]> andersk Git - openssh.git/blame - ChangeLog
- dtucker@cvs.openbsd.org 2009/08/20 23:54:28
[openssh.git] / ChangeLog
CommitLineData
3496b8d4 120091007
2 - (dtucker) OpenBSD CVS Sync
3 - djm@cvs.openbsd.org 2009/08/12 00:13:00
4 [sftp.c sftp.1]
5 support most of scp(1)'s commandline arguments in sftp(1), as a first
6 step towards making sftp(1) a drop-in replacement for scp(1).
7 One conflicting option (-P) has not been changed, pending further
8 discussion.
9 Patch from carlosvsilvapt@gmail.com as part of his work in the
10 Google Summer of Code
b68241c3 11 - jmc@cvs.openbsd.org 2009/08/12 06:31:42
12 [sftp.1]
13 sort options;
97658f13 14 - djm@cvs.openbsd.org 2009/08/13 01:11:19
15 [sftp.1 sftp.c]
16 Swizzle options: "-P sftp_server_path" moves to "-D sftp_server_path",
17 add "-P port" to match scp(1). Fortunately, the -P option is only really
18 used by our regression scripts.
19 part of larger patch from carlosvsilvapt@gmail.com for his Google Summer
20 of Code work; ok deraadt markus
5aa0f160 21 - jmc@cvs.openbsd.org 2009/08/13 13:39:54
22 [sftp.1 sftp.c]
23 sync synopsis and usage();
e746280c 24 - djm@cvs.openbsd.org 2009/08/14 18:17:49
25 [sftp-client.c]
26 make the "get_handle: ..." error messages vaguely useful by allowing
27 callers to specify their own error message strings.
5d799258 28 - fgsch@cvs.openbsd.org 2009/08/15 18:56:34
29 [auth.h]
30 remove unused define. markus@ ok.
31 (Id sync only, Portable still uses this.)
7b3a24aa 32 - dtucker@cvs.openbsd.org 2009/08/16 23:29:26
33 [sshd_config.5]
34 Add PubkeyAuthentication to the list allowed in a Match block (bz #1577)
d141f964 35 - djm@cvs.openbsd.org 2009/08/18 18:36:21
36 [sftp-client.h sftp.1 sftp-client.c sftp.c]
37 recursive transfer support for get/put and on the commandline
38 work mostly by carlosvsilvapt@gmail.com for the Google Summer of Code
39 with some tweaks by me; "go for it" deraadt@
e83f55f9 40 - djm@cvs.openbsd.org 2009/08/18 21:15:59
41 [sftp.1]
42 fix "get" command usage, spotted by jmc@
3829cbca 43 - jmc@cvs.openbsd.org 2009/08/19 04:56:03
44 [sftp.1]
45 ether -> either;
2e2c33ad 46 - dtucker@cvs.openbsd.org 2009/08/20 23:54:28
47 [mux.c]
48 subsystem_flag is defined in ssh.c so it's extern; ok djm
3496b8d4 49
2391a73c 5020091002
51 - (djm) [Makefile.in] Mention readconf.o in ssh-keysign's make deps.
52 spotted by des AT des.no
53
018fda87 5420090926
55 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
56 [contrib/suse/openssh.spec] Update for release
57 - (djm) [README] update relnotes URL
58 - (djm) [packet.c] Restore EWOULDBLOCK handling that got lost somewhere
59 - (djm) Release 5.3p1
60
a37250f4 6120090911
62 - (dtucker) [configure.ac] Change the -lresolv check so it works on Mac OS X
63 10.6 (which doesn't have BIND8_COMPAT and thus uses res_9_query). Patch
64 from jbasney at ncsa uiuc edu.
65
bc33f6d6 6620090908
67 - (djm) [serverloop.c] Fix test for server-assigned remote forwarding port
68 (-R 0:...); bz#1578, spotted and fix by gavin AT emf.net; ok dtucker@
69
3acad382 7020090901
71 - (dtucker) [configure.ac] Bug #1639: use AC_PATH_PROG to search the path for
72 krb5-config if it's not in the location specified by --with-kerberos5.
73 Patch from jchadima at redhat.
74
84c645ec 7520090829
76 - (dtucker) [README.platform] Add text about development packages, based on
77 text from Chris Pepper in bug #1631.
78
7a51ce05 7920090828
80 - dtucker [auth-sia.c] Roll back the change for bug #1241 as it apparently
81 causes problems in some Tru64 configurations.
d108641a 82 - (djm) [sshd_config.5] downgrade mention of login.conf to be an example
83 and mention PAM as another provider for ChallengeResponseAuthentication;
84 bz#1408; ok dtucker@
6ecb350f 85 - (djm) [sftp-server.c] bz#1535: accept ENOSYS as a fallback error when
86 attempting atomic rename(); ok dtucker@
36141cb8 87 - (djm) [Makefile.in] bz#1505: Solaris make(1) doesn't accept make variables
88 in argv, so pass them in the environment; ok dtucker@
5e934f78 89 - (dtucker) [channels.c configure.ac] Bug #1528: skip the tcgetattr call on
90 the pty master on Solaris, since it never succeeds and can hang if large
91 amounts of data is sent to the slave (eg a copy-paste). Based on a patch
92 originally from Doke Scott, ok djm@
e7ac4a90 93 - (dtucker) [clientloop.c configure.ac defines.h] Make the client's IO buffer
94 size a compile-time option and set it to 64k on Cygwin, since Corinna
95 reports that it makes a significant difference to performance. ok djm@
00789f24 96 - (dtucker) [configure.ac] Fix the syntax of the Solaris tcgetattr entry.
7a51ce05 97
bf87c429 9820090820
99 - (dtucker) [includes.h] Bug #1634: do not include system glob.h if we're not
100 using it since the type conflicts can cause problems on FreeBSD. Patch
101 from Jonathan Chen.
406dc01a 102 - (dtucker) [session.c openbsd-compat/port-aix.h] Bugs #1249 and #1567: move
103 the setpcred call on AIX to immediately before the permanently_set_uid().
104 Ensures that we still have privileges when we call chroot and
105 pam_open_sesson. Based on a patch from David Leonard.
bf87c429 106
8295689f 10720090817
108 - (dtucker) [configure.ac] Check for headers before libraries for openssl an
109 zlib, which should make the errors slightly more meaningful on platforms
110 where there's separate "-devel" packages for those.
e339fa25 111 - (dtucker) [sshlogin.c openbsd-compat/port-aix.{c,h}] Bug #1595: make
112 PrintLastLog work on AIX. Based in part on a patch from Miguel Sanders.
8295689f 113
852de6fd 11420090729
115 - (tim) [contrib/cygwin/ssh-user-config] Change script to call correct error
116 function. Patch from Corinna Vinschen.
117
14a260e8 11820090713
119 - (dtucker) [openbsd-compat/getrrsetbyname.c] Reduce answer buffer size so it
120 fits into 16 bits to work around a bug in glibc's resolver where it masks
121 off the buffer size at 16 bits. Patch from Hauke Lampe, ok djm jakob.
122
0a008a4d 12320090712
124 - (dtucker) [configure.ac] Include sys/param.h for the sys/mount.h test,
125 prevents configure complaining on older BSDs.
74973c95 126 - (dtucker [contrib/cygwin/ssh-{host,user}-config] Add license text. Patch
127 from Corinna Vinschen.
f12c178c 128 - (dtucker) [auth-pam.c] Bug #1534: move the deletion of PAM credentials on
1d5c49e0 129 logout to after the session close. Patch from Anicka Bernathova,
130 originally from Andreas Schwab via Novelll ok djm.
0a008a4d 131
78576c54 13220090707
133 - (dtucker) [contrib/cygwin/ssh-host-config] better support for automated
134 scripts and fix usage of eval. Patch from Corinna Vinschen.
135
13620090705
dc11a83a 137 - (dtucker) OpenBSD CVS Sync
138 - andreas@cvs.openbsd.org 2009/06/27 09:29:06
139 [packet.h packet.c]
140 packet_bacup_state() and packet_restore_state() will be used to
141 temporarily save the current state ren resuming a suspended connection.
142 ok markus@
143 - andreas@cvs.openbsd.org 2009/06/27 09:32:43
144 [roaming_common.c roaming.h]
145 It may be necessary to retransmit some data when resuming, so add it
146 to a buffer when roaming is enabled.
147 Most of this code was written by Martin Forssen, maf at appgate dot com.
148 ok markus@
149 - andreas@cvs.openbsd.org 2009/06/27 09:35:06
150 [readconf.h readconf.c]
151 Add client option UseRoaming. It doesn't do anything yet but will
152 control whether the client tries to use roaming if enabled on the
153 server. From Martin Forssen.
154 ok markus@
155 - markus@cvs.openbsd.org 2009/06/30 14:54:40
156 [version.h]
157 crank version; ok deraadt
158 - dtucker@cvs.openbsd.org 2009/07/02 02:11:47
159 [ssh.c]
160 allow for long home dir paths (bz #1615). ok deraadt
161 (based in part on a patch from jchadima at redhat)
162 - stevesk@cvs.openbsd.org 2009/07/05 19:28:33
163 [clientloop.c]
164 only send SSH2_MSG_DISCONNECT if we're in compat20; from dtucker@
165 ok deraadt@ markus@
166
127c96db 16720090622
168 - (dtucker) OpenBSD CVS Sync
169 - dtucker@cvs.openbsd.org 2009/06/22 05:39:28
170 [monitor_wrap.c monitor_mm.c ssh-keygen.c auth2.c gss-genr.c sftp-client.c]
171 alphabetize includes; reduces diff vs portable and style(9).
172 ok stevesk djm
173 (Id sync only; these were already in order in -portable)
174
f0956980 17520090621
176 - (dtucker) OpenBSD CVS Sync
177 - markus@cvs.openbsd.org 2009/03/17 21:37:00
178 [ssh.c]
179 pass correct argv[0] to openlog(); ok djm@
8fe25329 180 - jmc@cvs.openbsd.org 2009/03/19 15:15:09
181 [ssh.1]
182 for "Ciphers", just point the reader to the keyword in ssh_config(5), just
183 as we do for "MACs": this stops us getting out of sync when the lists
184 change;
185 fixes documentation/6102, submitted by Peter J. Philipp
186 alternative fix proposed by djm
187 ok markus
230d03b6 188 - tobias@cvs.openbsd.org 2009/03/23 08:31:19
189 [ssh-agent.c]
190 Fixed a possible out-of-bounds memory access if the environment variable
191 SHELL is shorter than 3 characters.
192 with input by and ok dtucker
7027325d 193 - tobias@cvs.openbsd.org 2009/03/23 19:38:04
194 [ssh-agent.c]
195 My previous commit didn't fix the problem at all, so stick at my first
196 version of the fix presented to dtucker.
197 Issue notified by Matthias Barkhoff (matthias dot barkhoff at gmx dot de).
198 ok dtucker
b31ae930 199 - sobrado@cvs.openbsd.org 2009/03/26 08:38:39
200 [sftp-server.8 sshd.8 ssh-agent.1]
201 fix a few typographical errors found by spell(1).
202 ok dtucker@, jmc@
640f440b 203 - stevesk@cvs.openbsd.org 2009/04/13 19:07:44
204 [sshd_config.5]
205 fix possessive; ok djm@
7bd399ce 206 - stevesk@cvs.openbsd.org 2009/04/14 16:33:42
207 [sftp-server.c]
208 remove unused option character from getopt() optstring; ok markus@
3e576dfe 209 - jj@cvs.openbsd.org 2009/04/14 21:10:54
210 [servconf.c]
211 Fixed a few the-the misspellings in comments. Skipped a bunch in
212 binutils,gcc and so on. ok jmc@
02d56d32 213 - stevesk@cvs.openbsd.org 2009/04/17 19:23:06
214 [session.c]
215 use INTERNAL_SFTP_NAME for setproctitle() of in-process sftp-server;
216 ok djm@ markus@
db1f5925 217 - stevesk@cvs.openbsd.org 2009/04/17 19:40:17
218 [sshd_config.5]
219 clarify that even internal-sftp needs /dev/log for logging to work; ok
220 markus@
47f4188a 221 - jmc@cvs.openbsd.org 2009/04/18 18:39:10
222 [sshd_config.5]
223 tweak previous; ok stevesk
5df1f0e3 224 - stevesk@cvs.openbsd.org 2009/04/21 15:13:17
225 [sshd_config.5]
226 clarify we cd to user's home after chroot; ok markus@ on
227 earlier version; tweaks and ok jmc@
dc1f1948 228 - andreas@cvs.openbsd.org 2009/05/25 06:48:01
229 [channels.c packet.c clientloop.c packet.h serverloop.c monitor_wrap.c
230 monitor.c]
231 Put the globals in packet.c into a struct and don't access it directly
232 from other files. No functional changes.
233 ok markus@ djm@
234 - andreas@cvs.openbsd.org 2009/05/27 06:31:25
235 [canohost.h canohost.c]
236 Add clear_cached_addr(), needed for upcoming changes allowing the peer
237 address to change.
238 ok markus@
f936c5d4 239 - andreas@cvs.openbsd.org 2009/05/27 06:33:39
240 [clientloop.c]
241 Send SSH2_MSG_DISCONNECT when the client disconnects. From a larger
242 change from Martin Forssen, maf at appgate dot com.
243 ok markus@
abdc5018 244 - andreas@cvs.openbsd.org 2009/05/27 06:34:36
245 [kex.c kex.h]
246 Move the KEX_COOKIE_LEN define to kex.h
247 ok markus@
87db7000 248 - andreas@cvs.openbsd.org 2009/05/27 06:36:07
249 [packet.h packet.c]
250 Add packet_put_int64() and packet_get_int64(), part of a larger change
251 from Martin Forssen.
c6063ed7 252 ok markus@
253 - andreas@cvs.openbsd.org 2009/05/27 06:38:16
254 [sshconnect.h sshconnect.c]
255 Un-static ssh_exchange_identification(), part of a larger change from
256 Martin Forssen and needed for upcoming changes.
257 ok markus@
5d4d25cd 258 - andreas@cvs.openbsd.org 2009/05/28 16:50:16
259 [sshd.c packet.c serverloop.c monitor_wrap.c clientloop.c sshconnect.c
d0137ef8 260 monitor.c Added roaming.h roaming_common.c roaming_dummy.c]
5d4d25cd 261 Keep track of number of bytes read and written. Needed for upcoming
262 changes. Most code from Martin Forssen, maf at appgate dot com.
263 ok markus@
d0137ef8 264 Also, applied appropriate changes to Makefile.in
adb5cc1b 265 - andreas@cvs.openbsd.org 2009/06/12 20:43:22
266 [monitor.c packet.c]
267 Fix warnings found by chl@ and djm@ and change roaming_atomicio's
268 return type to match atomicio's
269 Diff from djm@, ok markus@
6a49252d 270 - andreas@cvs.openbsd.org 2009/06/12 20:58:32
271 [packet.c]
272 Move some more statics into session_state
273 ok markus@ djm@
ac692f84 274 - dtucker@cvs.openbsd.org 2009/06/21 07:37:15
275 [kexdhs.c kexgexs.c]
276 abort if key_sign fails, preventing possible null deref. Based on report
277 from Paolo Ganci, ok markus@ djm@
278 - dtucker@cvs.openbsd.org 2009/06/21 09:04:03
279 [roaming.h roaming_common.c roaming_dummy.c]
280 Add tags for the benefit of the sync scripts
281 Also: pull in the changes for 1.1->1.2 missed in the previous sync.
9b9302ea 282 - (dtucker) [auth2-jpake.c auth2.c canohost.h session.c] Whitespace and
283 header-order changes to reduce diff vs OpenBSD.
c8dc0909 284 - (dtucker) [servconf.c sshd.c] More whitespace sync.
e85016d4 285 - (dtucker) [roaming_common.c roaming_dummy.c] Wrap #include <inttypes.h> in
286 ifdef.
f0956980 287
87562a58 28820090616
289 - (dtucker) [configure.ac defines.h] Bug #1607: handle the case where fsid_t
290 is a struct with a __val member. Fixes build on, eg, Redhat 6.2.
291
6ee76eea 29220090504
293 - (dtucker) [sshlogin.c] Move the NO_SSH_LASTLOG #ifndef line to include
294 variable declarations. Should prevent unused warnings anywhere it's set
295 (only Crays as far as I can tell) and be a no-op everywhere else.
296
bc9a470b 29720090318
298 - (tim) [configure.ac] Remove setting IP_TOS_IS_BROKEN for Cygwin. The problem
299 that setsockopt(IP_TOS) doesn't work on Cygwin has been fixed since 2005.
300 Based on patch from vinschen at redhat com.
301
5077a5f6 30220090308
303 - (dtucker) [auth-passwd.c auth1.c auth2-kbdint.c auth2-none.c auth2-passwd.c
304 auth2-pubkey.c session.c openbsd-compat/bsd-cygwin_util.{c,h}
305 openbsd-compat/daemon.c] Remove support for Windows 95/98/ME and very old
306 version of Cygwin. Patch from vinschen at redhat com.
307
3e566c29 30820090307
309 - (dtucker) [contrib/aix/buildbff.sh] Only try to rename ssh_prng_cmds if it
310 exists (it's not created if OpenSSL's PRNG is self-seeded, eg if the OS
311 has a /dev/random).
36b68fd5 312 - (dtucker) [schnorr.c openbsd-compat/openssl-compat.{c,h}] Add
313 EVP_DigestUpdate to the OLD_EVP compatibility functions and tell schnorr.c
314 to use them. Allows building with older OpenSSL versions.
aeed50df 315 - (dtucker) [configure.ac defines.h] Check for in_port_t and typedef if needed.
86783a32 316 - (dtucker) [configure.ac] Missing comma in type list.
14e380c6 317 - (dtucker) [configure.ac openbsd-compat/openssl-compat.{c,h}]
318 EVP_DigestUpdate does not exactly match the other OLD_EVP functions (eg
319 in openssl 0.9.6) so add an explicit test for it.
3e566c29 320
5b01421b 32120090306
322 - (djm) OpenBSD CVS Sync
323 - djm@cvs.openbsd.org 2009/03/05 07:18:19
324 [auth2-jpake.c jpake.c jpake.h monitor_wrap.c monitor_wrap.h schnorr.c]
325 [sshconnect2.c]
326 refactor the (disabled) Schnorr proof code to make it a little more
327 generally useful
4f983ff5 328 - djm@cvs.openbsd.org 2009/03/05 11:30:50
329 [uuencode.c]
330 document what these functions do so I don't ever have to recuse into
331 b64_pton/ntop to remember their return values
5b01421b 332
ebf012a2 33320090223
334 - (djm) OpenBSD CVS Sync
335 - djm@cvs.openbsd.org 2009/02/22 23:50:57
336 [ssh_config.5 sshd_config.5]
337 don't advertise experimental options
09b37352 338 - djm@cvs.openbsd.org 2009/02/22 23:59:25
339 [sshd_config.5]
340 missing period
52d8f3f6 341 - djm@cvs.openbsd.org 2009/02/23 00:06:15
342 [version.h]
343 openssh-5.2
dc336a3b 344 - (djm) [README] update for 5.2
0e8d25c9 345 - (djm) Release openssh-5.2p1
ebf012a2 346
7eec82ab 34720090222
348 - (djm) OpenBSD CVS Sync
349 - tobias@cvs.openbsd.org 2009/02/21 19:32:04
350 [misc.c sftp-server-main.c ssh-keygen.c]
351 Added missing newlines in error messages.
352 ok dtucker
353
1925d16d 35420090221
355 - (djm) OpenBSD CVS Sync
356 - djm@cvs.openbsd.org 2009/02/17 01:28:32
357 [ssh_config]
358 sync with revised default ciphers; pointed out by dkrause@
dca75d4b 359 - djm@cvs.openbsd.org 2009/02/18 04:31:21
360 [schnorr.c]
361 signature should hash over the entire group, not just the generator
362 (this is still disabled code)
9a4a047b 363 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
364 [contrib/suse/openssh.spec] Prepare for 5.2p1
1925d16d 365
aa10bde9 36620090216
367 - (djm) [regress/conch-ciphers.sh regress/putty-ciphers.sh]
368 [regress/putty-kex.sh regress/putty-transfer.sh] Downgrade disabled
369 interop tests from FATAL error to a warning. Allows some interop
370 tests to proceed if others are missing necessary prerequisites.
4c3b7423 371 - (djm) [configure.ac] support GNU/kFreeBSD and GNU/kOpensolaris
372 systems; patch from Aurelien Jarno via rmh AT aybabtu.com
aa10bde9 373
69354fe2 37420090214
375 - (djm) OpenBSD CVS Sync
376 - dtucker@cvs.openbsd.org 2009/02/02 11:15:14
377 [sftp.c]
378 Initialize a few variables to prevent spurious "may be used
379 uninitialized" warnings from newer gcc's. ok djm@
17525a70 380 - djm@cvs.openbsd.org 2009/02/12 03:00:56
381 [canohost.c canohost.h channels.c channels.h clientloop.c readconf.c]
382 [readconf.h serverloop.c ssh.c]
383 support remote port forwarding with a zero listen port (-R0:...) to
384 dyamically allocate a listen port at runtime (this is actually
385 specified in rfc4254); bz#1003 ok markus@
1d68c50a 386 - djm@cvs.openbsd.org 2009/02/12 03:16:01
387 [serverloop.c]
388 tighten check for -R0:... forwarding: only allow dynamic allocation
389 if want_reply is set in the packet
28b5d376 390 - djm@cvs.openbsd.org 2009/02/12 03:26:22
391 [monitor.c]
392 some paranoia: check that the serialised key is really KEY_RSA before
393 diddling its internals
db9039d0 394 - djm@cvs.openbsd.org 2009/02/12 03:42:09
395 [ssh.1]
396 document -R0:... usage
1e709459 397 - djm@cvs.openbsd.org 2009/02/12 03:44:25
398 [ssh.1]
399 consistency: Dq => Ql
c6b2c0e0 400 - djm@cvs.openbsd.org 2009/02/12 03:46:17
401 [ssh_config.5]
402 document RemoteForward usage with 0 listen port
e12d3e21 403 - jmc@cvs.openbsd.org 2009/02/12 07:34:20
404 [ssh_config.5]
405 kill trailing whitespace;
8b773163 406 - markus@cvs.openbsd.org 2009/02/13 11:50:21
407 [packet.c]
408 check for enc !=NULL in packet_start_discard
e75a14a1 409 - djm@cvs.openbsd.org 2009/02/14 06:35:49
410 [PROTOCOL]
411 mention that eow and no-more-sessions extensions are sent only to
412 OpenSSH peers
69354fe2 413
41420090212
f7b8146b 415 - (djm) [sshpty.c] bz#1419: OSX uses cloning ptys that automagically
416 set ownership and modes, so avoid explicitly setting them
295dd642 417 - (djm) [configure.ac loginrec.c] bz#1421: fix lastlog support for OSX.
418 OSX provides a getlastlogxbyname function that automates the reading of
419 a lastlog file. Also, the pututxline function will update lastlog so
420 there is no need for loginrec.c to do it explicitly. Collapse some
421 overly verbose code while I'm in there.
f7b8146b 422
b4341d7a 42320090201
424 - (dtucker) [defines.h sshconnect.c] INET6_ADDRSTRLEN is now needed in
425 channels.c too, so move the definition for non-IP6 platforms to defines.h
426 where it can be shared.
427
e1986e0a 42820090129
429 - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
430 If the CYGWIN environment variable is empty, the installer script
431 should not install the service with an empty CYGWIN variable, but
432 rather without setting CYGWNI entirely.
863ba23a 433 - (tim) [contrib/cygwin/ssh-host-config] Whitespace cleanup. No code changes.
e1986e0a 434
7f24626b 43520090128
436 - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
437 Changes to work on Cygwin 1.5.x as well as on the new Cygwin 1.7.x.
438 The information given for the setting of the CYGWIN environment variable
439 is wrong for both releases so I just removed it, together with the
440 unnecessary (Cygwin 1.5.x) or wrong (Cygwin 1.7.x) default setting.
441
68405671 44220081228
443 - (djm) OpenBSD CVS Sync
444 - stevesk@cvs.openbsd.org 2008/12/09 03:20:42
445 [channels.c servconf.c]
446 channel_print_adm_permitted_opens() should deal with all the printing
447 for that config option. suggested by markus@; ok markus@ djm@
448 dtucker@
7efff8ce 449 - djm@cvs.openbsd.org 2008/12/09 04:32:22
450 [auth2-chall.c]
451 replace by-hand string building with xasprinf(); ok deraadt@
d3cd4016 452 - sobrado@cvs.openbsd.org 2008/12/09 15:35:00
453 [sftp.1 sftp.c]
454 update for the synopses displayed by the 'help' command, there are a
455 few missing flags; add 'bye' to the output of 'help'; sorting and spacing.
456 jmc@ suggested replacing .Oo/.Oc with a single .Op macro.
457 ok jmc@
6c20a13f 458 - stevesk@cvs.openbsd.org 2008/12/09 22:37:33
459 [clientloop.c]
460 fix typo in error message
fd2ce9c6 461 - stevesk@cvs.openbsd.org 2008/12/10 03:55:20
462 [addrmatch.c]
463 o cannot be NULL here but use xfree() to be consistent; ok djm@
8647612c 464 - stevesk@cvs.openbsd.org 2008/12/29 01:12:36
465 [ssh-keyscan.1]
466 fix example, default key type is rsa for 3+ years; from
467 frederic.perrin@resel.fr
040d6b1f 468 - stevesk@cvs.openbsd.org 2008/12/29 02:23:26
469 [pathnames.h]
470 no need to escape single quotes in comments
d4bfdc62 471 - okan@cvs.openbsd.org 2008/12/30 00:46:56
472 [sshd_config.5]
473 add AllowAgentForwarding to available Match keywords list
474 ok djm
6cf44b6a 475 - djm@cvs.openbsd.org 2009/01/01 21:14:35
476 [channels.c]
477 call channel destroy callbacks on receipt of open failure messages.
478 fixes client hangs when connecting to a server that has MaxSessions=0
479 set spotted by imorgan AT nas.nasa.gov; ok markus@
546202d0 480 - djm@cvs.openbsd.org 2009/01/01 21:17:36
481 [kexgexs.c]
482 fix hash calculation for KEXGEX: hash over the original client-supplied
483 values and not the sanity checked versions that we acutally use;
484 bz#1540 reported by john.smith AT arrows.demon.co.uk
485 ok markus@
4866a6d6 486 - djm@cvs.openbsd.org 2009/01/14 01:38:06
487 [channels.c]
488 support SOCKS4A protocol, from dwmw2 AT infradead.org via bz#1482;
489 "looks ok" markus@
9b4b86c2 490 - stevesk@cvs.openbsd.org 2009/01/15 17:38:43
491 [readconf.c]
492 1) use obsolete instead of alias for consistency
493 2) oUserKnownHostsFile not obsolete but oGlobalKnownHostsFile2 is
494 so move the comment.
495 3) reorder so like options are together
496 ok djm@
1338ba77 497 - djm@cvs.openbsd.org 2009/01/22 09:46:01
498 [channels.c channels.h session.c]
499 make Channel->path an allocated string, saving a few bytes here and
500 there and fixing bz#1380 in the process; ok markus@
920706fd 501 - djm@cvs.openbsd.org 2009/01/22 09:49:57
502 [channels.c]
503 oops! I committed the wrong version of the Channel->path diff,
504 it was missing some tweaks suggested by stevesk@
5134115d 505 - djm@cvs.openbsd.org 2009/01/22 10:02:34
506 [clientloop.c misc.c readconf.c readconf.h servconf.c servconf.h]
507 [serverloop.c ssh-keyscan.c ssh.c sshd.c]
508 make a2port() return -1 when it encounters an invalid port number
509 rather than 0, which it will now treat as valid (needed for future work)
510 adjust current consumers of a2port() to check its return value is <= 0,
511 which in turn required some things to be converted from u_short => int
512 make use of int vs. u_short consistent in some other places too
513 feedback & ok markus@
368e246f 514 - djm@cvs.openbsd.org 2009/01/22 10:09:16
515 [auth-options.c]
516 another chunk of a2port() diff that got away. wtfdjm??
700fd7e7 517 - djm@cvs.openbsd.org 2009/01/23 07:58:11
518 [myproposal.h]
519 prefer CTR modes and revised arcfour (i.e w/ discard) modes to CBC
520 modes; ok markus@
29ec8eb3 521 - naddy@cvs.openbsd.org 2009/01/24 17:10:22
522 [ssh_config.5 sshd_config.5]
523 sync list of preferred ciphers; ok djm@
608bcf58 524 - markus@cvs.openbsd.org 2009/01/26 09:58:15
525 [cipher.c cipher.h packet.c]
526 Work around the CPNI-957037 Plaintext Recovery Attack by always
527 reading 256K of data on packet size or HMAC errors (in CBC mode only).
528 Help, feedback and ok djm@
529 Feedback from Martin Albrecht and Paterson Kenny
68405671 530
a25d08b3 53120090107
532 - (djm) [uidswap.c] bz#1412: Support >16 supplemental groups in OS X.
533 Patch based on one from vgiffin AT apple.com; ok dtucker@
b5a1596f 534 - (djm) [channels.c] bz#1419: support "on demand" X11 forwarding via
535 launchd on OS X; patch from vgiffin AT apple.com, slightly tweaked;
536 ok dtucker@
23b3ed0b 537 - (djm) [contrib/ssh-copy-id.1 contrib/ssh-copy-id] bz#1492: Make
538 ssh-copy-id copy id_rsa.pub by default (instead of the legacy "identity"
539 key). Patch from cjwatson AT debian.org
a25d08b3 540
16076ac9 54120090107
542 - (tim) [configure.ac defines.h openbsd-compat/port-uw.c
543 openbsd-compat/xcrypt.c] Add SECUREWARE support to OpenServer 6 SVR5 ABI.
544 OK djm@ dtucker@
44a71983 545 - (tim) [configure.ac] Move check_for_libcrypt_later=1 in *-*-sysv5*) section.
546 OpenServer 6 doesn't need libcrypt.
16076ac9 547
09925c00 54820081209
549 - (djm) OpenBSD CVS Sync
550 - djm@cvs.openbsd.org 2008/12/09 02:38:18
551 [clientloop.c]
552 The ~C escape handler does not work correctly for multiplexed sessions -
553 it opens a commandline on the master session, instead of on the slave
554 that requested it. Disable it on slave sessions until such time as it
555 is fixed; bz#1543 report from Adrian Bridgett via Colin Watson
556 ok markus@
ddb5e00f 557 - djm@cvs.openbsd.org 2008/12/09 02:39:59
558 [sftp.c]
559 Deal correctly with failures in remote stat() operation in sftp,
560 correcting fail-on-error behaviour in batchmode. bz#1541 report and
561 fix from anedvedicky AT gmail.com; ok markus@
bab3d903 562 - djm@cvs.openbsd.org 2008/12/09 02:58:16
563 [readconf.c]
564 don't leave junk (free'd) pointers around in Forward *fwd argument on
565 failure; avoids double-free in ~C -L handler when given an invalid
566 forwarding specification; bz#1539 report from adejong AT debian.org
567 via Colin Watson; ok markus@ dtucker@
83cd8c39 568 - djm@cvs.openbsd.org 2008/12/09 03:02:37
569 [sftp.1 sftp.c]
570 correct sftp(1) and corresponding usage syntax;
571 bz#1518 patch from imorgan AT nas.nasa.gov; ok deraadt@ improved diff jmc@
09925c00 572
53e2660a 57320081208
574 - (djm) [configure.ac] bz#1538: better test for ProPolice/SSP: actually
575 use some stack in main().
576 Report and suggested fix from vapier AT gentoo.org
66e16767 577 - (djm) OpenBSD CVS Sync
578 - markus@cvs.openbsd.org 2008/12/02 19:01:07
579 [clientloop.c]
580 we have to use the recipient's channel number (RFC 4254) for
581 SSH2_MSG_CHANNEL_SUCCESS/SSH2_MSG_CHANNEL_FAILURE messages,
582 otherwise we trigger 'Non-public channel' error messages on sshd
583 systems with clientkeepalive enabled; noticed by sturm; ok djm;
7ec2b275 584 - markus@cvs.openbsd.org 2008/12/02 19:08:59
585 [serverloop.c]
586 backout 1.149, since it's not necessary and openssh clients send
587 broken CHANNEL_FAILURE/SUCCESS messages since about 2004; ok djm@
b09b559d 588 - markus@cvs.openbsd.org 2008/12/02 19:09:38
589 [channels.c]
590 s/remote_id/id/ to be more consistent with other code; ok djm@
53e2660a 591
de470c82 59220081201
593 - (dtucker) [contrib/cygwin/{Makefile,ssh-host-config}] Add new doc files
594 and tweak the is-sshd-running check in ssh-host-config. Patch from
595 vinschen at redhat com.
66af1c21 596 - (dtucker) OpenBSD CVS Sync
597 - markus@cvs.openbsd.org 2008/11/21 15:47:38
598 [packet.c]
599 packet_disconnect() on padding error, too. should reduce the success
600 probability for the CPNI-957037 Plaintext Recovery Attack to 2^-18
601 ok djm@
8e10da10 602 - dtucker@cvs.openbsd.org 2008/11/30 11:59:26
603 [monitor_fdpass.c]
604 Retry sendmsg/recvmsg on EAGAIN and EINTR; ok djm@
de470c82 605
d2aa725a 60620081123
607 - (dtucker) [monitor_fdpass.c] Reduce diff vs OpenBSD by moving some
608 declarations, removing an unnecessary union member and adding whitespace.
c037a517 609 cmsgbuf.tmp thing spotted by des at des no, ok djm some time ago.
d2aa725a 610
95e16084 61120081118
612 - (tim) [addrmatch.c configure.ac] Some platforms do not have sin6_scope_id
613 member of sockaddr_in6. Also reported in Bug 1491 by David Leonard. OK and
614 feedback by djm@
615
0bd3332c 61620081111
617 - (dtucker) OpenBSD CVS Sync
618 - jmc@cvs.openbsd.org 2008/11/05 11:22:54
619 [servconf.c]
620 passord -> password;
621 fixes user/5975 from Rene Maroufi
1890bf8b 622 - stevesk@cvs.openbsd.org 2008/11/07 00:42:12
623 [ssh-keygen.c]
624 spelling/typo in comment
92d0164c 625 - stevesk@cvs.openbsd.org 2008/11/07 18:50:18
626 [nchan.c]
627 add space to some log/debug messages for readability; ok djm@ markus@
3d7f6c3d 628 - dtucker@cvs.openbsd.org 2008/11/07 23:34:48
629 [auth2-jpake.c]
630 Move JPAKE define to make life easier for portable. ok djm@
94087553 631 - tobias@cvs.openbsd.org 2008/11/09 12:34:47
632 [session.c ssh.1]
633 typo fixed (overriden -> overridden)
634 ok espie, jmc
2505b891 635 - stevesk@cvs.openbsd.org 2008/11/11 02:58:09
636 [servconf.c]
637 USE_AFS not referenced so remove #ifdef. fixes sshd -T not printing
638 kerberosgetafstoken. ok dtucker@
639 (Id sync only, we still want the ifdef in portable)
861e9e53 640 - stevesk@cvs.openbsd.org 2008/11/11 03:55:11
641 [channels.c]
642 for sshd -T print 'permitopen any' vs. 'permitopen' for case of no
643 permitopen's; ok and input dtucker@
0771f5dd 644 - djm@cvs.openbsd.org 2008/11/10 02:06:35
645 [regress/putty-ciphers.sh]
646 PuTTY supports AES CTR modes, so interop test against them too
0bd3332c 647
39aa8698 64820081105
649 - OpenBSD CVS Sync
650 - djm@cvs.openbsd.org 2008/11/03 08:59:41
651 [servconf.c]
652 include MaxSessions in sshd -T output; patch from imorgan AT nas.nasa.gov
a28625a6 653 - djm@cvs.openbsd.org 2008/11/04 07:58:09
654 [auth.c]
655 need unistd.h for close() prototype
656 (ID sync only)
5adf6b9a 657 - djm@cvs.openbsd.org 2008/11/04 08:22:13
658 [auth.h auth2.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h]
659 [readconf.c readconf.h servconf.c servconf.h ssh2.h ssh_config.5]
660 [sshconnect2.c sshd_config.5 jpake.c jpake.h schnorr.c auth2-jpake.c]
661 [Makefile.in]
662 Add support for an experimental zero-knowledge password authentication
663 method using the J-PAKE protocol described in F. Hao, P. Ryan,
664 "Password Authenticated Key Exchange by Juggling", 16th Workshop on
665 Security Protocols, Cambridge, April 2008.
666
667 This method allows password-based authentication without exposing
668 the password to the server. Instead, the client and server exchange
669 cryptographic proofs to demonstrate of knowledge of the password while
670 revealing nothing useful to an attacker or compromised endpoint.
671
672 This is experimental, work-in-progress code and is presently
673 compiled-time disabled (turn on -DJPAKE in Makefile.inc).
674
675 "just commit it. It isn't too intrusive." deraadt@
d35f707e 676 - stevesk@cvs.openbsd.org 2008/11/04 19:18:00
677 [readconf.c]
678 because parse_forward() is now used to parse all forward types (DLR),
679 and it malloc's space for host variables, we don't need to malloc
680 here. fixes small memory leaks.
681
682 previously dynamic forwards were not parsed in parse_forward() and
683 space was not malloc'd in that case.
684
685 ok djm@
10cf2ac3 686 - stevesk@cvs.openbsd.org 2008/11/05 03:23:09
687 [clientloop.c ssh.1]
688 add dynamic forward escape command line; ok djm@
39aa8698 689
94f36816 69020081103
691 - OpenBSD CVS Sync
692 - sthen@cvs.openbsd.org 2008/07/24 23:55:30
693 [ssh-keygen.1]
694 Add "ssh-keygen -F -l" to synopsis (displays fingerprint from
695 known_hosts). ok djm@
696 - grunk@cvs.openbsd.org 2008/07/25 06:56:35
697 [ssh_config]
698 Add VisualHostKey to example file, ok djm@
5ca42ddb 699 - grunk@cvs.openbsd.org 2008/07/25 07:05:16
700 [key.c]
701 In random art visualization, make sure to use the end marker only at the
702 end. Initial diff by Dirk Loss, tweaks and ok djm@
341cb46b 703 - markus@cvs.openbsd.org 2008/07/31 14:48:28
704 [sshconnect2.c]
705 don't allocate space for empty banners; report t8m at centrum.cz;
706 ok deraadt
686bdcbd 707 - krw@cvs.openbsd.org 2008/08/02 04:29:51
708 [ssh_config.5]
709 whitepsace -> whitespace. From Matthew Clarke via bugs@.
e3ef5245 710 - djm@cvs.openbsd.org 2008/08/21 04:09:57
711 [session.c]
712 allow ForceCommand internal-sftp with arguments. based on patch from
713 michael.barabanov AT gmail.com; ok markus@
1975fb98 714 - djm@cvs.openbsd.org 2008/09/06 12:24:13
715 [kex.c]
716 OpenSSL 0.9.8h supplies a real EVP_sha256 so we do not need our
717 replacement anymore
718 (ID sync only for portable - we still need this)
72bd2fca 719 - markus@cvs.openbsd.org 2008/09/11 14:22:37
720 [compat.c compat.h nchan.c ssh.c]
721 only send eow and no-more-sessions requests to openssh 5 and newer;
722 fixes interop problems with broken ssh v2 implementations; ok djm@
2e96832c 723 - millert@cvs.openbsd.org 2008/10/02 14:39:35
724 [session.c]
725 Convert an unchecked strdup to xstrdup. OK deraadt@
dc94d57e 726 - jmc@cvs.openbsd.org 2008/10/03 13:08:12
727 [sshd.8]
728 do not give an example of how to chmod files: we can presume the user
729 knows that. removes an ambiguity in the permission of authorized_keys;
730 ok deraadt
90d5350e 731 - deraadt@cvs.openbsd.org 2008/10/03 23:56:28
732 [sshconnect2.c]
733 Repair strnvis() buffersize of 4*n+1, with termination gauranteed by the
734 function.
735 spotted by des@freebsd, who commited an incorrect fix to the freebsd tree
736 and (as is fairly typical) did not report the problem to us. But this fix
737 is correct.
738 ok djm
bf793210 739 - djm@cvs.openbsd.org 2008/10/08 23:34:03
740 [ssh.1 ssh.c]
741 Add -y option to force logging via syslog rather than stderr.
742 Useful for daemonised ssh connection (ssh -f). Patch originally from
743 and ok'd by markus@
e68868a1 744 - djm@cvs.openbsd.org 2008/10/09 03:50:54
745 [servconf.c sshd_config.5]
746 support setting PermitEmptyPasswords in a Match block
747 requested in PR3891; ok dtucker@
f3a4d0d0 748 - jmc@cvs.openbsd.org 2008/10/09 06:54:22
749 [ssh.c]
750 add -y to usage();
6503dc91 751 - stevesk@cvs.openbsd.org 2008/10/10 04:55:16
752 [scp.c]
753 spelling in comment; ok djm@
260bf88a 754 - stevesk@cvs.openbsd.org 2008/10/10 05:00:12
755 [key.c]
756 typo in error message; ok djm@
96a00a9d 757 - stevesk@cvs.openbsd.org 2008/10/10 16:43:27
758 [ssh_config.5]
759 use 'Privileged ports can be forwarded only when logging in as root on
760 the remote machine.' for RemoteForward just like ssh.1 -R.
761 ok djm@ jmc@
762 - stevesk@cvs.openbsd.org 2008/10/14 18:11:33
763 [sshconnect.c]
764 use #define ROQUIET here; no binary change. ok dtucker@
8d20b087 765 - stevesk@cvs.openbsd.org 2008/10/17 18:36:24
766 [ssh_config.5]
767 correct and clarify VisualHostKey; ok jmc@
25f93f2c 768 - stevesk@cvs.openbsd.org 2008/10/30 19:31:16
769 [clientloop.c sshd.c]
770 don't need to #include "monitor_fdpass.h"
b8974c94 771 - stevesk@cvs.openbsd.org 2008/10/31 15:05:34
772 [dispatch.c]
773 remove unused #define DISPATCH_MIN; ok markus@
e64399cc 774 - djm@cvs.openbsd.org 2008/11/01 04:50:08
775 [sshconnect2.c]
776 sprinkle ARGSUSED on dispatch handlers
777 nuke stale unusued prototype
2ea438c2 778 - stevesk@cvs.openbsd.org 2008/11/01 06:43:33
779 [channels.c]
780 fix some typos in log messages; ok djm@
9995aaa3 781 - sobrado@cvs.openbsd.org 2008/11/01 11:14:36
782 [ssh-keyscan.1 ssh-keyscan.c]
783 the ellipsis is not an optional argument; while here, improve spacing.
30573fea 784 - stevesk@cvs.openbsd.org 2008/11/01 17:40:33
785 [clientloop.c readconf.c readconf.h ssh.c]
786 merge dynamic forward parsing into parse_forward();
787 'i think this is OK' djm@
9bbba34b 788 - stevesk@cvs.openbsd.org 2008/11/02 00:16:16
789 [ttymodes.c]
790 protocol 2 tty modes support is now 7.5 years old so remove these
791 debug3()s; ok deraadt@
b626b7ae 792 - stevesk@cvs.openbsd.org 2008/11/03 01:07:02
793 [readconf.c]
794 remove valueless comment
c8eaf0ec 795 - stevesk@cvs.openbsd.org 2008/11/03 02:44:41
796 [readconf.c]
797 fix comment
fce91335 798 - (djm) [contrib/caldera/ssh-host-keygen contrib/suse/rc.sshd]
799 Make example scripts generate keys with default sizes rather than fixed,
800 non-default 1024 bits; patch from imorgan AT nas.nasa.gov
933e2f91 801 - (djm) [contrib/sshd.pam.generic contrib/caldera/sshd.pam]
802 [contrib/redhat/sshd.pam] Move pam_nologin to account group from
803 incorrect auth group in example files;
804 patch from imorgan AT nas.nasa.gov
94f36816 805
d6339843 80620080906
807 - (dtucker) [config.guess config.sub] Update to latest versions from
808 http://git.savannah.gnu.org/gitweb/ (2008-04-14 and 2008-06-16
809 respectively).
810
974ce4a0 81120080830
812 - (dtucker) [openbsd-compat/bsd-poll.c] correctly check for number of FDs
813 larger than FD_SETSIZE (OpenSSH only ever uses poll with one fd). Patch
814 from Nicholas Marriott.
815
e888d981 81620080721
817 - (djm) OpenBSD CVS Sync
818 - djm@cvs.openbsd.org 2008/07/23 07:36:55
819 [servconf.c]
820 do not try to print options that have been compile-time disabled
821 in config test mode (sshd -T); report from nix-corp AT esperi.org.uk
822 ok dtucker@
cee47c9f 823 - (djm) [servconf.c] Print UsePAM option in config test mode (when it
824 has been compiled in); report from nix-corp AT esperi.org.uk
825 ok dtucker@
e888d981 826
b14e719f 82720080721
828 - (djm) OpenBSD CVS Sync
829 - jmc@cvs.openbsd.org 2008/07/18 22:51:01
830 [sftp-server.8]
831 no need for .Pp before or after .Sh;
f3b93df3 832 - djm@cvs.openbsd.org 2008/07/21 08:19:07
833 [version.h]
834 openssh-5.1
11368183 835 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
836 [contrib/suse/openssh.spec] Update version number in README and RPM specs
55d5db1c 837 - (djm) Release OpenSSH-5.1
b14e719f 838
e5df5ff2 83920080717
840 - (djm) OpenBSD CVS Sync
841 - djm@cvs.openbsd.org 2008/07/17 08:48:00
842 [sshconnect2.c]
843 strnvis preauth banner; pointed out by mpf@ ok markus@
2800468d 844 - djm@cvs.openbsd.org 2008/07/17 08:51:07
845 [auth2-hostbased.c]
846 strip trailing '.' from hostname when HostbasedUsesNameFromPacketOnly=yes
847 report and patch from res AT qoxp.net (bz#1200); ok markus@
d9d96f7a 848 - (dtucker) [openbsd-compat/bsd-cygwin_util.c] Remove long-unneeded compat
849 code, replace with equivalent cygwin library call. Patch from vinschen
3a69fb58 850 at redhat.com, ok djm@.
851 - (djm) [sshconnect2.c] vis.h isn't available everywhere
e5df5ff2 852
b8c9ea19 85320080716
854 - OpenBSD CVS Sync
855 - djm@cvs.openbsd.org 2008/07/15 02:23:14
856 [sftp.1]
857 number of pipelined requests is now 64;
858 prodded by Iain.Morgan AT nasa.gov
dfe666f6 859 - djm@cvs.openbsd.org 2008/07/16 11:51:14
860 [clientloop.c]
861 rename variable first_gc -> last_gc (since it is actually the last
862 in the list).
cdfbc829 863 - djm@cvs.openbsd.org 2008/07/16 11:52:19
864 [channels.c]
865 this loop index should be automatic, not static
b8c9ea19 866
322b3f02 86720080714
868 - (djm) OpenBSD CVS Sync
869 - sthen@cvs.openbsd.org 2008/07/13 21:22:52
870 [ssh-keygen.c]
871 Change "ssh-keygen -F [host] -l" to not display random art unless
872 -v is also specified, making it consistent with the manual and other
873 uses of -l.
874 ok grunk@
9fb764ab 875 - djm@cvs.openbsd.org 2008/07/13 22:13:07
876 [channels.c]
877 use struct sockaddr_storage instead of struct sockaddr for accept(2)
878 address argument. from visibilis AT yahoo.com in bz#1485; ok markus@
873722cc 879 - djm@cvs.openbsd.org 2008/07/13 22:16:03
880 [sftp.c]
881 increase number of piplelined requests so they properly fill the
882 (recently increased) channel window. prompted by rapier AT psc.edu;
883 ok markus@
66fba053 884 - djm@cvs.openbsd.org 2008/07/14 01:55:56
885 [sftp-server.8]
886 mention requirement for /dev/log inside chroot when using sftp-server
887 with ChrootDirectory
6c6bb9a6 888 - (djm) [openbsd-compat/bindresvport.c] Rename variables s/sin/in/ to
889 avoid clash with sin(3) function; reported by
890 cristian.ionescu-idbohrn AT axis.com
7be182d4 891 - (djm) [openbsd-compat/rresvport.c] Add unistd.h for missing close()
892 prototype; reported by cristian.ionescu-idbohrn AT axis.com
6a9c22a5 893 - (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash;
894 reported by cristian.ionescu-idbohrn AT axis.com
7ea1abf7 895 - (djm) [contrib/cygwin/Makefile contrib/cygwin/ssh-host-config]
896 [contrib/cygwin/ssh-user-config contrib/cygwin/sshd-inetd]
897 Revamped and simplified Cygwin ssh-host-config script that uses
898 unified csih configuration tool. Requires recent Cygwin.
899 Patch from vinschen AT redhat.com
322b3f02 900
267d5589 90120080712
902 - (djm) OpenBSD CVS Sync
903 - djm@cvs.openbsd.org 2008/07/12 04:52:50
904 [channels.c]
905 unbreak; move clearing of cctx struct to before first use
906 reported by dkrause@
da9a823d 907 - djm@cvs.openbsd.org 2008/07/12 05:33:41
908 [scp.1]
909 better description for -i flag:
910 s/RSA authentication/public key authentication/
2ade01eb 911 - (djm) [openbsd-compat/fake-rfc2553.c openbsd-compat/fake-rfc2553.h]
912 return EAI_FAMILY when trying to lookup unsupported address family;
913 from vinschen AT redhat.com
267d5589 914
971deff8 91520080711
916 - (djm) OpenBSD CVS Sync
917 - stevesk@cvs.openbsd.org 2008/07/07 00:31:41
918 [ttymodes.c]
919 we don't need arg after the debug3() was removed. from lint.
920 ok djm@
d5b5b8f6 921 - stevesk@cvs.openbsd.org 2008/07/07 23:32:51
922 [key.c]
923 /*NOTREACHED*/ for lint warning:
924 warning: function key_equal falls off bottom without returning value
925 ok djm@
6eb3f18c 926 - markus@cvs.openbsd.org 2008/07/10 18:05:58
927 [channels.c]
928 missing bzero; from mickey; ok djm@
e8e08a80 929 - markus@cvs.openbsd.org 2008/07/10 18:08:11
930 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h sshd.c]
931 sync v1 and v2 traffic accounting; add it to sshd, too;
932 ok djm@, dtucker@
971deff8 933
17969fcc 93420080709
935 - (djm) [Makefile.in] Print "all tests passed" when all regress tests pass
b5fc5d94 936 - (djm) [auth1.c] Fix format string vulnerability in protocol 1 PAM
937 account check failure path. The vulnerable format buffer is supplied
938 from PAM and should not contain attacker-supplied data.
78cb4705 939 - (djm) [auth.c] Missing unistd.h for close()
b5902374 940 - (djm) [configure.ac] Add -Wformat-security to CFLAGS for gcc 3.x and 4.x
17969fcc 941
3fde0623 94220080705
943 - (djm) [auth.c] Fixed test for locked account on HP/UX with shadowed
944 passwords disabled. bz#1083 report & patch from senthilkumar_sen AT
945 hotpop.com, w/ dtucker@
e8983917 946 - (djm) [atomicio.c configure.ac] Disable poll() fallback in atomiciov for
947 Tru64. readv doesn't seem to be a comparable object there.
948 bz#1386, patch from dtucker@ ok me
b8d635d0 949 - (djm) [Makefile.in] Pass though pass to conch for interop tests
6ed8a3ae 950 - (djm) [configure.ac] unbreak: remove extra closing brace
d38d9a80 951 - (djm) OpenBSD CVS Sync
952 - djm@cvs.openbsd.org 2008/07/04 23:08:25
953 [packet.c]
954 handle EINTR in packet_write_poll()l ok dtucker@
71709bcd 955 - djm@cvs.openbsd.org 2008/07/04 23:30:16
956 [auth1.c auth2.c]
957 Make protocol 1 MaxAuthTries logic match protocol 2's.
958 Do not treat the first protocol 2 authentication attempt as
959 a failure IFF it is for method "none".
960 Makes MaxAuthTries' user-visible behaviour identical for
961 protocol 1 vs 2.
962 ok dtucker@
3086db6e 963 - djm@cvs.openbsd.org 2008/07/05 05:16:01
964 [PROTOCOL]
965 grammar
3fde0623 966
a0d38609 96720080704
968 - (dtucker) OpenBSD CVS Sync
969 - djm@cvs.openbsd.org 2008/07/02 13:30:34
970 [auth2.c]
971 really really remove the freebie "none" auth try for protocol 2
6c777090 972 - djm@cvs.openbsd.org 2008/07/02 13:47:39
973 [ssh.1 ssh.c]
974 When forking after authentication ("ssh -f") with ExitOnForwardFailure
975 enabled, delay the fork until after replies for any -R forwards have
976 been seen. Allows for robust detection of -R forward failure when
977 using -f (similar to bz#92); ok dtucker@
f0b9fde3 978 - otto@cvs.openbsd.org 2008/07/03 21:46:58
979 [auth2-pubkey.c]
980 avoid nasty double free; ok dtucker@ djm@
cece208b 981 - djm@cvs.openbsd.org 2008/07/04 03:44:59
982 [servconf.c groupaccess.h groupaccess.c]
983 support negation of groups in "Match group" block (bz#1315); ok dtucker@
c54d3d1c 984 - dtucker@cvs.openbsd.org 2008/07/04 03:47:02
985 [monitor.c]
986 Make debug a little clearer. ok djm@
c7cbf377 987 - djm@cvs.openbsd.org 2008/06/30 08:07:34
988 [regress/key-options.sh]
989 shell portability: use "=" instead of "==" in test(1) expressions,
990 double-quote string with backslash escaped /
8a972082 991 - djm@cvs.openbsd.org 2008/06/30 10:31:11
992 [regress/{putty-transfer,putty-kex,putty-ciphers}.sh]
993 remove "set -e" left over from debugging
9b0c87d9 994 - djm@cvs.openbsd.org 2008/06/30 10:43:03
995 [regress/conch-ciphers.sh]
996 explicitly disable conch options that could interfere with the test
97e61398 997 - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link
998 returns EXDEV. Patch from Mike Garrison, ok djm@
5a0c8771 999 - (djm) [atomicio.c channels.c clientloop.c defines.h includes.h]
1000 [packet.c scp.c serverloop.c sftp-client.c ssh-agent.c ssh-keyscan.c]
1001 [sshd.c] Explicitly handle EWOULDBLOCK wherever we handle EAGAIN, on
1002 some platforms (HP nonstop) it is a distinct errno;
1003 bz#1467 reported by sconeu AT yahoo.com; ok dtucker@
1004
8f02e0be 100520080702
1006 - (dtucker) OpenBSD CVS Sync
1007 - djm@cvs.openbsd.org 2008/06/30 08:05:59
1008 [PROTOCOL.agent]
1009 typo: s/constraint_date/constraint_data/
fb5582f7 1010 - djm@cvs.openbsd.org 2008/06/30 12:15:39
1011 [serverloop.c]
1012 only pass channel requests on session channels through to the session
1013 channel handler, avoiding spurious log messages; ok! markus@
4d92dbc1 1014 - djm@cvs.openbsd.org 2008/06/30 12:16:02
1015 [nchan.c]
1016 only send eow@openssh.com notifications for session channels; ok! markus@
8fb1ddc9 1017 - djm@cvs.openbsd.org 2008/06/30 12:18:34
1018 [PROTOCOL]
1019 clarify that eow@openssh.com is only sent on session channels
979b31ed 1020 - dtucker@cvs.openbsd.org 2008/07/01 07:20:52
1021 [sshconnect.c]
1022 Check ExitOnForwardFailure if forwardings are disabled due to a failed
1023 host key check. ok djm@
f9b45eaf 1024 - dtucker@cvs.openbsd.org 2008/07/01 07:24:22
1025 [sshconnect.c sshd.c]
1026 Send CR LF during protocol banner exchanges, but only for Protocol 2 only,
1027 in order to comply with RFC 4253. bz #1443, ok djm@
5ebed98d 1028 - stevesk@cvs.openbsd.org 2008/07/01 23:12:47
1029 [PROTOCOL.agent]
1030 fix some typos; ok djm@
39ceddb7 1031 - djm@cvs.openbsd.org 2008/07/02 02:24:18
1032 [sshd_config sshd_config.5 sshd.8 servconf.c]
1033 increase default size of ssh protocol 1 ephemeral key from 768 to 1024
1034 bits; prodded by & ok dtucker@ ok deraadt@
f7c2a004 1035 - dtucker@cvs.openbsd.org 2008/07/02 12:03:51
1036 [auth-rsa.c auth.c auth2-pubkey.c auth.h]
1037 Merge duplicate host key file checks, based in part on a patch from Rob
1038 Holland via bz #1348 . Also checks for non-regular files during protocol
1039 1 RSA auth. ok djm@
221fc73c 1040 - djm@cvs.openbsd.org 2008/07/02 12:36:39
1041 [auth2-none.c auth2.c]
1042 Make protocol 2 MaxAuthTries behaviour a little more sensible:
1043 Check whether client has exceeded MaxAuthTries before running
1044 an authentication method and skip it if they have, previously it
1045 would always allow one try (for "none" auth).
1046 Preincrement failure count before post-auth test - previously this
1047 checked and postincremented, also to allow one "none" try.
1048 Together, these two changes always count the "none" auth method
1049 which could be skipped by a malicious client (e.g. an SSH worm)
1050 to get an extra attempt at a real auth method. They also make
1051 MaxAuthTries=0 a useful way to block users entirely (esp. in a
1052 sshd_config Match block).
1053 Also, move sending of any preauth banner from "none" auth method
1054 to the first call to input_userauth_request(), so worms that skip
1055 the "none" method get to see it too.
8f02e0be 1056
00b7389d 105720080630
1058 - (djm) OpenBSD CVS Sync
1059 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
1060 [regress/Makefile regress/key-options.sh]
1061 Add regress test for key options. ok djm@
86d745dc 1062 - dtucker@cvs.openbsd.org 2008/06/11 23:11:40
014f1b23 1063 [regress/Makefile]
86d745dc 1064 Don't run cipher-speed test by default; mistakenly enabled by me
014f1b23 1065 - djm@cvs.openbsd.org 2008/06/28 13:57:25
1066 [regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh]
1067 very basic regress test against Twisted Conch in "make interop"
1068 target (conch is available in ports/devel/py-twisted/conch);
1069 ok markus@
8476b024 1070 - (djm) [regress/Makefile] search for conch by path, like we do putty
00b7389d 1071
aa47edcc 107220080629
1073 - (djm) OpenBSD CVS Sync
1074 - martynas@cvs.openbsd.org 2008/06/21 07:46:46
1075 [sftp.c]
1076 use optopt to get invalid flag, instead of return value of getopt,
1077 which is always '?'; ok djm@
ccf0fcb6 1078 - otto@cvs.openbsd.org 2008/06/25 11:13:43
1079 [key.c]
1080 add key length to visual fingerprint; zap magical constants;
1081 ok grunk@ djm@
681efe9f 1082 - djm@cvs.openbsd.org 2008/06/26 06:10:09
1083 [sftp-client.c sftp-server.c]
1084 allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky
1085 bits. Note that this only affects explicit setting of modes (e.g. via
1086 sftp(1)'s chmod command) and not file transfers. (bz#1310)
1087 ok deraadt@ at c2k8
b080d398 1088 - djm@cvs.openbsd.org 2008/06/26 09:19:40
1089 [dh.c dh.h moduli.c]
1090 when loading moduli from /etc/moduli in sshd(8), check that they
1091 are of the expected "safe prime" structure and have had
1092 appropriate primality tests performed;
1093 feedback and ok dtucker@
7b3999b8 1094 - grunk@cvs.openbsd.org 2008/06/26 11:46:31
1095 [readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c]
1096 Move SSH Fingerprint Visualization away from sharing the config option
1097 CheckHostIP to an own config option named VisualHostKey.
1098 While there, fix the behaviour that ssh would draw a random art picture
1099 on every newly seen host even when the option was not enabled.
1100 prodded by deraadt@, discussions,
1101 help and ok markus@ djm@ dtucker@
2e8d3306 1102 - jmc@cvs.openbsd.org 2008/06/26 21:11:46
1103 [ssh.1]
1104 add VisualHostKey to the list of options listed in -o;
cda43f66 1105 - djm@cvs.openbsd.org 2008/06/28 07:25:07
1106 [PROTOCOL]
1107 spelling fixes
c525650a 1108 - djm@cvs.openbsd.org 2008/06/28 13:58:23
1109 [ssh-agent.c]
1110 refuse to add a key that has unknown constraints specified;
1111 ok markus
9ee2fb0e 1112 - djm@cvs.openbsd.org 2008/06/28 14:05:15
1113 [ssh-agent.c]
1114 reset global compat flag after processing a protocol 2 signature
1115 request with the legacy DSA encoding flag set; ok markus
ab3eb078 1116 - djm@cvs.openbsd.org 2008/06/28 14:08:30
1117 [PROTOCOL PROTOCOL.agent]
1118 document the protocol used by ssh-agent; "looks ok" markus@
aa47edcc 1119
f6351d4d 112020080628
1121 - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec]
1122 RFC.nroff lacks a license, remove it (it is long gone in OpenBSD).
1123
bd6b3feb 112420080626
1125 - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD.
1126 (bz#1372)
a32d8b38 1127 - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
1128 [contrib/suse/openssh.spec] Include moduli.5 in RPM spec files.
bd6b3feb 1129
b3784859 113020080616
1131 - (dtucker) OpenBSD CVS Sync
1132 - dtucker@cvs.openbsd.org 2008/06/16 13:22:53
1133 [session.c channels.c]
1134 Rename the isatty argument to is_tty so we don't shadow
1135 isatty(3). ok markus@
245f4d36 1136 - (dtucker) [channels.c] isatty -> is_tty here too.
b3784859 1137
b55b0285 113820080615
1139 - (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc.
081573fe 1140 - OpenBSD CVS Sync
1141 - dtucker@cvs.openbsd.org 2008/06/14 15:49:48
1142 [sshd.c]
1143 wrap long line at 80 chars
26512357 1144 - dtucker@cvs.openbsd.org 2008/06/14 17:07:11
1145 [sshd.c]
1146 ensure default umask disallows at least group and world write; ok djm@
2608aa2b 1147 - djm@cvs.openbsd.org 2008/06/14 18:33:43
1148 [session.c]
1149 suppress the warning message from chdir(homedir) failures
1150 when chrooted (bz#1461); ok dtucker
49c5f262 1151 - dtucker@cvs.openbsd.org 2008/06/14 19:42:10
1152 [scp.1]
1153 Mention that scp follows symlinks during -r. bz #1466,
1154 from nectar at apple
d97287d3 1155 - dtucker@cvs.openbsd.org 2008/06/15 16:55:38
1156 [sshd_config.5]
1157 MaxSessions is allowed in a Match block too
8086aeb2 1158 - dtucker@cvs.openbsd.org 2008/06/15 16:58:40
1159 [servconf.c sshd_config.5]
1160 Allow MaxAuthTries within a Match block. ok djm@
c9478090 1161 - djm@cvs.openbsd.org 2008/06/15 20:06:26
1162 [channels.c channels.h session.c]
1163 don't call isatty() on a pty master, instead pass a flag down to
1164 channel_set_fds() indicating that te fds refer to a tty. Fixes a
1165 hang on exit on Solaris (bz#1463) in portable but is actually
1166 a generic bug; ok dtucker deraadt markus
b55b0285 1167
add357c6 116820080614
1169 - (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction
1170 replacement code; patch from ighighi AT gmail.com in bz#1240;
1171 ok dtucker
1172
849d3ceb 117320080613
1174 - (dtucker) OpenBSD CVS Sync
1175 - deraadt@cvs.openbsd.org 2008/06/13 09:44:36
1176 [packet.c]
1177 compile on older gcc; no decl after code
52ad6b9a 1178 - dtucker@cvs.openbsd.org 2008/06/13 13:56:59
1179 [monitor.c]
1180 Clear key options in the monitor on failed authentication, prevents
1181 applying additional restrictions to non-pubkey authentications in
1182 the case where pubkey fails but another method subsequently succeeds.
1183 bz #1472, found by Colin Watson, ok markus@ djm@
1d0b7aaa 1184 - dtucker@cvs.openbsd.org 2008/06/13 14:18:51
1185 [auth2-pubkey.c auth-rhosts.c]
1186 Include unistd.h for close(), prevents warnings in -portable
a3f13d60 1187 - dtucker@cvs.openbsd.org 2008/06/13 17:21:20
1188 [mux.c]
1189 Friendlier error messages for mux fallback. ok djm@
a15e7da1 1190 - dtucker@cvs.openbsd.org 2008/06/13 18:55:22
1191 [scp.c]
1192 Prevent -Wsign-compare warnings on LP64 systems. bz #1192, ok deraadt@
990ada29 1193 - grunk@cvs.openbsd.org 2008/06/13 20:13:26
1194 [ssh.1]
1195 Explain the use of SSH fpr visualization using random art, and cite the
1196 original scientific paper inspiring that technique.
1197 Much help with English and nroff by jmc@, thanks.
596a825b 1198 - (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which
1199 despite its name doesn't seem to implement all of GSSAPI. Patch from
1200 Jan Engelhardt, sanity checked by Simon Wilkinson.
849d3ceb 1201
9754b94b 120220080612
1203 - (dtucker) OpenBSD CVS Sync
1204 - jmc@cvs.openbsd.org 2008/06/11 07:30:37
1205 [sshd.8]
1206 kill trailing whitespace;
aff73c5f 1207 - grunk@cvs.openbsd.org 2008/06/11 21:01:35
1208 [ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
1209 sshconnect.c]
1210 Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
1211 graphical hash visualization schemes known as "random art", and by
1212 Dan Kaminsky's musings on the subject during a BlackOp talk at the
1213 23C3 in Berlin.
1214 Scientific publication (original paper):
1215 "Hash Visualization: a New Technique to improve Real-World Security",
1216 Perrig A. and Song D., 1999, International Workshop on Cryptographic
1217 Techniques and E-Commerce (CrypTEC '99)
1218 http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
1219 The algorithm used here is a worm crawling over a discrete plane,
1220 leaving a trace (augmenting the field) everywhere it goes.
1221 Movement is taken from dgst_raw 2bit-wise. Bumping into walls
1222 makes the respective movement vector be ignored for this turn,
1223 thus switching to the other color of the chessboard.
1224 Graphs are not unambiguous for now, because circles in graphs can be
1225 walked in either direction.
1226 discussions with several people,
1227 help, corrections and ok markus@ djm@
93778882 1228 - grunk@cvs.openbsd.org 2008/06/11 21:38:25
1229 [ssh-keygen.c]
1230 ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub
1231 would not display you the random art as intended, spotted by canacar@
639211b7 1232 - grunk@cvs.openbsd.org 2008/06/11 22:20:46
1233 [ssh-keygen.c ssh-keygen.1]
1234 ssh-keygen would write fingerprints to STDOUT, and random art to STDERR,
1235 that is not how it was envisioned.
1236 Also correct manpage saying that -v is needed along with -l for it to work.
1237 spotted by naddy@
e3115002 1238 - otto@cvs.openbsd.org 2008/06/11 23:02:22
1239 [key.c]
1240 simpler way of computing the augmentations; ok grunk@
fe88400f 1241 - grunk@cvs.openbsd.org 2008/06/11 23:03:56
1242 [ssh_config.5]
1243 CheckHostIP set to ``fingerprint'' will display both hex and random art
1244 spotted by naddy@
97841001 1245 - grunk@cvs.openbsd.org 2008/06/11 23:51:57
1246 [key.c]
1247 #define statements that are not atoms need braces around them, else they
1248 will cause trouble in some cases.
1249 Also do a computation of -1 once, and not in a loop several times.
1250 spotted by otto@
e907df41 1251 - dtucker@cvs.openbsd.org 2008/06/12 00:03:49
1252 [dns.c canohost.c sshconnect.c]
1253 Do not pass "0" strings as ports to getaddrinfo because the lookups
1254 can slow things down and we never use the service info anyway. bz
1255 #859, patch from YOSHIFUJI Hideaki and John Devitofranceschi. ok
1256 deraadt@ djm@
1257 djm belives that the reason for the "0" strings is to ensure that
1258 it's not possible to call getaddrinfo with both host and port being
1259 NULL. In the case of canohost.c host is a local array. In the
1260 case of sshconnect.c, it's checked for null immediately before use.
1261 In dns.c it ultimately comes from ssh.c:main() and is guaranteed to
1262 be non-null but it's not obvious, so I added a warning message in
1263 case it is ever passed a null.
1264 - grunk@cvs.openbsd.org 2008/06/12 00:13:55
1265 [sshconnect.c]
1266 Make ssh print the random art also when ssh'ing to a host using IP only.
1267 spotted by naddy@, ok and help djm@ dtucker@
208cc0ee 1268 - otto@cvs.openbsd.org 2008/06/12 00:13:13
1269 [key.c]
1270 use an odd number of rows and columns and a separate start marker, looks
1271 better; ok grunk@
f17f705b 1272 - djm@cvs.openbsd.org 2008/06/12 03:40:52
1273 [clientloop.h mux.c channels.c clientloop.c channels.h]
1274 Enable ~ escapes for multiplex slave sessions; give each channel
1275 its own escape state and hook the escape filters up to muxed
1276 channels. bz #1331
1277 Mux slaves do not currently support the ~^Z and ~& escapes.
1278 NB. this change cranks the mux protocol version, so a new ssh
1279 mux client will not be able to connect to a running old ssh
1280 mux master.
1281 ok dtucker@
72becb62 1282 - djm@cvs.openbsd.org 2008/06/12 04:06:00
1283 [clientloop.h ssh.c clientloop.c]
1284 maintain an ordered queue of outstanding global requests that we
1285 expect replies to, similar to the per-channel confirmation queue.
1286 Use this queue to verify success or failure for remote forward
1287 establishment in a race free way.
1288 ok dtucker@
344f1d3d 1289 - djm@cvs.openbsd.org 2008/06/12 04:17:47
1290 [clientloop.c]
1291 thall shalt not code past the eightieth column
e8097dc9 1292 - djm@cvs.openbsd.org 2008/06/12 04:24:06
1293 [ssh.c]
1294 thal shalt not code past the eightieth column
9bcf03ce 1295 - djm@cvs.openbsd.org 2008/06/12 05:15:41
1296 [PROTOCOL]
1297 document tun@openssh.com forwarding method
aacab402 1298 - djm@cvs.openbsd.org 2008/06/12 05:32:30
1299 [mux.c]
1300 some more TODO for me
2bb50d23 1301 - grunk@cvs.openbsd.org 2008/06/12 05:42:46
1302 [key.c]
1303 supply the key type (rsa1, rsa, dsa) as a caption in the frame of the
1304 random art. while there, stress the fact that the field base should at
1305 least be 8 characters for the pictures to make sense.
1306 comment and ok djm@
1307 - grunk@cvs.openbsd.org 2008/06/12 06:32:59
1308 [key.c]
1309 We already mark the start of the worm, now also mark the end of the worm
1310 in our random art drawings.
1311 ok djm@
e74caf1e 1312 - djm@cvs.openbsd.org 2008/06/12 15:19:17
1313 [clientloop.h channels.h clientloop.c channels.c mux.c]
1314 The multiplexing escape char handler commit last night introduced a
1315 small memory leak per session; plug it.
e9d0b573 1316 - dtucker@cvs.openbsd.org 2008/06/12 16:35:31
1317 [ssh_config.5 ssh.c]
1318 keyword expansion for localcommand. ok djm@
a64f8307 1319 - jmc@cvs.openbsd.org 2008/06/12 19:10:09
1320 [ssh_config.5 ssh-keygen.1]
1321 tweak the ascii art text; ok grunk
bc2d97c8 1322 - dtucker@cvs.openbsd.org 2008/06/12 20:38:28
1323 [sshd.c sshconnect.c packet.h misc.c misc.h packet.c]
1324 Make keepalive timeouts apply while waiting for a packet, particularly
1325 during key renegotiation (bz #1363). With djm and Matt Day, ok djm@
ad39a852 1326 - djm@cvs.openbsd.org 2008/06/12 20:47:04
1327 [sftp-client.c]
1328 print extension revisions for extensions that we understand
07d8d480 1329 - djm@cvs.openbsd.org 2008/06/12 21:06:25
1330 [clientloop.c]
1331 I was coalescing expected global request confirmation replies at
1332 the wrong end of the queue - fix; prompted by markus@
31de76cc 1333 - grunk@cvs.openbsd.org 2008/06/12 21:14:46
1334 [ssh-keygen.c]
1335 make ssh-keygen -lf show the key type just as ssh-add -l would do it
1336 ok djm@ markus@
f97fb6ca 1337 - grunk@cvs.openbsd.org 2008/06/12 22:03:36
1338 [key.c]
1339 add my copyright, ok djm@
6d8216ff 1340 - ian@cvs.openbsd.org 2008/06/12 23:24:58
1341 [sshconnect.c]
1342 tweak wording in message, ok deraadt@ jmc@
2c83cd01 1343 - dtucker@cvs.openbsd.org 2008/06/13 00:12:02
1344 [sftp.h log.h]
1345 replace __dead with __attribute__((noreturn)), makes things
1346 a little easier to port. Also, add it to sigdie(). ok djm@
b97ea6eb 1347 - djm@cvs.openbsd.org 2008/06/13 00:16:49
1348 [mux.c]
1349 fall back to creating a new TCP connection on most multiplexing errors
1350 (socket connect fail, invalid version, refused permittion, corrupted
1351 messages, etc.); bz #1329 ok dtucker@
243cc316 1352 - dtucker@cvs.openbsd.org 2008/06/13 00:47:53
1353 [mux.c]
1354 upcast size_t to u_long to match format arg; ok djm@
041f11dc 1355 - dtucker@cvs.openbsd.org 2008/06/13 00:51:47
1356 [mac.c]
1357 upcast another size_t to u_long to match format
852eb76b 1358 - dtucker@cvs.openbsd.org 2008/06/13 01:38:23
1359 [misc.c]
1360 upcast uid to long with matching %ld, prevents warnings in portable
632f2669 1361 - djm@cvs.openbsd.org 2008/06/13 04:40:22
1362 [auth2-pubkey.c auth-rhosts.c]
1363 refuse to read ~/.shosts or ~/.ssh/authorized_keys that are not
1364 regular files; report from Solar Designer via Colin Watson in bz#1471
1365 ok dtucker@ deraadt
136d0181 1366 - (dtucker) [clientloop.c serverloop.c] channel_register_filter now
1367 takes 2 more args. with djm@
49190c3d 1368 - (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch
1369 from Todd Vierling.
02e605ed 1370 - (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA
1371 systems. Patch from R. Scott Bailey.
c694c610 1372 - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used
1373 on big endian machines, so ifdef them for little-endian only to prevent
1374 unused function warnings on big-endians.
56f77432 1375 - (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent
1376 compiler warnings on some platforms. Based on a discussion with otto@
9754b94b 1377
554ebbed 137820080611
1379 - (djm) [channels.c configure.ac]
1380 Do not set SO_REUSEADDR on wildcard X11 listeners (X11UseLocalhost=no)
1381 bz#1464; ok dtucker
1382
15b5fa9b 138320080610
1384 - (dtucker) OpenBSD CVS Sync
1385 - djm@cvs.openbsd.org 2008/06/10 03:57:27
1386 [servconf.c match.h sshd_config.5]
1387 support CIDR address matching in sshd_config "Match address" blocks, with
1388 full support for negation and fall-back to classic wildcard matching.
1389 For example:
1390 Match address 192.0.2.0/24,3ffe:ffff::/32,!10.*
1391 PasswordAuthentication yes
1392 addrmatch.c code mostly lifted from flowd's addr.c
1393 feedback and ok dtucker@
8b671558 1394 - djm@cvs.openbsd.org 2008/06/10 04:17:46
1395 [sshd_config.5]
1396 better reference for pattern-list
1760c982 1397 - dtucker@cvs.openbsd.org 2008/06/10 04:50:25
1398 [sshd.c channels.h channels.c log.c servconf.c log.h servconf.h sshd.8]
1399 Add extended test mode (-T) and connection parameters for test mode (-C).
1400 -T causes sshd to write its effective configuration to stdout and exit.
1401 -C causes any relevant Match rules to be applied before output. The
1402 combination allows tesing of the parser and config files. ok deraadt djm
01e9e424 1403 - jmc@cvs.openbsd.org 2008/06/10 07:12:00
1404 [sshd_config.5]
1405 tweak previous;
3b42e3ac 1406 - jmc@cvs.openbsd.org 2008/06/10 08:17:40
1407 [sshd.8 sshd.c]
1408 - update usage()
1409 - fix SYNOPSIS, and sort options
1410 - some minor additional fixes
f0528444 1411 - dtucker@cvs.openbsd.org 2008/06/09 18:06:32
1412 [regress/test-exec.sh]
1413 Don't generate putty keys if we're not going to use them. ok djm
16d46c30 1414 - dtucker@cvs.openbsd.org 2008/06/10 05:23:32
1415 [regress/addrmatch.sh regress/Makefile]
1416 Regress test for Match CIDR rules. ok djm@
94edc013 1417 - dtucker@cvs.openbsd.org 2008/06/10 15:21:41
1418 [test-exec.sh]
1419 Use a more portable construct for checking if we're running a putty test
64c576e9 1420 - dtucker@cvs.openbsd.org 2008/06/10 15:28:49
1421 [test-exec.sh]
1422 Add quotes
f6748d7b 1423 - dtucker@cvs.openbsd.org 2008/06/10 18:21:24
1424 [ssh_config.5]
1425 clarify that Host patterns are space-separated. ok deraadt
3f0444ca 1426 - djm@cvs.openbsd.org 2008/06/10 22:15:23
1427 [PROTOCOL ssh.c serverloop.c]
1428 Add a no-more-sessions@openssh.com global request extension that the
1429 client sends when it knows that it will never request another session
1430 (i.e. when session multiplexing is disabled). This allows a server to
1431 disallow further session requests and terminate the session.
1432 Why would a non-multiplexing client ever issue additional session
1433 requests? It could have been attacked with something like SSH'jack:
1434 http://www.storm.net.nz/projects/7
1435 feedback & ok markus
b3b048d6 1436 - djm@cvs.openbsd.org 2008/06/10 23:06:19
1437 [auth-options.c match.c servconf.c addrmatch.c sshd.8]
1438 support CIDR address matching in .ssh/authorized_keys from="..." stanzas
1439 ok and extensive testing dtucker@
8fb12ef0 1440 - dtucker@cvs.openbsd.org 2008/06/10 23:21:34
1441 [bufaux.c]
1442 Use '\0' for a nul byte rather than unadorned 0. ok djm@
a6d05adf 1443 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
1444 [Makefile regress/key-options.sh]
1445 Add regress test for key options. ok djm@
edee47f5 1446 - (dtucker) [openbsd-compat/fake-rfc2553.h] Add sin6_scope_id to sockaddr_in6
1447 since the new CIDR code in addmatch.c references it.
1448 - (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6
1449 specific tests on platforms that don't do IPv6.
8ac1d2eb 1450 - (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well
1451 as environment.
0694c78f 1452 - (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now.
15b5fa9b 1453
10e804f4 145420080609
1455 - (dtucker) OpenBSD CVS Sync
1456 - dtucker@cvs.openbsd.org 2008/06/08 17:04:41
1457 [sftp-server.c]
1458 Add case for ENOSYS in errno_to_portable; ok deraadt
5a3cde15 1459 - dtucker@cvs.openbsd.org 2008/06/08 20:15:29
1460 [sftp.c sftp-client.c sftp-client.h]
1461 Have the sftp client store the statvfs replies in wire format,
1462 which prevents problems when the server's native sizes exceed the
1463 client's.
1464 Also extends the sizes of the remaining 32bit wire format to 64bit,
1465 they're specified as unsigned long in the standard.
7290afcb 1466 - dtucker@cvs.openbsd.org 2008/06/09 13:02:39
2626070f 1467 [sftp-server.c]
7290afcb 1468 Extend 32bit -> 64bit values for statvfs extension missed in previous
1469 commit.
2626070f 1470 - dtucker@cvs.openbsd.org 2008/06/09 13:38:46
1471 [PROTOCOL]
1472 Use a $OpenBSD tag so our scripts will sync changes.
10e804f4 1473
22f5e872 147420080608
1475 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c
1476 openbsd-compat/Makefile.in openbsd-compat/openbsd-compat.h
1477 openbsd-compat/bsd-statvfs.{c,h}] Add a null implementation of statvfs and
1478 fstatvfs and remove #defines around statvfs code. ok djm@
7a4f468b 1479 - (dtucker) [configure.ac defines.h sftp-client.c M sftp-server.c] Add a
1480 macro to convert fsid to unsigned long for platforms where fsid is a
1481 2-member array.
22f5e872 1482
0894bbed 148320080607
1484 - (dtucker) [mux.c] Include paths.h inside ifdef HAVE_PATHS_H.
4538e135 1485 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c]
1486 Do not enable statvfs extensions on platforms that do not have statvfs.
2abb1ef5 1487 - (dtucker) OpenBSD CVS Sync
1488 - djm@cvs.openbsd.org 2008/05/19 06:14:02
1489 [packet.c] unbreak protocol keepalive timeouts bz#1465; ok dtucker@
82bb6f20 1490 - djm@cvs.openbsd.org 2008/05/19 15:45:07
1491 [sshtty.c ttymodes.c sshpty.h]
1492 Fix sending tty modes when stdin is not a tty (bz#1199). Previously
1493 we would send the modes corresponding to a zeroed struct termios,
1494 whereas we should have been sending an empty list of modes.
1495 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
048acbeb 1496 - djm@cvs.openbsd.org 2008/05/19 15:46:31
1497 [ssh-keygen.c]
1498 support -l (print fingerprint) in combination with -F (find host) to
1499 search for a host in ~/.ssh/known_hosts and display its fingerprint;
1500 ok markus@
4651c790 1501 - djm@cvs.openbsd.org 2008/05/19 20:53:52
1502 [clientloop.c]
1503 unbreak tree by committing this bit that I missed from:
1504 Fix sending tty modes when stdin is not a tty (bz#1199). Previously
1505 we would send the modes corresponding to a zeroed struct termios,
1506 whereas we should have been sending an empty list of modes.
1507 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
0894bbed 1508
07e61b8a 150920080604
1510 - (djm) [openbsd-compat/bsd-arc4random.c] Fix math bug that caused bias
1511 in arc4random_uniform with upper_bound in (2^30,2*31). Note that
1512 OpenSSH did not make requests with upper bounds in this range.
1513
b3ef88dc 151420080519
1515 - (djm) [configure.ac mux.c sftp.c openbsd-compat/Makefile.in]
1516 [openbsd-compat/fmt_scaled.c openbsd-compat/openbsd-compat.h]
1517 Fix compilation on Linux, including pulling in fmt_scaled(3)
1518 implementation from OpenBSD's libutil.
1519
9b04dbaa 152020080518
1521 - (djm) OpenBSD CVS Sync
1522 - djm@cvs.openbsd.org 2008/04/04 05:14:38
1523 [sshd_config.5]
1524 ChrootDirectory is supported in Match blocks (in fact, it is most useful
1525 there). Spotted by Minstrel AT minstrel.org.uk
5b76e3ef 1526 - djm@cvs.openbsd.org 2008/04/04 06:44:26
1527 [sshd_config.5]
1528 oops, some unrelated stuff crept into that commit - backout.
1529 spotted by jmc@
ade21243 1530 - djm@cvs.openbsd.org 2008/04/05 02:46:02
1531 [sshd_config.5]
1532 HostbasedAuthentication is supported under Match too
185adaf8 1533 - (djm) [openbsd-compat/bsd-arc4random.c openbsd-compat/openbsd-compat.c]
1534 [configure.ac] Implement arc4random_buf(), import implementation of
1535 arc4random_uniform() from OpenBSD
936e7c8c 1536 - (djm) [openbsd-compat/bsd-arc4random.c] Warning fixes
c49ce62e 1537 - (djm) [openbsd-compat/port-tun.c] needs sys/queue.h
c1d152b8 1538 - (djm) OpenBSD CVS Sync
1539 - djm@cvs.openbsd.org 2008/04/13 00:22:17
1540 [dh.c sshd.c]
1541 Use arc4random_buf() when requesting more than a single word of output
1542 Use arc4random_uniform() when the desired random number upper bound
1543 is not a power of two
1544 ok deraadt@ millert@
360b43ab 1545 - djm@cvs.openbsd.org 2008/04/18 12:32:11
1546 [sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c sftp.h]
1547 introduce sftp extension methods statvfs@openssh.com and
1548 fstatvfs@openssh.com that implement statvfs(2)-like operations,
1549 based on a patch from miklos AT szeredi.hu (bz#1399)
1550 also add a "df" command to the sftp client that uses the
1551 statvfs@openssh.com to produce a df(1)-like display of filesystem
1552 space and inode utilisation
1553 ok markus@
ea530517 1554 - jmc@cvs.openbsd.org 2008/04/18 17:15:47
1555 [sftp.1]
1556 macro fixage;
48fbfda0 1557 - djm@cvs.openbsd.org 2008/04/18 22:01:33
1558 [session.c]
1559 remove unneccessary parentheses
0bb7755b 1560 - otto@cvs.openbsd.org 2008/04/29 11:20:31
1561 [monitor_mm.h]
1562 garbage collect two unused fields in struct mm_master; ok markus@
c47ff7a6 1563 - djm@cvs.openbsd.org 2008/04/30 10:14:03
1564 [ssh-keyscan.1 ssh-keyscan.c]
1565 default to rsa (protocol 2) keys, instead of rsa1 keys; spotted by
1566 larsnooden AT openoffice.org
43c3f85c 1567 - pyr@cvs.openbsd.org 2008/05/07 05:49:37
1568 [servconf.c servconf.h session.c sshd_config.5]
1569 Enable the AllowAgentForwarding option in sshd_config (global and match
1570 context), to specify if agents should be permitted on the server.
1571 As the man page states:
1572 ``Note that disabling Agent forwarding does not improve security
1573 unless users are also denied shell access, as they can always install
1574 their own forwarders.''
1575 ok djm@, ok and a mild frown markus@
5c7e2b47 1576 - pyr@cvs.openbsd.org 2008/05/07 06:43:35
1577 [sshd_config]
1578 push the sshd_config bits in, spotted by ajacoutot@
94569631 1579 - jmc@cvs.openbsd.org 2008/05/07 08:00:14
1580 [sshd_config.5]
1581 sort;
17f02f0a 1582 - markus@cvs.openbsd.org 2008/05/08 06:59:01
1583 [bufaux.c buffer.h channels.c packet.c packet.h]
1584 avoid extra malloc/copy/free when receiving data over the net;
1585 ~10% speedup for localhost-scp; ok djm@
3593bdc0 1586 - djm@cvs.openbsd.org 2008/05/08 12:02:23
1587 [auth-options.c auth1.c channels.c channels.h clientloop.c gss-serv.c]
1588 [monitor.c monitor_wrap.c nchan.c servconf.c serverloop.c session.c]
1589 [ssh.c sshd.c]
1590 Implement a channel success/failure status confirmation callback
1591 mechanism. Each channel maintains a queue of callbacks, which will
1592 be drained in order (RFC4253 guarantees confirm messages are not
1593 reordered within an channel).
1594 Also includes a abandonment callback to clean up if a channel is
1595 closed without sending confirmation messages. This probably
1596 shouldn't happen in compliant implementations, but it could be
1597 abused to leak memory.
1598 ok markus@ (as part of a larger diff)
c6dca55e 1599 - djm@cvs.openbsd.org 2008/05/08 12:21:16
1600 [monitor.c monitor_wrap.c session.h servconf.c servconf.h session.c]
1601 [sshd_config sshd_config.5]
1602 Make the maximum number of sessions run-time controllable via
1603 a sshd_config MaxSessions knob. This is useful for disabling
1604 login/shell/subsystem access while leaving port-forwarding working
1605 (MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or
1606 simply increasing the number of allows multiplexed sessions.
1607 Because some bozos are sure to configure MaxSessions in excess of the
1608 number of available file descriptors in sshd (which, at peak, might be
1609 as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds
1610 on error paths, and make it fail gracefully on out-of-fd conditions -
1611 sending channel errors instead of than exiting with fatal().
1612 bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com
1613 ok markus@
95d3c124 1614 - djm@cvs.openbsd.org 2008/05/08 13:06:11
1615 [clientloop.c clientloop.h ssh.c]
1616 Use new channel status confirmation callback system to properly deal
1617 with "important" channel requests that fail, in particular command exec,
1618 shell and subsystem requests. Previously we would optimistically assume
1619 that the requests would always succeed, which could cause hangs if they
1620 did not (e.g. when the server runs out of fds) or were unimplemented by
1621 the server (bz #1384)
1622 Also, properly report failing multiplex channel requests via the mux
1623 client stderr (subject to LogLevel in the mux master) - better than
1624 silently failing.
1625 most bits ok markus@ (as part of a larger diff)
e07e21ad 1626 - djm@cvs.openbsd.org 2008/05/09 04:55:56
1627 [channels.c channels.h clientloop.c serverloop.c]
1628 Try additional addresses when connecting to a port forward destination
1629 whose DNS name resolves to more than one address. The previous behaviour
1630 was to try the first address and give up.
1631 Reported by stig AT venaas.com in bz#343
1632 great feedback and ok markus@
3bcced4c 1633 - djm@cvs.openbsd.org 2008/05/09 14:18:44
1634 [clientloop.c clientloop.h ssh.c mux.c]
1635 tidy up session multiplexing code, moving it into its own file and
1636 making the function names more consistent - making ssh.c and
1637 clientloop.c a fair bit more readable.
1638 ok markus@
6cd3e678 1639 - djm@cvs.openbsd.org 2008/05/09 14:26:08
1640 [ssh.c]
1641 dingo stole my diff hunk
ee7c3e92 1642 - markus@cvs.openbsd.org 2008/05/09 16:16:06
1643 [session.c]
1644 re-add the USE_PIPES code and enable it.
1645 without pipes shutdown-read from the sshd does not trigger
1646 a SIGPIPE when the forked program does a write.
1647 ok djm@
1648 (Id sync only, USE_PIPES never left portable OpenSSH)
271f4a13 1649 - markus@cvs.openbsd.org 2008/05/09 16:17:51
1650 [channels.c]
1651 error-fd race: don't enable the error fd in the select bitmask
1652 for channels with both in- and output closed, since the channel
1653 will go away before we call select();
1654 report, lots of debugging help and ok djm@
50c96367 1655 - markus@cvs.openbsd.org 2008/05/09 16:21:13
1656 [channels.h clientloop.c nchan.c serverloop.c]
1657 unbreak
1658 ssh -2 localhost od /bin/ls | true
1659 ignoring SIGPIPE by adding a new channel message (EOW) that signals
1660 the peer that we're not interested in any data it might send.
1661 fixes bz #85; discussion, debugging and ok djm@
d5820099 1662 - pvalchev@cvs.openbsd.org 2008/05/12 20:52:20
1663 [umac.c]
1664 Ensure nh_result lies on a 64-bit boundary (fixes warnings observed
1665 on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@
56b12440 1666 - djm@cvs.openbsd.org 2008/05/15 23:52:24
1667 [nchan2.ms]
1668 document eow message in ssh protocol 2 channel state machine;
1669 feedback and ok markus@
f8db3345 1670 - djm@cvs.openbsd.org 2008/05/18 21:29:05
1671 [sftp-server.c]
1672 comment extension announcement
8be03682 1673 - djm@cvs.openbsd.org 2008/05/16 08:30:42
1674 [PROTOCOL]
1675 document our protocol extensions and deviations; ok markus@
1676 - djm@cvs.openbsd.org 2008/05/17 01:31:56
1677 [PROTOCOL]
1678 grammar and correctness fixes from stevesk@
9b04dbaa 1679
490c3105 168020080403
1681 - (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile-
1682 time warnings on LynxOS. Patch from ops AT iki.fi
1ebb73e4 1683 - (djm) Force string arguments to replacement setproctitle() though
1684 strnvis first. Ok dtucker@
490c3105 1685
2b363e83 168620080403
1687 - (djm) OpenBSD CVS sync:
1688 - markus@cvs.openbsd.org 2008/04/02 15:36:51
1689 [channels.c]
1690 avoid possible hijacking of x11-forwarded connections (back out 1.183)
1691 CVE-2008-1483; ok djm@
adb7acbc 1692 - jmc@cvs.openbsd.org 2008/03/27 22:37:57
1693 [sshd.8]
1694 remove trailing whitespace;
53e0dc70 1695 - djm@cvs.openbsd.org 2008/04/03 09:50:14
1696 [version.h]
1697 openssh-5.0
31b1b2c8 1698 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
1699 [contrib/suse/openssh.spec] Crank version numbers in RPM spec files
dd052df9 1700 - (djm) [README] Update link to release notes
098ebea7 1701 - (djm) Release 5.0p1
This page took 2.764778 seconds and 5 git commands to generate.