]> andersk Git - openssh.git/blame - ChangeLog
- (dtucker) Bug #543: [configure.ac port-aix.c port-aix.h]
[openssh.git] / ChangeLog
CommitLineData
e351e493 120030714
2 - (dtucker) [acconfig.h configure.ac port-aix.c] Older AIXes don't declare
3 loginfailed at all, so assume 3-arg loginfailed if not declared.
1cd5765d 4 - (dtucker) [port-aix.h] Work around name collision on AIX for r_type by
5 undef'ing it.
2aa3a16c 6 - (dtucker) Bug #543: [configure.ac port-aix.c port-aix.h]
7 Call setauthdb() before loginfailed(), which may load password registry-
8 specific functions. Based on patch by cawlfiel@us.ibm.com.
e351e493 9
f58c0e01 1020030708
11 - (dtucker) [acconfig.h auth-passwd.c configure.ac session.c port-aix.[ch]]
12 Include AIX headers for authentication functions and make calls match
e351e493 13 prototypes. Test for and handle 3-arg and 4-arg variants of loginfailed.
bc7dfc06 14 - (dtucker) [session.c] Check return value of setpcred().
15 - (dtucker) [auth-passwd.c auth.c session.c sshd.c port-aix.c port-aix.h]
16 Convert aixloginmsg into platform-independant Buffer loginmsg.
f58c0e01 17
309709db 1820030707
19 - (dtucker) [configure.ac] Bug #600: Check that getrusage is declared before
20 searching libraries for it. Fixes build errors on NCR MP-RAS.
21
d72f7b79 2220030706
23 - (dtucker) [ssh-rand-helper.c loginrec.c]
24 Apply atomicio typing change to these too.
25
71b9ced0 2620030703
27 - (dtucker) OpenBSD CVS Sync
28 - djm@cvs.openbsd.org 2003/06/28 07:48:10
29 [sshd.c]
30 report pidfile creation errors, based on patch from Roumen Petrov;
31 ok markus@
dc54438a 32 - deraadt@cvs.openbsd.org 2003/06/28 16:23:06
33 [atomicio.c atomicio.h authfd.c clientloop.c monitor_wrap.c msg.c
34 progressmeter.c scp.c sftp-client.c ssh-keyscan.c ssh.h sshconnect.c
35 sshd.c]
36 deal with typing of write vs read in atomicio
7caca6d4 37 - markus@cvs.openbsd.org 2003/06/29 12:44:38
38 [sshconnect.c]
39 memset 0, not \0; andrushock@korovino.net
8e7c9afc 40 - markus@cvs.openbsd.org 2003/07/02 12:56:34
41 [channels.c]
42 deny dynamic forwarding with -R for v1, too; ok djm@
f49658f5 43 - markus@cvs.openbsd.org 2003/07/02 14:51:16
44 [channels.c ssh.1 ssh_config.5]
45 (re)add socks5 suppport to -D; ok djm@
46 now ssh(1) can act both as a socks 4 and socks 5 server and
47 dynamically forward ports.
03c82656 48 - markus@cvs.openbsd.org 2003/07/02 20:37:48
49 [ssh.c]
50 convert hostkeyalias to lowercase, otherwise uppercase aliases will
51 not match at all; ok henning@
1768a611 52 - markus@cvs.openbsd.org 2003/07/03 08:21:46
53 [regress/dynamic-forward.sh]
54 add socks5; speedup; reformat; based on patch from dtucker@zip.com.au
7664edb6 55 - markus@cvs.openbsd.org 2003/07/03 08:24:13
56 [regress/Makefile]
57 enable tests for dynamic fwd via socks (-D), uses nc(1)
1572b90f 58 - djm@cvs.openbsd.org 2003/07/03 08:09:06
59 [readconf.c readconf.h ssh-keysign.c ssh.c]
60 fix AddressFamily option in config file, from brent@graveland.net;
61 ok markus@
71b9ced0 62
4e00038c 6320030630
64 - (djm) Search for support functions necessary to build our
65 getrrsetbyname() replacement. Patch from Roumen Petrov
66
9f59c5a3 6720030629
c5829391 68 - (dtucker) [includes.h] Bug #602: move #include of netdb.h to after in.h
69 (fixes compiler warnings on Solaris 2.5.1).
70 - (dtucker) [configure.ac] Add sanity test after system-dependant compiler
71 flag modifications.
9f59c5a3 72
9ea150a7 7320030628
74 - (djm) Bug #591: use PKCS#15 private key label as a comment in case
75 of OpenSC. Report and patch from larsch@trustcenter.de
d2168412 76 - (djm) Bug #593: Sanity check OpenSC card reader number; patch from
77 aj@dungeon.inka.de
f0677b69 78 - (dtucker) OpenBSD CVS Sync
79 - markus@cvs.openbsd.org 2003/06/23 09:02:44
80 [ssh_config.5]
81 document EnableSSHKeysign; bugzilla #599; ok deraadt@, jmc@
a27002e5 82 - markus@cvs.openbsd.org 2003/06/24 08:23:46
83 [auth2-hostbased.c auth2-pubkey.c auth2.c channels.c key.c key.h
84 monitor.c packet.c packet.h serverloop.c sshconnect2.c sshd.c]
85 int -> u_int; ok djm@, deraadt@, mouring@
d7ded285 86 - miod@cvs.openbsd.org 2003/06/25 22:39:36
87 [sftp-server.c]
88 Typo police: attribute is better written with an 'r'.
2d9c1828 89 - markus@cvs.openbsd.org 2003/06/26 20:08:33
90 [readconf.c]
91 do not dump core for 'ssh -o proxycommand host'; ok deraadt@
78b2dd04 92 - (dtucker) [regress/dynamic-forward.sh] Import new regression test.
ddb154b3 93 - (dtucker) [configure.ac] Bug #570: Have ./configure --enable-FEATURE
94 actually enable the feature, for those normally disabled. Patch by
95 openssh (at) roumenpetrov.info.
f0677b69 96
e15ba28b 9720030624
98 - (dtucker) Have configure refer the user to config.log and
99 contrib/findssl.sh for OpenSSL header/library mismatches.
100
63a556df 10120030622
c1ffd4bd 102 - (dtucker) OpenBSD CVS Sync
63a556df 103 - markus@cvs.openbsd.org 2003/06/21 09:14:05
c1ffd4bd 104 [regress/reconfigure.sh]
63a556df 105 missing $SUDO; from dtucker@zip.com.au
93527718 106 - markus@cvs.openbsd.org 2003/06/18 11:28:11
c1ffd4bd 107 [ssh-rsa.c]
108 backout last change, since it violates pkcs#1
109 switch to share/misc/license.template
1891396b 110 - djm@cvs.openbsd.org 2003/06/20 05:47:58
111 [sshd_config.5]
112 sync description of protocol 2 cipher proposal; ok markus
4db4d313 113 - djm@cvs.openbsd.org 2003/06/20 05:48:21
114 [sshd_config]
115 sync some implemented options; ok markus@
63a556df 116 - (dtucker) [regress/authorized_keys_root] Remove temp data file from CVS.
39ef3618 117 - (dtucker) [openbsd-compat/setproctitle.c] Ensure SPT_TYPE is defined before
118 testing its value.
63a556df 119
b8e04133 12020030618
121 - (djm) OpenBSD CVS Sync
122 - markus@cvs.openbsd.org 2003/06/12 07:57:38
123 [monitor.c sshlogin.c sshpty.c]
124 typos; dtucker at zip.com.au
b9ad9d13 125 - djm@cvs.openbsd.org 2003/06/12 12:22:47
126 [LICENCE]
127 mention more copyright holders; ok markus@
1fb23629 128 - nino@cvs.openbsd.org 2003/06/12 15:34:09
129 [scp.c]
130 Typo. Ok markus@.
244e796f 131 - markus@cvs.openbsd.org 2003/06/12 19:12:03
132 [scard.c scard.h ssh-agent.c ssh.c]
133 add sc_get_key_label; larsch at trustcenter.de; bugzilla#591
9250058a 134 - markus@cvs.openbsd.org 2003/06/16 08:22:35
135 [ssh-rsa.c]
136 make sure the signature has at least the expected length (don't
137 insist on len == hlen + oidlen, since this breaks some smartcards)
138 bugzilla #592; ok djm@
360a4aae 139 - markus@cvs.openbsd.org 2003/06/16 10:22:45
140 [ssh-add.c]
141 print out key comment on each prompt; make ssh-askpass more useable; ok djm@
0a59bd6b 142 - markus@cvs.openbsd.org 2003/06/17 18:14:23
143 [cipher-ctr.c]
144 use license from /usr/share/misc/license.template for new code
1d6c0b69 145 - (dtucker) [reconfigure.sh rekey.sh sftp-badcmds.sh]
146 Import new regression tests from OpenBSD
d4d84f5f 147 - (dtucker) [regress/copy.1 regress/copy.2] Remove temp data files from CVS.
ed49cc81 148 - (dtucker) OpenBSD CVS Sync (regress/)
149 - markus@cvs.openbsd.org 2003/04/02 12:21:13
150 [Makefile]
151 enable rekey test
2c670155 152 - djm@cvs.openbsd.org 2003/04/04 09:34:22
153 [Makefile sftp-cmds.sh]
154 More regression tests, including recent directory rename bug; ok markus@
737447ad 155 - markus@cvs.openbsd.org 2003/05/14 22:08:27
156 [ssh-com-client.sh ssh-com-keygen.sh ssh-com-sftp.sh ssh-com.sh]
157 test against some new commerical versions
68df2aa0 158 - mouring@cvs.openbsd.org 2003/05/15 04:07:12
159 [sftp-cmds.sh]
160 Advanced put/get testing for sftp. OK @djm
eb9bf761 161 - markus@cvs.openbsd.org 2003/06/12 15:40:01
162 [try-ciphers.sh]
163 add ctr
39c0191e 164 - markus@cvs.openbsd.org 2003/06/12 15:43:32
165 [Makefile]
166 test -HUP; dtucker at zip.com.au
b8e04133 167
f5827134 16820030614
169 - (djm) Update license on fake-rfc2553.[ch]; ok itojun@
170
be193d89 17120030611
c12c6ef8 172 - (djm) Mention portable copyright holders in LICENSE
e52ca1e5 173 - (djm) Put licenses on substantial header files
8cb3fa9d 174 - (djm) Sync LICENSE against OpenBSD
be193d89 175 - (djm) OpenBSD CVS Sync
176 - jmc@cvs.openbsd.org 2003/06/10 09:12:11
177 [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5]
178 [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
179 - section reorder
180 - COMPATIBILITY merge
181 - macro cleanup
182 - kill whitespace at EOL
183 - new sentence, new line
184 ssh pages ok markus@
0daa6547 185 - deraadt@cvs.openbsd.org 2003/06/10 22:20:52
186 [packet.c progressmeter.c]
187 mostly ansi cleanup; pval ok
1432b5c4 188 - jakob@cvs.openbsd.org 2003/06/11 10:16:16
189 [sshconnect.c]
190 clean up check_host_key() and improve SSHFP feedback. ok markus@
cc263107 191 - jakob@cvs.openbsd.org 2003/06/11 10:18:47
192 [dns.c]
193 sync with check_host_key() change
ca719034 194 - djm@cvs.openbsd.org 2003/06/11 11:18:38
195 [authfd.c authfd.h ssh-add.c ssh-agent.c]
196 make agent constraints (lifetime, confirm) work with smartcard keys;
197 ok markus@
be193d89 198
199
8a547250 20020030609
201 - (djm) Sync README.smartcard with OpenBSD -current
a1864983 202 - (djm) Re-merge OpenSC info into README.smartcard
8a547250 203
f5db6a03 20420030606
205 - (dtucker) [uidswap.c] Fix setreuid and add missing args to fatal(). ok djm@
206
02e2a074 20720030605
208 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
209 canohost.c changes.
688eed4a 210 - (djm) Implement paranoid priv dropping checks, based on:
211 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
212 Proceedings of USENIX Security Symposium 2002
d6bd2b5a 213 - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
52d58495 214 - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
57c917f8 215 - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
216 Patch from larsch@trustcenter.de
7b7f164b 217 - (djm) Bug #589 - scard-opensc: load only keys with a private keys
218 Patch from larsch@trustcenter.de
4ed465ec 219 - (dtucker) Add includes.h to fake-rfc2553.c so it will build.
e932f447 220 - (dtucker) Define EAI_NONAME in fake-rfc2553.h (used by fake-rfc2553.c).
02e2a074 221
b08a39ff 22220030604
d60e487c 223 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
224 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
8acdec60 225 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
11f1e60e 226 Patch from larsch@trustcenter.de; ok markus@
227 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
228 larsch@trustcenter.de; ok markus@
d453a600 229 - (djm) OpenBSD CVS Sync
230 - djm@cvs.openbsd.org 2003/06/04 08:25:18
231 [sshconnect.c]
232 disable challenge/response and keyboard-interactive auth methods
233 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
234 bz #580; ok markus@
ee50371d 235 - djm@cvs.openbsd.org 2003/06/04 10:23:48
236 [sshd.c]
237 remove duplicated group-dropping code; ok markus@
b08a39ff 238 - djm@cvs.openbsd.org 2003/06/04 12:03:59
239 [serverloop.c]
240 remove bitrotten commet; ok markus@
cf3248b8 241 - djm@cvs.openbsd.org 2003/06/04 12:18:49
242 [scp.c]
243 ansify; ok markus@
0f764b2f 244 - djm@cvs.openbsd.org 2003/06/04 12:40:39
245 [scp.c]
246 kill ssh process upon receipt of signal, bz #241.
247 based on patch from esb AT hawaii.edu; ok markus@
1b558925 248 - djm@cvs.openbsd.org 2003/06/04 12:41:22
249 [sftp.c]
250 kill ssh process on receipt of signal; ok markus@
fba33e81 251 - (djm) Update to fix of bug #584: lock card before return.
252 From larsch@trustcenter.de
8d9bb5dd 253 - (djm) Always use mysignal() for SIGALRM
d60e487c 254
3a2b2b44 25520030603
256 - (djm) Replace setproctitle replacement with code derived from
257 UCB sendmail
c5a7d788 258 - (djm) OpenBSD CVS Sync
259 - markus@cvs.openbsd.org 2003/06/02 09:17:34
260 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
261 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
262 [sshd_config.5]
263 deprecate VerifyReverseMapping since it's dangerous if combined
264 with IP based access control as noted by Mike Harding; replace with
265 a UseDNS option, UseDNS is on by default and includes the
266 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
267 ok deraadt@, djm@
d981089c 268 - millert@cvs.openbsd.org 2003/06/03 02:56:16
269 [scp.c]
270 Remove the advertising clause in the UCB license which Berkeley
271 rescinded 22 July 1999. Proofed by myself and Theo.
c5a7d788 272 - (djm) Fix portable-specific uses of verify_reverse_mapping too
3e67f7df 273 - (djm) Sync openbsd-compat with OpenBSD CVS.
484d59c7 274 - No more 4-term BSD licenses in linked code
5d8ca8c7 275 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
3a2b2b44 276
aff561f9 27720030602
278 - (djm) Fix segv from bad reordering in auth-pam.c
416c732d 279 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
280 clobber
1b7342ab 281 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
282 CVS ID.
8862e142 283 - (djm) Remove "noip6" option from RedHat spec file. This may now be
284 set at runtime using AddressFamily option.
58ba3cb7 285 - (djm) Fix use of macro before #define in cipher-aes.c
382fe2fa 286 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
b0545fe6 287 - (djm) OpenBSD CVS Sync
288 - djm@cvs.openbsd.org 2003/05/26 12:54:40
289 [sshconnect.c]
290 fix format strings; ok markus@
fa5120a0 291 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
292 [sshd.c uidswap.c]
293 seteuid and setegid; markus ok
0f92946c 294 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
295 [ssh_config.5]
296 VerifyHostKeyDNS is v2 only. ok markus@
aff561f9 297
4f178be8 29820030530
299 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
300 roumenpetrov.info
eabb99c6 301 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
4f178be8 302
4881aebb 30320030526
304 - (djm) Avoid auth2-chall.c warning when compiling without
305 PAM, BSD_AUTH and SKEY
306
5b0fe364 30720030525
308- (djm) OpenBSD CVS Sync
309 - djm@cvs.openbsd.org 2003/05/24 09:02:22
310 [log.c]
311 pass logged data through strnvis; ok markus
b9ed513a 312 - djm@cvs.openbsd.org 2003/05/24 09:30:40
313 [authfile.c monitor.c sftp-common.c sshpty.c]
314 cast some types for printing; ok markus@
5b0fe364 315
44c78996 31620030524
317 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
318
d83ebe4a 31920030523
320 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
321 encoding (which encodes many more characters)
bd47824b 322 - OpenBSD CVS Sync
323 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
324 [sftp.1]
325 - new sentence, new line
326 - added .Xr's
327 - typos
328 ok djm@
3cbc677d 329 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
330 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
331 new sentence, new line
da54f5be 332 - djm@cvs.openbsd.org 2003/05/23 08:29:30
333 [sshconnect.c]
334 fix leak; ok markus@
d83ebe4a 335
c453493f 33620030520
337 - (djm) OpenBSD CVS Sync
338 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
339 [log.c]
340 use syslog_r() in a signal handler called place; markus ok
79d4fc55 341 - (djm) Configure logic to detect syslog_r and friends
c453493f 342
acb50584 34320030519
344 - (djm) Sync auth-pam.h with what we actually implement
345
34620030518
5ff453c0 347 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
348 recent merge
f811e52a 349 - (djm) OpenBSD CVS Sync
350 - djm@cvs.openbsd.org 2003/05/16 03:27:12
351 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
352 add AddressFamily option to ssh_config (like -4, -6 on commandline).
353 Portable bug #534; ok markus@
013b1214 354 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
355 [auth-rhosts.c]
356 just in case, put numbers to sscanf %s arg.
25b66522 357 - markus@cvs.openbsd.org 2003/05/17 04:27:52
358 [cipher.c cipher-ctr.c myproposal.h]
359 experimental support for aes-ctr modes from
360 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
361 ok djm@
25351757 362 - (djm) Remove IPv4 by default hack now that we can specify AF in config
3bf784bc 363 - (djm) Tidy and trim TODO
bffa6723 364 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
9901cb37 365 - (djm) Big KNF on openbsd-compat/
f1da2b8b 366 - (djm) KNF on md5crypt.[ch]
367 - (djm) KNF on auth-sia.[ch]
5ff453c0 368
f123055b 36920030517
370 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
371
c936c243 37220030516
373 - (djm) OpenBSD CVS Sync
374 - djm@cvs.openbsd.org 2003/05/15 13:52:10
375 [ssh.c]
376 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
377 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
a2144546 378 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
379 [readconf.c servconf.c]
380 warn for unsupported config option. ok markus@
5bdfde81 381 - markus@cvs.openbsd.org 2003/05/15 14:09:21
382 [auth2-krb5.c]
383 fix 64bit issue; report itojun@
09ab3296 384 - djm@cvs.openbsd.org 2003/05/15 14:55:25
385 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
386 add a ConnectTimeout option to ssh, based on patch from
387 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
b06b11ad 388 - (djm) Add warning for UsePAM when built without PAM support
7be625e1 389 - (djm) A few type mismatch fixes from Bug #565
0eb6370a 390 - (djm) Guard free_pam_environment against NULL argument. Works around
391 HP/UX PAM problems debugged by dtucker
c936c243 392
7efc7f57 39320030515
394 - (djm) OpenBSD CVS Sync
395 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
396 [ssh-agent.1]
397 setup -> set up;
398 from wiz@netbsd
21289cd0 399 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
400 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
401 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
402 add experimental support for verifying hos keys using DNS as described
403 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
404 ok markus@ and henning@
16a79097 405 - markus@cvs.openbsd.org 2003/05/14 22:24:42
406 [clientloop.c session.c ssh.1]
407 allow to send a BREAK to the remote system; ok various
b8c2031b 408 - markus@cvs.openbsd.org 2003/05/15 00:28:28
409 [sshconnect2.c]
410 cleanup unregister of per-method packet handlers; ok djm@
d0ec7f42 411 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
412 [readconf.c readconf.h servconf.c servconf.h]
413 always parse kerberos options. ok djm@ markus@
b414a17b 414 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
415 [dns.c]
416 add missing freerrset
3b6e3da9 417 - markus@cvs.openbsd.org 2003/05/15 03:08:29
418 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
419 split out custom EVP ciphers
02159d9b 420 - djm@cvs.openbsd.org 2003/05/15 03:10:52
421 [ssh-keygen.c]
422 avoid warning; ok jakob@
4a26f5c5 423 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
424 [sftp-int.c]
425 Make put/get (globed and nonglobed) code more consistant. OK djm@
c44f10c6 426 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
dc69f53c 427 [sftp-int.c sftp.c]
c44f10c6 428 Teach ls how to display multiple column display and allow users
429 to return to single column format via 'ls -1'. OK @djm
1457e7ff 430 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
431 [readconf.c servconf.c]
432 disable kerberos when not supported. ok markus@
861f0365 433 - markus@cvs.openbsd.org 2003/05/15 04:08:41
434 [ssh.1]
435 ~B is ssh2 only
d0ec7f42 436 - (djm) Always parse UsePAM
3e05e934 437 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
4460d509 438 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
86ee6794 439 - (djm) Tidy Makefile clean targets
2636769c 440 - (djm) Adapt README.dns for portable
2d2e4a34 441 - (djm) Avoid uuencode.c warnings
1457e7ff 442 - (djm) Enable UsePAM when built --with-pam
67467c30 443 - (djm) Only build getrrsetbyname replacement when using --with-dns
f420d2ba 444 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
445 correctly)
3c49ef10 446 - (djm) Bug #444: Wrong paths after reconfigure
321735c7 447 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
f420d2ba 448
dd3ebb5a 44920030514
450 - (djm) Bug #117: Don't lie to PAM about username
0608f8a7 451 - (djm) RCSID sync w/ OpenBSD
204fde99 452 - (djm) OpenBSD CVS Sync
453 - djm@cvs.openbsd.org 2003/04/09 12:00:37
454 [readconf.c]
455 strip trailing whitespace from config lines before parsing.
456 Fixes bz 528; ok markus@
18ae3c67 457 - markus@cvs.openbsd.org 2003/04/12 10:13:57
458 [cipher.c]
459 hide cipher details; ok djm@
45c42d58 460 - markus@cvs.openbsd.org 2003/04/12 10:15:36
461 [misc.c]
462 debug->debug2
c825cd79 463 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
464 [ssh.1]
465 document -V switch, fix wording; ok markus@
3e131a6d 466 - markus@cvs.openbsd.org 2003/04/14 14:17:50
467 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
468 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
927e9f8b 469 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
470 [sftp-int.c]
471 Missing globfree(&g) in process_put() spotted by Vince Brimhall
472 <VBrimhall@novell.com>. ok@ Theo
473 - markus@cvs.openbsd.org 2003/04/16 14:35:27
474 [auth.h]
475 document struct Authctxt; with solar
b9e5aff6 476 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
477 [ssh-keyscan.c]
478 -t in usage(); rogier@quaak.org
9a26a6e2 479 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
480 [sshd.8 sshd_config.5]
481 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
482 Bug #550 and * escaping suggested by jmc@.
09dc8896 483 - david@cvs.openbsd.org 2003/04/30 20:41:07
484 [sshd.8]
485 fix invalid .Pf macro usage introduced in previous commit
486 ok jmc@ mouring@
3566c73c 487 - markus@cvs.openbsd.org 2003/05/11 16:56:48
488 [authfile.c ssh-keygen.c]
489 change key_load_public to try to read a public from:
490 rsa1 private or rsa1 public and ssh2 keys.
491 this makes ssh-keygen -e fail for ssh1 keys more gracefully
492 for example; report from itojun (netbsd pr 20550).
0d942eff 493 - markus@cvs.openbsd.org 2003/05/11 20:30:25
494 [channels.c clientloop.c serverloop.c session.c ssh.c]
495 make channel_new() strdup the 'remote_name' (not the caller); ok theo
43348518 496 - markus@cvs.openbsd.org 2003/05/12 16:55:37
497 [sshconnect2.c]
498 for pubkey authentication try the user keys in the following order:
499 1. agent keys that are found in the config file
500 2. other agent keys
501 3. keys that are only listed in the config file
502 this helps when an agent has many keys, where the server might
503 close the connection before the correct key is used. report & ok pb@
dc109cfe 504 - markus@cvs.openbsd.org 2003/05/12 18:35:18
505 [ssh-keyscan.1]
506 typo: DSA keys are of type ssh-dss; Brian Poole
81466908 507 - markus@cvs.openbsd.org 2003/05/14 00:52:59
508 [ssh2.h]
509 ranges for per auth method messages
510 - djm@cvs.openbsd.org 2003/05/14 01:00:44
511 [sftp.1]
512 emphasise the batchmode functionality and make reference to pubkey auth,
513 both of which are FAQs; ok markus@
802e01b8 514 - markus@cvs.openbsd.org 2003/05/14 02:15:47
515 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
516 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
517 server interops with commercial client; ok jakob@ djm@
72c5fe79 518 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
519 [sftp.1]
520 - better formatting in SYNOPSIS
521 - whitespace at EOL
522 ok djm@
3a39206f 523 - markus@cvs.openbsd.org 2003/05/14 08:57:49
524 [monitor.c]
525 http://bugzilla.mindrot.org/show_bug.cgi?id=560
526 Privsep child continues to run after monitor killed.
527 Pass monitor signals through to child; Darren Tucker
751092f9 528 - (djm) Make portable build with MIT krb5 (some issues remain)
7fceb20d 529 - (djm) Add new UsePAM configuration directive to allow runtime control
530 over usage of PAM. This allows non-root use of sshd when built with
531 --with-pam
817e6d38 532 - (djm) Die screaming if start_pam() is called when UsePAM=no
83ccf11a 533 - (djm) Avoid KrbV leak for MIT Kerberos
b1848832 534 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
fa065de2 535 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
dd3ebb5a 536
91f3aa9b 53720030512
538 - (djm) Redhat spec: Don't install profile.d scripts when not
539 building with GNOME/GTK askpass (patch from bet@rahul.net)
540
5def520a 54120030510
542 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
543 "make install". Patch by roth@feep.net.
ad84c479 544 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
545 problem on Linux (fixes "could not set controlling tty" errors).
05114c74 546 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
547 proper challenge-response module
23ab1f36 548 - (djm) 2-clause license on loginrec.c, with permission from
549 andre@ae-35.com
5def520a 550
43ce025d 55120030504
dd594f99 552 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
553 Patch from vinschen@redhat.com.
43ce025d 554
2cd5dbba 55520030503
556 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
557 by wendyp@cray.com.
558
bf7c1e6c 55920030502
560 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
561 privsep should now work.
73d9dad3 562 - (dtucker) Move handling of bad password authentications into a platform
990278ef 563 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
bf7c1e6c 564
68ece370 56520030429
566 - (djm) Add back radix.o (used by AFS support), after it went missing from
567 Makefile many moons ago
568 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
569 - (djm) Fix blibpath specification for AIX/gcc
570 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
571
ded9dd18 57220030428
573 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
574 hacked code.
575
aceb0423 57620030427
577 - (bal) Bug #541: return; was dropped by mistake. Reported by
578 furrier@iglou.com
c8a50a34 579 - (bal) Since we don't support platforms lacking u_int_64. We may
580 as well clean out some of those evil #ifdefs
9a6fee8b 581 - (bal) auth1.c minor resync while looking at the code.
d7cf277b 582 - (bal) auth2.c same changed as above.
aceb0423 583
0a626302 58420030409
585 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
586 from matth@eecs.berkeley.edu
d35929b5 587 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
ffd7b36b 588 - (djm) OpenBSD CVS Sync
589 - markus@cvs.openbsd.org 2003/04/02 09:48:07
590 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
591 [readconf.h serverloop.c sshconnect2.c]
592 reapply rekeying chage, tested by henning@, ok djm@
16f1b5ca 593 - markus@cvs.openbsd.org 2003/04/02 14:36:26
594 [ssh-keysign.c]
595 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
6c1bc5c5 596 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
597 [progressmeter.c]
598 $OpenBSD$
599 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
600 [progressmeter.c]
601 remove $OpenBSD$, as other *.c does not have it.
806e4c11 602 - markus@cvs.openbsd.org 2003/04/07 08:29:57
603 [monitor_wrap.c]
604 typo: get correct counters; introduced during rekeying change.
2f5b2528 605 - millert@cvs.openbsd.org 2003/04/07 21:58:05
606 [progressmeter.c]
607 The UCB copyright here is incorrect. This code did not originate
608 at UCB, it was written by Luke Mewburn. Updated the copyright at
609 the author's request. markus@ OK
610 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
611 [*.c *.h]
612 rename log() into logit() to avoid name conflict. markus ok, from
613 netbsd
614 - (djm) XXX - Performed locally using:
615 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
70e1f62f 616 - hin@cvs.openbsd.org 2003/04/09 08:23:52
617 [servconf.c]
618 Don't include <krb.h> when compiling with Kerberos 5 support
2f5b2528 619 - (djm) Fix up missing include for packet.c
a3568201 620 - (djm) Fix missed log => logit occurance (reference by function pointer)
0a626302 621
4d0cb2e5 62220030402
623 - (bal) if IP_TOS is not found or broken don't try to compile in
624 packet_set_tos() function call. bug #527
625
a4e5acef 62620030401
627 - (djm) OpenBSD CVS Sync
628 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
629 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
630 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
631 - killed whitespace
632 - new sentence new line
633 - .Bk for arguments
634 ok markus@
177f584b 635 - markus@cvs.openbsd.org 2003/04/01 10:10:23
636 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
637 [readconf.h serverloop.c sshconnect2.c]
638 rekeying bugfixes and automatic rekeying:
639 * both client and server rekey _automatically_
640 (a) after 2^31 packets, because after 2^32 packets
641 the sequence number for packets wraps
642 (b) after 2^(blocksize_in_bits/4) blocks
643 (see: draft-ietf-secsh-newmodes-00.txt)
644 (a) and (b) are _enabled_ by default, and only disabled for known
645 openssh versions, that don't support rekeying properly.
646 * client option 'RekeyLimit'
647 * do not reply to requests during rekeying
648 - markus@cvs.openbsd.org 2003/04/01 10:22:21
649 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
650 [readconf.h serverloop.c sshconnect2.c]
651 backout rekeying changes (for 3.6.1)
519bdfe8 652 - markus@cvs.openbsd.org 2003/04/01 10:31:26
653 [compat.c compat.h kex.c]
654 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
655 tested by ho@ and myself
9dd240a3 656 - markus@cvs.openbsd.org 2003/04/01 10:56:46
657 [version.h]
658 3.6.1
ac01b518 659 - (djm) Crank spec file versions
b32453fe 660 - (djm) Release 3.6.1p1
a4e5acef 661
fd77a40f 66220030326
663 - (djm) OpenBSD CVS Sync
664 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
665 [sftp-server.c]
666 one last fix to the tree: race fix broke stuff; pr 3169;
667 srp@srparish.net, help from djm
668
8021857c 66920030325
670 - (djm) Fix getpeerid support for 64 bit BE systems. From
671 Arnd Bergmann <arndb@de.ibm.com>
672
cdb64c4d 67320030324
674 - (djm) OpenBSD CVS Sync
675 - markus@cvs.openbsd.org 2003/03/23 19:02:00
676 [monitor.c]
677 unbreak rekeying for privsep; ok millert@
678 - Release 3.6p1
62086365 679 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
680 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
cdb64c4d 681
0b202697 682$Id$
This page took 3.042341 seconds and 5 git commands to generate.