]>
Commit | Line | Data |
---|---|---|
f86b0eef | 1 | 20020922 |
2 | - (djm) OpenBSD CVS Sync | |
3 | - stevesk@cvs.openbsd.org 2002/09/19 14:53:14 | |
4 | [compat.c] | |
c7724abb | 5 | - markus@cvs.openbsd.org 2002/09/19 15:51:23 |
6 | [ssh-add.c] | |
7 | typo; cd@kalkatraz.de | |
00e842d8 | 8 | - stevesk@cvs.openbsd.org 2002/09/19 16:03:15 |
9 | [serverloop.c] | |
10 | log IP address also; ok markus@ | |
f86b0eef | 11 | |
792e7d2d | 12 | 20020919 |
13 | - (djm) OpenBSD CVS Sync | |
14 | - stevesk@cvs.openbsd.org 2002/09/12 19:11:52 | |
15 | [ssh-agent.c] | |
16 | %u for uid print; ok markus@ | |
da0561eb | 17 | - stevesk@cvs.openbsd.org 2002/09/12 19:50:36 |
18 | [session.c ssh.1] | |
19 | add SSH_CONNECTION and deprecate SSH_CLIENT; bug #384. ok markus@ | |
facfd613 | 20 | - stevesk@cvs.openbsd.org 2002/09/13 19:23:09 |
21 | [channels.c sshconnect.c sshd.c] | |
22 | remove use of SO_LINGER, it should not be needed. error check | |
23 | SO_REUSEADDR. fixup comments. ok markus@ | |
8bd4e2ae | 24 | - stevesk@cvs.openbsd.org 2002/09/16 19:55:33 |
25 | [session.c] | |
26 | log when _PATH_NOLOGIN exists; ok markus@ | |
e6fe1bab | 27 | - stevesk@cvs.openbsd.org 2002/09/16 20:12:11 |
28 | [sshd_config.5] | |
29 | more details on X11Forwarding security issues and threats; ok markus@ | |
f1dcc34e | 30 | - stevesk@cvs.openbsd.org 2002/09/16 22:03:13 |
31 | [sshd.8] | |
32 | reference moduli(5) in FILES /etc/moduli. | |
5c0d0e90 | 33 | - itojun@cvs.openbsd.org 2002/09/17 07:47:02 |
34 | [channels.c] | |
35 | don't quit while creating X11 listening socket. | |
36 | http://mail-index.netbsd.org/current-users/2002/09/16/0005.html | |
37 | got from portable. markus ok | |
6939bbd4 | 38 | - djm@cvs.openbsd.org 2002/09/19 01:58:18 |
39 | [ssh.c sshconnect.c] | |
40 | bugzilla.mindrot.org #223 - ProxyCommands don't exit. | |
41 | Patch from dtucker@zip.com.au; ok markus@ | |
792e7d2d | 42 | |
4f3834e8 | 43 | 20020912 |
eee2215e | 44 | - (djm) Made GNOME askpass programs return non-zero if cancel button is |
45 | pressed. | |
10a560d4 | 46 | - (djm) Added getpeereid() replacement. Properly implemented for systems |
47 | with SO_PEERCRED support. Faked for systems which lack it. | |
9fd2a215 | 48 | - (djm) Sync sys/tree.h with OpenBSD -current. Rename tree.h and |
49 | fake-queue.h to sys-tree.h and sys-queue.h | |
4f3834e8 | 50 | - (djm) OpenBSD CVS Sync |
51 | - markus@cvs.openbsd.org 2002/09/08 20:24:08 | |
52 | [hostfile.h] | |
53 | no comma at end of enumerator list | |
696f6bef | 54 | - itojun@cvs.openbsd.org 2002/09/09 06:48:06 |
55 | [auth1.c auth.h auth-krb5.c monitor.c monitor.h] | |
56 | [monitor_wrap.c monitor_wrap.h] | |
57 | kerberos support for privsep. confirmed to work by lha@stacken.kth.se | |
58 | patch from markus | |
661e45a0 | 59 | - markus@cvs.openbsd.org 2002/09/09 14:54:15 |
60 | [channels.c kex.h key.c monitor.c monitor_wrap.c radix.c uuencode.c] | |
61 | signed vs unsigned from -pedantic; ok henning@ | |
87f4111f | 62 | - markus@cvs.openbsd.org 2002/09/10 20:24:47 |
63 | [ssh-agent.c] | |
64 | check the euid of the connecting process with getpeereid(2); | |
65 | ok provos deraadt stevesk | |
07d688d5 | 66 | - stevesk@cvs.openbsd.org 2002/09/11 17:55:03 |
67 | [ssh.1] | |
68 | add agent and X11 forwarding warning text from ssh_config.5; ok markus@ | |
8b10e20e | 69 | - stevesk@cvs.openbsd.org 2002/09/11 18:27:26 |
70 | [authfd.c authfd.h ssh.c] | |
71 | don't connect to agent to test for presence if we've previously | |
72 | connected; ok markus@ | |
00b3ad3e | 73 | - djm@cvs.openbsd.org 2002/09/11 22:41:50 |
74 | [sftp.1 sftp-client.c sftp-client.h sftp-common.c sftp-common.h] | |
75 | [sftp-glob.c sftp-glob.h sftp-int.c sftp-server.c] | |
76 | support for short/long listings and globbing in "ls"; ok markus@ | |
be0cd512 | 77 | - djm@cvs.openbsd.org 2002/09/12 00:13:06 |
78 | [sftp-int.c] | |
79 | zap unused var introduced in last commit | |
4f3834e8 | 80 | |
ac8802eb | 81 | 20020911 |
82 | - (djm) Sync openbsd-compat with OpenBSD -current | |
83 | ||
e2e36358 | 84 | 20020910 |
85 | - (djm) Bug #365: Read /.ssh/environment properly under CygWin. | |
86 | Patch from Mark Bradshaw <bradshaw@staff.crosswalk.com> | |
35c4faf5 | 87 | - (djm) Bug #138: Make protocol 1 blowfish work with old OpenSSL. |
88 | Patch from Robert Halubek <rob@adso.com.pl> | |
e2e36358 | 89 | |
3445ca02 | 90 | 20020905 |
91 | - (djm) OpenBSD CVS Sync | |
92 | - stevesk@cvs.openbsd.org 2002/09/04 18:52:42 | |
93 | [servconf.c sshd.8 sshd_config.5] | |
94 | default LoginGraceTime to 2m; 1m may be too short for slow systems. | |
95 | ok markus@ | |
cbecf1ed | 96 | - (djm) Merge openssh-TODO.patch from Redhat (null) beta |
c4ee4c60 | 97 | - (djm) Add gnome-ssh-askpass2.c (gtk2) by merge with patch from |
98 | Nalin Dahyabhai <nalin@redhat.com> | |
3c1dff28 | 99 | - (djm) Add support for building gtk2 password requestor from Redhat beta |
3445ca02 | 100 | |
954640a4 | 101 | 20020903 |
33e2e066 | 102 | - (djm) Patch from itojun@ for Darwin OS: test getaddrinfo, reorder libcrypt |
e18b7d35 | 103 | - (djm) Fix Redhat RPM build dependancy test |
954640a4 | 104 | - (djm) OpenBSD CVS Sync |
105 | - markus@cvs.openbsd.org 2002/08/12 10:46:35 | |
106 | [ssh-agent.c] | |
107 | make ssh-agent setgid, disallow ptrace. | |
755c4339 | 108 | - espie@cvs.openbsd.org 2002/08/21 11:20:59 |
109 | [sshd.8] | |
110 | `RSA' updated to refer to `public key', where it matters. | |
111 | okay markus@ | |
6e0fbda1 | 112 | - stevesk@cvs.openbsd.org 2002/08/21 19:38:06 |
113 | [servconf.c sshd.8 sshd_config sshd_config.5] | |
114 | change LoginGraceTime default to 1 minute; ok mouring@ markus@ | |
00e41835 | 115 | - stevesk@cvs.openbsd.org 2002/08/21 20:10:28 |
116 | [ssh-agent.c] | |
117 | raise listen backlog; ok markus@ | |
c1a4eef1 | 118 | - stevesk@cvs.openbsd.org 2002/08/22 19:27:53 |
119 | [ssh-agent.c] | |
120 | use common close function; ok markus@ | |
1d77f8cb | 121 | - stevesk@cvs.openbsd.org 2002/08/22 19:38:42 |
122 | [clientloop.c] | |
123 | format with current EscapeChar; bugzilla #388 from wknox@mitre.org. | |
124 | ok markus@ | |
f34ec885 | 125 | - stevesk@cvs.openbsd.org 2002/08/22 20:57:19 |
126 | [ssh-agent.c] | |
127 | shutdown(SHUT_RDWR) not needed before close here; ok markus@ | |
848bf884 | 128 | - markus@cvs.openbsd.org 2002/08/22 21:33:58 |
129 | [auth1.c auth2.c] | |
130 | auth_root_allowed() is handled by the monitor in the privsep case, | |
131 | so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325 | |
6c723e7c | 132 | - markus@cvs.openbsd.org 2002/08/22 21:45:41 |
133 | [session.c] | |
134 | send signal name (not signal number) in "exit-signal" message; noticed | |
135 | by galb@vandyke.com | |
b41baf4d | 136 | - stevesk@cvs.openbsd.org 2002/08/27 17:13:56 |
137 | [ssh-rsa.c] | |
138 | RSA_public_decrypt() returns -1 on error so len must be signed; | |
139 | ok markus@ | |
dbcdea68 | 140 | - stevesk@cvs.openbsd.org 2002/08/27 17:18:40 |
141 | [ssh_config.5] | |
142 | some warning text for ForwardAgent and ForwardX11; ok markus@ | |
ba1566dd | 143 | - stevesk@cvs.openbsd.org 2002/08/29 15:57:25 |
144 | [monitor.c session.c sshlogin.c sshlogin.h] | |
145 | pass addrlen with sockaddr *; from Hajimu UMEMOTO <ume@FreeBSD.org> | |
146 | NOTE: there are also p-specific parts to this patch. ok markus@ | |
e59404d1 | 147 | - stevesk@cvs.openbsd.org 2002/08/29 16:02:54 |
148 | [ssh.1 ssh.c] | |
149 | deprecate -P as UsePrivilegedPort defaults to no now; ok markus@ | |
878b8992 | 150 | - stevesk@cvs.openbsd.org 2002/08/29 16:09:02 |
151 | [ssh_config.5] | |
152 | more on UsePrivilegedPort and setuid root; ok markus@ | |
9f324470 | 153 | - stevesk@cvs.openbsd.org 2002/08/29 19:49:42 |
154 | [ssh.c] | |
155 | shrink initial privilege bracket for setuid case; ok markus@ | |
57ff5eeb | 156 | - stevesk@cvs.openbsd.org 2002/08/29 22:54:10 |
157 | [ssh_config.5 sshd_config.5] | |
158 | state XAuthLocation is a full pathname | |
954640a4 | 159 | |
b85698ab | 160 | 20020820 |
161 | - OpenBSD CVS Sync | |
162 | - millert@cvs.openbsd.org 2002/08/02 14:43:15 | |
163 | [monitor.c monitor_mm.c] | |
164 | Change mm_zalloc() sanity checks to be more in line with what | |
165 | we do in calloc() and add a check to monitor_mm.c. | |
166 | OK provos@ and markus@ | |
6a342527 | 167 | - marc@cvs.openbsd.org 2002/08/02 16:00:07 |
168 | [ssh.1 sshd.8] | |
169 | note that .ssh/environment is only read when | |
170 | allowed (PermitUserEnvironment in sshd_config). | |
171 | OK markus@ | |
4004c2ac | 172 | - markus@cvs.openbsd.org 2002/08/02 21:23:41 |
173 | [ssh-rsa.c] | |
174 | diff is u_int (2x); ok deraadt/provos | |
0caf874a | 175 | - markus@cvs.openbsd.org 2002/08/02 22:20:30 |
176 | [ssh-rsa.c] | |
177 | replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser | |
178 | for authentication; ok deraadt/djm | |
75cf7563 | 179 | - aaron@cvs.openbsd.org 2002/08/08 13:50:23 |
180 | [sshconnect1.c] | |
181 | Use & to test if bits are set, not &&; markus@ ok. | |
d6097023 | 182 | - stevesk@cvs.openbsd.org 2002/08/08 23:54:52 |
183 | [auth.c] | |
184 | typo in comment | |
36535ee6 | 185 | - stevesk@cvs.openbsd.org 2002/08/09 17:21:42 |
186 | [sshd_config.5] | |
187 | use Op for mdoc conformance; from esr@golux.thyrsus.com | |
188 | ok aaron@ | |
b3641662 | 189 | - stevesk@cvs.openbsd.org 2002/08/09 17:41:12 |
190 | [sshd_config.5] | |
191 | proxy vs. fake display | |
35453849 | 192 | - stevesk@cvs.openbsd.org 2002/08/12 17:30:35 |
193 | [ssh.1 sshd.8 sshd_config.5] | |
194 | more PermitUserEnvironment; ok markus@ | |
24794905 | 195 | - stevesk@cvs.openbsd.org 2002/08/17 23:07:14 |
196 | [ssh.1] | |
197 | ForwardAgent has defaulted to no for over 2 years; be more clear here. | |
4dcbbeea | 198 | - stevesk@cvs.openbsd.org 2002/08/17 23:55:01 |
199 | [ssh_config.5] | |
200 | ordered list here | |
7d3b91a6 | 201 | - (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assign |
202 | it to ULONG_MAX. | |
b85698ab | 203 | |
cd018561 | 204 | 20020813 |
205 | - (tim) [configure.ac] Display OpenSSL header/library version. | |
206 | Patch by dtucker@zip.com.au | |
207 | ||
8a48a7ef | 208 | 20020731 |
209 | - (bal) OpenBSD CVS Sync | |
210 | - markus@cvs.openbsd.org 2002/07/24 16:11:18 | |
211 | [hostfile.c hostfile.h sshconnect.c] | |
212 | print out all known keys for a host if we get a unknown host key, | |
213 | see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4 | |
214 | ||
215 | the ssharp mitm tool attacks users in a similar way, so i'd like to | |
216 | pointed out again: | |
217 | A MITM attack is always possible if the ssh client prints: | |
218 | The authenticity of host 'bla' can't be established. | |
219 | (protocol version 2 with pubkey authentication allows you to detect | |
220 | MITM attacks) | |
5cb5518b | 221 | - mouring@cvs.openbsd.org 2002/07/25 01:16:59 |
222 | [sftp.c] | |
223 | FallBackToRsh does not exist anywhere else. Remove it from here. | |
224 | OK deraadt. | |
567a05bf | 225 | - markus@cvs.openbsd.org 2002/07/29 18:57:30 |
226 | [sshconnect.c] | |
227 | print file:line | |
f00bab84 | 228 | - markus@cvs.openbsd.org 2002/07/30 17:03:55 |
229 | [auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5] | |
230 | add PermitUserEnvironment (off by default!); from dot@dotat.at; | |
231 | ok provos, deraadt | |
8a48a7ef | 232 | |
13979d47 | 233 | 20020730 |
234 | - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de | |
235 | ||
d228d9dd | 236 | 20020728 |
237 | - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar | |
16c4a972 | 238 | - (stevesk) [CREDITS] solar |
75131bbd | 239 | - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned |
240 | char arg. | |
d228d9dd | 241 | |
d40af5fa | 242 | 20020725 |
243 | - (djm) Remove some cruft from INSTALL | |
d91b4743 | 244 | - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/ |
d40af5fa | 245 | |
56b54901 | 246 | 20020723 |
247 | - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger. | |
918ffb0b | 248 | - (bal) sync ID w/ ssh-agent.c |
516f0d7d | 249 | - (bal) OpenBSD Sync |
250 | - markus@cvs.openbsd.org 2002/07/19 15:43:33 | |
251 | [log.c log.h session.c sshd.c] | |
252 | remove fatal cleanups after fork; based on discussions with and code | |
253 | from solar. | |
5d185586 | 254 | - stevesk@cvs.openbsd.org 2002/07/19 17:42:40 |
255 | [ssh.c] | |
256 | display a warning from ssh when XAuthLocation does not exist or xauth | |
257 | returned no authentication data. ok markus@ | |
30998af1 | 258 | - stevesk@cvs.openbsd.org 2002/07/21 18:32:20 |
259 | [auth-options.c] | |
260 | unneeded includes | |
dbc728ff | 261 | - stevesk@cvs.openbsd.org 2002/07/21 18:34:43 |
262 | [auth-options.h] | |
263 | remove invalid comment | |
97686bf9 | 264 | - markus@cvs.openbsd.org 2002/07/22 11:03:06 |
265 | [session.c] | |
266 | fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors; | |
d341742a | 267 | - stevesk@cvs.openbsd.org 2002/07/22 17:32:56 |
268 | [monitor.c] | |
269 | u_int here; ok provos@ | |
67f04db1 | 270 | - stevesk@cvs.openbsd.org 2002/07/23 16:03:10 |
271 | [sshd.c] | |
272 | utmp_len is unsigned; display error consistent with other options. | |
273 | ok markus@ | |
0df3a240 | 274 | - stevesk@cvs.openbsd.org 2002/07/15 17:15:31 |
275 | [uidswap.c] | |
276 | little more debugging; ok markus@ | |
d341742a | 277 | |
21c2c5cd | 278 | 20020722 |
279 | - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk | |
a93bd14c | 280 | - (stevesk) [xmmap.c] missing prototype for fatal() |
ccbb983c | 281 | - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync |
282 | with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com. | |
d262b7f2 | 283 | - (bal) [configure.ac] Missing ;; from cray patch. |
30eab01d | 284 | - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines |
285 | into it's own header. | |
ee48c949 | 286 | - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be |
287 | freed by the caller; add free_pam_environment() and use it. | |
1d3f4ae7 | 288 | - (stevesk) [auth-pam.c] typo in comment |
21c2c5cd | 289 | |
b992432e | 290 | 20020721 |
291 | - (stevesk) [auth-pam.c] merge cosmetic changes from solar's | |
292 | openssh-3.4p1-owl-password-changing.diff | |
277f55cf | 293 | - (stevesk) [auth-pam.c] merge rest of solar's PAM patch; |
294 | PAM_NEW_AUTHTOK_REQD remains in #if 0 for now. | |
f7808a93 | 295 | - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch |
296 | warning on pam_conv struct conversation function. | |
337dde6b | 297 | - (stevesk) [auth-pam.h] license |
8565f28e | 298 | - (stevesk) [auth-pam.h] unneeded include |
e9b2c23d | 299 | - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h |
b992432e | 300 | |
ce88d9df | 301 | 20020720 |
302 | - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng(). | |
303 | ||
4379c0e5 | 304 | 20020719 |
305 | - (tim) [contrib/solaris/buildpkg.sh] create privsep user/group if needed. | |
306 | Patch by dtucker@zip.com.au | |
f75ca46d | 307 | - (tim) [configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au |
4379c0e5 | 308 | |
45491100 | 309 | 20020718 |
310 | - (tim) [defines.h] Bug 313 patch by dirk.meyer@dinoex.sub.org | |
311 | - (tim) [monitor_mm.c] add missing declaration for xmmap(). Reported | |
312 | by ayamura@ayamura.org | |
1cbbe6c8 | 313 | - (tim) [configure.ac] Bug 267 rework int64_t test. |
5749e709 | 314 | - (tim) [includes.h] Bug 267 add stdint.h |
45491100 | 315 | |
dd3943d0 | 316 | 20020717 |
317 | - (bal) aixbff package updated by dtucker@zip.com.au | |
2bf42e4a | 318 | - (tim) [configure.ac] change how we do paths in AC_PATH_PROGS tests |
319 | for autoconf 2.53. Based on a patch by jrj@purdue.edu | |
dd3943d0 | 320 | |
8fc47887 | 321 | 20020716 |
322 | - (tim) [contrib/solaris/opensshd.in] Only kill sshd if .pid file found | |
323 | ||
c750d869 | 324 | 20020715 |
325 | - (bal) OpenBSD CVS Sync | |
326 | - itojun@cvs.openbsd.org 2002/07/12 13:29:09 | |
327 | [sshconnect.c] | |
328 | print connect failure during debugging mode. | |
a2f883ce | 329 | - markus@cvs.openbsd.org 2002/07/12 15:50:17 |
330 | [cipher.c] | |
331 | EVP_CIPH_CUSTOM_IV for our own rijndael | |
2d199535 | 332 | - (bal) Remove unused tty defined in do_setusercontext() pointed out by |
333 | dtucker@zip.com.au plus a a more KNF since I am near it. | |
846be3f4 | 334 | - (bal) Privsep user creation support in Solaris buildpkg.sh by |
335 | dtucker@zip.com.au | |
c750d869 | 336 | |
798c5808 | 337 | 20020714 |
338 | - (tim) [Makefile.in] replace "id sshd" with "sshd -t" | |
4165b82e | 339 | - (bal/tim) [acconfig.h configure.ac monitor_mm.c servconf.c |
340 | openbsd-compat/Makefile.in] support compression on platforms that | |
341 | have no/broken MAP_ANON. Moved code to openbsd-compat/xmmap.c | |
342 | Based on patch from nalin@redhat.com of code extracted from Owl's package | |
5fd8087a | 343 | - (tim) [ssh_prng_cmds.in] Bug 323 arp -n flag doesn't exist under Solaris. |
344 | report by chris@by-design.net | |
fdebdd4f | 345 | - (tim) [loginrec.c] Bug 347: Fix typo (WTMPX_FILE) report by rodney@bond.net |
d80063fe | 346 | - (tim) [loginrec.c] Bug 348: add missing found = 1; to wtmpx_islogin() |
347 | report by rodney@bond.net | |
798c5808 | 348 | |
6b2a3595 | 349 | 20020712 |
350 | - (tim) [Makefile.in] quiet down install-files: and check-user: | |
3085601b | 351 | - (tim) [configure.ac] remove unused filepriv line |
6b2a3595 | 352 | |
249f9903 | 353 | 20020710 |
354 | - (tim) [contrib/cygwin/ssh-host-config] explicitely sets the permissions | |
355 | on /var/empty to 755 Patch by vinschen@redhat.com | |
6f901f8e | 356 | - (bal) OpenBSD CVS Sync |
357 | - itojun@cvs.openbsd.org 2002/07/09 11:56:50 | |
358 | [sshconnect.c] | |
359 | silently try next address on connect(2). markus ok | |
59c825e1 | 360 | - itojun@cvs.openbsd.org 2002/07/09 11:56:27 |
361 | [canohost.c] | |
362 | suppress log on reverse lookup failiure, as there's no real value in | |
363 | doing so. | |
364 | markus ok | |
aab5431b | 365 | - itojun@cvs.openbsd.org 2002/07/09 12:04:02 |
366 | [sshconnect.c] | |
367 | ed static function (less warnings) | |
94ad46d1 | 368 | - stevesk@cvs.openbsd.org 2002/07/09 17:46:25 |
369 | [sshd_config.5] | |
370 | clarify no preference ordering in protocol list; ok markus@ | |
9bd68577 | 371 | - itojun@cvs.openbsd.org 2002/07/10 10:28:15 |
372 | [sshconnect.c] | |
373 | bark if all connection attempt fails. | |
09683edf | 374 | - deraadt@cvs.openbsd.org 2002/07/10 17:53:54 |
375 | [rijndael.c] | |
376 | use right sizeof in memcpy; markus ok | |
249f9903 | 377 | |
e6f15ed1 | 378 | 20020709 |
379 | - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platforms | |
380 | lacking that concept can share it. Patch by vinschen@redhat.com | |
381 | ||
4f9d6706 | 382 | 20020708 |
383 | - (tim) [openssh/contrib/solaris/buildpkg.sh] add PKG_INSTALL_ROOT to | |
384 | work in a jumpstart environment. patch by kbrint@rufus.net | |
b451e27b | 385 | - (tim) [Makefile.in] workaround for broken pakadd on some systems. |
cda1ebcb | 386 | - (tim) [configure.ac] fix libc89 utimes test. Mention default path for |
387 | --with-privsep-path= | |
4f9d6706 | 388 | |
ac74561e | 389 | 20020707 |
390 | - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH) | |
94d8258b | 391 | - (tim) [acconfig.h configure.ac sshd.c] |
392 | s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/ | |
d41f8eed | 393 | - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes |
394 | patch from vinschen@redhat.com | |
0b832146 | 395 | - (bal) [realpath.c] Updated with OpenBSD tree. |
da2499f5 | 396 | - (bal) OpenBSD CVS Sync |
397 | - deraadt@cvs.openbsd.org 2002/07/04 04:15:33 | |
398 | [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c] | |
399 | patch memory leaks; grendel@zeitbombe.org | |
e1feb9bf | 400 | - deraadt@cvs.openbsd.org 2002/07/04 08:12:15 |
401 | [channels.c packet.c] | |
402 | blah blah minor nothing as i read and re-read and re-read... | |
eb9f2fab | 403 | - markus@cvs.openbsd.org 2002/07/04 10:41:47 |
404 | [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c] | |
405 | don't allocate, copy, and discard if there is not interested in the data; | |
406 | ok deraadt@ | |
4394a17f | 407 | - deraadt@cvs.openbsd.org 2002/07/06 01:00:49 |
408 | [log.c] | |
409 | KNF | |
50d2fbbc | 410 | - deraadt@cvs.openbsd.org 2002/07/06 01:01:26 |
411 | [ssh-keyscan.c] | |
412 | KNF, realloc fix, and clean usage | |
12a3f2c3 | 413 | - stevesk@cvs.openbsd.org 2002/07/06 17:47:58 |
414 | [ssh-keyscan.c] | |
415 | unused variable | |
41545cb6 | 416 | - (bal) Minor KNF on ssh-keyscan.c |
ac74561e | 417 | |
0764e748 | 418 | 20020705 |
419 | - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs. | |
420 | Reported by Darren Tucker <dtucker@zip.com.au> | |
e12659f4 | 421 | - (tim) [contrib/cygwin/ssh-host-config] double slash corrction |
422 | from vinschen@redhat.com | |
0764e748 | 423 | |
64c0ce80 | 424 | 20020704 |
425 | - (bal) Limit data to TTY for AIX only (Newer versions can't handle the | |
426 | faster data rate) Bug #124 | |
375c1dee | 427 | - (bal) glob.c defines TILDE and AIX also defines it. #undef it first. |
428 | bug #265 | |
ff2de800 | 429 | - (bal) One too many nulls in ports-aix.c |
64c0ce80 | 430 | |
d2f95449 | 431 | 20020703 |
432 | - (bal) Updated contrib/cygwin/ patch by vinschen@redhat.com | |
619a6aff | 433 | - (bal) minor correction to utimes() replacement. Patch by |
434 | onoe@sm.sony.co.jp | |
f11fe301 | 435 | - OpenBSD CVS Sync |
436 | - markus@cvs.openbsd.org 2002/06/27 08:49:44 | |
437 | [dh.c ssh-keyscan.c sshconnect.c] | |
438 | more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@ | |
181d6635 | 439 | - deraadt@cvs.openbsd.org 2002/06/27 09:08:00 |
440 | [monitor.c] | |
441 | improve mm_zalloc check; markus ok | |
30e37ee6 | 442 | - deraadt@cvs.openbsd.org 2002/06/27 10:35:47 |
443 | [auth2-none.c monitor.c sftp-client.c] | |
444 | use xfree() | |
c8f94200 | 445 | - stevesk@cvs.openbsd.org 2002/06/27 19:49:08 |
446 | [ssh-keyscan.c] | |
447 | use convtime(); ok markus@ | |
a64d3560 | 448 | - millert@cvs.openbsd.org 2002/06/28 01:49:31 |
449 | [monitor_mm.c] | |
450 | tree(3) wants an int return value for its compare functions and | |
451 | the difference between two pointers is not an int. Just do the | |
452 | safest thing and store the result in a long and then return 0, | |
453 | -1, or 1 based on that result. | |
405a0d43 | 454 | - deraadt@cvs.openbsd.org 2002/06/28 01:50:37 |
455 | [monitor_wrap.c] | |
456 | use ssize_t | |
4efd85b2 | 457 | - deraadt@cvs.openbsd.org 2002/06/28 10:08:25 |
458 | [sshd.c] | |
459 | range check -u option at invocation | |
6ded293b | 460 | - deraadt@cvs.openbsd.org 2002/06/28 23:05:06 |
461 | [sshd.c] | |
462 | gidset[2] -> gidset[1]; markus ok | |
7fdc56c5 | 463 | - deraadt@cvs.openbsd.org 2002/06/30 21:54:16 |
464 | [auth2.c session.c sshd.c] | |
465 | lint asks that we use names that do not overlap | |
343288b8 | 466 | - deraadt@cvs.openbsd.org 2002/06/30 21:59:45 |
467 | [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c | |
468 | monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c | |
469 | sshconnect2.c sshd.c] | |
470 | minor KNF | |
7d60d74c | 471 | - deraadt@cvs.openbsd.org 2002/07/01 16:15:25 |
472 | [msg.c] | |
473 | %u | |
713f6cd9 | 474 | - markus@cvs.openbsd.org 2002/07/01 19:48:46 |
475 | [sshconnect2.c] | |
476 | for compression=yes, we fallback to no-compression if the server does | |
477 | not support compression, vice versa for compression=no. ok mouring@ | |
261189cc | 478 | - markus@cvs.openbsd.org 2002/07/03 09:55:38 |
479 | [ssh-keysign.c] | |
480 | use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld) | |
481 | in order to avoid a possible Kocher timing attack pointed out by Charles | |
482 | Hannum; ok provos@ | |
60cd0a97 | 483 | - markus@cvs.openbsd.org 2002/07/03 14:21:05 |
484 | [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config] | |
485 | re-enable ssh-keysign's sbit, but make ssh-keysign read | |
486 | /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled | |
487 | globally. based on discussions with deraadt, itojun and sommerfeld; | |
488 | ok itojun@ | |
56fd97d7 | 489 | - (bal) Failed password attempts don't increment counter on AIX. Bug #145 |
e8aa0a5c | 490 | - (bal) Missed Makefile.in change. keysign needs readconf.o |
0ba40daa | 491 | - (bal) Clean up aix_usrinfo(). Ignore TTY= period I guess. |
56fd97d7 | 492 | |
b2f295dc | 493 | 20020702 |
494 | - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc & | |
495 | friends consistently. Spotted by Solar Designer <solar@openwall.com> | |
496 | ||
3c3e878a | 497 | 20020629 |
498 | - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style | |
499 | clean up while I'm near it. | |
500 | ||
811ee370 | 501 | 20020628 |
502 | - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented | |
503 | options should contain default value. from solar. | |
b9b82dab | 504 | - (bal) Cygwin uid0 fix by vinschen@redhat.com |
17962c40 | 505 | - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c. Otherwise wise |
506 | have issues of our fixes not propogating right (ie bcopy instead of | |
507 | memmove). OK tim | |
4fa4fb00 | 508 | - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported. |
509 | Bug #303 | |
811ee370 | 510 | |
ce88d9df | 511 | 20020627 |
d1ff09ba | 512 | - OpenBSD CVS Sync |
513 | - deraadt@cvs.openbsd.org 2002/06/26 14:49:36 | |
514 | [monitor.c] | |
515 | correct %u | |
63b5f1a1 | 516 | - deraadt@cvs.openbsd.org 2002/06/26 14:50:04 |
517 | [monitor_fdpass.c] | |
518 | use ssize_t for recvmsg() and sendmsg() return | |
1431a900 | 519 | - markus@cvs.openbsd.org 2002/06/26 14:51:33 |
520 | [ssh-add.c] | |
521 | fix exit code for -X/-x | |
bb0640b2 | 522 | - deraadt@cvs.openbsd.org 2002/06/26 15:00:32 |
523 | [monitor_wrap.c] | |
524 | more %u | |
20e79e98 | 525 | - markus@cvs.openbsd.org 2002/06/26 22:27:32 |
526 | [ssh-keysign.c] | |
527 | bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu | |
d1ff09ba | 528 | |
4bfa8bb6 | 529 | 20020626 |
530 | - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM | |
a594fa74 | 531 | - (bal) OpenBSD CVS Sync |
532 | - markus@cvs.openbsd.org 2002/06/23 21:34:07 | |
533 | [channels.c] | |
534 | tcode is u_int | |
38501509 | 535 | - markus@cvs.openbsd.org 2002/06/24 13:12:23 |
536 | [ssh-agent.1] | |
537 | the socket name contains ssh-agent's ppid; via mpech@ from form@ | |
f91d9a89 | 538 | - markus@cvs.openbsd.org 2002/06/24 14:33:27 |
539 | [channels.c channels.h clientloop.c serverloop.c] | |
540 | move channel counter to u_int | |
1169c3df | 541 | - markus@cvs.openbsd.org 2002/06/24 14:55:38 |
542 | [authfile.c kex.c ssh-agent.c] | |
543 | cat to (void) when output from buffer_get_X is ignored | |
09915dc1 | 544 | - itojun@cvs.openbsd.org 2002/06/24 15:49:22 |
545 | [msg.c] | |
546 | printf type pedant | |
d0a1c5d1 | 547 | - deraadt@cvs.openbsd.org 2002/06/24 17:57:20 |
548 | [sftp-server.c sshpty.c] | |
549 | explicit (u_int) for uid and gid | |
6c69a6a9 | 550 | - markus@cvs.openbsd.org 2002/06/25 16:22:42 |
551 | [authfd.c] | |
552 | unnecessary cast | |
87809a1f | 553 | - markus@cvs.openbsd.org 2002/06/25 18:51:04 |
554 | [sshd.c] | |
555 | lightweight do_setusercontext after chroot() | |
924681ee | 556 | - (bal) Updated AIX package build. Patch by dtucker@zip.com.au |
46c8ebb3 | 557 | - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8 |
78beb77d | 558 | - (bal) added back in error check for mmap(). I screwed up, Pointed |
559 | out by stevesk@ | |
f2d9a1f8 | 560 | - (tim) [README.privsep] UnixWare tip no longer needed. |
88cb875c | 561 | - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP, |
562 | but it all damned lies. | |
0d0270e6 | 563 | - (stevesk) [README.privsep] more for sshd pseudo-account. |
8029e7fc | 564 | - (tim) [contrib/caldera/openssh.spec] add support for privsep |
8695f9f7 | 565 | - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@ |
b29fe4ea | 566 | - (djm) OpenBSD CVS Sync |
567 | - markus@cvs.openbsd.org 2002/06/26 08:53:12 | |
568 | [bufaux.c] | |
569 | limit size of BNs to 8KB; ok provos/deraadt | |
22d62d31 | 570 | - markus@cvs.openbsd.org 2002/06/26 08:54:18 |
571 | [buffer.c] | |
572 | limit append to 1MB and buffers to 10MB | |
5df8c731 | 573 | - markus@cvs.openbsd.org 2002/06/26 08:55:02 |
574 | [channels.c] | |
575 | limit # of channels to 10000 | |
87f18810 | 576 | - markus@cvs.openbsd.org 2002/06/26 08:58:26 |
577 | [session.c] | |
578 | limit # of env vars to 1000; ok deraadt/djm | |
2f095a0e | 579 | - deraadt@cvs.openbsd.org 2002/06/26 13:20:57 |
580 | [monitor.c] | |
581 | be careful in mm_zalloc | |
66087567 | 582 | - deraadt@cvs.openbsd.org 2002/06/26 13:49:26 |
583 | [session.c] | |
584 | disclose less information from environment files; based on input | |
585 | from djm, and dschultz@uclink.Berkeley.EDU | |
477edc5d | 586 | - markus@cvs.openbsd.org 2002/06/26 13:55:37 |
587 | [auth2-chall.c] | |
588 | make sure # of response matches # of queries, fixes int overflow; | |
589 | from ISS | |
03b14b6f | 590 | - markus@cvs.openbsd.org 2002/06/26 13:56:27 |
591 | [version.h] | |
592 | 3.4 | |
9c696d0d | 593 | - (djm) Require krb5 devel for RPM build w/ KrbV |
c4186be7 | 594 | - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai |
595 | <nalin@redhat.com> | |
1e7bc74c | 596 | - (djm) Update spec files for release |
49b53b03 | 597 | - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS |
03b14b6f | 598 | - (djm) Release 3.4p1 |
6519cfd6 | 599 | - (tim) [contrib/caldera/openssh.spec] remove 2 configure options I put in |
600 | by mistake | |
4bfa8bb6 | 601 | |
ef1ac12b | 602 | 20020625 |
603 | - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh | |
1a44c6f7 | 604 | - (stevesk) [README.privsep] minor updates |
fd3cbf67 | 605 | - (djm) Create privsep directory and warn if privsep user is missing |
606 | during make install | |
702b2855 | 607 | - (bal) Started list of PrivSep issues in TODO |
1c6249af | 608 | - (bal) if mmap() is substandard, don't allow compression on server side. |
609 | Post 'event' we will add more options. | |
cbaa3d44 | 610 | - (tim) [contrib/caldera/openssh.spec] Sync with Caldera |
e2bc41f9 | 611 | - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by |
612 | dtucker@zip.com.au | |
d170feb1 | 613 | - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus |
614 | for Cygwin, Cray, & SCO | |
ef1ac12b | 615 | |
d5803314 | 616 | 20020624 |
617 | - OpenBSD CVS Sync | |
618 | - deraadt@cvs.openbsd.org 2002/06/23 03:25:50 | |
619 | [tildexpand.c] | |
620 | KNF | |
3ddc795d | 621 | - deraadt@cvs.openbsd.org 2002/06/23 03:26:19 |
622 | [cipher.c key.c] | |
623 | KNF | |
d6133f43 | 624 | - deraadt@cvs.openbsd.org 2002/06/23 03:30:58 |
625 | [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c | |
626 | sshpty.c] | |
627 | various KNF and %d for unsigned | |
9906a836 | 628 | - deraadt@cvs.openbsd.org 2002/06/23 09:30:14 |
629 | [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c | |
630 | sftp.c] | |
631 | bunch of u_int vs int stuff | |
512df038 | 632 | - deraadt@cvs.openbsd.org 2002/06/23 09:39:55 |
633 | [ssh-keygen.c] | |
634 | u_int stuff | |
7528d467 | 635 | - deraadt@cvs.openbsd.org 2002/06/23 09:46:51 |
636 | [bufaux.c servconf.c] | |
637 | minor KNF. things the fingers do while you read | |
e424e241 | 638 | - deraadt@cvs.openbsd.org 2002/06/23 10:29:52 |
639 | [ssh-agent.c sshd.c] | |
640 | some minor KNF and %u | |
7138ebd9 | 641 | - deraadt@cvs.openbsd.org 2002/06/23 20:39:45 |
642 | [session.c] | |
643 | compression_level is u_int | |
f09ce20a | 644 | - deraadt@cvs.openbsd.org 2002/06/23 21:06:13 |
645 | [sshpty.c] | |
646 | KNF | |
57f228e8 | 647 | - deraadt@cvs.openbsd.org 2002/06/23 21:06:41 |
648 | [channels.c channels.h session.c session.h] | |
649 | display, screen, row, col, xpixel, ypixel are u_int; markus ok | |
0bc50167 | 650 | - deraadt@cvs.openbsd.org 2002/06/23 21:10:02 |
651 | [packet.c] | |
652 | packet_get_int() returns unsigned for reason & seqnr | |
57f228e8 | 653 | - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col, |
654 | xpixel are u_int. | |
655 | ||
d5803314 | 656 | |
58177c0a | 657 | 20020623 |
658 | - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX. | |
dc43acd2 | 659 | - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset. |
ef3912be | 660 | - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au |
a8bbdc75 | 661 | - OpenBSD CVS Sync |
662 | - stevesk@cvs.openbsd.org 2002/06/22 02:00:29 | |
663 | [ssh.h] | |
664 | correct comment | |
1ae02182 | 665 | - stevesk@cvs.openbsd.org 2002/06/22 02:40:23 |
666 | [ssh.1] | |
667 | section 5 not 4 for ssh_config | |
b2843ec6 | 668 | - naddy@cvs.openbsd.org 2002/06/22 11:51:39 |
669 | [ssh.1] | |
670 | typo | |
75653d3e | 671 | - stevesk@cvs.openbsd.org 2002/06/22 16:32:54 |
672 | [sshd.8] | |
673 | add /var/empty in FILES section | |
a56313d7 | 674 | - stevesk@cvs.openbsd.org 2002/06/22 16:40:19 |
675 | [sshd.c] | |
676 | check /var/empty owner mode; ok provos@ | |
e4e83d70 | 677 | - stevesk@cvs.openbsd.org 2002/06/22 16:41:57 |
678 | [scp.1] | |
679 | typo | |
baa08b92 | 680 | - stevesk@cvs.openbsd.org 2002/06/22 16:45:29 |
681 | [ssh-agent.1 sshd.8 sshd_config.5] | |
682 | use process ID vs. pid/PID/process identifier | |
c28876e9 | 683 | - stevesk@cvs.openbsd.org 2002/06/22 20:05:27 |
684 | [sshd.c] | |
685 | don't call setsid() if debugging or run from inetd; no "Operation not | |
686 | permitted" errors now; ok millert@ markus@ | |
d17ef027 | 687 | - stevesk@cvs.openbsd.org 2002/06/22 23:09:51 |
688 | [monitor.c] | |
689 | save auth method before monitor_reset_key_state(); bugzilla bug #284; | |
690 | ok provos@ | |
58177c0a | 691 | |
0b202697 | 692 | $Id$ |