]> andersk Git - openssh.git/blame - ChangeLog
- andreas@cvs.openbsd.org 2009/10/24 11:11:58
[openssh.git] / ChangeLog
CommitLineData
1270be26 120091208
2 - (dtucker) OpenBSD CVS Sync
3 - andreas@cvs.openbsd.org 2009/10/24 11:11:58
4 [roaming.h]
5 Declarations needed for upcoming changes.
6 ok markus@
7
da073eee 820091226
9 - (tim) [contrib/cygwin/Makefile] Install ssh-copy-id and ssh-copy-id.1
10 Gzip all man pages. Patch from Corinna Vinschen.
11
3bef3252 1220091221
13 - (dtucker) [auth-krb5.c platform.{c,h} openbsd-compat/port-aix.{c,h}]
14 Bug #1583: Use system's kerberos principal name on AIX if it's available.
15 Based on a patch from and tested by Miguel Sanders
16
fd2d830a 1720091208
18 - (dtucker) Bug #1470: Disable OOM-killing of the listening sshd on Linux,
19 based on a patch from Vaclav Ovsik and Colin Watson. ok djm.
20
6b52ddbd 2120091207
22 - (dtucker) Bug #1160: use pkg-config for opensc config if it's available.
23 Tested by Martin Paljak.
95f0ee69 24 - (dtucker) Bug #1677: add conditionals around the source for ssh-askpass.
6b52ddbd 25
e4402dc5 2620091121
27 - (tim) [opensshd.init.in] If PidFile is set in sshd_config, use it.
28 Bug 1628. OK dtucker@
29
48662587 3020091120
31 - (djm) [ssh-rand-helper.c] Print error and usage() when passed command-
32 line arguments as none are supported. Exit when passed unrecognised
33 commandline flags. bz#1568 from gson AT araneus.fi
34
3520091118
4e1082aa 36 - (djm) [channels.c misc.c misc.h sshd.c] add missing setsockopt() to
37 set IPV6_V6ONLY for local forwarding with GatwayPorts=yes. Unify
38 setting IPV6_V6ONLY behind a new function misc.c:sock_set_v6only()
e5a1e421 39 bz#1648, report and fix from jan.kratochvil AT redhat.com
40 - (djm) [contrib/gnome-ssh-askpass2.c] Make askpass dialog desktop-modal.
41 bz#1645, patch from jchadima AT redhat.com
4e1082aa 42
cd82326a 4320091107
44 - (dtucker) [authfile.c] Fall back to 3DES for the encryption of private
45 keys when built with OpenSSL versions that don't do AES.
46
090c27c5 4720091105
48 - (dtucker) [authfile.c] Add OpenSSL compat header so this still builds with
49 older versions of OpenSSL.
50
5c0f4199 5120091024
52 - (dtucker) OpenBSD CVS Sync
53 - djm@cvs.openbsd.org 2009/10/11 23:03:15
54 [hostfile.c]
55 mention the host name that we are looking for in check_host_in_hostfile()
1a0a69a7 56 - sobrado@cvs.openbsd.org 2009/10/17 12:10:39
57 [sftp-server.c]
58 sort flags.
7a779483 59 - sobrado@cvs.openbsd.org 2009/10/22 12:35:53
60 [ssh.1 ssh-agent.1 ssh-add.1]
61 use the UNIX-related macros (.At and .Ux) where appropriate.
62 ok jmc@
78da49cb 63 - sobrado@cvs.openbsd.org 2009/10/22 15:02:12
64 [ssh-agent.1 ssh-add.1 ssh.1]
65 write UNIX-domain in a more consistent way; while here, replace a
66 few remaining ".Tn UNIX" macros with ".Ux" ones.
67 pointed out by ratchov@, thanks!
68 ok jmc@
4c9466ae 69 - djm@cvs.openbsd.org 2009/10/22 22:26:13
70 [authfile.c]
71 switch from 3DES to AES-128 for encryption of passphrase-protected
72 SSH protocol 2 private keys; ok several
fbba8bf6 73 - djm@cvs.openbsd.org 2009/10/23 01:57:11
74 [sshconnect2.c]
75 disallow a hostile server from checking jpake auth by sending an
76 out-of-sequence success message. (doesn't affect code enabled by default)
78edb05a 77 - dtucker@cvs.openbsd.org 2009/10/24 00:48:34
78 [ssh-keygen.1]
79 ssh-keygen now uses AES-128 for private keys
aaeda216 80 - (dtucker) [mdoc2man.awk] Teach it to understand the .Ux macro.
51fa929a 81 - (dtucker) [session.c openbsd-compat/port-linux.{c,h}] Bug #1637: if selinux
82 is enabled set the security context to "sftpd_t" before running the
83 internal sftp server Based on a patch from jchadima at redhat.
5c0f4199 84
19b6c4d5 8520091011
86 - (dtucker) [configure.ac sftp-client.c] Remove the gyrations required for
87 dirent d_type and DTTOIF as we've switched OpenBSD to the more portable
88 lstat.
21af5fc4 89 - (dtucker) OpenBSD CVS Sync
90 - markus@cvs.openbsd.org 2009/10/08 14:03:41
91 [sshd_config readconf.c ssh_config.5 servconf.c sshd_config.5]
92 disable protocol 1 by default (after a transition period of about 10 years)
93 ok deraadt
0dba6d86 94 - jmc@cvs.openbsd.org 2009/10/08 20:42:12
95 [sshd_config.5 ssh_config.5 sshd.8 ssh.1]
96 some tweaks now that protocol 1 is not offered by default; ok markus
711fb093 97 - dtucker@cvs.openbsd.org 2009/10/11 10:41:26
98 [sftp-client.c]
99 d_type isn't portable so use lstat to get dirent modes. Suggested by and
100 "looks sane" deraadt@
991c9728 101 - markus@cvs.openbsd.org 2009/10/08 18:04:27
102 [regress/test-exec.sh]
103 re-enable protocol v1 for the tests.
19b6c4d5 104
3496b8d4 10520091007
106 - (dtucker) OpenBSD CVS Sync
107 - djm@cvs.openbsd.org 2009/08/12 00:13:00
108 [sftp.c sftp.1]
109 support most of scp(1)'s commandline arguments in sftp(1), as a first
110 step towards making sftp(1) a drop-in replacement for scp(1).
111 One conflicting option (-P) has not been changed, pending further
112 discussion.
113 Patch from carlosvsilvapt@gmail.com as part of his work in the
114 Google Summer of Code
b68241c3 115 - jmc@cvs.openbsd.org 2009/08/12 06:31:42
116 [sftp.1]
117 sort options;
97658f13 118 - djm@cvs.openbsd.org 2009/08/13 01:11:19
119 [sftp.1 sftp.c]
120 Swizzle options: "-P sftp_server_path" moves to "-D sftp_server_path",
121 add "-P port" to match scp(1). Fortunately, the -P option is only really
122 used by our regression scripts.
123 part of larger patch from carlosvsilvapt@gmail.com for his Google Summer
124 of Code work; ok deraadt markus
5aa0f160 125 - jmc@cvs.openbsd.org 2009/08/13 13:39:54
126 [sftp.1 sftp.c]
127 sync synopsis and usage();
e746280c 128 - djm@cvs.openbsd.org 2009/08/14 18:17:49
129 [sftp-client.c]
130 make the "get_handle: ..." error messages vaguely useful by allowing
131 callers to specify their own error message strings.
5d799258 132 - fgsch@cvs.openbsd.org 2009/08/15 18:56:34
133 [auth.h]
134 remove unused define. markus@ ok.
135 (Id sync only, Portable still uses this.)
7b3a24aa 136 - dtucker@cvs.openbsd.org 2009/08/16 23:29:26
137 [sshd_config.5]
138 Add PubkeyAuthentication to the list allowed in a Match block (bz #1577)
d141f964 139 - djm@cvs.openbsd.org 2009/08/18 18:36:21
140 [sftp-client.h sftp.1 sftp-client.c sftp.c]
141 recursive transfer support for get/put and on the commandline
142 work mostly by carlosvsilvapt@gmail.com for the Google Summer of Code
143 with some tweaks by me; "go for it" deraadt@
e83f55f9 144 - djm@cvs.openbsd.org 2009/08/18 21:15:59
145 [sftp.1]
146 fix "get" command usage, spotted by jmc@
3829cbca 147 - jmc@cvs.openbsd.org 2009/08/19 04:56:03
148 [sftp.1]
149 ether -> either;
2e2c33ad 150 - dtucker@cvs.openbsd.org 2009/08/20 23:54:28
151 [mux.c]
152 subsystem_flag is defined in ssh.c so it's extern; ok djm
99c5cf8e 153 - djm@cvs.openbsd.org 2009/08/27 17:28:52
154 [sftp-server.c]
155 allow setting an explicit umask on the commandline to override whatever
156 default the user has. bz#1229; ok dtucker@ deraadt@ markus@
bf3290be 157 - djm@cvs.openbsd.org 2009/08/27 17:33:49
158 [ssh-keygen.c]
159 force use of correct hash function for random-art signature display
160 as it was inheriting the wrong one when bubblebabble signatures were
161 activated; bz#1611 report and patch from fwojcik+openssh AT besh.com;
162 ok markus@
62b92bdc 163 - djm@cvs.openbsd.org 2009/08/27 17:43:00
164 [sftp-server.8]
165 allow setting an explicit umask on the commandline to override whatever
166 default the user has. bz#1229; ok dtucker@ deraadt@ markus@
b4741f94 167 - djm@cvs.openbsd.org 2009/08/27 17:44:52
168 [authfd.c ssh-add.c authfd.h]
169 Do not fall back to adding keys without contraints (ssh-add -c / -t ...)
170 when the agent refuses the constrained add request. This was a useful
171 migration measure back in 2002 when constraints were new, but just
172 adds risk now.
173 bz #1612, report and patch from dkg AT fifthhorseman.net; ok markus@
57a6b5dd 174 - djm@cvs.openbsd.org 2009/08/31 20:56:02
175 [sftp-server.c]
176 check correct variable for error message, spotted by martynas@
b7177174 177 - djm@cvs.openbsd.org 2009/08/31 21:01:29
178 [sftp-server.8]
179 document -e and -h; prodded by jmc@
5561856d 180 - djm@cvs.openbsd.org 2009/09/01 14:43:17
181 [ssh-agent.c]
182 fix a race condition in ssh-agent that could result in a wedged or
183 spinning agent: don't read off the end of the allocated fd_sets, and
184 don't issue blocking read/write on agent sockets - just fall back to
185 select() on retriable read/write errors. bz#1633 reported and tested
186 by "noodle10000 AT googlemail.com"; ok dtucker@ markus@
fd8b10fa 187 - grunk@cvs.openbsd.org 2009/10/01 11:37:33
188 [dh.c]
189 fix a cast
190 ok djm@ markus@
45bb6142 191 - djm@cvs.openbsd.org 2009/10/06 04:46:40
192 [session.c]
193 bz#1596: fflush(NULL) before exec() to ensure that everying (motd
194 in particular) has made it out before the streams go away.
1aeac41e 195 - djm@cvs.openbsd.org 2008/12/07 22:17:48
196 [regress/addrmatch.sh]
197 match string "passwordauthentication" only at start of line, not anywhere
198 in sshd -T output
cbc2c3e5 199 - dtucker@cvs.openbsd.org 2009/05/05 07:51:36
200 [regress/multiplex.sh]
201 Always specify ssh_config for multiplex tests: prevents breakage caused
202 by options in ~/.ssh/config. From Dan Peterson.
95744748 203 - djm@cvs.openbsd.org 2009/08/13 00:57:17
204 [regress/Makefile]
205 regression test for port number parsing. written as part of the a2port
206 change that went into 5.2 but I forgot to commit it at the time...
6c8ebe98 207 - djm@cvs.openbsd.org 2009/08/13 01:11:55
90fc667e 208 [regress/sftp-batch.sh regress/sftp-badcmds.sh regress/sftp.sh
209 regress/sftp-cmds.sh regres/sftp-glob.sh]
6c8ebe98 210 date: 2009/08/13 01:11:19; author: djm; state: Exp; lines: +10 -7
211 Swizzle options: "-P sftp_server_path" moves to "-D sftp_server_path",
212 add "-P port" to match scp(1). Fortunately, the -P option is only really
213 used by our regression scripts.
214 part of larger patch from carlosvsilvapt@gmail.com for his Google Summer
215 of Code work; ok deraadt markus
c16b5840 216 - djm@cvs.openbsd.org 2009/08/20 18:43:07
90fc667e 217 [regress/ssh-com-sftp.sh]
c16b5840 218 fix one sftp -D ... => sftp -P ... conversion that I missed; from Carlos
219 Silva for Google Summer of Code
90fc667e 220 - dtucker@cvs.openbsd.org 2009/10/06 23:51:49
221 [regress/ssh2putty.sh]
222 Add OpenBSD tag to make syncs easier
deed7126 223 - (dtucker) [regress/portnum.sh] Import new test.
c7e0fa79 224 - (dtucker) [configure.ac sftp-client.c] DTOTIF is in fs/ffs/dir.h on at
4b48f754 225 least dragonflybsd.
c7e0fa79 226 - (dtucker) d_type is not mandated by POSIX, so add fallback code using
227 stat(), needed on at least cygwin.
3496b8d4 228
2391a73c 22920091002
230 - (djm) [Makefile.in] Mention readconf.o in ssh-keysign's make deps.
231 spotted by des AT des.no
232
018fda87 23320090926
234 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
235 [contrib/suse/openssh.spec] Update for release
236 - (djm) [README] update relnotes URL
237 - (djm) [packet.c] Restore EWOULDBLOCK handling that got lost somewhere
238 - (djm) Release 5.3p1
239
a37250f4 24020090911
241 - (dtucker) [configure.ac] Change the -lresolv check so it works on Mac OS X
242 10.6 (which doesn't have BIND8_COMPAT and thus uses res_9_query). Patch
243 from jbasney at ncsa uiuc edu.
244
bc33f6d6 24520090908
246 - (djm) [serverloop.c] Fix test for server-assigned remote forwarding port
247 (-R 0:...); bz#1578, spotted and fix by gavin AT emf.net; ok dtucker@
248
3acad382 24920090901
250 - (dtucker) [configure.ac] Bug #1639: use AC_PATH_PROG to search the path for
251 krb5-config if it's not in the location specified by --with-kerberos5.
252 Patch from jchadima at redhat.
253
84c645ec 25420090829
255 - (dtucker) [README.platform] Add text about development packages, based on
256 text from Chris Pepper in bug #1631.
257
7a51ce05 25820090828
259 - dtucker [auth-sia.c] Roll back the change for bug #1241 as it apparently
260 causes problems in some Tru64 configurations.
d108641a 261 - (djm) [sshd_config.5] downgrade mention of login.conf to be an example
262 and mention PAM as another provider for ChallengeResponseAuthentication;
263 bz#1408; ok dtucker@
6ecb350f 264 - (djm) [sftp-server.c] bz#1535: accept ENOSYS as a fallback error when
265 attempting atomic rename(); ok dtucker@
36141cb8 266 - (djm) [Makefile.in] bz#1505: Solaris make(1) doesn't accept make variables
267 in argv, so pass them in the environment; ok dtucker@
5e934f78 268 - (dtucker) [channels.c configure.ac] Bug #1528: skip the tcgetattr call on
269 the pty master on Solaris, since it never succeeds and can hang if large
270 amounts of data is sent to the slave (eg a copy-paste). Based on a patch
271 originally from Doke Scott, ok djm@
e7ac4a90 272 - (dtucker) [clientloop.c configure.ac defines.h] Make the client's IO buffer
273 size a compile-time option and set it to 64k on Cygwin, since Corinna
274 reports that it makes a significant difference to performance. ok djm@
00789f24 275 - (dtucker) [configure.ac] Fix the syntax of the Solaris tcgetattr entry.
7a51ce05 276
bf87c429 27720090820
278 - (dtucker) [includes.h] Bug #1634: do not include system glob.h if we're not
279 using it since the type conflicts can cause problems on FreeBSD. Patch
280 from Jonathan Chen.
406dc01a 281 - (dtucker) [session.c openbsd-compat/port-aix.h] Bugs #1249 and #1567: move
282 the setpcred call on AIX to immediately before the permanently_set_uid().
283 Ensures that we still have privileges when we call chroot and
284 pam_open_sesson. Based on a patch from David Leonard.
bf87c429 285
8295689f 28620090817
287 - (dtucker) [configure.ac] Check for headers before libraries for openssl an
288 zlib, which should make the errors slightly more meaningful on platforms
289 where there's separate "-devel" packages for those.
e339fa25 290 - (dtucker) [sshlogin.c openbsd-compat/port-aix.{c,h}] Bug #1595: make
291 PrintLastLog work on AIX. Based in part on a patch from Miguel Sanders.
8295689f 292
852de6fd 29320090729
294 - (tim) [contrib/cygwin/ssh-user-config] Change script to call correct error
295 function. Patch from Corinna Vinschen.
296
14a260e8 29720090713
298 - (dtucker) [openbsd-compat/getrrsetbyname.c] Reduce answer buffer size so it
299 fits into 16 bits to work around a bug in glibc's resolver where it masks
300 off the buffer size at 16 bits. Patch from Hauke Lampe, ok djm jakob.
301
0a008a4d 30220090712
303 - (dtucker) [configure.ac] Include sys/param.h for the sys/mount.h test,
304 prevents configure complaining on older BSDs.
74973c95 305 - (dtucker [contrib/cygwin/ssh-{host,user}-config] Add license text. Patch
306 from Corinna Vinschen.
f12c178c 307 - (dtucker) [auth-pam.c] Bug #1534: move the deletion of PAM credentials on
1d5c49e0 308 logout to after the session close. Patch from Anicka Bernathova,
309 originally from Andreas Schwab via Novelll ok djm.
0a008a4d 310
78576c54 31120090707
312 - (dtucker) [contrib/cygwin/ssh-host-config] better support for automated
313 scripts and fix usage of eval. Patch from Corinna Vinschen.
314
31520090705
dc11a83a 316 - (dtucker) OpenBSD CVS Sync
317 - andreas@cvs.openbsd.org 2009/06/27 09:29:06
318 [packet.h packet.c]
319 packet_bacup_state() and packet_restore_state() will be used to
320 temporarily save the current state ren resuming a suspended connection.
321 ok markus@
322 - andreas@cvs.openbsd.org 2009/06/27 09:32:43
323 [roaming_common.c roaming.h]
324 It may be necessary to retransmit some data when resuming, so add it
325 to a buffer when roaming is enabled.
326 Most of this code was written by Martin Forssen, maf at appgate dot com.
327 ok markus@
328 - andreas@cvs.openbsd.org 2009/06/27 09:35:06
329 [readconf.h readconf.c]
330 Add client option UseRoaming. It doesn't do anything yet but will
331 control whether the client tries to use roaming if enabled on the
332 server. From Martin Forssen.
333 ok markus@
334 - markus@cvs.openbsd.org 2009/06/30 14:54:40
335 [version.h]
336 crank version; ok deraadt
337 - dtucker@cvs.openbsd.org 2009/07/02 02:11:47
338 [ssh.c]
339 allow for long home dir paths (bz #1615). ok deraadt
340 (based in part on a patch from jchadima at redhat)
341 - stevesk@cvs.openbsd.org 2009/07/05 19:28:33
342 [clientloop.c]
343 only send SSH2_MSG_DISCONNECT if we're in compat20; from dtucker@
344 ok deraadt@ markus@
345
127c96db 34620090622
347 - (dtucker) OpenBSD CVS Sync
348 - dtucker@cvs.openbsd.org 2009/06/22 05:39:28
349 [monitor_wrap.c monitor_mm.c ssh-keygen.c auth2.c gss-genr.c sftp-client.c]
350 alphabetize includes; reduces diff vs portable and style(9).
351 ok stevesk djm
352 (Id sync only; these were already in order in -portable)
353
f0956980 35420090621
355 - (dtucker) OpenBSD CVS Sync
356 - markus@cvs.openbsd.org 2009/03/17 21:37:00
357 [ssh.c]
358 pass correct argv[0] to openlog(); ok djm@
8fe25329 359 - jmc@cvs.openbsd.org 2009/03/19 15:15:09
360 [ssh.1]
361 for "Ciphers", just point the reader to the keyword in ssh_config(5), just
362 as we do for "MACs": this stops us getting out of sync when the lists
363 change;
364 fixes documentation/6102, submitted by Peter J. Philipp
365 alternative fix proposed by djm
366 ok markus
230d03b6 367 - tobias@cvs.openbsd.org 2009/03/23 08:31:19
368 [ssh-agent.c]
369 Fixed a possible out-of-bounds memory access if the environment variable
370 SHELL is shorter than 3 characters.
371 with input by and ok dtucker
7027325d 372 - tobias@cvs.openbsd.org 2009/03/23 19:38:04
373 [ssh-agent.c]
374 My previous commit didn't fix the problem at all, so stick at my first
375 version of the fix presented to dtucker.
376 Issue notified by Matthias Barkhoff (matthias dot barkhoff at gmx dot de).
377 ok dtucker
b31ae930 378 - sobrado@cvs.openbsd.org 2009/03/26 08:38:39
379 [sftp-server.8 sshd.8 ssh-agent.1]
380 fix a few typographical errors found by spell(1).
381 ok dtucker@, jmc@
640f440b 382 - stevesk@cvs.openbsd.org 2009/04/13 19:07:44
383 [sshd_config.5]
384 fix possessive; ok djm@
7bd399ce 385 - stevesk@cvs.openbsd.org 2009/04/14 16:33:42
386 [sftp-server.c]
387 remove unused option character from getopt() optstring; ok markus@
3e576dfe 388 - jj@cvs.openbsd.org 2009/04/14 21:10:54
389 [servconf.c]
390 Fixed a few the-the misspellings in comments. Skipped a bunch in
391 binutils,gcc and so on. ok jmc@
02d56d32 392 - stevesk@cvs.openbsd.org 2009/04/17 19:23:06
393 [session.c]
394 use INTERNAL_SFTP_NAME for setproctitle() of in-process sftp-server;
395 ok djm@ markus@
db1f5925 396 - stevesk@cvs.openbsd.org 2009/04/17 19:40:17
397 [sshd_config.5]
398 clarify that even internal-sftp needs /dev/log for logging to work; ok
399 markus@
47f4188a 400 - jmc@cvs.openbsd.org 2009/04/18 18:39:10
401 [sshd_config.5]
402 tweak previous; ok stevesk
5df1f0e3 403 - stevesk@cvs.openbsd.org 2009/04/21 15:13:17
404 [sshd_config.5]
405 clarify we cd to user's home after chroot; ok markus@ on
406 earlier version; tweaks and ok jmc@
dc1f1948 407 - andreas@cvs.openbsd.org 2009/05/25 06:48:01
408 [channels.c packet.c clientloop.c packet.h serverloop.c monitor_wrap.c
409 monitor.c]
410 Put the globals in packet.c into a struct and don't access it directly
411 from other files. No functional changes.
412 ok markus@ djm@
413 - andreas@cvs.openbsd.org 2009/05/27 06:31:25
414 [canohost.h canohost.c]
415 Add clear_cached_addr(), needed for upcoming changes allowing the peer
416 address to change.
417 ok markus@
f936c5d4 418 - andreas@cvs.openbsd.org 2009/05/27 06:33:39
419 [clientloop.c]
420 Send SSH2_MSG_DISCONNECT when the client disconnects. From a larger
421 change from Martin Forssen, maf at appgate dot com.
422 ok markus@
abdc5018 423 - andreas@cvs.openbsd.org 2009/05/27 06:34:36
424 [kex.c kex.h]
425 Move the KEX_COOKIE_LEN define to kex.h
426 ok markus@
87db7000 427 - andreas@cvs.openbsd.org 2009/05/27 06:36:07
428 [packet.h packet.c]
429 Add packet_put_int64() and packet_get_int64(), part of a larger change
430 from Martin Forssen.
c6063ed7 431 ok markus@
432 - andreas@cvs.openbsd.org 2009/05/27 06:38:16
433 [sshconnect.h sshconnect.c]
434 Un-static ssh_exchange_identification(), part of a larger change from
435 Martin Forssen and needed for upcoming changes.
436 ok markus@
5d4d25cd 437 - andreas@cvs.openbsd.org 2009/05/28 16:50:16
438 [sshd.c packet.c serverloop.c monitor_wrap.c clientloop.c sshconnect.c
d0137ef8 439 monitor.c Added roaming.h roaming_common.c roaming_dummy.c]
5d4d25cd 440 Keep track of number of bytes read and written. Needed for upcoming
441 changes. Most code from Martin Forssen, maf at appgate dot com.
442 ok markus@
d0137ef8 443 Also, applied appropriate changes to Makefile.in
adb5cc1b 444 - andreas@cvs.openbsd.org 2009/06/12 20:43:22
445 [monitor.c packet.c]
446 Fix warnings found by chl@ and djm@ and change roaming_atomicio's
447 return type to match atomicio's
448 Diff from djm@, ok markus@
6a49252d 449 - andreas@cvs.openbsd.org 2009/06/12 20:58:32
450 [packet.c]
451 Move some more statics into session_state
452 ok markus@ djm@
ac692f84 453 - dtucker@cvs.openbsd.org 2009/06/21 07:37:15
454 [kexdhs.c kexgexs.c]
455 abort if key_sign fails, preventing possible null deref. Based on report
456 from Paolo Ganci, ok markus@ djm@
457 - dtucker@cvs.openbsd.org 2009/06/21 09:04:03
458 [roaming.h roaming_common.c roaming_dummy.c]
459 Add tags for the benefit of the sync scripts
460 Also: pull in the changes for 1.1->1.2 missed in the previous sync.
9b9302ea 461 - (dtucker) [auth2-jpake.c auth2.c canohost.h session.c] Whitespace and
462 header-order changes to reduce diff vs OpenBSD.
c8dc0909 463 - (dtucker) [servconf.c sshd.c] More whitespace sync.
e85016d4 464 - (dtucker) [roaming_common.c roaming_dummy.c] Wrap #include <inttypes.h> in
465 ifdef.
f0956980 466
87562a58 46720090616
468 - (dtucker) [configure.ac defines.h] Bug #1607: handle the case where fsid_t
469 is a struct with a __val member. Fixes build on, eg, Redhat 6.2.
470
6ee76eea 47120090504
472 - (dtucker) [sshlogin.c] Move the NO_SSH_LASTLOG #ifndef line to include
473 variable declarations. Should prevent unused warnings anywhere it's set
474 (only Crays as far as I can tell) and be a no-op everywhere else.
475
bc9a470b 47620090318
477 - (tim) [configure.ac] Remove setting IP_TOS_IS_BROKEN for Cygwin. The problem
478 that setsockopt(IP_TOS) doesn't work on Cygwin has been fixed since 2005.
479 Based on patch from vinschen at redhat com.
480
5077a5f6 48120090308
482 - (dtucker) [auth-passwd.c auth1.c auth2-kbdint.c auth2-none.c auth2-passwd.c
483 auth2-pubkey.c session.c openbsd-compat/bsd-cygwin_util.{c,h}
484 openbsd-compat/daemon.c] Remove support for Windows 95/98/ME and very old
485 version of Cygwin. Patch from vinschen at redhat com.
486
3e566c29 48720090307
488 - (dtucker) [contrib/aix/buildbff.sh] Only try to rename ssh_prng_cmds if it
489 exists (it's not created if OpenSSL's PRNG is self-seeded, eg if the OS
490 has a /dev/random).
36b68fd5 491 - (dtucker) [schnorr.c openbsd-compat/openssl-compat.{c,h}] Add
492 EVP_DigestUpdate to the OLD_EVP compatibility functions and tell schnorr.c
493 to use them. Allows building with older OpenSSL versions.
aeed50df 494 - (dtucker) [configure.ac defines.h] Check for in_port_t and typedef if needed.
86783a32 495 - (dtucker) [configure.ac] Missing comma in type list.
14e380c6 496 - (dtucker) [configure.ac openbsd-compat/openssl-compat.{c,h}]
497 EVP_DigestUpdate does not exactly match the other OLD_EVP functions (eg
498 in openssl 0.9.6) so add an explicit test for it.
3e566c29 499
5b01421b 50020090306
501 - (djm) OpenBSD CVS Sync
502 - djm@cvs.openbsd.org 2009/03/05 07:18:19
503 [auth2-jpake.c jpake.c jpake.h monitor_wrap.c monitor_wrap.h schnorr.c]
504 [sshconnect2.c]
505 refactor the (disabled) Schnorr proof code to make it a little more
506 generally useful
4f983ff5 507 - djm@cvs.openbsd.org 2009/03/05 11:30:50
508 [uuencode.c]
509 document what these functions do so I don't ever have to recuse into
510 b64_pton/ntop to remember their return values
5b01421b 511
ebf012a2 51220090223
513 - (djm) OpenBSD CVS Sync
514 - djm@cvs.openbsd.org 2009/02/22 23:50:57
515 [ssh_config.5 sshd_config.5]
516 don't advertise experimental options
09b37352 517 - djm@cvs.openbsd.org 2009/02/22 23:59:25
518 [sshd_config.5]
519 missing period
52d8f3f6 520 - djm@cvs.openbsd.org 2009/02/23 00:06:15
521 [version.h]
522 openssh-5.2
dc336a3b 523 - (djm) [README] update for 5.2
0e8d25c9 524 - (djm) Release openssh-5.2p1
ebf012a2 525
7eec82ab 52620090222
527 - (djm) OpenBSD CVS Sync
528 - tobias@cvs.openbsd.org 2009/02/21 19:32:04
529 [misc.c sftp-server-main.c ssh-keygen.c]
530 Added missing newlines in error messages.
531 ok dtucker
532
1925d16d 53320090221
534 - (djm) OpenBSD CVS Sync
535 - djm@cvs.openbsd.org 2009/02/17 01:28:32
536 [ssh_config]
537 sync with revised default ciphers; pointed out by dkrause@
dca75d4b 538 - djm@cvs.openbsd.org 2009/02/18 04:31:21
539 [schnorr.c]
540 signature should hash over the entire group, not just the generator
541 (this is still disabled code)
9a4a047b 542 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
543 [contrib/suse/openssh.spec] Prepare for 5.2p1
1925d16d 544
aa10bde9 54520090216
546 - (djm) [regress/conch-ciphers.sh regress/putty-ciphers.sh]
547 [regress/putty-kex.sh regress/putty-transfer.sh] Downgrade disabled
548 interop tests from FATAL error to a warning. Allows some interop
549 tests to proceed if others are missing necessary prerequisites.
4c3b7423 550 - (djm) [configure.ac] support GNU/kFreeBSD and GNU/kOpensolaris
551 systems; patch from Aurelien Jarno via rmh AT aybabtu.com
aa10bde9 552
69354fe2 55320090214
554 - (djm) OpenBSD CVS Sync
555 - dtucker@cvs.openbsd.org 2009/02/02 11:15:14
556 [sftp.c]
557 Initialize a few variables to prevent spurious "may be used
558 uninitialized" warnings from newer gcc's. ok djm@
17525a70 559 - djm@cvs.openbsd.org 2009/02/12 03:00:56
560 [canohost.c canohost.h channels.c channels.h clientloop.c readconf.c]
561 [readconf.h serverloop.c ssh.c]
562 support remote port forwarding with a zero listen port (-R0:...) to
563 dyamically allocate a listen port at runtime (this is actually
564 specified in rfc4254); bz#1003 ok markus@
1d68c50a 565 - djm@cvs.openbsd.org 2009/02/12 03:16:01
566 [serverloop.c]
567 tighten check for -R0:... forwarding: only allow dynamic allocation
568 if want_reply is set in the packet
28b5d376 569 - djm@cvs.openbsd.org 2009/02/12 03:26:22
570 [monitor.c]
571 some paranoia: check that the serialised key is really KEY_RSA before
572 diddling its internals
db9039d0 573 - djm@cvs.openbsd.org 2009/02/12 03:42:09
574 [ssh.1]
575 document -R0:... usage
1e709459 576 - djm@cvs.openbsd.org 2009/02/12 03:44:25
577 [ssh.1]
578 consistency: Dq => Ql
c6b2c0e0 579 - djm@cvs.openbsd.org 2009/02/12 03:46:17
580 [ssh_config.5]
581 document RemoteForward usage with 0 listen port
e12d3e21 582 - jmc@cvs.openbsd.org 2009/02/12 07:34:20
583 [ssh_config.5]
584 kill trailing whitespace;
8b773163 585 - markus@cvs.openbsd.org 2009/02/13 11:50:21
586 [packet.c]
587 check for enc !=NULL in packet_start_discard
e75a14a1 588 - djm@cvs.openbsd.org 2009/02/14 06:35:49
589 [PROTOCOL]
590 mention that eow and no-more-sessions extensions are sent only to
591 OpenSSH peers
69354fe2 592
59320090212
f7b8146b 594 - (djm) [sshpty.c] bz#1419: OSX uses cloning ptys that automagically
595 set ownership and modes, so avoid explicitly setting them
295dd642 596 - (djm) [configure.ac loginrec.c] bz#1421: fix lastlog support for OSX.
597 OSX provides a getlastlogxbyname function that automates the reading of
598 a lastlog file. Also, the pututxline function will update lastlog so
599 there is no need for loginrec.c to do it explicitly. Collapse some
600 overly verbose code while I'm in there.
f7b8146b 601
b4341d7a 60220090201
603 - (dtucker) [defines.h sshconnect.c] INET6_ADDRSTRLEN is now needed in
604 channels.c too, so move the definition for non-IP6 platforms to defines.h
605 where it can be shared.
606
e1986e0a 60720090129
608 - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
609 If the CYGWIN environment variable is empty, the installer script
610 should not install the service with an empty CYGWIN variable, but
611 rather without setting CYGWNI entirely.
863ba23a 612 - (tim) [contrib/cygwin/ssh-host-config] Whitespace cleanup. No code changes.
e1986e0a 613
7f24626b 61420090128
615 - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
616 Changes to work on Cygwin 1.5.x as well as on the new Cygwin 1.7.x.
617 The information given for the setting of the CYGWIN environment variable
618 is wrong for both releases so I just removed it, together with the
619 unnecessary (Cygwin 1.5.x) or wrong (Cygwin 1.7.x) default setting.
620
68405671 62120081228
622 - (djm) OpenBSD CVS Sync
623 - stevesk@cvs.openbsd.org 2008/12/09 03:20:42
624 [channels.c servconf.c]
625 channel_print_adm_permitted_opens() should deal with all the printing
626 for that config option. suggested by markus@; ok markus@ djm@
627 dtucker@
7efff8ce 628 - djm@cvs.openbsd.org 2008/12/09 04:32:22
629 [auth2-chall.c]
630 replace by-hand string building with xasprinf(); ok deraadt@
d3cd4016 631 - sobrado@cvs.openbsd.org 2008/12/09 15:35:00
632 [sftp.1 sftp.c]
633 update for the synopses displayed by the 'help' command, there are a
634 few missing flags; add 'bye' to the output of 'help'; sorting and spacing.
635 jmc@ suggested replacing .Oo/.Oc with a single .Op macro.
636 ok jmc@
6c20a13f 637 - stevesk@cvs.openbsd.org 2008/12/09 22:37:33
638 [clientloop.c]
639 fix typo in error message
fd2ce9c6 640 - stevesk@cvs.openbsd.org 2008/12/10 03:55:20
641 [addrmatch.c]
642 o cannot be NULL here but use xfree() to be consistent; ok djm@
8647612c 643 - stevesk@cvs.openbsd.org 2008/12/29 01:12:36
644 [ssh-keyscan.1]
645 fix example, default key type is rsa for 3+ years; from
646 frederic.perrin@resel.fr
040d6b1f 647 - stevesk@cvs.openbsd.org 2008/12/29 02:23:26
648 [pathnames.h]
649 no need to escape single quotes in comments
d4bfdc62 650 - okan@cvs.openbsd.org 2008/12/30 00:46:56
651 [sshd_config.5]
652 add AllowAgentForwarding to available Match keywords list
653 ok djm
6cf44b6a 654 - djm@cvs.openbsd.org 2009/01/01 21:14:35
655 [channels.c]
656 call channel destroy callbacks on receipt of open failure messages.
657 fixes client hangs when connecting to a server that has MaxSessions=0
658 set spotted by imorgan AT nas.nasa.gov; ok markus@
546202d0 659 - djm@cvs.openbsd.org 2009/01/01 21:17:36
660 [kexgexs.c]
661 fix hash calculation for KEXGEX: hash over the original client-supplied
662 values and not the sanity checked versions that we acutally use;
663 bz#1540 reported by john.smith AT arrows.demon.co.uk
664 ok markus@
4866a6d6 665 - djm@cvs.openbsd.org 2009/01/14 01:38:06
666 [channels.c]
667 support SOCKS4A protocol, from dwmw2 AT infradead.org via bz#1482;
668 "looks ok" markus@
9b4b86c2 669 - stevesk@cvs.openbsd.org 2009/01/15 17:38:43
670 [readconf.c]
671 1) use obsolete instead of alias for consistency
672 2) oUserKnownHostsFile not obsolete but oGlobalKnownHostsFile2 is
673 so move the comment.
674 3) reorder so like options are together
675 ok djm@
1338ba77 676 - djm@cvs.openbsd.org 2009/01/22 09:46:01
677 [channels.c channels.h session.c]
678 make Channel->path an allocated string, saving a few bytes here and
679 there and fixing bz#1380 in the process; ok markus@
920706fd 680 - djm@cvs.openbsd.org 2009/01/22 09:49:57
681 [channels.c]
682 oops! I committed the wrong version of the Channel->path diff,
683 it was missing some tweaks suggested by stevesk@
5134115d 684 - djm@cvs.openbsd.org 2009/01/22 10:02:34
685 [clientloop.c misc.c readconf.c readconf.h servconf.c servconf.h]
686 [serverloop.c ssh-keyscan.c ssh.c sshd.c]
687 make a2port() return -1 when it encounters an invalid port number
688 rather than 0, which it will now treat as valid (needed for future work)
689 adjust current consumers of a2port() to check its return value is <= 0,
690 which in turn required some things to be converted from u_short => int
691 make use of int vs. u_short consistent in some other places too
692 feedback & ok markus@
368e246f 693 - djm@cvs.openbsd.org 2009/01/22 10:09:16
694 [auth-options.c]
695 another chunk of a2port() diff that got away. wtfdjm??
700fd7e7 696 - djm@cvs.openbsd.org 2009/01/23 07:58:11
697 [myproposal.h]
698 prefer CTR modes and revised arcfour (i.e w/ discard) modes to CBC
699 modes; ok markus@
29ec8eb3 700 - naddy@cvs.openbsd.org 2009/01/24 17:10:22
701 [ssh_config.5 sshd_config.5]
702 sync list of preferred ciphers; ok djm@
608bcf58 703 - markus@cvs.openbsd.org 2009/01/26 09:58:15
704 [cipher.c cipher.h packet.c]
705 Work around the CPNI-957037 Plaintext Recovery Attack by always
706 reading 256K of data on packet size or HMAC errors (in CBC mode only).
707 Help, feedback and ok djm@
708 Feedback from Martin Albrecht and Paterson Kenny
68405671 709
a25d08b3 71020090107
711 - (djm) [uidswap.c] bz#1412: Support >16 supplemental groups in OS X.
712 Patch based on one from vgiffin AT apple.com; ok dtucker@
b5a1596f 713 - (djm) [channels.c] bz#1419: support "on demand" X11 forwarding via
714 launchd on OS X; patch from vgiffin AT apple.com, slightly tweaked;
715 ok dtucker@
23b3ed0b 716 - (djm) [contrib/ssh-copy-id.1 contrib/ssh-copy-id] bz#1492: Make
717 ssh-copy-id copy id_rsa.pub by default (instead of the legacy "identity"
718 key). Patch from cjwatson AT debian.org
a25d08b3 719
16076ac9 72020090107
721 - (tim) [configure.ac defines.h openbsd-compat/port-uw.c
722 openbsd-compat/xcrypt.c] Add SECUREWARE support to OpenServer 6 SVR5 ABI.
723 OK djm@ dtucker@
44a71983 724 - (tim) [configure.ac] Move check_for_libcrypt_later=1 in *-*-sysv5*) section.
725 OpenServer 6 doesn't need libcrypt.
16076ac9 726
09925c00 72720081209
728 - (djm) OpenBSD CVS Sync
729 - djm@cvs.openbsd.org 2008/12/09 02:38:18
730 [clientloop.c]
731 The ~C escape handler does not work correctly for multiplexed sessions -
732 it opens a commandline on the master session, instead of on the slave
733 that requested it. Disable it on slave sessions until such time as it
734 is fixed; bz#1543 report from Adrian Bridgett via Colin Watson
735 ok markus@
ddb5e00f 736 - djm@cvs.openbsd.org 2008/12/09 02:39:59
737 [sftp.c]
738 Deal correctly with failures in remote stat() operation in sftp,
739 correcting fail-on-error behaviour in batchmode. bz#1541 report and
740 fix from anedvedicky AT gmail.com; ok markus@
bab3d903 741 - djm@cvs.openbsd.org 2008/12/09 02:58:16
742 [readconf.c]
743 don't leave junk (free'd) pointers around in Forward *fwd argument on
744 failure; avoids double-free in ~C -L handler when given an invalid
745 forwarding specification; bz#1539 report from adejong AT debian.org
746 via Colin Watson; ok markus@ dtucker@
83cd8c39 747 - djm@cvs.openbsd.org 2008/12/09 03:02:37
748 [sftp.1 sftp.c]
749 correct sftp(1) and corresponding usage syntax;
750 bz#1518 patch from imorgan AT nas.nasa.gov; ok deraadt@ improved diff jmc@
09925c00 751
53e2660a 75220081208
753 - (djm) [configure.ac] bz#1538: better test for ProPolice/SSP: actually
754 use some stack in main().
755 Report and suggested fix from vapier AT gentoo.org
66e16767 756 - (djm) OpenBSD CVS Sync
757 - markus@cvs.openbsd.org 2008/12/02 19:01:07
758 [clientloop.c]
759 we have to use the recipient's channel number (RFC 4254) for
760 SSH2_MSG_CHANNEL_SUCCESS/SSH2_MSG_CHANNEL_FAILURE messages,
761 otherwise we trigger 'Non-public channel' error messages on sshd
762 systems with clientkeepalive enabled; noticed by sturm; ok djm;
7ec2b275 763 - markus@cvs.openbsd.org 2008/12/02 19:08:59
764 [serverloop.c]
765 backout 1.149, since it's not necessary and openssh clients send
766 broken CHANNEL_FAILURE/SUCCESS messages since about 2004; ok djm@
b09b559d 767 - markus@cvs.openbsd.org 2008/12/02 19:09:38
768 [channels.c]
769 s/remote_id/id/ to be more consistent with other code; ok djm@
53e2660a 770
de470c82 77120081201
772 - (dtucker) [contrib/cygwin/{Makefile,ssh-host-config}] Add new doc files
773 and tweak the is-sshd-running check in ssh-host-config. Patch from
774 vinschen at redhat com.
66af1c21 775 - (dtucker) OpenBSD CVS Sync
776 - markus@cvs.openbsd.org 2008/11/21 15:47:38
777 [packet.c]
778 packet_disconnect() on padding error, too. should reduce the success
779 probability for the CPNI-957037 Plaintext Recovery Attack to 2^-18
780 ok djm@
8e10da10 781 - dtucker@cvs.openbsd.org 2008/11/30 11:59:26
782 [monitor_fdpass.c]
783 Retry sendmsg/recvmsg on EAGAIN and EINTR; ok djm@
de470c82 784
d2aa725a 78520081123
786 - (dtucker) [monitor_fdpass.c] Reduce diff vs OpenBSD by moving some
787 declarations, removing an unnecessary union member and adding whitespace.
c037a517 788 cmsgbuf.tmp thing spotted by des at des no, ok djm some time ago.
d2aa725a 789
95e16084 79020081118
791 - (tim) [addrmatch.c configure.ac] Some platforms do not have sin6_scope_id
792 member of sockaddr_in6. Also reported in Bug 1491 by David Leonard. OK and
793 feedback by djm@
794
0bd3332c 79520081111
796 - (dtucker) OpenBSD CVS Sync
797 - jmc@cvs.openbsd.org 2008/11/05 11:22:54
798 [servconf.c]
799 passord -> password;
800 fixes user/5975 from Rene Maroufi
1890bf8b 801 - stevesk@cvs.openbsd.org 2008/11/07 00:42:12
802 [ssh-keygen.c]
803 spelling/typo in comment
92d0164c 804 - stevesk@cvs.openbsd.org 2008/11/07 18:50:18
805 [nchan.c]
806 add space to some log/debug messages for readability; ok djm@ markus@
3d7f6c3d 807 - dtucker@cvs.openbsd.org 2008/11/07 23:34:48
808 [auth2-jpake.c]
809 Move JPAKE define to make life easier for portable. ok djm@
94087553 810 - tobias@cvs.openbsd.org 2008/11/09 12:34:47
811 [session.c ssh.1]
812 typo fixed (overriden -> overridden)
813 ok espie, jmc
2505b891 814 - stevesk@cvs.openbsd.org 2008/11/11 02:58:09
815 [servconf.c]
816 USE_AFS not referenced so remove #ifdef. fixes sshd -T not printing
817 kerberosgetafstoken. ok dtucker@
818 (Id sync only, we still want the ifdef in portable)
861e9e53 819 - stevesk@cvs.openbsd.org 2008/11/11 03:55:11
820 [channels.c]
821 for sshd -T print 'permitopen any' vs. 'permitopen' for case of no
822 permitopen's; ok and input dtucker@
0771f5dd 823 - djm@cvs.openbsd.org 2008/11/10 02:06:35
824 [regress/putty-ciphers.sh]
825 PuTTY supports AES CTR modes, so interop test against them too
0bd3332c 826
39aa8698 82720081105
828 - OpenBSD CVS Sync
829 - djm@cvs.openbsd.org 2008/11/03 08:59:41
830 [servconf.c]
831 include MaxSessions in sshd -T output; patch from imorgan AT nas.nasa.gov
a28625a6 832 - djm@cvs.openbsd.org 2008/11/04 07:58:09
833 [auth.c]
834 need unistd.h for close() prototype
835 (ID sync only)
5adf6b9a 836 - djm@cvs.openbsd.org 2008/11/04 08:22:13
837 [auth.h auth2.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h]
838 [readconf.c readconf.h servconf.c servconf.h ssh2.h ssh_config.5]
839 [sshconnect2.c sshd_config.5 jpake.c jpake.h schnorr.c auth2-jpake.c]
840 [Makefile.in]
841 Add support for an experimental zero-knowledge password authentication
842 method using the J-PAKE protocol described in F. Hao, P. Ryan,
843 "Password Authenticated Key Exchange by Juggling", 16th Workshop on
844 Security Protocols, Cambridge, April 2008.
845
846 This method allows password-based authentication without exposing
847 the password to the server. Instead, the client and server exchange
848 cryptographic proofs to demonstrate of knowledge of the password while
849 revealing nothing useful to an attacker or compromised endpoint.
850
851 This is experimental, work-in-progress code and is presently
852 compiled-time disabled (turn on -DJPAKE in Makefile.inc).
853
854 "just commit it. It isn't too intrusive." deraadt@
d35f707e 855 - stevesk@cvs.openbsd.org 2008/11/04 19:18:00
856 [readconf.c]
857 because parse_forward() is now used to parse all forward types (DLR),
858 and it malloc's space for host variables, we don't need to malloc
859 here. fixes small memory leaks.
860
861 previously dynamic forwards were not parsed in parse_forward() and
862 space was not malloc'd in that case.
863
864 ok djm@
10cf2ac3 865 - stevesk@cvs.openbsd.org 2008/11/05 03:23:09
866 [clientloop.c ssh.1]
867 add dynamic forward escape command line; ok djm@
39aa8698 868
94f36816 86920081103
870 - OpenBSD CVS Sync
871 - sthen@cvs.openbsd.org 2008/07/24 23:55:30
872 [ssh-keygen.1]
873 Add "ssh-keygen -F -l" to synopsis (displays fingerprint from
874 known_hosts). ok djm@
875 - grunk@cvs.openbsd.org 2008/07/25 06:56:35
876 [ssh_config]
877 Add VisualHostKey to example file, ok djm@
5ca42ddb 878 - grunk@cvs.openbsd.org 2008/07/25 07:05:16
879 [key.c]
880 In random art visualization, make sure to use the end marker only at the
881 end. Initial diff by Dirk Loss, tweaks and ok djm@
341cb46b 882 - markus@cvs.openbsd.org 2008/07/31 14:48:28
883 [sshconnect2.c]
884 don't allocate space for empty banners; report t8m at centrum.cz;
885 ok deraadt
686bdcbd 886 - krw@cvs.openbsd.org 2008/08/02 04:29:51
887 [ssh_config.5]
888 whitepsace -> whitespace. From Matthew Clarke via bugs@.
e3ef5245 889 - djm@cvs.openbsd.org 2008/08/21 04:09:57
890 [session.c]
891 allow ForceCommand internal-sftp with arguments. based on patch from
892 michael.barabanov AT gmail.com; ok markus@
1975fb98 893 - djm@cvs.openbsd.org 2008/09/06 12:24:13
894 [kex.c]
895 OpenSSL 0.9.8h supplies a real EVP_sha256 so we do not need our
896 replacement anymore
897 (ID sync only for portable - we still need this)
72bd2fca 898 - markus@cvs.openbsd.org 2008/09/11 14:22:37
899 [compat.c compat.h nchan.c ssh.c]
900 only send eow and no-more-sessions requests to openssh 5 and newer;
901 fixes interop problems with broken ssh v2 implementations; ok djm@
2e96832c 902 - millert@cvs.openbsd.org 2008/10/02 14:39:35
903 [session.c]
904 Convert an unchecked strdup to xstrdup. OK deraadt@
dc94d57e 905 - jmc@cvs.openbsd.org 2008/10/03 13:08:12
906 [sshd.8]
907 do not give an example of how to chmod files: we can presume the user
908 knows that. removes an ambiguity in the permission of authorized_keys;
909 ok deraadt
90d5350e 910 - deraadt@cvs.openbsd.org 2008/10/03 23:56:28
911 [sshconnect2.c]
912 Repair strnvis() buffersize of 4*n+1, with termination gauranteed by the
913 function.
914 spotted by des@freebsd, who commited an incorrect fix to the freebsd tree
915 and (as is fairly typical) did not report the problem to us. But this fix
916 is correct.
917 ok djm
bf793210 918 - djm@cvs.openbsd.org 2008/10/08 23:34:03
919 [ssh.1 ssh.c]
920 Add -y option to force logging via syslog rather than stderr.
921 Useful for daemonised ssh connection (ssh -f). Patch originally from
922 and ok'd by markus@
e68868a1 923 - djm@cvs.openbsd.org 2008/10/09 03:50:54
924 [servconf.c sshd_config.5]
925 support setting PermitEmptyPasswords in a Match block
926 requested in PR3891; ok dtucker@
f3a4d0d0 927 - jmc@cvs.openbsd.org 2008/10/09 06:54:22
928 [ssh.c]
929 add -y to usage();
6503dc91 930 - stevesk@cvs.openbsd.org 2008/10/10 04:55:16
931 [scp.c]
932 spelling in comment; ok djm@
260bf88a 933 - stevesk@cvs.openbsd.org 2008/10/10 05:00:12
934 [key.c]
935 typo in error message; ok djm@
96a00a9d 936 - stevesk@cvs.openbsd.org 2008/10/10 16:43:27
937 [ssh_config.5]
938 use 'Privileged ports can be forwarded only when logging in as root on
939 the remote machine.' for RemoteForward just like ssh.1 -R.
940 ok djm@ jmc@
941 - stevesk@cvs.openbsd.org 2008/10/14 18:11:33
942 [sshconnect.c]
943 use #define ROQUIET here; no binary change. ok dtucker@
8d20b087 944 - stevesk@cvs.openbsd.org 2008/10/17 18:36:24
945 [ssh_config.5]
946 correct and clarify VisualHostKey; ok jmc@
25f93f2c 947 - stevesk@cvs.openbsd.org 2008/10/30 19:31:16
948 [clientloop.c sshd.c]
949 don't need to #include "monitor_fdpass.h"
b8974c94 950 - stevesk@cvs.openbsd.org 2008/10/31 15:05:34
951 [dispatch.c]
952 remove unused #define DISPATCH_MIN; ok markus@
e64399cc 953 - djm@cvs.openbsd.org 2008/11/01 04:50:08
954 [sshconnect2.c]
955 sprinkle ARGSUSED on dispatch handlers
956 nuke stale unusued prototype
2ea438c2 957 - stevesk@cvs.openbsd.org 2008/11/01 06:43:33
958 [channels.c]
959 fix some typos in log messages; ok djm@
9995aaa3 960 - sobrado@cvs.openbsd.org 2008/11/01 11:14:36
961 [ssh-keyscan.1 ssh-keyscan.c]
962 the ellipsis is not an optional argument; while here, improve spacing.
30573fea 963 - stevesk@cvs.openbsd.org 2008/11/01 17:40:33
964 [clientloop.c readconf.c readconf.h ssh.c]
965 merge dynamic forward parsing into parse_forward();
966 'i think this is OK' djm@
9bbba34b 967 - stevesk@cvs.openbsd.org 2008/11/02 00:16:16
968 [ttymodes.c]
969 protocol 2 tty modes support is now 7.5 years old so remove these
970 debug3()s; ok deraadt@
b626b7ae 971 - stevesk@cvs.openbsd.org 2008/11/03 01:07:02
972 [readconf.c]
973 remove valueless comment
c8eaf0ec 974 - stevesk@cvs.openbsd.org 2008/11/03 02:44:41
975 [readconf.c]
976 fix comment
fce91335 977 - (djm) [contrib/caldera/ssh-host-keygen contrib/suse/rc.sshd]
978 Make example scripts generate keys with default sizes rather than fixed,
979 non-default 1024 bits; patch from imorgan AT nas.nasa.gov
933e2f91 980 - (djm) [contrib/sshd.pam.generic contrib/caldera/sshd.pam]
981 [contrib/redhat/sshd.pam] Move pam_nologin to account group from
982 incorrect auth group in example files;
983 patch from imorgan AT nas.nasa.gov
94f36816 984
d6339843 98520080906
986 - (dtucker) [config.guess config.sub] Update to latest versions from
987 http://git.savannah.gnu.org/gitweb/ (2008-04-14 and 2008-06-16
988 respectively).
989
974ce4a0 99020080830
991 - (dtucker) [openbsd-compat/bsd-poll.c] correctly check for number of FDs
992 larger than FD_SETSIZE (OpenSSH only ever uses poll with one fd). Patch
993 from Nicholas Marriott.
994
e888d981 99520080721
996 - (djm) OpenBSD CVS Sync
997 - djm@cvs.openbsd.org 2008/07/23 07:36:55
998 [servconf.c]
999 do not try to print options that have been compile-time disabled
1000 in config test mode (sshd -T); report from nix-corp AT esperi.org.uk
1001 ok dtucker@
cee47c9f 1002 - (djm) [servconf.c] Print UsePAM option in config test mode (when it
1003 has been compiled in); report from nix-corp AT esperi.org.uk
1004 ok dtucker@
e888d981 1005
b14e719f 100620080721
1007 - (djm) OpenBSD CVS Sync
1008 - jmc@cvs.openbsd.org 2008/07/18 22:51:01
1009 [sftp-server.8]
1010 no need for .Pp before or after .Sh;
f3b93df3 1011 - djm@cvs.openbsd.org 2008/07/21 08:19:07
1012 [version.h]
1013 openssh-5.1
11368183 1014 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
1015 [contrib/suse/openssh.spec] Update version number in README and RPM specs
55d5db1c 1016 - (djm) Release OpenSSH-5.1
b14e719f 1017
e5df5ff2 101820080717
1019 - (djm) OpenBSD CVS Sync
1020 - djm@cvs.openbsd.org 2008/07/17 08:48:00
1021 [sshconnect2.c]
1022 strnvis preauth banner; pointed out by mpf@ ok markus@
2800468d 1023 - djm@cvs.openbsd.org 2008/07/17 08:51:07
1024 [auth2-hostbased.c]
1025 strip trailing '.' from hostname when HostbasedUsesNameFromPacketOnly=yes
1026 report and patch from res AT qoxp.net (bz#1200); ok markus@
d9d96f7a 1027 - (dtucker) [openbsd-compat/bsd-cygwin_util.c] Remove long-unneeded compat
1028 code, replace with equivalent cygwin library call. Patch from vinschen
3a69fb58 1029 at redhat.com, ok djm@.
1030 - (djm) [sshconnect2.c] vis.h isn't available everywhere
e5df5ff2 1031
b8c9ea19 103220080716
1033 - OpenBSD CVS Sync
1034 - djm@cvs.openbsd.org 2008/07/15 02:23:14
1035 [sftp.1]
1036 number of pipelined requests is now 64;
1037 prodded by Iain.Morgan AT nasa.gov
dfe666f6 1038 - djm@cvs.openbsd.org 2008/07/16 11:51:14
1039 [clientloop.c]
1040 rename variable first_gc -> last_gc (since it is actually the last
1041 in the list).
cdfbc829 1042 - djm@cvs.openbsd.org 2008/07/16 11:52:19
1043 [channels.c]
1044 this loop index should be automatic, not static
b8c9ea19 1045
322b3f02 104620080714
1047 - (djm) OpenBSD CVS Sync
1048 - sthen@cvs.openbsd.org 2008/07/13 21:22:52
1049 [ssh-keygen.c]
1050 Change "ssh-keygen -F [host] -l" to not display random art unless
1051 -v is also specified, making it consistent with the manual and other
1052 uses of -l.
1053 ok grunk@
9fb764ab 1054 - djm@cvs.openbsd.org 2008/07/13 22:13:07
1055 [channels.c]
1056 use struct sockaddr_storage instead of struct sockaddr for accept(2)
1057 address argument. from visibilis AT yahoo.com in bz#1485; ok markus@
873722cc 1058 - djm@cvs.openbsd.org 2008/07/13 22:16:03
1059 [sftp.c]
1060 increase number of piplelined requests so they properly fill the
1061 (recently increased) channel window. prompted by rapier AT psc.edu;
1062 ok markus@
66fba053 1063 - djm@cvs.openbsd.org 2008/07/14 01:55:56
1064 [sftp-server.8]
1065 mention requirement for /dev/log inside chroot when using sftp-server
1066 with ChrootDirectory
6c6bb9a6 1067 - (djm) [openbsd-compat/bindresvport.c] Rename variables s/sin/in/ to
1068 avoid clash with sin(3) function; reported by
1069 cristian.ionescu-idbohrn AT axis.com
7be182d4 1070 - (djm) [openbsd-compat/rresvport.c] Add unistd.h for missing close()
1071 prototype; reported by cristian.ionescu-idbohrn AT axis.com
6a9c22a5 1072 - (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash;
1073 reported by cristian.ionescu-idbohrn AT axis.com
7ea1abf7 1074 - (djm) [contrib/cygwin/Makefile contrib/cygwin/ssh-host-config]
1075 [contrib/cygwin/ssh-user-config contrib/cygwin/sshd-inetd]
1076 Revamped and simplified Cygwin ssh-host-config script that uses
1077 unified csih configuration tool. Requires recent Cygwin.
1078 Patch from vinschen AT redhat.com
322b3f02 1079
267d5589 108020080712
1081 - (djm) OpenBSD CVS Sync
1082 - djm@cvs.openbsd.org 2008/07/12 04:52:50
1083 [channels.c]
1084 unbreak; move clearing of cctx struct to before first use
1085 reported by dkrause@
da9a823d 1086 - djm@cvs.openbsd.org 2008/07/12 05:33:41
1087 [scp.1]
1088 better description for -i flag:
1089 s/RSA authentication/public key authentication/
2ade01eb 1090 - (djm) [openbsd-compat/fake-rfc2553.c openbsd-compat/fake-rfc2553.h]
1091 return EAI_FAMILY when trying to lookup unsupported address family;
1092 from vinschen AT redhat.com
267d5589 1093
971deff8 109420080711
1095 - (djm) OpenBSD CVS Sync
1096 - stevesk@cvs.openbsd.org 2008/07/07 00:31:41
1097 [ttymodes.c]
1098 we don't need arg after the debug3() was removed. from lint.
1099 ok djm@
d5b5b8f6 1100 - stevesk@cvs.openbsd.org 2008/07/07 23:32:51
1101 [key.c]
1102 /*NOTREACHED*/ for lint warning:
1103 warning: function key_equal falls off bottom without returning value
1104 ok djm@
6eb3f18c 1105 - markus@cvs.openbsd.org 2008/07/10 18:05:58
1106 [channels.c]
1107 missing bzero; from mickey; ok djm@
e8e08a80 1108 - markus@cvs.openbsd.org 2008/07/10 18:08:11
1109 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h sshd.c]
1110 sync v1 and v2 traffic accounting; add it to sshd, too;
1111 ok djm@, dtucker@
971deff8 1112
17969fcc 111320080709
1114 - (djm) [Makefile.in] Print "all tests passed" when all regress tests pass
b5fc5d94 1115 - (djm) [auth1.c] Fix format string vulnerability in protocol 1 PAM
1116 account check failure path. The vulnerable format buffer is supplied
1117 from PAM and should not contain attacker-supplied data.
78cb4705 1118 - (djm) [auth.c] Missing unistd.h for close()
b5902374 1119 - (djm) [configure.ac] Add -Wformat-security to CFLAGS for gcc 3.x and 4.x
17969fcc 1120
3fde0623 112120080705
1122 - (djm) [auth.c] Fixed test for locked account on HP/UX with shadowed
1123 passwords disabled. bz#1083 report & patch from senthilkumar_sen AT
1124 hotpop.com, w/ dtucker@
e8983917 1125 - (djm) [atomicio.c configure.ac] Disable poll() fallback in atomiciov for
1126 Tru64. readv doesn't seem to be a comparable object there.
1127 bz#1386, patch from dtucker@ ok me
b8d635d0 1128 - (djm) [Makefile.in] Pass though pass to conch for interop tests
6ed8a3ae 1129 - (djm) [configure.ac] unbreak: remove extra closing brace
d38d9a80 1130 - (djm) OpenBSD CVS Sync
1131 - djm@cvs.openbsd.org 2008/07/04 23:08:25
1132 [packet.c]
1133 handle EINTR in packet_write_poll()l ok dtucker@
71709bcd 1134 - djm@cvs.openbsd.org 2008/07/04 23:30:16
1135 [auth1.c auth2.c]
1136 Make protocol 1 MaxAuthTries logic match protocol 2's.
1137 Do not treat the first protocol 2 authentication attempt as
1138 a failure IFF it is for method "none".
1139 Makes MaxAuthTries' user-visible behaviour identical for
1140 protocol 1 vs 2.
1141 ok dtucker@
3086db6e 1142 - djm@cvs.openbsd.org 2008/07/05 05:16:01
1143 [PROTOCOL]
1144 grammar
3fde0623 1145
a0d38609 114620080704
1147 - (dtucker) OpenBSD CVS Sync
1148 - djm@cvs.openbsd.org 2008/07/02 13:30:34
1149 [auth2.c]
1150 really really remove the freebie "none" auth try for protocol 2
6c777090 1151 - djm@cvs.openbsd.org 2008/07/02 13:47:39
1152 [ssh.1 ssh.c]
1153 When forking after authentication ("ssh -f") with ExitOnForwardFailure
1154 enabled, delay the fork until after replies for any -R forwards have
1155 been seen. Allows for robust detection of -R forward failure when
1156 using -f (similar to bz#92); ok dtucker@
f0b9fde3 1157 - otto@cvs.openbsd.org 2008/07/03 21:46:58
1158 [auth2-pubkey.c]
1159 avoid nasty double free; ok dtucker@ djm@
cece208b 1160 - djm@cvs.openbsd.org 2008/07/04 03:44:59
1161 [servconf.c groupaccess.h groupaccess.c]
1162 support negation of groups in "Match group" block (bz#1315); ok dtucker@
c54d3d1c 1163 - dtucker@cvs.openbsd.org 2008/07/04 03:47:02
1164 [monitor.c]
1165 Make debug a little clearer. ok djm@
c7cbf377 1166 - djm@cvs.openbsd.org 2008/06/30 08:07:34
1167 [regress/key-options.sh]
1168 shell portability: use "=" instead of "==" in test(1) expressions,
1169 double-quote string with backslash escaped /
8a972082 1170 - djm@cvs.openbsd.org 2008/06/30 10:31:11
1171 [regress/{putty-transfer,putty-kex,putty-ciphers}.sh]
1172 remove "set -e" left over from debugging
9b0c87d9 1173 - djm@cvs.openbsd.org 2008/06/30 10:43:03
1174 [regress/conch-ciphers.sh]
1175 explicitly disable conch options that could interfere with the test
97e61398 1176 - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link
1177 returns EXDEV. Patch from Mike Garrison, ok djm@
5a0c8771 1178 - (djm) [atomicio.c channels.c clientloop.c defines.h includes.h]
1179 [packet.c scp.c serverloop.c sftp-client.c ssh-agent.c ssh-keyscan.c]
1180 [sshd.c] Explicitly handle EWOULDBLOCK wherever we handle EAGAIN, on
1181 some platforms (HP nonstop) it is a distinct errno;
1182 bz#1467 reported by sconeu AT yahoo.com; ok dtucker@
1183
8f02e0be 118420080702
1185 - (dtucker) OpenBSD CVS Sync
1186 - djm@cvs.openbsd.org 2008/06/30 08:05:59
1187 [PROTOCOL.agent]
1188 typo: s/constraint_date/constraint_data/
fb5582f7 1189 - djm@cvs.openbsd.org 2008/06/30 12:15:39
1190 [serverloop.c]
1191 only pass channel requests on session channels through to the session
1192 channel handler, avoiding spurious log messages; ok! markus@
4d92dbc1 1193 - djm@cvs.openbsd.org 2008/06/30 12:16:02
1194 [nchan.c]
1195 only send eow@openssh.com notifications for session channels; ok! markus@
8fb1ddc9 1196 - djm@cvs.openbsd.org 2008/06/30 12:18:34
1197 [PROTOCOL]
1198 clarify that eow@openssh.com is only sent on session channels
979b31ed 1199 - dtucker@cvs.openbsd.org 2008/07/01 07:20:52
1200 [sshconnect.c]
1201 Check ExitOnForwardFailure if forwardings are disabled due to a failed
1202 host key check. ok djm@
f9b45eaf 1203 - dtucker@cvs.openbsd.org 2008/07/01 07:24:22
1204 [sshconnect.c sshd.c]
1205 Send CR LF during protocol banner exchanges, but only for Protocol 2 only,
1206 in order to comply with RFC 4253. bz #1443, ok djm@
5ebed98d 1207 - stevesk@cvs.openbsd.org 2008/07/01 23:12:47
1208 [PROTOCOL.agent]
1209 fix some typos; ok djm@
39ceddb7 1210 - djm@cvs.openbsd.org 2008/07/02 02:24:18
1211 [sshd_config sshd_config.5 sshd.8 servconf.c]
1212 increase default size of ssh protocol 1 ephemeral key from 768 to 1024
1213 bits; prodded by & ok dtucker@ ok deraadt@
f7c2a004 1214 - dtucker@cvs.openbsd.org 2008/07/02 12:03:51
1215 [auth-rsa.c auth.c auth2-pubkey.c auth.h]
1216 Merge duplicate host key file checks, based in part on a patch from Rob
1217 Holland via bz #1348 . Also checks for non-regular files during protocol
1218 1 RSA auth. ok djm@
221fc73c 1219 - djm@cvs.openbsd.org 2008/07/02 12:36:39
1220 [auth2-none.c auth2.c]
1221 Make protocol 2 MaxAuthTries behaviour a little more sensible:
1222 Check whether client has exceeded MaxAuthTries before running
1223 an authentication method and skip it if they have, previously it
1224 would always allow one try (for "none" auth).
1225 Preincrement failure count before post-auth test - previously this
1226 checked and postincremented, also to allow one "none" try.
1227 Together, these two changes always count the "none" auth method
1228 which could be skipped by a malicious client (e.g. an SSH worm)
1229 to get an extra attempt at a real auth method. They also make
1230 MaxAuthTries=0 a useful way to block users entirely (esp. in a
1231 sshd_config Match block).
1232 Also, move sending of any preauth banner from "none" auth method
1233 to the first call to input_userauth_request(), so worms that skip
1234 the "none" method get to see it too.
8f02e0be 1235
00b7389d 123620080630
1237 - (djm) OpenBSD CVS Sync
1238 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
1239 [regress/Makefile regress/key-options.sh]
1240 Add regress test for key options. ok djm@
86d745dc 1241 - dtucker@cvs.openbsd.org 2008/06/11 23:11:40
014f1b23 1242 [regress/Makefile]
86d745dc 1243 Don't run cipher-speed test by default; mistakenly enabled by me
014f1b23 1244 - djm@cvs.openbsd.org 2008/06/28 13:57:25
1245 [regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh]
1246 very basic regress test against Twisted Conch in "make interop"
1247 target (conch is available in ports/devel/py-twisted/conch);
1248 ok markus@
8476b024 1249 - (djm) [regress/Makefile] search for conch by path, like we do putty
00b7389d 1250
aa47edcc 125120080629
1252 - (djm) OpenBSD CVS Sync
1253 - martynas@cvs.openbsd.org 2008/06/21 07:46:46
1254 [sftp.c]
1255 use optopt to get invalid flag, instead of return value of getopt,
1256 which is always '?'; ok djm@
ccf0fcb6 1257 - otto@cvs.openbsd.org 2008/06/25 11:13:43
1258 [key.c]
1259 add key length to visual fingerprint; zap magical constants;
1260 ok grunk@ djm@
681efe9f 1261 - djm@cvs.openbsd.org 2008/06/26 06:10:09
1262 [sftp-client.c sftp-server.c]
1263 allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky
1264 bits. Note that this only affects explicit setting of modes (e.g. via
1265 sftp(1)'s chmod command) and not file transfers. (bz#1310)
1266 ok deraadt@ at c2k8
b080d398 1267 - djm@cvs.openbsd.org 2008/06/26 09:19:40
1268 [dh.c dh.h moduli.c]
1269 when loading moduli from /etc/moduli in sshd(8), check that they
1270 are of the expected "safe prime" structure and have had
1271 appropriate primality tests performed;
1272 feedback and ok dtucker@
7b3999b8 1273 - grunk@cvs.openbsd.org 2008/06/26 11:46:31
1274 [readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c]
1275 Move SSH Fingerprint Visualization away from sharing the config option
1276 CheckHostIP to an own config option named VisualHostKey.
1277 While there, fix the behaviour that ssh would draw a random art picture
1278 on every newly seen host even when the option was not enabled.
1279 prodded by deraadt@, discussions,
1280 help and ok markus@ djm@ dtucker@
2e8d3306 1281 - jmc@cvs.openbsd.org 2008/06/26 21:11:46
1282 [ssh.1]
1283 add VisualHostKey to the list of options listed in -o;
cda43f66 1284 - djm@cvs.openbsd.org 2008/06/28 07:25:07
1285 [PROTOCOL]
1286 spelling fixes
c525650a 1287 - djm@cvs.openbsd.org 2008/06/28 13:58:23
1288 [ssh-agent.c]
1289 refuse to add a key that has unknown constraints specified;
1290 ok markus
9ee2fb0e 1291 - djm@cvs.openbsd.org 2008/06/28 14:05:15
1292 [ssh-agent.c]
1293 reset global compat flag after processing a protocol 2 signature
1294 request with the legacy DSA encoding flag set; ok markus
ab3eb078 1295 - djm@cvs.openbsd.org 2008/06/28 14:08:30
1296 [PROTOCOL PROTOCOL.agent]
1297 document the protocol used by ssh-agent; "looks ok" markus@
aa47edcc 1298
f6351d4d 129920080628
1300 - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec]
1301 RFC.nroff lacks a license, remove it (it is long gone in OpenBSD).
1302
bd6b3feb 130320080626
1304 - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD.
1305 (bz#1372)
a32d8b38 1306 - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
1307 [contrib/suse/openssh.spec] Include moduli.5 in RPM spec files.
bd6b3feb 1308
b3784859 130920080616
1310 - (dtucker) OpenBSD CVS Sync
1311 - dtucker@cvs.openbsd.org 2008/06/16 13:22:53
1312 [session.c channels.c]
1313 Rename the isatty argument to is_tty so we don't shadow
1314 isatty(3). ok markus@
245f4d36 1315 - (dtucker) [channels.c] isatty -> is_tty here too.
b3784859 1316
b55b0285 131720080615
1318 - (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc.
081573fe 1319 - OpenBSD CVS Sync
1320 - dtucker@cvs.openbsd.org 2008/06/14 15:49:48
1321 [sshd.c]
1322 wrap long line at 80 chars
26512357 1323 - dtucker@cvs.openbsd.org 2008/06/14 17:07:11
1324 [sshd.c]
1325 ensure default umask disallows at least group and world write; ok djm@
2608aa2b 1326 - djm@cvs.openbsd.org 2008/06/14 18:33:43
1327 [session.c]
1328 suppress the warning message from chdir(homedir) failures
1329 when chrooted (bz#1461); ok dtucker
49c5f262 1330 - dtucker@cvs.openbsd.org 2008/06/14 19:42:10
1331 [scp.1]
1332 Mention that scp follows symlinks during -r. bz #1466,
1333 from nectar at apple
d97287d3 1334 - dtucker@cvs.openbsd.org 2008/06/15 16:55:38
1335 [sshd_config.5]
1336 MaxSessions is allowed in a Match block too
8086aeb2 1337 - dtucker@cvs.openbsd.org 2008/06/15 16:58:40
1338 [servconf.c sshd_config.5]
1339 Allow MaxAuthTries within a Match block. ok djm@
c9478090 1340 - djm@cvs.openbsd.org 2008/06/15 20:06:26
1341 [channels.c channels.h session.c]
1342 don't call isatty() on a pty master, instead pass a flag down to
1343 channel_set_fds() indicating that te fds refer to a tty. Fixes a
1344 hang on exit on Solaris (bz#1463) in portable but is actually
1345 a generic bug; ok dtucker deraadt markus
b55b0285 1346
add357c6 134720080614
1348 - (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction
1349 replacement code; patch from ighighi AT gmail.com in bz#1240;
1350 ok dtucker
1351
849d3ceb 135220080613
1353 - (dtucker) OpenBSD CVS Sync
1354 - deraadt@cvs.openbsd.org 2008/06/13 09:44:36
1355 [packet.c]
1356 compile on older gcc; no decl after code
52ad6b9a 1357 - dtucker@cvs.openbsd.org 2008/06/13 13:56:59
1358 [monitor.c]
1359 Clear key options in the monitor on failed authentication, prevents
1360 applying additional restrictions to non-pubkey authentications in
1361 the case where pubkey fails but another method subsequently succeeds.
1362 bz #1472, found by Colin Watson, ok markus@ djm@
1d0b7aaa 1363 - dtucker@cvs.openbsd.org 2008/06/13 14:18:51
1364 [auth2-pubkey.c auth-rhosts.c]
1365 Include unistd.h for close(), prevents warnings in -portable
a3f13d60 1366 - dtucker@cvs.openbsd.org 2008/06/13 17:21:20
1367 [mux.c]
1368 Friendlier error messages for mux fallback. ok djm@
a15e7da1 1369 - dtucker@cvs.openbsd.org 2008/06/13 18:55:22
1370 [scp.c]
1371 Prevent -Wsign-compare warnings on LP64 systems. bz #1192, ok deraadt@
990ada29 1372 - grunk@cvs.openbsd.org 2008/06/13 20:13:26
1373 [ssh.1]
1374 Explain the use of SSH fpr visualization using random art, and cite the
1375 original scientific paper inspiring that technique.
1376 Much help with English and nroff by jmc@, thanks.
596a825b 1377 - (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which
1378 despite its name doesn't seem to implement all of GSSAPI. Patch from
1379 Jan Engelhardt, sanity checked by Simon Wilkinson.
849d3ceb 1380
9754b94b 138120080612
1382 - (dtucker) OpenBSD CVS Sync
1383 - jmc@cvs.openbsd.org 2008/06/11 07:30:37
1384 [sshd.8]
1385 kill trailing whitespace;
aff73c5f 1386 - grunk@cvs.openbsd.org 2008/06/11 21:01:35
1387 [ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
1388 sshconnect.c]
1389 Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
1390 graphical hash visualization schemes known as "random art", and by
1391 Dan Kaminsky's musings on the subject during a BlackOp talk at the
1392 23C3 in Berlin.
1393 Scientific publication (original paper):
1394 "Hash Visualization: a New Technique to improve Real-World Security",
1395 Perrig A. and Song D., 1999, International Workshop on Cryptographic
1396 Techniques and E-Commerce (CrypTEC '99)
1397 http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
1398 The algorithm used here is a worm crawling over a discrete plane,
1399 leaving a trace (augmenting the field) everywhere it goes.
1400 Movement is taken from dgst_raw 2bit-wise. Bumping into walls
1401 makes the respective movement vector be ignored for this turn,
1402 thus switching to the other color of the chessboard.
1403 Graphs are not unambiguous for now, because circles in graphs can be
1404 walked in either direction.
1405 discussions with several people,
1406 help, corrections and ok markus@ djm@
93778882 1407 - grunk@cvs.openbsd.org 2008/06/11 21:38:25
1408 [ssh-keygen.c]
1409 ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub
1410 would not display you the random art as intended, spotted by canacar@
639211b7 1411 - grunk@cvs.openbsd.org 2008/06/11 22:20:46
1412 [ssh-keygen.c ssh-keygen.1]
1413 ssh-keygen would write fingerprints to STDOUT, and random art to STDERR,
1414 that is not how it was envisioned.
1415 Also correct manpage saying that -v is needed along with -l for it to work.
1416 spotted by naddy@
e3115002 1417 - otto@cvs.openbsd.org 2008/06/11 23:02:22
1418 [key.c]
1419 simpler way of computing the augmentations; ok grunk@
fe88400f 1420 - grunk@cvs.openbsd.org 2008/06/11 23:03:56
1421 [ssh_config.5]
1422 CheckHostIP set to ``fingerprint'' will display both hex and random art
1423 spotted by naddy@
97841001 1424 - grunk@cvs.openbsd.org 2008/06/11 23:51:57
1425 [key.c]
1426 #define statements that are not atoms need braces around them, else they
1427 will cause trouble in some cases.
1428 Also do a computation of -1 once, and not in a loop several times.
1429 spotted by otto@
e907df41 1430 - dtucker@cvs.openbsd.org 2008/06/12 00:03:49
1431 [dns.c canohost.c sshconnect.c]
1432 Do not pass "0" strings as ports to getaddrinfo because the lookups
1433 can slow things down and we never use the service info anyway. bz
1434 #859, patch from YOSHIFUJI Hideaki and John Devitofranceschi. ok
1435 deraadt@ djm@
1436 djm belives that the reason for the "0" strings is to ensure that
1437 it's not possible to call getaddrinfo with both host and port being
1438 NULL. In the case of canohost.c host is a local array. In the
1439 case of sshconnect.c, it's checked for null immediately before use.
1440 In dns.c it ultimately comes from ssh.c:main() and is guaranteed to
1441 be non-null but it's not obvious, so I added a warning message in
1442 case it is ever passed a null.
1443 - grunk@cvs.openbsd.org 2008/06/12 00:13:55
1444 [sshconnect.c]
1445 Make ssh print the random art also when ssh'ing to a host using IP only.
1446 spotted by naddy@, ok and help djm@ dtucker@
208cc0ee 1447 - otto@cvs.openbsd.org 2008/06/12 00:13:13
1448 [key.c]
1449 use an odd number of rows and columns and a separate start marker, looks
1450 better; ok grunk@
f17f705b 1451 - djm@cvs.openbsd.org 2008/06/12 03:40:52
1452 [clientloop.h mux.c channels.c clientloop.c channels.h]
1453 Enable ~ escapes for multiplex slave sessions; give each channel
1454 its own escape state and hook the escape filters up to muxed
1455 channels. bz #1331
1456 Mux slaves do not currently support the ~^Z and ~& escapes.
1457 NB. this change cranks the mux protocol version, so a new ssh
1458 mux client will not be able to connect to a running old ssh
1459 mux master.
1460 ok dtucker@
72becb62 1461 - djm@cvs.openbsd.org 2008/06/12 04:06:00
1462 [clientloop.h ssh.c clientloop.c]
1463 maintain an ordered queue of outstanding global requests that we
1464 expect replies to, similar to the per-channel confirmation queue.
1465 Use this queue to verify success or failure for remote forward
1466 establishment in a race free way.
1467 ok dtucker@
344f1d3d 1468 - djm@cvs.openbsd.org 2008/06/12 04:17:47
1469 [clientloop.c]
1470 thall shalt not code past the eightieth column
e8097dc9 1471 - djm@cvs.openbsd.org 2008/06/12 04:24:06
1472 [ssh.c]
1473 thal shalt not code past the eightieth column
9bcf03ce 1474 - djm@cvs.openbsd.org 2008/06/12 05:15:41
1475 [PROTOCOL]
1476 document tun@openssh.com forwarding method
aacab402 1477 - djm@cvs.openbsd.org 2008/06/12 05:32:30
1478 [mux.c]
1479 some more TODO for me
2bb50d23 1480 - grunk@cvs.openbsd.org 2008/06/12 05:42:46
1481 [key.c]
1482 supply the key type (rsa1, rsa, dsa) as a caption in the frame of the
1483 random art. while there, stress the fact that the field base should at
1484 least be 8 characters for the pictures to make sense.
1485 comment and ok djm@
1486 - grunk@cvs.openbsd.org 2008/06/12 06:32:59
1487 [key.c]
1488 We already mark the start of the worm, now also mark the end of the worm
1489 in our random art drawings.
1490 ok djm@
e74caf1e 1491 - djm@cvs.openbsd.org 2008/06/12 15:19:17
1492 [clientloop.h channels.h clientloop.c channels.c mux.c]
1493 The multiplexing escape char handler commit last night introduced a
1494 small memory leak per session; plug it.
e9d0b573 1495 - dtucker@cvs.openbsd.org 2008/06/12 16:35:31
1496 [ssh_config.5 ssh.c]
1497 keyword expansion for localcommand. ok djm@
a64f8307 1498 - jmc@cvs.openbsd.org 2008/06/12 19:10:09
1499 [ssh_config.5 ssh-keygen.1]
1500 tweak the ascii art text; ok grunk
bc2d97c8 1501 - dtucker@cvs.openbsd.org 2008/06/12 20:38:28
1502 [sshd.c sshconnect.c packet.h misc.c misc.h packet.c]
1503 Make keepalive timeouts apply while waiting for a packet, particularly
1504 during key renegotiation (bz #1363). With djm and Matt Day, ok djm@
ad39a852 1505 - djm@cvs.openbsd.org 2008/06/12 20:47:04
1506 [sftp-client.c]
1507 print extension revisions for extensions that we understand
07d8d480 1508 - djm@cvs.openbsd.org 2008/06/12 21:06:25
1509 [clientloop.c]
1510 I was coalescing expected global request confirmation replies at
1511 the wrong end of the queue - fix; prompted by markus@
31de76cc 1512 - grunk@cvs.openbsd.org 2008/06/12 21:14:46
1513 [ssh-keygen.c]
1514 make ssh-keygen -lf show the key type just as ssh-add -l would do it
1515 ok djm@ markus@
f97fb6ca 1516 - grunk@cvs.openbsd.org 2008/06/12 22:03:36
1517 [key.c]
1518 add my copyright, ok djm@
6d8216ff 1519 - ian@cvs.openbsd.org 2008/06/12 23:24:58
1520 [sshconnect.c]
1521 tweak wording in message, ok deraadt@ jmc@
2c83cd01 1522 - dtucker@cvs.openbsd.org 2008/06/13 00:12:02
1523 [sftp.h log.h]
1524 replace __dead with __attribute__((noreturn)), makes things
1525 a little easier to port. Also, add it to sigdie(). ok djm@
b97ea6eb 1526 - djm@cvs.openbsd.org 2008/06/13 00:16:49
1527 [mux.c]
1528 fall back to creating a new TCP connection on most multiplexing errors
1529 (socket connect fail, invalid version, refused permittion, corrupted
1530 messages, etc.); bz #1329 ok dtucker@
243cc316 1531 - dtucker@cvs.openbsd.org 2008/06/13 00:47:53
1532 [mux.c]
1533 upcast size_t to u_long to match format arg; ok djm@
041f11dc 1534 - dtucker@cvs.openbsd.org 2008/06/13 00:51:47
1535 [mac.c]
1536 upcast another size_t to u_long to match format
852eb76b 1537 - dtucker@cvs.openbsd.org 2008/06/13 01:38:23
1538 [misc.c]
1539 upcast uid to long with matching %ld, prevents warnings in portable
632f2669 1540 - djm@cvs.openbsd.org 2008/06/13 04:40:22
1541 [auth2-pubkey.c auth-rhosts.c]
1542 refuse to read ~/.shosts or ~/.ssh/authorized_keys that are not
1543 regular files; report from Solar Designer via Colin Watson in bz#1471
1544 ok dtucker@ deraadt
136d0181 1545 - (dtucker) [clientloop.c serverloop.c] channel_register_filter now
1546 takes 2 more args. with djm@
49190c3d 1547 - (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch
1548 from Todd Vierling.
02e605ed 1549 - (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA
1550 systems. Patch from R. Scott Bailey.
c694c610 1551 - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used
1552 on big endian machines, so ifdef them for little-endian only to prevent
1553 unused function warnings on big-endians.
56f77432 1554 - (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent
1555 compiler warnings on some platforms. Based on a discussion with otto@
9754b94b 1556
554ebbed 155720080611
1558 - (djm) [channels.c configure.ac]
1559 Do not set SO_REUSEADDR on wildcard X11 listeners (X11UseLocalhost=no)
1560 bz#1464; ok dtucker
1561
15b5fa9b 156220080610
1563 - (dtucker) OpenBSD CVS Sync
1564 - djm@cvs.openbsd.org 2008/06/10 03:57:27
1565 [servconf.c match.h sshd_config.5]
1566 support CIDR address matching in sshd_config "Match address" blocks, with
1567 full support for negation and fall-back to classic wildcard matching.
1568 For example:
1569 Match address 192.0.2.0/24,3ffe:ffff::/32,!10.*
1570 PasswordAuthentication yes
1571 addrmatch.c code mostly lifted from flowd's addr.c
1572 feedback and ok dtucker@
8b671558 1573 - djm@cvs.openbsd.org 2008/06/10 04:17:46
1574 [sshd_config.5]
1575 better reference for pattern-list
1760c982 1576 - dtucker@cvs.openbsd.org 2008/06/10 04:50:25
1577 [sshd.c channels.h channels.c log.c servconf.c log.h servconf.h sshd.8]
1578 Add extended test mode (-T) and connection parameters for test mode (-C).
1579 -T causes sshd to write its effective configuration to stdout and exit.
1580 -C causes any relevant Match rules to be applied before output. The
1581 combination allows tesing of the parser and config files. ok deraadt djm
01e9e424 1582 - jmc@cvs.openbsd.org 2008/06/10 07:12:00
1583 [sshd_config.5]
1584 tweak previous;
3b42e3ac 1585 - jmc@cvs.openbsd.org 2008/06/10 08:17:40
1586 [sshd.8 sshd.c]
1587 - update usage()
1588 - fix SYNOPSIS, and sort options
1589 - some minor additional fixes
f0528444 1590 - dtucker@cvs.openbsd.org 2008/06/09 18:06:32
1591 [regress/test-exec.sh]
1592 Don't generate putty keys if we're not going to use them. ok djm
16d46c30 1593 - dtucker@cvs.openbsd.org 2008/06/10 05:23:32
1594 [regress/addrmatch.sh regress/Makefile]
1595 Regress test for Match CIDR rules. ok djm@
94edc013 1596 - dtucker@cvs.openbsd.org 2008/06/10 15:21:41
1597 [test-exec.sh]
1598 Use a more portable construct for checking if we're running a putty test
64c576e9 1599 - dtucker@cvs.openbsd.org 2008/06/10 15:28:49
1600 [test-exec.sh]
1601 Add quotes
f6748d7b 1602 - dtucker@cvs.openbsd.org 2008/06/10 18:21:24
1603 [ssh_config.5]
1604 clarify that Host patterns are space-separated. ok deraadt
3f0444ca 1605 - djm@cvs.openbsd.org 2008/06/10 22:15:23
1606 [PROTOCOL ssh.c serverloop.c]
1607 Add a no-more-sessions@openssh.com global request extension that the
1608 client sends when it knows that it will never request another session
1609 (i.e. when session multiplexing is disabled). This allows a server to
1610 disallow further session requests and terminate the session.
1611 Why would a non-multiplexing client ever issue additional session
1612 requests? It could have been attacked with something like SSH'jack:
1613 http://www.storm.net.nz/projects/7
1614 feedback & ok markus
b3b048d6 1615 - djm@cvs.openbsd.org 2008/06/10 23:06:19
1616 [auth-options.c match.c servconf.c addrmatch.c sshd.8]
1617 support CIDR address matching in .ssh/authorized_keys from="..." stanzas
1618 ok and extensive testing dtucker@
8fb12ef0 1619 - dtucker@cvs.openbsd.org 2008/06/10 23:21:34
1620 [bufaux.c]
1621 Use '\0' for a nul byte rather than unadorned 0. ok djm@
a6d05adf 1622 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
1623 [Makefile regress/key-options.sh]
1624 Add regress test for key options. ok djm@
edee47f5 1625 - (dtucker) [openbsd-compat/fake-rfc2553.h] Add sin6_scope_id to sockaddr_in6
1626 since the new CIDR code in addmatch.c references it.
1627 - (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6
1628 specific tests on platforms that don't do IPv6.
8ac1d2eb 1629 - (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well
1630 as environment.
0694c78f 1631 - (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now.
15b5fa9b 1632
10e804f4 163320080609
1634 - (dtucker) OpenBSD CVS Sync
1635 - dtucker@cvs.openbsd.org 2008/06/08 17:04:41
1636 [sftp-server.c]
1637 Add case for ENOSYS in errno_to_portable; ok deraadt
5a3cde15 1638 - dtucker@cvs.openbsd.org 2008/06/08 20:15:29
1639 [sftp.c sftp-client.c sftp-client.h]
1640 Have the sftp client store the statvfs replies in wire format,
1641 which prevents problems when the server's native sizes exceed the
1642 client's.
1643 Also extends the sizes of the remaining 32bit wire format to 64bit,
1644 they're specified as unsigned long in the standard.
7290afcb 1645 - dtucker@cvs.openbsd.org 2008/06/09 13:02:39
2626070f 1646 [sftp-server.c]
7290afcb 1647 Extend 32bit -> 64bit values for statvfs extension missed in previous
1648 commit.
2626070f 1649 - dtucker@cvs.openbsd.org 2008/06/09 13:38:46
1650 [PROTOCOL]
1651 Use a $OpenBSD tag so our scripts will sync changes.
10e804f4 1652
22f5e872 165320080608
1654 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c
1655 openbsd-compat/Makefile.in openbsd-compat/openbsd-compat.h
1656 openbsd-compat/bsd-statvfs.{c,h}] Add a null implementation of statvfs and
1657 fstatvfs and remove #defines around statvfs code. ok djm@
7a4f468b 1658 - (dtucker) [configure.ac defines.h sftp-client.c M sftp-server.c] Add a
1659 macro to convert fsid to unsigned long for platforms where fsid is a
1660 2-member array.
22f5e872 1661
0894bbed 166220080607
1663 - (dtucker) [mux.c] Include paths.h inside ifdef HAVE_PATHS_H.
4538e135 1664 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c]
1665 Do not enable statvfs extensions on platforms that do not have statvfs.
2abb1ef5 1666 - (dtucker) OpenBSD CVS Sync
1667 - djm@cvs.openbsd.org 2008/05/19 06:14:02
1668 [packet.c] unbreak protocol keepalive timeouts bz#1465; ok dtucker@
82bb6f20 1669 - djm@cvs.openbsd.org 2008/05/19 15:45:07
1670 [sshtty.c ttymodes.c sshpty.h]
1671 Fix sending tty modes when stdin is not a tty (bz#1199). Previously
1672 we would send the modes corresponding to a zeroed struct termios,
1673 whereas we should have been sending an empty list of modes.
1674 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
048acbeb 1675 - djm@cvs.openbsd.org 2008/05/19 15:46:31
1676 [ssh-keygen.c]
1677 support -l (print fingerprint) in combination with -F (find host) to
1678 search for a host in ~/.ssh/known_hosts and display its fingerprint;
1679 ok markus@
4651c790 1680 - djm@cvs.openbsd.org 2008/05/19 20:53:52
1681 [clientloop.c]
1682 unbreak tree by committing this bit that I missed from:
1683 Fix sending tty modes when stdin is not a tty (bz#1199). Previously
1684 we would send the modes corresponding to a zeroed struct termios,
1685 whereas we should have been sending an empty list of modes.
1686 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
0894bbed 1687
07e61b8a 168820080604
1689 - (djm) [openbsd-compat/bsd-arc4random.c] Fix math bug that caused bias
1690 in arc4random_uniform with upper_bound in (2^30,2*31). Note that
1691 OpenSSH did not make requests with upper bounds in this range.
1692
b3ef88dc 169320080519
1694 - (djm) [configure.ac mux.c sftp.c openbsd-compat/Makefile.in]
1695 [openbsd-compat/fmt_scaled.c openbsd-compat/openbsd-compat.h]
1696 Fix compilation on Linux, including pulling in fmt_scaled(3)
1697 implementation from OpenBSD's libutil.
1698
9b04dbaa 169920080518
1700 - (djm) OpenBSD CVS Sync
1701 - djm@cvs.openbsd.org 2008/04/04 05:14:38
1702 [sshd_config.5]
1703 ChrootDirectory is supported in Match blocks (in fact, it is most useful
1704 there). Spotted by Minstrel AT minstrel.org.uk
5b76e3ef 1705 - djm@cvs.openbsd.org 2008/04/04 06:44:26
1706 [sshd_config.5]
1707 oops, some unrelated stuff crept into that commit - backout.
1708 spotted by jmc@
ade21243 1709 - djm@cvs.openbsd.org 2008/04/05 02:46:02
1710 [sshd_config.5]
1711 HostbasedAuthentication is supported under Match too
185adaf8 1712 - (djm) [openbsd-compat/bsd-arc4random.c openbsd-compat/openbsd-compat.c]
1713 [configure.ac] Implement arc4random_buf(), import implementation of
1714 arc4random_uniform() from OpenBSD
936e7c8c 1715 - (djm) [openbsd-compat/bsd-arc4random.c] Warning fixes
c49ce62e 1716 - (djm) [openbsd-compat/port-tun.c] needs sys/queue.h
c1d152b8 1717 - (djm) OpenBSD CVS Sync
1718 - djm@cvs.openbsd.org 2008/04/13 00:22:17
1719 [dh.c sshd.c]
1720 Use arc4random_buf() when requesting more than a single word of output
1721 Use arc4random_uniform() when the desired random number upper bound
1722 is not a power of two
1723 ok deraadt@ millert@
360b43ab 1724 - djm@cvs.openbsd.org 2008/04/18 12:32:11
1725 [sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c sftp.h]
1726 introduce sftp extension methods statvfs@openssh.com and
1727 fstatvfs@openssh.com that implement statvfs(2)-like operations,
1728 based on a patch from miklos AT szeredi.hu (bz#1399)
1729 also add a "df" command to the sftp client that uses the
1730 statvfs@openssh.com to produce a df(1)-like display of filesystem
1731 space and inode utilisation
1732 ok markus@
ea530517 1733 - jmc@cvs.openbsd.org 2008/04/18 17:15:47
1734 [sftp.1]
1735 macro fixage;
48fbfda0 1736 - djm@cvs.openbsd.org 2008/04/18 22:01:33
1737 [session.c]
1738 remove unneccessary parentheses
0bb7755b 1739 - otto@cvs.openbsd.org 2008/04/29 11:20:31
1740 [monitor_mm.h]
1741 garbage collect two unused fields in struct mm_master; ok markus@
c47ff7a6 1742 - djm@cvs.openbsd.org 2008/04/30 10:14:03
1743 [ssh-keyscan.1 ssh-keyscan.c]
1744 default to rsa (protocol 2) keys, instead of rsa1 keys; spotted by
1745 larsnooden AT openoffice.org
43c3f85c 1746 - pyr@cvs.openbsd.org 2008/05/07 05:49:37
1747 [servconf.c servconf.h session.c sshd_config.5]
1748 Enable the AllowAgentForwarding option in sshd_config (global and match
1749 context), to specify if agents should be permitted on the server.
1750 As the man page states:
1751 ``Note that disabling Agent forwarding does not improve security
1752 unless users are also denied shell access, as they can always install
1753 their own forwarders.''
1754 ok djm@, ok and a mild frown markus@
5c7e2b47 1755 - pyr@cvs.openbsd.org 2008/05/07 06:43:35
1756 [sshd_config]
1757 push the sshd_config bits in, spotted by ajacoutot@
94569631 1758 - jmc@cvs.openbsd.org 2008/05/07 08:00:14
1759 [sshd_config.5]
1760 sort;
17f02f0a 1761 - markus@cvs.openbsd.org 2008/05/08 06:59:01
1762 [bufaux.c buffer.h channels.c packet.c packet.h]
1763 avoid extra malloc/copy/free when receiving data over the net;
1764 ~10% speedup for localhost-scp; ok djm@
3593bdc0 1765 - djm@cvs.openbsd.org 2008/05/08 12:02:23
1766 [auth-options.c auth1.c channels.c channels.h clientloop.c gss-serv.c]
1767 [monitor.c monitor_wrap.c nchan.c servconf.c serverloop.c session.c]
1768 [ssh.c sshd.c]
1769 Implement a channel success/failure status confirmation callback
1770 mechanism. Each channel maintains a queue of callbacks, which will
1771 be drained in order (RFC4253 guarantees confirm messages are not
1772 reordered within an channel).
1773 Also includes a abandonment callback to clean up if a channel is
1774 closed without sending confirmation messages. This probably
1775 shouldn't happen in compliant implementations, but it could be
1776 abused to leak memory.
1777 ok markus@ (as part of a larger diff)
c6dca55e 1778 - djm@cvs.openbsd.org 2008/05/08 12:21:16
1779 [monitor.c monitor_wrap.c session.h servconf.c servconf.h session.c]
1780 [sshd_config sshd_config.5]
1781 Make the maximum number of sessions run-time controllable via
1782 a sshd_config MaxSessions knob. This is useful for disabling
1783 login/shell/subsystem access while leaving port-forwarding working
1784 (MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or
1785 simply increasing the number of allows multiplexed sessions.
1786 Because some bozos are sure to configure MaxSessions in excess of the
1787 number of available file descriptors in sshd (which, at peak, might be
1788 as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds
1789 on error paths, and make it fail gracefully on out-of-fd conditions -
1790 sending channel errors instead of than exiting with fatal().
1791 bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com
1792 ok markus@
95d3c124 1793 - djm@cvs.openbsd.org 2008/05/08 13:06:11
1794 [clientloop.c clientloop.h ssh.c]
1795 Use new channel status confirmation callback system to properly deal
1796 with "important" channel requests that fail, in particular command exec,
1797 shell and subsystem requests. Previously we would optimistically assume
1798 that the requests would always succeed, which could cause hangs if they
1799 did not (e.g. when the server runs out of fds) or were unimplemented by
1800 the server (bz #1384)
1801 Also, properly report failing multiplex channel requests via the mux
1802 client stderr (subject to LogLevel in the mux master) - better than
1803 silently failing.
1804 most bits ok markus@ (as part of a larger diff)
e07e21ad 1805 - djm@cvs.openbsd.org 2008/05/09 04:55:56
1806 [channels.c channels.h clientloop.c serverloop.c]
1807 Try additional addresses when connecting to a port forward destination
1808 whose DNS name resolves to more than one address. The previous behaviour
1809 was to try the first address and give up.
1810 Reported by stig AT venaas.com in bz#343
1811 great feedback and ok markus@
3bcced4c 1812 - djm@cvs.openbsd.org 2008/05/09 14:18:44
1813 [clientloop.c clientloop.h ssh.c mux.c]
1814 tidy up session multiplexing code, moving it into its own file and
1815 making the function names more consistent - making ssh.c and
1816 clientloop.c a fair bit more readable.
1817 ok markus@
6cd3e678 1818 - djm@cvs.openbsd.org 2008/05/09 14:26:08
1819 [ssh.c]
1820 dingo stole my diff hunk
ee7c3e92 1821 - markus@cvs.openbsd.org 2008/05/09 16:16:06
1822 [session.c]
1823 re-add the USE_PIPES code and enable it.
1824 without pipes shutdown-read from the sshd does not trigger
1825 a SIGPIPE when the forked program does a write.
1826 ok djm@
1827 (Id sync only, USE_PIPES never left portable OpenSSH)
271f4a13 1828 - markus@cvs.openbsd.org 2008/05/09 16:17:51
1829 [channels.c]
1830 error-fd race: don't enable the error fd in the select bitmask
1831 for channels with both in- and output closed, since the channel
1832 will go away before we call select();
1833 report, lots of debugging help and ok djm@
50c96367 1834 - markus@cvs.openbsd.org 2008/05/09 16:21:13
1835 [channels.h clientloop.c nchan.c serverloop.c]
1836 unbreak
1837 ssh -2 localhost od /bin/ls | true
1838 ignoring SIGPIPE by adding a new channel message (EOW) that signals
1839 the peer that we're not interested in any data it might send.
1840 fixes bz #85; discussion, debugging and ok djm@
d5820099 1841 - pvalchev@cvs.openbsd.org 2008/05/12 20:52:20
1842 [umac.c]
1843 Ensure nh_result lies on a 64-bit boundary (fixes warnings observed
1844 on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@
56b12440 1845 - djm@cvs.openbsd.org 2008/05/15 23:52:24
1846 [nchan2.ms]
1847 document eow message in ssh protocol 2 channel state machine;
1848 feedback and ok markus@
f8db3345 1849 - djm@cvs.openbsd.org 2008/05/18 21:29:05
1850 [sftp-server.c]
1851 comment extension announcement
8be03682 1852 - djm@cvs.openbsd.org 2008/05/16 08:30:42
1853 [PROTOCOL]
1854 document our protocol extensions and deviations; ok markus@
1855 - djm@cvs.openbsd.org 2008/05/17 01:31:56
1856 [PROTOCOL]
1857 grammar and correctness fixes from stevesk@
9b04dbaa 1858
490c3105 185920080403
1860 - (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile-
1861 time warnings on LynxOS. Patch from ops AT iki.fi
1ebb73e4 1862 - (djm) Force string arguments to replacement setproctitle() though
1863 strnvis first. Ok dtucker@
490c3105 1864
2b363e83 186520080403
1866 - (djm) OpenBSD CVS sync:
1867 - markus@cvs.openbsd.org 2008/04/02 15:36:51
1868 [channels.c]
1869 avoid possible hijacking of x11-forwarded connections (back out 1.183)
1870 CVE-2008-1483; ok djm@
adb7acbc 1871 - jmc@cvs.openbsd.org 2008/03/27 22:37:57
1872 [sshd.8]
1873 remove trailing whitespace;
53e0dc70 1874 - djm@cvs.openbsd.org 2008/04/03 09:50:14
1875 [version.h]
1876 openssh-5.0
31b1b2c8 1877 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
1878 [contrib/suse/openssh.spec] Crank version numbers in RPM spec files
dd052df9 1879 - (djm) [README] Update link to release notes
098ebea7 1880 - (djm) Release 5.0p1
This page took 0.406625 seconds and 5 git commands to generate.