]> andersk Git - openssh.git/blame - ChangeLog
- (tim) [configure.ac] Define BROKEN_GETADDRINFO on SVR5 systems. The native
[openssh.git] / ChangeLog
CommitLineData
2e6adf75 120100116
2 - (dtucker) [openbsd-compat/pwcache.c] Pull in includes.h and thus defines.h
3 so we correctly detect whether or not we have a native user_from_uid.
1666eacb 4 - (dtucker) [openbsd-compat/openbsd-compat.h] Prototypes for user_from_uid
5 and group_from_gid.
6cf8b42e 6 - (dtucker) [openbsd-compat/openbsd-compat.h] Fix prototypes, spotted by
7 Tim.
e5271db2 8 - (dtucker) OpenBSD CVS Sync
9 - markus@cvs.openbsd.org 2010/01/15 09:24:23
10 [sftp-common.c]
11 unused
6bcd3709 12 - (dtucker) [openbsd-compat/pwcache.c] Shrink ifdef area to prevent unused
13 variable warnings.
cc52586e 14 - (dtucker) [openbsd-compat/openbsd-compat.h] Typo.
3be6fc36 15 - (tim) [regress/portnum.sh] Shell portability fix.
0303fddc 16 - (tim) [configure.ac] Define BROKEN_GETADDRINFO on SVR5 systems. The native
17 getaddrinfo() is too old and limited for addr_pton() in addrmatch.c.
2e6adf75 18
69098855 1920100115
20 - (dtucker) OpenBSD CVS Sync
21 - jmc@cvs.openbsd.org 2010/01/13 12:48:34
22 [sftp.1 sftp.c]
23 sftp.1: put ls -h in the right place
24 sftp.c: as above, plus add -p to get/put, and shorten their arg names
25 to keep the help usage nicely aligned
26 ok djm
239542dc 27 - djm@cvs.openbsd.org 2010/01/13 23:47:26
28 [auth.c]
29 when using ChrootDirectory, make sure we test for the existence of the
30 user's shell inside the chroot; bz #1679, patch from alex AT rtfs.hu;
31 ok dtucker
6d588777 32 - dtucker@cvs.openbsd.org 2010/01/14 23:41:49
33 [sftp-common.c]
34 use user_from{uid,gid} to lookup up ids since it keeps a small cache.
35 ok djm
d8311568 36 - guenther@cvs.openbsd.org 2010/01/15 00:05:22
37 [sftp.c]
38 Reset SIGTERM to SIG_DFL before executing ssh, so that even if sftp
39 inherited SIGTERM as ignored it will still be able to kill the ssh it
40 starts.
41 ok dtucker@
8f8a4508 42 - (dtucker) [openbsd-compat/pwcache.c] Pull in pwcache.c from OpenBSD (no
e45b6d40 43 changes yet but there will be some to come).
2dec25c9 44 - (dtucker) [configure.ac openbsd-compat/{Makefile.in,pwcache.c} Portability
45 for pwcache. Also, added caching of negative hits.
69098855 46
962386fc 4720100114
48 - (djm) [platform.h] Add missing prototype for
49 platform_krb5_get_principal_name
50
e37f390b 5120100113
52 - (dtucker) [monitor_fdpass.c] Wrap poll.h include in ifdefs.
1f4dfa18 53 - (dtucker) [openbsd-compat/readpassphrase.c] Resync against OpenBSD's r1.18:
54 missing restore of SIGTTOU and some whitespace.
851a428e 55 - (dtucker) [openbsd-compat/readpassphrase.c] Update to OpenBSD's r1.21.
168e46a0 56 - (dtucker) [openbsd-compat/readpassphrase.c] Update to OpenBSD's r1.22.
57 Fixes bz #1590, where sometimes you could not interrupt a connection while
58 ssh was prompting for a passphrase or password.
52e1856c 59 - (dtucker) OpenBSD CVS Sync
60 - dtucker@cvs.openbsd.org 2010/01/13 00:19:04
61 [sshconnect.c auth.c]
62 Fix a couple of typos/mispellings in comments
51529944 63 - dtucker@cvs.openbsd.org 2010/01/13 01:10:56
64 [key.c]
65 Ignore and log any Protocol 1 keys where the claimed size is not equal to
66 the actual size. Noted by Derek Martin, ok djm@
420c55a1 67 - dtucker@cvs.openbsd.org 2010/01/13 01:20:20
68 [canohost.c ssh-keysign.c sshconnect2.c]
69 Make HostBased authentication work with a ProxyCommand. bz #1569, patch
70 from imorgan at nas nasa gov, ok djm@
29793ade 71 - djm@cvs.openbsd.org 2010/01/13 01:40:16
72 [sftp.c sftp-server.c sftp.1 sftp-common.c sftp-common.h]
73 support '-h' (human-readable units) for sftp's ls command, just like
74 ls(1); ok dtucker@
ca24b550 75 - djm@cvs.openbsd.org 2010/01/13 03:48:13
76 [servconf.c servconf.h sshd.c]
77 avoid run-time failures when specifying hostkeys via a relative
78 path by prepending the cwd in these cases; bz#1290; ok dtucker@
13455c70 79 - djm@cvs.openbsd.org 2010/01/13 04:10:50
80 [sftp.c]
81 don't append a space after inserting a completion of a directory (i.e.
82 a path ending in '/') for a slightly better user experience; ok dtucker@
c1e654ec 83 - (dtucker) [sftp-common.c] Wrap include of util.h in an ifdef.
795b6739 84 - (tim) [defines.h] openbsd-compat/readpassphrase.c now needs _NSIG.
85 feedback and ok dtucker@
e37f390b 86
e4393625 8720100112
e6780883 88 - (dtucker) OpenBSD CVS Sync
89 - dtucker@cvs.openbsd.org 2010/01/11 01:39:46
90 [ssh_config channels.c ssh.1 channels.h ssh.c]
91 Add a 'netcat mode' (ssh -W). This connects stdio on the client to a
92 single port forward on the server. This allows, for example, using ssh as
93 a ProxyCommand to route connections via intermediate servers.
94 bz #1618, man page help from jmc@, ok markus@
13b90bdd 95 - dtucker@cvs.openbsd.org 2010/01/11 04:46:45
96 [authfile.c sshconnect2.c]
97 Do not prompt for a passphrase if we fail to open a keyfile, and log the
98 reason the open failed to debug.
99 bz #1693, found by tj AT castaglia org, ok djm@
c23cfd0d 100 - djm@cvs.openbsd.org 2010/01/11 10:51:07
101 [ssh-keygen.c]
102 when converting keys, truncate key comments at 72 chars as per RFC4716;
103 bz#1630 reported by tj AT castaglia.org; ok markus@
17c7855a 104 - dtucker@cvs.openbsd.org 2010/01/12 00:16:47
105 [authfile.c]
106 Fix bug introduced in r1.78 (incorrect brace location) that broke key auth.
107 Patch from joachim joachimschipper nl.
e8e24c80 108 - djm@cvs.openbsd.org 2010/01/12 00:58:25
109 [monitor_fdpass.c]
110 avoid spinning when fd passing on nonblocking sockets by calling poll()
111 in the EINTR/EAGAIN path, much like we do in atomicio; ok dtucker@
6bbbf0b8 112 - djm@cvs.openbsd.org 2010/01/12 00:59:29
113 [roaming_common.c]
114 delete with extreme prejudice a debug() that fired with every keypress;
115 ok dtucker deraadt
97397841 116 - dtucker@cvs.openbsd.org 2010/01/12 01:31:05
117 [session.c]
118 Do not allow logins if /etc/nologin exists but is not readable by the user
119 logging in. Noted by Jan.Pechanec at Sun, ok djm@ deraadt@
e0cbb24b 120 - djm@cvs.openbsd.org 2010/01/12 01:36:08
121 [buffer.h bufaux.c]
122 add a buffer_get_string_ptr_ret() that does the same as
123 buffer_get_string_ptr() but does not fatal() on error; ok dtucker@
e4393625 124 - dtucker@cvs.openbsd.org 2010/01/12 08:33:17
125 [session.c]
126 Add explicit stat so we reliably detect nologin with bad perms.
127 ok djm markus
e6780883 128
12920100110
70dd663d 130 - (dtucker) [configure.ac misc.c readconf.c servconf.c ssh-keyscan.c]
131 Remove hacks add for RoutingDomain in preparation for its removal.
04b061c4 132 - (dtucker) OpenBSD CVS Sync
16d64584 133 - dtucker@cvs.openbsd.org 2010/01/09 23:04:13
134 [channels.c ssh.1 servconf.c sshd_config.5 sshd.c channels.h servconf.h
135 ssh-keyscan.1 ssh-keyscan.c readconf.c sshconnect.c misc.c ssh.c
136 readconf.h scp.1 sftp.1 ssh_config.5 misc.h]
137 Remove RoutingDomain from ssh since it's now not needed. It can be
138 replaced with "route exec" or "nc -V" as a proxycommand. "route exec"
139 also ensures that trafic such as DNS lookups stays withing the specified
140 routingdomain. For example (from reyk):
141 # route -T 2 exec /usr/sbin/sshd
142 or inherited from the parent process
143 $ route -T 2 exec sh
144 $ ssh 10.1.2.3
145 ok deraadt@ markus@ stevesk@ reyk@
04b061c4 146 - dtucker@cvs.openbsd.org 2010/01/10 03:51:17
147 [servconf.c]
148 Add ChrootDirectory to sshd.c test-mode output
5deb8b6e 149 - dtucker@cvs.openbsd.org 2010/01/10 07:15:56
150 [auth.c]
151 Output a debug if we can't open an existing keyfile. bz#1694, ok djm@
70dd663d 152
e6780883 15320100109
17073b5e 154 - (dtucker) Wrap use of IPPROTO_IPV6 in an ifdef for platforms that don't
155 have it.
d59ac96c 156 - (dtucker) [defines.h] define PRIu64 for platforms that don't have it.
2d7536f6 157 - (dtucker) [roaming_client.c] Wrap inttypes.h in an ifdef.
5dec7926 158 - (dtucker) [loginrec.c] Use the SUSv3 specified name for the user name
159 when using utmpx. Patch from Ed Schouten.
250caf33 160 - (dtucker) OpenBSD CVS Sync
161 - djm@cvs.openbsd.org 2010/01/09 00:20:26
162 [sftp-server.c sftp-server.8]
163 add a 'read-only' mode to sftp-server(8) that disables open in write mode
164 and all other fs-modifying protocol methods. bz#430 ok dtucker@
29c7b6ce 165 - djm@cvs.openbsd.org 2010/01/09 00:57:10
166 [PROTOCOL]
167 tweak language
0752feb3 168 - jmc@cvs.openbsd.org 2010/01/09 03:36:00
169 [sftp-server.8]
170 bad place to forget a comma...
ccd01778 171 - djm@cvs.openbsd.org 2010/01/09 05:04:24
172 [mux.c sshpty.h clientloop.c sshtty.c]
173 quell tc[gs]etattr warnings when forcing a tty (ssh -tt), since we
174 usually don't actually have a tty to read/set; bz#1686 ok dtucker@
7b610012 175 - dtucker@cvs.openbsd.org 2010/01/09 05:17:00
176 [roaming_client.c]
177 Remove a PRIu64 format string that snuck in with roaming. ok djm@
96fc1b1b 178 - dtucker@cvs.openbsd.org 2010/01/09 11:13:02
179 [sftp.c]
180 Prevent sftp from derefing a null pointer when given a "-" without a
181 command. Also, allow whitespace to follow a "-". bz#1691, path from
182 Colin Watson via Debian. ok djm@ deraadt@
1e0e398c 183 - dtucker@cvs.openbsd.org 2010/01/09 11:17:56
184 [sshd.c]
185 Afer sshd receives a SIGHUP, ignore subsequent HUPs while sshd re-execs
186 itself. Prevents two HUPs in quick succession from resulting in sshd
187 dying. bz#1692, patch from Colin Watson via Ubuntu.
ce27af32 188 - (dtucker) [defines.h] Remove now-undeeded PRIu64 define.
17073b5e 189
e6780883 19020100108
1270be26 191 - (dtucker) OpenBSD CVS Sync
192 - andreas@cvs.openbsd.org 2009/10/24 11:11:58
193 [roaming.h]
194 Declarations needed for upcoming changes.
195 ok markus@
d8b0d145 196 - andreas@cvs.openbsd.org 2009/10/24 11:13:54
197 [sshconnect2.c kex.h kex.c]
198 Let the client detect if the server supports roaming by looking
199 for the resume@appgate.com kex algorithm.
200 ok markus@
bb466eca 201 - andreas@cvs.openbsd.org 2009/10/24 11:15:29
202 [clientloop.c]
203 client_loop() must detect if the session has been suspended and resumed,
204 and take appropriate action in that case.
205 From Martin Forssen, maf at appgate dot com
d33822b7 206 - andreas@cvs.openbsd.org 2009/10/24 11:19:17
207 [ssh2.h]
208 Define the KEX messages used when resuming a suspended connection.
bb466eca 209 ok markus@
60751dff 210 - andreas@cvs.openbsd.org 2009/10/24 11:22:37
211 [roaming_common.c]
212 Do the actual suspend/resume in the client. This won't be useful until
213 the server side supports roaming.
214 Most code from Martin Forssen, maf at appgate dot com. Some changes by
215 me and markus@
216 ok markus@
1cb94277 217 - andreas@cvs.openbsd.org 2009/10/24 11:23:42
218 [ssh.c]
219 Request roaming to be enabled if UseRoaming is true and the server
220 supports it.
221 ok markus@
fe7dba42 222 - reyk@cvs.openbsd.org 2009/10/28 16:38:18
223 [ssh_config.5 sshd.c misc.h ssh-keyscan.1 readconf.h sshconnect.c
224 channels.c channels.h servconf.h servconf.c ssh.1 ssh-keyscan.c scp.1
225 sftp.1 sshd_config.5 readconf.c ssh.c misc.c]
226 Allow to set the rdomain in ssh/sftp/scp/sshd and ssh-keyscan.
227 ok markus@
d92c9eaa 228 - jmc@cvs.openbsd.org 2009/10/28 21:45:08
229 [sshd_config.5 sftp.1]
230 tweak previous;
a30caa92 231 - djm@cvs.openbsd.org 2009/11/10 02:56:22
232 [ssh_config.5]
233 explain the constraints on LocalCommand some more so people don't
234 try to abuse it.
09367de8 235 - djm@cvs.openbsd.org 2009/11/10 02:58:56
236 [sshd_config.5]
237 clarify that StrictModes does not apply to ChrootDirectory. Permissions
238 and ownership are always checked when chrooting. bz#1532
fe5bc072 239 - dtucker@cvs.openbsd.org 2009/11/10 04:30:45
240 [sshconnect2.c channels.c sshconnect.c]
241 Set close-on-exec on various descriptors so they don't get leaked to
242 child processes. bz #1643, patch from jchadima at redhat, ok deraadt.
7501ed0d 243 - markus@cvs.openbsd.org 2009/11/11 21:37:03
244 [channels.c channels.h]
245 fix race condition in x11/agent channel allocation: don't read after
246 the end of the select read/write fdset and make sure a reused FD
247 is not touched before the pre-handlers are called.
248 with and ok djm@
851d192b 249 - djm@cvs.openbsd.org 2009/11/17 05:31:44
250 [clientloop.c]
251 fix incorrect exit status when multiplexing and channel ID 0 is recycled
252 bz#1570 reported by peter.oliver AT eon-is.co.uk; ok dtucker
0cc9aecf 253 - djm@cvs.openbsd.org 2009/11/19 23:39:50
254 [session.c]
255 bz#1606: error when an attempt is made to connect to a server
256 with ForceCommand=internal-sftp with a shell session (i.e. not a
257 subsystem session). Avoids stuck client when attempting to ssh to such a
258 service. ok dtucker@
f69e651d 259 - dtucker@cvs.openbsd.org 2009/11/20 00:15:41
260 [session.c]
261 Warn but do not fail if stat()ing the subsystem binary fails. This helps
262 with chrootdirectory+forcecommand=sftp-server and restricted shells.
263 bz #1599, ok djm.
b3534d29 264 - djm@cvs.openbsd.org 2009/11/20 00:54:01
265 [sftp.c]
266 bz#1588 change "Connecting to host..." message to "Connected to host."
267 and delay it until after the sftp protocol connection has been established.
268 Avoids confusing sequence of messages when the underlying ssh connection
269 experiences problems. ok dtucker@
db528a58 270 - dtucker@cvs.openbsd.org 2009/11/20 00:59:36
271 [sshconnect2.c]
272 Use the HostKeyAlias when prompting for passwords. bz#1039, ok djm@
704709cf 273 - djm@cvs.openbsd.org 2009/11/20 03:24:07
274 [misc.c]
275 correct off-by-one in percent_expand(): we would fatal() when trying
276 to expand EXPAND_MAX_KEYS, allowing only EXPAND_MAX_KEYS-1 to actually
277 work. Note that nothing in OpenSSH actually uses close to this limit at
278 present. bz#1607 from Jan.Pechanec AT Sun.COM
f2aba402 279 - halex@cvs.openbsd.org 2009/11/22 13:18:00
280 [sftp.c]
281 make passing of zero-length arguments to ssh safe by
282 passing "-<switch>" "<value>" rather than "-<switch><value>"
283 ok dtucker@, guenther@, djm@
87d86481 284 - dtucker@cvs.openbsd.org 2009/12/06 23:41:15
285 [sshconnect2.c]
286 zap unused variable and strlen; from Steve McClellan, ok djm
e657a401 287 - djm@cvs.openbsd.org 2009/12/06 23:53:45
288 [roaming_common.c]
289 use socklen_t for getsockopt optlen parameter; reported by
290 Steve.McClellan AT radisys.com, ok dtucker@
38b1f255 291 - dtucker@cvs.openbsd.org 2009/12/06 23:53:54
292 [sftp.c]
293 fix potential divide-by-zero in sftp's "df" output when talking to a server
294 that reports zero files on the filesystem (Unix filesystems always have at
295 least the root inode). From Steve McClellan at radisys, ok djm@
d7af0c50 296 - markus@cvs.openbsd.org 2009/12/11 18:16:33
297 [key.c]
298 switch from 35 to the more common value of RSA_F4 == (2**16)+1 == 65537
299 for the RSA public exponent; discussed with provos; ok djm@
c3773c6e 300 - guenther@cvs.openbsd.org 2009/12/20 07:28:36
301 [ssh.c sftp.c scp.c]
302 When passing user-controlled options with arguments to other programs,
303 pass the option and option argument as separate argv entries and
304 not smashed into one (e.g., as -l foo and not -lfoo). Also, always
305 pass a "--" argument to stop option parsing, so that a positional
306 argument that starts with a '-' isn't treated as an option. This
307 fixes some error cases as well as the handling of hostnames and
308 filenames that start with a '-'.
309 Based on a diff by halex@
310 ok halex@ djm@ deraadt@
f67f71f1 311 - djm@cvs.openbsd.org 2009/12/20 23:20:40
312 [PROTOCOL]
313 fix an incorrect magic number and typo in PROTOCOL; bz#1688
314 report and fix from ueno AT unixuser.org
9e622dcd 315 - stevesk@cvs.openbsd.org 2009/12/25 19:40:21
316 [readconf.c servconf.c misc.h ssh-keyscan.c misc.c]
317 validate routing domain is in range 0-RT_TABLEID_MAX.
318 'Looks right' deraadt@
bad23583 319 - stevesk@cvs.openbsd.org 2009/12/29 16:38:41
320 [sshd_config.5 readconf.c ssh_config.5 scp.1 servconf.c sftp.1 ssh.1]
321 Rename RDomain config option to RoutingDomain to be more clear and
322 consistent with other options.
323 NOTE: if you currently use RDomain in the ssh client or server config,
324 or ssh/sshd -o, you must update to use RoutingDomain.
325 ok markus@ djm@
d0335861 326 - jmc@cvs.openbsd.org 2009/12/29 18:03:32
327 [sshd_config.5 ssh_config.5]
328 sort previous;
e85f4dce 329 - dtucker@cvs.openbsd.org 2010/01/04 01:45:30
330 [sshconnect2.c]
331 Don't escape backslashes in the SSH2 banner. bz#1533, patch from
332 Michal Gorny via Gentoo.
4e715007 333 - djm@cvs.openbsd.org 2010/01/04 02:03:57
334 [sftp.c]
335 Implement tab-completion of commands, local and remote filenames for sftp.
336 Hacked on and off for some time by myself, mouring, Carlos Silva (via 2009
337 Google Summer of Code) and polished to a fine sheen by myself again.
338 It should deal more-or-less correctly with the ikky corner-cases presented
339 by quoted filenames, but the UI could still be slightly improved.
340 In particular, it is quite slow for remote completion on large directories.
341 bz#200; ok markus@
d4b8c904 342 - djm@cvs.openbsd.org 2010/01/04 02:25:15
343 [sftp-server.c]
344 bz#1566 don't unnecessarily dup() in and out fds for sftp-server;
345 ok markus@
d03186af 346 - dtucker@cvs.openbsd.org 2010/01/08 21:50:49
347 [sftp.c]
348 Fix two warnings: possibly used unitialized and use a nul byte instead of
349 NULL pointer. ok djm@
6f8969f5 350 - (dtucker) [Makefile.in added roaming_client.c roaming_serv.c] Import new
351 files for roaming and add to Makefile.
957016e4 352 - (dtucker) [Makefile.in] .c files do not belong in the OBJ lines.
81598a81 353 - (dtucker) [sftp.c] ifdef out the sftp completion bits for platforms that
354 don't have libedit.
85fee9c0 355 - (dtucker) [configure.ac misc.c readconf.c servconf.c ssh-keyscan.c] Make
356 RoutingDomain an unsupported option on platforms that don't have it.
21e59e57 357 - (dtucker) [sftp.c] Expand ifdef for libedit to cover complete_is_remote
358 too.
1c0194f1 359 - (dtucker) [misc.c] Move the routingdomain ifdef to allow the socket to
360 be created.
3b6c53d3 361 - (dtucker] [misc.c] Shrink the area covered by USE_ROUTINGDOMAIN more
362 to eliminate an unused variable warning.
fcbc6487 363 - (dtucker) [roaming_serv.c] Include includes.h for u_intXX_t types.
1270be26 364
da073eee 36520091226
366 - (tim) [contrib/cygwin/Makefile] Install ssh-copy-id and ssh-copy-id.1
367 Gzip all man pages. Patch from Corinna Vinschen.
368
3bef3252 36920091221
370 - (dtucker) [auth-krb5.c platform.{c,h} openbsd-compat/port-aix.{c,h}]
371 Bug #1583: Use system's kerberos principal name on AIX if it's available.
372 Based on a patch from and tested by Miguel Sanders
373
fd2d830a 37420091208
375 - (dtucker) Bug #1470: Disable OOM-killing of the listening sshd on Linux,
376 based on a patch from Vaclav Ovsik and Colin Watson. ok djm.
377
6b52ddbd 37820091207
379 - (dtucker) Bug #1160: use pkg-config for opensc config if it's available.
380 Tested by Martin Paljak.
95f0ee69 381 - (dtucker) Bug #1677: add conditionals around the source for ssh-askpass.
6b52ddbd 382
e4402dc5 38320091121
384 - (tim) [opensshd.init.in] If PidFile is set in sshd_config, use it.
385 Bug 1628. OK dtucker@
386
48662587 38720091120
388 - (djm) [ssh-rand-helper.c] Print error and usage() when passed command-
389 line arguments as none are supported. Exit when passed unrecognised
390 commandline flags. bz#1568 from gson AT araneus.fi
391
39220091118
4e1082aa 393 - (djm) [channels.c misc.c misc.h sshd.c] add missing setsockopt() to
394 set IPV6_V6ONLY for local forwarding with GatwayPorts=yes. Unify
395 setting IPV6_V6ONLY behind a new function misc.c:sock_set_v6only()
e5a1e421 396 bz#1648, report and fix from jan.kratochvil AT redhat.com
397 - (djm) [contrib/gnome-ssh-askpass2.c] Make askpass dialog desktop-modal.
398 bz#1645, patch from jchadima AT redhat.com
4e1082aa 399
cd82326a 40020091107
401 - (dtucker) [authfile.c] Fall back to 3DES for the encryption of private
402 keys when built with OpenSSL versions that don't do AES.
403
090c27c5 40420091105
405 - (dtucker) [authfile.c] Add OpenSSL compat header so this still builds with
406 older versions of OpenSSL.
407
5c0f4199 40820091024
409 - (dtucker) OpenBSD CVS Sync
410 - djm@cvs.openbsd.org 2009/10/11 23:03:15
411 [hostfile.c]
412 mention the host name that we are looking for in check_host_in_hostfile()
1a0a69a7 413 - sobrado@cvs.openbsd.org 2009/10/17 12:10:39
414 [sftp-server.c]
415 sort flags.
7a779483 416 - sobrado@cvs.openbsd.org 2009/10/22 12:35:53
417 [ssh.1 ssh-agent.1 ssh-add.1]
418 use the UNIX-related macros (.At and .Ux) where appropriate.
419 ok jmc@
78da49cb 420 - sobrado@cvs.openbsd.org 2009/10/22 15:02:12
421 [ssh-agent.1 ssh-add.1 ssh.1]
422 write UNIX-domain in a more consistent way; while here, replace a
423 few remaining ".Tn UNIX" macros with ".Ux" ones.
424 pointed out by ratchov@, thanks!
425 ok jmc@
4c9466ae 426 - djm@cvs.openbsd.org 2009/10/22 22:26:13
427 [authfile.c]
428 switch from 3DES to AES-128 for encryption of passphrase-protected
429 SSH protocol 2 private keys; ok several
fbba8bf6 430 - djm@cvs.openbsd.org 2009/10/23 01:57:11
431 [sshconnect2.c]
432 disallow a hostile server from checking jpake auth by sending an
433 out-of-sequence success message. (doesn't affect code enabled by default)
78edb05a 434 - dtucker@cvs.openbsd.org 2009/10/24 00:48:34
435 [ssh-keygen.1]
436 ssh-keygen now uses AES-128 for private keys
aaeda216 437 - (dtucker) [mdoc2man.awk] Teach it to understand the .Ux macro.
51fa929a 438 - (dtucker) [session.c openbsd-compat/port-linux.{c,h}] Bug #1637: if selinux
439 is enabled set the security context to "sftpd_t" before running the
440 internal sftp server Based on a patch from jchadima at redhat.
5c0f4199 441
19b6c4d5 44220091011
443 - (dtucker) [configure.ac sftp-client.c] Remove the gyrations required for
444 dirent d_type and DTTOIF as we've switched OpenBSD to the more portable
445 lstat.
21af5fc4 446 - (dtucker) OpenBSD CVS Sync
447 - markus@cvs.openbsd.org 2009/10/08 14:03:41
448 [sshd_config readconf.c ssh_config.5 servconf.c sshd_config.5]
449 disable protocol 1 by default (after a transition period of about 10 years)
450 ok deraadt
0dba6d86 451 - jmc@cvs.openbsd.org 2009/10/08 20:42:12
452 [sshd_config.5 ssh_config.5 sshd.8 ssh.1]
453 some tweaks now that protocol 1 is not offered by default; ok markus
711fb093 454 - dtucker@cvs.openbsd.org 2009/10/11 10:41:26
455 [sftp-client.c]
456 d_type isn't portable so use lstat to get dirent modes. Suggested by and
457 "looks sane" deraadt@
991c9728 458 - markus@cvs.openbsd.org 2009/10/08 18:04:27
459 [regress/test-exec.sh]
460 re-enable protocol v1 for the tests.
19b6c4d5 461
3496b8d4 46220091007
463 - (dtucker) OpenBSD CVS Sync
464 - djm@cvs.openbsd.org 2009/08/12 00:13:00
465 [sftp.c sftp.1]
466 support most of scp(1)'s commandline arguments in sftp(1), as a first
467 step towards making sftp(1) a drop-in replacement for scp(1).
468 One conflicting option (-P) has not been changed, pending further
469 discussion.
470 Patch from carlosvsilvapt@gmail.com as part of his work in the
471 Google Summer of Code
b68241c3 472 - jmc@cvs.openbsd.org 2009/08/12 06:31:42
473 [sftp.1]
474 sort options;
97658f13 475 - djm@cvs.openbsd.org 2009/08/13 01:11:19
476 [sftp.1 sftp.c]
477 Swizzle options: "-P sftp_server_path" moves to "-D sftp_server_path",
478 add "-P port" to match scp(1). Fortunately, the -P option is only really
479 used by our regression scripts.
480 part of larger patch from carlosvsilvapt@gmail.com for his Google Summer
481 of Code work; ok deraadt markus
5aa0f160 482 - jmc@cvs.openbsd.org 2009/08/13 13:39:54
483 [sftp.1 sftp.c]
484 sync synopsis and usage();
e746280c 485 - djm@cvs.openbsd.org 2009/08/14 18:17:49
486 [sftp-client.c]
487 make the "get_handle: ..." error messages vaguely useful by allowing
488 callers to specify their own error message strings.
5d799258 489 - fgsch@cvs.openbsd.org 2009/08/15 18:56:34
490 [auth.h]
491 remove unused define. markus@ ok.
492 (Id sync only, Portable still uses this.)
7b3a24aa 493 - dtucker@cvs.openbsd.org 2009/08/16 23:29:26
494 [sshd_config.5]
495 Add PubkeyAuthentication to the list allowed in a Match block (bz #1577)
d141f964 496 - djm@cvs.openbsd.org 2009/08/18 18:36:21
497 [sftp-client.h sftp.1 sftp-client.c sftp.c]
498 recursive transfer support for get/put and on the commandline
499 work mostly by carlosvsilvapt@gmail.com for the Google Summer of Code
500 with some tweaks by me; "go for it" deraadt@
e83f55f9 501 - djm@cvs.openbsd.org 2009/08/18 21:15:59
502 [sftp.1]
503 fix "get" command usage, spotted by jmc@
3829cbca 504 - jmc@cvs.openbsd.org 2009/08/19 04:56:03
505 [sftp.1]
506 ether -> either;
2e2c33ad 507 - dtucker@cvs.openbsd.org 2009/08/20 23:54:28
508 [mux.c]
509 subsystem_flag is defined in ssh.c so it's extern; ok djm
99c5cf8e 510 - djm@cvs.openbsd.org 2009/08/27 17:28:52
511 [sftp-server.c]
512 allow setting an explicit umask on the commandline to override whatever
513 default the user has. bz#1229; ok dtucker@ deraadt@ markus@
bf3290be 514 - djm@cvs.openbsd.org 2009/08/27 17:33:49
515 [ssh-keygen.c]
516 force use of correct hash function for random-art signature display
517 as it was inheriting the wrong one when bubblebabble signatures were
518 activated; bz#1611 report and patch from fwojcik+openssh AT besh.com;
519 ok markus@
62b92bdc 520 - djm@cvs.openbsd.org 2009/08/27 17:43:00
521 [sftp-server.8]
522 allow setting an explicit umask on the commandline to override whatever
523 default the user has. bz#1229; ok dtucker@ deraadt@ markus@
b4741f94 524 - djm@cvs.openbsd.org 2009/08/27 17:44:52
525 [authfd.c ssh-add.c authfd.h]
526 Do not fall back to adding keys without contraints (ssh-add -c / -t ...)
527 when the agent refuses the constrained add request. This was a useful
528 migration measure back in 2002 when constraints were new, but just
529 adds risk now.
530 bz #1612, report and patch from dkg AT fifthhorseman.net; ok markus@
57a6b5dd 531 - djm@cvs.openbsd.org 2009/08/31 20:56:02
532 [sftp-server.c]
533 check correct variable for error message, spotted by martynas@
b7177174 534 - djm@cvs.openbsd.org 2009/08/31 21:01:29
535 [sftp-server.8]
536 document -e and -h; prodded by jmc@
5561856d 537 - djm@cvs.openbsd.org 2009/09/01 14:43:17
538 [ssh-agent.c]
539 fix a race condition in ssh-agent that could result in a wedged or
540 spinning agent: don't read off the end of the allocated fd_sets, and
541 don't issue blocking read/write on agent sockets - just fall back to
542 select() on retriable read/write errors. bz#1633 reported and tested
543 by "noodle10000 AT googlemail.com"; ok dtucker@ markus@
fd8b10fa 544 - grunk@cvs.openbsd.org 2009/10/01 11:37:33
545 [dh.c]
546 fix a cast
547 ok djm@ markus@
45bb6142 548 - djm@cvs.openbsd.org 2009/10/06 04:46:40
549 [session.c]
550 bz#1596: fflush(NULL) before exec() to ensure that everying (motd
551 in particular) has made it out before the streams go away.
1aeac41e 552 - djm@cvs.openbsd.org 2008/12/07 22:17:48
553 [regress/addrmatch.sh]
554 match string "passwordauthentication" only at start of line, not anywhere
555 in sshd -T output
cbc2c3e5 556 - dtucker@cvs.openbsd.org 2009/05/05 07:51:36
557 [regress/multiplex.sh]
558 Always specify ssh_config for multiplex tests: prevents breakage caused
559 by options in ~/.ssh/config. From Dan Peterson.
95744748 560 - djm@cvs.openbsd.org 2009/08/13 00:57:17
561 [regress/Makefile]
562 regression test for port number parsing. written as part of the a2port
563 change that went into 5.2 but I forgot to commit it at the time...
6c8ebe98 564 - djm@cvs.openbsd.org 2009/08/13 01:11:55
90fc667e 565 [regress/sftp-batch.sh regress/sftp-badcmds.sh regress/sftp.sh
566 regress/sftp-cmds.sh regres/sftp-glob.sh]
6c8ebe98 567 date: 2009/08/13 01:11:19; author: djm; state: Exp; lines: +10 -7
568 Swizzle options: "-P sftp_server_path" moves to "-D sftp_server_path",
569 add "-P port" to match scp(1). Fortunately, the -P option is only really
570 used by our regression scripts.
571 part of larger patch from carlosvsilvapt@gmail.com for his Google Summer
572 of Code work; ok deraadt markus
c16b5840 573 - djm@cvs.openbsd.org 2009/08/20 18:43:07
90fc667e 574 [regress/ssh-com-sftp.sh]
c16b5840 575 fix one sftp -D ... => sftp -P ... conversion that I missed; from Carlos
576 Silva for Google Summer of Code
90fc667e 577 - dtucker@cvs.openbsd.org 2009/10/06 23:51:49
578 [regress/ssh2putty.sh]
579 Add OpenBSD tag to make syncs easier
deed7126 580 - (dtucker) [regress/portnum.sh] Import new test.
c7e0fa79 581 - (dtucker) [configure.ac sftp-client.c] DTOTIF is in fs/ffs/dir.h on at
4b48f754 582 least dragonflybsd.
c7e0fa79 583 - (dtucker) d_type is not mandated by POSIX, so add fallback code using
584 stat(), needed on at least cygwin.
3496b8d4 585
2391a73c 58620091002
587 - (djm) [Makefile.in] Mention readconf.o in ssh-keysign's make deps.
588 spotted by des AT des.no
589
018fda87 59020090926
591 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
592 [contrib/suse/openssh.spec] Update for release
593 - (djm) [README] update relnotes URL
594 - (djm) [packet.c] Restore EWOULDBLOCK handling that got lost somewhere
595 - (djm) Release 5.3p1
596
a37250f4 59720090911
598 - (dtucker) [configure.ac] Change the -lresolv check so it works on Mac OS X
599 10.6 (which doesn't have BIND8_COMPAT and thus uses res_9_query). Patch
600 from jbasney at ncsa uiuc edu.
601
bc33f6d6 60220090908
603 - (djm) [serverloop.c] Fix test for server-assigned remote forwarding port
604 (-R 0:...); bz#1578, spotted and fix by gavin AT emf.net; ok dtucker@
605
3acad382 60620090901
607 - (dtucker) [configure.ac] Bug #1639: use AC_PATH_PROG to search the path for
608 krb5-config if it's not in the location specified by --with-kerberos5.
609 Patch from jchadima at redhat.
610
84c645ec 61120090829
612 - (dtucker) [README.platform] Add text about development packages, based on
613 text from Chris Pepper in bug #1631.
614
7a51ce05 61520090828
616 - dtucker [auth-sia.c] Roll back the change for bug #1241 as it apparently
617 causes problems in some Tru64 configurations.
d108641a 618 - (djm) [sshd_config.5] downgrade mention of login.conf to be an example
619 and mention PAM as another provider for ChallengeResponseAuthentication;
620 bz#1408; ok dtucker@
6ecb350f 621 - (djm) [sftp-server.c] bz#1535: accept ENOSYS as a fallback error when
622 attempting atomic rename(); ok dtucker@
36141cb8 623 - (djm) [Makefile.in] bz#1505: Solaris make(1) doesn't accept make variables
624 in argv, so pass them in the environment; ok dtucker@
5e934f78 625 - (dtucker) [channels.c configure.ac] Bug #1528: skip the tcgetattr call on
626 the pty master on Solaris, since it never succeeds and can hang if large
627 amounts of data is sent to the slave (eg a copy-paste). Based on a patch
628 originally from Doke Scott, ok djm@
e7ac4a90 629 - (dtucker) [clientloop.c configure.ac defines.h] Make the client's IO buffer
630 size a compile-time option and set it to 64k on Cygwin, since Corinna
631 reports that it makes a significant difference to performance. ok djm@
00789f24 632 - (dtucker) [configure.ac] Fix the syntax of the Solaris tcgetattr entry.
7a51ce05 633
bf87c429 63420090820
635 - (dtucker) [includes.h] Bug #1634: do not include system glob.h if we're not
636 using it since the type conflicts can cause problems on FreeBSD. Patch
637 from Jonathan Chen.
406dc01a 638 - (dtucker) [session.c openbsd-compat/port-aix.h] Bugs #1249 and #1567: move
639 the setpcred call on AIX to immediately before the permanently_set_uid().
640 Ensures that we still have privileges when we call chroot and
641 pam_open_sesson. Based on a patch from David Leonard.
bf87c429 642
8295689f 64320090817
644 - (dtucker) [configure.ac] Check for headers before libraries for openssl an
645 zlib, which should make the errors slightly more meaningful on platforms
646 where there's separate "-devel" packages for those.
e339fa25 647 - (dtucker) [sshlogin.c openbsd-compat/port-aix.{c,h}] Bug #1595: make
648 PrintLastLog work on AIX. Based in part on a patch from Miguel Sanders.
8295689f 649
852de6fd 65020090729
651 - (tim) [contrib/cygwin/ssh-user-config] Change script to call correct error
652 function. Patch from Corinna Vinschen.
653
14a260e8 65420090713
655 - (dtucker) [openbsd-compat/getrrsetbyname.c] Reduce answer buffer size so it
656 fits into 16 bits to work around a bug in glibc's resolver where it masks
657 off the buffer size at 16 bits. Patch from Hauke Lampe, ok djm jakob.
658
0a008a4d 65920090712
660 - (dtucker) [configure.ac] Include sys/param.h for the sys/mount.h test,
661 prevents configure complaining on older BSDs.
74973c95 662 - (dtucker [contrib/cygwin/ssh-{host,user}-config] Add license text. Patch
663 from Corinna Vinschen.
f12c178c 664 - (dtucker) [auth-pam.c] Bug #1534: move the deletion of PAM credentials on
1d5c49e0 665 logout to after the session close. Patch from Anicka Bernathova,
666 originally from Andreas Schwab via Novelll ok djm.
0a008a4d 667
78576c54 66820090707
669 - (dtucker) [contrib/cygwin/ssh-host-config] better support for automated
670 scripts and fix usage of eval. Patch from Corinna Vinschen.
671
67220090705
dc11a83a 673 - (dtucker) OpenBSD CVS Sync
674 - andreas@cvs.openbsd.org 2009/06/27 09:29:06
675 [packet.h packet.c]
676 packet_bacup_state() and packet_restore_state() will be used to
677 temporarily save the current state ren resuming a suspended connection.
678 ok markus@
679 - andreas@cvs.openbsd.org 2009/06/27 09:32:43
680 [roaming_common.c roaming.h]
681 It may be necessary to retransmit some data when resuming, so add it
682 to a buffer when roaming is enabled.
683 Most of this code was written by Martin Forssen, maf at appgate dot com.
684 ok markus@
685 - andreas@cvs.openbsd.org 2009/06/27 09:35:06
686 [readconf.h readconf.c]
687 Add client option UseRoaming. It doesn't do anything yet but will
688 control whether the client tries to use roaming if enabled on the
689 server. From Martin Forssen.
690 ok markus@
691 - markus@cvs.openbsd.org 2009/06/30 14:54:40
692 [version.h]
693 crank version; ok deraadt
694 - dtucker@cvs.openbsd.org 2009/07/02 02:11:47
695 [ssh.c]
696 allow for long home dir paths (bz #1615). ok deraadt
697 (based in part on a patch from jchadima at redhat)
698 - stevesk@cvs.openbsd.org 2009/07/05 19:28:33
699 [clientloop.c]
700 only send SSH2_MSG_DISCONNECT if we're in compat20; from dtucker@
701 ok deraadt@ markus@
702
127c96db 70320090622
704 - (dtucker) OpenBSD CVS Sync
705 - dtucker@cvs.openbsd.org 2009/06/22 05:39:28
706 [monitor_wrap.c monitor_mm.c ssh-keygen.c auth2.c gss-genr.c sftp-client.c]
707 alphabetize includes; reduces diff vs portable and style(9).
708 ok stevesk djm
709 (Id sync only; these were already in order in -portable)
710
f0956980 71120090621
712 - (dtucker) OpenBSD CVS Sync
713 - markus@cvs.openbsd.org 2009/03/17 21:37:00
714 [ssh.c]
715 pass correct argv[0] to openlog(); ok djm@
8fe25329 716 - jmc@cvs.openbsd.org 2009/03/19 15:15:09
717 [ssh.1]
718 for "Ciphers", just point the reader to the keyword in ssh_config(5), just
719 as we do for "MACs": this stops us getting out of sync when the lists
720 change;
721 fixes documentation/6102, submitted by Peter J. Philipp
722 alternative fix proposed by djm
723 ok markus
230d03b6 724 - tobias@cvs.openbsd.org 2009/03/23 08:31:19
725 [ssh-agent.c]
726 Fixed a possible out-of-bounds memory access if the environment variable
727 SHELL is shorter than 3 characters.
728 with input by and ok dtucker
7027325d 729 - tobias@cvs.openbsd.org 2009/03/23 19:38:04
730 [ssh-agent.c]
731 My previous commit didn't fix the problem at all, so stick at my first
732 version of the fix presented to dtucker.
733 Issue notified by Matthias Barkhoff (matthias dot barkhoff at gmx dot de).
734 ok dtucker
b31ae930 735 - sobrado@cvs.openbsd.org 2009/03/26 08:38:39
736 [sftp-server.8 sshd.8 ssh-agent.1]
737 fix a few typographical errors found by spell(1).
738 ok dtucker@, jmc@
640f440b 739 - stevesk@cvs.openbsd.org 2009/04/13 19:07:44
740 [sshd_config.5]
741 fix possessive; ok djm@
7bd399ce 742 - stevesk@cvs.openbsd.org 2009/04/14 16:33:42
743 [sftp-server.c]
744 remove unused option character from getopt() optstring; ok markus@
3e576dfe 745 - jj@cvs.openbsd.org 2009/04/14 21:10:54
746 [servconf.c]
747 Fixed a few the-the misspellings in comments. Skipped a bunch in
748 binutils,gcc and so on. ok jmc@
02d56d32 749 - stevesk@cvs.openbsd.org 2009/04/17 19:23:06
750 [session.c]
751 use INTERNAL_SFTP_NAME for setproctitle() of in-process sftp-server;
752 ok djm@ markus@
db1f5925 753 - stevesk@cvs.openbsd.org 2009/04/17 19:40:17
754 [sshd_config.5]
755 clarify that even internal-sftp needs /dev/log for logging to work; ok
756 markus@
47f4188a 757 - jmc@cvs.openbsd.org 2009/04/18 18:39:10
758 [sshd_config.5]
759 tweak previous; ok stevesk
5df1f0e3 760 - stevesk@cvs.openbsd.org 2009/04/21 15:13:17
761 [sshd_config.5]
762 clarify we cd to user's home after chroot; ok markus@ on
763 earlier version; tweaks and ok jmc@
dc1f1948 764 - andreas@cvs.openbsd.org 2009/05/25 06:48:01
765 [channels.c packet.c clientloop.c packet.h serverloop.c monitor_wrap.c
766 monitor.c]
767 Put the globals in packet.c into a struct and don't access it directly
768 from other files. No functional changes.
769 ok markus@ djm@
770 - andreas@cvs.openbsd.org 2009/05/27 06:31:25
771 [canohost.h canohost.c]
772 Add clear_cached_addr(), needed for upcoming changes allowing the peer
773 address to change.
774 ok markus@
f936c5d4 775 - andreas@cvs.openbsd.org 2009/05/27 06:33:39
776 [clientloop.c]
777 Send SSH2_MSG_DISCONNECT when the client disconnects. From a larger
778 change from Martin Forssen, maf at appgate dot com.
779 ok markus@
abdc5018 780 - andreas@cvs.openbsd.org 2009/05/27 06:34:36
781 [kex.c kex.h]
782 Move the KEX_COOKIE_LEN define to kex.h
783 ok markus@
87db7000 784 - andreas@cvs.openbsd.org 2009/05/27 06:36:07
785 [packet.h packet.c]
786 Add packet_put_int64() and packet_get_int64(), part of a larger change
787 from Martin Forssen.
c6063ed7 788 ok markus@
789 - andreas@cvs.openbsd.org 2009/05/27 06:38:16
790 [sshconnect.h sshconnect.c]
791 Un-static ssh_exchange_identification(), part of a larger change from
792 Martin Forssen and needed for upcoming changes.
793 ok markus@
5d4d25cd 794 - andreas@cvs.openbsd.org 2009/05/28 16:50:16
795 [sshd.c packet.c serverloop.c monitor_wrap.c clientloop.c sshconnect.c
d0137ef8 796 monitor.c Added roaming.h roaming_common.c roaming_dummy.c]
5d4d25cd 797 Keep track of number of bytes read and written. Needed for upcoming
798 changes. Most code from Martin Forssen, maf at appgate dot com.
799 ok markus@
d0137ef8 800 Also, applied appropriate changes to Makefile.in
adb5cc1b 801 - andreas@cvs.openbsd.org 2009/06/12 20:43:22
802 [monitor.c packet.c]
803 Fix warnings found by chl@ and djm@ and change roaming_atomicio's
804 return type to match atomicio's
805 Diff from djm@, ok markus@
6a49252d 806 - andreas@cvs.openbsd.org 2009/06/12 20:58:32
807 [packet.c]
808 Move some more statics into session_state
809 ok markus@ djm@
ac692f84 810 - dtucker@cvs.openbsd.org 2009/06/21 07:37:15
811 [kexdhs.c kexgexs.c]
812 abort if key_sign fails, preventing possible null deref. Based on report
813 from Paolo Ganci, ok markus@ djm@
814 - dtucker@cvs.openbsd.org 2009/06/21 09:04:03
815 [roaming.h roaming_common.c roaming_dummy.c]
816 Add tags for the benefit of the sync scripts
817 Also: pull in the changes for 1.1->1.2 missed in the previous sync.
9b9302ea 818 - (dtucker) [auth2-jpake.c auth2.c canohost.h session.c] Whitespace and
819 header-order changes to reduce diff vs OpenBSD.
c8dc0909 820 - (dtucker) [servconf.c sshd.c] More whitespace sync.
e85016d4 821 - (dtucker) [roaming_common.c roaming_dummy.c] Wrap #include <inttypes.h> in
822 ifdef.
f0956980 823
87562a58 82420090616
825 - (dtucker) [configure.ac defines.h] Bug #1607: handle the case where fsid_t
826 is a struct with a __val member. Fixes build on, eg, Redhat 6.2.
827
6ee76eea 82820090504
829 - (dtucker) [sshlogin.c] Move the NO_SSH_LASTLOG #ifndef line to include
830 variable declarations. Should prevent unused warnings anywhere it's set
831 (only Crays as far as I can tell) and be a no-op everywhere else.
832
bc9a470b 83320090318
834 - (tim) [configure.ac] Remove setting IP_TOS_IS_BROKEN for Cygwin. The problem
835 that setsockopt(IP_TOS) doesn't work on Cygwin has been fixed since 2005.
836 Based on patch from vinschen at redhat com.
837
5077a5f6 83820090308
839 - (dtucker) [auth-passwd.c auth1.c auth2-kbdint.c auth2-none.c auth2-passwd.c
840 auth2-pubkey.c session.c openbsd-compat/bsd-cygwin_util.{c,h}
841 openbsd-compat/daemon.c] Remove support for Windows 95/98/ME and very old
842 version of Cygwin. Patch from vinschen at redhat com.
843
3e566c29 84420090307
845 - (dtucker) [contrib/aix/buildbff.sh] Only try to rename ssh_prng_cmds if it
846 exists (it's not created if OpenSSL's PRNG is self-seeded, eg if the OS
847 has a /dev/random).
36b68fd5 848 - (dtucker) [schnorr.c openbsd-compat/openssl-compat.{c,h}] Add
849 EVP_DigestUpdate to the OLD_EVP compatibility functions and tell schnorr.c
850 to use them. Allows building with older OpenSSL versions.
aeed50df 851 - (dtucker) [configure.ac defines.h] Check for in_port_t and typedef if needed.
86783a32 852 - (dtucker) [configure.ac] Missing comma in type list.
14e380c6 853 - (dtucker) [configure.ac openbsd-compat/openssl-compat.{c,h}]
854 EVP_DigestUpdate does not exactly match the other OLD_EVP functions (eg
855 in openssl 0.9.6) so add an explicit test for it.
3e566c29 856
5b01421b 85720090306
858 - (djm) OpenBSD CVS Sync
859 - djm@cvs.openbsd.org 2009/03/05 07:18:19
860 [auth2-jpake.c jpake.c jpake.h monitor_wrap.c monitor_wrap.h schnorr.c]
861 [sshconnect2.c]
862 refactor the (disabled) Schnorr proof code to make it a little more
863 generally useful
4f983ff5 864 - djm@cvs.openbsd.org 2009/03/05 11:30:50
865 [uuencode.c]
866 document what these functions do so I don't ever have to recuse into
867 b64_pton/ntop to remember their return values
5b01421b 868
ebf012a2 86920090223
870 - (djm) OpenBSD CVS Sync
871 - djm@cvs.openbsd.org 2009/02/22 23:50:57
872 [ssh_config.5 sshd_config.5]
873 don't advertise experimental options
09b37352 874 - djm@cvs.openbsd.org 2009/02/22 23:59:25
875 [sshd_config.5]
876 missing period
52d8f3f6 877 - djm@cvs.openbsd.org 2009/02/23 00:06:15
878 [version.h]
879 openssh-5.2
dc336a3b 880 - (djm) [README] update for 5.2
0e8d25c9 881 - (djm) Release openssh-5.2p1
ebf012a2 882
7eec82ab 88320090222
884 - (djm) OpenBSD CVS Sync
885 - tobias@cvs.openbsd.org 2009/02/21 19:32:04
886 [misc.c sftp-server-main.c ssh-keygen.c]
887 Added missing newlines in error messages.
888 ok dtucker
889
1925d16d 89020090221
891 - (djm) OpenBSD CVS Sync
892 - djm@cvs.openbsd.org 2009/02/17 01:28:32
893 [ssh_config]
894 sync with revised default ciphers; pointed out by dkrause@
dca75d4b 895 - djm@cvs.openbsd.org 2009/02/18 04:31:21
896 [schnorr.c]
897 signature should hash over the entire group, not just the generator
898 (this is still disabled code)
9a4a047b 899 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
900 [contrib/suse/openssh.spec] Prepare for 5.2p1
1925d16d 901
aa10bde9 90220090216
903 - (djm) [regress/conch-ciphers.sh regress/putty-ciphers.sh]
904 [regress/putty-kex.sh regress/putty-transfer.sh] Downgrade disabled
905 interop tests from FATAL error to a warning. Allows some interop
906 tests to proceed if others are missing necessary prerequisites.
4c3b7423 907 - (djm) [configure.ac] support GNU/kFreeBSD and GNU/kOpensolaris
908 systems; patch from Aurelien Jarno via rmh AT aybabtu.com
aa10bde9 909
69354fe2 91020090214
911 - (djm) OpenBSD CVS Sync
912 - dtucker@cvs.openbsd.org 2009/02/02 11:15:14
913 [sftp.c]
914 Initialize a few variables to prevent spurious "may be used
915 uninitialized" warnings from newer gcc's. ok djm@
17525a70 916 - djm@cvs.openbsd.org 2009/02/12 03:00:56
917 [canohost.c canohost.h channels.c channels.h clientloop.c readconf.c]
918 [readconf.h serverloop.c ssh.c]
919 support remote port forwarding with a zero listen port (-R0:...) to
920 dyamically allocate a listen port at runtime (this is actually
921 specified in rfc4254); bz#1003 ok markus@
1d68c50a 922 - djm@cvs.openbsd.org 2009/02/12 03:16:01
923 [serverloop.c]
924 tighten check for -R0:... forwarding: only allow dynamic allocation
925 if want_reply is set in the packet
28b5d376 926 - djm@cvs.openbsd.org 2009/02/12 03:26:22
927 [monitor.c]
928 some paranoia: check that the serialised key is really KEY_RSA before
929 diddling its internals
db9039d0 930 - djm@cvs.openbsd.org 2009/02/12 03:42:09
931 [ssh.1]
932 document -R0:... usage
1e709459 933 - djm@cvs.openbsd.org 2009/02/12 03:44:25
934 [ssh.1]
935 consistency: Dq => Ql
c6b2c0e0 936 - djm@cvs.openbsd.org 2009/02/12 03:46:17
937 [ssh_config.5]
938 document RemoteForward usage with 0 listen port
e12d3e21 939 - jmc@cvs.openbsd.org 2009/02/12 07:34:20
940 [ssh_config.5]
941 kill trailing whitespace;
8b773163 942 - markus@cvs.openbsd.org 2009/02/13 11:50:21
943 [packet.c]
944 check for enc !=NULL in packet_start_discard
e75a14a1 945 - djm@cvs.openbsd.org 2009/02/14 06:35:49
946 [PROTOCOL]
947 mention that eow and no-more-sessions extensions are sent only to
948 OpenSSH peers
69354fe2 949
95020090212
f7b8146b 951 - (djm) [sshpty.c] bz#1419: OSX uses cloning ptys that automagically
952 set ownership and modes, so avoid explicitly setting them
295dd642 953 - (djm) [configure.ac loginrec.c] bz#1421: fix lastlog support for OSX.
954 OSX provides a getlastlogxbyname function that automates the reading of
955 a lastlog file. Also, the pututxline function will update lastlog so
956 there is no need for loginrec.c to do it explicitly. Collapse some
957 overly verbose code while I'm in there.
f7b8146b 958
b4341d7a 95920090201
960 - (dtucker) [defines.h sshconnect.c] INET6_ADDRSTRLEN is now needed in
961 channels.c too, so move the definition for non-IP6 platforms to defines.h
962 where it can be shared.
963
e1986e0a 96420090129
965 - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
966 If the CYGWIN environment variable is empty, the installer script
967 should not install the service with an empty CYGWIN variable, but
968 rather without setting CYGWNI entirely.
863ba23a 969 - (tim) [contrib/cygwin/ssh-host-config] Whitespace cleanup. No code changes.
e1986e0a 970
7f24626b 97120090128
972 - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
973 Changes to work on Cygwin 1.5.x as well as on the new Cygwin 1.7.x.
974 The information given for the setting of the CYGWIN environment variable
975 is wrong for both releases so I just removed it, together with the
976 unnecessary (Cygwin 1.5.x) or wrong (Cygwin 1.7.x) default setting.
977
68405671 97820081228
979 - (djm) OpenBSD CVS Sync
980 - stevesk@cvs.openbsd.org 2008/12/09 03:20:42
981 [channels.c servconf.c]
982 channel_print_adm_permitted_opens() should deal with all the printing
983 for that config option. suggested by markus@; ok markus@ djm@
984 dtucker@
7efff8ce 985 - djm@cvs.openbsd.org 2008/12/09 04:32:22
986 [auth2-chall.c]
987 replace by-hand string building with xasprinf(); ok deraadt@
d3cd4016 988 - sobrado@cvs.openbsd.org 2008/12/09 15:35:00
989 [sftp.1 sftp.c]
990 update for the synopses displayed by the 'help' command, there are a
991 few missing flags; add 'bye' to the output of 'help'; sorting and spacing.
992 jmc@ suggested replacing .Oo/.Oc with a single .Op macro.
993 ok jmc@
6c20a13f 994 - stevesk@cvs.openbsd.org 2008/12/09 22:37:33
995 [clientloop.c]
996 fix typo in error message
fd2ce9c6 997 - stevesk@cvs.openbsd.org 2008/12/10 03:55:20
998 [addrmatch.c]
999 o cannot be NULL here but use xfree() to be consistent; ok djm@
8647612c 1000 - stevesk@cvs.openbsd.org 2008/12/29 01:12:36
1001 [ssh-keyscan.1]
1002 fix example, default key type is rsa for 3+ years; from
1003 frederic.perrin@resel.fr
040d6b1f 1004 - stevesk@cvs.openbsd.org 2008/12/29 02:23:26
1005 [pathnames.h]
1006 no need to escape single quotes in comments
d4bfdc62 1007 - okan@cvs.openbsd.org 2008/12/30 00:46:56
1008 [sshd_config.5]
1009 add AllowAgentForwarding to available Match keywords list
1010 ok djm
6cf44b6a 1011 - djm@cvs.openbsd.org 2009/01/01 21:14:35
1012 [channels.c]
1013 call channel destroy callbacks on receipt of open failure messages.
1014 fixes client hangs when connecting to a server that has MaxSessions=0
1015 set spotted by imorgan AT nas.nasa.gov; ok markus@
546202d0 1016 - djm@cvs.openbsd.org 2009/01/01 21:17:36
1017 [kexgexs.c]
1018 fix hash calculation for KEXGEX: hash over the original client-supplied
1019 values and not the sanity checked versions that we acutally use;
1020 bz#1540 reported by john.smith AT arrows.demon.co.uk
1021 ok markus@
4866a6d6 1022 - djm@cvs.openbsd.org 2009/01/14 01:38:06
1023 [channels.c]
1024 support SOCKS4A protocol, from dwmw2 AT infradead.org via bz#1482;
1025 "looks ok" markus@
9b4b86c2 1026 - stevesk@cvs.openbsd.org 2009/01/15 17:38:43
1027 [readconf.c]
1028 1) use obsolete instead of alias for consistency
1029 2) oUserKnownHostsFile not obsolete but oGlobalKnownHostsFile2 is
1030 so move the comment.
1031 3) reorder so like options are together
1032 ok djm@
1338ba77 1033 - djm@cvs.openbsd.org 2009/01/22 09:46:01
1034 [channels.c channels.h session.c]
1035 make Channel->path an allocated string, saving a few bytes here and
1036 there and fixing bz#1380 in the process; ok markus@
920706fd 1037 - djm@cvs.openbsd.org 2009/01/22 09:49:57
1038 [channels.c]
1039 oops! I committed the wrong version of the Channel->path diff,
1040 it was missing some tweaks suggested by stevesk@
5134115d 1041 - djm@cvs.openbsd.org 2009/01/22 10:02:34
1042 [clientloop.c misc.c readconf.c readconf.h servconf.c servconf.h]
1043 [serverloop.c ssh-keyscan.c ssh.c sshd.c]
1044 make a2port() return -1 when it encounters an invalid port number
1045 rather than 0, which it will now treat as valid (needed for future work)
1046 adjust current consumers of a2port() to check its return value is <= 0,
1047 which in turn required some things to be converted from u_short => int
1048 make use of int vs. u_short consistent in some other places too
1049 feedback & ok markus@
368e246f 1050 - djm@cvs.openbsd.org 2009/01/22 10:09:16
1051 [auth-options.c]
1052 another chunk of a2port() diff that got away. wtfdjm??
700fd7e7 1053 - djm@cvs.openbsd.org 2009/01/23 07:58:11
1054 [myproposal.h]
1055 prefer CTR modes and revised arcfour (i.e w/ discard) modes to CBC
1056 modes; ok markus@
29ec8eb3 1057 - naddy@cvs.openbsd.org 2009/01/24 17:10:22
1058 [ssh_config.5 sshd_config.5]
1059 sync list of preferred ciphers; ok djm@
608bcf58 1060 - markus@cvs.openbsd.org 2009/01/26 09:58:15
1061 [cipher.c cipher.h packet.c]
1062 Work around the CPNI-957037 Plaintext Recovery Attack by always
1063 reading 256K of data on packet size or HMAC errors (in CBC mode only).
1064 Help, feedback and ok djm@
1065 Feedback from Martin Albrecht and Paterson Kenny
68405671 1066
a25d08b3 106720090107
1068 - (djm) [uidswap.c] bz#1412: Support >16 supplemental groups in OS X.
1069 Patch based on one from vgiffin AT apple.com; ok dtucker@
b5a1596f 1070 - (djm) [channels.c] bz#1419: support "on demand" X11 forwarding via
1071 launchd on OS X; patch from vgiffin AT apple.com, slightly tweaked;
1072 ok dtucker@
23b3ed0b 1073 - (djm) [contrib/ssh-copy-id.1 contrib/ssh-copy-id] bz#1492: Make
1074 ssh-copy-id copy id_rsa.pub by default (instead of the legacy "identity"
1075 key). Patch from cjwatson AT debian.org
a25d08b3 1076
16076ac9 107720090107
1078 - (tim) [configure.ac defines.h openbsd-compat/port-uw.c
1079 openbsd-compat/xcrypt.c] Add SECUREWARE support to OpenServer 6 SVR5 ABI.
1080 OK djm@ dtucker@
44a71983 1081 - (tim) [configure.ac] Move check_for_libcrypt_later=1 in *-*-sysv5*) section.
1082 OpenServer 6 doesn't need libcrypt.
16076ac9 1083
09925c00 108420081209
1085 - (djm) OpenBSD CVS Sync
1086 - djm@cvs.openbsd.org 2008/12/09 02:38:18
1087 [clientloop.c]
1088 The ~C escape handler does not work correctly for multiplexed sessions -
1089 it opens a commandline on the master session, instead of on the slave
1090 that requested it. Disable it on slave sessions until such time as it
1091 is fixed; bz#1543 report from Adrian Bridgett via Colin Watson
1092 ok markus@
ddb5e00f 1093 - djm@cvs.openbsd.org 2008/12/09 02:39:59
1094 [sftp.c]
1095 Deal correctly with failures in remote stat() operation in sftp,
1096 correcting fail-on-error behaviour in batchmode. bz#1541 report and
1097 fix from anedvedicky AT gmail.com; ok markus@
bab3d903 1098 - djm@cvs.openbsd.org 2008/12/09 02:58:16
1099 [readconf.c]
1100 don't leave junk (free'd) pointers around in Forward *fwd argument on
1101 failure; avoids double-free in ~C -L handler when given an invalid
1102 forwarding specification; bz#1539 report from adejong AT debian.org
1103 via Colin Watson; ok markus@ dtucker@
83cd8c39 1104 - djm@cvs.openbsd.org 2008/12/09 03:02:37
1105 [sftp.1 sftp.c]
1106 correct sftp(1) and corresponding usage syntax;
1107 bz#1518 patch from imorgan AT nas.nasa.gov; ok deraadt@ improved diff jmc@
09925c00 1108
53e2660a 110920081208
1110 - (djm) [configure.ac] bz#1538: better test for ProPolice/SSP: actually
1111 use some stack in main().
1112 Report and suggested fix from vapier AT gentoo.org
66e16767 1113 - (djm) OpenBSD CVS Sync
1114 - markus@cvs.openbsd.org 2008/12/02 19:01:07
1115 [clientloop.c]
1116 we have to use the recipient's channel number (RFC 4254) for
1117 SSH2_MSG_CHANNEL_SUCCESS/SSH2_MSG_CHANNEL_FAILURE messages,
1118 otherwise we trigger 'Non-public channel' error messages on sshd
1119 systems with clientkeepalive enabled; noticed by sturm; ok djm;
7ec2b275 1120 - markus@cvs.openbsd.org 2008/12/02 19:08:59
1121 [serverloop.c]
1122 backout 1.149, since it's not necessary and openssh clients send
1123 broken CHANNEL_FAILURE/SUCCESS messages since about 2004; ok djm@
b09b559d 1124 - markus@cvs.openbsd.org 2008/12/02 19:09:38
1125 [channels.c]
1126 s/remote_id/id/ to be more consistent with other code; ok djm@
53e2660a 1127
de470c82 112820081201
1129 - (dtucker) [contrib/cygwin/{Makefile,ssh-host-config}] Add new doc files
1130 and tweak the is-sshd-running check in ssh-host-config. Patch from
1131 vinschen at redhat com.
66af1c21 1132 - (dtucker) OpenBSD CVS Sync
1133 - markus@cvs.openbsd.org 2008/11/21 15:47:38
1134 [packet.c]
1135 packet_disconnect() on padding error, too. should reduce the success
1136 probability for the CPNI-957037 Plaintext Recovery Attack to 2^-18
1137 ok djm@
8e10da10 1138 - dtucker@cvs.openbsd.org 2008/11/30 11:59:26
1139 [monitor_fdpass.c]
1140 Retry sendmsg/recvmsg on EAGAIN and EINTR; ok djm@
de470c82 1141
d2aa725a 114220081123
1143 - (dtucker) [monitor_fdpass.c] Reduce diff vs OpenBSD by moving some
1144 declarations, removing an unnecessary union member and adding whitespace.
c037a517 1145 cmsgbuf.tmp thing spotted by des at des no, ok djm some time ago.
d2aa725a 1146
95e16084 114720081118
1148 - (tim) [addrmatch.c configure.ac] Some platforms do not have sin6_scope_id
1149 member of sockaddr_in6. Also reported in Bug 1491 by David Leonard. OK and
1150 feedback by djm@
1151
0bd3332c 115220081111
1153 - (dtucker) OpenBSD CVS Sync
1154 - jmc@cvs.openbsd.org 2008/11/05 11:22:54
1155 [servconf.c]
1156 passord -> password;
1157 fixes user/5975 from Rene Maroufi
1890bf8b 1158 - stevesk@cvs.openbsd.org 2008/11/07 00:42:12
1159 [ssh-keygen.c]
1160 spelling/typo in comment
92d0164c 1161 - stevesk@cvs.openbsd.org 2008/11/07 18:50:18
1162 [nchan.c]
1163 add space to some log/debug messages for readability; ok djm@ markus@
3d7f6c3d 1164 - dtucker@cvs.openbsd.org 2008/11/07 23:34:48
1165 [auth2-jpake.c]
1166 Move JPAKE define to make life easier for portable. ok djm@
94087553 1167 - tobias@cvs.openbsd.org 2008/11/09 12:34:47
1168 [session.c ssh.1]
1169 typo fixed (overriden -> overridden)
1170 ok espie, jmc
2505b891 1171 - stevesk@cvs.openbsd.org 2008/11/11 02:58:09
1172 [servconf.c]
1173 USE_AFS not referenced so remove #ifdef. fixes sshd -T not printing
1174 kerberosgetafstoken. ok dtucker@
1175 (Id sync only, we still want the ifdef in portable)
861e9e53 1176 - stevesk@cvs.openbsd.org 2008/11/11 03:55:11
1177 [channels.c]
1178 for sshd -T print 'permitopen any' vs. 'permitopen' for case of no
1179 permitopen's; ok and input dtucker@
0771f5dd 1180 - djm@cvs.openbsd.org 2008/11/10 02:06:35
1181 [regress/putty-ciphers.sh]
1182 PuTTY supports AES CTR modes, so interop test against them too
0bd3332c 1183
39aa8698 118420081105
1185 - OpenBSD CVS Sync
1186 - djm@cvs.openbsd.org 2008/11/03 08:59:41
1187 [servconf.c]
1188 include MaxSessions in sshd -T output; patch from imorgan AT nas.nasa.gov
a28625a6 1189 - djm@cvs.openbsd.org 2008/11/04 07:58:09
1190 [auth.c]
1191 need unistd.h for close() prototype
1192 (ID sync only)
5adf6b9a 1193 - djm@cvs.openbsd.org 2008/11/04 08:22:13
1194 [auth.h auth2.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h]
1195 [readconf.c readconf.h servconf.c servconf.h ssh2.h ssh_config.5]
1196 [sshconnect2.c sshd_config.5 jpake.c jpake.h schnorr.c auth2-jpake.c]
1197 [Makefile.in]
1198 Add support for an experimental zero-knowledge password authentication
1199 method using the J-PAKE protocol described in F. Hao, P. Ryan,
1200 "Password Authenticated Key Exchange by Juggling", 16th Workshop on
1201 Security Protocols, Cambridge, April 2008.
1202
1203 This method allows password-based authentication without exposing
1204 the password to the server. Instead, the client and server exchange
1205 cryptographic proofs to demonstrate of knowledge of the password while
1206 revealing nothing useful to an attacker or compromised endpoint.
1207
1208 This is experimental, work-in-progress code and is presently
1209 compiled-time disabled (turn on -DJPAKE in Makefile.inc).
1210
1211 "just commit it. It isn't too intrusive." deraadt@
d35f707e 1212 - stevesk@cvs.openbsd.org 2008/11/04 19:18:00
1213 [readconf.c]
1214 because parse_forward() is now used to parse all forward types (DLR),
1215 and it malloc's space for host variables, we don't need to malloc
1216 here. fixes small memory leaks.
1217
1218 previously dynamic forwards were not parsed in parse_forward() and
1219 space was not malloc'd in that case.
1220
1221 ok djm@
10cf2ac3 1222 - stevesk@cvs.openbsd.org 2008/11/05 03:23:09
1223 [clientloop.c ssh.1]
1224 add dynamic forward escape command line; ok djm@
39aa8698 1225
94f36816 122620081103
1227 - OpenBSD CVS Sync
1228 - sthen@cvs.openbsd.org 2008/07/24 23:55:30
1229 [ssh-keygen.1]
1230 Add "ssh-keygen -F -l" to synopsis (displays fingerprint from
1231 known_hosts). ok djm@
1232 - grunk@cvs.openbsd.org 2008/07/25 06:56:35
1233 [ssh_config]
1234 Add VisualHostKey to example file, ok djm@
5ca42ddb 1235 - grunk@cvs.openbsd.org 2008/07/25 07:05:16
1236 [key.c]
1237 In random art visualization, make sure to use the end marker only at the
1238 end. Initial diff by Dirk Loss, tweaks and ok djm@
341cb46b 1239 - markus@cvs.openbsd.org 2008/07/31 14:48:28
1240 [sshconnect2.c]
1241 don't allocate space for empty banners; report t8m at centrum.cz;
1242 ok deraadt
686bdcbd 1243 - krw@cvs.openbsd.org 2008/08/02 04:29:51
1244 [ssh_config.5]
1245 whitepsace -> whitespace. From Matthew Clarke via bugs@.
e3ef5245 1246 - djm@cvs.openbsd.org 2008/08/21 04:09:57
1247 [session.c]
1248 allow ForceCommand internal-sftp with arguments. based on patch from
1249 michael.barabanov AT gmail.com; ok markus@
1975fb98 1250 - djm@cvs.openbsd.org 2008/09/06 12:24:13
1251 [kex.c]
1252 OpenSSL 0.9.8h supplies a real EVP_sha256 so we do not need our
1253 replacement anymore
1254 (ID sync only for portable - we still need this)
72bd2fca 1255 - markus@cvs.openbsd.org 2008/09/11 14:22:37
1256 [compat.c compat.h nchan.c ssh.c]
1257 only send eow and no-more-sessions requests to openssh 5 and newer;
1258 fixes interop problems with broken ssh v2 implementations; ok djm@
2e96832c 1259 - millert@cvs.openbsd.org 2008/10/02 14:39:35
1260 [session.c]
1261 Convert an unchecked strdup to xstrdup. OK deraadt@
dc94d57e 1262 - jmc@cvs.openbsd.org 2008/10/03 13:08:12
1263 [sshd.8]
1264 do not give an example of how to chmod files: we can presume the user
1265 knows that. removes an ambiguity in the permission of authorized_keys;
1266 ok deraadt
90d5350e 1267 - deraadt@cvs.openbsd.org 2008/10/03 23:56:28
1268 [sshconnect2.c]
1269 Repair strnvis() buffersize of 4*n+1, with termination gauranteed by the
1270 function.
1271 spotted by des@freebsd, who commited an incorrect fix to the freebsd tree
1272 and (as is fairly typical) did not report the problem to us. But this fix
1273 is correct.
1274 ok djm
bf793210 1275 - djm@cvs.openbsd.org 2008/10/08 23:34:03
1276 [ssh.1 ssh.c]
1277 Add -y option to force logging via syslog rather than stderr.
1278 Useful for daemonised ssh connection (ssh -f). Patch originally from
1279 and ok'd by markus@
e68868a1 1280 - djm@cvs.openbsd.org 2008/10/09 03:50:54
1281 [servconf.c sshd_config.5]
1282 support setting PermitEmptyPasswords in a Match block
1283 requested in PR3891; ok dtucker@
f3a4d0d0 1284 - jmc@cvs.openbsd.org 2008/10/09 06:54:22
1285 [ssh.c]
1286 add -y to usage();
6503dc91 1287 - stevesk@cvs.openbsd.org 2008/10/10 04:55:16
1288 [scp.c]
1289 spelling in comment; ok djm@
260bf88a 1290 - stevesk@cvs.openbsd.org 2008/10/10 05:00:12
1291 [key.c]
1292 typo in error message; ok djm@
96a00a9d 1293 - stevesk@cvs.openbsd.org 2008/10/10 16:43:27
1294 [ssh_config.5]
1295 use 'Privileged ports can be forwarded only when logging in as root on
1296 the remote machine.' for RemoteForward just like ssh.1 -R.
1297 ok djm@ jmc@
1298 - stevesk@cvs.openbsd.org 2008/10/14 18:11:33
1299 [sshconnect.c]
1300 use #define ROQUIET here; no binary change. ok dtucker@
8d20b087 1301 - stevesk@cvs.openbsd.org 2008/10/17 18:36:24
1302 [ssh_config.5]
1303 correct and clarify VisualHostKey; ok jmc@
25f93f2c 1304 - stevesk@cvs.openbsd.org 2008/10/30 19:31:16
1305 [clientloop.c sshd.c]
1306 don't need to #include "monitor_fdpass.h"
b8974c94 1307 - stevesk@cvs.openbsd.org 2008/10/31 15:05:34
1308 [dispatch.c]
1309 remove unused #define DISPATCH_MIN; ok markus@
e64399cc 1310 - djm@cvs.openbsd.org 2008/11/01 04:50:08
1311 [sshconnect2.c]
1312 sprinkle ARGSUSED on dispatch handlers
1313 nuke stale unusued prototype
2ea438c2 1314 - stevesk@cvs.openbsd.org 2008/11/01 06:43:33
1315 [channels.c]
1316 fix some typos in log messages; ok djm@
9995aaa3 1317 - sobrado@cvs.openbsd.org 2008/11/01 11:14:36
1318 [ssh-keyscan.1 ssh-keyscan.c]
1319 the ellipsis is not an optional argument; while here, improve spacing.
30573fea 1320 - stevesk@cvs.openbsd.org 2008/11/01 17:40:33
1321 [clientloop.c readconf.c readconf.h ssh.c]
1322 merge dynamic forward parsing into parse_forward();
1323 'i think this is OK' djm@
9bbba34b 1324 - stevesk@cvs.openbsd.org 2008/11/02 00:16:16
1325 [ttymodes.c]
1326 protocol 2 tty modes support is now 7.5 years old so remove these
1327 debug3()s; ok deraadt@
b626b7ae 1328 - stevesk@cvs.openbsd.org 2008/11/03 01:07:02
1329 [readconf.c]
1330 remove valueless comment
c8eaf0ec 1331 - stevesk@cvs.openbsd.org 2008/11/03 02:44:41
1332 [readconf.c]
1333 fix comment
fce91335 1334 - (djm) [contrib/caldera/ssh-host-keygen contrib/suse/rc.sshd]
1335 Make example scripts generate keys with default sizes rather than fixed,
1336 non-default 1024 bits; patch from imorgan AT nas.nasa.gov
933e2f91 1337 - (djm) [contrib/sshd.pam.generic contrib/caldera/sshd.pam]
1338 [contrib/redhat/sshd.pam] Move pam_nologin to account group from
1339 incorrect auth group in example files;
1340 patch from imorgan AT nas.nasa.gov
94f36816 1341
d6339843 134220080906
1343 - (dtucker) [config.guess config.sub] Update to latest versions from
1344 http://git.savannah.gnu.org/gitweb/ (2008-04-14 and 2008-06-16
1345 respectively).
1346
974ce4a0 134720080830
1348 - (dtucker) [openbsd-compat/bsd-poll.c] correctly check for number of FDs
1349 larger than FD_SETSIZE (OpenSSH only ever uses poll with one fd). Patch
1350 from Nicholas Marriott.
1351
e888d981 135220080721
1353 - (djm) OpenBSD CVS Sync
1354 - djm@cvs.openbsd.org 2008/07/23 07:36:55
1355 [servconf.c]
1356 do not try to print options that have been compile-time disabled
1357 in config test mode (sshd -T); report from nix-corp AT esperi.org.uk
1358 ok dtucker@
cee47c9f 1359 - (djm) [servconf.c] Print UsePAM option in config test mode (when it
1360 has been compiled in); report from nix-corp AT esperi.org.uk
1361 ok dtucker@
e888d981 1362
b14e719f 136320080721
1364 - (djm) OpenBSD CVS Sync
1365 - jmc@cvs.openbsd.org 2008/07/18 22:51:01
1366 [sftp-server.8]
1367 no need for .Pp before or after .Sh;
f3b93df3 1368 - djm@cvs.openbsd.org 2008/07/21 08:19:07
1369 [version.h]
1370 openssh-5.1
11368183 1371 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
1372 [contrib/suse/openssh.spec] Update version number in README and RPM specs
55d5db1c 1373 - (djm) Release OpenSSH-5.1
b14e719f 1374
e5df5ff2 137520080717
1376 - (djm) OpenBSD CVS Sync
1377 - djm@cvs.openbsd.org 2008/07/17 08:48:00
1378 [sshconnect2.c]
1379 strnvis preauth banner; pointed out by mpf@ ok markus@
2800468d 1380 - djm@cvs.openbsd.org 2008/07/17 08:51:07
1381 [auth2-hostbased.c]
1382 strip trailing '.' from hostname when HostbasedUsesNameFromPacketOnly=yes
1383 report and patch from res AT qoxp.net (bz#1200); ok markus@
d9d96f7a 1384 - (dtucker) [openbsd-compat/bsd-cygwin_util.c] Remove long-unneeded compat
1385 code, replace with equivalent cygwin library call. Patch from vinschen
3a69fb58 1386 at redhat.com, ok djm@.
1387 - (djm) [sshconnect2.c] vis.h isn't available everywhere
e5df5ff2 1388
b8c9ea19 138920080716
1390 - OpenBSD CVS Sync
1391 - djm@cvs.openbsd.org 2008/07/15 02:23:14
1392 [sftp.1]
1393 number of pipelined requests is now 64;
1394 prodded by Iain.Morgan AT nasa.gov
dfe666f6 1395 - djm@cvs.openbsd.org 2008/07/16 11:51:14
1396 [clientloop.c]
1397 rename variable first_gc -> last_gc (since it is actually the last
1398 in the list).
cdfbc829 1399 - djm@cvs.openbsd.org 2008/07/16 11:52:19
1400 [channels.c]
1401 this loop index should be automatic, not static
b8c9ea19 1402
322b3f02 140320080714
1404 - (djm) OpenBSD CVS Sync
1405 - sthen@cvs.openbsd.org 2008/07/13 21:22:52
1406 [ssh-keygen.c]
1407 Change "ssh-keygen -F [host] -l" to not display random art unless
1408 -v is also specified, making it consistent with the manual and other
1409 uses of -l.
1410 ok grunk@
9fb764ab 1411 - djm@cvs.openbsd.org 2008/07/13 22:13:07
1412 [channels.c]
1413 use struct sockaddr_storage instead of struct sockaddr for accept(2)
1414 address argument. from visibilis AT yahoo.com in bz#1485; ok markus@
873722cc 1415 - djm@cvs.openbsd.org 2008/07/13 22:16:03
1416 [sftp.c]
1417 increase number of piplelined requests so they properly fill the
1418 (recently increased) channel window. prompted by rapier AT psc.edu;
1419 ok markus@
66fba053 1420 - djm@cvs.openbsd.org 2008/07/14 01:55:56
1421 [sftp-server.8]
1422 mention requirement for /dev/log inside chroot when using sftp-server
1423 with ChrootDirectory
6c6bb9a6 1424 - (djm) [openbsd-compat/bindresvport.c] Rename variables s/sin/in/ to
1425 avoid clash with sin(3) function; reported by
1426 cristian.ionescu-idbohrn AT axis.com
7be182d4 1427 - (djm) [openbsd-compat/rresvport.c] Add unistd.h for missing close()
1428 prototype; reported by cristian.ionescu-idbohrn AT axis.com
6a9c22a5 1429 - (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash;
1430 reported by cristian.ionescu-idbohrn AT axis.com
7ea1abf7 1431 - (djm) [contrib/cygwin/Makefile contrib/cygwin/ssh-host-config]
1432 [contrib/cygwin/ssh-user-config contrib/cygwin/sshd-inetd]
1433 Revamped and simplified Cygwin ssh-host-config script that uses
1434 unified csih configuration tool. Requires recent Cygwin.
1435 Patch from vinschen AT redhat.com
322b3f02 1436
267d5589 143720080712
1438 - (djm) OpenBSD CVS Sync
1439 - djm@cvs.openbsd.org 2008/07/12 04:52:50
1440 [channels.c]
1441 unbreak; move clearing of cctx struct to before first use
1442 reported by dkrause@
da9a823d 1443 - djm@cvs.openbsd.org 2008/07/12 05:33:41
1444 [scp.1]
1445 better description for -i flag:
1446 s/RSA authentication/public key authentication/
2ade01eb 1447 - (djm) [openbsd-compat/fake-rfc2553.c openbsd-compat/fake-rfc2553.h]
1448 return EAI_FAMILY when trying to lookup unsupported address family;
1449 from vinschen AT redhat.com
267d5589 1450
971deff8 145120080711
1452 - (djm) OpenBSD CVS Sync
1453 - stevesk@cvs.openbsd.org 2008/07/07 00:31:41
1454 [ttymodes.c]
1455 we don't need arg after the debug3() was removed. from lint.
1456 ok djm@
d5b5b8f6 1457 - stevesk@cvs.openbsd.org 2008/07/07 23:32:51
1458 [key.c]
1459 /*NOTREACHED*/ for lint warning:
1460 warning: function key_equal falls off bottom without returning value
1461 ok djm@
6eb3f18c 1462 - markus@cvs.openbsd.org 2008/07/10 18:05:58
1463 [channels.c]
1464 missing bzero; from mickey; ok djm@
e8e08a80 1465 - markus@cvs.openbsd.org 2008/07/10 18:08:11
1466 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h sshd.c]
1467 sync v1 and v2 traffic accounting; add it to sshd, too;
1468 ok djm@, dtucker@
971deff8 1469
17969fcc 147020080709
1471 - (djm) [Makefile.in] Print "all tests passed" when all regress tests pass
b5fc5d94 1472 - (djm) [auth1.c] Fix format string vulnerability in protocol 1 PAM
1473 account check failure path. The vulnerable format buffer is supplied
1474 from PAM and should not contain attacker-supplied data.
78cb4705 1475 - (djm) [auth.c] Missing unistd.h for close()
b5902374 1476 - (djm) [configure.ac] Add -Wformat-security to CFLAGS for gcc 3.x and 4.x
17969fcc 1477
3fde0623 147820080705
1479 - (djm) [auth.c] Fixed test for locked account on HP/UX with shadowed
1480 passwords disabled. bz#1083 report & patch from senthilkumar_sen AT
1481 hotpop.com, w/ dtucker@
e8983917 1482 - (djm) [atomicio.c configure.ac] Disable poll() fallback in atomiciov for
1483 Tru64. readv doesn't seem to be a comparable object there.
1484 bz#1386, patch from dtucker@ ok me
b8d635d0 1485 - (djm) [Makefile.in] Pass though pass to conch for interop tests
6ed8a3ae 1486 - (djm) [configure.ac] unbreak: remove extra closing brace
d38d9a80 1487 - (djm) OpenBSD CVS Sync
1488 - djm@cvs.openbsd.org 2008/07/04 23:08:25
1489 [packet.c]
1490 handle EINTR in packet_write_poll()l ok dtucker@
71709bcd 1491 - djm@cvs.openbsd.org 2008/07/04 23:30:16
1492 [auth1.c auth2.c]
1493 Make protocol 1 MaxAuthTries logic match protocol 2's.
1494 Do not treat the first protocol 2 authentication attempt as
1495 a failure IFF it is for method "none".
1496 Makes MaxAuthTries' user-visible behaviour identical for
1497 protocol 1 vs 2.
1498 ok dtucker@
3086db6e 1499 - djm@cvs.openbsd.org 2008/07/05 05:16:01
1500 [PROTOCOL]
1501 grammar
3fde0623 1502
a0d38609 150320080704
1504 - (dtucker) OpenBSD CVS Sync
1505 - djm@cvs.openbsd.org 2008/07/02 13:30:34
1506 [auth2.c]
1507 really really remove the freebie "none" auth try for protocol 2
6c777090 1508 - djm@cvs.openbsd.org 2008/07/02 13:47:39
1509 [ssh.1 ssh.c]
1510 When forking after authentication ("ssh -f") with ExitOnForwardFailure
1511 enabled, delay the fork until after replies for any -R forwards have
1512 been seen. Allows for robust detection of -R forward failure when
1513 using -f (similar to bz#92); ok dtucker@
f0b9fde3 1514 - otto@cvs.openbsd.org 2008/07/03 21:46:58
1515 [auth2-pubkey.c]
1516 avoid nasty double free; ok dtucker@ djm@
cece208b 1517 - djm@cvs.openbsd.org 2008/07/04 03:44:59
1518 [servconf.c groupaccess.h groupaccess.c]
1519 support negation of groups in "Match group" block (bz#1315); ok dtucker@
c54d3d1c 1520 - dtucker@cvs.openbsd.org 2008/07/04 03:47:02
1521 [monitor.c]
1522 Make debug a little clearer. ok djm@
c7cbf377 1523 - djm@cvs.openbsd.org 2008/06/30 08:07:34
1524 [regress/key-options.sh]
1525 shell portability: use "=" instead of "==" in test(1) expressions,
1526 double-quote string with backslash escaped /
8a972082 1527 - djm@cvs.openbsd.org 2008/06/30 10:31:11
1528 [regress/{putty-transfer,putty-kex,putty-ciphers}.sh]
1529 remove "set -e" left over from debugging
9b0c87d9 1530 - djm@cvs.openbsd.org 2008/06/30 10:43:03
1531 [regress/conch-ciphers.sh]
1532 explicitly disable conch options that could interfere with the test
97e61398 1533 - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link
1534 returns EXDEV. Patch from Mike Garrison, ok djm@
5a0c8771 1535 - (djm) [atomicio.c channels.c clientloop.c defines.h includes.h]
1536 [packet.c scp.c serverloop.c sftp-client.c ssh-agent.c ssh-keyscan.c]
1537 [sshd.c] Explicitly handle EWOULDBLOCK wherever we handle EAGAIN, on
1538 some platforms (HP nonstop) it is a distinct errno;
1539 bz#1467 reported by sconeu AT yahoo.com; ok dtucker@
1540
8f02e0be 154120080702
1542 - (dtucker) OpenBSD CVS Sync
1543 - djm@cvs.openbsd.org 2008/06/30 08:05:59
1544 [PROTOCOL.agent]
1545 typo: s/constraint_date/constraint_data/
fb5582f7 1546 - djm@cvs.openbsd.org 2008/06/30 12:15:39
1547 [serverloop.c]
1548 only pass channel requests on session channels through to the session
1549 channel handler, avoiding spurious log messages; ok! markus@
4d92dbc1 1550 - djm@cvs.openbsd.org 2008/06/30 12:16:02
1551 [nchan.c]
1552 only send eow@openssh.com notifications for session channels; ok! markus@
8fb1ddc9 1553 - djm@cvs.openbsd.org 2008/06/30 12:18:34
1554 [PROTOCOL]
1555 clarify that eow@openssh.com is only sent on session channels
979b31ed 1556 - dtucker@cvs.openbsd.org 2008/07/01 07:20:52
1557 [sshconnect.c]
1558 Check ExitOnForwardFailure if forwardings are disabled due to a failed
1559 host key check. ok djm@
f9b45eaf 1560 - dtucker@cvs.openbsd.org 2008/07/01 07:24:22
1561 [sshconnect.c sshd.c]
1562 Send CR LF during protocol banner exchanges, but only for Protocol 2 only,
1563 in order to comply with RFC 4253. bz #1443, ok djm@
5ebed98d 1564 - stevesk@cvs.openbsd.org 2008/07/01 23:12:47
1565 [PROTOCOL.agent]
1566 fix some typos; ok djm@
39ceddb7 1567 - djm@cvs.openbsd.org 2008/07/02 02:24:18
1568 [sshd_config sshd_config.5 sshd.8 servconf.c]
1569 increase default size of ssh protocol 1 ephemeral key from 768 to 1024
1570 bits; prodded by & ok dtucker@ ok deraadt@
f7c2a004 1571 - dtucker@cvs.openbsd.org 2008/07/02 12:03:51
1572 [auth-rsa.c auth.c auth2-pubkey.c auth.h]
1573 Merge duplicate host key file checks, based in part on a patch from Rob
1574 Holland via bz #1348 . Also checks for non-regular files during protocol
1575 1 RSA auth. ok djm@
221fc73c 1576 - djm@cvs.openbsd.org 2008/07/02 12:36:39
1577 [auth2-none.c auth2.c]
1578 Make protocol 2 MaxAuthTries behaviour a little more sensible:
1579 Check whether client has exceeded MaxAuthTries before running
1580 an authentication method and skip it if they have, previously it
1581 would always allow one try (for "none" auth).
1582 Preincrement failure count before post-auth test - previously this
1583 checked and postincremented, also to allow one "none" try.
1584 Together, these two changes always count the "none" auth method
1585 which could be skipped by a malicious client (e.g. an SSH worm)
1586 to get an extra attempt at a real auth method. They also make
1587 MaxAuthTries=0 a useful way to block users entirely (esp. in a
1588 sshd_config Match block).
1589 Also, move sending of any preauth banner from "none" auth method
1590 to the first call to input_userauth_request(), so worms that skip
1591 the "none" method get to see it too.
8f02e0be 1592
00b7389d 159320080630
1594 - (djm) OpenBSD CVS Sync
1595 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
1596 [regress/Makefile regress/key-options.sh]
1597 Add regress test for key options. ok djm@
86d745dc 1598 - dtucker@cvs.openbsd.org 2008/06/11 23:11:40
014f1b23 1599 [regress/Makefile]
86d745dc 1600 Don't run cipher-speed test by default; mistakenly enabled by me
014f1b23 1601 - djm@cvs.openbsd.org 2008/06/28 13:57:25
1602 [regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh]
1603 very basic regress test against Twisted Conch in "make interop"
1604 target (conch is available in ports/devel/py-twisted/conch);
1605 ok markus@
8476b024 1606 - (djm) [regress/Makefile] search for conch by path, like we do putty
00b7389d 1607
aa47edcc 160820080629
1609 - (djm) OpenBSD CVS Sync
1610 - martynas@cvs.openbsd.org 2008/06/21 07:46:46
1611 [sftp.c]
1612 use optopt to get invalid flag, instead of return value of getopt,
1613 which is always '?'; ok djm@
ccf0fcb6 1614 - otto@cvs.openbsd.org 2008/06/25 11:13:43
1615 [key.c]
1616 add key length to visual fingerprint; zap magical constants;
1617 ok grunk@ djm@
681efe9f 1618 - djm@cvs.openbsd.org 2008/06/26 06:10:09
1619 [sftp-client.c sftp-server.c]
1620 allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky
1621 bits. Note that this only affects explicit setting of modes (e.g. via
1622 sftp(1)'s chmod command) and not file transfers. (bz#1310)
1623 ok deraadt@ at c2k8
b080d398 1624 - djm@cvs.openbsd.org 2008/06/26 09:19:40
1625 [dh.c dh.h moduli.c]
1626 when loading moduli from /etc/moduli in sshd(8), check that they
1627 are of the expected "safe prime" structure and have had
1628 appropriate primality tests performed;
1629 feedback and ok dtucker@
7b3999b8 1630 - grunk@cvs.openbsd.org 2008/06/26 11:46:31
1631 [readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c]
1632 Move SSH Fingerprint Visualization away from sharing the config option
1633 CheckHostIP to an own config option named VisualHostKey.
1634 While there, fix the behaviour that ssh would draw a random art picture
1635 on every newly seen host even when the option was not enabled.
1636 prodded by deraadt@, discussions,
1637 help and ok markus@ djm@ dtucker@
2e8d3306 1638 - jmc@cvs.openbsd.org 2008/06/26 21:11:46
1639 [ssh.1]
1640 add VisualHostKey to the list of options listed in -o;
cda43f66 1641 - djm@cvs.openbsd.org 2008/06/28 07:25:07
1642 [PROTOCOL]
1643 spelling fixes
c525650a 1644 - djm@cvs.openbsd.org 2008/06/28 13:58:23
1645 [ssh-agent.c]
1646 refuse to add a key that has unknown constraints specified;
1647 ok markus
9ee2fb0e 1648 - djm@cvs.openbsd.org 2008/06/28 14:05:15
1649 [ssh-agent.c]
1650 reset global compat flag after processing a protocol 2 signature
1651 request with the legacy DSA encoding flag set; ok markus
ab3eb078 1652 - djm@cvs.openbsd.org 2008/06/28 14:08:30
1653 [PROTOCOL PROTOCOL.agent]
1654 document the protocol used by ssh-agent; "looks ok" markus@
aa47edcc 1655
f6351d4d 165620080628
1657 - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec]
1658 RFC.nroff lacks a license, remove it (it is long gone in OpenBSD).
1659
bd6b3feb 166020080626
1661 - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD.
1662 (bz#1372)
a32d8b38 1663 - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
1664 [contrib/suse/openssh.spec] Include moduli.5 in RPM spec files.
bd6b3feb 1665
b3784859 166620080616
1667 - (dtucker) OpenBSD CVS Sync
1668 - dtucker@cvs.openbsd.org 2008/06/16 13:22:53
1669 [session.c channels.c]
1670 Rename the isatty argument to is_tty so we don't shadow
1671 isatty(3). ok markus@
245f4d36 1672 - (dtucker) [channels.c] isatty -> is_tty here too.
b3784859 1673
b55b0285 167420080615
1675 - (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc.
081573fe 1676 - OpenBSD CVS Sync
1677 - dtucker@cvs.openbsd.org 2008/06/14 15:49:48
1678 [sshd.c]
1679 wrap long line at 80 chars
26512357 1680 - dtucker@cvs.openbsd.org 2008/06/14 17:07:11
1681 [sshd.c]
1682 ensure default umask disallows at least group and world write; ok djm@
2608aa2b 1683 - djm@cvs.openbsd.org 2008/06/14 18:33:43
1684 [session.c]
1685 suppress the warning message from chdir(homedir) failures
1686 when chrooted (bz#1461); ok dtucker
49c5f262 1687 - dtucker@cvs.openbsd.org 2008/06/14 19:42:10
1688 [scp.1]
1689 Mention that scp follows symlinks during -r. bz #1466,
1690 from nectar at apple
d97287d3 1691 - dtucker@cvs.openbsd.org 2008/06/15 16:55:38
1692 [sshd_config.5]
1693 MaxSessions is allowed in a Match block too
8086aeb2 1694 - dtucker@cvs.openbsd.org 2008/06/15 16:58:40
1695 [servconf.c sshd_config.5]
1696 Allow MaxAuthTries within a Match block. ok djm@
c9478090 1697 - djm@cvs.openbsd.org 2008/06/15 20:06:26
1698 [channels.c channels.h session.c]
1699 don't call isatty() on a pty master, instead pass a flag down to
1700 channel_set_fds() indicating that te fds refer to a tty. Fixes a
1701 hang on exit on Solaris (bz#1463) in portable but is actually
1702 a generic bug; ok dtucker deraadt markus
b55b0285 1703
add357c6 170420080614
1705 - (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction
1706 replacement code; patch from ighighi AT gmail.com in bz#1240;
1707 ok dtucker
1708
849d3ceb 170920080613
1710 - (dtucker) OpenBSD CVS Sync
1711 - deraadt@cvs.openbsd.org 2008/06/13 09:44:36
1712 [packet.c]
1713 compile on older gcc; no decl after code
52ad6b9a 1714 - dtucker@cvs.openbsd.org 2008/06/13 13:56:59
1715 [monitor.c]
1716 Clear key options in the monitor on failed authentication, prevents
1717 applying additional restrictions to non-pubkey authentications in
1718 the case where pubkey fails but another method subsequently succeeds.
1719 bz #1472, found by Colin Watson, ok markus@ djm@
1d0b7aaa 1720 - dtucker@cvs.openbsd.org 2008/06/13 14:18:51
1721 [auth2-pubkey.c auth-rhosts.c]
1722 Include unistd.h for close(), prevents warnings in -portable
a3f13d60 1723 - dtucker@cvs.openbsd.org 2008/06/13 17:21:20
1724 [mux.c]
1725 Friendlier error messages for mux fallback. ok djm@
a15e7da1 1726 - dtucker@cvs.openbsd.org 2008/06/13 18:55:22
1727 [scp.c]
1728 Prevent -Wsign-compare warnings on LP64 systems. bz #1192, ok deraadt@
990ada29 1729 - grunk@cvs.openbsd.org 2008/06/13 20:13:26
1730 [ssh.1]
1731 Explain the use of SSH fpr visualization using random art, and cite the
1732 original scientific paper inspiring that technique.
1733 Much help with English and nroff by jmc@, thanks.
596a825b 1734 - (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which
1735 despite its name doesn't seem to implement all of GSSAPI. Patch from
1736 Jan Engelhardt, sanity checked by Simon Wilkinson.
849d3ceb 1737
9754b94b 173820080612
1739 - (dtucker) OpenBSD CVS Sync
1740 - jmc@cvs.openbsd.org 2008/06/11 07:30:37
1741 [sshd.8]
1742 kill trailing whitespace;
aff73c5f 1743 - grunk@cvs.openbsd.org 2008/06/11 21:01:35
1744 [ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
1745 sshconnect.c]
1746 Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
1747 graphical hash visualization schemes known as "random art", and by
1748 Dan Kaminsky's musings on the subject during a BlackOp talk at the
1749 23C3 in Berlin.
1750 Scientific publication (original paper):
1751 "Hash Visualization: a New Technique to improve Real-World Security",
1752 Perrig A. and Song D., 1999, International Workshop on Cryptographic
1753 Techniques and E-Commerce (CrypTEC '99)
1754 http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
1755 The algorithm used here is a worm crawling over a discrete plane,
1756 leaving a trace (augmenting the field) everywhere it goes.
1757 Movement is taken from dgst_raw 2bit-wise. Bumping into walls
1758 makes the respective movement vector be ignored for this turn,
1759 thus switching to the other color of the chessboard.
1760 Graphs are not unambiguous for now, because circles in graphs can be
1761 walked in either direction.
1762 discussions with several people,
1763 help, corrections and ok markus@ djm@
93778882 1764 - grunk@cvs.openbsd.org 2008/06/11 21:38:25
1765 [ssh-keygen.c]
1766 ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub
1767 would not display you the random art as intended, spotted by canacar@
639211b7 1768 - grunk@cvs.openbsd.org 2008/06/11 22:20:46
1769 [ssh-keygen.c ssh-keygen.1]
1770 ssh-keygen would write fingerprints to STDOUT, and random art to STDERR,
1771 that is not how it was envisioned.
1772 Also correct manpage saying that -v is needed along with -l for it to work.
1773 spotted by naddy@
e3115002 1774 - otto@cvs.openbsd.org 2008/06/11 23:02:22
1775 [key.c]
1776 simpler way of computing the augmentations; ok grunk@
fe88400f 1777 - grunk@cvs.openbsd.org 2008/06/11 23:03:56
1778 [ssh_config.5]
1779 CheckHostIP set to ``fingerprint'' will display both hex and random art
1780 spotted by naddy@
97841001 1781 - grunk@cvs.openbsd.org 2008/06/11 23:51:57
1782 [key.c]
1783 #define statements that are not atoms need braces around them, else they
1784 will cause trouble in some cases.
1785 Also do a computation of -1 once, and not in a loop several times.
1786 spotted by otto@
e907df41 1787 - dtucker@cvs.openbsd.org 2008/06/12 00:03:49
1788 [dns.c canohost.c sshconnect.c]
1789 Do not pass "0" strings as ports to getaddrinfo because the lookups
1790 can slow things down and we never use the service info anyway. bz
1791 #859, patch from YOSHIFUJI Hideaki and John Devitofranceschi. ok
1792 deraadt@ djm@
1793 djm belives that the reason for the "0" strings is to ensure that
1794 it's not possible to call getaddrinfo with both host and port being
1795 NULL. In the case of canohost.c host is a local array. In the
1796 case of sshconnect.c, it's checked for null immediately before use.
1797 In dns.c it ultimately comes from ssh.c:main() and is guaranteed to
1798 be non-null but it's not obvious, so I added a warning message in
1799 case it is ever passed a null.
1800 - grunk@cvs.openbsd.org 2008/06/12 00:13:55
1801 [sshconnect.c]
1802 Make ssh print the random art also when ssh'ing to a host using IP only.
1803 spotted by naddy@, ok and help djm@ dtucker@
208cc0ee 1804 - otto@cvs.openbsd.org 2008/06/12 00:13:13
1805 [key.c]
1806 use an odd number of rows and columns and a separate start marker, looks
1807 better; ok grunk@
f17f705b 1808 - djm@cvs.openbsd.org 2008/06/12 03:40:52
1809 [clientloop.h mux.c channels.c clientloop.c channels.h]
1810 Enable ~ escapes for multiplex slave sessions; give each channel
1811 its own escape state and hook the escape filters up to muxed
1812 channels. bz #1331
1813 Mux slaves do not currently support the ~^Z and ~& escapes.
1814 NB. this change cranks the mux protocol version, so a new ssh
1815 mux client will not be able to connect to a running old ssh
1816 mux master.
1817 ok dtucker@
72becb62 1818 - djm@cvs.openbsd.org 2008/06/12 04:06:00
1819 [clientloop.h ssh.c clientloop.c]
1820 maintain an ordered queue of outstanding global requests that we
1821 expect replies to, similar to the per-channel confirmation queue.
1822 Use this queue to verify success or failure for remote forward
1823 establishment in a race free way.
1824 ok dtucker@
344f1d3d 1825 - djm@cvs.openbsd.org 2008/06/12 04:17:47
1826 [clientloop.c]
1827 thall shalt not code past the eightieth column
e8097dc9 1828 - djm@cvs.openbsd.org 2008/06/12 04:24:06
1829 [ssh.c]
1830 thal shalt not code past the eightieth column
9bcf03ce 1831 - djm@cvs.openbsd.org 2008/06/12 05:15:41
1832 [PROTOCOL]
1833 document tun@openssh.com forwarding method
aacab402 1834 - djm@cvs.openbsd.org 2008/06/12 05:32:30
1835 [mux.c]
1836 some more TODO for me
2bb50d23 1837 - grunk@cvs.openbsd.org 2008/06/12 05:42:46
1838 [key.c]
1839 supply the key type (rsa1, rsa, dsa) as a caption in the frame of the
1840 random art. while there, stress the fact that the field base should at
1841 least be 8 characters for the pictures to make sense.
1842 comment and ok djm@
1843 - grunk@cvs.openbsd.org 2008/06/12 06:32:59
1844 [key.c]
1845 We already mark the start of the worm, now also mark the end of the worm
1846 in our random art drawings.
1847 ok djm@
e74caf1e 1848 - djm@cvs.openbsd.org 2008/06/12 15:19:17
1849 [clientloop.h channels.h clientloop.c channels.c mux.c]
1850 The multiplexing escape char handler commit last night introduced a
1851 small memory leak per session; plug it.
e9d0b573 1852 - dtucker@cvs.openbsd.org 2008/06/12 16:35:31
1853 [ssh_config.5 ssh.c]
1854 keyword expansion for localcommand. ok djm@
a64f8307 1855 - jmc@cvs.openbsd.org 2008/06/12 19:10:09
1856 [ssh_config.5 ssh-keygen.1]
1857 tweak the ascii art text; ok grunk
bc2d97c8 1858 - dtucker@cvs.openbsd.org 2008/06/12 20:38:28
1859 [sshd.c sshconnect.c packet.h misc.c misc.h packet.c]
1860 Make keepalive timeouts apply while waiting for a packet, particularly
1861 during key renegotiation (bz #1363). With djm and Matt Day, ok djm@
ad39a852 1862 - djm@cvs.openbsd.org 2008/06/12 20:47:04
1863 [sftp-client.c]
1864 print extension revisions for extensions that we understand
07d8d480 1865 - djm@cvs.openbsd.org 2008/06/12 21:06:25
1866 [clientloop.c]
1867 I was coalescing expected global request confirmation replies at
1868 the wrong end of the queue - fix; prompted by markus@
31de76cc 1869 - grunk@cvs.openbsd.org 2008/06/12 21:14:46
1870 [ssh-keygen.c]
1871 make ssh-keygen -lf show the key type just as ssh-add -l would do it
1872 ok djm@ markus@
f97fb6ca 1873 - grunk@cvs.openbsd.org 2008/06/12 22:03:36
1874 [key.c]
1875 add my copyright, ok djm@
6d8216ff 1876 - ian@cvs.openbsd.org 2008/06/12 23:24:58
1877 [sshconnect.c]
1878 tweak wording in message, ok deraadt@ jmc@
2c83cd01 1879 - dtucker@cvs.openbsd.org 2008/06/13 00:12:02
1880 [sftp.h log.h]
1881 replace __dead with __attribute__((noreturn)), makes things
1882 a little easier to port. Also, add it to sigdie(). ok djm@
b97ea6eb 1883 - djm@cvs.openbsd.org 2008/06/13 00:16:49
1884 [mux.c]
1885 fall back to creating a new TCP connection on most multiplexing errors
1886 (socket connect fail, invalid version, refused permittion, corrupted
1887 messages, etc.); bz #1329 ok dtucker@
243cc316 1888 - dtucker@cvs.openbsd.org 2008/06/13 00:47:53
1889 [mux.c]
1890 upcast size_t to u_long to match format arg; ok djm@
041f11dc 1891 - dtucker@cvs.openbsd.org 2008/06/13 00:51:47
1892 [mac.c]
1893 upcast another size_t to u_long to match format
852eb76b 1894 - dtucker@cvs.openbsd.org 2008/06/13 01:38:23
1895 [misc.c]
1896 upcast uid to long with matching %ld, prevents warnings in portable
632f2669 1897 - djm@cvs.openbsd.org 2008/06/13 04:40:22
1898 [auth2-pubkey.c auth-rhosts.c]
1899 refuse to read ~/.shosts or ~/.ssh/authorized_keys that are not
1900 regular files; report from Solar Designer via Colin Watson in bz#1471
1901 ok dtucker@ deraadt
136d0181 1902 - (dtucker) [clientloop.c serverloop.c] channel_register_filter now
1903 takes 2 more args. with djm@
49190c3d 1904 - (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch
1905 from Todd Vierling.
02e605ed 1906 - (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA
1907 systems. Patch from R. Scott Bailey.
c694c610 1908 - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used
1909 on big endian machines, so ifdef them for little-endian only to prevent
1910 unused function warnings on big-endians.
56f77432 1911 - (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent
1912 compiler warnings on some platforms. Based on a discussion with otto@
9754b94b 1913
554ebbed 191420080611
1915 - (djm) [channels.c configure.ac]
1916 Do not set SO_REUSEADDR on wildcard X11 listeners (X11UseLocalhost=no)
1917 bz#1464; ok dtucker
1918
15b5fa9b 191920080610
1920 - (dtucker) OpenBSD CVS Sync
1921 - djm@cvs.openbsd.org 2008/06/10 03:57:27
1922 [servconf.c match.h sshd_config.5]
1923 support CIDR address matching in sshd_config "Match address" blocks, with
1924 full support for negation and fall-back to classic wildcard matching.
1925 For example:
1926 Match address 192.0.2.0/24,3ffe:ffff::/32,!10.*
1927 PasswordAuthentication yes
1928 addrmatch.c code mostly lifted from flowd's addr.c
1929 feedback and ok dtucker@
8b671558 1930 - djm@cvs.openbsd.org 2008/06/10 04:17:46
1931 [sshd_config.5]
1932 better reference for pattern-list
1760c982 1933 - dtucker@cvs.openbsd.org 2008/06/10 04:50:25
1934 [sshd.c channels.h channels.c log.c servconf.c log.h servconf.h sshd.8]
1935 Add extended test mode (-T) and connection parameters for test mode (-C).
1936 -T causes sshd to write its effective configuration to stdout and exit.
1937 -C causes any relevant Match rules to be applied before output. The
1938 combination allows tesing of the parser and config files. ok deraadt djm
01e9e424 1939 - jmc@cvs.openbsd.org 2008/06/10 07:12:00
1940 [sshd_config.5]
1941 tweak previous;
3b42e3ac 1942 - jmc@cvs.openbsd.org 2008/06/10 08:17:40
1943 [sshd.8 sshd.c]
1944 - update usage()
1945 - fix SYNOPSIS, and sort options
1946 - some minor additional fixes
f0528444 1947 - dtucker@cvs.openbsd.org 2008/06/09 18:06:32
1948 [regress/test-exec.sh]
1949 Don't generate putty keys if we're not going to use them. ok djm
16d46c30 1950 - dtucker@cvs.openbsd.org 2008/06/10 05:23:32
1951 [regress/addrmatch.sh regress/Makefile]
1952 Regress test for Match CIDR rules. ok djm@
94edc013 1953 - dtucker@cvs.openbsd.org 2008/06/10 15:21:41
1954 [test-exec.sh]
1955 Use a more portable construct for checking if we're running a putty test
64c576e9 1956 - dtucker@cvs.openbsd.org 2008/06/10 15:28:49
1957 [test-exec.sh]
1958 Add quotes
f6748d7b 1959 - dtucker@cvs.openbsd.org 2008/06/10 18:21:24
1960 [ssh_config.5]
1961 clarify that Host patterns are space-separated. ok deraadt
3f0444ca 1962 - djm@cvs.openbsd.org 2008/06/10 22:15:23
1963 [PROTOCOL ssh.c serverloop.c]
1964 Add a no-more-sessions@openssh.com global request extension that the
1965 client sends when it knows that it will never request another session
1966 (i.e. when session multiplexing is disabled). This allows a server to
1967 disallow further session requests and terminate the session.
1968 Why would a non-multiplexing client ever issue additional session
1969 requests? It could have been attacked with something like SSH'jack:
1970 http://www.storm.net.nz/projects/7
1971 feedback & ok markus
b3b048d6 1972 - djm@cvs.openbsd.org 2008/06/10 23:06:19
1973 [auth-options.c match.c servconf.c addrmatch.c sshd.8]
1974 support CIDR address matching in .ssh/authorized_keys from="..." stanzas
1975 ok and extensive testing dtucker@
8fb12ef0 1976 - dtucker@cvs.openbsd.org 2008/06/10 23:21:34
1977 [bufaux.c]
1978 Use '\0' for a nul byte rather than unadorned 0. ok djm@
a6d05adf 1979 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
1980 [Makefile regress/key-options.sh]
1981 Add regress test for key options. ok djm@
edee47f5 1982 - (dtucker) [openbsd-compat/fake-rfc2553.h] Add sin6_scope_id to sockaddr_in6
1983 since the new CIDR code in addmatch.c references it.
1984 - (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6
1985 specific tests on platforms that don't do IPv6.
8ac1d2eb 1986 - (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well
1987 as environment.
0694c78f 1988 - (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now.
15b5fa9b 1989
10e804f4 199020080609
1991 - (dtucker) OpenBSD CVS Sync
1992 - dtucker@cvs.openbsd.org 2008/06/08 17:04:41
1993 [sftp-server.c]
1994 Add case for ENOSYS in errno_to_portable; ok deraadt
5a3cde15 1995 - dtucker@cvs.openbsd.org 2008/06/08 20:15:29
1996 [sftp.c sftp-client.c sftp-client.h]
1997 Have the sftp client store the statvfs replies in wire format,
1998 which prevents problems when the server's native sizes exceed the
1999 client's.
2000 Also extends the sizes of the remaining 32bit wire format to 64bit,
2001 they're specified as unsigned long in the standard.
7290afcb 2002 - dtucker@cvs.openbsd.org 2008/06/09 13:02:39
2626070f 2003 [sftp-server.c]
7290afcb 2004 Extend 32bit -> 64bit values for statvfs extension missed in previous
2005 commit.
2626070f 2006 - dtucker@cvs.openbsd.org 2008/06/09 13:38:46
2007 [PROTOCOL]
2008 Use a $OpenBSD tag so our scripts will sync changes.
10e804f4 2009
22f5e872 201020080608
2011 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c
2012 openbsd-compat/Makefile.in openbsd-compat/openbsd-compat.h
2013 openbsd-compat/bsd-statvfs.{c,h}] Add a null implementation of statvfs and
2014 fstatvfs and remove #defines around statvfs code. ok djm@
7a4f468b 2015 - (dtucker) [configure.ac defines.h sftp-client.c M sftp-server.c] Add a
2016 macro to convert fsid to unsigned long for platforms where fsid is a
2017 2-member array.
22f5e872 2018
0894bbed 201920080607
2020 - (dtucker) [mux.c] Include paths.h inside ifdef HAVE_PATHS_H.
4538e135 2021 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c]
2022 Do not enable statvfs extensions on platforms that do not have statvfs.
2abb1ef5 2023 - (dtucker) OpenBSD CVS Sync
2024 - djm@cvs.openbsd.org 2008/05/19 06:14:02
2025 [packet.c] unbreak protocol keepalive timeouts bz#1465; ok dtucker@
82bb6f20 2026 - djm@cvs.openbsd.org 2008/05/19 15:45:07
2027 [sshtty.c ttymodes.c sshpty.h]
2028 Fix sending tty modes when stdin is not a tty (bz#1199). Previously
2029 we would send the modes corresponding to a zeroed struct termios,
2030 whereas we should have been sending an empty list of modes.
2031 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
048acbeb 2032 - djm@cvs.openbsd.org 2008/05/19 15:46:31
2033 [ssh-keygen.c]
2034 support -l (print fingerprint) in combination with -F (find host) to
2035 search for a host in ~/.ssh/known_hosts and display its fingerprint;
2036 ok markus@
4651c790 2037 - djm@cvs.openbsd.org 2008/05/19 20:53:52
2038 [clientloop.c]
2039 unbreak tree by committing this bit that I missed from:
2040 Fix sending tty modes when stdin is not a tty (bz#1199). Previously
2041 we would send the modes corresponding to a zeroed struct termios,
2042 whereas we should have been sending an empty list of modes.
2043 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
0894bbed 2044
07e61b8a 204520080604
2046 - (djm) [openbsd-compat/bsd-arc4random.c] Fix math bug that caused bias
2047 in arc4random_uniform with upper_bound in (2^30,2*31). Note that
2048 OpenSSH did not make requests with upper bounds in this range.
2049
b3ef88dc 205020080519
2051 - (djm) [configure.ac mux.c sftp.c openbsd-compat/Makefile.in]
2052 [openbsd-compat/fmt_scaled.c openbsd-compat/openbsd-compat.h]
2053 Fix compilation on Linux, including pulling in fmt_scaled(3)
2054 implementation from OpenBSD's libutil.
2055
9b04dbaa 205620080518
2057 - (djm) OpenBSD CVS Sync
2058 - djm@cvs.openbsd.org 2008/04/04 05:14:38
2059 [sshd_config.5]
2060 ChrootDirectory is supported in Match blocks (in fact, it is most useful
2061 there). Spotted by Minstrel AT minstrel.org.uk
5b76e3ef 2062 - djm@cvs.openbsd.org 2008/04/04 06:44:26
2063 [sshd_config.5]
2064 oops, some unrelated stuff crept into that commit - backout.
2065 spotted by jmc@
ade21243 2066 - djm@cvs.openbsd.org 2008/04/05 02:46:02
2067 [sshd_config.5]
2068 HostbasedAuthentication is supported under Match too
185adaf8 2069 - (djm) [openbsd-compat/bsd-arc4random.c openbsd-compat/openbsd-compat.c]
2070 [configure.ac] Implement arc4random_buf(), import implementation of
2071 arc4random_uniform() from OpenBSD
936e7c8c 2072 - (djm) [openbsd-compat/bsd-arc4random.c] Warning fixes
c49ce62e 2073 - (djm) [openbsd-compat/port-tun.c] needs sys/queue.h
c1d152b8 2074 - (djm) OpenBSD CVS Sync
2075 - djm@cvs.openbsd.org 2008/04/13 00:22:17
2076 [dh.c sshd.c]
2077 Use arc4random_buf() when requesting more than a single word of output
2078 Use arc4random_uniform() when the desired random number upper bound
2079 is not a power of two
2080 ok deraadt@ millert@
360b43ab 2081 - djm@cvs.openbsd.org 2008/04/18 12:32:11
2082 [sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c sftp.h]
2083 introduce sftp extension methods statvfs@openssh.com and
2084 fstatvfs@openssh.com that implement statvfs(2)-like operations,
2085 based on a patch from miklos AT szeredi.hu (bz#1399)
2086 also add a "df" command to the sftp client that uses the
2087 statvfs@openssh.com to produce a df(1)-like display of filesystem
2088 space and inode utilisation
2089 ok markus@
ea530517 2090 - jmc@cvs.openbsd.org 2008/04/18 17:15:47
2091 [sftp.1]
2092 macro fixage;
48fbfda0 2093 - djm@cvs.openbsd.org 2008/04/18 22:01:33
2094 [session.c]
2095 remove unneccessary parentheses
0bb7755b 2096 - otto@cvs.openbsd.org 2008/04/29 11:20:31
2097 [monitor_mm.h]
2098 garbage collect two unused fields in struct mm_master; ok markus@
c47ff7a6 2099 - djm@cvs.openbsd.org 2008/04/30 10:14:03
2100 [ssh-keyscan.1 ssh-keyscan.c]
2101 default to rsa (protocol 2) keys, instead of rsa1 keys; spotted by
2102 larsnooden AT openoffice.org
43c3f85c 2103 - pyr@cvs.openbsd.org 2008/05/07 05:49:37
2104 [servconf.c servconf.h session.c sshd_config.5]
2105 Enable the AllowAgentForwarding option in sshd_config (global and match
2106 context), to specify if agents should be permitted on the server.
2107 As the man page states:
2108 ``Note that disabling Agent forwarding does not improve security
2109 unless users are also denied shell access, as they can always install
2110 their own forwarders.''
2111 ok djm@, ok and a mild frown markus@
5c7e2b47 2112 - pyr@cvs.openbsd.org 2008/05/07 06:43:35
2113 [sshd_config]
2114 push the sshd_config bits in, spotted by ajacoutot@
94569631 2115 - jmc@cvs.openbsd.org 2008/05/07 08:00:14
2116 [sshd_config.5]
2117 sort;
17f02f0a 2118 - markus@cvs.openbsd.org 2008/05/08 06:59:01
2119 [bufaux.c buffer.h channels.c packet.c packet.h]
2120 avoid extra malloc/copy/free when receiving data over the net;
2121 ~10% speedup for localhost-scp; ok djm@
3593bdc0 2122 - djm@cvs.openbsd.org 2008/05/08 12:02:23
2123 [auth-options.c auth1.c channels.c channels.h clientloop.c gss-serv.c]
2124 [monitor.c monitor_wrap.c nchan.c servconf.c serverloop.c session.c]
2125 [ssh.c sshd.c]
2126 Implement a channel success/failure status confirmation callback
2127 mechanism. Each channel maintains a queue of callbacks, which will
2128 be drained in order (RFC4253 guarantees confirm messages are not
2129 reordered within an channel).
2130 Also includes a abandonment callback to clean up if a channel is
2131 closed without sending confirmation messages. This probably
2132 shouldn't happen in compliant implementations, but it could be
2133 abused to leak memory.
2134 ok markus@ (as part of a larger diff)
c6dca55e 2135 - djm@cvs.openbsd.org 2008/05/08 12:21:16
2136 [monitor.c monitor_wrap.c session.h servconf.c servconf.h session.c]
2137 [sshd_config sshd_config.5]
2138 Make the maximum number of sessions run-time controllable via
2139 a sshd_config MaxSessions knob. This is useful for disabling
2140 login/shell/subsystem access while leaving port-forwarding working
2141 (MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or
2142 simply increasing the number of allows multiplexed sessions.
2143 Because some bozos are sure to configure MaxSessions in excess of the
2144 number of available file descriptors in sshd (which, at peak, might be
2145 as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds
2146 on error paths, and make it fail gracefully on out-of-fd conditions -
2147 sending channel errors instead of than exiting with fatal().
2148 bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com
2149 ok markus@
95d3c124 2150 - djm@cvs.openbsd.org 2008/05/08 13:06:11
2151 [clientloop.c clientloop.h ssh.c]
2152 Use new channel status confirmation callback system to properly deal
2153 with "important" channel requests that fail, in particular command exec,
2154 shell and subsystem requests. Previously we would optimistically assume
2155 that the requests would always succeed, which could cause hangs if they
2156 did not (e.g. when the server runs out of fds) or were unimplemented by
2157 the server (bz #1384)
2158 Also, properly report failing multiplex channel requests via the mux
2159 client stderr (subject to LogLevel in the mux master) - better than
2160 silently failing.
2161 most bits ok markus@ (as part of a larger diff)
e07e21ad 2162 - djm@cvs.openbsd.org 2008/05/09 04:55:56
2163 [channels.c channels.h clientloop.c serverloop.c]
2164 Try additional addresses when connecting to a port forward destination
2165 whose DNS name resolves to more than one address. The previous behaviour
2166 was to try the first address and give up.
2167 Reported by stig AT venaas.com in bz#343
2168 great feedback and ok markus@
3bcced4c 2169 - djm@cvs.openbsd.org 2008/05/09 14:18:44
2170 [clientloop.c clientloop.h ssh.c mux.c]
2171 tidy up session multiplexing code, moving it into its own file and
2172 making the function names more consistent - making ssh.c and
2173 clientloop.c a fair bit more readable.
2174 ok markus@
6cd3e678 2175 - djm@cvs.openbsd.org 2008/05/09 14:26:08
2176 [ssh.c]
2177 dingo stole my diff hunk
ee7c3e92 2178 - markus@cvs.openbsd.org 2008/05/09 16:16:06
2179 [session.c]
2180 re-add the USE_PIPES code and enable it.
2181 without pipes shutdown-read from the sshd does not trigger
2182 a SIGPIPE when the forked program does a write.
2183 ok djm@
2184 (Id sync only, USE_PIPES never left portable OpenSSH)
271f4a13 2185 - markus@cvs.openbsd.org 2008/05/09 16:17:51
2186 [channels.c]
2187 error-fd race: don't enable the error fd in the select bitmask
2188 for channels with both in- and output closed, since the channel
2189 will go away before we call select();
2190 report, lots of debugging help and ok djm@
50c96367 2191 - markus@cvs.openbsd.org 2008/05/09 16:21:13
2192 [channels.h clientloop.c nchan.c serverloop.c]
2193 unbreak
2194 ssh -2 localhost od /bin/ls | true
2195 ignoring SIGPIPE by adding a new channel message (EOW) that signals
2196 the peer that we're not interested in any data it might send.
2197 fixes bz #85; discussion, debugging and ok djm@
d5820099 2198 - pvalchev@cvs.openbsd.org 2008/05/12 20:52:20
2199 [umac.c]
2200 Ensure nh_result lies on a 64-bit boundary (fixes warnings observed
2201 on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@
56b12440 2202 - djm@cvs.openbsd.org 2008/05/15 23:52:24
2203 [nchan2.ms]
2204 document eow message in ssh protocol 2 channel state machine;
2205 feedback and ok markus@
f8db3345 2206 - djm@cvs.openbsd.org 2008/05/18 21:29:05
2207 [sftp-server.c]
2208 comment extension announcement
8be03682 2209 - djm@cvs.openbsd.org 2008/05/16 08:30:42
2210 [PROTOCOL]
2211 document our protocol extensions and deviations; ok markus@
2212 - djm@cvs.openbsd.org 2008/05/17 01:31:56
2213 [PROTOCOL]
2214 grammar and correctness fixes from stevesk@
9b04dbaa 2215
490c3105 221620080403
2217 - (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile-
2218 time warnings on LynxOS. Patch from ops AT iki.fi
1ebb73e4 2219 - (djm) Force string arguments to replacement setproctitle() though
2220 strnvis first. Ok dtucker@
490c3105 2221
2b363e83 222220080403
2223 - (djm) OpenBSD CVS sync:
2224 - markus@cvs.openbsd.org 2008/04/02 15:36:51
2225 [channels.c]
2226 avoid possible hijacking of x11-forwarded connections (back out 1.183)
2227 CVE-2008-1483; ok djm@
adb7acbc 2228 - jmc@cvs.openbsd.org 2008/03/27 22:37:57
2229 [sshd.8]
2230 remove trailing whitespace;
53e0dc70 2231 - djm@cvs.openbsd.org 2008/04/03 09:50:14
2232 [version.h]
2233 openssh-5.0
31b1b2c8 2234 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
2235 [contrib/suse/openssh.spec] Crank version numbers in RPM spec files
dd052df9 2236 - (djm) [README] Update link to release notes
098ebea7 2237 - (djm) Release 5.0p1
This page took 0.469621 seconds and 5 git commands to generate.