]>
Commit | Line | Data |
---|---|---|
d0104542 | 1 | 20030110 |
2 | - (djm) Enable new setproctitle emulation for Linux, AIX and HP/UX. More | |
3 | systems may be added later. | |
9a36208d | 4 | - (djm) OpenBSD CVS Sync |
5 | - djm@cvs.openbsd.org 2003/01/08 23:53:26 | |
6 | [sftp.1 sftp.c sftp-int.c sftp-int.h] | |
7 | Cleanup error handling for batchmode | |
8 | Allow blank lines and comments in input | |
9 | Ability to suppress abort on error in batchmode ("-put blah") | |
10 | Fixes mindrot bug #452; markus@ ok | |
b65c3807 | 11 | - fgsch@cvs.openbsd.org 2003/01/10 08:19:07 |
12 | [scp.c sftp.1 sftp.c sftp-client.c sftp-int.c] | |
13 | sftp progress meter support. | |
14 | original diffs by Nils Nordman <nino at nforced dot com> via | |
15 | markus@, merged to -current by me, djm@ ok. | |
bf0bf24b | 16 | - djm@cvs.openbsd.org 2003/01/10 08:48:15 |
17 | [sftp-client.c] | |
18 | Simplify and avoid redundancy in packet send and receive | |
19 | functions; ok fgs@ | |
25a6efd8 | 20 | - djm@cvs.openbsd.org 2003/01/10 10:29:35 |
21 | [scp.c] | |
22 | Don't ftruncate after write error, creating sparse files of | |
23 | incorrect length | |
24 | mindrot bug #403, reported by rusr@cup.hp.com; ok markus@ | |
d0104542 | 25 | |
7bb526ce | 26 | 20030108 |
27 | - (djm) Sync openbsd-compat/ with OpenBSD -current | |
93c63b8d | 28 | - (djm) Avoid redundant xstrdup/xfree in auth2-pam.c. From Solar via markus@ |
faa483fa | 29 | - (djm) OpenBSD CVS Sync |
30 | - markus@cvs.openbsd.org 2003/01/01 18:08:52 | |
31 | [channels.c] | |
32 | move big output buffer messages to debug2 | |
bfd934b9 | 33 | - djm@cvs.openbsd.org 2003/01/06 23:51:22 |
34 | [sftp-client.c] | |
35 | Fix "get -p" download to not add user-write perm. mindrot bug #426 | |
36 | reported by gfernandez@livevault.com; ok markus@ | |
048ff12c | 37 | - fgsch@cvs.openbsd.org 2003/01/07 23:42:54 |
38 | [sftp.1] | |
39 | add version; from Nils Nordman <nino at nforced dot com> via markus@. | |
40 | markus@ ok | |
c9c462e4 | 41 | - (djm) Update README to reflect AIX's status as a well supported platform. |
42 | From dtucker@zip.com.au | |
c3690df3 | 43 | - (tim) [Makefile.in configure.ac] replace fixpath with sed script. Patch |
a2144d93 | 44 | by Mo DeJong. |
ad0279ff | 45 | - (tim) [auth.c] declare today at top of allowed_user() to keep |
46 | older compilers happy. | |
a2144d93 | 47 | - (tim) [scp.c] make compilers without long long happy. |
7bb526ce | 48 | |
e7ccd20d | 49 | 20030107 |
50 | - (djm) Bug #401: Work around Linux breakage with IPv6 mapped addresses. | |
51 | Based on fix from yoshfuji@linux-ipv6.org | |
e2ef2342 | 52 | - (djm) Bug #442: Check for and deny access to accounts with locked |
53 | passwords. Patch from dtucker@zip.com.au | |
70e7d0b0 | 54 | - (djm) Bug #26: Use local mkstemp() rather than glibc's silly one. Fixes |
55 | Can't pass KRB4 TGT passing. Fix from: jan.iven@cern.ch | |
93a9a35a | 56 | - (djm) Fix Bug #442 for PAM case |
ed05a983 | 57 | - (djm) Bug #110: bogus error messages in lastlog_get_entry(). Fix based |
58 | on one by peak@argo.troja.mff.cuni.cz | |
63cada0a | 59 | - (djm) Bug #111: Run syslog and stderr logging through strnvis to eliminate |
60 | nasties. Report from peak@argo.troja.mff.cuni.cz | |
99f4fb69 | 61 | - (djm) Bug #178: On AIX /etc/nologin wasnt't shown to users. Fix from |
62 | Ralf.Wenk@fh-karlsruhe.de and dtucker@zip.com.au | |
b57c8e20 | 63 | - (djm) Fix my fix of the fix for the Bug #442 for PAM case. Spotted by |
64 | dtucker@zip.com.au. Reorder for clarity too. | |
e7ccd20d | 65 | |
9300be60 | 66 | 20030103 |
67 | - (djm) Bug #461: ssh-copy-id fails with no arguments. Patch from | |
68 | cjwatson@debian.org | |
9746ee4b | 69 | - (djm) Bug #460: Filling utmp[x]->ut_addr_v6 if present. Patch from |
70 | cjwatson@debian.org | |
17ed08c5 | 71 | - (djm) Bug #446: Set LOGIN env var to pw_name on AIX. Patch from |
72 | mii@ornl.gov | |
73 | ||
d4ac26ed | 74 | 20030101 |
75 | - (stevesk) [session.c sshlogin.c sshlogin.h] complete portable | |
76 | parts of pass addrlen with sockaddr * fix. | |
77 | from Hajimu UMEMOTO <ume@FreeBSD.org> | |
78 | ||
378d9956 | 79 | 20021222 |
80 | - (bal) OpenBSD CVS Sync | |
81 | - fgsch@cvs.openbsd.org 2002/11/15 10:03:09 | |
82 | [authfile.c] | |
83 | lseek(2) may return -1 when getting the public/private key lenght. | |
84 | Simplify the code and check for errors using fstat(2). | |
85 | ||
86 | Problem reported by Mauricio Sanchez, markus@ ok. | |
3c93c917 | 87 | - markus@cvs.openbsd.org 2002/11/18 16:43:44 |
88 | [clientloop.c] | |
89 | don't overwrite SIG{INT,QUIT,TERM} handler if set to SIG_IGN; | |
90 | e.g. if ssh is used for backup; report Joerg Schilling; ok millert@ | |
35efb24c | 91 | - markus@cvs.openbsd.org 2002/11/21 22:22:50 |
92 | [dh.c] | |
93 | debug->debug2 | |
a77673cc | 94 | - markus@cvs.openbsd.org 2002/11/21 22:45:31 |
95 | [cipher.c kex.c packet.c sshconnect.c sshconnect2.c] | |
96 | debug->debug2, unify debug messages | |
b77a87e5 | 97 | - deraadt@cvs.openbsd.org 2002/11/21 23:03:51 |
98 | [auth-krb5.c auth1.c hostfile.h monitor_wrap.c sftp-client.c sftp-int.c ssh-add.c ssh-rsa.c | |
99 | sshconnect.c] | |
100 | KNF | |
556f1c05 | 101 | - markus@cvs.openbsd.org 2002/11/21 23:04:33 |
83bbc162 | 102 | [ssh.c] |
103 | debug->debug2 | |
556f1c05 | 104 | - stevesk@cvs.openbsd.org 2002/11/24 21:46:24 |
eef52fa7 | 105 | [ssh-keysign.8] |
106 | typo: "the the" | |
6d58d81e | 107 | - wcobb@cvs.openbsd.org 2002/11/26 00:45:03 |
108 | [scp.c ssh-keygen.c] | |
109 | Remove unnecessary fflush(stderr) calls, stderr is unbuffered by default. | |
110 | ok markus@ | |
556f1c05 | 111 | - stevesk@cvs.openbsd.org 2002/11/26 02:35:30 |
63baa058 | 112 | [ssh-keygen.1] |
113 | remove outdated statement; ok markus@ deraadt@ | |
649bb60b | 114 | - stevesk@cvs.openbsd.org 2002/11/26 02:38:54 |
115 | [canohost.c] | |
116 | KNF, comment and error message repair; ok markus@ | |
15748b4d | 117 | - markus@cvs.openbsd.org 2002/11/27 17:53:35 |
118 | [scp.c sftp.c ssh.c] | |
119 | allow usernames with embedded '@', e.g. scp user@vhost@realhost:file /tmp; | |
120 | http://bugzilla.mindrot.org/show_bug.cgi?id=447; ok mouring@, millert@ | |
fe661d8f | 121 | - stevesk@cvs.openbsd.org 2002/12/04 04:36:47 |
122 | [session.c] | |
123 | remove xauth entries before add; PR 2994 from janjaap@stack.nl. | |
124 | ok markus@ | |
a0a14bcd | 125 | - markus@cvs.openbsd.org 2002/12/05 11:08:35 |
126 | [scp.c] | |
127 | use roundup() similar to rcp/util.c and avoid problems with strange | |
128 | filesystem block sizes, noted by tjr@freebsd.org; ok djm@ | |
556f1c05 | 129 | - djm@cvs.openbsd.org 2002/12/06 05:20:02 |
2ea16b0b | 130 | [sftp.1] |
131 | Fix cut'n'paste error, spotted by matthias.riese@b-novative.de; ok deraadt@ | |
978ebf99 | 132 | - millert@cvs.openbsd.org 2002/12/09 16:50:30 |
133 | [ssh.c] | |
134 | Avoid setting optind to 0 as GNU getopt treats that like we do optreset. | |
135 | markus@ OK | |
32214c88 | 136 | - markus@cvs.openbsd.org 2002/12/10 08:56:00 |
137 | [session.c] | |
138 | Make sure $SHELL points to the shell from the password file, even if shell | |
139 | is overridden from login.conf; bug#453; semen at online.sinor.ru; ok millert@ | |
48f636b2 | 140 | - markus@cvs.openbsd.org 2002/12/10 19:26:50 |
141 | [packet.c] | |
142 | move tos handling to packet_set_tos; ok provos/henning/deraadt | |
9e637910 | 143 | - markus@cvs.openbsd.org 2002/12/10 19:47:14 |
144 | [packet.c] | |
145 | static | |
6226a8f8 | 146 | - markus@cvs.openbsd.org 2002/12/13 10:03:15 |
147 | [channels.c misc.c sshconnect2.c] | |
148 | cleanup debug messages, more useful information for the client user. | |
556f1c05 | 149 | - markus@cvs.openbsd.org 2002/12/13 15:20:52 |
150 | [scp.c] | |
151 | 1) include stalling time in total time | |
152 | 2) truncate filenames to 45 instead of 20 characters | |
153 | 3) print rate instead of progress bar, no more stars | |
154 | 4) scale output to tty width | |
155 | based on a patch from Niels; ok fries@ lebel@ fgs@ millert@ | |
3075ac59 | 156 | - (bal) [msg.c msg.h scp.c ssh-keysign.c sshconnect2.c] Resync CVS IDs since |
157 | we already did s/msg_send/ssh_msg_send/ | |
378d9956 | 158 | |
a76550cf | 159 | 20021205 |
160 | - (djm) PERL-free fixpaths from stuge-openssh-unix-dev@cdy.org | |
161 | ||
d9a4e55b | 162 | 20021122 |
163 | - (tim) [configure.ac] fix STDPATH test for IRIX. First reported by | |
164 | advax@triumf.ca. This type of solution tested by <herb@sgi.com> | |
165 | ||
f825dbf4 | 166 | 20021113 |
167 | - (tim) [configure.ac] remove unused variables no_libsocket and no_libnsl | |
168 | ||
17d429bb | 169 | 20021111 |
170 | - (tim) [contrib/solaris/opensshd.in] add umask 022 so sshd.pid is | |
171 | not world writable. | |
172 | ||
c9826b28 | 173 | 20021109 |
174 | - (bal) OpenBSD CVS Sync | |
175 | - itojun@cvs.openbsd.org 2002/10/16 14:31:48 | |
176 | [sftp-common.c] | |
177 | 64bit pedant. %llu is "unsigned long long". markus ok | |
2fe3c2db | 178 | - markus@cvs.openbsd.org 2002/10/23 10:32:13 |
179 | [packet.c] | |
180 | use %u for u_int | |
358b576b | 181 | - markus@cvs.openbsd.org 2002/10/23 10:40:16 |
182 | [bufaux.c] | |
183 | %u for u_int | |
f6f02456 | 184 | - markus@cvs.openbsd.org 2002/11/04 10:07:53 |
185 | [auth.c] | |
186 | don't compare against pw_home if realpath fails for pw_home (seen | |
187 | on AFS); ok djm@ | |
2ccb7bde | 188 | - markus@cvs.openbsd.org 2002/11/04 10:09:51 |
189 | [packet.c] | |
190 | log before send disconnect; ok djm@ | |
39e71188 | 191 | - markus@cvs.openbsd.org 2002/11/05 19:45:20 |
192 | [monitor.c] | |
193 | handle overflows for size_t larger than u_int; siw@goneko.de, bug #425 | |
9db1a8e9 | 194 | - markus@cvs.openbsd.org 2002/11/05 20:10:37 |
195 | [sftp-client.c] | |
196 | typo; GaryF@livevault.com | |
51efad8c | 197 | - markus@cvs.openbsd.org 2002/11/07 16:28:47 |
198 | [sshd.c] | |
199 | log to stderr if -ie is given, bug #414, prj@po.cwru.edu | |
cc46e2ee | 200 | - markus@cvs.openbsd.org 2002/11/07 22:08:07 |
201 | [readconf.c readconf.h ssh-keysign.8 ssh-keysign.c] | |
202 | we cannot use HostbasedAuthentication for enabling ssh-keysign(8), | |
203 | because HostbasedAuthentication might be enabled based on the | |
204 | target host and ssh-keysign(8) does not know the remote hostname | |
205 | and not trust ssh(1) about the hostname, so we add a new option | |
206 | EnableSSHKeysign; ok djm@, report from zierke@informatik.uni-hamburg.de | |
252d1a24 | 207 | - markus@cvs.openbsd.org 2002/11/07 22:35:38 |
208 | [scp.c] | |
209 | check exit status from ssh, and exit(1) if ssh fails; bug#369; | |
210 | binder@arago.de | |
f00addc9 | 211 | - (bal) Update ssh-host-config and minor rewrite of bsd-cygwin_util.c |
212 | ntsec now default if cygwin version beginning w/ version 56. Patch | |
213 | by Corinna Vinschen <vinschen@redhat.com> | |
819d3f09 | 214 | - (bal) AIX does not log login attempts for unknown users (bug #432). |
215 | patch by dtucker@zip.com.au | |
c9826b28 | 216 | |
4e6f1c4f | 217 | 20021021 |
f0e27f3d | 218 | - (djm) Bug #400: Kill ssh-rand-helper children on timeout, patch from |
219 | dtucker@zip.com.au | |
cacd2e7a | 220 | - (djm) Bug #317: FreeBSD needs libutil.h for openpty() Report from |
221 | dirk.meyer@dinoex.sub.org | |
4e6f1c4f | 222 | |
f3e87063 | 223 | 20021015 |
224 | - (bal) Fix bug id 383 and only call loginrestrict for AIX if not root. | |
08412d26 | 225 | - (bal) More advanced strsep test by Darren Tucker <dtucker@zip.com.au> |
f3e87063 | 226 | |
57872969 | 227 | 20021015 |
228 | - (tim) [contrib/caldera/openssh.spec] make ssh-agent setgid nobody | |
229 | ||
6af8f131 | 230 | 20021004 |
231 | - (bal) Disable post-authentication Privsep for OSF/1. It conflicts with | |
232 | SIA. | |
233 | ||
e139021d | 234 | 20021003 |
235 | - (djm) OpenBSD CVS Sync | |
236 | - markus@cvs.openbsd.org 2002/10/01 20:34:12 | |
237 | [ssh-agent.c] | |
238 | allow root to access the agent, since there is no protection from root. | |
886cd2bb | 239 | - markus@cvs.openbsd.org 2002/10/01 13:24:50 |
240 | [version.h] | |
241 | OpenSSH 3.5 | |
0855868a | 242 | - (djm) Bump RPM spec version numbers |
e987fdbe | 243 | - (djm) Bug #406: s/msg_send/ssh_msg_send/ for Mac OS X 1.2 |
e139021d | 244 | |
1d677676 | 245 | 20020930 |
9a87e2ac | 246 | - (djm) Tidy contrib/, add Makefile for GNOME passphrase dialogs, |
247 | tweak README | |
248 | - (djm) OpenBSD CVS Sync | |
249 | - mickey@cvs.openbsd.org 2002/09/27 10:42:09 | |
250 | [compat.c compat.h sshd.c] | |
251 | add a generic match for a prober, such as sie big brother; | |
252 | idea from stevesk@; markus@ ok | |
05960cf0 | 253 | - stevesk@cvs.openbsd.org 2002/09/27 15:46:21 |
254 | [ssh.1] | |
255 | clarify compression level protocol 1 only; ok markus@ deraadt@ | |
1d677676 | 256 | |
0d3d0e82 | 257 | 20020927 |
258 | - (djm) OpenBSD CVS Sync | |
259 | - markus@cvs.openbsd.org 2002/09/25 11:17:16 | |
260 | [sshd_config] | |
261 | sync LoginGraceTime with default | |
26b9a3d2 | 262 | - markus@cvs.openbsd.org 2002/09/25 15:19:02 |
263 | [sshd.c] | |
264 | typo; pilot@monkey.org | |
2db9d8aa | 265 | - markus@cvs.openbsd.org 2002/09/26 11:38:43 |
266 | [auth1.c auth.h auth-krb4.c monitor.c monitor.h monitor_wrap.c] | |
267 | [monitor_wrap.h] | |
268 | krb4 + privsep; ok dugsong@, deraadt@ | |
0d3d0e82 | 269 | |
b7c4a4cc | 270 | 20020925 |
271 | - (bal) Fix issue where successfull login does not clear failure counts | |
272 | in AIX. Patch by dtucker@zip.com.au ok by djm | |
ef51930f | 273 | - (tim) Cray fixes (bug 367) based on patch from Wendy Palm @ cray. |
274 | This does not include the deattack.c fixes. | |
b7c4a4cc | 275 | |
99443922 | 276 | 20020923 |
277 | - (djm) OpenBSD CVS Sync | |
278 | - stevesk@cvs.openbsd.org 2002/09/23 20:46:27 | |
279 | [canohost.c] | |
280 | change get_peer_ipaddr() and get_local_ipaddr() to not return NULL for | |
281 | non-sockets; fixes a problem passing NULL to snprintf(). ok markus@ | |
0082ad34 | 282 | - markus@cvs.openbsd.org 2002/09/23 22:11:05 |
283 | [monitor.c] | |
284 | only call auth_krb5 if kerberos is enabled; ok deraadt@ | |
4741e3a6 | 285 | - markus@cvs.openbsd.org 2002/09/24 08:46:04 |
286 | [monitor.c] | |
287 | only call kerberos code for authctxt->valid | |
cb11b555 | 288 | - todd@cvs.openbsd.org 2002/09/24 20:59:44 |
289 | [sshd.8] | |
290 | tweak the example $HOME/.ssh/rc script to not show on any cmdline the | |
291 | sensitive data it handles. This fixes bug # 402 as reported by | |
292 | kolya@mit.edu (Nickolai Zeldovich). | |
293 | ok markus@ and stevesk@ | |
99443922 | 294 | |
aec4cb4f | 295 | 20020923 |
296 | - (tim) [configure.ac] s/return/exit/ patch by dtucker@zip.com.au | |
297 | ||
f86b0eef | 298 | 20020922 |
299 | - (djm) OpenBSD CVS Sync | |
300 | - stevesk@cvs.openbsd.org 2002/09/19 14:53:14 | |
301 | [compat.c] | |
c7724abb | 302 | - markus@cvs.openbsd.org 2002/09/19 15:51:23 |
303 | [ssh-add.c] | |
304 | typo; cd@kalkatraz.de | |
00e842d8 | 305 | - stevesk@cvs.openbsd.org 2002/09/19 16:03:15 |
306 | [serverloop.c] | |
307 | log IP address also; ok markus@ | |
c2802d92 | 308 | - stevesk@cvs.openbsd.org 2002/09/20 18:41:29 |
309 | [auth.c] | |
310 | log illegal user here for missing privsep case (ssh2). | |
311 | this is executed in the monitor. ok markus@ | |
f86b0eef | 312 | |
792e7d2d | 313 | 20020919 |
314 | - (djm) OpenBSD CVS Sync | |
315 | - stevesk@cvs.openbsd.org 2002/09/12 19:11:52 | |
316 | [ssh-agent.c] | |
317 | %u for uid print; ok markus@ | |
da0561eb | 318 | - stevesk@cvs.openbsd.org 2002/09/12 19:50:36 |
319 | [session.c ssh.1] | |
320 | add SSH_CONNECTION and deprecate SSH_CLIENT; bug #384. ok markus@ | |
facfd613 | 321 | - stevesk@cvs.openbsd.org 2002/09/13 19:23:09 |
322 | [channels.c sshconnect.c sshd.c] | |
323 | remove use of SO_LINGER, it should not be needed. error check | |
324 | SO_REUSEADDR. fixup comments. ok markus@ | |
8bd4e2ae | 325 | - stevesk@cvs.openbsd.org 2002/09/16 19:55:33 |
326 | [session.c] | |
327 | log when _PATH_NOLOGIN exists; ok markus@ | |
e6fe1bab | 328 | - stevesk@cvs.openbsd.org 2002/09/16 20:12:11 |
329 | [sshd_config.5] | |
330 | more details on X11Forwarding security issues and threats; ok markus@ | |
f1dcc34e | 331 | - stevesk@cvs.openbsd.org 2002/09/16 22:03:13 |
332 | [sshd.8] | |
333 | reference moduli(5) in FILES /etc/moduli. | |
5c0d0e90 | 334 | - itojun@cvs.openbsd.org 2002/09/17 07:47:02 |
335 | [channels.c] | |
336 | don't quit while creating X11 listening socket. | |
337 | http://mail-index.netbsd.org/current-users/2002/09/16/0005.html | |
338 | got from portable. markus ok | |
6939bbd4 | 339 | - djm@cvs.openbsd.org 2002/09/19 01:58:18 |
340 | [ssh.c sshconnect.c] | |
341 | bugzilla.mindrot.org #223 - ProxyCommands don't exit. | |
342 | Patch from dtucker@zip.com.au; ok markus@ | |
792e7d2d | 343 | |
4f3834e8 | 344 | 20020912 |
eee2215e | 345 | - (djm) Made GNOME askpass programs return non-zero if cancel button is |
346 | pressed. | |
10a560d4 | 347 | - (djm) Added getpeereid() replacement. Properly implemented for systems |
348 | with SO_PEERCRED support. Faked for systems which lack it. | |
9fd2a215 | 349 | - (djm) Sync sys/tree.h with OpenBSD -current. Rename tree.h and |
350 | fake-queue.h to sys-tree.h and sys-queue.h | |
4f3834e8 | 351 | - (djm) OpenBSD CVS Sync |
352 | - markus@cvs.openbsd.org 2002/09/08 20:24:08 | |
353 | [hostfile.h] | |
354 | no comma at end of enumerator list | |
696f6bef | 355 | - itojun@cvs.openbsd.org 2002/09/09 06:48:06 |
356 | [auth1.c auth.h auth-krb5.c monitor.c monitor.h] | |
357 | [monitor_wrap.c monitor_wrap.h] | |
358 | kerberos support for privsep. confirmed to work by lha@stacken.kth.se | |
359 | patch from markus | |
661e45a0 | 360 | - markus@cvs.openbsd.org 2002/09/09 14:54:15 |
361 | [channels.c kex.h key.c monitor.c monitor_wrap.c radix.c uuencode.c] | |
362 | signed vs unsigned from -pedantic; ok henning@ | |
87f4111f | 363 | - markus@cvs.openbsd.org 2002/09/10 20:24:47 |
364 | [ssh-agent.c] | |
365 | check the euid of the connecting process with getpeereid(2); | |
366 | ok provos deraadt stevesk | |
07d688d5 | 367 | - stevesk@cvs.openbsd.org 2002/09/11 17:55:03 |
368 | [ssh.1] | |
369 | add agent and X11 forwarding warning text from ssh_config.5; ok markus@ | |
8b10e20e | 370 | - stevesk@cvs.openbsd.org 2002/09/11 18:27:26 |
371 | [authfd.c authfd.h ssh.c] | |
372 | don't connect to agent to test for presence if we've previously | |
373 | connected; ok markus@ | |
00b3ad3e | 374 | - djm@cvs.openbsd.org 2002/09/11 22:41:50 |
375 | [sftp.1 sftp-client.c sftp-client.h sftp-common.c sftp-common.h] | |
376 | [sftp-glob.c sftp-glob.h sftp-int.c sftp-server.c] | |
377 | support for short/long listings and globbing in "ls"; ok markus@ | |
be0cd512 | 378 | - djm@cvs.openbsd.org 2002/09/12 00:13:06 |
379 | [sftp-int.c] | |
380 | zap unused var introduced in last commit | |
4f3834e8 | 381 | |
ac8802eb | 382 | 20020911 |
383 | - (djm) Sync openbsd-compat with OpenBSD -current | |
384 | ||
e2e36358 | 385 | 20020910 |
386 | - (djm) Bug #365: Read /.ssh/environment properly under CygWin. | |
387 | Patch from Mark Bradshaw <bradshaw@staff.crosswalk.com> | |
35c4faf5 | 388 | - (djm) Bug #138: Make protocol 1 blowfish work with old OpenSSL. |
389 | Patch from Robert Halubek <rob@adso.com.pl> | |
e2e36358 | 390 | |
3445ca02 | 391 | 20020905 |
392 | - (djm) OpenBSD CVS Sync | |
393 | - stevesk@cvs.openbsd.org 2002/09/04 18:52:42 | |
394 | [servconf.c sshd.8 sshd_config.5] | |
395 | default LoginGraceTime to 2m; 1m may be too short for slow systems. | |
396 | ok markus@ | |
cbecf1ed | 397 | - (djm) Merge openssh-TODO.patch from Redhat (null) beta |
c4ee4c60 | 398 | - (djm) Add gnome-ssh-askpass2.c (gtk2) by merge with patch from |
399 | Nalin Dahyabhai <nalin@redhat.com> | |
3c1dff28 | 400 | - (djm) Add support for building gtk2 password requestor from Redhat beta |
3445ca02 | 401 | |
954640a4 | 402 | 20020903 |
33e2e066 | 403 | - (djm) Patch from itojun@ for Darwin OS: test getaddrinfo, reorder libcrypt |
e18b7d35 | 404 | - (djm) Fix Redhat RPM build dependancy test |
954640a4 | 405 | - (djm) OpenBSD CVS Sync |
406 | - markus@cvs.openbsd.org 2002/08/12 10:46:35 | |
407 | [ssh-agent.c] | |
408 | make ssh-agent setgid, disallow ptrace. | |
755c4339 | 409 | - espie@cvs.openbsd.org 2002/08/21 11:20:59 |
410 | [sshd.8] | |
411 | `RSA' updated to refer to `public key', where it matters. | |
412 | okay markus@ | |
6e0fbda1 | 413 | - stevesk@cvs.openbsd.org 2002/08/21 19:38:06 |
414 | [servconf.c sshd.8 sshd_config sshd_config.5] | |
415 | change LoginGraceTime default to 1 minute; ok mouring@ markus@ | |
00e41835 | 416 | - stevesk@cvs.openbsd.org 2002/08/21 20:10:28 |
417 | [ssh-agent.c] | |
418 | raise listen backlog; ok markus@ | |
c1a4eef1 | 419 | - stevesk@cvs.openbsd.org 2002/08/22 19:27:53 |
420 | [ssh-agent.c] | |
421 | use common close function; ok markus@ | |
1d77f8cb | 422 | - stevesk@cvs.openbsd.org 2002/08/22 19:38:42 |
423 | [clientloop.c] | |
424 | format with current EscapeChar; bugzilla #388 from wknox@mitre.org. | |
425 | ok markus@ | |
f34ec885 | 426 | - stevesk@cvs.openbsd.org 2002/08/22 20:57:19 |
427 | [ssh-agent.c] | |
428 | shutdown(SHUT_RDWR) not needed before close here; ok markus@ | |
848bf884 | 429 | - markus@cvs.openbsd.org 2002/08/22 21:33:58 |
430 | [auth1.c auth2.c] | |
431 | auth_root_allowed() is handled by the monitor in the privsep case, | |
432 | so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325 | |
6c723e7c | 433 | - markus@cvs.openbsd.org 2002/08/22 21:45:41 |
434 | [session.c] | |
435 | send signal name (not signal number) in "exit-signal" message; noticed | |
436 | by galb@vandyke.com | |
b41baf4d | 437 | - stevesk@cvs.openbsd.org 2002/08/27 17:13:56 |
438 | [ssh-rsa.c] | |
439 | RSA_public_decrypt() returns -1 on error so len must be signed; | |
440 | ok markus@ | |
dbcdea68 | 441 | - stevesk@cvs.openbsd.org 2002/08/27 17:18:40 |
442 | [ssh_config.5] | |
443 | some warning text for ForwardAgent and ForwardX11; ok markus@ | |
ba1566dd | 444 | - stevesk@cvs.openbsd.org 2002/08/29 15:57:25 |
445 | [monitor.c session.c sshlogin.c sshlogin.h] | |
446 | pass addrlen with sockaddr *; from Hajimu UMEMOTO <ume@FreeBSD.org> | |
447 | NOTE: there are also p-specific parts to this patch. ok markus@ | |
e59404d1 | 448 | - stevesk@cvs.openbsd.org 2002/08/29 16:02:54 |
449 | [ssh.1 ssh.c] | |
450 | deprecate -P as UsePrivilegedPort defaults to no now; ok markus@ | |
878b8992 | 451 | - stevesk@cvs.openbsd.org 2002/08/29 16:09:02 |
452 | [ssh_config.5] | |
453 | more on UsePrivilegedPort and setuid root; ok markus@ | |
9f324470 | 454 | - stevesk@cvs.openbsd.org 2002/08/29 19:49:42 |
455 | [ssh.c] | |
456 | shrink initial privilege bracket for setuid case; ok markus@ | |
57ff5eeb | 457 | - stevesk@cvs.openbsd.org 2002/08/29 22:54:10 |
458 | [ssh_config.5 sshd_config.5] | |
459 | state XAuthLocation is a full pathname | |
954640a4 | 460 | |
b85698ab | 461 | 20020820 |
462 | - OpenBSD CVS Sync | |
463 | - millert@cvs.openbsd.org 2002/08/02 14:43:15 | |
464 | [monitor.c monitor_mm.c] | |
465 | Change mm_zalloc() sanity checks to be more in line with what | |
466 | we do in calloc() and add a check to monitor_mm.c. | |
467 | OK provos@ and markus@ | |
6a342527 | 468 | - marc@cvs.openbsd.org 2002/08/02 16:00:07 |
469 | [ssh.1 sshd.8] | |
470 | note that .ssh/environment is only read when | |
471 | allowed (PermitUserEnvironment in sshd_config). | |
472 | OK markus@ | |
4004c2ac | 473 | - markus@cvs.openbsd.org 2002/08/02 21:23:41 |
474 | [ssh-rsa.c] | |
475 | diff is u_int (2x); ok deraadt/provos | |
0caf874a | 476 | - markus@cvs.openbsd.org 2002/08/02 22:20:30 |
477 | [ssh-rsa.c] | |
478 | replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser | |
479 | for authentication; ok deraadt/djm | |
75cf7563 | 480 | - aaron@cvs.openbsd.org 2002/08/08 13:50:23 |
481 | [sshconnect1.c] | |
482 | Use & to test if bits are set, not &&; markus@ ok. | |
d6097023 | 483 | - stevesk@cvs.openbsd.org 2002/08/08 23:54:52 |
484 | [auth.c] | |
485 | typo in comment | |
36535ee6 | 486 | - stevesk@cvs.openbsd.org 2002/08/09 17:21:42 |
487 | [sshd_config.5] | |
488 | use Op for mdoc conformance; from esr@golux.thyrsus.com | |
489 | ok aaron@ | |
b3641662 | 490 | - stevesk@cvs.openbsd.org 2002/08/09 17:41:12 |
491 | [sshd_config.5] | |
492 | proxy vs. fake display | |
35453849 | 493 | - stevesk@cvs.openbsd.org 2002/08/12 17:30:35 |
494 | [ssh.1 sshd.8 sshd_config.5] | |
495 | more PermitUserEnvironment; ok markus@ | |
24794905 | 496 | - stevesk@cvs.openbsd.org 2002/08/17 23:07:14 |
497 | [ssh.1] | |
498 | ForwardAgent has defaulted to no for over 2 years; be more clear here. | |
4dcbbeea | 499 | - stevesk@cvs.openbsd.org 2002/08/17 23:55:01 |
500 | [ssh_config.5] | |
501 | ordered list here | |
7d3b91a6 | 502 | - (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assign |
503 | it to ULONG_MAX. | |
b85698ab | 504 | |
cd018561 | 505 | 20020813 |
506 | - (tim) [configure.ac] Display OpenSSL header/library version. | |
507 | Patch by dtucker@zip.com.au | |
508 | ||
8a48a7ef | 509 | 20020731 |
510 | - (bal) OpenBSD CVS Sync | |
511 | - markus@cvs.openbsd.org 2002/07/24 16:11:18 | |
512 | [hostfile.c hostfile.h sshconnect.c] | |
513 | print out all known keys for a host if we get a unknown host key, | |
514 | see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4 | |
515 | ||
516 | the ssharp mitm tool attacks users in a similar way, so i'd like to | |
517 | pointed out again: | |
518 | A MITM attack is always possible if the ssh client prints: | |
519 | The authenticity of host 'bla' can't be established. | |
520 | (protocol version 2 with pubkey authentication allows you to detect | |
521 | MITM attacks) | |
5cb5518b | 522 | - mouring@cvs.openbsd.org 2002/07/25 01:16:59 |
523 | [sftp.c] | |
524 | FallBackToRsh does not exist anywhere else. Remove it from here. | |
525 | OK deraadt. | |
567a05bf | 526 | - markus@cvs.openbsd.org 2002/07/29 18:57:30 |
527 | [sshconnect.c] | |
528 | print file:line | |
f00bab84 | 529 | - markus@cvs.openbsd.org 2002/07/30 17:03:55 |
530 | [auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5] | |
531 | add PermitUserEnvironment (off by default!); from dot@dotat.at; | |
532 | ok provos, deraadt | |
8a48a7ef | 533 | |
13979d47 | 534 | 20020730 |
535 | - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de | |
536 | ||
d228d9dd | 537 | 20020728 |
538 | - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar | |
16c4a972 | 539 | - (stevesk) [CREDITS] solar |
75131bbd | 540 | - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned |
541 | char arg. | |
d228d9dd | 542 | |
d40af5fa | 543 | 20020725 |
544 | - (djm) Remove some cruft from INSTALL | |
d91b4743 | 545 | - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/ |
d40af5fa | 546 | |
56b54901 | 547 | 20020723 |
548 | - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger. | |
918ffb0b | 549 | - (bal) sync ID w/ ssh-agent.c |
516f0d7d | 550 | - (bal) OpenBSD Sync |
551 | - markus@cvs.openbsd.org 2002/07/19 15:43:33 | |
552 | [log.c log.h session.c sshd.c] | |
553 | remove fatal cleanups after fork; based on discussions with and code | |
554 | from solar. | |
5d185586 | 555 | - stevesk@cvs.openbsd.org 2002/07/19 17:42:40 |
556 | [ssh.c] | |
557 | display a warning from ssh when XAuthLocation does not exist or xauth | |
558 | returned no authentication data. ok markus@ | |
30998af1 | 559 | - stevesk@cvs.openbsd.org 2002/07/21 18:32:20 |
560 | [auth-options.c] | |
561 | unneeded includes | |
dbc728ff | 562 | - stevesk@cvs.openbsd.org 2002/07/21 18:34:43 |
563 | [auth-options.h] | |
564 | remove invalid comment | |
97686bf9 | 565 | - markus@cvs.openbsd.org 2002/07/22 11:03:06 |
566 | [session.c] | |
567 | fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors; | |
d341742a | 568 | - stevesk@cvs.openbsd.org 2002/07/22 17:32:56 |
569 | [monitor.c] | |
570 | u_int here; ok provos@ | |
67f04db1 | 571 | - stevesk@cvs.openbsd.org 2002/07/23 16:03:10 |
572 | [sshd.c] | |
573 | utmp_len is unsigned; display error consistent with other options. | |
574 | ok markus@ | |
0df3a240 | 575 | - stevesk@cvs.openbsd.org 2002/07/15 17:15:31 |
576 | [uidswap.c] | |
577 | little more debugging; ok markus@ | |
d341742a | 578 | |
21c2c5cd | 579 | 20020722 |
580 | - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk | |
a93bd14c | 581 | - (stevesk) [xmmap.c] missing prototype for fatal() |
ccbb983c | 582 | - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync |
583 | with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com. | |
d262b7f2 | 584 | - (bal) [configure.ac] Missing ;; from cray patch. |
30eab01d | 585 | - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines |
586 | into it's own header. | |
ee48c949 | 587 | - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be |
588 | freed by the caller; add free_pam_environment() and use it. | |
1d3f4ae7 | 589 | - (stevesk) [auth-pam.c] typo in comment |
21c2c5cd | 590 | |
b992432e | 591 | 20020721 |
592 | - (stevesk) [auth-pam.c] merge cosmetic changes from solar's | |
593 | openssh-3.4p1-owl-password-changing.diff | |
277f55cf | 594 | - (stevesk) [auth-pam.c] merge rest of solar's PAM patch; |
595 | PAM_NEW_AUTHTOK_REQD remains in #if 0 for now. | |
f7808a93 | 596 | - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch |
597 | warning on pam_conv struct conversation function. | |
337dde6b | 598 | - (stevesk) [auth-pam.h] license |
8565f28e | 599 | - (stevesk) [auth-pam.h] unneeded include |
e9b2c23d | 600 | - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h |
b992432e | 601 | |
ce88d9df | 602 | 20020720 |
603 | - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng(). | |
604 | ||
4379c0e5 | 605 | 20020719 |
606 | - (tim) [contrib/solaris/buildpkg.sh] create privsep user/group if needed. | |
607 | Patch by dtucker@zip.com.au | |
f75ca46d | 608 | - (tim) [configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au |
4379c0e5 | 609 | |
45491100 | 610 | 20020718 |
611 | - (tim) [defines.h] Bug 313 patch by dirk.meyer@dinoex.sub.org | |
612 | - (tim) [monitor_mm.c] add missing declaration for xmmap(). Reported | |
613 | by ayamura@ayamura.org | |
1cbbe6c8 | 614 | - (tim) [configure.ac] Bug 267 rework int64_t test. |
5749e709 | 615 | - (tim) [includes.h] Bug 267 add stdint.h |
45491100 | 616 | |
dd3943d0 | 617 | 20020717 |
618 | - (bal) aixbff package updated by dtucker@zip.com.au | |
2bf42e4a | 619 | - (tim) [configure.ac] change how we do paths in AC_PATH_PROGS tests |
620 | for autoconf 2.53. Based on a patch by jrj@purdue.edu | |
dd3943d0 | 621 | |
8fc47887 | 622 | 20020716 |
623 | - (tim) [contrib/solaris/opensshd.in] Only kill sshd if .pid file found | |
624 | ||
c750d869 | 625 | 20020715 |
626 | - (bal) OpenBSD CVS Sync | |
627 | - itojun@cvs.openbsd.org 2002/07/12 13:29:09 | |
628 | [sshconnect.c] | |
629 | print connect failure during debugging mode. | |
a2f883ce | 630 | - markus@cvs.openbsd.org 2002/07/12 15:50:17 |
631 | [cipher.c] | |
632 | EVP_CIPH_CUSTOM_IV for our own rijndael | |
2d199535 | 633 | - (bal) Remove unused tty defined in do_setusercontext() pointed out by |
634 | dtucker@zip.com.au plus a a more KNF since I am near it. | |
846be3f4 | 635 | - (bal) Privsep user creation support in Solaris buildpkg.sh by |
636 | dtucker@zip.com.au | |
c750d869 | 637 | |
798c5808 | 638 | 20020714 |
639 | - (tim) [Makefile.in] replace "id sshd" with "sshd -t" | |
4165b82e | 640 | - (bal/tim) [acconfig.h configure.ac monitor_mm.c servconf.c |
641 | openbsd-compat/Makefile.in] support compression on platforms that | |
642 | have no/broken MAP_ANON. Moved code to openbsd-compat/xmmap.c | |
643 | Based on patch from nalin@redhat.com of code extracted from Owl's package | |
5fd8087a | 644 | - (tim) [ssh_prng_cmds.in] Bug 323 arp -n flag doesn't exist under Solaris. |
645 | report by chris@by-design.net | |
fdebdd4f | 646 | - (tim) [loginrec.c] Bug 347: Fix typo (WTMPX_FILE) report by rodney@bond.net |
d80063fe | 647 | - (tim) [loginrec.c] Bug 348: add missing found = 1; to wtmpx_islogin() |
648 | report by rodney@bond.net | |
798c5808 | 649 | |
6b2a3595 | 650 | 20020712 |
651 | - (tim) [Makefile.in] quiet down install-files: and check-user: | |
3085601b | 652 | - (tim) [configure.ac] remove unused filepriv line |
6b2a3595 | 653 | |
249f9903 | 654 | 20020710 |
655 | - (tim) [contrib/cygwin/ssh-host-config] explicitely sets the permissions | |
656 | on /var/empty to 755 Patch by vinschen@redhat.com | |
6f901f8e | 657 | - (bal) OpenBSD CVS Sync |
658 | - itojun@cvs.openbsd.org 2002/07/09 11:56:50 | |
659 | [sshconnect.c] | |
660 | silently try next address on connect(2). markus ok | |
59c825e1 | 661 | - itojun@cvs.openbsd.org 2002/07/09 11:56:27 |
662 | [canohost.c] | |
663 | suppress log on reverse lookup failiure, as there's no real value in | |
664 | doing so. | |
665 | markus ok | |
aab5431b | 666 | - itojun@cvs.openbsd.org 2002/07/09 12:04:02 |
667 | [sshconnect.c] | |
668 | ed static function (less warnings) | |
94ad46d1 | 669 | - stevesk@cvs.openbsd.org 2002/07/09 17:46:25 |
670 | [sshd_config.5] | |
671 | clarify no preference ordering in protocol list; ok markus@ | |
9bd68577 | 672 | - itojun@cvs.openbsd.org 2002/07/10 10:28:15 |
673 | [sshconnect.c] | |
674 | bark if all connection attempt fails. | |
09683edf | 675 | - deraadt@cvs.openbsd.org 2002/07/10 17:53:54 |
676 | [rijndael.c] | |
677 | use right sizeof in memcpy; markus ok | |
249f9903 | 678 | |
e6f15ed1 | 679 | 20020709 |
680 | - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platforms | |
681 | lacking that concept can share it. Patch by vinschen@redhat.com | |
682 | ||
4f9d6706 | 683 | 20020708 |
684 | - (tim) [openssh/contrib/solaris/buildpkg.sh] add PKG_INSTALL_ROOT to | |
685 | work in a jumpstart environment. patch by kbrint@rufus.net | |
b451e27b | 686 | - (tim) [Makefile.in] workaround for broken pakadd on some systems. |
cda1ebcb | 687 | - (tim) [configure.ac] fix libc89 utimes test. Mention default path for |
688 | --with-privsep-path= | |
4f9d6706 | 689 | |
ac74561e | 690 | 20020707 |
691 | - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH) | |
94d8258b | 692 | - (tim) [acconfig.h configure.ac sshd.c] |
693 | s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/ | |
d41f8eed | 694 | - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes |
695 | patch from vinschen@redhat.com | |
0b832146 | 696 | - (bal) [realpath.c] Updated with OpenBSD tree. |
da2499f5 | 697 | - (bal) OpenBSD CVS Sync |
698 | - deraadt@cvs.openbsd.org 2002/07/04 04:15:33 | |
699 | [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c] | |
700 | patch memory leaks; grendel@zeitbombe.org | |
e1feb9bf | 701 | - deraadt@cvs.openbsd.org 2002/07/04 08:12:15 |
702 | [channels.c packet.c] | |
703 | blah blah minor nothing as i read and re-read and re-read... | |
eb9f2fab | 704 | - markus@cvs.openbsd.org 2002/07/04 10:41:47 |
705 | [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c] | |
706 | don't allocate, copy, and discard if there is not interested in the data; | |
707 | ok deraadt@ | |
4394a17f | 708 | - deraadt@cvs.openbsd.org 2002/07/06 01:00:49 |
709 | [log.c] | |
710 | KNF | |
50d2fbbc | 711 | - deraadt@cvs.openbsd.org 2002/07/06 01:01:26 |
712 | [ssh-keyscan.c] | |
713 | KNF, realloc fix, and clean usage | |
12a3f2c3 | 714 | - stevesk@cvs.openbsd.org 2002/07/06 17:47:58 |
715 | [ssh-keyscan.c] | |
716 | unused variable | |
41545cb6 | 717 | - (bal) Minor KNF on ssh-keyscan.c |
ac74561e | 718 | |
0764e748 | 719 | 20020705 |
720 | - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs. | |
721 | Reported by Darren Tucker <dtucker@zip.com.au> | |
e12659f4 | 722 | - (tim) [contrib/cygwin/ssh-host-config] double slash corrction |
723 | from vinschen@redhat.com | |
0764e748 | 724 | |
64c0ce80 | 725 | 20020704 |
726 | - (bal) Limit data to TTY for AIX only (Newer versions can't handle the | |
727 | faster data rate) Bug #124 | |
375c1dee | 728 | - (bal) glob.c defines TILDE and AIX also defines it. #undef it first. |
729 | bug #265 | |
ff2de800 | 730 | - (bal) One too many nulls in ports-aix.c |
64c0ce80 | 731 | |
d2f95449 | 732 | 20020703 |
733 | - (bal) Updated contrib/cygwin/ patch by vinschen@redhat.com | |
619a6aff | 734 | - (bal) minor correction to utimes() replacement. Patch by |
735 | onoe@sm.sony.co.jp | |
f11fe301 | 736 | - OpenBSD CVS Sync |
737 | - markus@cvs.openbsd.org 2002/06/27 08:49:44 | |
738 | [dh.c ssh-keyscan.c sshconnect.c] | |
739 | more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@ | |
181d6635 | 740 | - deraadt@cvs.openbsd.org 2002/06/27 09:08:00 |
741 | [monitor.c] | |
742 | improve mm_zalloc check; markus ok | |
30e37ee6 | 743 | - deraadt@cvs.openbsd.org 2002/06/27 10:35:47 |
744 | [auth2-none.c monitor.c sftp-client.c] | |
745 | use xfree() | |
c8f94200 | 746 | - stevesk@cvs.openbsd.org 2002/06/27 19:49:08 |
747 | [ssh-keyscan.c] | |
748 | use convtime(); ok markus@ | |
a64d3560 | 749 | - millert@cvs.openbsd.org 2002/06/28 01:49:31 |
750 | [monitor_mm.c] | |
751 | tree(3) wants an int return value for its compare functions and | |
752 | the difference between two pointers is not an int. Just do the | |
753 | safest thing and store the result in a long and then return 0, | |
754 | -1, or 1 based on that result. | |
405a0d43 | 755 | - deraadt@cvs.openbsd.org 2002/06/28 01:50:37 |
756 | [monitor_wrap.c] | |
757 | use ssize_t | |
4efd85b2 | 758 | - deraadt@cvs.openbsd.org 2002/06/28 10:08:25 |
759 | [sshd.c] | |
760 | range check -u option at invocation | |
6ded293b | 761 | - deraadt@cvs.openbsd.org 2002/06/28 23:05:06 |
762 | [sshd.c] | |
763 | gidset[2] -> gidset[1]; markus ok | |
7fdc56c5 | 764 | - deraadt@cvs.openbsd.org 2002/06/30 21:54:16 |
765 | [auth2.c session.c sshd.c] | |
766 | lint asks that we use names that do not overlap | |
343288b8 | 767 | - deraadt@cvs.openbsd.org 2002/06/30 21:59:45 |
768 | [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c | |
769 | monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c | |
770 | sshconnect2.c sshd.c] | |
771 | minor KNF | |
7d60d74c | 772 | - deraadt@cvs.openbsd.org 2002/07/01 16:15:25 |
773 | [msg.c] | |
774 | %u | |
713f6cd9 | 775 | - markus@cvs.openbsd.org 2002/07/01 19:48:46 |
776 | [sshconnect2.c] | |
777 | for compression=yes, we fallback to no-compression if the server does | |
778 | not support compression, vice versa for compression=no. ok mouring@ | |
261189cc | 779 | - markus@cvs.openbsd.org 2002/07/03 09:55:38 |
780 | [ssh-keysign.c] | |
781 | use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld) | |
782 | in order to avoid a possible Kocher timing attack pointed out by Charles | |
783 | Hannum; ok provos@ | |
60cd0a97 | 784 | - markus@cvs.openbsd.org 2002/07/03 14:21:05 |
785 | [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config] | |
786 | re-enable ssh-keysign's sbit, but make ssh-keysign read | |
787 | /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled | |
788 | globally. based on discussions with deraadt, itojun and sommerfeld; | |
789 | ok itojun@ | |
56fd97d7 | 790 | - (bal) Failed password attempts don't increment counter on AIX. Bug #145 |
e8aa0a5c | 791 | - (bal) Missed Makefile.in change. keysign needs readconf.o |
0ba40daa | 792 | - (bal) Clean up aix_usrinfo(). Ignore TTY= period I guess. |
56fd97d7 | 793 | |
b2f295dc | 794 | 20020702 |
795 | - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc & | |
796 | friends consistently. Spotted by Solar Designer <solar@openwall.com> | |
797 | ||
3c3e878a | 798 | 20020629 |
799 | - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style | |
800 | clean up while I'm near it. | |
801 | ||
811ee370 | 802 | 20020628 |
803 | - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented | |
804 | options should contain default value. from solar. | |
b9b82dab | 805 | - (bal) Cygwin uid0 fix by vinschen@redhat.com |
17962c40 | 806 | - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c. Otherwise wise |
807 | have issues of our fixes not propogating right (ie bcopy instead of | |
808 | memmove). OK tim | |
4fa4fb00 | 809 | - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported. |
810 | Bug #303 | |
811ee370 | 811 | |
ce88d9df | 812 | 20020627 |
d1ff09ba | 813 | - OpenBSD CVS Sync |
814 | - deraadt@cvs.openbsd.org 2002/06/26 14:49:36 | |
815 | [monitor.c] | |
816 | correct %u | |
63b5f1a1 | 817 | - deraadt@cvs.openbsd.org 2002/06/26 14:50:04 |
818 | [monitor_fdpass.c] | |
819 | use ssize_t for recvmsg() and sendmsg() return | |
1431a900 | 820 | - markus@cvs.openbsd.org 2002/06/26 14:51:33 |
821 | [ssh-add.c] | |
822 | fix exit code for -X/-x | |
bb0640b2 | 823 | - deraadt@cvs.openbsd.org 2002/06/26 15:00:32 |
824 | [monitor_wrap.c] | |
825 | more %u | |
20e79e98 | 826 | - markus@cvs.openbsd.org 2002/06/26 22:27:32 |
827 | [ssh-keysign.c] | |
828 | bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu | |
d1ff09ba | 829 | |
4bfa8bb6 | 830 | 20020626 |
831 | - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM | |
a594fa74 | 832 | - (bal) OpenBSD CVS Sync |
833 | - markus@cvs.openbsd.org 2002/06/23 21:34:07 | |
834 | [channels.c] | |
835 | tcode is u_int | |
38501509 | 836 | - markus@cvs.openbsd.org 2002/06/24 13:12:23 |
837 | [ssh-agent.1] | |
838 | the socket name contains ssh-agent's ppid; via mpech@ from form@ | |
f91d9a89 | 839 | - markus@cvs.openbsd.org 2002/06/24 14:33:27 |
840 | [channels.c channels.h clientloop.c serverloop.c] | |
841 | move channel counter to u_int | |
1169c3df | 842 | - markus@cvs.openbsd.org 2002/06/24 14:55:38 |
843 | [authfile.c kex.c ssh-agent.c] | |
844 | cat to (void) when output from buffer_get_X is ignored | |
09915dc1 | 845 | - itojun@cvs.openbsd.org 2002/06/24 15:49:22 |
846 | [msg.c] | |
847 | printf type pedant | |
d0a1c5d1 | 848 | - deraadt@cvs.openbsd.org 2002/06/24 17:57:20 |
849 | [sftp-server.c sshpty.c] | |
850 | explicit (u_int) for uid and gid | |
6c69a6a9 | 851 | - markus@cvs.openbsd.org 2002/06/25 16:22:42 |
852 | [authfd.c] | |
853 | unnecessary cast | |
87809a1f | 854 | - markus@cvs.openbsd.org 2002/06/25 18:51:04 |
855 | [sshd.c] | |
856 | lightweight do_setusercontext after chroot() | |
924681ee | 857 | - (bal) Updated AIX package build. Patch by dtucker@zip.com.au |
46c8ebb3 | 858 | - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8 |
78beb77d | 859 | - (bal) added back in error check for mmap(). I screwed up, Pointed |
860 | out by stevesk@ | |
f2d9a1f8 | 861 | - (tim) [README.privsep] UnixWare tip no longer needed. |
88cb875c | 862 | - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP, |
863 | but it all damned lies. | |
0d0270e6 | 864 | - (stevesk) [README.privsep] more for sshd pseudo-account. |
8029e7fc | 865 | - (tim) [contrib/caldera/openssh.spec] add support for privsep |
8695f9f7 | 866 | - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@ |
b29fe4ea | 867 | - (djm) OpenBSD CVS Sync |
868 | - markus@cvs.openbsd.org 2002/06/26 08:53:12 | |
869 | [bufaux.c] | |
870 | limit size of BNs to 8KB; ok provos/deraadt | |
22d62d31 | 871 | - markus@cvs.openbsd.org 2002/06/26 08:54:18 |
872 | [buffer.c] | |
873 | limit append to 1MB and buffers to 10MB | |
5df8c731 | 874 | - markus@cvs.openbsd.org 2002/06/26 08:55:02 |
875 | [channels.c] | |
876 | limit # of channels to 10000 | |
87f18810 | 877 | - markus@cvs.openbsd.org 2002/06/26 08:58:26 |
878 | [session.c] | |
879 | limit # of env vars to 1000; ok deraadt/djm | |
2f095a0e | 880 | - deraadt@cvs.openbsd.org 2002/06/26 13:20:57 |
881 | [monitor.c] | |
882 | be careful in mm_zalloc | |
66087567 | 883 | - deraadt@cvs.openbsd.org 2002/06/26 13:49:26 |
884 | [session.c] | |
885 | disclose less information from environment files; based on input | |
886 | from djm, and dschultz@uclink.Berkeley.EDU | |
477edc5d | 887 | - markus@cvs.openbsd.org 2002/06/26 13:55:37 |
888 | [auth2-chall.c] | |
889 | make sure # of response matches # of queries, fixes int overflow; | |
890 | from ISS | |
03b14b6f | 891 | - markus@cvs.openbsd.org 2002/06/26 13:56:27 |
892 | [version.h] | |
893 | 3.4 | |
9c696d0d | 894 | - (djm) Require krb5 devel for RPM build w/ KrbV |
c4186be7 | 895 | - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai |
896 | <nalin@redhat.com> | |
1e7bc74c | 897 | - (djm) Update spec files for release |
49b53b03 | 898 | - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS |
03b14b6f | 899 | - (djm) Release 3.4p1 |
6519cfd6 | 900 | - (tim) [contrib/caldera/openssh.spec] remove 2 configure options I put in |
901 | by mistake | |
4bfa8bb6 | 902 | |
ef1ac12b | 903 | 20020625 |
904 | - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh | |
1a44c6f7 | 905 | - (stevesk) [README.privsep] minor updates |
fd3cbf67 | 906 | - (djm) Create privsep directory and warn if privsep user is missing |
907 | during make install | |
702b2855 | 908 | - (bal) Started list of PrivSep issues in TODO |
1c6249af | 909 | - (bal) if mmap() is substandard, don't allow compression on server side. |
910 | Post 'event' we will add more options. | |
cbaa3d44 | 911 | - (tim) [contrib/caldera/openssh.spec] Sync with Caldera |
e2bc41f9 | 912 | - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by |
913 | dtucker@zip.com.au | |
d170feb1 | 914 | - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus |
915 | for Cygwin, Cray, & SCO | |
ef1ac12b | 916 | |
d5803314 | 917 | 20020624 |
918 | - OpenBSD CVS Sync | |
919 | - deraadt@cvs.openbsd.org 2002/06/23 03:25:50 | |
920 | [tildexpand.c] | |
921 | KNF | |
3ddc795d | 922 | - deraadt@cvs.openbsd.org 2002/06/23 03:26:19 |
923 | [cipher.c key.c] | |
924 | KNF | |
d6133f43 | 925 | - deraadt@cvs.openbsd.org 2002/06/23 03:30:58 |
926 | [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c | |
927 | sshpty.c] | |
928 | various KNF and %d for unsigned | |
9906a836 | 929 | - deraadt@cvs.openbsd.org 2002/06/23 09:30:14 |
930 | [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c | |
931 | sftp.c] | |
932 | bunch of u_int vs int stuff | |
512df038 | 933 | - deraadt@cvs.openbsd.org 2002/06/23 09:39:55 |
934 | [ssh-keygen.c] | |
935 | u_int stuff | |
7528d467 | 936 | - deraadt@cvs.openbsd.org 2002/06/23 09:46:51 |
937 | [bufaux.c servconf.c] | |
938 | minor KNF. things the fingers do while you read | |
e424e241 | 939 | - deraadt@cvs.openbsd.org 2002/06/23 10:29:52 |
940 | [ssh-agent.c sshd.c] | |
941 | some minor KNF and %u | |
7138ebd9 | 942 | - deraadt@cvs.openbsd.org 2002/06/23 20:39:45 |
943 | [session.c] | |
944 | compression_level is u_int | |
f09ce20a | 945 | - deraadt@cvs.openbsd.org 2002/06/23 21:06:13 |
946 | [sshpty.c] | |
947 | KNF | |
57f228e8 | 948 | - deraadt@cvs.openbsd.org 2002/06/23 21:06:41 |
949 | [channels.c channels.h session.c session.h] | |
950 | display, screen, row, col, xpixel, ypixel are u_int; markus ok | |
0bc50167 | 951 | - deraadt@cvs.openbsd.org 2002/06/23 21:10:02 |
952 | [packet.c] | |
953 | packet_get_int() returns unsigned for reason & seqnr | |
57f228e8 | 954 | - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col, |
955 | xpixel are u_int. | |
956 | ||
d5803314 | 957 | |
58177c0a | 958 | 20020623 |
959 | - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX. | |
dc43acd2 | 960 | - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset. |
ef3912be | 961 | - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au |
a8bbdc75 | 962 | - OpenBSD CVS Sync |
963 | - stevesk@cvs.openbsd.org 2002/06/22 02:00:29 | |
964 | [ssh.h] | |
965 | correct comment | |
1ae02182 | 966 | - stevesk@cvs.openbsd.org 2002/06/22 02:40:23 |
967 | [ssh.1] | |
968 | section 5 not 4 for ssh_config | |
b2843ec6 | 969 | - naddy@cvs.openbsd.org 2002/06/22 11:51:39 |
970 | [ssh.1] | |
971 | typo | |
75653d3e | 972 | - stevesk@cvs.openbsd.org 2002/06/22 16:32:54 |
973 | [sshd.8] | |
974 | add /var/empty in FILES section | |
a56313d7 | 975 | - stevesk@cvs.openbsd.org 2002/06/22 16:40:19 |
976 | [sshd.c] | |
977 | check /var/empty owner mode; ok provos@ | |
e4e83d70 | 978 | - stevesk@cvs.openbsd.org 2002/06/22 16:41:57 |
979 | [scp.1] | |
980 | typo | |
baa08b92 | 981 | - stevesk@cvs.openbsd.org 2002/06/22 16:45:29 |
982 | [ssh-agent.1 sshd.8 sshd_config.5] | |
983 | use process ID vs. pid/PID/process identifier | |
c28876e9 | 984 | - stevesk@cvs.openbsd.org 2002/06/22 20:05:27 |
985 | [sshd.c] | |
986 | don't call setsid() if debugging or run from inetd; no "Operation not | |
987 | permitted" errors now; ok millert@ markus@ | |
d17ef027 | 988 | - stevesk@cvs.openbsd.org 2002/06/22 23:09:51 |
989 | [monitor.c] | |
990 | save auth method before monitor_reset_key_state(); bugzilla bug #284; | |
991 | ok provos@ | |
58177c0a | 992 | |
0b202697 | 993 | $Id$ |