
- diff vs OpenBSD; ok mouring@, tested by tim@ too.
- - (dtucker) OpenBSD CVS Sync
- - deraadt@cvs.openbsd.org 2004/07/11 17:48:47
- [channels.c cipher.c clientloop.c clientloop.h compat.h moduli.c
- readconf.c nchan.c pathnames.h progressmeter.c readconf.h servconf.c
- session.c sftp-client.c sftp.c ssh-agent.1 ssh-keygen.c ssh.c ssh1.h
- sshd.c ttymodes.h]
- spaces
- - brad@cvs.openbsd.org 2004/07/12 23:34:25
- [ssh-keyscan.1]
- Fix incorrect macro, .I -> .Em
- From: Eric S. Raymond <esr at thyrsus dot com>
- ok jmc@
- - dtucker@cvs.openbsd.org 2004/07/17 05:31:41
- [monitor.c monitor_wrap.c session.c session.h sshd.c sshlogin.c]
- Move "Last logged in at.." message generation to the monitor, right
- before recording the new login. Fixes missing lastlog message when
- /var/log/lastlog is not world-readable and incorrect datestamp when
- multiple sessions are used (bz #463); much assistance & ok markus@
-
-20040711
- - (dtucker) [auth-pam.c] Check for zero from waitpid() too, which allows
- the monitor to properly clean up the PAM thread (Debian bug #252676).
-
-20040709
- - (tim) [contrib/cygwin/README] add minires-devel requirement. Patch from
- vinschen AT redhat.com
-
-20040708
- - (dtucker) OpenBSD CVS Sync
- - dtucker@cvs.openbsd.org 2004/07/03 05:11:33
- [sshlogin.c] (RCSID sync only, the corresponding code is not in Portable)
- Use '\0' not 0 for string; ok djm@, deraadt@
- - dtucker@cvs.openbsd.org 2004/07/03 11:02:25
- [monitor_wrap.c]
- Put s/key functions inside #ifdef SKEY same as monitor.c,
- from des@freebsd via bz #330, ok markus@
- - dtucker@cvs.openbsd.org 2004/07/08 12:47:21
- [scp.c]
- Prevent scp from skipping the file following a double-error.
- bz #863, ok markus@
-
-20040702
- - (dtucker) [mdoc2man.awk] Teach it to ignore .Bk -words, reported by
- strube at physik3.gwdg.de a long time ago.
-
-20040701
- - (dtucker) [session.c] Call display_loginmsg again after do_pam_session.
- Ensures messages from PAM modules are displayed when privsep=no.
- - (dtucker) [auth-pam.c] Bug #705: Make arguments match PAM specs, fixes
- warnings on compliant platforms. From paul.a.bolton at bt.com. ok djm@
- - (dtucker) [auth-pam.c] Bug #559 (last piece): Pass DISALLOW_NULL_AUTHTOK
- to pam_authenticate for challenge-response auth too. Originally from
- fcusack at fcusack.com, ok djm@
- - (tim) [buildpkg.sh.in] Add $REV to bump the package revision within
- the same version. Handle the case where someone uses --with-privsep-user=
- and the user name does not match the group name. ok dtucker@
-
-20040630
- - (dtucker) [auth-pam.c] Check for buggy PAM modules that return a NULL
- appdata_ptr to the conversation function. ok djm@
+20090221
- (djm) OpenBSD CVS Sync
- - jmc@cvs.openbsd.org 2004/06/26 09:03:21
- [ssh.1]
- - remove double word
- - rearrange .Bk to keep SYNOPSIS nice
- - -M before -m in options description
- - jmc@cvs.openbsd.org 2004/06/26 09:11:14
- [ssh_config.5]
- punctuation and grammar fixes. also, keep the options in order.
- - jmc@cvs.openbsd.org 2004/06/26 09:14:40
- [sshd_config.5]
- new sentence, new line;
- - avsm@cvs.openbsd.org 2004/06/26 20:07:16
- [sshd.c]
- initialise some fd variables to -1, djm@ ok
- - djm@cvs.openbsd.org 2004/06/30 08:36:59
- [session.c]
- unbreak TTY break, diagnosed by darren AT dazwin.com; ok markus@
-
-20040627
- - (tim) update README files.
- - (dtucker) [mdoc2man.awk] Bug #883: correctly recognise .Pa and .Ev macros.
- - (dtucker) [regress/README.regress] Document new variables.
- - (dtucker) [acconfig.h configure.ac sftp-server.c] Bug #823: add sftp
- rename handling for Linux which returns EPERM for link() on (at least some)
- filesystems that do not support hard links. sftp-server will fall back to
- stat+rename() in such cases.
- - (dtucker) [openbsd-compat/port-aix.c] Missing __func__.
-
-20040626
- - (djm) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2004/06/25 18:43:36
- [sshd.c]
- fix broken fd handling in the re-exec fallback path, particularly when
- /dev/crypto is in use; ok deraadt@ markus@
- - djm@cvs.openbsd.org 2004/06/25 23:21:38
- [sftp.c]
- bz #875: fix bad escape char error message; reported by f_mohr AT yahoo.de
-
-20040625
- - (dtucker) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2004/06/24 19:30:54
- [servconf.c servconf.h sshd.c]
- re-exec sshd on accept(); initial work, final debugging and ok markus@
- - djm@cvs.openbsd.org 2004/06/25 01:16:09
- [sshd.c]
- only perform tcp wrappers checks when the incoming connection is on a
- socket. silences useless warnings from regress tests that use
- proxycommand="sshd -i". prompted by david@ ok markus@
- - djm@cvs.openbsd.org 2004/06/24 19:32:00
- [regress/Makefile regress/test-exec.sh, added regress/reexec.sh]
- regress test for re-exec corner cases
- - djm@cvs.openbsd.org 2004/06/25 01:25:12
- [regress/test-exec.sh]
- clean reexec-specific junk out of text-exec.sh and simplify; idea markus@
- - dtucker@cvs.openbsd.org 2004/06/25 05:38:48
- [sftp-server.c]
- Fall back to stat+rename if filesystem doesn't doesn't support hard
- links. bz#823, ok djm@
- - (dtucker) [configure.ac openbsd-compat/misc.c [openbsd-compat/misc.h]
- Add closefrom() for platforms that don't have it.
- - (dtucker) [sshd.c] add line missing from reexec sync.
-
-20040623
- - (dtucker) [auth1.c] Ensure do_pam_account is called for Protocol 1
- connections with empty passwords. Patch from davidwu at nbttech.com,
- ok djm@
- - (dtucker) OpenBSD CVS Sync
- - dtucker@cvs.openbsd.org 2004/06/22 22:42:02
- [regress/envpass.sh]
- Add quoting for test -z; ok markus@
- - dtucker@cvs.openbsd.org 2004/06/22 22:45:52
- [regress/test-exec.sh]
- Add TEST_SSH_SSHD_CONFOPTS and TEST_SSH_SSH_CONFOPTS to allow adding
- arbitary options to sshd_config and ssh_config during tests. ok markus@
- - dtucker@cvs.openbsd.org 2004/06/22 22:55:56
- [regress/dynamic-forward.sh regress/test-exec.sh]
- Allow setting of port for regress from TEST_SSH_PORT variable; ok markus@
- - mouring@cvs.openbsd.org 2004/06/23 00:39:38
- [rijndael.c]
- -Wshadow fix up s/encrypt/do_encrypt/. OK djm@, markus@
- - dtucker@cvs.openbsd.org 2004/06/23 14:31:01
- [ssh.c]
- Fix counting in master/slave when passing environment variables; ok djm@
- - (dtucker) [cipher.c] encrypt->do_encrypt inside SSH_OLD_EVP to match
- -Wshadow change.
- - (bal) [Makefile.in] Remove opensshd.init on 'make distclean'
- - (dtucker) [auth.c openbsd-compat/port-aix.c openbsd-compat/port-aix.h]
- Move loginrestrictions test to port-aix.c, replace with a generic hook.
- - (tim) [regress/try-ciphers.sh] "if ! some_command" is not portable.
- - (bal) [contrib/README] Removed "mdoc2man.pl" reference and added
- reference to "findssl.sh"
-
-20040622
- - (dtucker) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2004/06/20 17:36:59
- [ssh.c]
- filter passed env vars at slave in connection sharing case; ok markus@
- - djm@cvs.openbsd.org 2004/06/20 18:53:39
- [sftp.c]
- make "ls -l" listings print user/group names, add "ls -n" to show uid/gid
- (like /bin/ls); idea & ok markus@
- - djm@cvs.openbsd.org 2004/06/20 19:28:12
- [sftp.1]
- mention new -n flag
- - avsm@cvs.openbsd.org 2004/06/21 17:36:31
- [auth-rsa.c auth2-gss.c auth2-pubkey.c authfile.c canohost.c channels.c
- cipher.c dns.c kex.c monitor.c monitor_fdpass.c monitor_wrap.c
- monitor_wrap.h nchan.c packet.c progressmeter.c scp.c sftp-server.c sftp.c
- ssh-gss.h ssh-keygen.c ssh.c sshconnect.c sshconnect1.c sshlogin.c
- sshpty.c]
- make ssh -Wshadow clean, no functional changes
- markus@ ok
- - djm@cvs.openbsd.org 2004/06/21 17:53:03
- [session.c]
- fix fd leak for multiple subsystem connections; with markus@
- - djm@cvs.openbsd.org 2004/06/21 22:02:58
- [log.h]
- mark fatal and cleanup exit as __dead; ok markus@
- - djm@cvs.openbsd.org 2004/06/21 22:04:50
- [sftp.c]
- introduce sorting for ls, same options as /bin/ls; ok markus@
- - djm@cvs.openbsd.org 2004/06/21 22:30:45
- [sftp.c]
- prefix ls option flags with LS_
- - djm@cvs.openbsd.org 2004/06/21 22:41:31
- [sftp.1]
- document sort options
- - djm@cvs.openbsd.org 2004/06/22 01:16:39
- [sftp.c]
- don't show .files by default in ls, add -a option to turn them back on;
- ok markus
- - markus@cvs.openbsd.org 2004/06/22 03:12:13
- [regress/envpass.sh regress/multiplex.sh]
- more portable env passing tests
- - dtucker@cvs.openbsd.org 2004/06/22 05:05:45
- [monitor.c monitor_wrap.c]
- Change login->username, will prevent -Wshadow errors in Portable;
- ok markus@
- - (dtucker) [monitor.c] Fix Portable-specific -Wshadow warnings on "socket".
- - (dtucker) [defines.h] Define __dead if not already defined.
- - (bal) [auth-passwd.c auth1.c] Clean up unused variables.
-
-20040620
- - (tim) [configure.ac Makefile.in] Only change TEST_SHELL on broken platforms.
-
-20040619
- - (dtucker) [auth-pam.c] Don't use PAM namespace for
- pam_password_change_required either.
- - (tim) [configure.ac buildpkg.sh.in contrib/solaris/README] move opensshd
- init script to top level directory. Add opensshd.init.in.
- Remove contrib/solaris/buildpkg.sh, contrib/solaris/opensshd.in
-
-20040618
+ - djm@cvs.openbsd.org 2009/02/17 01:28:32
+ [ssh_config]
+ sync with revised default ciphers; pointed out by dkrause@
+ - djm@cvs.openbsd.org 2009/02/18 04:31:21
+ [schnorr.c]
+ signature should hash over the entire group, not just the generator
+ (this is still disabled code)
+ - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
+ [contrib/suse/openssh.spec] Prepare for 5.2p1
+
+20090216
+ - (djm) [regress/conch-ciphers.sh regress/putty-ciphers.sh]
+ [regress/putty-kex.sh regress/putty-transfer.sh] Downgrade disabled
+ interop tests from FATAL error to a warning. Allows some interop
+ tests to proceed if others are missing necessary prerequisites.
+ - (djm) [configure.ac] support GNU/kFreeBSD and GNU/kOpensolaris
+ systems; patch from Aurelien Jarno via rmh AT aybabtu.com
+
+20090214
- (djm) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2004/06/17 14:52:48
- [clientloop.c clientloop.h ssh.c]
- support environment passing over shared connections; ok markus@
- - djm@cvs.openbsd.org 2004/06/17 15:10:14
- [clientloop.c misc.h readconf.c readpass.c ssh.c ssh_config.5]
- Add option for confirmation (ControlMaster=ask) via ssh-askpass before
- opening shared connections; ok markus@
- - djm@cvs.openbsd.org 2004/06/17 14:53:27
- [regress/multiplex.sh]
- shared connection env passing regress test
- - (dtucker) [regress/README.regress] Add detail on how to run a single
- test from the top-level Makefile.
- - (dtucker) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2004/06/17 23:56:57
- [ssh.1 ssh.c]
- sync usage() and SYNPOSIS with connection sharing changes
- - dtucker@cvs.openbsd.org 2004/06/18 06:13:25
+ - dtucker@cvs.openbsd.org 2009/02/02 11:15:14
[sftp.c]
- Use execvp instead of execv so sftp -S ssh works. "makes sense" markus@
- - dtucker@cvs.openbsd.org 2004/06/18 06:15:51
- [multiplex.sh]
- Use -S for scp/sftp to force the use of the ssh being tested.
- ok djm@,markus@
+ Initialize a few variables to prevent spurious "may be used
+ uninitialized" warnings from newer gcc's. ok djm@
+ - djm@cvs.openbsd.org 2009/02/12 03:00:56
+ [canohost.c canohost.h channels.c channels.h clientloop.c readconf.c]
+ [readconf.h serverloop.c ssh.c]
+ support remote port forwarding with a zero listen port (-R0:...) to
+ dyamically allocate a listen port at runtime (this is actually
+ specified in rfc4254); bz#1003 ok markus@
+ - djm@cvs.openbsd.org 2009/02/12 03:16:01
+ [serverloop.c]
+ tighten check for -R0:... forwarding: only allow dynamic allocation
+ if want_reply is set in the packet
+ - djm@cvs.openbsd.org 2009/02/12 03:26:22
+ [monitor.c]
+ some paranoia: check that the serialised key is really KEY_RSA before
+ diddling its internals
+ - djm@cvs.openbsd.org 2009/02/12 03:42:09
+ [ssh.1]
+ document -R0:... usage
+ - djm@cvs.openbsd.org 2009/02/12 03:44:25
+ [ssh.1]
+ consistency: Dq => Ql
+ - djm@cvs.openbsd.org 2009/02/12 03:46:17
+ [ssh_config.5]
+ document RemoteForward usage with 0 listen port
+ - jmc@cvs.openbsd.org 2009/02/12 07:34:20
+ [ssh_config.5]
+ kill trailing whitespace;
+ - markus@cvs.openbsd.org 2009/02/13 11:50:21
+ [packet.c]
+ check for enc !=NULL in packet_start_discard
+ - djm@cvs.openbsd.org 2009/02/14 06:35:49
+ [PROTOCOL]
+ mention that eow and no-more-sessions extensions are sent only to
+ OpenSSH peers
+
+20090212
+ - (djm) [sshpty.c] bz#1419: OSX uses cloning ptys that automagically
+ set ownership and modes, so avoid explicitly setting them
+ - (djm) [configure.ac loginrec.c] bz#1421: fix lastlog support for OSX.
+ OSX provides a getlastlogxbyname function that automates the reading of
+ a lastlog file. Also, the pututxline function will update lastlog so
+ there is no need for loginrec.c to do it explicitly. Collapse some
+ overly verbose code while I'm in there.
+
+20090201
+ - (dtucker) [defines.h sshconnect.c] INET6_ADDRSTRLEN is now needed in
+ channels.c too, so move the definition for non-IP6 platforms to defines.h
+ where it can be shared.
+
+20090129
+ - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
+ If the CYGWIN environment variable is empty, the installer script
+ should not install the service with an empty CYGWIN variable, but
+ rather without setting CYGWNI entirely.
+ - (tim) [contrib/cygwin/ssh-host-config] Whitespace cleanup. No code changes.
+
+20090128
+ - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
+ Changes to work on Cygwin 1.5.x as well as on the new Cygwin 1.7.x.
+ The information given for the setting of the CYGWIN environment variable
+ is wrong for both releases so I just removed it, together with the
+ unnecessary (Cygwin 1.5.x) or wrong (Cygwin 1.7.x) default setting.
+
+20081228
- (djm) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2004/06/18 10:40:19
- [ssh.c]
- delay signal handler setup until we have finished talking to the master.
- allow interrupting of setup (e.g. if master is stuck); ok markus@
- - markus@cvs.openbsd.org 2004/06/18 10:55:43
- [ssh.1 ssh.c]
- trim synopsis for -S, allow -S and -oControlMaster, -MM means 'ask';
+ - stevesk@cvs.openbsd.org 2008/12/09 03:20:42
+ [channels.c servconf.c]
+ channel_print_adm_permitted_opens() should deal with all the printing
+ for that config option. suggested by markus@; ok markus@ djm@
+ dtucker@
+ - djm@cvs.openbsd.org 2008/12/09 04:32:22
+ [auth2-chall.c]
+ replace by-hand string building with xasprinf(); ok deraadt@
+ - sobrado@cvs.openbsd.org 2008/12/09 15:35:00
+ [sftp.1 sftp.c]
+ update for the synopses displayed by the 'help' command, there are a
+ few missing flags; add 'bye' to the output of 'help'; sorting and spacing.
+ jmc@ suggested replacing .Oo/.Oc with a single .Op macro.
+ ok jmc@
+ - stevesk@cvs.openbsd.org 2008/12/09 22:37:33
+ [clientloop.c]
+ fix typo in error message
+ - stevesk@cvs.openbsd.org 2008/12/10 03:55:20
+ [addrmatch.c]
+ o cannot be NULL here but use xfree() to be consistent; ok djm@
+ - stevesk@cvs.openbsd.org 2008/12/29 01:12:36
+ [ssh-keyscan.1]
+ fix example, default key type is rsa for 3+ years; from
+ frederic.perrin@resel.fr
+ - stevesk@cvs.openbsd.org 2008/12/29 02:23:26
+ [pathnames.h]
+ no need to escape single quotes in comments
+ - okan@cvs.openbsd.org 2008/12/30 00:46:56
+ [sshd_config.5]
+ add AllowAgentForwarding to available Match keywords list
ok djm
- - djm@cvs.openbsd.org 2004/06/18 11:11:54
- [channels.c clientloop.c]
- Don't explode in clientloop when we receive a bogus channel id, but
- also don't generate them to begin with; ok markus@
-
-20040617
- - (dtucker) [regress/scp.sh] diff -N is not portable (but needed for some
- platforms), so test if diff understands it. Pointed out by tim@, ok djm@
- - (dtucker) OpenBSD CVS Sync regress/
- - dtucker@cvs.openbsd.org 2004/06/17 05:51:59
- [regress/multiplex.sh]
- Remove datafile between and after tests, kill sshd rather than wait;
- ok djm@
- - dtucker@cvs.openbsd.org 2004/06/17 06:00:05
- [regress/multiplex.sh]
- Use DATA and COPY for test data rather than hard-coded paths; ok djm@
- - dtucker@cvs.openbsd.org 2004/06/17 06:19:06
- [regress/multiplex.sh]
- Add small description of failing test to failure message; ok djm@
- - (dtucker) [regress/multiplex.sh] add EXEEXT for those platforms that need
- it.
- - (dtucker) [regress/multiplex.sh] Increase sleep time to 120 sec (60 is not
- enough for slow systems, especially if they don't have a kernel RNG).
-
-20040616
- - (dtucker) [openbsd-compat/port-aix.c] Expand whitespace -> tabs. No
- code changes.
- - (dtucker) OpenBSD CVS Sync regress/
- - djm@cvs.openbsd.org 2004/04/27 09:47:30
- [regress/Makefile regress/test-exec.sh, added regress/envpass.sh]
- regress test for environment passing, SendEnv & AcceptEnv options;
+ - djm@cvs.openbsd.org 2009/01/01 21:14:35
+ [channels.c]
+ call channel destroy callbacks on receipt of open failure messages.
+ fixes client hangs when connecting to a server that has MaxSessions=0
+ set spotted by imorgan AT nas.nasa.gov; ok markus@
+ - djm@cvs.openbsd.org 2009/01/01 21:17:36
+ [kexgexs.c]
+ fix hash calculation for KEXGEX: hash over the original client-supplied
+ values and not the sanity checked versions that we acutally use;
+ bz#1540 reported by john.smith AT arrows.demon.co.uk
ok markus@
- - dtucker@cvs.openbsd.org 2004/06/13 13:51:02
- [regress/Makefile regress/test-exec.sh, added regress/scp-ssh-wrapper.sh
- regress/scp.sh]
- Add scp regression test; with & ok markus@
- - djm@cvs.openbsd.org 2004/06/13 15:04:08
- [regress/Makefile regress/test-exec.sh, added regress/envpass.sh]
- regress test for client multiplexing; ok markus@
- - djm@cvs.openbsd.org 2004/06/13 15:16:54
- [regress/test-exec.sh]
- remove duplicate setting of $SCP; spotted by markus@
- - dtucker@cvs.openbsd.org 2004/06/16 13:15:09
- [regress/scp.sh]
- Make scp -r tests use diff -rN not cmp (which won't do dirs. ok markus@
- - dtucker@cvs.openbsd.org 2004/06/16 13:16:40
- [regress/multiplex.sh]
- Silence multiplex sftp and scp tests. ok markus@
- - (dtucker) [regress/test-exec.sh]
- Move Portable-only StrictModes to top of list to make syncs easier.
- - (dtucker) [regress/README.regress]
- Add $TEST_SHELL to readme.
-
-20040615
+ - djm@cvs.openbsd.org 2009/01/14 01:38:06
+ [channels.c]
+ support SOCKS4A protocol, from dwmw2 AT infradead.org via bz#1482;
+ "looks ok" markus@
+ - stevesk@cvs.openbsd.org 2009/01/15 17:38:43
+ [readconf.c]
+ 1) use obsolete instead of alias for consistency
+ 2) oUserKnownHostsFile not obsolete but oGlobalKnownHostsFile2 is
+ so move the comment.
+ 3) reorder so like options are together
+ ok djm@
+ - djm@cvs.openbsd.org 2009/01/22 09:46:01
+ [channels.c channels.h session.c]
+ make Channel->path an allocated string, saving a few bytes here and
+ there and fixing bz#1380 in the process; ok markus@
+ - djm@cvs.openbsd.org 2009/01/22 09:49:57
+ [channels.c]
+ oops! I committed the wrong version of the Channel->path diff,
+ it was missing some tweaks suggested by stevesk@
+ - djm@cvs.openbsd.org 2009/01/22 10:02:34
+ [clientloop.c misc.c readconf.c readconf.h servconf.c servconf.h]
+ [serverloop.c ssh-keyscan.c ssh.c sshd.c]
+ make a2port() return -1 when it encounters an invalid port number
+ rather than 0, which it will now treat as valid (needed for future work)
+ adjust current consumers of a2port() to check its return value is <= 0,
+ which in turn required some things to be converted from u_short => int
+ make use of int vs. u_short consistent in some other places too
+ feedback & ok markus@
+ - djm@cvs.openbsd.org 2009/01/22 10:09:16
+ [auth-options.c]
+ another chunk of a2port() diff that got away. wtfdjm??
+ - djm@cvs.openbsd.org 2009/01/23 07:58:11
+ [myproposal.h]
+ prefer CTR modes and revised arcfour (i.e w/ discard) modes to CBC
+ modes; ok markus@
+ - naddy@cvs.openbsd.org 2009/01/24 17:10:22
+ [ssh_config.5 sshd_config.5]
+ sync list of preferred ciphers; ok djm@
+ - markus@cvs.openbsd.org 2009/01/26 09:58:15
+ [cipher.c cipher.h packet.c]
+ Work around the CPNI-957037 Plaintext Recovery Attack by always
+ reading 256K of data on packet size or HMAC errors (in CBC mode only).
+ Help, feedback and ok djm@
+ Feedback from Martin Albrecht and Paterson Kenny
+
+20090107
+ - (djm) [uidswap.c] bz#1412: Support >16 supplemental groups in OS X.
+ Patch based on one from vgiffin AT apple.com; ok dtucker@
+ - (djm) [channels.c] bz#1419: support "on demand" X11 forwarding via
+ launchd on OS X; patch from vgiffin AT apple.com, slightly tweaked;
+ ok dtucker@
+ - (djm) [contrib/ssh-copy-id.1 contrib/ssh-copy-id] bz#1492: Make
+ ssh-copy-id copy id_rsa.pub by default (instead of the legacy "identity"
+ key). Patch from cjwatson AT debian.org
+
+20090107
+ - (tim) [configure.ac defines.h openbsd-compat/port-uw.c
+ openbsd-compat/xcrypt.c] Add SECUREWARE support to OpenServer 6 SVR5 ABI.
+ OK djm@ dtucker@
+ - (tim) [configure.ac] Move check_for_libcrypt_later=1 in *-*-sysv5*) section.
+ OpenServer 6 doesn't need libcrypt.
+
+20081209
- (djm) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2004/05/26 08:59:57
+ - djm@cvs.openbsd.org 2008/12/09 02:38:18
+ [clientloop.c]
+ The ~C escape handler does not work correctly for multiplexed sessions -
+ it opens a commandline on the master session, instead of on the slave
+ that requested it. Disable it on slave sessions until such time as it
+ is fixed; bz#1543 report from Adrian Bridgett via Colin Watson
+ ok markus@
+ - djm@cvs.openbsd.org 2008/12/09 02:39:59
[sftp.c]
- exit -> _exit in forked child on error; from andrushock AT korovino.net
- - markus@cvs.openbsd.org 2004/05/26 23:02:39
- [channels.c]
- missing freeaddrinfo; Andrey Matveev
- - dtucker@cvs.openbsd.org 2004/05/27 00:50:13
+ Deal correctly with failures in remote stat() operation in sftp,
+ correcting fail-on-error behaviour in batchmode. bz#1541 report and
+ fix from anedvedicky AT gmail.com; ok markus@
+ - djm@cvs.openbsd.org 2008/12/09 02:58:16
[readconf.c]
- Kill dead code after fatal(); ok djm@
- - dtucker@cvs.openbsd.org 2004/06/01 14:20:45
- [auth2-chall.c]
- Remove redundant #include; ok markus@
- - pedro@cvs.openbsd.org 2004/06/03 12:22:20
- [sftp-client.c sftp.c]
- initialize pointers, ok markus@
- - djm@cvs.openbsd.org 2004/06/13 12:53:24
- [dh.c dh.h kex.c kex.h kexdhc.c kexdhs.c monitor.c myproposal.h]
- [ssh-keyscan.c sshconnect2.c sshd.c]
- implement diffie-hellman-group14-sha1 kex method (trivial extension to
- existing diffie-hellman-group1-sha1); ok markus@
- - dtucker@cvs.openbsd.org 2004/06/13 14:01:42
- [ssh.1 ssh_config.5 sshd_config.5]
- List supported ciphers in man pages, tidy up ssh -c;
- "looks fine" jmc@, ok markus@
- - djm@cvs.openbsd.org 2004/06/13 15:03:02
- [channels.c channels.h clientloop.c clientloop.h includes.h readconf.c]
- [readconf.h scp.1 sftp.1 ssh.1 ssh.c ssh_config.5]
- implement session multiplexing in the client (the server has supported
- this since 2.0); ok markus@
- - djm@cvs.openbsd.org 2004/06/14 01:44:39
- [channels.c clientloop.c misc.c misc.h packet.c ssh-agent.c ssh-keyscan.c]
- [sshd.c]
- set_nonblock() instead of fnctl(...,O_NONBLOCK); "looks sane" deraadt@
- - djm@cvs.openbsd.org 2004/06/15 05:45:04
+ don't leave junk (free'd) pointers around in Forward *fwd argument on
+ failure; avoids double-free in ~C -L handler when given an invalid
+ forwarding specification; bz#1539 report from adejong AT debian.org
+ via Colin Watson; ok markus@ dtucker@
+ - djm@cvs.openbsd.org 2008/12/09 03:02:37
+ [sftp.1 sftp.c]
+ correct sftp(1) and corresponding usage syntax;
+ bz#1518 patch from imorgan AT nas.nasa.gov; ok deraadt@ improved diff jmc@
+
+20081208
+ - (djm) [configure.ac] bz#1538: better test for ProPolice/SSP: actually
+ use some stack in main().
+ Report and suggested fix from vapier AT gentoo.org
+ - (djm) OpenBSD CVS Sync
+ - markus@cvs.openbsd.org 2008/12/02 19:01:07
[clientloop.c]
- missed one unset_nonblock; spotted by Tim Rice
- - (djm) Fix Makefile.in for connection sharing changes
- - (djm) [ssh.c] Use separate var for address length
-
-20040603
- - (dtucker) [auth-pam.c] Don't use pam_* namespace for sshd's PAM functions.
- ok djm@
+ we have to use the recipient's channel number (RFC 4254) for
+ SSH2_MSG_CHANNEL_SUCCESS/SSH2_MSG_CHANNEL_FAILURE messages,
+ otherwise we trigger 'Non-public channel' error messages on sshd
+ systems with clientkeepalive enabled; noticed by sturm; ok djm;
+ - markus@cvs.openbsd.org 2008/12/02 19:08:59
+ [serverloop.c]
+ backout 1.149, since it's not necessary and openssh clients send
+ broken CHANNEL_FAILURE/SUCCESS messages since about 2004; ok djm@
+ - markus@cvs.openbsd.org 2008/12/02 19:09:38
+ [channels.c]
+ s/remote_id/id/ to be more consistent with other code; ok djm@
-20040601
- - (djm) [auth-pam.c] Add copyright for local changes
+20081201
+ - (dtucker) [contrib/cygwin/{Makefile,ssh-host-config}] Add new doc files
+ and tweak the is-sshd-running check in ssh-host-config. Patch from
+ vinschen at redhat com.
+ - (dtucker) OpenBSD CVS Sync
+ - markus@cvs.openbsd.org 2008/11/21 15:47:38
+ [packet.c]
+ packet_disconnect() on padding error, too. should reduce the success
+ probability for the CPNI-957037 Plaintext Recovery Attack to 2^-18
+ ok djm@
+ - dtucker@cvs.openbsd.org 2008/11/30 11:59:26
+ [monitor_fdpass.c]
+ Retry sendmsg/recvmsg on EAGAIN and EINTR; ok djm@
-20040530
- - (dtucker) [auth-pam.c auth-pam.h auth-passwd.c] Bug #874: Re-add PAM
- support for PasswordAuthentication=yes. ok djm@
- - (dtucker) [auth-pam.c] Use an invalid password for root if
- PermitRootLogin != yes or the login is invalid, to prevent leaking
- information. Based on Openwall's owl-always-auth patch. ok djm@
- - (tim) [configure.ac Makefile.in] Add support for "make package" ok djm@
- - (tim) [buildpkg.sh.in] New file. A more flexible version of
- contrib/solaris/buildpkg.sh used for "make package".
- - (tim) [buildpkg.sh.in] Last minute fix didn't make it in the .in file.
+20081123
+ - (dtucker) [monitor_fdpass.c] Reduce diff vs OpenBSD by moving some
+ declarations, removing an unnecessary union member and adding whitespace.
+ cmsgbuf.tmp thing spotted by des at des no, ok djm some time ago.
-20040527
- - (dtucker) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec
- contrib/README CREDITS INSTALL] Bug #873: Correct URLs for x11-ssh-askpass
- and Jim Knoble's email address , from Jim himself.
+20081118
+ - (tim) [addrmatch.c configure.ac] Some platforms do not have sin6_scope_id
+ member of sockaddr_in6. Also reported in Bug 1491 by David Leonard. OK and
+ feedback by djm@
-20040524
+20081111
- (dtucker) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2004/05/19 12:17:33
- [sftp-client.c sftp.c]
- gracefully abort transfers on receipt of SIGINT, also ignore SIGINT while
- waiting for a command; ok markus@
- - dtucker@cvs.openbsd.org 2004/05/20 10:58:05
- [clientloop.c]
- Trivial type fix 0 -> '\0'; ok markus@
- - markus@cvs.openbsd.org 2004/05/21 08:43:03
- [kex.h moduli.c tildexpand.c]
- add prototypes for -Wall; ok djm
- - djm@cvs.openbsd.org 2004/05/21 11:33:11
- [channels.c channels.h clientloop.c serverloop.c ssh.1]
- bz #756: add support for the cancel-tcpip-forward request for the server
- and the client (through the ~C commandline). reported by z3p AT
- twistedmatrix.com; ok markus@
- - djm@cvs.openbsd.org 2004/05/22 06:32:12
+ - jmc@cvs.openbsd.org 2008/11/05 11:22:54
+ [servconf.c]
+ passord -> password;
+ fixes user/5975 from Rene Maroufi
+ - stevesk@cvs.openbsd.org 2008/11/07 00:42:12
+ [ssh-keygen.c]
+ spelling/typo in comment
+ - stevesk@cvs.openbsd.org 2008/11/07 18:50:18
+ [nchan.c]
+ add space to some log/debug messages for readability; ok djm@ markus@
+ - dtucker@cvs.openbsd.org 2008/11/07 23:34:48
+ [auth2-jpake.c]
+ Move JPAKE define to make life easier for portable. ok djm@
+ - tobias@cvs.openbsd.org 2008/11/09 12:34:47
+ [session.c ssh.1]
+ typo fixed (overriden -> overridden)
+ ok espie, jmc
+ - stevesk@cvs.openbsd.org 2008/11/11 02:58:09
+ [servconf.c]
+ USE_AFS not referenced so remove #ifdef. fixes sshd -T not printing
+ kerberosgetafstoken. ok dtucker@
+ (Id sync only, we still want the ifdef in portable)
+ - stevesk@cvs.openbsd.org 2008/11/11 03:55:11
+ [channels.c]
+ for sshd -T print 'permitopen any' vs. 'permitopen' for case of no
+ permitopen's; ok and input dtucker@
+ - djm@cvs.openbsd.org 2008/11/10 02:06:35
+ [regress/putty-ciphers.sh]
+ PuTTY supports AES CTR modes, so interop test against them too
+
+20081105
+ - OpenBSD CVS Sync
+ - djm@cvs.openbsd.org 2008/11/03 08:59:41
+ [servconf.c]
+ include MaxSessions in sshd -T output; patch from imorgan AT nas.nasa.gov
+ - djm@cvs.openbsd.org 2008/11/04 07:58:09
+ [auth.c]
+ need unistd.h for close() prototype
+ (ID sync only)
+ - djm@cvs.openbsd.org 2008/11/04 08:22:13
+ [auth.h auth2.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h]
+ [readconf.c readconf.h servconf.c servconf.h ssh2.h ssh_config.5]
+ [sshconnect2.c sshd_config.5 jpake.c jpake.h schnorr.c auth2-jpake.c]
+ [Makefile.in]
+ Add support for an experimental zero-knowledge password authentication
+ method using the J-PAKE protocol described in F. Hao, P. Ryan,
+ "Password Authenticated Key Exchange by Juggling", 16th Workshop on
+ Security Protocols, Cambridge, April 2008.
+
+ This method allows password-based authentication without exposing
+ the password to the server. Instead, the client and server exchange
+ cryptographic proofs to demonstrate of knowledge of the password while
+ revealing nothing useful to an attacker or compromised endpoint.
+
+ This is experimental, work-in-progress code and is presently
+ compiled-time disabled (turn on -DJPAKE in Makefile.inc).
+
+ "just commit it. It isn't too intrusive." deraadt@
+ - stevesk@cvs.openbsd.org 2008/11/04 19:18:00
+ [readconf.c]
+ because parse_forward() is now used to parse all forward types (DLR),
+ and it malloc's space for host variables, we don't need to malloc
+ here. fixes small memory leaks.
+
+ previously dynamic forwards were not parsed in parse_forward() and
+ space was not malloc'd in that case.
+
+ ok djm@
+ - stevesk@cvs.openbsd.org 2008/11/05 03:23:09
[clientloop.c ssh.1]
- use '-h' for help in ~C commandline instead of '-?'; inspired by jmc@
- - jmc@cvs.openbsd.org 2004/05/22 16:01:05
- [ssh.1]
- kill whitespace at eol;
- - dtucker@cvs.openbsd.org 2004/05/23 23:59:53
- [auth.c auth.h auth1.c auth2.c servconf.c servconf.h sshd_config
- sshd_config.5]
- Add MaxAuthTries sshd config option; ok markus@
- - (dtucker) [auth-pam.c] Bug #839: Ensure that pam authentication "thread"
- is terminated if the privsep slave exits during keyboard-interactive
- authentication. ok djm@
- - (dtucker) [sshd.c] Fix typo in comment.
-
-20040523
- - (djm) [sshd_config] Explain consequences of UsePAM=yes a little better in
- sshd_config; ok dtucker@
- - (djm) [configure.ac] Warn if the system has no known way of figuring out
- which user is on the other end of a Unix domain socket; ok dtucker@
- - (bal) [openbsd-compat/sys-queue.h] Reintroduce machinary to handle
- old/broken/incomplete <sys/queue.h>.
+ add dynamic forward escape command line; ok djm@
-20040513
- - (dtucker) [configure.ac] Bug #867: Additional tests for res_query in
- libresolv, fixes problems detecting it on some platforms
- (eg Linux/x86-64). From Kurt Roeckx via Debian, ok mouring@
- - (dtucker) OpenBSD CVS Sync
- - jmc@cvs.openbsd.org 2004/05/04 18:36:07
- [scp.1]
- SendEnv here too;
- - jmc@cvs.openbsd.org 2004/05/06 11:24:23
+20081103
+ - OpenBSD CVS Sync
+ - sthen@cvs.openbsd.org 2008/07/24 23:55:30
+ [ssh-keygen.1]
+ Add "ssh-keygen -F -l" to synopsis (displays fingerprint from
+ known_hosts). ok djm@
+ - grunk@cvs.openbsd.org 2008/07/25 06:56:35
+ [ssh_config]
+ Add VisualHostKey to example file, ok djm@
+ - grunk@cvs.openbsd.org 2008/07/25 07:05:16
+ [key.c]
+ In random art visualization, make sure to use the end marker only at the
+ end. Initial diff by Dirk Loss, tweaks and ok djm@
+ - markus@cvs.openbsd.org 2008/07/31 14:48:28
+ [sshconnect2.c]
+ don't allocate space for empty banners; report t8m at centrum.cz;
+ ok deraadt
+ - krw@cvs.openbsd.org 2008/08/02 04:29:51
[ssh_config.5]
- typo from John Cosimano (PR 3770);
- - deraadt@cvs.openbsd.org 2004/05/08 00:01:37
- [auth.c clientloop.c misc.h servconf.c ssh.c sshpty.h sshtty.c
- tildexpand.c], removed: sshtty.h tildexpand.h
- make two tiny header files go away; djm ok
- - djm@cvs.openbsd.org 2004/05/08 00:21:31
- [clientloop.c misc.h readpass.c scard.c ssh-add.c ssh-agent.c ssh-keygen.c
- sshconnect.c sshconnect1.c sshconnect2.c] removed: readpass.h
- kill a tiny header; ok deraadt@
- - djm@cvs.openbsd.org 2004/05/09 00:06:47
- [moduli.c ssh-keygen.c] removed: moduli.h
- zap another tiny header; ok deraadt@
- - djm@cvs.openbsd.org 2004/05/09 01:19:28
- [OVERVIEW auth-rsa.c auth1.c kex.c monitor.c session.c sshconnect1.c
- sshd.c] removed: mpaux.c mpaux.h
- kill some more tiny files; ok deraadt@
- - djm@cvs.openbsd.org 2004/05/09 01:26:48
+ whitepsace -> whitespace. From Matthew Clarke via bugs@.
+ - djm@cvs.openbsd.org 2008/08/21 04:09:57
+ [session.c]
+ allow ForceCommand internal-sftp with arguments. based on patch from
+ michael.barabanov AT gmail.com; ok markus@
+ - djm@cvs.openbsd.org 2008/09/06 12:24:13
[kex.c]
- don't overwrite what we are trying to compute
- - deraadt@cvs.openbsd.org 2004/05/11 19:01:43
- [auth.c auth2-none.c authfile.c channels.c monitor.c monitor_mm.c
- packet.c packet.h progressmeter.c session.c openbsd-compat/xmmap.c]
- improve some code lint did not like; djm millert ok
- - dtucker@cvs.openbsd.org 2004/05/13 02:47:50
- [ssh-agent.1]
- Add examples to ssh-agent.1, bz#481 from Ralf Hauser; ok deraadt@
- - (dtucker) [sshd.8] Bug #843: Add warning about PasswordAuthentication to
- UsePAM section. Parts from djm@ and jmc@.
- - (dtucker) [auth-pam.c scard-opensc.c] Tinderbox says auth-pam.c uses
- readpass.h, grep says scard-opensc.c does too. Replace with misc.h.
- - (dtucker) [openbsd-compat/getrrsetbyname.c] Check that HAVE_DECL_H_ERROR
- is defined before using.
- - (dtucker) [openbsd-compat/getrrsetbyname.c] Fix typo too: HAVE_DECL_H_ERROR
- -> HAVE_DECL_H_ERRNO.
-
-20040502
- - (dtucker) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2004/04/22 11:56:57
- [moduli.c]
- Bugzilla #850: Sophie Germain is the correct name of the French
- mathematician, "Sophie Germaine" isn't; from Luc.Maisonobe@c-s.fr
- - djm@cvs.openbsd.org 2004/04/27 09:46:37
- [readconf.c readconf.h servconf.c servconf.h session.c session.h ssh.c
- ssh_config.5 sshd_config.5]
- bz #815: implement ability to pass specified environment variables from
- the client to the server; ok markus@
- - djm@cvs.openbsd.org 2004/04/28 05:17:10
- [ssh_config.5 sshd_config.5]
- manpage fixes in envpass stuff from Brian Poole (raj AT cerias.purdue.edu)
- - jmc@cvs.openbsd.org 2004/04/28 07:02:56
- [sshd_config.5]
- remove unnecessary .Pp;
- - jmc@cvs.openbsd.org 2004/04/28 07:13:42
- [sftp.1 ssh.1]
- add SendEnv to -o list;
- - dtucker@cvs.openbsd.org 2004/05/02 11:54:31
+ OpenSSL 0.9.8h supplies a real EVP_sha256 so we do not need our
+ replacement anymore
+ (ID sync only for portable - we still need this)
+ - markus@cvs.openbsd.org 2008/09/11 14:22:37
+ [compat.c compat.h nchan.c ssh.c]
+ only send eow and no-more-sessions requests to openssh 5 and newer;
+ fixes interop problems with broken ssh v2 implementations; ok djm@
+ - millert@cvs.openbsd.org 2008/10/02 14:39:35
+ [session.c]
+ Convert an unchecked strdup to xstrdup. OK deraadt@
+ - jmc@cvs.openbsd.org 2008/10/03 13:08:12
[sshd.8]
- Man page grammar fix (bz #858), from damerell at chiark.greenend.org.uk
- via Debian; ok djm@
- - dtucker@cvs.openbsd.org 2004/05/02 11:57:52
- [ssh.1]
- ConnectionTimeout -> ConnectTimeout, from m.a.ellis at ncl.ac.uk via
- Debian. ok djm@
- - dtucker@cvs.openbsd.org 2004/05/02 23:02:17
- [sftp.1]
- ConnectionTimeout -> ConnectTimeout here too, pointed out by jmc@
- - dtucker@cvs.openbsd.org 2004/05/02 23:17:51
- [scp.1]
- ConnectionTimeout -> ConnectTimeout for scp.1 too.
-
-20040423
- - (dtucker) [configure.ac openbsd-compat/getrrsetbyname.c] Declare h_errno
- as extern int if not already declared. Fixes compile errors on old SCO
- platforms. ok tim@
- - (dtucker) [README.platform] List prereqs for building on Cygwin.
-
-20040421
- - (djm) Update config.guess and config.sub to autoconf-2.59 versions; ok tim@
-
-20040420
- - (djm) OpenBSD CVS Sync
- - henning@cvs.openbsd.org 2004/04/08 16:08:21
+ do not give an example of how to chmod files: we can presume the user
+ knows that. removes an ambiguity in the permission of authorized_keys;
+ ok deraadt
+ - deraadt@cvs.openbsd.org 2008/10/03 23:56:28
[sshconnect2.c]
- swap the last two parameters to TAILQ_FOREACH_REVERSE. matches what
- FreeBSD and NetBSD do.
- ok millert@ mcbride@ markus@ ho@, checked to not affect ports by naddy@
- - djm@cvs.openbsd.org 2004/04/18 23:10:26
- [readconf.c readconf.h ssh-keysign.c ssh.c]
- perform strict ownership and modes checks for ~/.ssh/config files,
- as these can be used to execute arbitrary programs; ok markus@
- NB. ssh will now exit when it detects a config with poor permissions
- - djm@cvs.openbsd.org 2004/04/19 13:02:40
- [ssh.1 ssh_config.5]
- document strict permission checks on ~/.ssh/config; prompted by,
- with & ok jmc@
- - jmc@cvs.openbsd.org 2004/04/19 16:12:14
- [ssh_config.5]
- kill whitespace at eol;
- - djm@cvs.openbsd.org 2004/04/19 21:51:49
+ Repair strnvis() buffersize of 4*n+1, with termination gauranteed by the
+ function.
+ spotted by des@freebsd, who commited an incorrect fix to the freebsd tree
+ and (as is fairly typical) did not report the problem to us. But this fix
+ is correct.
+ ok djm
+ - djm@cvs.openbsd.org 2008/10/08 23:34:03
+ [ssh.1 ssh.c]
+ Add -y option to force logging via syslog rather than stderr.
+ Useful for daemonised ssh connection (ssh -f). Patch originally from
+ and ok'd by markus@
+ - djm@cvs.openbsd.org 2008/10/09 03:50:54
+ [servconf.c sshd_config.5]
+ support setting PermitEmptyPasswords in a Match block
+ requested in PR3891; ok dtucker@
+ - jmc@cvs.openbsd.org 2008/10/09 06:54:22
[ssh.c]
- fix idiot typo that i introduced in my last commit;
- spotted by cschneid AT cschneid.com
- - (djm) [openbsd-compat/sys-queue.h] Sync with OpenBSD, needed for
- above change
- - (djm) [configure.ac] Check whether libroken is required when building
- with Heimdal
-
-20040419
- - (dtucker) OpenBSD CVS Sync
- - dtucker@cvs.openbsd.org 2004/02/29 22:04:45
- [regress/login-timeout.sh]
- Use sudo when restarting daemon during test. ok markus@
- - dtucker@cvs.openbsd.org 2004/03/08 10:17:12
- [regress/login-timeout.sh]
- Missing OBJ, from tim@. ok markus@ (Already fixed, ID sync only)
- - djm@cvs.openbsd.org 2004/03/30 12:41:56
- [sftp-client.c]
- sync comment with reality
- - djm@cvs.openbsd.org 2004/03/31 21:58:47
- [canohost.c]
- don't skip ip options check when UseDNS=no; ok markus@ (ID sync only)
- - markus@cvs.openbsd.org 2004/04/01 12:19:57
+ add -y to usage();
+ - stevesk@cvs.openbsd.org 2008/10/10 04:55:16
[scp.c]
- limit trust between local and remote rcp/scp process,
- noticed by lcamtuf; ok deraadt@, djm@
-
-20040418
- - (dtucker) [auth-pam.c] Log username and source host for failed PAM
- authentication attempts. With & ok djm@
- - (djm) [openbsd-compat/bsd-cygwin_util.c] Recent versions of Cygwin allow
- change of user context without a password, so relax auth method
- restrictions; from vinschen AT redhat.com; ok dtucker@
-
-20040416
- - (dtucker) [regress/sftp-cmds.sh] Skip quoting test on Cygwin, since
- FAT/NTFS does not permit quotes in filenames. From vinschen at redhat.com
- - (djm) [auth-krb5.c auth.h session.c] Explicitly refer to Kerberos ccache
- file using FILE: method, fixes problems on Mac OSX.
- Patch from simon@sxw.org.uk; ok dtucker@
- - (tim) [configure.ac] Set SETEUID_BREAKS_SETUID, BROKEN_SETREUID and
- BROKEN_SETREGID for SCO OpenServer 3
-
-20040412
- - (dtucker) [sshd_config.5] Add PermitRootLogin without-password warning
- from bug #701 (text from jfh at cise.ufl.edu).
- - (dtucker) [acconfig.h configure.ac defines.h] Bug #673: check for 4-arg
- skeychallenge(), eg on NetBSD. ok mouring@
- - (dtucker) [auth-skey.c defines.h monitor.c] Make skeychallenge explicitly
- 4-arg, with compatibility for 3-arg versions. From djm@, ok me.
- - (djm) [configure.ac] Fix detection of libwrap on OpenBSD; ok dtucker@
-
-20040408
- - (dtucker) [loginrec.c] Use UT_LINESIZE if available, prevents truncating
- pty name on Linux 2.6.x systems. Patch from jpe at eisenmenger.org.
- - (bal) [monitor.c monitor_wrap.c] Second try. Put the zlib.h headers
- back and #undef TARGET_OS_MAC instead. (Bug report pending with Apple)
- - (dtucker) [defines.h loginrec.c] Define UT_LINESIZE if not defined and
- simplify loginrec.c. ok tim@
- - (bal) [monitor.c monitor_wrap.c] Ok.. Last time. Promise. Tim suggested
- limiting scope and dtucker@ agreed.
-
-20040407
- - (dtucker) [session.c] Flush stdout after displaying loginmsg. From
- f_mohr at yahoo.de.
- - (bal) [acconfig.h auth-krb5.c configure.ac gss-serv-krb5.c] Check to see
- if Krb5 library exports krb5_init_etc() since some OSes (like MacOS/X)
- are starting to restrict it as internal since it is not needed by
- developers any more. (Patch based on Apple tree)
- - (bal) [monitor.c monitor_wrap.c] monitor_wrap.c] moved zlib.h higher since
- krb5 on MacOS/X conflicts. There may be a better solution, but this will
- work for now.
-
-20040406
- - (dtucker) [acconfig.h configure.ac defines.h] Bug #820: don't use
- updwtmpx() on IRIX since it seems to clobber utmp. ok djm@
- - (dtucker) [configure.ac] Bug #816, #748 (again): Attempt to detect
- broken getaddrinfo and friends on HP-UX. ok djm@
-
-20040330
- - (dtucker) [configure.ac] Bug #811: Use "!" for LOCKED_PASSWD_PREFIX on
- Linuxes, since that's what many use. ok djm@
- - (dtucker) [auth-pam.c] rename the_authctxt to sshpam_authctxt in auth-pam.c
- to reduce potential confusion with the one in sshd.c. ok djm@
- - (djm) Bug #825: Fix ip_options_check() for mapped IPv4/IPv6 connection;
- with & ok dtucker@
-
-20040327
- - (dtucker) [session.c] Bug #817: Clear loginmsg after fork to prevent
- duplicate login messages for mutli-session logins. ok djm@
-
-20040322
- - (djm) [sshd.c] Drop supplemental groups if started as root
+ spelling in comment; ok djm@
+ - stevesk@cvs.openbsd.org 2008/10/10 05:00:12
+ [key.c]
+ typo in error message; ok djm@
+ - stevesk@cvs.openbsd.org 2008/10/10 16:43:27
+ [ssh_config.5]
+ use 'Privileged ports can be forwarded only when logging in as root on
+ the remote machine.' for RemoteForward just like ssh.1 -R.
+ ok djm@ jmc@
+ - stevesk@cvs.openbsd.org 2008/10/14 18:11:33
+ [sshconnect.c]
+ use #define ROQUIET here; no binary change. ok dtucker@
+ - stevesk@cvs.openbsd.org 2008/10/17 18:36:24
+ [ssh_config.5]
+ correct and clarify VisualHostKey; ok jmc@
+ - stevesk@cvs.openbsd.org 2008/10/30 19:31:16
+ [clientloop.c sshd.c]
+ don't need to #include "monitor_fdpass.h"
+ - stevesk@cvs.openbsd.org 2008/10/31 15:05:34
+ [dispatch.c]
+ remove unused #define DISPATCH_MIN; ok markus@
+ - djm@cvs.openbsd.org 2008/11/01 04:50:08
+ [sshconnect2.c]
+ sprinkle ARGSUSED on dispatch handlers
+ nuke stale unusued prototype
+ - stevesk@cvs.openbsd.org 2008/11/01 06:43:33
+ [channels.c]
+ fix some typos in log messages; ok djm@
+ - sobrado@cvs.openbsd.org 2008/11/01 11:14:36
+ [ssh-keyscan.1 ssh-keyscan.c]
+ the ellipsis is not an optional argument; while here, improve spacing.
+ - stevesk@cvs.openbsd.org 2008/11/01 17:40:33
+ [clientloop.c readconf.c readconf.h ssh.c]
+ merge dynamic forward parsing into parse_forward();
+ 'i think this is OK' djm@
+ - stevesk@cvs.openbsd.org 2008/11/02 00:16:16
+ [ttymodes.c]
+ protocol 2 tty modes support is now 7.5 years old so remove these
+ debug3()s; ok deraadt@
+ - stevesk@cvs.openbsd.org 2008/11/03 01:07:02
+ [readconf.c]
+ remove valueless comment
+ - stevesk@cvs.openbsd.org 2008/11/03 02:44:41
+ [readconf.c]
+ fix comment
+ - (djm) [contrib/caldera/ssh-host-keygen contrib/suse/rc.sshd]
+ Make example scripts generate keys with default sizes rather than fixed,
+ non-default 1024 bits; patch from imorgan AT nas.nasa.gov
+ - (djm) [contrib/sshd.pam.generic contrib/caldera/sshd.pam]
+ [contrib/redhat/sshd.pam] Move pam_nologin to account group from
+ incorrect auth group in example files;
+ patch from imorgan AT nas.nasa.gov
+
+20080906
+ - (dtucker) [config.guess config.sub] Update to latest versions from
+ http://git.savannah.gnu.org/gitweb/ (2008-04-14 and 2008-06-16
+ respectively).
+
+20080830
+ - (dtucker) [openbsd-compat/bsd-poll.c] correctly check for number of FDs
+ larger than FD_SETSIZE (OpenSSH only ever uses poll with one fd). Patch
+ from Nicholas Marriott.
+
+20080721
- (djm) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2004/03/09 22:11:05
- [ssh.c]
- increase x11 cookie lifetime to 20 minutes; ok djm
- - markus@cvs.openbsd.org 2004/03/10 09:45:06
- [ssh.c]
- trim usage to match ssh(1) and look more like unix. ok djm@
- - markus@cvs.openbsd.org 2004/03/11 08:36:26
- [sshd.c]
- trim usage; ok deraadt
- - markus@cvs.openbsd.org 2004/03/11 10:21:17
- [ssh.c sshd.c]
- ssh, sshd: sync version output, ok djm
- - markus@cvs.openbsd.org 2004/03/20 10:40:59
- [version.h]
- 3.8.1
- - (djm) Crank RPM spec versions
-
-20040311
- - (djm) [configure.ac] Add standard license to configure.ac; ok ben, dtucker
-
-20040310
- - (dtucker) [openbsd-compat/fake-rfc2553.h] Bug #812: #undef getaddrinfo
- before redefining it, silences warnings on Tru64.
+ - djm@cvs.openbsd.org 2008/07/23 07:36:55
+ [servconf.c]
+ do not try to print options that have been compile-time disabled
+ in config test mode (sshd -T); report from nix-corp AT esperi.org.uk
+ ok dtucker@
+ - (djm) [servconf.c] Print UsePAM option in config test mode (when it
+ has been compiled in); report from nix-corp AT esperi.org.uk
+ ok dtucker@
-20040308
- - (dtucker) [sshd.c] Back out rev 1.270 as it caused problems on some
- platforms (eg SCO, HP-UX) with logging in the wrong TZ. ok djm@
- - (dtucker) [configure.ac sshd.c openbsd-compat/bsd-misc.h
- openbsd-compat/setenv.c] Unset KRB5CCNAME on AIX to prevent it from being
- inherited by the child. ok djm@
- - (dtucker) [auth-pam.c auth-pam.h auth1.c auth2.c monitor.c monitor_wrap.c
- monitor_wrap.h] Bug #808: Ensure force_pwchange is correctly initialized
- even if keyboard-interactive is not used by the client. Prevents
- segfaults in some cases where the user's password is expired (note this
- is not considered a security exposure). ok djm@
+20080721
- (djm) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2004/03/03 06:47:52
- [sshd.c]
- change proctiltle after accept(2); ok henning, deraadt, djm
- - djm@cvs.openbsd.org 2004/03/03 09:30:42
- [sftp-client.c]
- Don't print duplicate messages when progressmeter is off
- Spotted by job317 AT mailvault.com; ok markus@
- - djm@cvs.openbsd.org 2004/03/03 09:31:20
- [sftp.c]
- Fix initialisation of progress meter; ok markus@
- - markus@cvs.openbsd.org 2004/03/05 10:53:58
- [readconf.c readconf.h scp.1 sftp.1 ssh.1 ssh_config.5 sshconnect2.c]
- add IdentitiesOnly; ok djm@, pb@
- - djm@cvs.openbsd.org 2004/03/08 09:38:05
- [ssh-keyscan.c]
- explicitly initialise remote_major and remote_minor.
- from cjwatson AT debian.org; ok markus@
- - dtucker@cvs.openbsd.org 2004/03/08 10:18:57
- [sshd_config.5]
- Document KerberosGetAFSToken; ok markus@
- - (tim) [regress/README.regress] Document ssh-rand-helper issue. ok bal
-
-20040307
- - (tim) [regress/login-timeout.sh] fix building outside of source tree.
-
-20040304
- - (dtucker) [auth-pam.c] Don't try to export PAM when compiled with
- -DUSE_POSIX_THREADS. From antoine.verheijen at ualbert ca. ok djm@
- - (dtucker) [auth-pam.c] Reset signal status when starting pam auth thread,
- prevent hanging during PAM keyboard-interactive authentications. ok djm@
- - (dtucker) [auth-passwd.c auth-sia.c auth-sia.h defines.h
- openbsd-compat/xcrypt.c] Bug #802: Fix build error on Tru64 when
- configured --with-osfsia. ok djm@
-
-20040303
- - (djm) [configure.ac ssh-agent.c] Use prctl to prevent ptrace on ssh-agent
- ok dtucker
-
-20040229
- - (tim) [configure.ac] Put back bits mistakenly removed from Rev 1.188
-
-20040229
- - (dtucker) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2004/02/25 00:22:45
- [sshd.c]
- typo in comment
- - dtucker@cvs.openbsd.org 2004/02/27 22:42:47
- [dh.c]
- Prevent sshd from sending DH groups with a primitive generator of zero or
- one, even if they are listed in /etc/moduli. ok markus@
- - dtucker@cvs.openbsd.org 2004/02/27 22:44:56
- [dh.c]
- Make /etc/moduli line buffer big enough for 8kbit primes, in case anyone
- ever uses one. ok markus@
- - dtucker@cvs.openbsd.org 2004/02/27 22:49:27
- [dh.c]
- Reset bit counter at the right time, fixes debug output in the case where
- the DH group is rejected. ok markus@
- - dtucker@cvs.openbsd.org 2004/02/17 08:23:20
- [regress/Makefile regress/login-timeout.sh]
- Add regression test for LoginGraceTime; ok markus@
- - markus@cvs.openbsd.org 2004/02/24 16:56:30
- [regress/test-exec.sh]
- allow arguments in ${TEST_SSH_XXX}
- - markus@cvs.openbsd.org 2004/02/24 17:06:52
- [regress/ssh-com-client.sh regress/ssh-com-keygen.sh
- regress/ssh-com-sftp.sh regress/ssh-com.sh]
- test against recent ssh.com releases
- - dtucker@cvs.openbsd.org 2004/02/28 12:16:57
- [regress/dynamic-forward.sh]
- Make dynamic-forward understand nc's new output. ok markus@
- - dtucker@cvs.openbsd.org 2004/02/28 13:44:45
- [regress/try-ciphers.sh]
- Test acss too; ok markus@
- - (dtucker) [regress/try-ciphers.sh] Skip acss if not compiled in (eg if we
- built with openssl < 0.9.7)
-
-20040226
- - (bal) KNF our sshlogin.c even if the code looks nothing like upstream
- code due to diversity issues.
-
-20040225
- - (djm) Trim ChangeLog
- - (djm) Don't specify path to PAM modules in Redhat sshd.pam; from Fedora
-
-20040224
- - (dtucker) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2004/02/19 21:15:04
- [sftp-server.c]
- switch to new license.template
- - markus@cvs.openbsd.org 2004/02/23 12:02:33
- [sshd.c]
- backout revision 1.279; set listen socket to non-block; ok henning.
- - markus@cvs.openbsd.org 2004/02/23 15:12:46
- [bufaux.c]
- encode 0 correctly in buffer_put_bignum2; noted by Mikulas Patocka
- and drop support for negative BNs; ok otto@
- - markus@cvs.openbsd.org 2004/02/23 15:16:46
+ - jmc@cvs.openbsd.org 2008/07/18 22:51:01
+ [sftp-server.8]
+ no need for .Pp before or after .Sh;
+ - djm@cvs.openbsd.org 2008/07/21 08:19:07
[version.h]
- enter 3.8
- - (dtucker) [configure.ac gss-serv-krb5.c ssh-gss.h] Define GSSAPI when found
- with krb5-config, hunt down gssapi.h and friends. Based partially on patch
- from deengert at anl.gov. ok djm@
- - (djm) [groupaccess.c uidswap.c] Bug #787: Size group arrays at runtime
- using sysconf() if available Based on patches from
- holger AT van-lengerich.de and openssh_bugzilla AT hockin.org
- - (dtucker) [uidswap.c] Minor KNF. ok djm@
- - (tim) [openbsd-compat/getrrsetbyname.c] Make gcc 2.7.2.3 happy. ok djm@
- - (djm) Crank RPM spec versions
- - (dtucker) [README] Add pointer to release notes. ok djm@
- - (dtucker) {README.platform] Add platform-specific notes.
- - (tim) [configure.ac] SCO3 needs -lcrypt_i for -lprot
- - (djm) Release 3.8p1
+ openssh-5.1
+ - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
+ [contrib/suse/openssh.spec] Update version number in README and RPM specs
+ - (djm) Release OpenSSH-5.1
-20040223
- - (dtucker) [session.c] Bug #789: Only make setcred call for !privsep in the
- non-interactive path. ok djm@
-
-20040222
- - (dtucker) [auth-shadow.c auth.c auth.h] Move shadow account expiry test
- to auth-shadow.c, no functional change. ok djm@
- - (dtucker) [auth-shadow.c auth.h] Provide warnings of impending account or
- password expiry. ok djm@
- - (dtucker) [auth-passwd.c] Only check password expiry once. Prevents
- multiple warnings if a wrong password is entered.
- - (dtucker) [configure.ac] Apply krb5-config --libs fix to non-gssapi path
- too.
-
-20040220
- - (djm) [openbsd-compat/setproctitle.c] fix comments; from grange@
+20080717
+ - (djm) OpenBSD CVS Sync
+ - djm@cvs.openbsd.org 2008/07/17 08:48:00
+ [sshconnect2.c]
+ strnvis preauth banner; pointed out by mpf@ ok markus@
+ - djm@cvs.openbsd.org 2008/07/17 08:51:07
+ [auth2-hostbased.c]
+ strip trailing '.' from hostname when HostbasedUsesNameFromPacketOnly=yes
+ report and patch from res AT qoxp.net (bz#1200); ok markus@
+ - (dtucker) [openbsd-compat/bsd-cygwin_util.c] Remove long-unneeded compat
+ code, replace with equivalent cygwin library call. Patch from vinschen
+ at redhat.com, ok djm@.
+ - (djm) [sshconnect2.c] vis.h isn't available everywhere
+
+20080716
+ - OpenBSD CVS Sync
+ - djm@cvs.openbsd.org 2008/07/15 02:23:14
+ [sftp.1]
+ number of pipelined requests is now 64;
+ prodded by Iain.Morgan AT nasa.gov
+ - djm@cvs.openbsd.org 2008/07/16 11:51:14
+ [clientloop.c]
+ rename variable first_gc -> last_gc (since it is actually the last
+ in the list).
+ - djm@cvs.openbsd.org 2008/07/16 11:52:19
+ [channels.c]
+ this loop index should be automatic, not static
-20040218
- - (dtucker) [configure.ac] Handle case where krb5-config --libs returns a
- path with a "-" in it. From Sergio.Gelato at astro.su.se.
+20080714
- (djm) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2004/02/17 07:17:29
- [sftp-glob.c sftp.c]
- Remove useless headers; ok deraadt@
- - djm@cvs.openbsd.org 2004/02/17 11:03:08
+ - sthen@cvs.openbsd.org 2008/07/13 21:22:52
+ [ssh-keygen.c]
+ Change "ssh-keygen -F [host] -l" to not display random art unless
+ -v is also specified, making it consistent with the manual and other
+ uses of -l.
+ ok grunk@
+ - djm@cvs.openbsd.org 2008/07/13 22:13:07
+ [channels.c]
+ use struct sockaddr_storage instead of struct sockaddr for accept(2)
+ address argument. from visibilis AT yahoo.com in bz#1485; ok markus@
+ - djm@cvs.openbsd.org 2008/07/13 22:16:03
[sftp.c]
- sftp.c and sftp-int.c, together at last; ok markus@
- - jmc@cvs.openbsd.org 2004/02/17 19:35:21
- [sshd_config.5]
- remove cruft left over from RhostsAuthentication removal;
+ increase number of piplelined requests so they properly fill the
+ (recently increased) channel window. prompted by rapier AT psc.edu;
ok markus@
- - (djm) [log.c] Correct use of HAVE_OPENLOG_R
- - (djm) [log.c] Tighten openlog_r tests
-
-20040217
- - (djm) Simplify the license on code I have written. No code changes.
+ - djm@cvs.openbsd.org 2008/07/14 01:55:56
+ [sftp-server.8]
+ mention requirement for /dev/log inside chroot when using sftp-server
+ with ChrootDirectory
+ - (djm) [openbsd-compat/bindresvport.c] Rename variables s/sin/in/ to
+ avoid clash with sin(3) function; reported by
+ cristian.ionescu-idbohrn AT axis.com
+ - (djm) [openbsd-compat/rresvport.c] Add unistd.h for missing close()
+ prototype; reported by cristian.ionescu-idbohrn AT axis.com
+ - (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash;
+ reported by cristian.ionescu-idbohrn AT axis.com
+ - (djm) [contrib/cygwin/Makefile contrib/cygwin/ssh-host-config]
+ [contrib/cygwin/ssh-user-config contrib/cygwin/sshd-inetd]
+ Revamped and simplified Cygwin ssh-host-config script that uses
+ unified csih configuration tool. Requires recent Cygwin.
+ Patch from vinschen AT redhat.com
+
+20080712
- (djm) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2004/02/17 05:39:51
- [sftp-client.c sftp-client.h sftp-glob.c sftp-glob.h sftp-int.c]
- [sftp-int.h sftp.c]
- switch to license.template for code written by me (belated, I know...)
- - (djm) Bug #698: Specify FILE: for KRB5CCNAME; patch from
- stadal@suse.cz and simon@sxw.org.uk
- - (dtucker) [auth-pam.c] Tidy up PAM debugging. ok djm@
- - (dtucker) [auth-pam.c] Store output from pam_session and pam_setcred for
- display after login. Should fix problems like pam_motd not displaying
- anything, noticed by cjwatson at debian.org. ok djm@
-
-20040212
- - (tim) [Makefile.in regress/sftp-badcmds.sh regress/test-exec.sh]
- Portablity fixes. Data sftp transfers needs to be world readable. Some
- older shells hang on while loops when doing sh -n some_script. OK dtucker@
- - (tim) [configure.ac] Make sure -lcrypto is before -lsocket for sco3.
- ok mouring@
-
-20040211
- - (dtucker) [auth-passwd.c auth-shadow.c] Only enable shadow expiry check
- if HAS_SHADOW_EXPIRY is set.
- - (tim) [configure.ac] Fix comment to match code changes in ver 1.117
-
-20040210
- - (dtucker) [auth-passwd.c auth.h openbsd-compat/port-aix.c
- openbsd-compat/port-aix.h] Bug #14: Use do_pwchange to support AIX's
- native password expiry.
- - (dtucker) [LICENCE Makefile.in auth-passwd.c auth-shadow.c auth.c auth.h
- defines.h] Bug #14: Use do_pwchange to support password expiry and force
- change for platforms using /etc/shadow. ok djm@
- - (dtucker) [openbsd-compat/fake-rfc2553.h] Bug #563: Prepend ssh_ to compat
- functions to avoid conflicts with Heimdal's libroken. ok djm@
- - (dtucker) [auth-pam.c auth-pam.h session.c] Bug #14: Use do_pwchange to
- change expired PAM passwords for SSHv1 connections without privsep.
- pam_chauthtok is still used when privsep is disabled. ok djm@
- - (dtucker) [openbsd-compat/port-aix.c openbsd-compat/port-aix.h] Move
- include from port-aix.h to port-aix.c and remove unnecessary function
- definition. Fixes build errors on AIX.
- - (dtucker) [configure.ac loginrec.c] Bug #464: Use updwtmpx on platforms
- that support it. from & ok mouring@
- - (dtucker) [configure.ac] Bug #345: Do not disable utmp on HP-UX 10.x.
- ok djm@
-
-20040207
- - (dtucker) OpenBSD CVS Sync
- - dtucker@cvs.openbsd.org 2004/02/06 23:41:13
- [cipher-ctr.c]
- Use EVP_CIPHER_CTX_key_length for key length. ok markus@
- (This will fix builds with OpenSSL 0.9.5)
- - (dtucker) [cipher.c] enable AES counter modes with OpenSSL 0.9.5.
- ok djm@, markus@
-
-20040206
- - (dtucker) [acss.c acss.h] Fix $Id tags.
- - (dtucker) [cipher-acss.c cipher.c] Enable acss only if building with
- OpenSSL >= 0.9.7. ok djm@
- - (dtucker) [session.c] Bug #789: Do not call do_pam_setcred as a non-root
- user, since some modules might fail due to lack of privilege. ok djm@
- - (dtucker) [configure.ac] Bug #748: Always define BROKEN_GETADDRINFO
- for HP-UX 11.11. If there are known-good configs where this is not
- required, please report them. ok djm@
- - (dtucker) [sshd.c] Bug #757: Clear child's environment to prevent
- accidentally inheriting from root's environment. ok djm@
- - (dtucker) [openbsd-compat/port-aix.c openbsd-compat/port-aix.h] Bug #796:
- Restore previous authdb setting after auth calls. Fixes problems with
- setpcred failing on accounts that use AFS or NIS password registries.
- - (dtucker) [configure.ac includes.h] Include <sys/stream.h> if present,
- required on Solaris 2.5.1 for queue_t, which is used by <sys/ptms.h>.
- - (dtucker) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2004/01/30 09:48:57
- [auth-passwd.c auth.h pathnames.h session.c]
- support for password change; ok dtucker@
- (set password-dead=1w in login.conf to use this).
- In -Portable, this is currently only platforms using bsdauth.
- - dtucker@cvs.openbsd.org 2004/02/05 05:37:17
- [monitor.c sshd.c]
- Pass SIGALRM through to privsep child if LoginGraceTime expires. ok markus@
- - markus@cvs.openbsd.org 2004/02/05 15:33:33
- [progressmeter.c]
- fix ETA for > 4GB; bugzilla #791; ok henning@ deraadt@
-
-20040129
- - (dtucker) OpenBSD CVS Sync regress/
- - dtucker@cvs.openbsd.org 2003/10/11 11:49:49
- [Makefile banner.sh]
- Test missing banner file, suppression of banner with ssh -q, check return
- code from ssh. ok markus@
- - jmc@cvs.openbsd.org 2003/11/07 10:16:44
- [ssh-com.sh]
- adress -> address, and a few more; all from Jonathon Gray;
- - djm@cvs.openbsd.org 2004/01/13 09:49:06
- [sftp-batch.sh]
- - (dtucker) [configure.ac] Add --without-zlib-version-check. Feedback from
- tim@, ok several
- - (dtucker) [configure.ac openbsd-compat/bsd-cray.c openbsd-compat/bsd-cray.h]
- Bug #775: Cray fixes from wendy at cray.com
-
-20040128
- - (dtucker) [regress/README.regress] Add tcpwrappers issue, noted by tim@
- - (dtucker) [moduli] Import new moduli file from OpenBSD.
-
-20040127
- - (djm) OpenBSD CVS Sync
- - hshoexer@cvs.openbsd.org 2004/01/23 17:06:03
- [cipher.c]
- enable acss for ssh
- ok deraadt@ markus@
- - mouring@cvs.openbsd.org 2004/01/23 17:57:48
- [sftp-int.c]
- Fix issue pointed out with ls not handling large directories
- with embeded paths correctly. OK damien@
- - hshoexer@cvs.openbsd.org 2004/01/23 19:26:33
- [cipher.c]
- rename acss@opebsd.org to acss@openssh.org
- ok deraadt@
- - djm@cvs.openbsd.org 2004/01/25 03:49:09
- [sshconnect.c]
- reset nonblocking flag after ConnectTimeout > 0 connect; (bugzilla #785)
- from jclonguet AT free.fr; ok millert@
- - djm@cvs.openbsd.org 2004/01/27 10:08:10
- [sftp.c]
- reorder parsing so user:skey@host:file works (bugzilla #777)
- patch from admorten AT umich.edu; ok markus@
- - (djm) [acss.c acss.h cipher-acss.c] Portable support for ACSS
- if libcrypto lacks it
-
-20040126
- - (tim) Typo in regress/README.regress
- - (tim) [regress/test-exec.sh] RhostsAuthentication is deprecated.
- - (tim) [defines.h] Add defines for HFIXEDSZ and T_SIG
- - (tim) [configure.ac includes.h] add <sys/ptms.h> for grantpt() and friends.
- - (tim) [defines.h openbsd-compat/getrrsetbyname.h] Move defines for HFIXEDSZ
- and T_SIG to getrrsetbyname.h
-
-20040124
- - (djm) Typo in openbsd-compat/bsd-openpty.c; from wendyp AT cray.com
-
-20040123
- - (djm) Do pam_session processing for systems with HAVE_LOGIN_CAP; from
- ralf.hack AT pipex.net; ok dtucker@
- - (djm) Bug #776: Update contrib/redhat/openssh.spec to dynamically detect
- Kerberos location (and thus work with Fedora Core 1);
- from jason AT devrandom.org
- - (dtucker) [configure.ac] Bug #788: Test for zlib.h presence and for
- zlib >= 1.1.4. Partly from jbasney at ncsa.uiuc.edu. ok djm@
- - (dtucker) [contrib/cygwin/README] Document new ssh-host-config options.
- Patch from vinschen at redhat.com.
- - (dtucker) [acconfig.h configure.ac includes.h servconf.c session.c]
- Change AFS symbol to USE_AFS to prevent namespace collisions, do not
- include kafs.h unless necessary. From deengert at anl.gov.
- - (tim) [configure.ac] Remove hard coded -L/usr/local/lib and
- -I/usr/local/include. Users can do LDFLAGS="-L/usr/local/lib" \
- CPPFLAGS="-I/usr/local/include" ./configure if needed.
-
-20040122
- - (dtucker) [configure.ac] Use krb5-config where available for Kerberos/
- GSSAPI detection, libs and includes. ok djm@
- - (dtucker) [session.c] Enable AFS support in conjunction with KRB5 not
- just HEIMDAL.
- - (tim) [contrib/solaris/buildpkg.sh] Allow for the possibility of
- /usr/local being a symbolic link. Fixes problem reported by Henry Grebler.
+ - djm@cvs.openbsd.org 2008/07/12 04:52:50
+ [channels.c]
+ unbreak; move clearing of cctx struct to before first use
+ reported by dkrause@
+ - djm@cvs.openbsd.org 2008/07/12 05:33:41
+ [scp.1]
+ better description for -i flag:
+ s/RSA authentication/public key authentication/
+ - (djm) [openbsd-compat/fake-rfc2553.c openbsd-compat/fake-rfc2553.h]
+ return EAI_FAMILY when trying to lookup unsupported address family;
+ from vinschen AT redhat.com
-20040121
+20080711
- (djm) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2004/01/13 09:25:05
- [sftp-int.c sftp.1 sftp.c]
- Tidy sftp batchmode handling, eliminate junk to stderr (bugzilla #754) and
- enable use of "-b -" to accept batchfile from stdin; ok markus@
- - jmc@cvs.openbsd.org 2004/01/13 12:17:33
- [sftp.1]
- remove unnecessary Ic's;
- kill whitespace at EOL;
+ - stevesk@cvs.openbsd.org 2008/07/07 00:31:41
+ [ttymodes.c]
+ we don't need arg after the debug3() was removed. from lint.
+ ok djm@
+ - stevesk@cvs.openbsd.org 2008/07/07 23:32:51
+ [key.c]
+ /*NOTREACHED*/ for lint warning:
+ warning: function key_equal falls off bottom without returning value
ok djm@
- - markus@cvs.openbsd.org 2004/01/13 19:23:15
- [compress.c session.c]
- -Wall; ok henning
- - markus@cvs.openbsd.org 2004/01/13 19:45:15
- [compress.c]
- cast for portability; millert@
- - markus@cvs.openbsd.org 2004/01/19 09:24:21
+ - markus@cvs.openbsd.org 2008/07/10 18:05:58
[channels.c]
- fake consumption for half closed channels since the peer is waiting for
- window adjust messages; bugzilla #790 Matthew Dillon; test + ok dtucker@
- reproduce with sh -c 'ulimit -f 10; ssh host -n od /bsd | cat > foo'
- - markus@cvs.openbsd.org 2004/01/19 21:25:15
- [auth2-hostbased.c auth2-pubkey.c serverloop.c ssh-keysign.c sshconnect2.c]
- fix mem leaks; some fixes from Pete Flugstad; tested dtucker@
- - djm@cvs.openbsd.org 2004/01/21 03:07:59
- [sftp.c]
- initialise infile in main, rather than statically - from portable
- - deraadt@cvs.openbsd.org 2004/01/11 21:55:06
- [sshpty.c]
- for pty opening, only use the openpty() path. the other stuff only needs
- to be in openssh-p; markus ok
- - (djm) [openbsd-compat/bsd-openpty.c] Rework old sshpty.c code into an
- openpty() replacement
-
-20040114
- - (dtucker) [auth-pam.c] Have monitor die if PAM authentication thread exits
- unexpectedly. with & ok djm@
- - (dtucker) [auth-pam.c] Reset signal handler in pthread_cancel too, add
- test for case where cleanup has already run.
- - (dtucker) [auth-pam.c] Add minor debugging.
-
-20040113
- - (dtucker) [auth-pam.c] Relocate struct pam_ctxt and prototypes. No
- functional changes.
-
-20040108
- - (dtucker) [auth-pam.c defines.h] Bug #783: move __unused to defines.h and
- only define if not already. From des at freebsd.org.
- - (dtucker) [configure.ac] Remove extra (typo) comma.
-
-20040105
- - (dtucker) [contrib/ssh-copy-id] Bug #781: exit if ssh fails. Patch from
- cjwatson at debian.org.
- - (dtucker) [acconfig.h configure.ac includes.h servconf.c session.c]
- Only enable KerberosGetAFSToken if Heimdal's libkafs is found. with jakob@
-
-20040102
- - (djm) OSX/Darwin needs BIND_8_COMPAT to build getrrsetbyname. Report from
- jakob@
- - (djm) Remove useless DNS support configure summary message. from jakob@
- - (djm) OSX/Darwin put the PAM headers in a different place, detect this.
- Report from jakob@
-
-20031231
- - (dtucker) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2003/12/22 09:16:58
- [moduli.c ssh-keygen.1 ssh-keygen.c]
- tidy up moduli generation debugging, add -v (verbose/debug) option to
- ssh-keygen; ok markus@
- - markus@cvs.openbsd.org 2003/12/22 20:29:55
- [cipher-3des1.c]
- EVP_CIPHER_CTX_cleanup() for the des contexts; pruiksma@freesurf.fr
- - jakob@cvs.openbsd.org 2003/12/23 16:12:10
- [servconf.c servconf.h session.c sshd_config]
- implement KerberosGetAFSToken server option. ok markus@, beck@
- - millert@cvs.openbsd.org 2003/12/29 16:39:50
- [sshd_config]
- KeepAlive has been obsoleted, use TCPKeepAlive instead; markus@ OK
- - dtucker@cvs.openbsd.org 2003/12/31 00:24:50
- [auth2-passwd.c]
- Ignore password change request during password auth (which we currently
- don't support) and discard proposed new password. corrections/ok markus@
- - (dtucker) [configure.ac] Only test setresuid and setresgid if they exist.
-
-20031219
- - (dtucker) [defines.h] Bug #458: Define SIZE_T_MAX as UINT_MAX if we
- typedef size_t ourselves.
-
-20031218
- - (dtucker) [configure.ac] Don't use setre[ug]id on DG-UX, from Tom Orban.
- - (dtucker) [auth-pam.c] Do PAM chauthtok during SSH2 keyboard-interactive
- authentication. Partially fixes bug #423. Feedback & ok djm@
-
-20031217
+ missing bzero; from mickey; ok djm@
+ - markus@cvs.openbsd.org 2008/07/10 18:08:11
+ [clientloop.c monitor.c monitor_wrap.c packet.c packet.h sshd.c]
+ sync v1 and v2 traffic accounting; add it to sshd, too;
+ ok djm@, dtucker@
+
+20080709
+ - (djm) [Makefile.in] Print "all tests passed" when all regress tests pass
+ - (djm) [auth1.c] Fix format string vulnerability in protocol 1 PAM
+ account check failure path. The vulnerable format buffer is supplied
+ from PAM and should not contain attacker-supplied data.
+ - (djm) [auth.c] Missing unistd.h for close()
+ - (djm) [configure.ac] Add -Wformat-security to CFLAGS for gcc 3.x and 4.x
+
+20080705
+ - (djm) [auth.c] Fixed test for locked account on HP/UX with shadowed
+ passwords disabled. bz#1083 report & patch from senthilkumar_sen AT
+ hotpop.com, w/ dtucker@
+ - (djm) [atomicio.c configure.ac] Disable poll() fallback in atomiciov for
+ Tru64. readv doesn't seem to be a comparable object there.
+ bz#1386, patch from dtucker@ ok me
+ - (djm) [Makefile.in] Pass though pass to conch for interop tests
+ - (djm) [configure.ac] unbreak: remove extra closing brace
- (djm) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/12/09 15:28:43
- [serverloop.c]
- make ClientKeepAlive work for ssh -N, too (no login shell requested).
- 1) send a bogus channel request if we find a channel
- 2) send a bogus global request if we don't have a channel
- ok + test beck@
- - markus@cvs.openbsd.org 2003/12/09 17:29:04
- [sshd.c]
- fix -o and HUP; ok henning@
- - markus@cvs.openbsd.org 2003/12/09 17:30:05
- [ssh.c]
- don't modify argv for ssh -o; similar to sshd.c 1.283
- - markus@cvs.openbsd.org 2003/12/09 21:53:37
- [readconf.c readconf.h scp.1 servconf.c servconf.h sftp.1 ssh.1]
- [ssh_config.5 sshconnect.c sshd.c sshd_config.5]
- rename keepalive to tcpkeepalive; the old name causes too much
- confusion; ok djm, dtucker; with help from jmc@
- - dtucker@cvs.openbsd.org 2003/12/09 23:45:32
- [clientloop.c]
- Clear exit code when ssh -N is terminated with a SIGTERM. ok markus@
- - markus@cvs.openbsd.org 2003/12/14 12:37:21
- [ssh_config.5]
- we don't support GSS KEX; from Simon Wilkinson
- - markus@cvs.openbsd.org 2003/12/16 15:49:51
- [clientloop.c clientloop.h readconf.c readconf.h scp.1 sftp.1 ssh.1]
- [ssh.c ssh_config.5]
- application layer keep alive (ServerAliveInterval ServerAliveCountMax)
- for ssh(1), similar to the sshd(8) option; ok beck@; with help from
- jmc and dtucker@
- - markus@cvs.openbsd.org 2003/12/16 15:51:54
- [dh.c]
- use <= instead of < in dh_estimate; ok provos/hshoexer;
- do not return < DH_GRP_MIN
- - (dtucker) [acconfig.h configure.ac uidswap.c] Bug #645: Check for
- setres[ug]id() present but not implemented (eg some Linux/glibc
- combinations).
- - (bal) [openbsd-compat/bsd-misc.c] unset 'signal' defined if we are
- using a real 'signal()' (Noticed by a NeXT Compile)
-
-20031209
+ - djm@cvs.openbsd.org 2008/07/04 23:08:25
+ [packet.c]
+ handle EINTR in packet_write_poll()l ok dtucker@
+ - djm@cvs.openbsd.org 2008/07/04 23:30:16
+ [auth1.c auth2.c]
+ Make protocol 1 MaxAuthTries logic match protocol 2's.
+ Do not treat the first protocol 2 authentication attempt as
+ a failure IFF it is for method "none".
+ Makes MaxAuthTries' user-visible behaviour identical for
+ protocol 1 vs 2.
+ ok dtucker@
+ - djm@cvs.openbsd.org 2008/07/05 05:16:01
+ [PROTOCOL]
+ grammar
+
+20080704
- (dtucker) OpenBSD CVS Sync
- - matthieu@cvs.openbsd.org 2003/11/25 23:10:08
- [ssh-add.1]
- ssh-add doesn't need to be a descendant of ssh-agent. Ok markus@, jmc@.
- - djm@cvs.openbsd.org 2003/11/26 21:44:29
- [cipher-aes.c]
- fix #ifdef before #define; ok markus@
- (RCS ID sync only, Portable already had this)
- - markus@cvs.openbsd.org 2003/12/02 12:15:10
- [progressmeter.c]
- improvments from andreas@:
- * saner speed estimate for transfers that takes less than a second by
- rounding the time to 1 second.
- * when the transfer is finished calculate the actual total speed
- rather than the current speed which is given during the transfer
- - markus@cvs.openbsd.org 2003/12/02 17:01:15
- [channels.c session.c ssh-agent.c ssh.h sshd.c]
- use SSH_LISTEN_BACKLOG (=128) in listen(2).
- - djm@cvs.openbsd.org 2003/12/07 06:34:18
- [moduli.c]
- remove unused debugging #define templates
- - markus@cvs.openbsd.org 2003/12/08 11:00:47
- [kexgexc.c]
- print requested group size in debug; ok djm
- - dtucker@cvs.openbsd.org 2003/12/09 13:52:55
- [moduli.c]
- Prevent ssh-keygen -T from outputting moduli with a generator of 0, since
- they can't be used for Diffie-Hellman. Assistance and ok djm@
- - (dtucker) [ssh-keyscan.c] Sync RCSIDs, missed in SSH_SSFDMAX change below.
-
-20031208
- - (tim) [configure.ac] Bug 770. Fix --without-rpath.
-
-20031123
- - (djm) [canohost.c] Move IPv4inV6 mapped address normalisation to its own
- function and call it unconditionally
- - (djm) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2003/11/23 23:17:34
- [ssh-keyscan.c]
- from portable - use sysconf to detect fd limit; ok markus@
- (tidy diff by adding SSH_SSFDMAX macro to defines.h)
- - djm@cvs.openbsd.org 2003/11/23 23:18:45
- [ssh-keygen.c]
- consistency PATH_MAX -> MAXPATHLEN; ok markus@
- (RCS ID sync only)
- - djm@cvs.openbsd.org 2003/11/23 23:21:21
- [scp.c]
- from portable: rename clashing variable limit-> limit_rate; ok markus@
- (RCS ID sync only)
- - dtucker@cvs.openbsd.org 2003/11/24 00:16:35
+ - djm@cvs.openbsd.org 2008/07/02 13:30:34
+ [auth2.c]
+ really really remove the freebie "none" auth try for protocol 2
+ - djm@cvs.openbsd.org 2008/07/02 13:47:39
[ssh.1 ssh.c]
- Make ssh -k mean GSSAPIDelegateCredentials=no. Suggestion & ok markus@
- - (djm) Annotate OpenBSD-derived files in openbsd-compat/ with original
- source file path (in OpenBSD tree).
-
-20031122
- - (dtucker) [channels.c] Make AIX write limit code clearer. Suggested by djm@
- - (dtucker) [auth-passwd.c openbsd-compat/port-aix.c openbsd-compat/port-aix.h]
- Move AIX specific password authentication code to port-aix.c, call
- authenticate() until reenter flag is clear.
- - (dtucker) [auth-sia.c configure.ac] Tru64 update from cmadams at hiwaay.net.
- Use permanently_set_uid for SIA, only define DISABLE_FD_PASSING when SIA
- is enabled, rely on SIA to check for locked accounts if enabled. ok djm@
- - (djm) [scp.c] Rename limitbw -> limit_rate to match upstreamed patch
- - (djm) [sftp-int.c] Remove duplicated code from bogus sync
- - (djm) [packet.c] Shuffle #ifdef to reduce conditionally compiled code
-
-20031121
- - (djm) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/11/20 11:39:28
- [progressmeter.c]
- fix rounding errors; from andreas@
- - djm@cvs.openbsd.org 2003/11/21 11:57:03
- [everything]
- unexpand and delete whitespace at EOL; ok markus@
- (done locally and RCS IDs synced)
-
-20031118
- - (djm) Fix early exit for root auth success when UsePAM=yes and
- PermitRootLogin=no
- - (dtucker) [auth-pam.c] Convert chauthtok_conv into a generic tty_conv,
- and use it for do_pam_session. Fixes problems like pam_motd not
- displaying anything. ok djm@
- - (dtucker) [auth-pam.c] Only use pam_putenv if our platform has it. ok djm@
- - (djm) OpenBSD CVS Sync
- - dtucker@cvs.openbsd.org 2003/11/18 00:40:05
- [serverloop.c]
- Correct check for authctxt->valid. ok djm@
- - djm@cvs.openbsd.org 2003/11/18 10:53:07
+ When forking after authentication ("ssh -f") with ExitOnForwardFailure
+ enabled, delay the fork until after replies for any -R forwards have
+ been seen. Allows for robust detection of -R forward failure when
+ using -f (similar to bz#92); ok dtucker@
+ - otto@cvs.openbsd.org 2008/07/03 21:46:58
+ [auth2-pubkey.c]
+ avoid nasty double free; ok dtucker@ djm@
+ - djm@cvs.openbsd.org 2008/07/04 03:44:59
+ [servconf.c groupaccess.h groupaccess.c]
+ support negation of groups in "Match group" block (bz#1315); ok dtucker@
+ - dtucker@cvs.openbsd.org 2008/07/04 03:47:02
[monitor.c]
- unbreak fake authloop for non-existent users (my screwup). Spotted and
- tested by dtucker@; ok markus@
+ Make debug a little clearer. ok djm@
+ - djm@cvs.openbsd.org 2008/06/30 08:07:34
+ [regress/key-options.sh]
+ shell portability: use "=" instead of "==" in test(1) expressions,
+ double-quote string with backslash escaped /
+ - djm@cvs.openbsd.org 2008/06/30 10:31:11
+ [regress/{putty-transfer,putty-kex,putty-ciphers}.sh]
+ remove "set -e" left over from debugging
+ - djm@cvs.openbsd.org 2008/06/30 10:43:03
+ [regress/conch-ciphers.sh]
+ explicitly disable conch options that could interfere with the test
+ - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link
+ returns EXDEV. Patch from Mike Garrison, ok djm@
+ - (djm) [atomicio.c channels.c clientloop.c defines.h includes.h]
+ [packet.c scp.c serverloop.c sftp-client.c ssh-agent.c ssh-keyscan.c]
+ [sshd.c] Explicitly handle EWOULDBLOCK wherever we handle EAGAIN, on
+ some platforms (HP nonstop) it is a distinct errno;
+ bz#1467 reported by sconeu AT yahoo.com; ok dtucker@
+
+20080702
+ - (dtucker) OpenBSD CVS Sync
+ - djm@cvs.openbsd.org 2008/06/30 08:05:59
+ [PROTOCOL.agent]
+ typo: s/constraint_date/constraint_data/
+ - djm@cvs.openbsd.org 2008/06/30 12:15:39
+ [serverloop.c]
+ only pass channel requests on session channels through to the session
+ channel handler, avoiding spurious log messages; ok! markus@
+ - djm@cvs.openbsd.org 2008/06/30 12:16:02
+ [nchan.c]
+ only send eow@openssh.com notifications for session channels; ok! markus@
+ - djm@cvs.openbsd.org 2008/06/30 12:18:34
+ [PROTOCOL]
+ clarify that eow@openssh.com is only sent on session channels
+ - dtucker@cvs.openbsd.org 2008/07/01 07:20:52
+ [sshconnect.c]
+ Check ExitOnForwardFailure if forwardings are disabled due to a failed
+ host key check. ok djm@
+ - dtucker@cvs.openbsd.org 2008/07/01 07:24:22
+ [sshconnect.c sshd.c]
+ Send CR LF during protocol banner exchanges, but only for Protocol 2 only,
+ in order to comply with RFC 4253. bz #1443, ok djm@
+ - stevesk@cvs.openbsd.org 2008/07/01 23:12:47
+ [PROTOCOL.agent]
+ fix some typos; ok djm@
+ - djm@cvs.openbsd.org 2008/07/02 02:24:18
+ [sshd_config sshd_config.5 sshd.8 servconf.c]
+ increase default size of ssh protocol 1 ephemeral key from 768 to 1024
+ bits; prodded by & ok dtucker@ ok deraadt@
+ - dtucker@cvs.openbsd.org 2008/07/02 12:03:51
+ [auth-rsa.c auth.c auth2-pubkey.c auth.h]
+ Merge duplicate host key file checks, based in part on a patch from Rob
+ Holland via bz #1348 . Also checks for non-regular files during protocol
+ 1 RSA auth. ok djm@
+ - djm@cvs.openbsd.org 2008/07/02 12:36:39
+ [auth2-none.c auth2.c]
+ Make protocol 2 MaxAuthTries behaviour a little more sensible:
+ Check whether client has exceeded MaxAuthTries before running
+ an authentication method and skip it if they have, previously it
+ would always allow one try (for "none" auth).
+ Preincrement failure count before post-auth test - previously this
+ checked and postincremented, also to allow one "none" try.
+ Together, these two changes always count the "none" auth method
+ which could be skipped by a malicious client (e.g. an SSH worm)
+ to get an extra attempt at a real auth method. They also make
+ MaxAuthTries=0 a useful way to block users entirely (esp. in a
+ sshd_config Match block).
+ Also, move sending of any preauth banner from "none" auth method
+ to the first call to input_userauth_request(), so worms that skip
+ the "none" method get to see it too.
+
+20080630
+ - (djm) OpenBSD CVS Sync
+ - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
+ [regress/Makefile regress/key-options.sh]
+ Add regress test for key options. ok djm@
+ - dtucker@cvs.openbsd.org 2008/06/11 23:11:40
+ [regress/Makefile]
+ Don't run cipher-speed test by default; mistakenly enabled by me
+ - djm@cvs.openbsd.org 2008/06/28 13:57:25
+ [regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh]
+ very basic regress test against Twisted Conch in "make interop"
+ target (conch is available in ports/devel/py-twisted/conch);
+ ok markus@
+ - (djm) [regress/Makefile] search for conch by path, like we do putty
-20031117
+20080629
- (djm) OpenBSD CVS Sync
- - djm@cvs.openbsd.org 2003/11/03 09:03:37
- [auth-chall.c]
- make this a little more idiot-proof; ok markus@
- (includes portable-specific changes)
- - jakob@cvs.openbsd.org 2003/11/03 09:09:41
- [sshconnect.c]
- move changed key warning into warn_changed_key(). ok markus@
- - jakob@cvs.openbsd.org 2003/11/03 09:37:32
- [sshconnect.c]
- do not free static type pointer in warn_changed_key()
- - djm@cvs.openbsd.org 2003/11/04 08:54:09
- [auth1.c auth2.c auth2-pubkey.c auth.h auth-krb5.c auth-passwd.c]
- [auth-rhosts.c auth-rh-rsa.c auth-rsa.c monitor.c serverloop.c]
+ - martynas@cvs.openbsd.org 2008/06/21 07:46:46
+ [sftp.c]
+ use optopt to get invalid flag, instead of return value of getopt,
+ which is always '?'; ok djm@
+ - otto@cvs.openbsd.org 2008/06/25 11:13:43
+ [key.c]
+ add key length to visual fingerprint; zap magical constants;
+ ok grunk@ djm@
+ - djm@cvs.openbsd.org 2008/06/26 06:10:09
+ [sftp-client.c sftp-server.c]
+ allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky
+ bits. Note that this only affects explicit setting of modes (e.g. via
+ sftp(1)'s chmod command) and not file transfers. (bz#1310)
+ ok deraadt@ at c2k8
+ - djm@cvs.openbsd.org 2008/06/26 09:19:40
+ [dh.c dh.h moduli.c]
+ when loading moduli from /etc/moduli in sshd(8), check that they
+ are of the expected "safe prime" structure and have had
+ appropriate primality tests performed;
+ feedback and ok dtucker@
+ - grunk@cvs.openbsd.org 2008/06/26 11:46:31
+ [readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c]
+ Move SSH Fingerprint Visualization away from sharing the config option
+ CheckHostIP to an own config option named VisualHostKey.
+ While there, fix the behaviour that ssh would draw a random art picture
+ on every newly seen host even when the option was not enabled.
+ prodded by deraadt@, discussions,
+ help and ok markus@ djm@ dtucker@
+ - jmc@cvs.openbsd.org 2008/06/26 21:11:46
+ [ssh.1]
+ add VisualHostKey to the list of options listed in -o;
+ - djm@cvs.openbsd.org 2008/06/28 07:25:07
+ [PROTOCOL]
+ spelling fixes
+ - djm@cvs.openbsd.org 2008/06/28 13:58:23
+ [ssh-agent.c]
+ refuse to add a key that has unknown constraints specified;
+ ok markus
+ - djm@cvs.openbsd.org 2008/06/28 14:05:15
+ [ssh-agent.c]
+ reset global compat flag after processing a protocol 2 signature
+ request with the legacy DSA encoding flag set; ok markus
+ - djm@cvs.openbsd.org 2008/06/28 14:08:30
+ [PROTOCOL PROTOCOL.agent]
+ document the protocol used by ssh-agent; "looks ok" markus@
+
+20080628
+ - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec]
+ RFC.nroff lacks a license, remove it (it is long gone in OpenBSD).
+
+20080626
+ - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD.
+ (bz#1372)
+ - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
+ [contrib/suse/openssh.spec] Include moduli.5 in RPM spec files.
+
+20080616
+ - (dtucker) OpenBSD CVS Sync
+ - dtucker@cvs.openbsd.org 2008/06/16 13:22:53
+ [session.c channels.c]
+ Rename the isatty argument to is_tty so we don't shadow
+ isatty(3). ok markus@
+ - (dtucker) [channels.c] isatty -> is_tty here too.
+
+20080615
+ - (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc.
+ - OpenBSD CVS Sync
+ - dtucker@cvs.openbsd.org 2008/06/14 15:49:48
+ [sshd.c]
+ wrap long line at 80 chars
+ - dtucker@cvs.openbsd.org 2008/06/14 17:07:11
+ [sshd.c]
+ ensure default umask disallows at least group and world write; ok djm@
+ - djm@cvs.openbsd.org 2008/06/14 18:33:43
[session.c]
- standardise arguments to auth methods - they should all take authctxt.
- check authctxt->valid rather then pw != NULL; ok markus@
- - jakob@cvs.openbsd.org 2003/11/08 16:02:40
- [auth1.c]
- remove unused variable (pw). ok djm@
- (id sync only - still used in portable)
- - jmc@cvs.openbsd.org 2003/11/08 19:17:29
- [sftp-int.c]
- typos from Jonathon Gray;
- - jakob@cvs.openbsd.org 2003/11/10 16:23:41
- [bufaux.c bufaux.h cipher.c cipher.h hostfile.c hostfile.h key.c]
- [key.h sftp-common.c sftp-common.h sftp-server.c sshconnect.c sshd.c]
- [ssh-dss.c ssh-rsa.c uuencode.c uuencode.h]
- constify. ok markus@ & djm@
- - dtucker@cvs.openbsd.org 2003/11/12 10:12:15
+ suppress the warning message from chdir(homedir) failures
+ when chrooted (bz#1461); ok dtucker
+ - dtucker@cvs.openbsd.org 2008/06/14 19:42:10
+ [scp.1]
+ Mention that scp follows symlinks during -r. bz #1466,
+ from nectar at apple
+ - dtucker@cvs.openbsd.org 2008/06/15 16:55:38
+ [sshd_config.5]
+ MaxSessions is allowed in a Match block too
+ - dtucker@cvs.openbsd.org 2008/06/15 16:58:40
+ [servconf.c sshd_config.5]
+ Allow MaxAuthTries within a Match block. ok djm@
+ - djm@cvs.openbsd.org 2008/06/15 20:06:26
+ [channels.c channels.h session.c]
+ don't call isatty() on a pty master, instead pass a flag down to
+ channel_set_fds() indicating that te fds refer to a tty. Fixes a
+ hang on exit on Solaris (bz#1463) in portable but is actually
+ a generic bug; ok dtucker deraadt markus
+
+20080614
+ - (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction
+ replacement code; patch from ighighi AT gmail.com in bz#1240;
+ ok dtucker
+
+20080613
+ - (dtucker) OpenBSD CVS Sync
+ - deraadt@cvs.openbsd.org 2008/06/13 09:44:36
+ [packet.c]
+ compile on older gcc; no decl after code
+ - dtucker@cvs.openbsd.org 2008/06/13 13:56:59
+ [monitor.c]
+ Clear key options in the monitor on failed authentication, prevents
+ applying additional restrictions to non-pubkey authentications in
+ the case where pubkey fails but another method subsequently succeeds.
+ bz #1472, found by Colin Watson, ok markus@ djm@
+ - dtucker@cvs.openbsd.org 2008/06/13 14:18:51
+ [auth2-pubkey.c auth-rhosts.c]
+ Include unistd.h for close(), prevents warnings in -portable
+ - dtucker@cvs.openbsd.org 2008/06/13 17:21:20
+ [mux.c]
+ Friendlier error messages for mux fallback. ok djm@
+ - dtucker@cvs.openbsd.org 2008/06/13 18:55:22
[scp.c]
- When called with -q, pass -q to ssh; suppresses SSH2 banner. ok markus@
- - jakob@cvs.openbsd.org 2003/11/12 16:39:58
- [dns.c dns.h readconf.c ssh_config.5 sshconnect.c]
- update SSHFP validation. ok markus@
- - jmc@cvs.openbsd.org 2003/11/12 20:14:51
- [ssh_config.5]
- make verb agree with subject, and kill some whitespace;
- - markus@cvs.openbsd.org 2003/11/14 13:19:09
- [sshconnect2.c]
- cleanup and minor fixes for the client code; from Simon Wilkinson
- - djm@cvs.openbsd.org 2003/11/17 09:45:39
- [msg.c msg.h sshconnect2.c ssh-keysign.c]
- return error on msg send/receive failure (rather than fatal); ok markus@
- - markus@cvs.openbsd.org 2003/11/17 11:06:07
- [auth2-gss.c gss-genr.c gss-serv.c monitor.c monitor.h monitor_wrap.c]
- [monitor_wrap.h sshconnect2.c ssh-gss.h]
- replace "gssapi" with "gssapi-with-mic"; from Simon Wilkinson;
- test + ok jakob.
- - (djm) Bug #632: Don't call pam_end indirectly from within kbd-int
- conversation function
- - (djm) Export environment variables from authentication subprocess to
- parent. Part of Bug #717
-
-20031115
- - (dtucker) [regress/agent-ptrace.sh] Test for GDB output from Solaris and
- HP-UX, skip test on AIX.
-
-20031113
- - (dtucker) [auth-pam.c] Append newlines to lines output by the
- pam_chauthtok_conv().
- - (dtucker) [README ssh-host-config ssh-user-config Makefile] (All
- contrib/cygwin). Major update from vinschen at redhat.com.
- - Makefile provides a `cygwin-postinstall' target to run right after
- `make install'.
- - Better support for Windows 2003 Server.
- - Try to get permissions as correct as possible.
- - New command line options to allow full automated host configuration.
- - Create configs from skeletons in /etc/defaults/etc.
- - Use /bin/bash, allows reading user input with readline support.
- - Remove really old configs from /usr/local.
- - (dtucker) [auth-pam.c] Add newline to accumulated PAM_TEXT_INFO and
- PAM_ERROR_MSG messages.
-
-20031106
- - (djm) Clarify UsePAM consequences a little more
-
-20031103
- - (dtucker) [contrib/cygwin/ssh-host-config] Ensure entries in /etc/services
- are created correctly with CRLF line terminations. Patch from vinschen at
- redhat.com.
+ Prevent -Wsign-compare warnings on LP64 systems. bz #1192, ok deraadt@
+ - grunk@cvs.openbsd.org 2008/06/13 20:13:26
+ [ssh.1]
+ Explain the use of SSH fpr visualization using random art, and cite the
+ original scientific paper inspiring that technique.
+ Much help with English and nroff by jmc@, thanks.
+ - (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which
+ despite its name doesn't seem to implement all of GSSAPI. Patch from
+ Jan Engelhardt, sanity checked by Simon Wilkinson.
+
+20080612
- (dtucker) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/10/15 09:48:45
- [monitor_wrap.c]
- check pmonitor != NULL
- - markus@cvs.openbsd.org 2003/10/21 09:50:06
- [auth2-gss.c]
- make sure the doid is larger than 2
- - avsm@cvs.openbsd.org 2003/10/26 16:57:43
- [sshconnect2.c]
- rename 'supported' static var in userauth_gssapi() to 'gss_supported'
- to avoid shadowing the global version. markus@ ok
- - markus@cvs.openbsd.org 2003/10/28 09:08:06
+ - jmc@cvs.openbsd.org 2008/06/11 07:30:37
+ [sshd.8]
+ kill trailing whitespace;
+ - grunk@cvs.openbsd.org 2008/06/11 21:01:35
+ [ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
+ sshconnect.c]
+ Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
+ graphical hash visualization schemes known as "random art", and by
+ Dan Kaminsky's musings on the subject during a BlackOp talk at the
+ 23C3 in Berlin.
+ Scientific publication (original paper):
+ "Hash Visualization: a New Technique to improve Real-World Security",
+ Perrig A. and Song D., 1999, International Workshop on Cryptographic
+ Techniques and E-Commerce (CrypTEC '99)
+ http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
+ The algorithm used here is a worm crawling over a discrete plane,
+ leaving a trace (augmenting the field) everywhere it goes.
+ Movement is taken from dgst_raw 2bit-wise. Bumping into walls
+ makes the respective movement vector be ignored for this turn,
+ thus switching to the other color of the chessboard.
+ Graphs are not unambiguous for now, because circles in graphs can be
+ walked in either direction.
+ discussions with several people,
+ help, corrections and ok markus@ djm@
+ - grunk@cvs.openbsd.org 2008/06/11 21:38:25
+ [ssh-keygen.c]
+ ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub
+ would not display you the random art as intended, spotted by canacar@
+ - grunk@cvs.openbsd.org 2008/06/11 22:20:46
+ [ssh-keygen.c ssh-keygen.1]
+ ssh-keygen would write fingerprints to STDOUT, and random art to STDERR,
+ that is not how it was envisioned.
+ Also correct manpage saying that -v is needed along with -l for it to work.
+ spotted by naddy@
+ - otto@cvs.openbsd.org 2008/06/11 23:02:22
+ [key.c]
+ simpler way of computing the augmentations; ok grunk@
+ - grunk@cvs.openbsd.org 2008/06/11 23:03:56
+ [ssh_config.5]
+ CheckHostIP set to ``fingerprint'' will display both hex and random art
+ spotted by naddy@
+ - grunk@cvs.openbsd.org 2008/06/11 23:51:57
+ [key.c]
+ #define statements that are not atoms need braces around them, else they
+ will cause trouble in some cases.
+ Also do a computation of -1 once, and not in a loop several times.
+ spotted by otto@
+ - dtucker@cvs.openbsd.org 2008/06/12 00:03:49
+ [dns.c canohost.c sshconnect.c]
+ Do not pass "0" strings as ports to getaddrinfo because the lookups
+ can slow things down and we never use the service info anyway. bz
+ #859, patch from YOSHIFUJI Hideaki and John Devitofranceschi. ok
+ deraadt@ djm@
+ djm belives that the reason for the "0" strings is to ensure that
+ it's not possible to call getaddrinfo with both host and port being
+ NULL. In the case of canohost.c host is a local array. In the
+ case of sshconnect.c, it's checked for null immediately before use.
+ In dns.c it ultimately comes from ssh.c:main() and is guaranteed to
+ be non-null but it's not obvious, so I added a warning message in
+ case it is ever passed a null.
+ - grunk@cvs.openbsd.org 2008/06/12 00:13:55
+ [sshconnect.c]
+ Make ssh print the random art also when ssh'ing to a host using IP only.
+ spotted by naddy@, ok and help djm@ dtucker@
+ - otto@cvs.openbsd.org 2008/06/12 00:13:13
+ [key.c]
+ use an odd number of rows and columns and a separate start marker, looks
+ better; ok grunk@
+ - djm@cvs.openbsd.org 2008/06/12 03:40:52
+ [clientloop.h mux.c channels.c clientloop.c channels.h]
+ Enable ~ escapes for multiplex slave sessions; give each channel
+ its own escape state and hook the escape filters up to muxed
+ channels. bz #1331
+ Mux slaves do not currently support the ~^Z and ~& escapes.
+ NB. this change cranks the mux protocol version, so a new ssh
+ mux client will not be able to connect to a running old ssh
+ mux master.
+ ok dtucker@
+ - djm@cvs.openbsd.org 2008/06/12 04:06:00
+ [clientloop.h ssh.c clientloop.c]
+ maintain an ordered queue of outstanding global requests that we
+ expect replies to, similar to the per-channel confirmation queue.
+ Use this queue to verify success or failure for remote forward
+ establishment in a race free way.
+ ok dtucker@
+ - djm@cvs.openbsd.org 2008/06/12 04:17:47
+ [clientloop.c]
+ thall shalt not code past the eightieth column
+ - djm@cvs.openbsd.org 2008/06/12 04:24:06
+ [ssh.c]
+ thal shalt not code past the eightieth column
+ - djm@cvs.openbsd.org 2008/06/12 05:15:41
+ [PROTOCOL]
+ document tun@openssh.com forwarding method
+ - djm@cvs.openbsd.org 2008/06/12 05:32:30
+ [mux.c]
+ some more TODO for me
+ - grunk@cvs.openbsd.org 2008/06/12 05:42:46
+ [key.c]
+ supply the key type (rsa1, rsa, dsa) as a caption in the frame of the
+ random art. while there, stress the fact that the field base should at
+ least be 8 characters for the pictures to make sense.
+ comment and ok djm@
+ - grunk@cvs.openbsd.org 2008/06/12 06:32:59
+ [key.c]
+ We already mark the start of the worm, now also mark the end of the worm
+ in our random art drawings.
+ ok djm@
+ - djm@cvs.openbsd.org 2008/06/12 15:19:17
+ [clientloop.h channels.h clientloop.c channels.c mux.c]
+ The multiplexing escape char handler commit last night introduced a
+ small memory leak per session; plug it.
+ - dtucker@cvs.openbsd.org 2008/06/12 16:35:31
+ [ssh_config.5 ssh.c]
+ keyword expansion for localcommand. ok djm@
+ - jmc@cvs.openbsd.org 2008/06/12 19:10:09
+ [ssh_config.5 ssh-keygen.1]
+ tweak the ascii art text; ok grunk
+ - dtucker@cvs.openbsd.org 2008/06/12 20:38:28
+ [sshd.c sshconnect.c packet.h misc.c misc.h packet.c]
+ Make keepalive timeouts apply while waiting for a packet, particularly
+ during key renegotiation (bz #1363). With djm and Matt Day, ok djm@
+ - djm@cvs.openbsd.org 2008/06/12 20:47:04
+ [sftp-client.c]
+ print extension revisions for extensions that we understand
+ - djm@cvs.openbsd.org 2008/06/12 21:06:25
+ [clientloop.c]
+ I was coalescing expected global request confirmation replies at
+ the wrong end of the queue - fix; prompted by markus@
+ - grunk@cvs.openbsd.org 2008/06/12 21:14:46
+ [ssh-keygen.c]
+ make ssh-keygen -lf show the key type just as ssh-add -l would do it
+ ok djm@ markus@
+ - grunk@cvs.openbsd.org 2008/06/12 22:03:36
+ [key.c]
+ add my copyright, ok djm@
+ - ian@cvs.openbsd.org 2008/06/12 23:24:58
+ [sshconnect.c]
+ tweak wording in message, ok deraadt@ jmc@
+ - dtucker@cvs.openbsd.org 2008/06/13 00:12:02
+ [sftp.h log.h]
+ replace __dead with __attribute__((noreturn)), makes things
+ a little easier to port. Also, add it to sigdie(). ok djm@
+ - djm@cvs.openbsd.org 2008/06/13 00:16:49
+ [mux.c]
+ fall back to creating a new TCP connection on most multiplexing errors
+ (socket connect fail, invalid version, refused permittion, corrupted
+ messages, etc.); bz #1329 ok dtucker@
+ - dtucker@cvs.openbsd.org 2008/06/13 00:47:53
+ [mux.c]
+ upcast size_t to u_long to match format arg; ok djm@
+ - dtucker@cvs.openbsd.org 2008/06/13 00:51:47
+ [mac.c]
+ upcast another size_t to u_long to match format
+ - dtucker@cvs.openbsd.org 2008/06/13 01:38:23
[misc.c]
- error->debug for getsockopt+TCP_NODELAY; several requests
- - markus@cvs.openbsd.org 2003/11/02 11:01:03
- [auth2-gss.c compat.c compat.h sshconnect2.c]
- remove support for SSH_BUG_GSSAPI_BER; simon@sxw.org.uk
- - (dtucker) [regress/agent-ptrace.sh] Use numeric uid and gid.
-
-20031021
- - (dtucker) [INSTALL] Some system crypt() functions support MD5 passwords
- directly. Noted by Darren.Moffat at sun.com.
- - (dtucker) [regress/agent-ptrace.sh] Skip agent-test unless SUDO is set,
- make agent setgid during test.
-
-20031017
- - (dtucker) [INSTALL] Note that --with-md5 is now required on platforms with
- MD5 passwords even if PAM support is enabled. From steev at detritus.net.
-
-20031015
+ upcast uid to long with matching %ld, prevents warnings in portable
+ - djm@cvs.openbsd.org 2008/06/13 04:40:22
+ [auth2-pubkey.c auth-rhosts.c]
+ refuse to read ~/.shosts or ~/.ssh/authorized_keys that are not
+ regular files; report from Solar Designer via Colin Watson in bz#1471
+ ok dtucker@ deraadt
+ - (dtucker) [clientloop.c serverloop.c] channel_register_filter now
+ takes 2 more args. with djm@
+ - (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch
+ from Todd Vierling.
+ - (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA
+ systems. Patch from R. Scott Bailey.
+ - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used
+ on big endian machines, so ifdef them for little-endian only to prevent
+ unused function warnings on big-endians.
+ - (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent
+ compiler warnings on some platforms. Based on a discussion with otto@
+
+20080611
+ - (djm) [channels.c configure.ac]
+ Do not set SO_REUSEADDR on wildcard X11 listeners (X11UseLocalhost=no)
+ bz#1464; ok dtucker
+
+20080610
- (dtucker) OpenBSD CVS Sync
- - jmc@cvs.openbsd.org 2003/10/08 08:27:36
- [scp.1 scp.c sftp-server.8 sftp.1 sftp.c ssh.1 sshd.8]
- scp and sftp: add options list and sort options. options list requested
- by deraadt@
- sshd: use same format as ssh
- ssh: remove wrong option from list
- sftp-server: Subsystem is documented in ssh_config(5), not sshd(8)
- ok deraadt@ markus@
- - markus@cvs.openbsd.org 2003/10/08 15:21:24
- [readconf.c ssh_config.5]
- default GSS API to no in client, too; ok jakob, deraadt@
- - markus@cvs.openbsd.org 2003/10/11 08:24:08
- [readconf.c readconf.h ssh.1 ssh.c ssh_config.5]
- remote x11 clients are now untrusted by default, uses xauth(8) to generate
- untrusted cookies; ForwardX11Trusted=yes restores old behaviour.
- ok deraadt; feedback and ok djm/fries
- - markus@cvs.openbsd.org 2003/10/11 08:26:43
- [sshconnect2.c]
- search keys in reverse order; fixes #684
- - markus@cvs.openbsd.org 2003/10/11 11:36:23
- [monitor_wrap.c]
- return NULL for missing banner; ok djm@
- - jmc@cvs.openbsd.org 2003/10/12 13:12:13
+ - djm@cvs.openbsd.org 2008/06/10 03:57:27
+ [servconf.c match.h sshd_config.5]
+ support CIDR address matching in sshd_config "Match address" blocks, with
+ full support for negation and fall-back to classic wildcard matching.
+ For example:
+ Match address 192.0.2.0/24,3ffe:ffff::/32,!10.*
+ PasswordAuthentication yes
+ addrmatch.c code mostly lifted from flowd's addr.c
+ feedback and ok dtucker@
+ - djm@cvs.openbsd.org 2008/06/10 04:17:46
+ [sshd_config.5]
+ better reference for pattern-list
+ - dtucker@cvs.openbsd.org 2008/06/10 04:50:25
+ [sshd.c channels.h channels.c log.c servconf.c log.h servconf.h sshd.8]
+ Add extended test mode (-T) and connection parameters for test mode (-C).
+ -T causes sshd to write its effective configuration to stdout and exit.
+ -C causes any relevant Match rules to be applied before output. The
+ combination allows tesing of the parser and config files. ok deraadt djm
+ - jmc@cvs.openbsd.org 2008/06/10 07:12:00
+ [sshd_config.5]
+ tweak previous;
+ - jmc@cvs.openbsd.org 2008/06/10 08:17:40
+ [sshd.8 sshd.c]
+ - update usage()
+ - fix SYNOPSIS, and sort options
+ - some minor additional fixes
+ - dtucker@cvs.openbsd.org 2008/06/09 18:06:32
+ [regress/test-exec.sh]
+ Don't generate putty keys if we're not going to use them. ok djm
+ - dtucker@cvs.openbsd.org 2008/06/10 05:23:32
+ [regress/addrmatch.sh regress/Makefile]
+ Regress test for Match CIDR rules. ok djm@
+ - dtucker@cvs.openbsd.org 2008/06/10 15:21:41
+ [test-exec.sh]
+ Use a more portable construct for checking if we're running a putty test
+ - dtucker@cvs.openbsd.org 2008/06/10 15:28:49
+ [test-exec.sh]
+ Add quotes
+ - dtucker@cvs.openbsd.org 2008/06/10 18:21:24
[ssh_config.5]
- note that EnableSSHKeySign should be in the non-hostspecific section;
- remove unnecessary .Pp;
- ok markus@
- - markus@cvs.openbsd.org 2003/10/13 08:22:25
- [scp.1 sftp.1]
- don't refer to options related to forwarding; ok jmc@
- - jakob@cvs.openbsd.org 2003/10/14 19:42:10
- [dns.c dns.h readconf.c ssh-keygen.c sshconnect.c]
- include SSHFP lookup code (not enabled by default). ok markus@
- - jakob@cvs.openbsd.org 2003/10/14 19:43:23
- [README.dns]
- update
- - markus@cvs.openbsd.org 2003/10/14 19:54:39
- [session.c ssh-agent.c]
- 10X for mkdtemp; djm@
- - (dtucker) [acconfig.h configure.ac dns.c openbsd-compat/getrrsetbyname.c
- openbsd-compat/getrrsetbyname.h] DNS fingerprint support is now always
- compiled in but disabled in config.
- - (dtucker) [auth.c] Check for disabled password expiry on HP-UX Trusted Mode.
- - (tim) [regress/banner.sh] portability fix.
-
-20031009
- - (dtucker) [sshd_config.5] UsePAM defaults to "no". ok djm@
-
-20031008
- - (dtucker) OpenBSD CVS Sync
- - dtucker@cvs.openbsd.org 2003/10/07 01:47:27
- [sshconnect2.c]
- Don't use logit for banner, since it truncates to MSGBUFSIZ; bz #668 &
- #707. ok markus@
- - djm@cvs.openbsd.org 2003/10/07 07:04:16
- [sftp-int.c]
- sftp quoting fix from admorten AT umich.edu; ok markus@
- - deraadt@cvs.openbsd.org 2003/10/07 21:58:28
- [sshconnect2.c]
- set ptr to NULL after free
- - dtucker@cvs.openbsd.org 2003/10/07 01:52:13
- [regress/Makefile regress/banner.sh]
- Test SSH2 banner. ok markus@
- - djm@cvs.openbsd.org 2003/10/07 07:04:52
- [regress/sftp-cmds.sh]
- more sftp quoting regress tests; ok markus
-
-20031007
- - (djm) Delete autom4te.cache after autoreconf
- - (dtucker) [auth-pam.c auth-pam.h session.c] Make PAM use the new static
- cleanup functions. With & ok djm@
- - (dtucker) [contrib/redhat/openssh.spec] Bug #714: Now that UsePAM is a
- run-time switch, always build --with-md5-passwords.
- - (dtucker) [configure.ac openbsd-compat/Makefile.in openbsd-compat/strtoul.c]
- Bug #670: add strtoul() to openbsd-compat for platforms lacking it. ok djm@
- - (dtucker) [configure.ac] Bug #715: Set BROKEN_SETREUID and BROKEN_SETREGID
- on Reliant Unix. Patch from Robert.Dahlem at siemens.com.
- - (dtucker) [configure.ac] Bug #710: Check for dlsym() in libdl on
- Reliant Unix. Based on patch from Robert.Dahlem at siemens.com.
-
-20031003
- - (dtucker) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/10/02 10:41:59
- [sshd.c]
- print openssl version, too, several requests; ok henning/djm.
- - markus@cvs.openbsd.org 2003/10/02 08:26:53
- [ssh-gss.h]
- missing $OpenBSD:; dtucker
- - (tim) [contrib/caldera/openssh.spec] Remove obsolete --with-ipv4-default
- option.
-
-20031002
+ clarify that Host patterns are space-separated. ok deraadt
+ - djm@cvs.openbsd.org 2008/06/10 22:15:23
+ [PROTOCOL ssh.c serverloop.c]
+ Add a no-more-sessions@openssh.com global request extension that the
+ client sends when it knows that it will never request another session
+ (i.e. when session multiplexing is disabled). This allows a server to
+ disallow further session requests and terminate the session.
+ Why would a non-multiplexing client ever issue additional session
+ requests? It could have been attacked with something like SSH'jack:
+ http://www.storm.net.nz/projects/7
+ feedback & ok markus
+ - djm@cvs.openbsd.org 2008/06/10 23:06:19
+ [auth-options.c match.c servconf.c addrmatch.c sshd.8]
+ support CIDR address matching in .ssh/authorized_keys from="..." stanzas
+ ok and extensive testing dtucker@
+ - dtucker@cvs.openbsd.org 2008/06/10 23:21:34
+ [bufaux.c]
+ Use '\0' for a nul byte rather than unadorned 0. ok djm@
+ - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
+ [Makefile regress/key-options.sh]
+ Add regress test for key options. ok djm@
+ - (dtucker) [openbsd-compat/fake-rfc2553.h] Add sin6_scope_id to sockaddr_in6
+ since the new CIDR code in addmatch.c references it.
+ - (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6
+ specific tests on platforms that don't do IPv6.
+ - (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well
+ as environment.
+ - (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now.
+
+20080609
- (dtucker) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/09/23 20:17:11
- [Makefile.in auth1.c auth2.c auth.c auth.h auth-krb5.c canohost.c
- cleanup.c clientloop.c fatal.c gss-serv.c log.c log.h monitor.c monitor.h
- monitor_wrap.c monitor_wrap.h packet.c serverloop.c session.c session.h
- ssh-agent.c sshd.c]
- replace fatal_cleanup() and linked list of fatal callbacks with static
- cleanup_exit() function. re-refine cleanup_exit() where appropriate,
- allocate sshd's authctxt eary to allow simpler cleanup in sshd.
- tested by many, ok deraadt@
- - markus@cvs.openbsd.org 2003/09/23 20:18:52
- [progressmeter.c]
- don't print trailing \0; bug #709; Robert.Dahlem@siemens.com
- ok millert/deraadt@
- - markus@cvs.openbsd.org 2003/09/23 20:41:11
- [channels.c channels.h clientloop.c]
- move client only agent code to clientloop.c
- - markus@cvs.openbsd.org 2003/09/26 08:19:29
- [sshd.c]
- no need to set the listen sockets to non-block; ok deraadt@
- - jmc@cvs.openbsd.org 2003/09/29 11:40:51
- [ssh.1]
- - add list of options to -o and .Xr ssh_config(5)
- - some other cleanup
- requested by deraadt@;
- ok deraadt@ markus@
- - markus@cvs.openbsd.org 2003/09/29 20:19:57
- [servconf.c sshd_config]
- GSSAPICleanupCreds -> GSSAPICleanupCredentials
- - (dtucker) [configure.ac] Don't set DISABLE_SHADOW when configuring
- --with-pam. ok djm@
- - (dtucker) [ssh-gss.h] Prototype change missed in sync.
- - (dtucker) [session.c] Fix bus errors on some 64-bit Solaris configurations.
- Based on patches by Matthias Koeppe and Thomas Baden. ok djm@
-
-20030930
- - (bal) Fix issues in openbsd-compat/realpath.c
-
-20030925
- - (dtucker) [configure.ac openbsd-compat/xcrypt.c] Bug #633: Remove
- DISABLE_SHADOW for HP-UX, use getspnam instead of getprpwnam. Patch from
- michael_steffens at hp.com, ok djm@
- - (tim) [sshd_config] UsePAM defaults to no.
-
-20030924
- - (djm) Update version.h and spec files for HEAD
- - (dtucker) [configure.ac] IRIX5 needs the same setre[ug]id defines as IRIX6.
-
-20030923
- - (dtucker) [Makefile.in] Bug #644: Fix "make clean" for out-of-tree
- builds. Portability corrections from tim@.
- - (dtucker) [configure.ac] Bug #665: uid swapping issues on Mac OS X.
- Patch from max at quendi.de.
- - (dtucker) [configure.ac] Bug #657: uid swapping issues on BSDi.
- - (dtucker) [configure.ac] Bug #653: uid swapping issues on Tru64.
- - (dtucker) [configure.ac] Bug #693: uid swapping issues on NCR MP-RAS.
- Patch from david.haughton at ncr.com
- - (dtucker) [configure.ac] Bug #659: uid swapping issues on IRIX 6.
- Part of patch supplied by bugzilla-openssh at thewrittenword.com
- - (dtucker) [configure.ac openbsd-compat/fake-rfc2553.c
- openbsd-compat/fake-rfc2553.h] Bug #659: Test for and handle systems with
- where gai_strerror is defined as "const char *". Part of patch supplied
- by bugzilla-openssh at thewrittenword.com
- - (dtucker) [contrib/cygwin/README contrib/cygwin/ssh-host-config] Update
- ssh-host-config to match current defaults, bump README version. Patch from
- vinschen at redhat.com.
- - (dtucker) [uidswap.c] Don't test restoration of uid on Cygwin since the
- OS does not support permanently dropping privileges. Patch from
- vinschen at redhat.com.
- - (dtucker) [openbsd-compat/port-aix.c] Use correct include for xmalloc.h,
- add canohost.h to stop warning. Based on patch from openssh-unix-dev at
- thewrittenword.com
- - (dtucker) [INSTALL] Bug #686: Document requirement for zlib 1.1.4 or
- higher.
- - (tim) Fix typo. s/SETEIUD_BREAKS_SETUID/SETEUID_BREAKS_SETUID/
- - (tim) [configure.ac] Bug 665: move 3 new AC_DEFINES outside of AC_TRY_RUN.
- Report by distler AT golem ph utexas edu.
- - (dtucker) [contrib/aix/pam.conf] Include example pam.conf for AIX from
- article by genty at austin.ibm.com, included with the author's permission.
+ - dtucker@cvs.openbsd.org 2008/06/08 17:04:41
+ [sftp-server.c]
+ Add case for ENOSYS in errno_to_portable; ok deraadt
+ - dtucker@cvs.openbsd.org 2008/06/08 20:15:29
+ [sftp.c sftp-client.c sftp-client.h]
+ Have the sftp client store the statvfs replies in wire format,
+ which prevents problems when the server's native sizes exceed the
+ client's.
+ Also extends the sizes of the remaining 32bit wire format to 64bit,
+ they're specified as unsigned long in the standard.
+ - dtucker@cvs.openbsd.org 2008/06/09 13:02:39
+ [sftp-server.c]
+ Extend 32bit -> 64bit values for statvfs extension missed in previous
+ commit.
+ - dtucker@cvs.openbsd.org 2008/06/09 13:38:46
+ [PROTOCOL]
+ Use a $OpenBSD tag so our scripts will sync changes.
+
+20080608
+ - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c
+ openbsd-compat/Makefile.in openbsd-compat/openbsd-compat.h
+ openbsd-compat/bsd-statvfs.{c,h}] Add a null implementation of statvfs and
+ fstatvfs and remove #defines around statvfs code. ok djm@
+ - (dtucker) [configure.ac defines.h sftp-client.c M sftp-server.c] Add a
+ macro to convert fsid to unsigned long for platforms where fsid is a
+ 2-member array.
+
+20080607
+ - (dtucker) [mux.c] Include paths.h inside ifdef HAVE_PATHS_H.
+ - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c]
+ Do not enable statvfs extensions on platforms that do not have statvfs.
- (dtucker) OpenBSD CVS Sync
- - markus@cvs.openbsd.org 2003/09/18 07:52:54
- [sshconnect.c]
- missing {}; bug #656; jclonguet at free.fr
- - markus@cvs.openbsd.org 2003/09/18 07:54:48
- [buffer.c]
- protect against double free; #660; zardoz at users.sf.net
- - markus@cvs.openbsd.org 2003/09/18 07:56:05
- [authfile.c]
- missing buffer_free(&encrypted); #662; zardoz at users.sf.net
- - markus@cvs.openbsd.org 2003/09/18 08:49:45
- [deattack.c misc.c session.c ssh-agent.c]
- more buffer allocation fixes; from Solar Designer; CAN-2003-0682;
- ok millert@
- - miod@cvs.openbsd.org 2003/09/18 13:02:21
- [authfd.c bufaux.c dh.c mac.c ssh-keygen.c]
- A few signedness fixes for harmless situations; markus@ ok
- - markus@cvs.openbsd.org 2003/09/19 09:02:02
- [packet.c]
- buffer_dump only if PACKET_DEBUG is defined; Jedi/Sector One; pr 3471
- - markus@cvs.openbsd.org 2003/09/19 09:03:00
- [buffer.c]
- sign fix in buffer_dump; Jedi/Sector One; pr 3473
- - markus@cvs.openbsd.org 2003/09/19 11:29:40
- [ssh-agent.c]
- provide a ssh-agent specific fatal() function; ok deraadt
- - markus@cvs.openbsd.org 2003/09/19 11:30:39
- [ssh-keyscan.c]
- avoid fatal_cleanup, just call exit(); ok deraadt
- - markus@cvs.openbsd.org 2003/09/19 11:31:33
+ - djm@cvs.openbsd.org 2008/05/19 06:14:02
+ [packet.c] unbreak protocol keepalive timeouts bz#1465; ok dtucker@
+ - djm@cvs.openbsd.org 2008/05/19 15:45:07
+ [sshtty.c ttymodes.c sshpty.h]
+ Fix sending tty modes when stdin is not a tty (bz#1199). Previously
+ we would send the modes corresponding to a zeroed struct termios,
+ whereas we should have been sending an empty list of modes.
+ Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
+ - djm@cvs.openbsd.org 2008/05/19 15:46:31
+ [ssh-keygen.c]
+ support -l (print fingerprint) in combination with -F (find host) to
+ search for a host in ~/.ssh/known_hosts and display its fingerprint;
+ ok markus@
+ - djm@cvs.openbsd.org 2008/05/19 20:53:52
+ [clientloop.c]
+ unbreak tree by committing this bit that I missed from:
+ Fix sending tty modes when stdin is not a tty (bz#1199). Previously
+ we would send the modes corresponding to a zeroed struct termios,
+ whereas we should have been sending an empty list of modes.
+ Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
+
+20080604
+ - (djm) [openbsd-compat/bsd-arc4random.c] Fix math bug that caused bias
+ in arc4random_uniform with upper_bound in (2^30,2*31). Note that
+ OpenSSH did not make requests with upper bounds in this range.
+
+20080519
+ - (djm) [configure.ac mux.c sftp.c openbsd-compat/Makefile.in]
+ [openbsd-compat/fmt_scaled.c openbsd-compat/openbsd-compat.h]
+ Fix compilation on Linux, including pulling in fmt_scaled(3)
+ implementation from OpenBSD's libutil.
+
+20080518
+ - (djm) OpenBSD CVS Sync
+ - djm@cvs.openbsd.org 2008/04/04 05:14:38
+ [sshd_config.5]
+ ChrootDirectory is supported in Match blocks (in fact, it is most useful
+ there). Spotted by Minstrel AT minstrel.org.uk
+ - djm@cvs.openbsd.org 2008/04/04 06:44:26
+ [sshd_config.5]
+ oops, some unrelated stuff crept into that commit - backout.
+ spotted by jmc@
+ - djm@cvs.openbsd.org 2008/04/05 02:46:02
+ [sshd_config.5]
+ HostbasedAuthentication is supported under Match too
+ - (djm) [openbsd-compat/bsd-arc4random.c openbsd-compat/openbsd-compat.c]
+ [configure.ac] Implement arc4random_buf(), import implementation of
+ arc4random_uniform() from OpenBSD
+ - (djm) [openbsd-compat/bsd-arc4random.c] Warning fixes
+ - (djm) [openbsd-compat/port-tun.c] needs sys/queue.h
+ - (djm) OpenBSD CVS Sync
+ - djm@cvs.openbsd.org 2008/04/13 00:22:17
+ [dh.c sshd.c]
+ Use arc4random_buf() when requesting more than a single word of output
+ Use arc4random_uniform() when the desired random number upper bound
+ is not a power of two
+ ok deraadt@ millert@
+ - djm@cvs.openbsd.org 2008/04/18 12:32:11
+ [sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c sftp.h]
+ introduce sftp extension methods statvfs@openssh.com and
+ fstatvfs@openssh.com that implement statvfs(2)-like operations,
+ based on a patch from miklos AT szeredi.hu (bz#1399)
+ also add a "df" command to the sftp client that uses the
+ statvfs@openssh.com to produce a df(1)-like display of filesystem
+ space and inode utilisation
+ ok markus@
+ - jmc@cvs.openbsd.org 2008/04/18 17:15:47
+ [sftp.1]
+ macro fixage;
+ - djm@cvs.openbsd.org 2008/04/18 22:01:33
+ [session.c]
+ remove unneccessary parentheses
+ - otto@cvs.openbsd.org 2008/04/29 11:20:31
+ [monitor_mm.h]
+ garbage collect two unused fields in struct mm_master; ok markus@
+ - djm@cvs.openbsd.org 2008/04/30 10:14:03
+ [ssh-keyscan.1 ssh-keyscan.c]
+ default to rsa (protocol 2) keys, instead of rsa1 keys; spotted by
+ larsnooden AT openoffice.org
+ - pyr@cvs.openbsd.org 2008/05/07 05:49:37
+ [servconf.c servconf.h session.c sshd_config.5]
+ Enable the AllowAgentForwarding option in sshd_config (global and match
+ context), to specify if agents should be permitted on the server.
+ As the man page states:
+ ``Note that disabling Agent forwarding does not improve security
+ unless users are also denied shell access, as they can always install
+ their own forwarders.''
+ ok djm@, ok and a mild frown markus@
+ - pyr@cvs.openbsd.org 2008/05/07 06:43:35
+ [sshd_config]
+ push the sshd_config bits in, spotted by ajacoutot@
+ - jmc@cvs.openbsd.org 2008/05/07 08:00:14
+ [sshd_config.5]
+ sort;
+ - markus@cvs.openbsd.org 2008/05/08 06:59:01
+ [bufaux.c buffer.h channels.c packet.c packet.h]
+ avoid extra malloc/copy/free when receiving data over the net;
+ ~10% speedup for localhost-scp; ok djm@
+ - djm@cvs.openbsd.org 2008/05/08 12:02:23
+ [auth-options.c auth1.c channels.c channels.h clientloop.c gss-serv.c]
+ [monitor.c monitor_wrap.c nchan.c servconf.c serverloop.c session.c]
+ [ssh.c sshd.c]
+ Implement a channel success/failure status confirmation callback
+ mechanism. Each channel maintains a queue of callbacks, which will
+ be drained in order (RFC4253 guarantees confirm messages are not
+ reordered within an channel).
+ Also includes a abandonment callback to clean up if a channel is
+ closed without sending confirmation messages. This probably
+ shouldn't happen in compliant implementations, but it could be
+ abused to leak memory.
+ ok markus@ (as part of a larger diff)
+ - djm@cvs.openbsd.org 2008/05/08 12:21:16
+ [monitor.c monitor_wrap.c session.h servconf.c servconf.h session.c]
+ [sshd_config sshd_config.5]
+ Make the maximum number of sessions run-time controllable via
+ a sshd_config MaxSessions knob. This is useful for disabling
+ login/shell/subsystem access while leaving port-forwarding working
+ (MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or
+ simply increasing the number of allows multiplexed sessions.
+ Because some bozos are sure to configure MaxSessions in excess of the
+ number of available file descriptors in sshd (which, at peak, might be
+ as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds
+ on error paths, and make it fail gracefully on out-of-fd conditions -
+ sending channel errors instead of than exiting with fatal().
+ bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com
+ ok markus@
+ - djm@cvs.openbsd.org 2008/05/08 13:06:11
+ [clientloop.c clientloop.h ssh.c]
+ Use new channel status confirmation callback system to properly deal
+ with "important" channel requests that fail, in particular command exec,
+ shell and subsystem requests. Previously we would optimistically assume
+ that the requests would always succeed, which could cause hangs if they
+ did not (e.g. when the server runs out of fds) or were unimplemented by
+ the server (bz #1384)
+ Also, properly report failing multiplex channel requests via the mux
+ client stderr (subject to LogLevel in the mux master) - better than
+ silently failing.
+ most bits ok markus@ (as part of a larger diff)
+ - djm@cvs.openbsd.org 2008/05/09 04:55:56
+ [channels.c channels.h clientloop.c serverloop.c]
+ Try additional addresses when connecting to a port forward destination
+ whose DNS name resolves to more than one address. The previous behaviour
+ was to try the first address and give up.
+ Reported by stig AT venaas.com in bz#343
+ great feedback and ok markus@
+ - djm@cvs.openbsd.org 2008/05/09 14:18:44
+ [clientloop.c clientloop.h ssh.c mux.c]
+ tidy up session multiplexing code, moving it into its own file and
+ making the function names more consistent - making ssh.c and
+ clientloop.c a fair bit more readable.
+ ok markus@
+ - djm@cvs.openbsd.org 2008/05/09 14:26:08
+ [ssh.c]
+ dingo stole my diff hunk
+ - markus@cvs.openbsd.org 2008/05/09 16:16:06
+ [session.c]
+ re-add the USE_PIPES code and enable it.
+ without pipes shutdown-read from the sshd does not trigger
+ a SIGPIPE when the forked program does a write.
+ ok djm@
+ (Id sync only, USE_PIPES never left portable OpenSSH)
+ - markus@cvs.openbsd.org 2008/05/09 16:17:51
[channels.c]
- do not call channel_free_all on fatal; ok deraadt
- - markus@cvs.openbsd.org 2003/09/19 11:33:09
- [packet.c sshd.c]
- do not call packet_close on fatal; ok deraadt
- - markus@cvs.openbsd.org 2003/09/19 17:40:20
- [scp.c]
- error handling for remote-remote copy; #638; report Harald Koenig;
- ok millert, fgs, henning, deraadt
- - markus@cvs.openbsd.org 2003/09/19 17:43:35
- [clientloop.c sshtty.c sshtty.h]
- remove fatal callbacks from client code; ok deraadt
- - (bal) "extration" -> "extraction" in ssh-rand-helper.c; repoted by john
- on #unixhelp@efnet
- - (tim) [configure.ac] add --disable-etc-default-login option. ok djm
- - (djm) Sync with V_3_7 branch:
- - (djm) Fix SSH1 challenge kludge
- - (djm) Bug #671: Fix builds on OpenBSD
- - (djm) Bug #676: Fix PAM stack corruption
- - (djm) Fix bad free() in PAM code
- - (djm) Don't call pam_end before pam_init
- - (djm) Enable build with old OpenSSL again
- - (djm) Trim deprecated options from INSTALL. Mention UsePAM
- - (djm) Fix quote handling in sftp; Patch from admorten AT umich.edu
-
-$Id$
+ error-fd race: don't enable the error fd in the select bitmask
+ for channels with both in- and output closed, since the channel
+ will go away before we call select();
+ report, lots of debugging help and ok djm@
+ - markus@cvs.openbsd.org 2008/05/09 16:21:13
+ [channels.h clientloop.c nchan.c serverloop.c]
+ unbreak
+ ssh -2 localhost od /bin/ls | true
+ ignoring SIGPIPE by adding a new channel message (EOW) that signals
+ the peer that we're not interested in any data it might send.
+ fixes bz #85; discussion, debugging and ok djm@
+ - pvalchev@cvs.openbsd.org 2008/05/12 20:52:20
+ [umac.c]
+ Ensure nh_result lies on a 64-bit boundary (fixes warnings observed
+ on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@
+ - djm@cvs.openbsd.org 2008/05/15 23:52:24
+ [nchan2.ms]
+ document eow message in ssh protocol 2 channel state machine;
+ feedback and ok markus@
+ - djm@cvs.openbsd.org 2008/05/18 21:29:05
+ [sftp-server.c]
+ comment extension announcement
+ - djm@cvs.openbsd.org 2008/05/16 08:30:42
+ [PROTOCOL]
+ document our protocol extensions and deviations; ok markus@
+ - djm@cvs.openbsd.org 2008/05/17 01:31:56
+ [PROTOCOL]
+ grammar and correctness fixes from stevesk@
+
+20080403
+ - (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile-
+ time warnings on LynxOS. Patch from ops AT iki.fi
+ - (djm) Force string arguments to replacement setproctitle() though
+ strnvis first. Ok dtucker@
+
+20080403
+ - (djm) OpenBSD CVS sync:
+ - markus@cvs.openbsd.org 2008/04/02 15:36:51
+ [channels.c]
+ avoid possible hijacking of x11-forwarded connections (back out 1.183)
+ CVE-2008-1483; ok djm@
+ - jmc@cvs.openbsd.org 2008/03/27 22:37:57
+ [sshd.8]
+ remove trailing whitespace;
+ - djm@cvs.openbsd.org 2008/04/03 09:50:14
+ [version.h]
+ openssh-5.0
+ - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
+ [contrib/suse/openssh.spec] Crank version numbers in RPM spec files
+ - (djm) [README] Update link to release notes
+ - (djm) Release 5.0p1