]> andersk Git - openssh.git/blame - ChangeLog
- (djm) Bug #214: Fix utmp for Irix (don't strip "tty"). Patch from
[openssh.git] / ChangeLog
CommitLineData
520b41b2 120020423
3b307f85 2 - (djm) Trim ChangeLog to include only post-3.1 changes
48862e93 3 - (djm) Update RPM spec file versions
03dd62aa 4 - (djm) Redhat spec enables KrbV by default
1352689f 5 - (djm) Applied OpenSC smartcard updates from Markus &
6 Antti Tapaninen <aet@cc.hut.fi>
7 - (djm) Define BROKEN_REALPATH for AIX, patch from
8 Antti Tapaninen <aet@cc.hut.fi>
0e8f4eba 9 - (djm) Bug #214: Fix utmp for Irix (don't strip "tty"). Patch from
10 Kevin Taylor <no@nowhere.org> (??) via Philipp Grau
11 <phgrau@zedat.fu-berlin.de>
2805b943 12 - (djm) Bug #213: Simplify CMSG_ALIGN macros to avoid symbol clashes.
13 Reported by Doug Manton <dmanton@emea.att.com>
520b41b2 14 - (djm) Bug #222: Fix tests for getaddrinfo on OSF/1. Spotted by
15 Robert Urban <urban@spielwiese.de>
ad200abb 16 - (djm) Make privsep work with PAM (still experimental)
9b26c596 17 - (djm) OpenBSD CVS Sync
18 - deraadt@cvs.openbsd.org 2002/04/20 09:02:03
19 [servconf.c]
20 No, afs requires explicit enabling
21 - markus@cvs.openbsd.org 2002/04/20 09:14:58
22 [bufaux.c bufaux.h]
23 add buffer_{get,put}_short
3b358a0e 24 - markus@cvs.openbsd.org 2002/04/20 09:17:19
25 [radix.c]
26 rewrite using the buffer_* API, fixes overflow; ok deraadt@
22d0faff 27 - stevesk@cvs.openbsd.org 2002/04/21 16:19:27
28 [sshd.8 sshd_config]
29 document default AFSTokenPassing no; ok deraadt@
134c552b 30 - stevesk@cvs.openbsd.org 2002/04/21 16:25:06
31 [sshconnect1.c]
32 spelling in error message; ok markus@
afb8fdb4 33 - markus@cvs.openbsd.org 2002/04/22 06:15:47
34 [radix.c]
35 fix check for overflow
eadc806d 36 - markus@cvs.openbsd.org 2002/04/22 16:16:53
37 [servconf.c sshd.8 sshd_config]
38 do not auto-enable KerberosAuthentication; ok djm@, provos@, deraadt@
e0ae8728 39 - markus@cvs.openbsd.org 2002/04/22 21:04:52
40 [channels.c clientloop.c clientloop.h ssh.c]
41 request reply (success/failure) for -R style fwd in protocol v2,
42 depends on ordered replies.
43 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=215; ok provos@
520b41b2 44
ac033f8c 4520020421
46 - (tim) [entropy.c.] Portability fix for SCO Unix 3.2v4.x (SCO OSR 3.0).
47 entropy.c needs seteuid(getuid()) for the setuid(original_uid) to succeed.
48 Patch by gert@greenie.muc.de. This fixes one part of Bug 208
49
6dc63b4f 5020020418
51 - (djm) Avoid SIGCHLD breakage when run from rsync. Fix from
52 Sturle Sunde <sturle.sunde@usit.uio.no>
53
230c7a8f 5420020417
55 - (djm) Tell users to configure /dev/random support into OpenSSL in INSTALL
1a7220c2 56 - (djm) Fix .Nm in mdoc2man.pl from pspencer@fields.utoronto.ca
8d184c09 57 - (tim) [configure.ac] Issue warning on --with-default-path=/some_path
58 if LOGIN_CAP is enabled. Report & testing by Tuc <tuc@ttsg.com>
230c7a8f 59
9ae68cce 6020020415
61 - (djm) Unbreak "make install". Fix from Darren Tucker <dtucker@zip.com.au>
4e51cc76 62 - (stevesk) bsd-cygwin_util.[ch] BSD license from Corinna Vinschen
1b06e75e 63 - (tim) [configure.ac] add tests for recvmsg and sendmsg.
64 [monitor_fdpass.c] add checks for HAVE_SENDMSG and HAVE_RECVMSG for
65 systems that HAVE_ACCRIGHTS_IN_MSGHDR but no recvmsg or sendmsg.
9ae68cce 66
f6e6303d 6720020414
68 - (djm) ssh-rand-helper improvements
69 - Add commandline debugging options
70 - Don't write binary data if stdout is a tty (use hex instead)
71 - Give it a manpage
cbe5b851 72 - (djm) Random number collection doc fixes from Ben
f6e6303d 73
12928e80 7420020413
75 - (djm) Add KrbV support patch from Simon Wilkinson <simon@sxw.org.uk>
76
40b74b3f 7720020412
78 - (stevesk) [auth-sia.[ch]] add BSD license from Chris Adams
f95c8ce8 79 - (tim) [configure.ac] add <sys/types.h> to msghdr tests. Change -L
80 to -h on testing for /bin being symbolic link
e2c9b9e3 81 - (bal) Mistaken in Cygwin scripts for ssh starting. Patch by
82 Corinna Vinschen <vinschen@redhat.com>
e75b61db 83 - (bal) disable privsep if no MAP_ANON. We can re-enable it
84 after the release when we can do more testing.
40b74b3f 85
65b91c76 8620020411
87 - (stevesk) [auth-sia.c] cleanup
7b0737a4 88 - (tim) [acconfig.h defines.h includes.h] put includes in includes.h and
89 defines in defines.h [rijndael.c openbsd-compat/fake-socket.h
90 openbsd-compat/inet_aton.c] include "includes.h" instead of "config.h"
91 ok stevesk@
65b91c76 92
ca8aba40 9320020410
f1af2dbf 94 - (stevesk) [configure.ac monitor.c] HAVE_SOCKETPAIR
ca8aba40 95 - (stevesk) [auth-sia.c] compile fix Chris Adams <cmadams@hiwaay.net>
d8ff54e6 96 - (bal) OpenBSD CVS Sync
97 - markus@cvs.openbsd.org 2002/04/10 08:21:47
98 [auth1.c compat.c compat.h]
99 strip '@' from username only for KerbV and known broken clients, bug #204
f14a5033 100 - markus@cvs.openbsd.org 2002/04/10 08:56:01
101 [version.h]
102 OpenSSH_3.2
103 - Added p1 to idenify Portable release version.
ca8aba40 104
46c8e0f6 10520020408
106 - (bal) Minor OpenSC updates. Fix up header locations and update
107 README.smartcard provided by Juha Yrjölä <jyrjola@cc.hut.fi>
108
7176df4f 10920020407
110 - (stevesk) HAVE_CONTROL_IN_MSGHDR; not used right now.
111 Future: we may want to test if fd passing works correctly.
84071420 112 - (stevesk) [monitor_fdpass.c] fatal() for UsePrivilegeSeparation=yes
113 and no fd passing support.
1e8f8c5b 114 - (stevesk) HAVE_MMAP and HAVE_SYS_MMAN_H and use them in
115 monitor_mm.c
a90419b8 116 - (stevesk) remove configure support for poll.h; it was removed
117 from sshd.c a long time ago.
9a0fbcb3 118 - (stevesk) --with-privsep-user; default sshd
1bf74eac 119 - (stevesk) wrap munmap() with HAVE_MMAP also.
7176df4f 120
b17d6a47 12120020406
122 - (djm) Typo in Suse SPEC file. Fix from Carsten Grohmann
123 <carsten.grohmann@dr-baldeweg.de>
23aa1237 124 - (bal) Added MAP_FAILED to allow AIX and Trusted HP to compile.
af2b3cd9 125 - (bal) OpenBSD CVS Sync
126 - djm@cvs.openbsd.org 2002/04/06 00:30:08
127 [sftp-client.c]
128 Fix occasional corruption on upload due to bad reuse of request id, spotted
129 by chombier@mac.com; ok markus@
39f9599a 130 - mouring@cvs.openbsd.org 2002/04/06 18:24:09
131 [scp.c]
132 Fixes potental double // within path.
133 http://bugzilla.mindrot.org/show_bug.cgi?id=76
5866adb0 134 - (bal) Slight update to OpenSC support. Better version checking. patch
135 by Juha Yrjölä <jyrjola@cc.hut.fi>
b5171f93 136 - (bal) Revered out of runtime IRIX detection of joblimits. Code is
137 incomplete.
419e4769 138 - (bal) Quiet down configure.ac if /bin/test does not exist.
14f35963 139 - (bal) We no longer use atexit()/xatexit()/on_exit()
b17d6a47 140
295c8801 14120020405
142 - (bal) Patch for OpenSC SmartCard library; ok markus@; patch by
143 Juha Yrjölä <jyrjola@cc.hut.fi>
144 - (bal) Minor documentation update to reflect smartcard library
145 support changes.
ab33e02a 146 - (bal) Too many <sys/queue.h> issues. Remove all workarounds and
147 using internal version only.
d4c6ddff 148 - (bal) OpenBSD CVS Sync
149 - stevesk@cvs.openbsd.org 2002/04/05 20:56:21
150 [sshd.8]
151 clarify sshrc some and handle X11UseLocalhost=yes; ok markus@
295c8801 152
fde58bd4 15320020404
154 - (stevesk) [auth-pam.c auth-pam.h auth-passwd.c auth-sia.c auth-sia.h
155 auth1.c auth2.c] PAM, OSF_SIA password auth cleanup; from djm.
bf03f2da 156 - (bal) OpenBSD CVS Sync
157 - markus@cvs.openbsd.org 2002/04/03 09:26:11
158 [cipher.c myproposal.h]
159 re-add rijndael-cbc@lysator.liu.se for MacSSH; ash@lab.poc.net
fde58bd4 160
ca7e8e1e 16120020402
162 - (bal) Hand Sync of scp.c (reverted to upstream code)
163 - deraadt@cvs.openbsd.org 2002/03/30 17:45:46
164 [scp.c]
165 stretch banners
c572a874 166 - (bal) CVS ID sync of uidswap.c
783dbbdc 167 - (bal) OpenBSD CVS Sync (now for the real sync)
168 - markus@cvs.openbsd.org 2002/03/27 22:21:45
169 [ssh-keygen.c]
170 try to import keys with extra trailing === (seen with ssh.com < 2.0.12)
49a34e84 171 - markus@cvs.openbsd.org 2002/03/28 15:34:51
172 [session.c]
173 do not call record_login twice (for use_privsep)
ffbf7323 174 - markus@cvs.openbsd.org 2002/03/29 18:59:32
175 [session.c session.h]
176 retrieve last login time before the pty is allocated, store per session
3bc822df 177 - stevesk@cvs.openbsd.org 2002/03/29 19:16:22
178 [sshd.8]
179 RSA key modulus size minimum 768; ok markus@
82b00264 180 - stevesk@cvs.openbsd.org 2002/03/29 19:18:33
181 [auth-rsa.c ssh-rsa.c ssh.h]
182 make RSA modulus minimum #define; ok markus@
8c38e88b 183 - markus@cvs.openbsd.org 2002/03/30 18:51:15
184 [monitor.c serverloop.c sftp-int.c sftp.c sshd.c]
185 check waitpid for EINTR; based on patch from peter@ifm.liu.se
92053302 186 - markus@cvs.openbsd.org 2002/04/01 22:02:16
187 [sftp-client.c]
188 20480 is an upper limit for older server
9c74a24d 189 - markus@cvs.openbsd.org 2002/04/01 22:07:17
190 [sftp-client.c]
191 fallback to stat if server does not support lstat
b745a2f2 192 - markus@cvs.openbsd.org 2002/04/02 11:49:39
193 [ssh-agent.c]
194 check $SHELL for -k and -d, too;
195 http://bugzilla.mindrot.org/show_bug.cgi?id=199
b69145c2 196 - markus@cvs.openbsd.org 2002/04/02 17:37:48
197 [sftp.c]
198 always call log_init()
c9336aed 199 - markus@cvs.openbsd.org 2002/04/02 20:11:38
200 [ssh-rsa.c]
201 ignore SSH_BUG_SIGBLOB for ssh-rsa; #187
c895376b 202 - (bal) mispelling in uidswap.c (portable only)
ca7e8e1e 203
8b314ec9 20420020401
205 - (stevesk) [monitor.c] PAM should work again; will *not* work with
206 UsePrivilegeSeparation=yes.
3906af0f 207 - (stevesk) [auth1.c] fix password auth for protocol 1 when
208 !USE_PAM && !HAVE_OSF_SIA; merge issue.
8b314ec9 209
267e920e 21020020331
211 - (tim) [configure.ac] use /bin/test -L to work around broken builtin on
212 Solaris 8
ef077e37 213 - (tim) [sshconnect2.c] change uint32_t to u_int32_t
267e920e 214
0461c355 21520020330
216 - (stevesk) [configure.ac] remove header check for sys/ttcompat.h
217 bug 167
218
dd466ff8 21920020327
220 - (bal) 'pw' should be 'authctxt->pw' in auth1.c spotted by
221 kent@lysator.liu.se
17f5e68a 222 - (bal) OpenBSD CVS Sync
223 - markus@cvs.openbsd.org 2002/03/26 11:34:49
224 [ssh.1 sshd.8]
225 update to recent drafts
5fb274c1 226 - markus@cvs.openbsd.org 2002/03/26 11:37:05
227 [ssh.c]
228 update Copyright
19f40184 229 - markus@cvs.openbsd.org 2002/03/26 15:23:40
230 [bufaux.c]
231 do not talk about packets in bufaux
7341fad9 232 - rees@cvs.openbsd.org 2002/03/26 18:46:59
233 [scard.c]
234 try_AUT0 in read_pubkey too, for those paranoid few who want to acl 'sh'
6c112aca 235 - markus@cvs.openbsd.org 2002/03/26 22:50:39
236 [channels.h]
237 CHANNEL_EFD_OUTPUT_ACTIVE is false for CHAN_CLOSE_RCVD, too
52103b10 238 - markus@cvs.openbsd.org 2002/03/26 23:13:03
239 [auth-rsa.c]
240 disallow RSA keys < 768 for protocol 1, too (rhosts-rsa and rsa auth)
76bf34f1 241 - markus@cvs.openbsd.org 2002/03/26 23:14:51
242 [kex.c]
243 generate a new cookie for each SSH2_MSG_KEXINIT message we send out
300e01c4 244 - mouring@cvs.openbsd.org 2002/03/27 11:45:42
245 [monitor.c]
246 monitor_allowed_key() returns int instead of pointer. ok markus@
247
eb4652f4 24820020325
249 - (stevesk) import OpenBSD <sys/tree.h> as "openbsd-compat/tree.h"
47c36e5b 250 - (bal) OpenBSD CVS Sync
251 - stevesk@cvs.openbsd.org 2002/03/23 20:57:26
252 [sshd.c]
253 setproctitle() after preauth child; ok markus@
d452ec1a 254 - markus@cvs.openbsd.org 2002/03/24 16:00:27
255 [serverloop.c]
256 remove unused debug
a49dfdec 257 - markus@cvs.openbsd.org 2002/03/24 16:01:13
258 [packet.c]
259 debug->debug3 for extra padding
5b0d7dc1 260 - stevesk@cvs.openbsd.org 2002/03/24 17:27:03
261 [kexgex.c]
262 typo; ok markus@
d4355079 263 - stevesk@cvs.openbsd.org 2002/03/24 17:53:16
264 [monitor_fdpass.c]
265 minor cleanup and more error checking; ok markus@
9fc0407d 266 - markus@cvs.openbsd.org 2002/03/24 18:05:29
267 [scard.c]
268 we need to figure out AUT0 for sc_private_encrypt, too
38c1c52a 269 - stevesk@cvs.openbsd.org 2002/03/24 23:20:00
270 [monitor.c]
271 remove "\n" from fatal()
159897f3 272 - markus@cvs.openbsd.org 2002/03/25 09:21:13
273 [auth-rsa.c]
274 return 0 (not NULL); tomh@po.crl.go.jp
6f33c8cd 275 - markus@cvs.openbsd.org 2002/03/25 09:25:06
276 [auth-rh-rsa.c]
277 rm bogus comment
0659cace 278 - markus@cvs.openbsd.org 2002/03/25 17:34:27
279 [scard.c scard.h ssh-agent.c ssh-keygen.c ssh.c]
280 change sc_get_key to sc_get_keys and hide smartcard details in scard.c
3074b20c 281 - stevesk@cvs.openbsd.org 2002/03/25 20:12:10
282 [monitor_mm.c monitor_wrap.c]
283 ssize_t args use "%ld" and cast to (long)
284 size_t args use "%lu" and cast to (u_long)
285 ok markus@ and thanks millert@
1c2deed1 286 - markus@cvs.openbsd.org 2002/03/25 21:04:02
287 [ssh.c]
288 simplify num_identity_files handling
d2296ed7 289 - markus@cvs.openbsd.org 2002/03/25 21:13:51
290 [channels.c channels.h compat.c compat.h nchan.c]
291 don't send stderr data after EOF, accept this from older known (broken)
292 sshd servers only, fixes http://bugzilla.mindrot.org/show_bug.cgi?id=179
8e4fd4a1 293 - stevesk@cvs.openbsd.org 2002/03/26 03:24:01
294 [monitor.h monitor_fdpass.h monitor_mm.h monitor_wrap.h]
295 $OpenBSD$
eb4652f4 296
1178e8db 29720020324
298 - (stevesk) [session.c] disable LOGIN_NEEDS_TERM until we are sure
299 it can be removed. only used on solaris. will no longer compile with
300 privsep shuffling.
301
6f34652e 30220020322
303 - (stevesk) HAVE_ACCRIGHTS_IN_MSGHDR configure support
7b18c353 304 - (stevesk) [monitor.c monitor_wrap.c] #ifdef HAVE_PW_CLASS_IN_PASSWD
c921ee00 305 - (stevesk) configure and cpp __FUNCTION__ gymnastics to handle nielsisms
dc90b259 306 - (stevesk) [monitor_fdpass.c] support for access rights style file
307 descriptor passing
f7ed12f1 308 - (stevesk) [auth2.c] merge cleanup/sync
cfadc43b 309 - (stevesk) [defines.h] hp-ux 11 has ancillary data style fd passing, but
310 is missing CMSG_LEN() and CMSG_SPACE() macros.
cc58061e 311 - (stevesk) [defines.h] #define MAP_ANON MAP_ANONYMOUS for HP-UX; other
312 platforms may need this--I'm not sure. mmap() issues will need to be
313 addressed further.
05976246 314 - (tim) [cipher.c] fix problem with OpenBSD sync
9242fa1b 315 - (stevesk) [LICENCE] OpenBSD sync
6f34652e 316
8627f3e0 31720020321
318 - (bal) OpenBSD CVS Sync
319 - itojun@cvs.openbsd.org 2002/03/08 06:10:16
320 [sftp-client.c]
321 printf type mismatch
bfa7f960 322 - itojun@cvs.openbsd.org 2002/03/11 03:18:49
323 [sftp-client.c]
324 correct type mismatches (u_int64_t != unsigned long long)
5fc7dbc9 325 - itojun@cvs.openbsd.org 2002/03/11 03:19:53
326 [sftp-client.c]
327 indent
150a5466 328 - markus@cvs.openbsd.org 2002/03/14 15:24:27
329 [sshconnect1.c]
330 don't trust size sent by (rogue) server; noted by s.esser@e-matters.de
4f08e98d 331 - markus@cvs.openbsd.org 2002/03/14 16:38:26
332 [sshd.c]
333 split out ssh1 session key decryption; ok provos@
46f1eece 334 - markus@cvs.openbsd.org 2002/03/14 16:56:33
335 [auth-rh-rsa.c auth-rsa.c auth.h]
336 split auth_rsa() for better readability and privsep; ok provos@
c390a3c8 337 - itojun@cvs.openbsd.org 2002/03/15 11:00:38
338 [auth.c]
339 fix file type checking (use S_ISREG). ok by markus
bcb68a8f 340 - markus@cvs.openbsd.org 2002/03/16 11:24:53
341 [compress.c]
342 skip inflateEnd if inflate fails; ok provos@
3e65880e 343 - markus@cvs.openbsd.org 2002/03/16 17:22:09
344 [auth-rh-rsa.c auth.h]
345 split auth_rhosts_rsa(), ok provos@
bb15f28b 346 - stevesk@cvs.openbsd.org 2002/03/16 17:41:25
347 [auth-krb5.c]
348 BSD license. from Daniel Kouril via Dug Song. ok markus@
443fa1cd 349 - provos@cvs.openbsd.org 2002/03/17 20:25:56
350 [auth.c auth.h auth1.c auth2.c]
351 getpwnamallow returns struct passwd * only if user valid; okay markus@
1b34c1b3 352 - provos@cvs.openbsd.org 2002/03/18 01:12:14
353 [auth.h auth1.c auth2.c sshd.c]
354 have the authentication functions return the authentication context
355 and then do_authenticated; okay millert@
9d0844e3 356 - dugsong@cvs.openbsd.org 2002/03/18 01:30:10
357 [auth-krb4.c]
358 set client to NULL after xfree(), from Rolf Braun
359 <rbraun+ssh@andrew.cmu.edu>
1836f69f 360 - provos@cvs.openbsd.org 2002/03/18 03:41:08
361 [auth.c session.c]
362 move auth_approval into getpwnamallow with help from millert@
bf8269a9 363 - markus@cvs.openbsd.org 2002/03/18 17:13:15
364 [cipher.c cipher.h]
365 export/import cipher states; needed by ssh-privsep
e050d348 366 - markus@cvs.openbsd.org 2002/03/18 17:16:38
367 [packet.c packet.h]
368 export/import cipher state, iv and ssh2 seqnr; needed by ssh-privsep
d0074658 369 - markus@cvs.openbsd.org 2002/03/18 17:23:31
370 [key.c key.h]
371 add key_demote() for ssh-privsep
b625ad75 372 - provos@cvs.openbsd.org 2002/03/18 17:25:29
373 [bufaux.c bufaux.h]
374 buffer_skip_string and extra sanity checking; needed by ssh-privsep
3d6fc2f8 375 - provos@cvs.openbsd.org 2002/03/18 17:31:54
376 [compress.c]
377 export compression streams for ssh-privsep
1853d1ef 378 - provos@cvs.openbsd.org 2002/03/18 17:50:31
379 [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c auth-skey.c auth.h
380 auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c kexgex.c servconf.c
381 session.h servconf.h serverloop.c session.c sshd.c]
382 integrate privilege separated openssh; its turned off by default for now.
383 work done by me and markus@
ce19ff48 384 - provos@cvs.openbsd.org 2002/03/18 17:53:08
385 [sshd.8]
386 credits for privsep
70aa9ff4 387 - provos@cvs.openbsd.org 2002/03/18 17:59:09
388 [sshd.8]
389 document UsePrivilegeSeparation
73fbf637 390 - stevesk@cvs.openbsd.org 2002/03/18 23:52:51
391 [servconf.c]
392 UnprivUser/UnprivGroup usable now--specify numeric user/group; ok
393 provos@
1c352e97 394 - stevesk@cvs.openbsd.org 2002/03/19 03:03:43
395 [pathnames.h servconf.c servconf.h sshd.c]
396 _PATH_PRIVSEP_CHROOT_DIR; ok provos@
fffbaee2 397 - stevesk@cvs.openbsd.org 2002/03/19 05:23:08
398 [sshd.8]
399 Banner has no default.
702b7dd8 400 - mpech@cvs.openbsd.org 2002/03/19 06:32:56
401 [sftp-int.c]
402 use xfree() after xstrdup().
403
404 markus@ ok
51aeb639 405 - markus@cvs.openbsd.org 2002/03/19 10:35:39
406 [auth-options.c auth.h session.c session.h sshd.c]
407 clean up prototypes
762715ce 408 - markus@cvs.openbsd.org 2002/03/19 10:49:35
409 [auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h packet.c session.c
410 sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c sshconnect2.c sshd.c
411 ttymodes.c]
412 KNF whitespace
5f1f36b5 413 - markus@cvs.openbsd.org 2002/03/19 14:27:39
414 [auth.c auth1.c auth2.c]
415 make getpwnamallow() allways call pwcopy()
06bea668 416 - markus@cvs.openbsd.org 2002/03/19 15:31:47
417 [auth.c]
418 check for NULL; from provos@
2ea6de2b 419 - stevesk@cvs.openbsd.org 2002/03/20 19:12:25
420 [servconf.c servconf.h ssh.h sshd.c]
421 for unprivileged user, group do:
422 pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@
256debd0 423 - stevesk@cvs.openbsd.org 2002/03/20 21:08:08
424 [sshd.c]
425 strerror() on chdir() fail; ok provos@
edfb66cb 426 - markus@cvs.openbsd.org 2002/03/21 10:21:20
427 [ssh-add.c]
428 ignore errors for nonexisting default keys in ssh-add,
429 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158
c53c54c2 430 - jakob@cvs.openbsd.org 2002/03/21 15:17:26
431 [clientloop.c ssh.1]
432 add built-in command line for adding new port forwardings on the fly.
433 based on a patch from brian wellington. ok markus@.
7649bbfe 434 - markus@cvs.openbsd.org 2002/03/21 16:38:06
435 [scard.c]
436 make compile w/ openssl 0.9.7
b9f62352 437 - markus@cvs.openbsd.org 2002/03/21 16:54:53
438 [scard.c scard.h ssh-keygen.c]
439 move key upload to scard.[ch]
440 - markus@cvs.openbsd.org 2002/03/21 16:57:15
441 [scard.c]
442 remove const
39ac8430 443 - markus@cvs.openbsd.org 2002/03/21 16:58:13
444 [clientloop.c]
445 remove unused
514b94dc 446 - rees@cvs.openbsd.org 2002/03/21 18:08:15
447 [scard.c]
448 In sc_put_key(), sc_reader_id should be id.
ce1ba33a 449 - markus@cvs.openbsd.org 2002/03/21 20:51:12
450 [sshd_config]
451 add privsep (off)
324bf712 452 - markus@cvs.openbsd.org 2002/03/21 21:23:34
453 [sshd.c]
454 add privsep_preauth() and remove 1 goto; ok provos@
86c4f63d 455 - rees@cvs.openbsd.org 2002/03/21 21:54:34
456 [scard.c scard.h ssh-keygen.c]
457 Add PIN-protection for secret key.
76139bd8 458 - rees@cvs.openbsd.org 2002/03/21 22:44:05
459 [authfd.c authfd.h ssh-add.c ssh-agent.c ssh.c]
460 Add PIN-protection for secret key.
ec9b7086 461 - markus@cvs.openbsd.org 2002/03/21 23:07:37
462 [clientloop.c]
463 remove unused, sync w/ cmdline patch in my tree.
ce1ba33a 464
81dadca3 46520020317
466 - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is wanted,
467 warn if directory does not exist. Put system directories in front of
468 PATH for finding entorpy commands.
43e41c2c 469 - (tim) [contrib/aix/buildbff.sh contrib/aix/inventory.sh] AIX package
470 build fixes. Patch by Darren Tucker <dtucker@zip.com.au>
471 [contrib/solaris/buildpkg.sh] add missing dirs to SYSTEM_DIR. Have
472 postinstall check for $piddir and add if necessary.
81dadca3 473
e4abf75b 47420020311
475 - (tim) [contrib/solaris/buildpkg.sh, contrib/solaris/README] Updated to
476 build on all platforms that support SVR4 style package tools. Now runs
477 from build dir. Parts are based on patches from Antonio Navarro, and
478 Darren Tucker.
479
fb8f3dc9 48020020308
a068d86f 481 - (djm) Revert bits of Markus' OpenSSL compat patch which was
482 accidentally committed.
483 - (djm) Add Markus' patch for compat wih OpenSSL < 0.9.6.
484 Known issue: Blowfish for SSH1 does not work
dc254471 485 - (stevesk) entropy.c: typo in debug message
633151a3 486 - (djm) ssh-keygen -i needs seeded RNG; report from markus@
fb8f3dc9 487
0b202697 488$Id$
This page took 2.391012 seconds and 5 git commands to generate.