]>
Commit | Line | Data |
---|---|---|
7efc7f57 | 1 | 20030515 |
2 | - (djm) OpenBSD CVS Sync | |
3 | - jmc@cvs.openbsd.org 2003/05/14 13:11:56 | |
4 | [ssh-agent.1] | |
5 | setup -> set up; | |
6 | from wiz@netbsd | |
21289cd0 | 7 | - jakob@cvs.openbsd.org 2003/05/14 18:16:20 |
8 | [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c] | |
9 | [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c] | |
10 | add experimental support for verifying hos keys using DNS as described | |
11 | in draft-ietf-secsh-dns-xx.txt. more information in README.dns. | |
12 | ok markus@ and henning@ | |
16a79097 | 13 | - markus@cvs.openbsd.org 2003/05/14 22:24:42 |
14 | [clientloop.c session.c ssh.1] | |
15 | allow to send a BREAK to the remote system; ok various | |
b8c2031b | 16 | - markus@cvs.openbsd.org 2003/05/15 00:28:28 |
17 | [sshconnect2.c] | |
18 | cleanup unregister of per-method packet handlers; ok djm@ | |
d0ec7f42 | 19 | - jakob@cvs.openbsd.org 2003/05/15 01:48:10 |
20 | [readconf.c readconf.h servconf.c servconf.h] | |
21 | always parse kerberos options. ok djm@ markus@ | |
b414a17b | 22 | - jakob@cvs.openbsd.org 2003/05/15 02:27:15 |
23 | [dns.c] | |
24 | add missing freerrset | |
3b6e3da9 | 25 | - markus@cvs.openbsd.org 2003/05/15 03:08:29 |
26 | [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c] | |
27 | split out custom EVP ciphers | |
02159d9b | 28 | - djm@cvs.openbsd.org 2003/05/15 03:10:52 |
29 | [ssh-keygen.c] | |
30 | avoid warning; ok jakob@ | |
4a26f5c5 | 31 | - mouring@cvs.openbsd.org 2003/05/15 03:39:07 |
32 | [sftp-int.c] | |
33 | Make put/get (globed and nonglobed) code more consistant. OK djm@ | |
c44f10c6 | 34 | - mouring@cvs.openbsd.org 2003/05/15 03:43:59 |
dc69f53c | 35 | [sftp-int.c sftp.c] |
c44f10c6 | 36 | Teach ls how to display multiple column display and allow users |
37 | to return to single column format via 'ls -1'. OK @djm | |
1457e7ff | 38 | - jakob@cvs.openbsd.org 2003/05/15 04:08:44 |
39 | [readconf.c servconf.c] | |
40 | disable kerberos when not supported. ok markus@ | |
861f0365 | 41 | - markus@cvs.openbsd.org 2003/05/15 04:08:41 |
42 | [ssh.1] | |
43 | ~B is ssh2 only | |
d0ec7f42 | 44 | - (djm) Always parse UsePAM |
3e05e934 | 45 | - (djm) Configure glue for DNS support (code doesn't work in portable yet) |
4460d509 | 46 | - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support) |
86ee6794 | 47 | - (djm) Tidy Makefile clean targets |
2636769c | 48 | - (djm) Adapt README.dns for portable |
2d2e4a34 | 49 | - (djm) Avoid uuencode.c warnings |
1457e7ff | 50 | - (djm) Enable UsePAM when built --with-pam |
67467c30 | 51 | - (djm) Only build getrrsetbyname replacement when using --with-dns |
f420d2ba | 52 | - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv |
53 | correctly) | |
3c49ef10 | 54 | - (djm) Bug #444: Wrong paths after reconfigure |
f420d2ba | 55 | |
dd3ebb5a | 56 | 20030514 |
57 | - (djm) Bug #117: Don't lie to PAM about username | |
0608f8a7 | 58 | - (djm) RCSID sync w/ OpenBSD |
204fde99 | 59 | - (djm) OpenBSD CVS Sync |
60 | - djm@cvs.openbsd.org 2003/04/09 12:00:37 | |
61 | [readconf.c] | |
62 | strip trailing whitespace from config lines before parsing. | |
63 | Fixes bz 528; ok markus@ | |
18ae3c67 | 64 | - markus@cvs.openbsd.org 2003/04/12 10:13:57 |
65 | [cipher.c] | |
66 | hide cipher details; ok djm@ | |
45c42d58 | 67 | - markus@cvs.openbsd.org 2003/04/12 10:15:36 |
68 | [misc.c] | |
69 | debug->debug2 | |
c825cd79 | 70 | - naddy@cvs.openbsd.org 2003/04/12 11:40:15 |
71 | [ssh.1] | |
72 | document -V switch, fix wording; ok markus@ | |
3e131a6d | 73 | - markus@cvs.openbsd.org 2003/04/14 14:17:50 |
74 | [channels.c sshconnect.c sshd.c ssh-keyscan.c] | |
75 | avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP | |
927e9f8b | 76 | - mouring@cvs.openbsd.org 2003/04/14 21:31:27 |
77 | [sftp-int.c] | |
78 | Missing globfree(&g) in process_put() spotted by Vince Brimhall | |
79 | <VBrimhall@novell.com>. ok@ Theo | |
80 | - markus@cvs.openbsd.org 2003/04/16 14:35:27 | |
81 | [auth.h] | |
82 | document struct Authctxt; with solar | |
b9e5aff6 | 83 | - deraadt@cvs.openbsd.org 2003/04/26 04:29:49 |
84 | [ssh-keyscan.c] | |
85 | -t in usage(); rogier@quaak.org | |
9a26a6e2 | 86 | - mouring@cvs.openbsd.org 2003/04/30 01:16:20 |
87 | [sshd.8 sshd_config.5] | |
88 | Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable | |
89 | Bug #550 and * escaping suggested by jmc@. | |
09dc8896 | 90 | - david@cvs.openbsd.org 2003/04/30 20:41:07 |
91 | [sshd.8] | |
92 | fix invalid .Pf macro usage introduced in previous commit | |
93 | ok jmc@ mouring@ | |
3566c73c | 94 | - markus@cvs.openbsd.org 2003/05/11 16:56:48 |
95 | [authfile.c ssh-keygen.c] | |
96 | change key_load_public to try to read a public from: | |
97 | rsa1 private or rsa1 public and ssh2 keys. | |
98 | this makes ssh-keygen -e fail for ssh1 keys more gracefully | |
99 | for example; report from itojun (netbsd pr 20550). | |
0d942eff | 100 | - markus@cvs.openbsd.org 2003/05/11 20:30:25 |
101 | [channels.c clientloop.c serverloop.c session.c ssh.c] | |
102 | make channel_new() strdup the 'remote_name' (not the caller); ok theo | |
43348518 | 103 | - markus@cvs.openbsd.org 2003/05/12 16:55:37 |
104 | [sshconnect2.c] | |
105 | for pubkey authentication try the user keys in the following order: | |
106 | 1. agent keys that are found in the config file | |
107 | 2. other agent keys | |
108 | 3. keys that are only listed in the config file | |
109 | this helps when an agent has many keys, where the server might | |
110 | close the connection before the correct key is used. report & ok pb@ | |
dc109cfe | 111 | - markus@cvs.openbsd.org 2003/05/12 18:35:18 |
112 | [ssh-keyscan.1] | |
113 | typo: DSA keys are of type ssh-dss; Brian Poole | |
81466908 | 114 | - markus@cvs.openbsd.org 2003/05/14 00:52:59 |
115 | [ssh2.h] | |
116 | ranges for per auth method messages | |
117 | - djm@cvs.openbsd.org 2003/05/14 01:00:44 | |
118 | [sftp.1] | |
119 | emphasise the batchmode functionality and make reference to pubkey auth, | |
120 | both of which are FAQs; ok markus@ | |
802e01b8 | 121 | - markus@cvs.openbsd.org 2003/05/14 02:15:47 |
122 | [auth2.c monitor.c sshconnect2.c auth2-krb5.c] | |
123 | implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@ | |
124 | server interops with commercial client; ok jakob@ djm@ | |
72c5fe79 | 125 | - jmc@cvs.openbsd.org 2003/05/14 08:25:39 |
126 | [sftp.1] | |
127 | - better formatting in SYNOPSIS | |
128 | - whitespace at EOL | |
129 | ok djm@ | |
3a39206f | 130 | - markus@cvs.openbsd.org 2003/05/14 08:57:49 |
131 | [monitor.c] | |
132 | http://bugzilla.mindrot.org/show_bug.cgi?id=560 | |
133 | Privsep child continues to run after monitor killed. | |
134 | Pass monitor signals through to child; Darren Tucker | |
751092f9 | 135 | - (djm) Make portable build with MIT krb5 (some issues remain) |
7fceb20d | 136 | - (djm) Add new UsePAM configuration directive to allow runtime control |
137 | over usage of PAM. This allows non-root use of sshd when built with | |
138 | --with-pam | |
817e6d38 | 139 | - (djm) Die screaming if start_pam() is called when UsePAM=no |
83ccf11a | 140 | - (djm) Avoid KrbV leak for MIT Kerberos |
b1848832 | 141 | - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@ |
fa065de2 | 142 | - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability |
dd3ebb5a | 143 | |
91f3aa9b | 144 | 20030512 |
145 | - (djm) Redhat spec: Don't install profile.d scripts when not | |
146 | building with GNOME/GTK askpass (patch from bet@rahul.net) | |
147 | ||
5def520a | 148 | 20030510 |
149 | - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than | |
150 | "make install". Patch by roth@feep.net. | |
ad84c479 | 151 | - (dtucker) Bug #536: Test for and work around openpty/controlling tty |
152 | problem on Linux (fixes "could not set controlling tty" errors). | |
05114c74 | 153 | - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with |
154 | proper challenge-response module | |
23ab1f36 | 155 | - (djm) 2-clause license on loginrec.c, with permission from |
156 | andre@ae-35.com | |
5def520a | 157 | |
43ce025d | 158 | 20030504 |
dd594f99 | 159 | - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h. |
160 | Patch from vinschen@redhat.com. | |
43ce025d | 161 | |
2cd5dbba | 162 | 20030503 |
163 | - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted | |
164 | by wendyp@cray.com. | |
165 | ||
bf7c1e6c | 166 | 20030502 |
167 | - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels, | |
168 | privsep should now work. | |
73d9dad3 | 169 | - (dtucker) Move handling of bad password authentications into a platform |
990278ef | 170 | specific record_failed_login() function (affects AIX & Unicos). ok mouring@ |
bf7c1e6c | 171 | |
68ece370 | 172 | 20030429 |
173 | - (djm) Add back radix.o (used by AFS support), after it went missing from | |
174 | Makefile many moons ago | |
175 | - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer | |
176 | - (djm) Fix blibpath specification for AIX/gcc | |
177 | - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org | |
178 | ||
ded9dd18 | 179 | 20030428 |
180 | - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit | |
181 | hacked code. | |
182 | ||
aceb0423 | 183 | 20030427 |
184 | - (bal) Bug #541: return; was dropped by mistake. Reported by | |
185 | furrier@iglou.com | |
c8a50a34 | 186 | - (bal) Since we don't support platforms lacking u_int_64. We may |
187 | as well clean out some of those evil #ifdefs | |
9a6fee8b | 188 | - (bal) auth1.c minor resync while looking at the code. |
d7cf277b | 189 | - (bal) auth2.c same changed as above. |
aceb0423 | 190 | |
0a626302 | 191 | 20030409 |
192 | - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report | |
193 | from matth@eecs.berkeley.edu | |
d35929b5 | 194 | - (djm) Make the spec work with Redhat 9.0 (which renames sharutils) |
ffd7b36b | 195 | - (djm) OpenBSD CVS Sync |
196 | - markus@cvs.openbsd.org 2003/04/02 09:48:07 | |
197 | [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c] | |
198 | [readconf.h serverloop.c sshconnect2.c] | |
199 | reapply rekeying chage, tested by henning@, ok djm@ | |
16f1b5ca | 200 | - markus@cvs.openbsd.org 2003/04/02 14:36:26 |
201 | [ssh-keysign.c] | |
202 | potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526 | |
6c1bc5c5 | 203 | - itojun@cvs.openbsd.org 2003/04/03 07:25:27 |
204 | [progressmeter.c] | |
205 | $OpenBSD$ | |
206 | - itojun@cvs.openbsd.org 2003/04/03 10:17:35 | |
207 | [progressmeter.c] | |
208 | remove $OpenBSD$, as other *.c does not have it. | |
806e4c11 | 209 | - markus@cvs.openbsd.org 2003/04/07 08:29:57 |
210 | [monitor_wrap.c] | |
211 | typo: get correct counters; introduced during rekeying change. | |
2f5b2528 | 212 | - millert@cvs.openbsd.org 2003/04/07 21:58:05 |
213 | [progressmeter.c] | |
214 | The UCB copyright here is incorrect. This code did not originate | |
215 | at UCB, it was written by Luke Mewburn. Updated the copyright at | |
216 | the author's request. markus@ OK | |
217 | - itojun@cvs.openbsd.org 2003/04/08 20:21:29 | |
218 | [*.c *.h] | |
219 | rename log() into logit() to avoid name conflict. markus ok, from | |
220 | netbsd | |
221 | - (djm) XXX - Performed locally using: | |
222 | "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h" | |
70e1f62f | 223 | - hin@cvs.openbsd.org 2003/04/09 08:23:52 |
224 | [servconf.c] | |
225 | Don't include <krb.h> when compiling with Kerberos 5 support | |
2f5b2528 | 226 | - (djm) Fix up missing include for packet.c |
a3568201 | 227 | - (djm) Fix missed log => logit occurance (reference by function pointer) |
0a626302 | 228 | |
4d0cb2e5 | 229 | 20030402 |
230 | - (bal) if IP_TOS is not found or broken don't try to compile in | |
231 | packet_set_tos() function call. bug #527 | |
232 | ||
a4e5acef | 233 | 20030401 |
234 | - (djm) OpenBSD CVS Sync | |
235 | - jmc@cvs.openbsd.org 2003/03/28 10:11:43 | |
236 | [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5] | |
237 | [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8] | |
238 | - killed whitespace | |
239 | - new sentence new line | |
240 | - .Bk for arguments | |
241 | ok markus@ | |
177f584b | 242 | - markus@cvs.openbsd.org 2003/04/01 10:10:23 |
243 | [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c] | |
244 | [readconf.h serverloop.c sshconnect2.c] | |
245 | rekeying bugfixes and automatic rekeying: | |
246 | * both client and server rekey _automatically_ | |
247 | (a) after 2^31 packets, because after 2^32 packets | |
248 | the sequence number for packets wraps | |
249 | (b) after 2^(blocksize_in_bits/4) blocks | |
250 | (see: draft-ietf-secsh-newmodes-00.txt) | |
251 | (a) and (b) are _enabled_ by default, and only disabled for known | |
252 | openssh versions, that don't support rekeying properly. | |
253 | * client option 'RekeyLimit' | |
254 | * do not reply to requests during rekeying | |
255 | - markus@cvs.openbsd.org 2003/04/01 10:22:21 | |
256 | [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c] | |
257 | [readconf.h serverloop.c sshconnect2.c] | |
258 | backout rekeying changes (for 3.6.1) | |
519bdfe8 | 259 | - markus@cvs.openbsd.org 2003/04/01 10:31:26 |
260 | [compat.c compat.h kex.c] | |
261 | bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@; | |
262 | tested by ho@ and myself | |
9dd240a3 | 263 | - markus@cvs.openbsd.org 2003/04/01 10:56:46 |
264 | [version.h] | |
265 | 3.6.1 | |
ac01b518 | 266 | - (djm) Crank spec file versions |
b32453fe | 267 | - (djm) Release 3.6.1p1 |
a4e5acef | 268 | |
fd77a40f | 269 | 20030326 |
270 | - (djm) OpenBSD CVS Sync | |
271 | - deraadt@cvs.openbsd.org 2003/03/26 04:02:51 | |
272 | [sftp-server.c] | |
273 | one last fix to the tree: race fix broke stuff; pr 3169; | |
274 | srp@srparish.net, help from djm | |
275 | ||
8021857c | 276 | 20030325 |
277 | - (djm) Fix getpeerid support for 64 bit BE systems. From | |
278 | Arnd Bergmann <arndb@de.ibm.com> | |
279 | ||
cdb64c4d | 280 | 20030324 |
281 | - (djm) OpenBSD CVS Sync | |
282 | - markus@cvs.openbsd.org 2003/03/23 19:02:00 | |
283 | [monitor.c] | |
284 | unbreak rekeying for privsep; ok millert@ | |
285 | - Release 3.6p1 | |
62086365 | 286 | - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo. |
287 | Report from murple@murple.net, diagnosis from dtucker@zip.com.au | |
cdb64c4d | 288 | |
9c4cd3ef | 289 | 20030320 |
290 | - (djm) OpenBSD CVS Sync | |
291 | - markus@cvs.openbsd.org 2003/03/17 10:38:38 | |
292 | [progressmeter.c] | |
293 | don't print \n if backgrounded; from ho@ | |
57f5c15b | 294 | - markus@cvs.openbsd.org 2003/03/17 11:43:47 |
295 | [version.h] | |
296 | enter 3.6 | |
85abc74b | 297 | - (bal) The days of lack of int64_t support are over. Sorry kids. |
eb180c2e | 298 | - (bal) scp.c 'limit' conflicts with Cray. Rename to 'limitbw' |
af3cb693 | 299 | - (bal) Collection of Cray patches (bsd-cray.h fix for CRAYT3E and improved |
300 | guessing rules) | |
58d0df4e | 301 | - (bal) Disable Privsep for Tru64 after pre-authentication due to issues |
302 | with SIA. Also, clean up of tru64 support patch by Chris Adams | |
303 | <cmadams@hiwaay.net> | |
16c14233 | 304 | - (tim) [contrib/caldera/openssh.spec] workaround RPM quirk. Fix %files |
9c4cd3ef | 305 | |
5271b55c | 306 | 20030318 |
307 | - (tim) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h] | |
308 | add nanosleep(). testing/corrections by Darren Tucker <dtucker@zip.com.au> | |
309 | ||
d8eb5247 | 310 | 20030317 |
311 | - (djm) Fix return value checks for RAND_bytes. Report from | |
312 | Steve G <linux_4ever@yahoo.com> | |
313 | ||
15e98f49 | 314 | 20030315 |
315 | - (djm) OpenBSD CVS Sync | |
316 | - markus@cvs.openbsd.org 2003/03/13 11:42:19 | |
317 | [authfile.c ssh-keysign.c] | |
318 | move RSA_blinding_on to generic key load method | |
cb0e1d67 | 319 | - markus@cvs.openbsd.org 2003/03/13 11:44:50 |
320 | [ssh-agent.c] | |
321 | ssh-agent is similar to ssh-keysign (allows other processes to use | |
322 | private rsa keys). however, it gets key over socket and not from | |
323 | a file, so we have to do blinding here as well. | |
15e98f49 | 324 | |
3e2f2431 | 325 | 20030310 |
326 | - (djm) OpenBSD CVS Sync | |
327 | - markus@cvs.openbsd.org 2003/03/05 22:33:43 | |
328 | [channels.c monitor.c scp.c session.c sftp-client.c sftp-int.c] | |
329 | [sftp-server.c ssh-add.c sshconnect2.c] | |
330 | fix memory leaks; from dlheine@suif.Stanford.EDU/CLOUSEAU; ok djm@ | |
6cef88bc | 331 | - (djm) One more portable-specific one from dlheine@suif.Stanford.EDU/ |
332 | CLOUSEAU | |
6ecd00f8 | 333 | - (djm) Bug #245: TTY problems on Solaris. Fix by stevesk@ and |
334 | dtucker@zip.com.au | |
21e3ecaf | 335 | - (djm) AIX package builder update from dtucker@zip.com.au |
3e2f2431 | 336 | |
3a082d0a | 337 | 20030225 |
338 | - (djm) Fix some compile errors spotted by dtucker and his fabulous | |
339 | tinderbox | |
340 | ||
b2d033b4 | 341 | 20030224 |
342 | - (djm) Tweak gnome-ssh-askpass2: | |
343 | - Retry kb and mouse grab a couple of times, so passphrase dialog doesn't | |
344 | immediately fail if you are doing something else when it appears (e.g. | |
345 | dragging a window) | |
346 | - Perform server grab after we have the keyboard and/or pointer to avoid | |
347 | races. | |
5f021474 | 348 | - (djm) OpenBSD CVS Sync |
349 | - markus@cvs.openbsd.org 2003/01/27 17:06:31 | |
350 | [sshd.c] | |
351 | more specific error message when /var/empty has wrong permissions; | |
352 | bug #46, map@appgate.com; ok henning@, provos@, stevesk@ | |
bd9f564f | 353 | - markus@cvs.openbsd.org 2003/01/28 16:11:52 |
354 | [scp.1] | |
355 | document -l; pekkas@netcore.fi | |
00019895 | 356 | - stevesk@cvs.openbsd.org 2003/01/28 17:24:51 |
357 | [scp.1] | |
358 | remove example not pertinent with -1 addition; ok markus@ | |
6691e41b | 359 | - jmc@cvs.openbsd.org 2003/01/31 21:54:40 |
360 | [sshd.8] | |
361 | typos; sshd(8): help and ok markus@ | |
362 | help and ok millert@ | |
0ec7661a | 363 | - markus@cvs.openbsd.org 2003/02/02 10:51:13 |
364 | [scp.c] | |
365 | call okname() only when using system(3) for remote-remote copy; | |
366 | fixes bugs #483, #472; ok deraadt@, mouring@ | |
eed8e583 | 367 | - markus@cvs.openbsd.org 2003/02/02 10:56:08 |
368 | [kex.c] | |
369 | add support for key exchange guesses; based on work by | |
370 | avraham.fraenkel@commatch.com; fixes bug #148; ok deraadt@ | |
d6dc3576 | 371 | - markus@cvs.openbsd.org 2003/02/03 08:56:16 |
372 | [sshpty.c] | |
373 | don't call error() for readonly /dev; from soekris list; ok mcbride, | |
374 | henning, deraadt. | |
79cfe67c | 375 | - markus@cvs.openbsd.org 2003/02/04 09:32:08 |
376 | [key.c] | |
377 | better debug3 message | |
6d6c25e3 | 378 | - markus@cvs.openbsd.org 2003/02/04 09:33:22 |
379 | [monitor.c monitor_wrap.c] | |
380 | skey/bsdauth: use 0 to indicate failure instead of -1, because | |
381 | the buffer API only supports unsigned ints. | |
d718e75d | 382 | - markus@cvs.openbsd.org 2003/02/05 09:02:28 |
383 | [readconf.c] | |
384 | simplify ProxyCommand parsing, remove strcat/xrealloc; ok henning@, djm@ | |
381b021b | 385 | - markus@cvs.openbsd.org 2003/02/06 09:26:23 |
386 | [session.c] | |
387 | missing call to setproctitle() after authentication; ok provos@ | |
f78bde70 | 388 | - markus@cvs.openbsd.org 2003/02/06 09:27:29 |
389 | [ssh.c ssh_config.5] | |
390 | support 'ProxyCommand none'; bugzilla #433; binder@arago.de; ok djm@ | |
f2f28f1f | 391 | - markus@cvs.openbsd.org 2003/02/06 09:29:18 |
392 | [sftp-server.c] | |
393 | fix races in rename/symlink; from Tony Finch; ok djm@ | |
5d47f1d4 | 394 | - markus@cvs.openbsd.org 2003/02/06 21:22:43 |
395 | [auth1.c auth2.c] | |
396 | undo broken fix for #387, fixes #486 | |
f7272340 | 397 | - markus@cvs.openbsd.org 2003/02/10 11:51:47 |
398 | [ssh-add.1] | |
399 | xref sshd_config.5 (not sshd.8); mark@summersault.com; bug #490 | |
2a79da70 | 400 | - markus@cvs.openbsd.org 2003/02/12 09:33:04 |
401 | [key.c key.h ssh-dss.c ssh-rsa.c] | |
402 | merge ssh-dss.h ssh-rsa.h into key.h; ok deraadt@ | |
770432dd | 403 | - markus@cvs.openbsd.org 2003/02/12 21:39:50 |
404 | [crc32.c crc32.h] | |
405 | replace crc32.c with a BSD licensed version; noted by David Turner | |
98a58eda | 406 | - markus@cvs.openbsd.org 2003/02/16 17:09:57 |
407 | [kex.c kexdh.c kexgex.c kex.h sshconnect2.c sshd.c ssh-keyscan.c] | |
408 | split kex into client and server code, no need to link | |
409 | server code into the client; ok provos@ | |
92e15201 | 410 | - markus@cvs.openbsd.org 2003/02/16 17:30:33 |
411 | [monitor.c monitor_wrap.c] | |
412 | fix permitrootlogin forced-commands-only for privsep; bux #387; | |
413 | ok provos@ | |
34934506 | 414 | - markus@cvs.openbsd.org 2003/02/21 09:05:53 |
415 | [servconf.c] | |
416 | print sshd_config filename in debug2 mode. | |
98a0a51a | 417 | - mpech@cvs.openbsd.org 2003/02/21 10:34:48 |
418 | [auth-krb4.c] | |
419 | ...sizeof(&adat.session) is not good here. | |
420 | henning@, deraadt@, millert@ | |
bb102e8e | 421 | - (djm) Add new object files to Makefile and reorder |
4a35ae8b | 422 | - (djm) Bug #501: gai_strerror should return char*; |
423 | fix from dtucker@zip.com.au | |
2731632a | 424 | - (djm) Most of Bug #499: Cygwin compile fixes for new progressmeter; |
425 | From vinschen@redhat.com | |
2d0c443a | 426 | - (djm) Rest of Bug #499: Import a basename() function from OpenBSD libc |
2731632a | 427 | - (djm) Bug #494: Allow multiple accounts on Windows 9x/Me; |
428 | From vinschen@redhat.com | |
19160674 | 429 | - (djm) Bug #456: Support for NEC SX6 with Unicos; from wendyp@cray.com |
b2d033b4 | 430 | |
a52997bd | 431 | 20030211 |
432 | - (djm) Cygwin needs libcrypt too. Patch from vinschen@redhat.com | |
433 | ||
ecc03386 | 434 | 20030206 |
435 | - (djm) Teach fake-getaddrinfo to use getservbyname() when provided a | |
436 | string service name. Suggested by markus@, review by itojun@ | |
437 | ||
ad137007 | 438 | 20030131 |
439 | - (bal) AIX 4.2.1 lacks nanosleep(). Patch to use nsleep() provided by | |
440 | dtucker@zip.com.au | |
441 | ||
63ba3638 | 442 | 20030130 |
443 | - (djm) Unbreak root password auth. Spotted by dtucker@zip.com.au | |
444 | ||
92b1decf | 445 | 200301028 |
446 | - (djm) Search libposix4 and librt for nanosleep. From dtucker@zip.com.au | |
447 | and openssh-unix-dev@thewrittenword.com | |
448 | ||
96e85e17 | 449 | 200301027 |
450 | - (bal) Bugzilla 477 patch by wendyp@cray.com. Define TIOCGPGRP for | |
451 | cray. Also removed test for tcgetpgrp in configure.ac since it | |
452 | is no longer used. | |
453 | ||
1be697b6 | 454 | 20030124 |
455 | - (djm) OpenBSD CVS Sync | |
456 | - jmc@cvs.openbsd.org 2003/01/23 08:58:47 | |
457 | [sshd_config.5] | |
458 | typos; ok millert@ | |
c4087616 | 459 | - markus@cvs.openbsd.org 2003/01/23 13:50:27 |
460 | [authfd.c authfd.h readpass.c ssh-add.1 ssh-add.c ssh-agent.c] | |
461 | ssh-add -c, prompt user for confirmation (using ssh-askpass) when | |
462 | private agent key is used; with djm@; test by dugsong@, djm@; | |
463 | ok deraadt@ | |
6ea3c52a | 464 | - markus@cvs.openbsd.org 2003/01/23 14:01:53 |
465 | [scp.c] | |
466 | bandwidth limitation patch (scp -l) from niels@; ok todd@, deraadt@ | |
e6b15f23 | 467 | - markus@cvs.openbsd.org 2003/01/23 14:06:15 |
468 | [scp.1 scp.c] | |
469 | scp -12; Sam Smith and others; ok provos@, deraadt@ | |
c7578bb6 | 470 | - (djm) Add TIMEVAL_TO_TIMESPEC macros |
1be697b6 | 471 | |
0df3cb2b | 472 | 20030123 |
473 | - (djm) OpenBSD CVS Sync | |
474 | - djm@cvs.openbsd.org 2003/01/23 00:03:00 | |
475 | [auth1.c] | |
476 | Don't log TIS auth response; "get rid of it" - markus@ | |
477 | ||
494b267f | 478 | 20030122 |
479 | - (djm) OpenBSD CVS Sync | |
480 | - marc@cvs.openbsd.org 2003/01/21 18:14:36 | |
481 | [ssh-agent.1 ssh-agent.c] | |
482 | Add a -t life option to ssh-agent that set the default lifetime. | |
483 | The default can still be overriden by using -t in ssh-add. | |
484 | OK markus@ | |
882a3870 | 485 | - (djm) Reorganise PAM & SIA password handling to eliminate some common code |
8582624b | 486 | - (djm) Sync regress with OpenBSD -current |
494b267f | 487 | |
877c5ea2 | 488 | 20030120 |
489 | - (djm) Fix compilation for NetBSD from dtucker@zip.com.au | |
115dc20f | 490 | - (tim) [progressmeter.c] make compilers without long long happy. |
21710e39 | 491 | - (tim) [configure.ac] Add -belf to build ELF binaries on OpenServer 5 when |
492 | using cc. (gcc already did) | |
877c5ea2 | 493 | |
5ed5468f | 494 | 20030118 |
495 | - (djm) Revert fix for Bug #442 for now. | |
496 | ||
9e2b44f5 | 497 | 20030117 |
498 | - (djm) Bug #470: Detect strnvis, not strvis in configure. | |
499 | From d_wllms@lanl.gov | |
500 | ||
280806cf | 501 | 20030116 |
502 | - (djm) OpenBSD CVS Sync | |
503 | - djm@cvs.openbsd.org 2003/01/16 03:41:55 | |
504 | [sftp-int.c] | |
505 | explicitly use first glob result | |
506 | ||
33364f27 | 507 | 20030114 |
508 | - (djm) OpenBSD CVS Sync | |
509 | - fgsch@cvs.openbsd.org 2003/01/10 23:23:24 | |
510 | [sftp-int.c] | |
511 | typo; from Nils Nordman <nino at nforced dot com>. | |
083d2e97 | 512 | - markus@cvs.openbsd.org 2003/01/11 18:29:43 |
513 | [log.c] | |
514 | set fatal_cleanups to NULL in fatal_remove_all_cleanups(); | |
515 | dtucker@zip.com.au | |
b7fd001f | 516 | - markus@cvs.openbsd.org 2003/01/12 16:57:02 |
517 | [progressmeter.c] | |
518 | allow WARNINGS=yes; ok djm@ | |
c1e07c81 | 519 | - djm@cvs.openbsd.org 2003/01/13 11:04:04 |
520 | [sftp-int.c] | |
521 | make cmds[] array static to avoid conflict with BSDI libc. | |
209d3126 | 522 | mindrot bug #466. Fix from mdev@idg.nl; ok markus@ |
538840a2 | 523 | - djm@cvs.openbsd.org 2003/01/14 10:58:00 |
524 | [sftp-client.c sftp-int.c] | |
525 | Don't try to upload or download non-regular files. Report from | |
526 | apoloval@pantuflo.escet.urjc.es; ok markus@ | |
33364f27 | 527 | |
528 | 20030113 | |
e80fb2a0 | 529 | - (djm) Rework openbsd-compat/setproctitle.c a bit: move emulation type |
530 | detection to configure.ac. Prompted by stevesk@ | |
65a4b4af | 531 | - (djm) Bug #467: Add a --disable-strip option to turn off stripping of |
532 | installed binaries. From mdev@idg.nl | |
e80fb2a0 | 533 | |
d0104542 | 534 | 20030110 |
535 | - (djm) Enable new setproctitle emulation for Linux, AIX and HP/UX. More | |
536 | systems may be added later. | |
9a36208d | 537 | - (djm) OpenBSD CVS Sync |
538 | - djm@cvs.openbsd.org 2003/01/08 23:53:26 | |
539 | [sftp.1 sftp.c sftp-int.c sftp-int.h] | |
540 | Cleanup error handling for batchmode | |
541 | Allow blank lines and comments in input | |
542 | Ability to suppress abort on error in batchmode ("-put blah") | |
543 | Fixes mindrot bug #452; markus@ ok | |
b65c3807 | 544 | - fgsch@cvs.openbsd.org 2003/01/10 08:19:07 |
c9c38b73 | 545 | [scp.c sftp.1 sftp.c sftp-client.c sftp-int.c progressmeter.c] |
546 | [progressmeter.h] | |
b65c3807 | 547 | sftp progress meter support. |
548 | original diffs by Nils Nordman <nino at nforced dot com> via | |
549 | markus@, merged to -current by me, djm@ ok. | |
bf0bf24b | 550 | - djm@cvs.openbsd.org 2003/01/10 08:48:15 |
551 | [sftp-client.c] | |
552 | Simplify and avoid redundancy in packet send and receive | |
553 | functions; ok fgs@ | |
25a6efd8 | 554 | - djm@cvs.openbsd.org 2003/01/10 10:29:35 |
555 | [scp.c] | |
556 | Don't ftruncate after write error, creating sparse files of | |
557 | incorrect length | |
558 | mindrot bug #403, reported by rusr@cup.hp.com; ok markus@ | |
4940c411 | 559 | - djm@cvs.openbsd.org 2003/01/10 10:32:54 |
560 | [channels.c] | |
561 | hush socket() errors, except last. Fixes mindrot bug #408; ok markus@ | |
d0104542 | 562 | |
7bb526ce | 563 | 20030108 |
564 | - (djm) Sync openbsd-compat/ with OpenBSD -current | |
93c63b8d | 565 | - (djm) Avoid redundant xstrdup/xfree in auth2-pam.c. From Solar via markus@ |
faa483fa | 566 | - (djm) OpenBSD CVS Sync |
567 | - markus@cvs.openbsd.org 2003/01/01 18:08:52 | |
568 | [channels.c] | |
569 | move big output buffer messages to debug2 | |
bfd934b9 | 570 | - djm@cvs.openbsd.org 2003/01/06 23:51:22 |
571 | [sftp-client.c] | |
572 | Fix "get -p" download to not add user-write perm. mindrot bug #426 | |
573 | reported by gfernandez@livevault.com; ok markus@ | |
048ff12c | 574 | - fgsch@cvs.openbsd.org 2003/01/07 23:42:54 |
575 | [sftp.1] | |
576 | add version; from Nils Nordman <nino at nforced dot com> via markus@. | |
577 | markus@ ok | |
c9c462e4 | 578 | - (djm) Update README to reflect AIX's status as a well supported platform. |
579 | From dtucker@zip.com.au | |
c3690df3 | 580 | - (tim) [Makefile.in configure.ac] replace fixpath with sed script. Patch |
a2144d93 | 581 | by Mo DeJong. |
ad0279ff | 582 | - (tim) [auth.c] declare today at top of allowed_user() to keep |
583 | older compilers happy. | |
a2144d93 | 584 | - (tim) [scp.c] make compilers without long long happy. |
7bb526ce | 585 | |
e7ccd20d | 586 | 20030107 |
587 | - (djm) Bug #401: Work around Linux breakage with IPv6 mapped addresses. | |
588 | Based on fix from yoshfuji@linux-ipv6.org | |
e2ef2342 | 589 | - (djm) Bug #442: Check for and deny access to accounts with locked |
590 | passwords. Patch from dtucker@zip.com.au | |
41b7cf42 | 591 | - (djm) Bug #44: Use local mkstemp() rather than glibc's silly one. Fixes |
70e7d0b0 | 592 | Can't pass KRB4 TGT passing. Fix from: jan.iven@cern.ch |
93a9a35a | 593 | - (djm) Fix Bug #442 for PAM case |
ed05a983 | 594 | - (djm) Bug #110: bogus error messages in lastlog_get_entry(). Fix based |
595 | on one by peak@argo.troja.mff.cuni.cz | |
63cada0a | 596 | - (djm) Bug #111: Run syslog and stderr logging through strnvis to eliminate |
597 | nasties. Report from peak@argo.troja.mff.cuni.cz | |
99f4fb69 | 598 | - (djm) Bug #178: On AIX /etc/nologin wasnt't shown to users. Fix from |
599 | Ralf.Wenk@fh-karlsruhe.de and dtucker@zip.com.au | |
b57c8e20 | 600 | - (djm) Fix my fix of the fix for the Bug #442 for PAM case. Spotted by |
601 | dtucker@zip.com.au. Reorder for clarity too. | |
e7ccd20d | 602 | |
9300be60 | 603 | 20030103 |
604 | - (djm) Bug #461: ssh-copy-id fails with no arguments. Patch from | |
605 | cjwatson@debian.org | |
9746ee4b | 606 | - (djm) Bug #460: Filling utmp[x]->ut_addr_v6 if present. Patch from |
607 | cjwatson@debian.org | |
17ed08c5 | 608 | - (djm) Bug #446: Set LOGIN env var to pw_name on AIX. Patch from |
609 | mii@ornl.gov | |
610 | ||
d4ac26ed | 611 | 20030101 |
612 | - (stevesk) [session.c sshlogin.c sshlogin.h] complete portable | |
613 | parts of pass addrlen with sockaddr * fix. | |
614 | from Hajimu UMEMOTO <ume@FreeBSD.org> | |
615 | ||
378d9956 | 616 | 20021222 |
617 | - (bal) OpenBSD CVS Sync | |
618 | - fgsch@cvs.openbsd.org 2002/11/15 10:03:09 | |
619 | [authfile.c] | |
620 | lseek(2) may return -1 when getting the public/private key lenght. | |
621 | Simplify the code and check for errors using fstat(2). | |
622 | ||
623 | Problem reported by Mauricio Sanchez, markus@ ok. | |
3c93c917 | 624 | - markus@cvs.openbsd.org 2002/11/18 16:43:44 |
625 | [clientloop.c] | |
626 | don't overwrite SIG{INT,QUIT,TERM} handler if set to SIG_IGN; | |
627 | e.g. if ssh is used for backup; report Joerg Schilling; ok millert@ | |
35efb24c | 628 | - markus@cvs.openbsd.org 2002/11/21 22:22:50 |
629 | [dh.c] | |
630 | debug->debug2 | |
a77673cc | 631 | - markus@cvs.openbsd.org 2002/11/21 22:45:31 |
632 | [cipher.c kex.c packet.c sshconnect.c sshconnect2.c] | |
633 | debug->debug2, unify debug messages | |
b77a87e5 | 634 | - deraadt@cvs.openbsd.org 2002/11/21 23:03:51 |
635 | [auth-krb5.c auth1.c hostfile.h monitor_wrap.c sftp-client.c sftp-int.c ssh-add.c ssh-rsa.c | |
636 | sshconnect.c] | |
637 | KNF | |
556f1c05 | 638 | - markus@cvs.openbsd.org 2002/11/21 23:04:33 |
83bbc162 | 639 | [ssh.c] |
640 | debug->debug2 | |
556f1c05 | 641 | - stevesk@cvs.openbsd.org 2002/11/24 21:46:24 |
eef52fa7 | 642 | [ssh-keysign.8] |
643 | typo: "the the" | |
6d58d81e | 644 | - wcobb@cvs.openbsd.org 2002/11/26 00:45:03 |
645 | [scp.c ssh-keygen.c] | |
646 | Remove unnecessary fflush(stderr) calls, stderr is unbuffered by default. | |
647 | ok markus@ | |
556f1c05 | 648 | - stevesk@cvs.openbsd.org 2002/11/26 02:35:30 |
63baa058 | 649 | [ssh-keygen.1] |
650 | remove outdated statement; ok markus@ deraadt@ | |
649bb60b | 651 | - stevesk@cvs.openbsd.org 2002/11/26 02:38:54 |
652 | [canohost.c] | |
653 | KNF, comment and error message repair; ok markus@ | |
15748b4d | 654 | - markus@cvs.openbsd.org 2002/11/27 17:53:35 |
655 | [scp.c sftp.c ssh.c] | |
656 | allow usernames with embedded '@', e.g. scp user@vhost@realhost:file /tmp; | |
657 | http://bugzilla.mindrot.org/show_bug.cgi?id=447; ok mouring@, millert@ | |
fe661d8f | 658 | - stevesk@cvs.openbsd.org 2002/12/04 04:36:47 |
659 | [session.c] | |
660 | remove xauth entries before add; PR 2994 from janjaap@stack.nl. | |
661 | ok markus@ | |
a0a14bcd | 662 | - markus@cvs.openbsd.org 2002/12/05 11:08:35 |
663 | [scp.c] | |
664 | use roundup() similar to rcp/util.c and avoid problems with strange | |
665 | filesystem block sizes, noted by tjr@freebsd.org; ok djm@ | |
556f1c05 | 666 | - djm@cvs.openbsd.org 2002/12/06 05:20:02 |
2ea16b0b | 667 | [sftp.1] |
668 | Fix cut'n'paste error, spotted by matthias.riese@b-novative.de; ok deraadt@ | |
978ebf99 | 669 | - millert@cvs.openbsd.org 2002/12/09 16:50:30 |
670 | [ssh.c] | |
671 | Avoid setting optind to 0 as GNU getopt treats that like we do optreset. | |
672 | markus@ OK | |
32214c88 | 673 | - markus@cvs.openbsd.org 2002/12/10 08:56:00 |
674 | [session.c] | |
675 | Make sure $SHELL points to the shell from the password file, even if shell | |
676 | is overridden from login.conf; bug#453; semen at online.sinor.ru; ok millert@ | |
48f636b2 | 677 | - markus@cvs.openbsd.org 2002/12/10 19:26:50 |
678 | [packet.c] | |
679 | move tos handling to packet_set_tos; ok provos/henning/deraadt | |
9e637910 | 680 | - markus@cvs.openbsd.org 2002/12/10 19:47:14 |
681 | [packet.c] | |
682 | static | |
6226a8f8 | 683 | - markus@cvs.openbsd.org 2002/12/13 10:03:15 |
684 | [channels.c misc.c sshconnect2.c] | |
685 | cleanup debug messages, more useful information for the client user. | |
556f1c05 | 686 | - markus@cvs.openbsd.org 2002/12/13 15:20:52 |
687 | [scp.c] | |
688 | 1) include stalling time in total time | |
689 | 2) truncate filenames to 45 instead of 20 characters | |
690 | 3) print rate instead of progress bar, no more stars | |
691 | 4) scale output to tty width | |
692 | based on a patch from Niels; ok fries@ lebel@ fgs@ millert@ | |
3075ac59 | 693 | - (bal) [msg.c msg.h scp.c ssh-keysign.c sshconnect2.c] Resync CVS IDs since |
694 | we already did s/msg_send/ssh_msg_send/ | |
378d9956 | 695 | |
a76550cf | 696 | 20021205 |
697 | - (djm) PERL-free fixpaths from stuge-openssh-unix-dev@cdy.org | |
698 | ||
d9a4e55b | 699 | 20021122 |
700 | - (tim) [configure.ac] fix STDPATH test for IRIX. First reported by | |
701 | advax@triumf.ca. This type of solution tested by <herb@sgi.com> | |
702 | ||
f825dbf4 | 703 | 20021113 |
704 | - (tim) [configure.ac] remove unused variables no_libsocket and no_libnsl | |
705 | ||
17d429bb | 706 | 20021111 |
707 | - (tim) [contrib/solaris/opensshd.in] add umask 022 so sshd.pid is | |
708 | not world writable. | |
709 | ||
c9826b28 | 710 | 20021109 |
711 | - (bal) OpenBSD CVS Sync | |
712 | - itojun@cvs.openbsd.org 2002/10/16 14:31:48 | |
713 | [sftp-common.c] | |
714 | 64bit pedant. %llu is "unsigned long long". markus ok | |
2fe3c2db | 715 | - markus@cvs.openbsd.org 2002/10/23 10:32:13 |
716 | [packet.c] | |
717 | use %u for u_int | |
358b576b | 718 | - markus@cvs.openbsd.org 2002/10/23 10:40:16 |
719 | [bufaux.c] | |
720 | %u for u_int | |
f6f02456 | 721 | - markus@cvs.openbsd.org 2002/11/04 10:07:53 |
722 | [auth.c] | |
723 | don't compare against pw_home if realpath fails for pw_home (seen | |
724 | on AFS); ok djm@ | |
2ccb7bde | 725 | - markus@cvs.openbsd.org 2002/11/04 10:09:51 |
726 | [packet.c] | |
727 | log before send disconnect; ok djm@ | |
39e71188 | 728 | - markus@cvs.openbsd.org 2002/11/05 19:45:20 |
729 | [monitor.c] | |
730 | handle overflows for size_t larger than u_int; siw@goneko.de, bug #425 | |
9db1a8e9 | 731 | - markus@cvs.openbsd.org 2002/11/05 20:10:37 |
732 | [sftp-client.c] | |
733 | typo; GaryF@livevault.com | |
51efad8c | 734 | - markus@cvs.openbsd.org 2002/11/07 16:28:47 |
735 | [sshd.c] | |
736 | log to stderr if -ie is given, bug #414, prj@po.cwru.edu | |
cc46e2ee | 737 | - markus@cvs.openbsd.org 2002/11/07 22:08:07 |
738 | [readconf.c readconf.h ssh-keysign.8 ssh-keysign.c] | |
739 | we cannot use HostbasedAuthentication for enabling ssh-keysign(8), | |
740 | because HostbasedAuthentication might be enabled based on the | |
741 | target host and ssh-keysign(8) does not know the remote hostname | |
742 | and not trust ssh(1) about the hostname, so we add a new option | |
743 | EnableSSHKeysign; ok djm@, report from zierke@informatik.uni-hamburg.de | |
252d1a24 | 744 | - markus@cvs.openbsd.org 2002/11/07 22:35:38 |
745 | [scp.c] | |
746 | check exit status from ssh, and exit(1) if ssh fails; bug#369; | |
747 | binder@arago.de | |
f00addc9 | 748 | - (bal) Update ssh-host-config and minor rewrite of bsd-cygwin_util.c |
749 | ntsec now default if cygwin version beginning w/ version 56. Patch | |
750 | by Corinna Vinschen <vinschen@redhat.com> | |
819d3f09 | 751 | - (bal) AIX does not log login attempts for unknown users (bug #432). |
752 | patch by dtucker@zip.com.au | |
c9826b28 | 753 | |
4e6f1c4f | 754 | 20021021 |
f0e27f3d | 755 | - (djm) Bug #400: Kill ssh-rand-helper children on timeout, patch from |
756 | dtucker@zip.com.au | |
cacd2e7a | 757 | - (djm) Bug #317: FreeBSD needs libutil.h for openpty() Report from |
758 | dirk.meyer@dinoex.sub.org | |
4e6f1c4f | 759 | |
f3e87063 | 760 | 20021015 |
761 | - (bal) Fix bug id 383 and only call loginrestrict for AIX if not root. | |
08412d26 | 762 | - (bal) More advanced strsep test by Darren Tucker <dtucker@zip.com.au> |
f3e87063 | 763 | |
57872969 | 764 | 20021015 |
765 | - (tim) [contrib/caldera/openssh.spec] make ssh-agent setgid nobody | |
766 | ||
6af8f131 | 767 | 20021004 |
768 | - (bal) Disable post-authentication Privsep for OSF/1. It conflicts with | |
769 | SIA. | |
770 | ||
e139021d | 771 | 20021003 |
772 | - (djm) OpenBSD CVS Sync | |
773 | - markus@cvs.openbsd.org 2002/10/01 20:34:12 | |
774 | [ssh-agent.c] | |
775 | allow root to access the agent, since there is no protection from root. | |
886cd2bb | 776 | - markus@cvs.openbsd.org 2002/10/01 13:24:50 |
777 | [version.h] | |
778 | OpenSSH 3.5 | |
0855868a | 779 | - (djm) Bump RPM spec version numbers |
e987fdbe | 780 | - (djm) Bug #406: s/msg_send/ssh_msg_send/ for Mac OS X 1.2 |
e139021d | 781 | |
1d677676 | 782 | 20020930 |
9a87e2ac | 783 | - (djm) Tidy contrib/, add Makefile for GNOME passphrase dialogs, |
784 | tweak README | |
785 | - (djm) OpenBSD CVS Sync | |
786 | - mickey@cvs.openbsd.org 2002/09/27 10:42:09 | |
787 | [compat.c compat.h sshd.c] | |
788 | add a generic match for a prober, such as sie big brother; | |
789 | idea from stevesk@; markus@ ok | |
05960cf0 | 790 | - stevesk@cvs.openbsd.org 2002/09/27 15:46:21 |
791 | [ssh.1] | |
792 | clarify compression level protocol 1 only; ok markus@ deraadt@ | |
1d677676 | 793 | |
0d3d0e82 | 794 | 20020927 |
795 | - (djm) OpenBSD CVS Sync | |
796 | - markus@cvs.openbsd.org 2002/09/25 11:17:16 | |
797 | [sshd_config] | |
798 | sync LoginGraceTime with default | |
26b9a3d2 | 799 | - markus@cvs.openbsd.org 2002/09/25 15:19:02 |
800 | [sshd.c] | |
801 | typo; pilot@monkey.org | |
2db9d8aa | 802 | - markus@cvs.openbsd.org 2002/09/26 11:38:43 |
803 | [auth1.c auth.h auth-krb4.c monitor.c monitor.h monitor_wrap.c] | |
804 | [monitor_wrap.h] | |
805 | krb4 + privsep; ok dugsong@, deraadt@ | |
0d3d0e82 | 806 | |
b7c4a4cc | 807 | 20020925 |
808 | - (bal) Fix issue where successfull login does not clear failure counts | |
809 | in AIX. Patch by dtucker@zip.com.au ok by djm | |
ef51930f | 810 | - (tim) Cray fixes (bug 367) based on patch from Wendy Palm @ cray. |
811 | This does not include the deattack.c fixes. | |
b7c4a4cc | 812 | |
99443922 | 813 | 20020923 |
814 | - (djm) OpenBSD CVS Sync | |
815 | - stevesk@cvs.openbsd.org 2002/09/23 20:46:27 | |
816 | [canohost.c] | |
817 | change get_peer_ipaddr() and get_local_ipaddr() to not return NULL for | |
818 | non-sockets; fixes a problem passing NULL to snprintf(). ok markus@ | |
0082ad34 | 819 | - markus@cvs.openbsd.org 2002/09/23 22:11:05 |
820 | [monitor.c] | |
821 | only call auth_krb5 if kerberos is enabled; ok deraadt@ | |
4741e3a6 | 822 | - markus@cvs.openbsd.org 2002/09/24 08:46:04 |
823 | [monitor.c] | |
824 | only call kerberos code for authctxt->valid | |
cb11b555 | 825 | - todd@cvs.openbsd.org 2002/09/24 20:59:44 |
826 | [sshd.8] | |
827 | tweak the example $HOME/.ssh/rc script to not show on any cmdline the | |
828 | sensitive data it handles. This fixes bug # 402 as reported by | |
829 | kolya@mit.edu (Nickolai Zeldovich). | |
830 | ok markus@ and stevesk@ | |
99443922 | 831 | |
aec4cb4f | 832 | 20020923 |
833 | - (tim) [configure.ac] s/return/exit/ patch by dtucker@zip.com.au | |
834 | ||
f86b0eef | 835 | 20020922 |
836 | - (djm) OpenBSD CVS Sync | |
837 | - stevesk@cvs.openbsd.org 2002/09/19 14:53:14 | |
838 | [compat.c] | |
c7724abb | 839 | - markus@cvs.openbsd.org 2002/09/19 15:51:23 |
840 | [ssh-add.c] | |
841 | typo; cd@kalkatraz.de | |
00e842d8 | 842 | - stevesk@cvs.openbsd.org 2002/09/19 16:03:15 |
843 | [serverloop.c] | |
844 | log IP address also; ok markus@ | |
c2802d92 | 845 | - stevesk@cvs.openbsd.org 2002/09/20 18:41:29 |
846 | [auth.c] | |
847 | log illegal user here for missing privsep case (ssh2). | |
848 | this is executed in the monitor. ok markus@ | |
f86b0eef | 849 | |
792e7d2d | 850 | 20020919 |
851 | - (djm) OpenBSD CVS Sync | |
852 | - stevesk@cvs.openbsd.org 2002/09/12 19:11:52 | |
853 | [ssh-agent.c] | |
854 | %u for uid print; ok markus@ | |
da0561eb | 855 | - stevesk@cvs.openbsd.org 2002/09/12 19:50:36 |
856 | [session.c ssh.1] | |
857 | add SSH_CONNECTION and deprecate SSH_CLIENT; bug #384. ok markus@ | |
facfd613 | 858 | - stevesk@cvs.openbsd.org 2002/09/13 19:23:09 |
859 | [channels.c sshconnect.c sshd.c] | |
860 | remove use of SO_LINGER, it should not be needed. error check | |
861 | SO_REUSEADDR. fixup comments. ok markus@ | |
8bd4e2ae | 862 | - stevesk@cvs.openbsd.org 2002/09/16 19:55:33 |
863 | [session.c] | |
864 | log when _PATH_NOLOGIN exists; ok markus@ | |
e6fe1bab | 865 | - stevesk@cvs.openbsd.org 2002/09/16 20:12:11 |
866 | [sshd_config.5] | |
867 | more details on X11Forwarding security issues and threats; ok markus@ | |
f1dcc34e | 868 | - stevesk@cvs.openbsd.org 2002/09/16 22:03:13 |
869 | [sshd.8] | |
870 | reference moduli(5) in FILES /etc/moduli. | |
5c0d0e90 | 871 | - itojun@cvs.openbsd.org 2002/09/17 07:47:02 |
872 | [channels.c] | |
873 | don't quit while creating X11 listening socket. | |
874 | http://mail-index.netbsd.org/current-users/2002/09/16/0005.html | |
875 | got from portable. markus ok | |
6939bbd4 | 876 | - djm@cvs.openbsd.org 2002/09/19 01:58:18 |
877 | [ssh.c sshconnect.c] | |
878 | bugzilla.mindrot.org #223 - ProxyCommands don't exit. | |
879 | Patch from dtucker@zip.com.au; ok markus@ | |
792e7d2d | 880 | |
4f3834e8 | 881 | 20020912 |
eee2215e | 882 | - (djm) Made GNOME askpass programs return non-zero if cancel button is |
883 | pressed. | |
10a560d4 | 884 | - (djm) Added getpeereid() replacement. Properly implemented for systems |
885 | with SO_PEERCRED support. Faked for systems which lack it. | |
9fd2a215 | 886 | - (djm) Sync sys/tree.h with OpenBSD -current. Rename tree.h and |
887 | fake-queue.h to sys-tree.h and sys-queue.h | |
4f3834e8 | 888 | - (djm) OpenBSD CVS Sync |
889 | - markus@cvs.openbsd.org 2002/09/08 20:24:08 | |
890 | [hostfile.h] | |
891 | no comma at end of enumerator list | |
696f6bef | 892 | - itojun@cvs.openbsd.org 2002/09/09 06:48:06 |
893 | [auth1.c auth.h auth-krb5.c monitor.c monitor.h] | |
894 | [monitor_wrap.c monitor_wrap.h] | |
895 | kerberos support for privsep. confirmed to work by lha@stacken.kth.se | |
896 | patch from markus | |
661e45a0 | 897 | - markus@cvs.openbsd.org 2002/09/09 14:54:15 |
898 | [channels.c kex.h key.c monitor.c monitor_wrap.c radix.c uuencode.c] | |
899 | signed vs unsigned from -pedantic; ok henning@ | |
87f4111f | 900 | - markus@cvs.openbsd.org 2002/09/10 20:24:47 |
901 | [ssh-agent.c] | |
902 | check the euid of the connecting process with getpeereid(2); | |
903 | ok provos deraadt stevesk | |
07d688d5 | 904 | - stevesk@cvs.openbsd.org 2002/09/11 17:55:03 |
905 | [ssh.1] | |
906 | add agent and X11 forwarding warning text from ssh_config.5; ok markus@ | |
8b10e20e | 907 | - stevesk@cvs.openbsd.org 2002/09/11 18:27:26 |
908 | [authfd.c authfd.h ssh.c] | |
909 | don't connect to agent to test for presence if we've previously | |
910 | connected; ok markus@ | |
00b3ad3e | 911 | - djm@cvs.openbsd.org 2002/09/11 22:41:50 |
912 | [sftp.1 sftp-client.c sftp-client.h sftp-common.c sftp-common.h] | |
913 | [sftp-glob.c sftp-glob.h sftp-int.c sftp-server.c] | |
914 | support for short/long listings and globbing in "ls"; ok markus@ | |
be0cd512 | 915 | - djm@cvs.openbsd.org 2002/09/12 00:13:06 |
916 | [sftp-int.c] | |
917 | zap unused var introduced in last commit | |
4f3834e8 | 918 | |
ac8802eb | 919 | 20020911 |
920 | - (djm) Sync openbsd-compat with OpenBSD -current | |
921 | ||
e2e36358 | 922 | 20020910 |
923 | - (djm) Bug #365: Read /.ssh/environment properly under CygWin. | |
924 | Patch from Mark Bradshaw <bradshaw@staff.crosswalk.com> | |
35c4faf5 | 925 | - (djm) Bug #138: Make protocol 1 blowfish work with old OpenSSL. |
926 | Patch from Robert Halubek <rob@adso.com.pl> | |
e2e36358 | 927 | |
3445ca02 | 928 | 20020905 |
929 | - (djm) OpenBSD CVS Sync | |
930 | - stevesk@cvs.openbsd.org 2002/09/04 18:52:42 | |
931 | [servconf.c sshd.8 sshd_config.5] | |
932 | default LoginGraceTime to 2m; 1m may be too short for slow systems. | |
933 | ok markus@ | |
cbecf1ed | 934 | - (djm) Merge openssh-TODO.patch from Redhat (null) beta |
c4ee4c60 | 935 | - (djm) Add gnome-ssh-askpass2.c (gtk2) by merge with patch from |
936 | Nalin Dahyabhai <nalin@redhat.com> | |
3c1dff28 | 937 | - (djm) Add support for building gtk2 password requestor from Redhat beta |
3445ca02 | 938 | |
954640a4 | 939 | 20020903 |
33e2e066 | 940 | - (djm) Patch from itojun@ for Darwin OS: test getaddrinfo, reorder libcrypt |
e18b7d35 | 941 | - (djm) Fix Redhat RPM build dependancy test |
954640a4 | 942 | - (djm) OpenBSD CVS Sync |
943 | - markus@cvs.openbsd.org 2002/08/12 10:46:35 | |
944 | [ssh-agent.c] | |
945 | make ssh-agent setgid, disallow ptrace. | |
755c4339 | 946 | - espie@cvs.openbsd.org 2002/08/21 11:20:59 |
947 | [sshd.8] | |
948 | `RSA' updated to refer to `public key', where it matters. | |
949 | okay markus@ | |
6e0fbda1 | 950 | - stevesk@cvs.openbsd.org 2002/08/21 19:38:06 |
951 | [servconf.c sshd.8 sshd_config sshd_config.5] | |
952 | change LoginGraceTime default to 1 minute; ok mouring@ markus@ | |
00e41835 | 953 | - stevesk@cvs.openbsd.org 2002/08/21 20:10:28 |
954 | [ssh-agent.c] | |
955 | raise listen backlog; ok markus@ | |
c1a4eef1 | 956 | - stevesk@cvs.openbsd.org 2002/08/22 19:27:53 |
957 | [ssh-agent.c] | |
958 | use common close function; ok markus@ | |
1d77f8cb | 959 | - stevesk@cvs.openbsd.org 2002/08/22 19:38:42 |
960 | [clientloop.c] | |
961 | format with current EscapeChar; bugzilla #388 from wknox@mitre.org. | |
962 | ok markus@ | |
f34ec885 | 963 | - stevesk@cvs.openbsd.org 2002/08/22 20:57:19 |
964 | [ssh-agent.c] | |
965 | shutdown(SHUT_RDWR) not needed before close here; ok markus@ | |
848bf884 | 966 | - markus@cvs.openbsd.org 2002/08/22 21:33:58 |
967 | [auth1.c auth2.c] | |
968 | auth_root_allowed() is handled by the monitor in the privsep case, | |
969 | so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325 | |
6c723e7c | 970 | - markus@cvs.openbsd.org 2002/08/22 21:45:41 |
971 | [session.c] | |
972 | send signal name (not signal number) in "exit-signal" message; noticed | |
973 | by galb@vandyke.com | |
b41baf4d | 974 | - stevesk@cvs.openbsd.org 2002/08/27 17:13:56 |
975 | [ssh-rsa.c] | |
976 | RSA_public_decrypt() returns -1 on error so len must be signed; | |
977 | ok markus@ | |
dbcdea68 | 978 | - stevesk@cvs.openbsd.org 2002/08/27 17:18:40 |
979 | [ssh_config.5] | |
980 | some warning text for ForwardAgent and ForwardX11; ok markus@ | |
ba1566dd | 981 | - stevesk@cvs.openbsd.org 2002/08/29 15:57:25 |
982 | [monitor.c session.c sshlogin.c sshlogin.h] | |
983 | pass addrlen with sockaddr *; from Hajimu UMEMOTO <ume@FreeBSD.org> | |
984 | NOTE: there are also p-specific parts to this patch. ok markus@ | |
e59404d1 | 985 | - stevesk@cvs.openbsd.org 2002/08/29 16:02:54 |
986 | [ssh.1 ssh.c] | |
987 | deprecate -P as UsePrivilegedPort defaults to no now; ok markus@ | |
878b8992 | 988 | - stevesk@cvs.openbsd.org 2002/08/29 16:09:02 |
989 | [ssh_config.5] | |
990 | more on UsePrivilegedPort and setuid root; ok markus@ | |
9f324470 | 991 | - stevesk@cvs.openbsd.org 2002/08/29 19:49:42 |
992 | [ssh.c] | |
993 | shrink initial privilege bracket for setuid case; ok markus@ | |
57ff5eeb | 994 | - stevesk@cvs.openbsd.org 2002/08/29 22:54:10 |
995 | [ssh_config.5 sshd_config.5] | |
996 | state XAuthLocation is a full pathname | |
954640a4 | 997 | |
b85698ab | 998 | 20020820 |
999 | - OpenBSD CVS Sync | |
1000 | - millert@cvs.openbsd.org 2002/08/02 14:43:15 | |
1001 | [monitor.c monitor_mm.c] | |
1002 | Change mm_zalloc() sanity checks to be more in line with what | |
1003 | we do in calloc() and add a check to monitor_mm.c. | |
1004 | OK provos@ and markus@ | |
6a342527 | 1005 | - marc@cvs.openbsd.org 2002/08/02 16:00:07 |
1006 | [ssh.1 sshd.8] | |
1007 | note that .ssh/environment is only read when | |
1008 | allowed (PermitUserEnvironment in sshd_config). | |
1009 | OK markus@ | |
4004c2ac | 1010 | - markus@cvs.openbsd.org 2002/08/02 21:23:41 |
1011 | [ssh-rsa.c] | |
1012 | diff is u_int (2x); ok deraadt/provos | |
0caf874a | 1013 | - markus@cvs.openbsd.org 2002/08/02 22:20:30 |
1014 | [ssh-rsa.c] | |
1015 | replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser | |
1016 | for authentication; ok deraadt/djm | |
75cf7563 | 1017 | - aaron@cvs.openbsd.org 2002/08/08 13:50:23 |
1018 | [sshconnect1.c] | |
1019 | Use & to test if bits are set, not &&; markus@ ok. | |
d6097023 | 1020 | - stevesk@cvs.openbsd.org 2002/08/08 23:54:52 |
1021 | [auth.c] | |
1022 | typo in comment | |
36535ee6 | 1023 | - stevesk@cvs.openbsd.org 2002/08/09 17:21:42 |
1024 | [sshd_config.5] | |
1025 | use Op for mdoc conformance; from esr@golux.thyrsus.com | |
1026 | ok aaron@ | |
b3641662 | 1027 | - stevesk@cvs.openbsd.org 2002/08/09 17:41:12 |
1028 | [sshd_config.5] | |
1029 | proxy vs. fake display | |
35453849 | 1030 | - stevesk@cvs.openbsd.org 2002/08/12 17:30:35 |
1031 | [ssh.1 sshd.8 sshd_config.5] | |
1032 | more PermitUserEnvironment; ok markus@ | |
24794905 | 1033 | - stevesk@cvs.openbsd.org 2002/08/17 23:07:14 |
1034 | [ssh.1] | |
1035 | ForwardAgent has defaulted to no for over 2 years; be more clear here. | |
4dcbbeea | 1036 | - stevesk@cvs.openbsd.org 2002/08/17 23:55:01 |
1037 | [ssh_config.5] | |
1038 | ordered list here | |
7d3b91a6 | 1039 | - (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assign |
1040 | it to ULONG_MAX. | |
b85698ab | 1041 | |
cd018561 | 1042 | 20020813 |
1043 | - (tim) [configure.ac] Display OpenSSL header/library version. | |
1044 | Patch by dtucker@zip.com.au | |
1045 | ||
8a48a7ef | 1046 | 20020731 |
1047 | - (bal) OpenBSD CVS Sync | |
1048 | - markus@cvs.openbsd.org 2002/07/24 16:11:18 | |
1049 | [hostfile.c hostfile.h sshconnect.c] | |
1050 | print out all known keys for a host if we get a unknown host key, | |
1051 | see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4 | |
1052 | ||
1053 | the ssharp mitm tool attacks users in a similar way, so i'd like to | |
1054 | pointed out again: | |
1055 | A MITM attack is always possible if the ssh client prints: | |
1056 | The authenticity of host 'bla' can't be established. | |
1057 | (protocol version 2 with pubkey authentication allows you to detect | |
1058 | MITM attacks) | |
5cb5518b | 1059 | - mouring@cvs.openbsd.org 2002/07/25 01:16:59 |
1060 | [sftp.c] | |
1061 | FallBackToRsh does not exist anywhere else. Remove it from here. | |
1062 | OK deraadt. | |
567a05bf | 1063 | - markus@cvs.openbsd.org 2002/07/29 18:57:30 |
1064 | [sshconnect.c] | |
1065 | print file:line | |
f00bab84 | 1066 | - markus@cvs.openbsd.org 2002/07/30 17:03:55 |
1067 | [auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5] | |
1068 | add PermitUserEnvironment (off by default!); from dot@dotat.at; | |
1069 | ok provos, deraadt | |
8a48a7ef | 1070 | |
13979d47 | 1071 | 20020730 |
1072 | - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de | |
1073 | ||
d228d9dd | 1074 | 20020728 |
1075 | - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar | |
16c4a972 | 1076 | - (stevesk) [CREDITS] solar |
75131bbd | 1077 | - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned |
1078 | char arg. | |
d228d9dd | 1079 | |
d40af5fa | 1080 | 20020725 |
1081 | - (djm) Remove some cruft from INSTALL | |
d91b4743 | 1082 | - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/ |
d40af5fa | 1083 | |
56b54901 | 1084 | 20020723 |
1085 | - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger. | |
918ffb0b | 1086 | - (bal) sync ID w/ ssh-agent.c |
516f0d7d | 1087 | - (bal) OpenBSD Sync |
1088 | - markus@cvs.openbsd.org 2002/07/19 15:43:33 | |
1089 | [log.c log.h session.c sshd.c] | |
1090 | remove fatal cleanups after fork; based on discussions with and code | |
1091 | from solar. | |
5d185586 | 1092 | - stevesk@cvs.openbsd.org 2002/07/19 17:42:40 |
1093 | [ssh.c] | |
1094 | display a warning from ssh when XAuthLocation does not exist or xauth | |
1095 | returned no authentication data. ok markus@ | |
30998af1 | 1096 | - stevesk@cvs.openbsd.org 2002/07/21 18:32:20 |
1097 | [auth-options.c] | |
1098 | unneeded includes | |
dbc728ff | 1099 | - stevesk@cvs.openbsd.org 2002/07/21 18:34:43 |
1100 | [auth-options.h] | |
1101 | remove invalid comment | |
97686bf9 | 1102 | - markus@cvs.openbsd.org 2002/07/22 11:03:06 |
1103 | [session.c] | |
1104 | fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors; | |
d341742a | 1105 | - stevesk@cvs.openbsd.org 2002/07/22 17:32:56 |
1106 | [monitor.c] | |
1107 | u_int here; ok provos@ | |
67f04db1 | 1108 | - stevesk@cvs.openbsd.org 2002/07/23 16:03:10 |
1109 | [sshd.c] | |
1110 | utmp_len is unsigned; display error consistent with other options. | |
1111 | ok markus@ | |
0df3a240 | 1112 | - stevesk@cvs.openbsd.org 2002/07/15 17:15:31 |
1113 | [uidswap.c] | |
1114 | little more debugging; ok markus@ | |
d341742a | 1115 | |
21c2c5cd | 1116 | 20020722 |
1117 | - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk | |
a93bd14c | 1118 | - (stevesk) [xmmap.c] missing prototype for fatal() |
ccbb983c | 1119 | - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync |
1120 | with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com. | |
d262b7f2 | 1121 | - (bal) [configure.ac] Missing ;; from cray patch. |
30eab01d | 1122 | - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines |
1123 | into it's own header. | |
ee48c949 | 1124 | - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be |
1125 | freed by the caller; add free_pam_environment() and use it. | |
1d3f4ae7 | 1126 | - (stevesk) [auth-pam.c] typo in comment |
21c2c5cd | 1127 | |
b992432e | 1128 | 20020721 |
1129 | - (stevesk) [auth-pam.c] merge cosmetic changes from solar's | |
1130 | openssh-3.4p1-owl-password-changing.diff | |
277f55cf | 1131 | - (stevesk) [auth-pam.c] merge rest of solar's PAM patch; |
1132 | PAM_NEW_AUTHTOK_REQD remains in #if 0 for now. | |
f7808a93 | 1133 | - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch |
1134 | warning on pam_conv struct conversation function. | |
337dde6b | 1135 | - (stevesk) [auth-pam.h] license |
8565f28e | 1136 | - (stevesk) [auth-pam.h] unneeded include |
e9b2c23d | 1137 | - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h |
b992432e | 1138 | |
ce88d9df | 1139 | 20020720 |
1140 | - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng(). | |
1141 | ||
4379c0e5 | 1142 | 20020719 |
1143 | - (tim) [contrib/solaris/buildpkg.sh] create privsep user/group if needed. | |
1144 | Patch by dtucker@zip.com.au | |
f75ca46d | 1145 | - (tim) [configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au |
4379c0e5 | 1146 | |
45491100 | 1147 | 20020718 |
1148 | - (tim) [defines.h] Bug 313 patch by dirk.meyer@dinoex.sub.org | |
1149 | - (tim) [monitor_mm.c] add missing declaration for xmmap(). Reported | |
1150 | by ayamura@ayamura.org | |
1cbbe6c8 | 1151 | - (tim) [configure.ac] Bug 267 rework int64_t test. |
5749e709 | 1152 | - (tim) [includes.h] Bug 267 add stdint.h |
45491100 | 1153 | |
dd3943d0 | 1154 | 20020717 |
1155 | - (bal) aixbff package updated by dtucker@zip.com.au | |
2bf42e4a | 1156 | - (tim) [configure.ac] change how we do paths in AC_PATH_PROGS tests |
1157 | for autoconf 2.53. Based on a patch by jrj@purdue.edu | |
dd3943d0 | 1158 | |
8fc47887 | 1159 | 20020716 |
1160 | - (tim) [contrib/solaris/opensshd.in] Only kill sshd if .pid file found | |
1161 | ||
c750d869 | 1162 | 20020715 |
1163 | - (bal) OpenBSD CVS Sync | |
1164 | - itojun@cvs.openbsd.org 2002/07/12 13:29:09 | |
1165 | [sshconnect.c] | |
1166 | print connect failure during debugging mode. | |
a2f883ce | 1167 | - markus@cvs.openbsd.org 2002/07/12 15:50:17 |
1168 | [cipher.c] | |
1169 | EVP_CIPH_CUSTOM_IV for our own rijndael | |
2d199535 | 1170 | - (bal) Remove unused tty defined in do_setusercontext() pointed out by |
1171 | dtucker@zip.com.au plus a a more KNF since I am near it. | |
846be3f4 | 1172 | - (bal) Privsep user creation support in Solaris buildpkg.sh by |
1173 | dtucker@zip.com.au | |
c750d869 | 1174 | |
798c5808 | 1175 | 20020714 |
1176 | - (tim) [Makefile.in] replace "id sshd" with "sshd -t" | |
4165b82e | 1177 | - (bal/tim) [acconfig.h configure.ac monitor_mm.c servconf.c |
1178 | openbsd-compat/Makefile.in] support compression on platforms that | |
1179 | have no/broken MAP_ANON. Moved code to openbsd-compat/xmmap.c | |
1180 | Based on patch from nalin@redhat.com of code extracted from Owl's package | |
5fd8087a | 1181 | - (tim) [ssh_prng_cmds.in] Bug 323 arp -n flag doesn't exist under Solaris. |
1182 | report by chris@by-design.net | |
fdebdd4f | 1183 | - (tim) [loginrec.c] Bug 347: Fix typo (WTMPX_FILE) report by rodney@bond.net |
d80063fe | 1184 | - (tim) [loginrec.c] Bug 348: add missing found = 1; to wtmpx_islogin() |
1185 | report by rodney@bond.net | |
798c5808 | 1186 | |
6b2a3595 | 1187 | 20020712 |
1188 | - (tim) [Makefile.in] quiet down install-files: and check-user: | |
3085601b | 1189 | - (tim) [configure.ac] remove unused filepriv line |
6b2a3595 | 1190 | |
249f9903 | 1191 | 20020710 |
1192 | - (tim) [contrib/cygwin/ssh-host-config] explicitely sets the permissions | |
1193 | on /var/empty to 755 Patch by vinschen@redhat.com | |
6f901f8e | 1194 | - (bal) OpenBSD CVS Sync |
1195 | - itojun@cvs.openbsd.org 2002/07/09 11:56:50 | |
1196 | [sshconnect.c] | |
1197 | silently try next address on connect(2). markus ok | |
59c825e1 | 1198 | - itojun@cvs.openbsd.org 2002/07/09 11:56:27 |
1199 | [canohost.c] | |
1200 | suppress log on reverse lookup failiure, as there's no real value in | |
1201 | doing so. | |
1202 | markus ok | |
aab5431b | 1203 | - itojun@cvs.openbsd.org 2002/07/09 12:04:02 |
1204 | [sshconnect.c] | |
1205 | ed static function (less warnings) | |
94ad46d1 | 1206 | - stevesk@cvs.openbsd.org 2002/07/09 17:46:25 |
1207 | [sshd_config.5] | |
1208 | clarify no preference ordering in protocol list; ok markus@ | |
9bd68577 | 1209 | - itojun@cvs.openbsd.org 2002/07/10 10:28:15 |
1210 | [sshconnect.c] | |
1211 | bark if all connection attempt fails. | |
09683edf | 1212 | - deraadt@cvs.openbsd.org 2002/07/10 17:53:54 |
1213 | [rijndael.c] | |
1214 | use right sizeof in memcpy; markus ok | |
249f9903 | 1215 | |
e6f15ed1 | 1216 | 20020709 |
1217 | - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platforms | |
1218 | lacking that concept can share it. Patch by vinschen@redhat.com | |
1219 | ||
4f9d6706 | 1220 | 20020708 |
1221 | - (tim) [openssh/contrib/solaris/buildpkg.sh] add PKG_INSTALL_ROOT to | |
1222 | work in a jumpstart environment. patch by kbrint@rufus.net | |
b451e27b | 1223 | - (tim) [Makefile.in] workaround for broken pakadd on some systems. |
cda1ebcb | 1224 | - (tim) [configure.ac] fix libc89 utimes test. Mention default path for |
1225 | --with-privsep-path= | |
4f9d6706 | 1226 | |
ac74561e | 1227 | 20020707 |
1228 | - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH) | |
94d8258b | 1229 | - (tim) [acconfig.h configure.ac sshd.c] |
1230 | s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/ | |
d41f8eed | 1231 | - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes |
1232 | patch from vinschen@redhat.com | |
0b832146 | 1233 | - (bal) [realpath.c] Updated with OpenBSD tree. |
da2499f5 | 1234 | - (bal) OpenBSD CVS Sync |
1235 | - deraadt@cvs.openbsd.org 2002/07/04 04:15:33 | |
1236 | [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c] | |
1237 | patch memory leaks; grendel@zeitbombe.org | |
e1feb9bf | 1238 | - deraadt@cvs.openbsd.org 2002/07/04 08:12:15 |
1239 | [channels.c packet.c] | |
1240 | blah blah minor nothing as i read and re-read and re-read... | |
eb9f2fab | 1241 | - markus@cvs.openbsd.org 2002/07/04 10:41:47 |
1242 | [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c] | |
1243 | don't allocate, copy, and discard if there is not interested in the data; | |
1244 | ok deraadt@ | |
4394a17f | 1245 | - deraadt@cvs.openbsd.org 2002/07/06 01:00:49 |
1246 | [log.c] | |
1247 | KNF | |
50d2fbbc | 1248 | - deraadt@cvs.openbsd.org 2002/07/06 01:01:26 |
1249 | [ssh-keyscan.c] | |
1250 | KNF, realloc fix, and clean usage | |
12a3f2c3 | 1251 | - stevesk@cvs.openbsd.org 2002/07/06 17:47:58 |
1252 | [ssh-keyscan.c] | |
1253 | unused variable | |
41545cb6 | 1254 | - (bal) Minor KNF on ssh-keyscan.c |
ac74561e | 1255 | |
0764e748 | 1256 | 20020705 |
1257 | - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs. | |
1258 | Reported by Darren Tucker <dtucker@zip.com.au> | |
e12659f4 | 1259 | - (tim) [contrib/cygwin/ssh-host-config] double slash corrction |
1260 | from vinschen@redhat.com | |
0764e748 | 1261 | |
64c0ce80 | 1262 | 20020704 |
1263 | - (bal) Limit data to TTY for AIX only (Newer versions can't handle the | |
1264 | faster data rate) Bug #124 | |
375c1dee | 1265 | - (bal) glob.c defines TILDE and AIX also defines it. #undef it first. |
1266 | bug #265 | |
ff2de800 | 1267 | - (bal) One too many nulls in ports-aix.c |
64c0ce80 | 1268 | |
d2f95449 | 1269 | 20020703 |
1270 | - (bal) Updated contrib/cygwin/ patch by vinschen@redhat.com | |
619a6aff | 1271 | - (bal) minor correction to utimes() replacement. Patch by |
1272 | onoe@sm.sony.co.jp | |
f11fe301 | 1273 | - OpenBSD CVS Sync |
1274 | - markus@cvs.openbsd.org 2002/06/27 08:49:44 | |
1275 | [dh.c ssh-keyscan.c sshconnect.c] | |
1276 | more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@ | |
181d6635 | 1277 | - deraadt@cvs.openbsd.org 2002/06/27 09:08:00 |
1278 | [monitor.c] | |
1279 | improve mm_zalloc check; markus ok | |
30e37ee6 | 1280 | - deraadt@cvs.openbsd.org 2002/06/27 10:35:47 |
1281 | [auth2-none.c monitor.c sftp-client.c] | |
1282 | use xfree() | |
c8f94200 | 1283 | - stevesk@cvs.openbsd.org 2002/06/27 19:49:08 |
1284 | [ssh-keyscan.c] | |
1285 | use convtime(); ok markus@ | |
a64d3560 | 1286 | - millert@cvs.openbsd.org 2002/06/28 01:49:31 |
1287 | [monitor_mm.c] | |
1288 | tree(3) wants an int return value for its compare functions and | |
1289 | the difference between two pointers is not an int. Just do the | |
1290 | safest thing and store the result in a long and then return 0, | |
1291 | -1, or 1 based on that result. | |
405a0d43 | 1292 | - deraadt@cvs.openbsd.org 2002/06/28 01:50:37 |
1293 | [monitor_wrap.c] | |
1294 | use ssize_t | |
4efd85b2 | 1295 | - deraadt@cvs.openbsd.org 2002/06/28 10:08:25 |
1296 | [sshd.c] | |
1297 | range check -u option at invocation | |
6ded293b | 1298 | - deraadt@cvs.openbsd.org 2002/06/28 23:05:06 |
1299 | [sshd.c] | |
1300 | gidset[2] -> gidset[1]; markus ok | |
7fdc56c5 | 1301 | - deraadt@cvs.openbsd.org 2002/06/30 21:54:16 |
1302 | [auth2.c session.c sshd.c] | |
1303 | lint asks that we use names that do not overlap | |
343288b8 | 1304 | - deraadt@cvs.openbsd.org 2002/06/30 21:59:45 |
1305 | [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c | |
1306 | monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c | |
1307 | sshconnect2.c sshd.c] | |
1308 | minor KNF | |
7d60d74c | 1309 | - deraadt@cvs.openbsd.org 2002/07/01 16:15:25 |
1310 | [msg.c] | |
1311 | %u | |
713f6cd9 | 1312 | - markus@cvs.openbsd.org 2002/07/01 19:48:46 |
1313 | [sshconnect2.c] | |
1314 | for compression=yes, we fallback to no-compression if the server does | |
1315 | not support compression, vice versa for compression=no. ok mouring@ | |
261189cc | 1316 | - markus@cvs.openbsd.org 2002/07/03 09:55:38 |
1317 | [ssh-keysign.c] | |
1318 | use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld) | |
1319 | in order to avoid a possible Kocher timing attack pointed out by Charles | |
1320 | Hannum; ok provos@ | |
60cd0a97 | 1321 | - markus@cvs.openbsd.org 2002/07/03 14:21:05 |
1322 | [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config] | |
1323 | re-enable ssh-keysign's sbit, but make ssh-keysign read | |
1324 | /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled | |
1325 | globally. based on discussions with deraadt, itojun and sommerfeld; | |
1326 | ok itojun@ | |
56fd97d7 | 1327 | - (bal) Failed password attempts don't increment counter on AIX. Bug #145 |
e8aa0a5c | 1328 | - (bal) Missed Makefile.in change. keysign needs readconf.o |
0ba40daa | 1329 | - (bal) Clean up aix_usrinfo(). Ignore TTY= period I guess. |
56fd97d7 | 1330 | |
b2f295dc | 1331 | 20020702 |
1332 | - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc & | |
1333 | friends consistently. Spotted by Solar Designer <solar@openwall.com> | |
1334 | ||
3c3e878a | 1335 | 20020629 |
1336 | - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style | |
1337 | clean up while I'm near it. | |
1338 | ||
811ee370 | 1339 | 20020628 |
1340 | - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented | |
1341 | options should contain default value. from solar. | |
b9b82dab | 1342 | - (bal) Cygwin uid0 fix by vinschen@redhat.com |
17962c40 | 1343 | - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c. Otherwise wise |
1344 | have issues of our fixes not propogating right (ie bcopy instead of | |
1345 | memmove). OK tim | |
4fa4fb00 | 1346 | - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported. |
1347 | Bug #303 | |
811ee370 | 1348 | |
ce88d9df | 1349 | 20020627 |
d1ff09ba | 1350 | - OpenBSD CVS Sync |
1351 | - deraadt@cvs.openbsd.org 2002/06/26 14:49:36 | |
1352 | [monitor.c] | |
1353 | correct %u | |
63b5f1a1 | 1354 | - deraadt@cvs.openbsd.org 2002/06/26 14:50:04 |
1355 | [monitor_fdpass.c] | |
1356 | use ssize_t for recvmsg() and sendmsg() return | |
1431a900 | 1357 | - markus@cvs.openbsd.org 2002/06/26 14:51:33 |
1358 | [ssh-add.c] | |
1359 | fix exit code for -X/-x | |
bb0640b2 | 1360 | - deraadt@cvs.openbsd.org 2002/06/26 15:00:32 |
1361 | [monitor_wrap.c] | |
1362 | more %u | |
20e79e98 | 1363 | - markus@cvs.openbsd.org 2002/06/26 22:27:32 |
1364 | [ssh-keysign.c] | |
1365 | bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu | |
d1ff09ba | 1366 | |
4bfa8bb6 | 1367 | 20020626 |
1368 | - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM | |
a594fa74 | 1369 | - (bal) OpenBSD CVS Sync |
1370 | - markus@cvs.openbsd.org 2002/06/23 21:34:07 | |
1371 | [channels.c] | |
1372 | tcode is u_int | |
38501509 | 1373 | - markus@cvs.openbsd.org 2002/06/24 13:12:23 |
1374 | [ssh-agent.1] | |
1375 | the socket name contains ssh-agent's ppid; via mpech@ from form@ | |
f91d9a89 | 1376 | - markus@cvs.openbsd.org 2002/06/24 14:33:27 |
1377 | [channels.c channels.h clientloop.c serverloop.c] | |
1378 | move channel counter to u_int | |
1169c3df | 1379 | - markus@cvs.openbsd.org 2002/06/24 14:55:38 |
1380 | [authfile.c kex.c ssh-agent.c] | |
1381 | cat to (void) when output from buffer_get_X is ignored | |
09915dc1 | 1382 | - itojun@cvs.openbsd.org 2002/06/24 15:49:22 |
1383 | [msg.c] | |
1384 | printf type pedant | |
d0a1c5d1 | 1385 | - deraadt@cvs.openbsd.org 2002/06/24 17:57:20 |
1386 | [sftp-server.c sshpty.c] | |
1387 | explicit (u_int) for uid and gid | |
6c69a6a9 | 1388 | - markus@cvs.openbsd.org 2002/06/25 16:22:42 |
1389 | [authfd.c] | |
1390 | unnecessary cast | |
87809a1f | 1391 | - markus@cvs.openbsd.org 2002/06/25 18:51:04 |
1392 | [sshd.c] | |
1393 | lightweight do_setusercontext after chroot() | |
924681ee | 1394 | - (bal) Updated AIX package build. Patch by dtucker@zip.com.au |
46c8ebb3 | 1395 | - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8 |
78beb77d | 1396 | - (bal) added back in error check for mmap(). I screwed up, Pointed |
1397 | out by stevesk@ | |
f2d9a1f8 | 1398 | - (tim) [README.privsep] UnixWare tip no longer needed. |
88cb875c | 1399 | - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP, |
1400 | but it all damned lies. | |
0d0270e6 | 1401 | - (stevesk) [README.privsep] more for sshd pseudo-account. |
8029e7fc | 1402 | - (tim) [contrib/caldera/openssh.spec] add support for privsep |
8695f9f7 | 1403 | - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@ |
b29fe4ea | 1404 | - (djm) OpenBSD CVS Sync |
1405 | - markus@cvs.openbsd.org 2002/06/26 08:53:12 | |
1406 | [bufaux.c] | |
1407 | limit size of BNs to 8KB; ok provos/deraadt | |
22d62d31 | 1408 | - markus@cvs.openbsd.org 2002/06/26 08:54:18 |
1409 | [buffer.c] | |
1410 | limit append to 1MB and buffers to 10MB | |
5df8c731 | 1411 | - markus@cvs.openbsd.org 2002/06/26 08:55:02 |
1412 | [channels.c] | |
1413 | limit # of channels to 10000 | |
87f18810 | 1414 | - markus@cvs.openbsd.org 2002/06/26 08:58:26 |
1415 | [session.c] | |
1416 | limit # of env vars to 1000; ok deraadt/djm | |
2f095a0e | 1417 | - deraadt@cvs.openbsd.org 2002/06/26 13:20:57 |
1418 | [monitor.c] | |
1419 | be careful in mm_zalloc | |
66087567 | 1420 | - deraadt@cvs.openbsd.org 2002/06/26 13:49:26 |
1421 | [session.c] | |
1422 | disclose less information from environment files; based on input | |
1423 | from djm, and dschultz@uclink.Berkeley.EDU | |
477edc5d | 1424 | - markus@cvs.openbsd.org 2002/06/26 13:55:37 |
1425 | [auth2-chall.c] | |
1426 | make sure # of response matches # of queries, fixes int overflow; | |
1427 | from ISS | |
03b14b6f | 1428 | - markus@cvs.openbsd.org 2002/06/26 13:56:27 |
1429 | [version.h] | |
1430 | 3.4 | |
9c696d0d | 1431 | - (djm) Require krb5 devel for RPM build w/ KrbV |
c4186be7 | 1432 | - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai |
1433 | <nalin@redhat.com> | |
1e7bc74c | 1434 | - (djm) Update spec files for release |
49b53b03 | 1435 | - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS |
03b14b6f | 1436 | - (djm) Release 3.4p1 |
6519cfd6 | 1437 | - (tim) [contrib/caldera/openssh.spec] remove 2 configure options I put in |
1438 | by mistake | |
4bfa8bb6 | 1439 | |
ef1ac12b | 1440 | 20020625 |
1441 | - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh | |
1a44c6f7 | 1442 | - (stevesk) [README.privsep] minor updates |
fd3cbf67 | 1443 | - (djm) Create privsep directory and warn if privsep user is missing |
1444 | during make install | |
702b2855 | 1445 | - (bal) Started list of PrivSep issues in TODO |
1c6249af | 1446 | - (bal) if mmap() is substandard, don't allow compression on server side. |
1447 | Post 'event' we will add more options. | |
cbaa3d44 | 1448 | - (tim) [contrib/caldera/openssh.spec] Sync with Caldera |
e2bc41f9 | 1449 | - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by |
1450 | dtucker@zip.com.au | |
d170feb1 | 1451 | - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus |
1452 | for Cygwin, Cray, & SCO | |
ef1ac12b | 1453 | |
d5803314 | 1454 | 20020624 |
1455 | - OpenBSD CVS Sync | |
1456 | - deraadt@cvs.openbsd.org 2002/06/23 03:25:50 | |
1457 | [tildexpand.c] | |
1458 | KNF | |
3ddc795d | 1459 | - deraadt@cvs.openbsd.org 2002/06/23 03:26:19 |
1460 | [cipher.c key.c] | |
1461 | KNF | |
d6133f43 | 1462 | - deraadt@cvs.openbsd.org 2002/06/23 03:30:58 |
1463 | [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c | |
1464 | sshpty.c] | |
1465 | various KNF and %d for unsigned | |
9906a836 | 1466 | - deraadt@cvs.openbsd.org 2002/06/23 09:30:14 |
1467 | [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c | |
1468 | sftp.c] | |
1469 | bunch of u_int vs int stuff | |
512df038 | 1470 | - deraadt@cvs.openbsd.org 2002/06/23 09:39:55 |
1471 | [ssh-keygen.c] | |
1472 | u_int stuff | |
7528d467 | 1473 | - deraadt@cvs.openbsd.org 2002/06/23 09:46:51 |
1474 | [bufaux.c servconf.c] | |
1475 | minor KNF. things the fingers do while you read | |
e424e241 | 1476 | - deraadt@cvs.openbsd.org 2002/06/23 10:29:52 |
1477 | [ssh-agent.c sshd.c] | |
1478 | some minor KNF and %u | |
7138ebd9 | 1479 | - deraadt@cvs.openbsd.org 2002/06/23 20:39:45 |
1480 | [session.c] | |
1481 | compression_level is u_int | |
f09ce20a | 1482 | - deraadt@cvs.openbsd.org 2002/06/23 21:06:13 |
1483 | [sshpty.c] | |
1484 | KNF | |
57f228e8 | 1485 | - deraadt@cvs.openbsd.org 2002/06/23 21:06:41 |
1486 | [channels.c channels.h session.c session.h] | |
1487 | display, screen, row, col, xpixel, ypixel are u_int; markus ok | |
0bc50167 | 1488 | - deraadt@cvs.openbsd.org 2002/06/23 21:10:02 |
1489 | [packet.c] | |
1490 | packet_get_int() returns unsigned for reason & seqnr | |
57f228e8 | 1491 | - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col, |
1492 | xpixel are u_int. | |
1493 | ||
d5803314 | 1494 | |
58177c0a | 1495 | 20020623 |
1496 | - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX. | |
dc43acd2 | 1497 | - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset. |
ef3912be | 1498 | - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au |
a8bbdc75 | 1499 | - OpenBSD CVS Sync |
1500 | - stevesk@cvs.openbsd.org 2002/06/22 02:00:29 | |
1501 | [ssh.h] | |
1502 | correct comment | |
1ae02182 | 1503 | - stevesk@cvs.openbsd.org 2002/06/22 02:40:23 |
1504 | [ssh.1] | |
1505 | section 5 not 4 for ssh_config | |
b2843ec6 | 1506 | - naddy@cvs.openbsd.org 2002/06/22 11:51:39 |
1507 | [ssh.1] | |
1508 | typo | |
75653d3e | 1509 | - stevesk@cvs.openbsd.org 2002/06/22 16:32:54 |
1510 | [sshd.8] | |
1511 | add /var/empty in FILES section | |
a56313d7 | 1512 | - stevesk@cvs.openbsd.org 2002/06/22 16:40:19 |
1513 | [sshd.c] | |
1514 | check /var/empty owner mode; ok provos@ | |
e4e83d70 | 1515 | - stevesk@cvs.openbsd.org 2002/06/22 16:41:57 |
1516 | [scp.1] | |
1517 | typo | |
baa08b92 | 1518 | - stevesk@cvs.openbsd.org 2002/06/22 16:45:29 |
1519 | [ssh-agent.1 sshd.8 sshd_config.5] | |
1520 | use process ID vs. pid/PID/process identifier | |
c28876e9 | 1521 | - stevesk@cvs.openbsd.org 2002/06/22 20:05:27 |
1522 | [sshd.c] | |
1523 | don't call setsid() if debugging or run from inetd; no "Operation not | |
1524 | permitted" errors now; ok millert@ markus@ | |
d17ef027 | 1525 | - stevesk@cvs.openbsd.org 2002/06/22 23:09:51 |
1526 | [monitor.c] | |
1527 | save auth method before monitor_reset_key_state(); bugzilla bug #284; | |
1528 | ok provos@ | |
58177c0a | 1529 | |
0b202697 | 1530 | $Id$ |