]> andersk Git - openssh.git/blame - ChangeLog
- deraadt@cvs.openbsd.org 2002/05/04 02:39:35
[openssh.git] / ChangeLog
CommitLineData
68a9cd3e 120020515
2 - (bal) CVS ID fix up on auth-passwd.c
e0740430 3 - (bal) OpenBSD CVS Sync
4 - deraadt@cvs.openbsd.org 2002/05/07 19:54:36
5 [ssh.h]
6 use ssh uid
897fecd3 7 - deraadt@cvs.openbsd.org 2002/05/08 21:06:34
8 [ssh.h]
9 move to sshd.sshd instead
5de727d6 10 - stevesk@cvs.openbsd.org 2002/05/11 20:24:48
11 [ssh.h]
12 typo in comment
69538b0c 13 - itojun@cvs.openbsd.org 2002/05/13 02:37:39
14 [auth-skey.c auth2.c]
15 less warnings. skey_{respond,query} are public (in auth.h)
01dafcb5 16 - markus@cvs.openbsd.org 2002/05/13 20:44:58
17 [auth-options.c auth.c auth.h]
18 move the packet_send_debug handling from auth-options.c to auth.c;
19 ok provos@
4ac8556b 20 - millert@cvs.openbsd.org 2002/05/13 15:53:19
21 [sshd.c]
22 Call setsid() in the child after sshd accepts the connection and forks.
23 This is needed for privsep which calls setlogin() when it changes uids.
24 Without this, there is a race where the login name of an existing
25 connection, as returned by getlogin(), may be changed to the privsep
26 user (sshd). markus@ OK
b3ad3d88 27 - markus@cvs.openbsd.org 2002/05/13 21:26:49
28 [auth-rhosts.c]
29 handle debug messages during rhosts-rsa and hostbased authentication;
30 ok provos@
b5a28cbc 31 - mouring@cvs.openbsd.org 2002/05/15 15:47:49
32 [kex.c monitor.c monitor_wrap.c sshd.c]
33 'monitor' variable clashes with at least one lame platform (NeXT). i
34 Renamed to 'pmonitor'. provos@
1642b888 35 - deraadt@cvs.openbsd.org 2002/05/04 02:39:35
36 [servconf.c sshd.8 sshd_config]
37 enable privsep by default; provos ok
b5a28cbc 38 - (bal) Fixed up PAM case. I think.
0c83d9ea 39 - (bal) Clarified openbsd-compat/*-cray.* Licence provided by Wendy
68a9cd3e 40
545ba36e 4120020514
42 - (stevesk) [README.privsep] PAM+privsep works with Solaris 8.
f65fbec1 43 - (tim) [sshpty.c] set tty modes when allocating old style bsd ptys to
44 match what newer style ptys have when allocated. Based on a patch by
45 Roger Cornelius <rac@tenzing.org>
47cdfcbe 46 - (tim) [README.privsep] UnixWare 7 and OpenUNIX 8 work.
47 - (tim) [README.privsep] remove reference to UnixWare 7 and OpenUNIX 8
48 from PAM-enabled pragraph. UnixWare has no PAM.
3c1a6277 49 - (tim) [contrib/caldera/openssh.spec] update version.
545ba36e 50
06617857 5120020513
3d1beaf2 52 - (stevesk) add initial README.privsep
5222e7ef 53 - (stevesk) [configure.ac] nicer message: --with-privsep-user=user
fdff2c55 54 - (djm) Add --with-superuser-path=xxx configure option to specify
55 what $PATH the superuser receives.
94a73cdc 56 - (djm) Bug #231: UsePrivilegeSeparation turns off Banner.
ecac8ee5 57 - (djm) Add --with-privsep-path configure option
80e92e5d 58 - (djm) Update RPM spec file: different superuser path, use
59 /var/empty/sshd for privsep
75817f90 60 - (djm) Bug #234: missing readpassphrase declaration and defines
fdff2c55 61 - (djm) Add INSTALL warning about SSH protocol 1 blowfish w/
62 OpenSSL < 0.9.6
06617857 63
5b991353 6420020511
65 - (tim) [configure.ac] applied a rework of djm's OpenSSL search cleanup patch.
66 Now only searches system and /usr/local/ssl (OpenSSL's default install path)
67 Others must use --with-ssl-dir=....
d73cbfe3 68 - (tim) [monitor_fdpass.c] fix for systems that have both
fdff2c55 69 HAVE_ACCRIGHTS_IN_MSGHDR and HAVE_CONTROL_IN_MSGHDR. Ie. sys/socket.h
70 has #define msg_accrights msg_control
5b991353 71
3ef3d901 7220020510
5b29f152 73 - (stevesk) [auth.c] Shadow account and expiration cleanup. Now
74 check for root forced expire. Still don't check for inactive.
3ef3d901 75 - (djm) Rework RedHat RPM files. Based on spec from Nalin
76 Dahyabhai <nalin@redhat.com> and patches from
77 Pekka Savola <pekkas@netcore.fi>
018a5ea3 78 - (djm) Try to drop supplemental groups at daemon startup. Patch from
79 RedHat
f656b61e 80 - (bal) Back all the way out of auth-passwd.c changes. Breaks too many
81 things that don't set pw->pw_passwd.
3ef3d901 82
075682c1 8320020509
84 - (tim) [Makefile.in] Unbreak make -f Makefile.in distprep
fea8a8e8 85
075682c1 8620020508
af5ee4e4 87 - (tim) [openbsd-compat/bsd-arc4random.c] fix logic on when seed_rng() is
88 called. Report by Chris Maxwell <maxwell@cs.dal.ca>
6193497b 89 - (tim) [Makefile.in configure.ac] set SHELL variable in Makefile
075682c1 90 - (djm) Disable PAM kbd-int auth if privsep is turned on (it doesn't work)
af5ee4e4 91
f25cd32c 9220020507
93 - (tim) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
94 Add truncate() emulation to address Bug 208
95
69406cab 9620020506
97 - (djm) Unbreak auth-passwd.c for PAM and SIA
efe44db6 98 - (djm) Unbreak PAM auth for protocol 1. Report from Pekka Savola
99 <pekkas@netcore.fi>
39ce53de 100 - (djm) Don't reinitialise PAM credentials before we have started PAM.
101 Report from Pekka Savola <pekkas@netcore.fi>
102
d9891c59 10320020506
104 - (bal) Fixed auth-passwd.c to resolve PermitEmptyPassword issue
105
836d58d7 10620020501
107 - (djm) Import OpenBSD regression tests. Requires BSD make to run
50903cc7 108 - (djm) Fix readpassphase compilation for systems which have it
836d58d7 109
f0c180c3 11020020429
111 - (tim) [contrib/caldera/openssh.spec] update fixUP to reflect changes in
112 sshd_config.
113 - (tim) [contrib/cygwin/README] remove reference to regex.
114 patch from Corinna Vinschen <vinschen@redhat.com>
115
db8dbb6a 11620020426
117 - (djm) Bug #137, #209: fix make problems for scard/Ssh.bin, do uudecode
118 during distprep only
fdff2c55 119 - (djm) Disable PAM password expiry until a complete fix for bug #188
120 exists
782e2103 121 - (djm) Bug #180: Set ToS bits on IPv4-in-IPv6 mapped addresses. Based on
122 patch from openssh@misc.tecq.org
db8dbb6a 123
369e787a 12420020425
125 - (stevesk) [defines.h] remove USE_TIMEVAL; unused
6e879cb4 126 - (stevesk) [acconfig.h auth-passwd.c configure.ac sshd.c] HP-UX 10.26
127 support. bug #184. most from dcole@keysoftsys.com.
369e787a 128
8c1f70d8 12920020424
130 - (djm) OpenBSD CVS Sync
131 - markus@cvs.openbsd.org 2002/04/23 12:54:10
132 [version.h]
133 3.2.1
cdc4fc39 134 - djm@cvs.openbsd.org 2002/04/23 22:16:29
135 [sshd.c]
136 Improve error message; ok markus@ stevesk@
8c1f70d8 137
520b41b2 13820020423
a2572aa7 139 - (stevesk) [acconfig.h configure.ac session.c] LOGIN_NO_ENDOPT for HP-UX
7615ed55 140 - (stevesk) [acconfig.h] NEED_IN_SYSTM_H unused
744d788b 141 - (markus) OpenBSD CVS Sync
142 - markus@cvs.openbsd.org 2002/04/23 12:58:26
143 [radix.c]
144 send complete ticket; semerad@ss1000.ms.mff.cuni.cz
3b307f85 145 - (djm) Trim ChangeLog to include only post-3.1 changes
48862e93 146 - (djm) Update RPM spec file versions
03dd62aa 147 - (djm) Redhat spec enables KrbV by default
1352689f 148 - (djm) Applied OpenSC smartcard updates from Markus &
149 Antti Tapaninen <aet@cc.hut.fi>
150 - (djm) Define BROKEN_REALPATH for AIX, patch from
151 Antti Tapaninen <aet@cc.hut.fi>
0e8f4eba 152 - (djm) Bug #214: Fix utmp for Irix (don't strip "tty"). Patch from
153 Kevin Taylor <no@nowhere.org> (??) via Philipp Grau
154 <phgrau@zedat.fu-berlin.de>
2805b943 155 - (djm) Bug #213: Simplify CMSG_ALIGN macros to avoid symbol clashes.
156 Reported by Doug Manton <dmanton@emea.att.com>
520b41b2 157 - (djm) Bug #222: Fix tests for getaddrinfo on OSF/1. Spotted by
158 Robert Urban <urban@spielwiese.de>
52f1ccb2 159 - (djm) Bug #206 - blibpath isn't always needed for AIX ld, avoid
160 sizeof(long long int) == 4 breakage. Patch from Matthew Clarke
161 <Matthew_Clarke@mindlink.bc.ca>
ad200abb 162 - (djm) Make privsep work with PAM (still experimental)
9b26c596 163 - (djm) OpenBSD CVS Sync
164 - deraadt@cvs.openbsd.org 2002/04/20 09:02:03
165 [servconf.c]
166 No, afs requires explicit enabling
167 - markus@cvs.openbsd.org 2002/04/20 09:14:58
168 [bufaux.c bufaux.h]
169 add buffer_{get,put}_short
3b358a0e 170 - markus@cvs.openbsd.org 2002/04/20 09:17:19
171 [radix.c]
172 rewrite using the buffer_* API, fixes overflow; ok deraadt@
22d0faff 173 - stevesk@cvs.openbsd.org 2002/04/21 16:19:27
174 [sshd.8 sshd_config]
175 document default AFSTokenPassing no; ok deraadt@
134c552b 176 - stevesk@cvs.openbsd.org 2002/04/21 16:25:06
177 [sshconnect1.c]
178 spelling in error message; ok markus@
afb8fdb4 179 - markus@cvs.openbsd.org 2002/04/22 06:15:47
180 [radix.c]
181 fix check for overflow
eadc806d 182 - markus@cvs.openbsd.org 2002/04/22 16:16:53
183 [servconf.c sshd.8 sshd_config]
184 do not auto-enable KerberosAuthentication; ok djm@, provos@, deraadt@
e0ae8728 185 - markus@cvs.openbsd.org 2002/04/22 21:04:52
186 [channels.c clientloop.c clientloop.h ssh.c]
187 request reply (success/failure) for -R style fwd in protocol v2,
188 depends on ordered replies.
189 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=215; ok provos@
520b41b2 190
ac033f8c 19120020421
192 - (tim) [entropy.c.] Portability fix for SCO Unix 3.2v4.x (SCO OSR 3.0).
fdff2c55 193 entropy.c needs seteuid(getuid()) for the setuid(original_uid) to
194 succeed. Patch by gert@greenie.muc.de. This fixes one part of Bug 208
ac033f8c 195
6dc63b4f 19620020418
197 - (djm) Avoid SIGCHLD breakage when run from rsync. Fix from
198 Sturle Sunde <sturle.sunde@usit.uio.no>
199
230c7a8f 20020020417
fdff2c55 201 - (djm) Tell users to configure /dev/random support into OpenSSL in
202 INSTALL
1a7220c2 203 - (djm) Fix .Nm in mdoc2man.pl from pspencer@fields.utoronto.ca
8d184c09 204 - (tim) [configure.ac] Issue warning on --with-default-path=/some_path
205 if LOGIN_CAP is enabled. Report & testing by Tuc <tuc@ttsg.com>
230c7a8f 206
9ae68cce 20720020415
fdff2c55 208 - (djm) Unbreak "make install". Fix from Darren Tucker
209 <dtucker@zip.com.au>
4e51cc76 210 - (stevesk) bsd-cygwin_util.[ch] BSD license from Corinna Vinschen
1b06e75e 211 - (tim) [configure.ac] add tests for recvmsg and sendmsg.
212 [monitor_fdpass.c] add checks for HAVE_SENDMSG and HAVE_RECVMSG for
213 systems that HAVE_ACCRIGHTS_IN_MSGHDR but no recvmsg or sendmsg.
9ae68cce 214
f6e6303d 21520020414
216 - (djm) ssh-rand-helper improvements
217 - Add commandline debugging options
218 - Don't write binary data if stdout is a tty (use hex instead)
219 - Give it a manpage
cbe5b851 220 - (djm) Random number collection doc fixes from Ben
f6e6303d 221
12928e80 22220020413
223 - (djm) Add KrbV support patch from Simon Wilkinson <simon@sxw.org.uk>
224
40b74b3f 22520020412
226 - (stevesk) [auth-sia.[ch]] add BSD license from Chris Adams
f95c8ce8 227 - (tim) [configure.ac] add <sys/types.h> to msghdr tests. Change -L
228 to -h on testing for /bin being symbolic link
e2c9b9e3 229 - (bal) Mistaken in Cygwin scripts for ssh starting. Patch by
230 Corinna Vinschen <vinschen@redhat.com>
e75b61db 231 - (bal) disable privsep if no MAP_ANON. We can re-enable it
232 after the release when we can do more testing.
40b74b3f 233
65b91c76 23420020411
235 - (stevesk) [auth-sia.c] cleanup
7b0737a4 236 - (tim) [acconfig.h defines.h includes.h] put includes in includes.h and
237 defines in defines.h [rijndael.c openbsd-compat/fake-socket.h
238 openbsd-compat/inet_aton.c] include "includes.h" instead of "config.h"
239 ok stevesk@
65b91c76 240
ca8aba40 24120020410
f1af2dbf 242 - (stevesk) [configure.ac monitor.c] HAVE_SOCKETPAIR
ca8aba40 243 - (stevesk) [auth-sia.c] compile fix Chris Adams <cmadams@hiwaay.net>
d8ff54e6 244 - (bal) OpenBSD CVS Sync
245 - markus@cvs.openbsd.org 2002/04/10 08:21:47
246 [auth1.c compat.c compat.h]
fdff2c55 247 strip '@' from username only for KerbV and known broken clients,
248 bug #204
f14a5033 249 - markus@cvs.openbsd.org 2002/04/10 08:56:01
250 [version.h]
251 OpenSSH_3.2
252 - Added p1 to idenify Portable release version.
ca8aba40 253
46c8e0f6 25420020408
255 - (bal) Minor OpenSC updates. Fix up header locations and update
256 README.smartcard provided by Juha Yrjölä <jyrjola@cc.hut.fi>
257
7176df4f 25820020407
259 - (stevesk) HAVE_CONTROL_IN_MSGHDR; not used right now.
260 Future: we may want to test if fd passing works correctly.
84071420 261 - (stevesk) [monitor_fdpass.c] fatal() for UsePrivilegeSeparation=yes
262 and no fd passing support.
1e8f8c5b 263 - (stevesk) HAVE_MMAP and HAVE_SYS_MMAN_H and use them in
264 monitor_mm.c
a90419b8 265 - (stevesk) remove configure support for poll.h; it was removed
266 from sshd.c a long time ago.
9a0fbcb3 267 - (stevesk) --with-privsep-user; default sshd
1bf74eac 268 - (stevesk) wrap munmap() with HAVE_MMAP also.
7176df4f 269
b17d6a47 27020020406
271 - (djm) Typo in Suse SPEC file. Fix from Carsten Grohmann
272 <carsten.grohmann@dr-baldeweg.de>
23aa1237 273 - (bal) Added MAP_FAILED to allow AIX and Trusted HP to compile.
af2b3cd9 274 - (bal) OpenBSD CVS Sync
275 - djm@cvs.openbsd.org 2002/04/06 00:30:08
276 [sftp-client.c]
1d6d408a 277 Fix occasional corruption on upload due to bad reuse of request
278 id, spotted by chombier@mac.com; ok markus@
39f9599a 279 - mouring@cvs.openbsd.org 2002/04/06 18:24:09
280 [scp.c]
281 Fixes potental double // within path.
282 http://bugzilla.mindrot.org/show_bug.cgi?id=76
5866adb0 283 - (bal) Slight update to OpenSC support. Better version checking. patch
284 by Juha Yrjölä <jyrjola@cc.hut.fi>
b5171f93 285 - (bal) Revered out of runtime IRIX detection of joblimits. Code is
286 incomplete.
419e4769 287 - (bal) Quiet down configure.ac if /bin/test does not exist.
14f35963 288 - (bal) We no longer use atexit()/xatexit()/on_exit()
b17d6a47 289
295c8801 29020020405
291 - (bal) Patch for OpenSC SmartCard library; ok markus@; patch by
292 Juha Yrjölä <jyrjola@cc.hut.fi>
293 - (bal) Minor documentation update to reflect smartcard library
294 support changes.
ab33e02a 295 - (bal) Too many <sys/queue.h> issues. Remove all workarounds and
296 using internal version only.
d4c6ddff 297 - (bal) OpenBSD CVS Sync
298 - stevesk@cvs.openbsd.org 2002/04/05 20:56:21
299 [sshd.8]
300 clarify sshrc some and handle X11UseLocalhost=yes; ok markus@
295c8801 301
fde58bd4 30220020404
303 - (stevesk) [auth-pam.c auth-pam.h auth-passwd.c auth-sia.c auth-sia.h
304 auth1.c auth2.c] PAM, OSF_SIA password auth cleanup; from djm.
bf03f2da 305 - (bal) OpenBSD CVS Sync
306 - markus@cvs.openbsd.org 2002/04/03 09:26:11
307 [cipher.c myproposal.h]
308 re-add rijndael-cbc@lysator.liu.se for MacSSH; ash@lab.poc.net
fde58bd4 309
ca7e8e1e 31020020402
311 - (bal) Hand Sync of scp.c (reverted to upstream code)
312 - deraadt@cvs.openbsd.org 2002/03/30 17:45:46
313 [scp.c]
314 stretch banners
c572a874 315 - (bal) CVS ID sync of uidswap.c
783dbbdc 316 - (bal) OpenBSD CVS Sync (now for the real sync)
317 - markus@cvs.openbsd.org 2002/03/27 22:21:45
318 [ssh-keygen.c]
fdff2c55 319 try to import keys with extra trailing === (seen with ssh.com <
320 2.0.12)
49a34e84 321 - markus@cvs.openbsd.org 2002/03/28 15:34:51
322 [session.c]
323 do not call record_login twice (for use_privsep)
ffbf7323 324 - markus@cvs.openbsd.org 2002/03/29 18:59:32
325 [session.c session.h]
fdff2c55 326 retrieve last login time before the pty is allocated, store per
327 session
3bc822df 328 - stevesk@cvs.openbsd.org 2002/03/29 19:16:22
329 [sshd.8]
330 RSA key modulus size minimum 768; ok markus@
82b00264 331 - stevesk@cvs.openbsd.org 2002/03/29 19:18:33
332 [auth-rsa.c ssh-rsa.c ssh.h]
333 make RSA modulus minimum #define; ok markus@
8c38e88b 334 - markus@cvs.openbsd.org 2002/03/30 18:51:15
335 [monitor.c serverloop.c sftp-int.c sftp.c sshd.c]
336 check waitpid for EINTR; based on patch from peter@ifm.liu.se
92053302 337 - markus@cvs.openbsd.org 2002/04/01 22:02:16
338 [sftp-client.c]
339 20480 is an upper limit for older server
9c74a24d 340 - markus@cvs.openbsd.org 2002/04/01 22:07:17
341 [sftp-client.c]
342 fallback to stat if server does not support lstat
b745a2f2 343 - markus@cvs.openbsd.org 2002/04/02 11:49:39
344 [ssh-agent.c]
345 check $SHELL for -k and -d, too;
346 http://bugzilla.mindrot.org/show_bug.cgi?id=199
b69145c2 347 - markus@cvs.openbsd.org 2002/04/02 17:37:48
348 [sftp.c]
349 always call log_init()
c9336aed 350 - markus@cvs.openbsd.org 2002/04/02 20:11:38
351 [ssh-rsa.c]
352 ignore SSH_BUG_SIGBLOB for ssh-rsa; #187
c895376b 353 - (bal) mispelling in uidswap.c (portable only)
ca7e8e1e 354
8b314ec9 35520020401
356 - (stevesk) [monitor.c] PAM should work again; will *not* work with
357 UsePrivilegeSeparation=yes.
3906af0f 358 - (stevesk) [auth1.c] fix password auth for protocol 1 when
359 !USE_PAM && !HAVE_OSF_SIA; merge issue.
8b314ec9 360
267e920e 36120020331
362 - (tim) [configure.ac] use /bin/test -L to work around broken builtin on
363 Solaris 8
ef077e37 364 - (tim) [sshconnect2.c] change uint32_t to u_int32_t
267e920e 365
0461c355 36620020330
367 - (stevesk) [configure.ac] remove header check for sys/ttcompat.h
368 bug 167
369
dd466ff8 37020020327
371 - (bal) 'pw' should be 'authctxt->pw' in auth1.c spotted by
372 kent@lysator.liu.se
17f5e68a 373 - (bal) OpenBSD CVS Sync
374 - markus@cvs.openbsd.org 2002/03/26 11:34:49
375 [ssh.1 sshd.8]
376 update to recent drafts
5fb274c1 377 - markus@cvs.openbsd.org 2002/03/26 11:37:05
378 [ssh.c]
379 update Copyright
19f40184 380 - markus@cvs.openbsd.org 2002/03/26 15:23:40
381 [bufaux.c]
382 do not talk about packets in bufaux
7341fad9 383 - rees@cvs.openbsd.org 2002/03/26 18:46:59
384 [scard.c]
fdff2c55 385 try_AUT0 in read_pubkey too, for those paranoid few who want to
386 acl 'sh'
6c112aca 387 - markus@cvs.openbsd.org 2002/03/26 22:50:39
388 [channels.h]
389 CHANNEL_EFD_OUTPUT_ACTIVE is false for CHAN_CLOSE_RCVD, too
52103b10 390 - markus@cvs.openbsd.org 2002/03/26 23:13:03
391 [auth-rsa.c]
392 disallow RSA keys < 768 for protocol 1, too (rhosts-rsa and rsa auth)
76bf34f1 393 - markus@cvs.openbsd.org 2002/03/26 23:14:51
394 [kex.c]
395 generate a new cookie for each SSH2_MSG_KEXINIT message we send out
300e01c4 396 - mouring@cvs.openbsd.org 2002/03/27 11:45:42
397 [monitor.c]
398 monitor_allowed_key() returns int instead of pointer. ok markus@
399
eb4652f4 40020020325
401 - (stevesk) import OpenBSD <sys/tree.h> as "openbsd-compat/tree.h"
47c36e5b 402 - (bal) OpenBSD CVS Sync
403 - stevesk@cvs.openbsd.org 2002/03/23 20:57:26
404 [sshd.c]
405 setproctitle() after preauth child; ok markus@
d452ec1a 406 - markus@cvs.openbsd.org 2002/03/24 16:00:27
407 [serverloop.c]
408 remove unused debug
a49dfdec 409 - markus@cvs.openbsd.org 2002/03/24 16:01:13
410 [packet.c]
411 debug->debug3 for extra padding
5b0d7dc1 412 - stevesk@cvs.openbsd.org 2002/03/24 17:27:03
413 [kexgex.c]
414 typo; ok markus@
d4355079 415 - stevesk@cvs.openbsd.org 2002/03/24 17:53:16
416 [monitor_fdpass.c]
417 minor cleanup and more error checking; ok markus@
9fc0407d 418 - markus@cvs.openbsd.org 2002/03/24 18:05:29
419 [scard.c]
420 we need to figure out AUT0 for sc_private_encrypt, too
38c1c52a 421 - stevesk@cvs.openbsd.org 2002/03/24 23:20:00
422 [monitor.c]
423 remove "\n" from fatal()
159897f3 424 - markus@cvs.openbsd.org 2002/03/25 09:21:13
425 [auth-rsa.c]
426 return 0 (not NULL); tomh@po.crl.go.jp
6f33c8cd 427 - markus@cvs.openbsd.org 2002/03/25 09:25:06
428 [auth-rh-rsa.c]
429 rm bogus comment
0659cace 430 - markus@cvs.openbsd.org 2002/03/25 17:34:27
431 [scard.c scard.h ssh-agent.c ssh-keygen.c ssh.c]
432 change sc_get_key to sc_get_keys and hide smartcard details in scard.c
3074b20c 433 - stevesk@cvs.openbsd.org 2002/03/25 20:12:10
434 [monitor_mm.c monitor_wrap.c]
435 ssize_t args use "%ld" and cast to (long)
436 size_t args use "%lu" and cast to (u_long)
437 ok markus@ and thanks millert@
1c2deed1 438 - markus@cvs.openbsd.org 2002/03/25 21:04:02
439 [ssh.c]
440 simplify num_identity_files handling
d2296ed7 441 - markus@cvs.openbsd.org 2002/03/25 21:13:51
442 [channels.c channels.h compat.c compat.h nchan.c]
fdff2c55 443 don't send stderr data after EOF, accept this from older known
444 (broken) sshd servers only, fixes
445 http://bugzilla.mindrot.org/show_bug.cgi?id=179
8e4fd4a1 446 - stevesk@cvs.openbsd.org 2002/03/26 03:24:01
447 [monitor.h monitor_fdpass.h monitor_mm.h monitor_wrap.h]
448 $OpenBSD$
eb4652f4 449
1178e8db 45020020324
451 - (stevesk) [session.c] disable LOGIN_NEEDS_TERM until we are sure
452 it can be removed. only used on solaris. will no longer compile with
453 privsep shuffling.
454
6f34652e 45520020322
456 - (stevesk) HAVE_ACCRIGHTS_IN_MSGHDR configure support
7b18c353 457 - (stevesk) [monitor.c monitor_wrap.c] #ifdef HAVE_PW_CLASS_IN_PASSWD
c921ee00 458 - (stevesk) configure and cpp __FUNCTION__ gymnastics to handle nielsisms
dc90b259 459 - (stevesk) [monitor_fdpass.c] support for access rights style file
460 descriptor passing
f7ed12f1 461 - (stevesk) [auth2.c] merge cleanup/sync
cfadc43b 462 - (stevesk) [defines.h] hp-ux 11 has ancillary data style fd passing, but
463 is missing CMSG_LEN() and CMSG_SPACE() macros.
cc58061e 464 - (stevesk) [defines.h] #define MAP_ANON MAP_ANONYMOUS for HP-UX; other
465 platforms may need this--I'm not sure. mmap() issues will need to be
466 addressed further.
05976246 467 - (tim) [cipher.c] fix problem with OpenBSD sync
9242fa1b 468 - (stevesk) [LICENCE] OpenBSD sync
6f34652e 469
8627f3e0 47020020321
471 - (bal) OpenBSD CVS Sync
472 - itojun@cvs.openbsd.org 2002/03/08 06:10:16
473 [sftp-client.c]
474 printf type mismatch
bfa7f960 475 - itojun@cvs.openbsd.org 2002/03/11 03:18:49
476 [sftp-client.c]
477 correct type mismatches (u_int64_t != unsigned long long)
5fc7dbc9 478 - itojun@cvs.openbsd.org 2002/03/11 03:19:53
479 [sftp-client.c]
480 indent
150a5466 481 - markus@cvs.openbsd.org 2002/03/14 15:24:27
482 [sshconnect1.c]
fdff2c55 483 don't trust size sent by (rogue) server; noted by
484 s.esser@e-matters.de
4f08e98d 485 - markus@cvs.openbsd.org 2002/03/14 16:38:26
486 [sshd.c]
487 split out ssh1 session key decryption; ok provos@
46f1eece 488 - markus@cvs.openbsd.org 2002/03/14 16:56:33
489 [auth-rh-rsa.c auth-rsa.c auth.h]
490 split auth_rsa() for better readability and privsep; ok provos@
c390a3c8 491 - itojun@cvs.openbsd.org 2002/03/15 11:00:38
492 [auth.c]
493 fix file type checking (use S_ISREG). ok by markus
bcb68a8f 494 - markus@cvs.openbsd.org 2002/03/16 11:24:53
495 [compress.c]
496 skip inflateEnd if inflate fails; ok provos@
3e65880e 497 - markus@cvs.openbsd.org 2002/03/16 17:22:09
498 [auth-rh-rsa.c auth.h]
499 split auth_rhosts_rsa(), ok provos@
bb15f28b 500 - stevesk@cvs.openbsd.org 2002/03/16 17:41:25
501 [auth-krb5.c]
502 BSD license. from Daniel Kouril via Dug Song. ok markus@
443fa1cd 503 - provos@cvs.openbsd.org 2002/03/17 20:25:56
504 [auth.c auth.h auth1.c auth2.c]
fdff2c55 505 getpwnamallow returns struct passwd * only if user valid;
506 okay markus@
1b34c1b3 507 - provos@cvs.openbsd.org 2002/03/18 01:12:14
508 [auth.h auth1.c auth2.c sshd.c]
509 have the authentication functions return the authentication context
510 and then do_authenticated; okay millert@
9d0844e3 511 - dugsong@cvs.openbsd.org 2002/03/18 01:30:10
512 [auth-krb4.c]
513 set client to NULL after xfree(), from Rolf Braun
514 <rbraun+ssh@andrew.cmu.edu>
1836f69f 515 - provos@cvs.openbsd.org 2002/03/18 03:41:08
516 [auth.c session.c]
517 move auth_approval into getpwnamallow with help from millert@
bf8269a9 518 - markus@cvs.openbsd.org 2002/03/18 17:13:15
519 [cipher.c cipher.h]
520 export/import cipher states; needed by ssh-privsep
e050d348 521 - markus@cvs.openbsd.org 2002/03/18 17:16:38
522 [packet.c packet.h]
523 export/import cipher state, iv and ssh2 seqnr; needed by ssh-privsep
d0074658 524 - markus@cvs.openbsd.org 2002/03/18 17:23:31
525 [key.c key.h]
526 add key_demote() for ssh-privsep
b625ad75 527 - provos@cvs.openbsd.org 2002/03/18 17:25:29
528 [bufaux.c bufaux.h]
529 buffer_skip_string and extra sanity checking; needed by ssh-privsep
3d6fc2f8 530 - provos@cvs.openbsd.org 2002/03/18 17:31:54
531 [compress.c]
532 export compression streams for ssh-privsep
1853d1ef 533 - provos@cvs.openbsd.org 2002/03/18 17:50:31
9759df31 534 [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c]
535 [auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c]
536 [kexgex.c servconf.c]
537 [session.h servconf.h serverloop.c session.c sshd.c]
538 integrate privilege separated openssh; its turned off by default
539 for now. work done by me and markus@
ce19ff48 540 - provos@cvs.openbsd.org 2002/03/18 17:53:08
541 [sshd.8]
542 credits for privsep
70aa9ff4 543 - provos@cvs.openbsd.org 2002/03/18 17:59:09
544 [sshd.8]
545 document UsePrivilegeSeparation
73fbf637 546 - stevesk@cvs.openbsd.org 2002/03/18 23:52:51
547 [servconf.c]
548 UnprivUser/UnprivGroup usable now--specify numeric user/group; ok
549 provos@
1c352e97 550 - stevesk@cvs.openbsd.org 2002/03/19 03:03:43
551 [pathnames.h servconf.c servconf.h sshd.c]
552 _PATH_PRIVSEP_CHROOT_DIR; ok provos@
fffbaee2 553 - stevesk@cvs.openbsd.org 2002/03/19 05:23:08
554 [sshd.8]
555 Banner has no default.
702b7dd8 556 - mpech@cvs.openbsd.org 2002/03/19 06:32:56
557 [sftp-int.c]
558 use xfree() after xstrdup().
559
560 markus@ ok
51aeb639 561 - markus@cvs.openbsd.org 2002/03/19 10:35:39
562 [auth-options.c auth.h session.c session.h sshd.c]
563 clean up prototypes
762715ce 564 - markus@cvs.openbsd.org 2002/03/19 10:49:35
9759df31 565 [auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h]
566 [packet.c session.c sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c]
567 [sshconnect2.c sshd.c ttymodes.c]
762715ce 568 KNF whitespace
5f1f36b5 569 - markus@cvs.openbsd.org 2002/03/19 14:27:39
570 [auth.c auth1.c auth2.c]
571 make getpwnamallow() allways call pwcopy()
06bea668 572 - markus@cvs.openbsd.org 2002/03/19 15:31:47
573 [auth.c]
574 check for NULL; from provos@
2ea6de2b 575 - stevesk@cvs.openbsd.org 2002/03/20 19:12:25
576 [servconf.c servconf.h ssh.h sshd.c]
577 for unprivileged user, group do:
578 pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@
256debd0 579 - stevesk@cvs.openbsd.org 2002/03/20 21:08:08
580 [sshd.c]
581 strerror() on chdir() fail; ok provos@
edfb66cb 582 - markus@cvs.openbsd.org 2002/03/21 10:21:20
583 [ssh-add.c]
584 ignore errors for nonexisting default keys in ssh-add,
585 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158
c53c54c2 586 - jakob@cvs.openbsd.org 2002/03/21 15:17:26
587 [clientloop.c ssh.1]
588 add built-in command line for adding new port forwardings on the fly.
589 based on a patch from brian wellington. ok markus@.
7649bbfe 590 - markus@cvs.openbsd.org 2002/03/21 16:38:06
591 [scard.c]
592 make compile w/ openssl 0.9.7
b9f62352 593 - markus@cvs.openbsd.org 2002/03/21 16:54:53
594 [scard.c scard.h ssh-keygen.c]
595 move key upload to scard.[ch]
596 - markus@cvs.openbsd.org 2002/03/21 16:57:15
597 [scard.c]
598 remove const
39ac8430 599 - markus@cvs.openbsd.org 2002/03/21 16:58:13
600 [clientloop.c]
601 remove unused
514b94dc 602 - rees@cvs.openbsd.org 2002/03/21 18:08:15
603 [scard.c]
604 In sc_put_key(), sc_reader_id should be id.
ce1ba33a 605 - markus@cvs.openbsd.org 2002/03/21 20:51:12
606 [sshd_config]
607 add privsep (off)
324bf712 608 - markus@cvs.openbsd.org 2002/03/21 21:23:34
609 [sshd.c]
610 add privsep_preauth() and remove 1 goto; ok provos@
86c4f63d 611 - rees@cvs.openbsd.org 2002/03/21 21:54:34
612 [scard.c scard.h ssh-keygen.c]
613 Add PIN-protection for secret key.
76139bd8 614 - rees@cvs.openbsd.org 2002/03/21 22:44:05
615 [authfd.c authfd.h ssh-add.c ssh-agent.c ssh.c]
616 Add PIN-protection for secret key.
ec9b7086 617 - markus@cvs.openbsd.org 2002/03/21 23:07:37
618 [clientloop.c]
619 remove unused, sync w/ cmdline patch in my tree.
ce1ba33a 620
81dadca3 62120020317
fdff2c55 622 - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is
623 wanted, warn if directory does not exist. Put system directories in
624 front of PATH for finding entorpy commands.
43e41c2c 625 - (tim) [contrib/aix/buildbff.sh contrib/aix/inventory.sh] AIX package
626 build fixes. Patch by Darren Tucker <dtucker@zip.com.au>
627 [contrib/solaris/buildpkg.sh] add missing dirs to SYSTEM_DIR. Have
628 postinstall check for $piddir and add if necessary.
81dadca3 629
e4abf75b 63020020311
631 - (tim) [contrib/solaris/buildpkg.sh, contrib/solaris/README] Updated to
632 build on all platforms that support SVR4 style package tools. Now runs
633 from build dir. Parts are based on patches from Antonio Navarro, and
634 Darren Tucker.
635
fb8f3dc9 63620020308
a068d86f 637 - (djm) Revert bits of Markus' OpenSSL compat patch which was
638 accidentally committed.
639 - (djm) Add Markus' patch for compat wih OpenSSL < 0.9.6.
640 Known issue: Blowfish for SSH1 does not work
dc254471 641 - (stevesk) entropy.c: typo in debug message
633151a3 642 - (djm) ssh-keygen -i needs seeded RNG; report from markus@
fb8f3dc9 643
0b202697 644$Id$
This page took 0.39925 seconds and 5 git commands to generate.