]> andersk Git - openssh.git/blame - ChangeLog
- markus@cvs.openbsd.org 2003/07/10 14:42:28
[openssh.git] / ChangeLog
CommitLineData
e351e493 120030714
2 - (dtucker) [acconfig.h configure.ac port-aix.c] Older AIXes don't declare
3 loginfailed at all, so assume 3-arg loginfailed if not declared.
1cd5765d 4 - (dtucker) [port-aix.h] Work around name collision on AIX for r_type by
5 undef'ing it.
2aa3a16c 6 - (dtucker) Bug #543: [configure.ac port-aix.c port-aix.h]
7 Call setauthdb() before loginfailed(), which may load password registry-
8 specific functions. Based on patch by cawlfiel@us.ibm.com.
b4777c18 9 - (dtucker) [port-aix.h] Fix prototypes.
956b0f56 10 - (dtucker) OpenBSD CVS Sync
11 - avsm@cvs.openbsd.org 2003/07/09 13:58:19
12 [key.c]
13 minor tweak: when generating the hex fingerprint, give strlcat the full
14 bound to the buffer, and add a comment below explaining why the
15 zero-termination is one less than the bound. markus@ ok
40729edd 16 - markus@cvs.openbsd.org 2003/07/10 14:42:28
17 [packet.c]
18 the 2^(blocksize*2) rekeying limit is too expensive for 3DES,
19 blowfish, etc, so enforce a 1GB limit for small blocksizes.
e351e493 20
f58c0e01 2120030708
22 - (dtucker) [acconfig.h auth-passwd.c configure.ac session.c port-aix.[ch]]
23 Include AIX headers for authentication functions and make calls match
e351e493 24 prototypes. Test for and handle 3-arg and 4-arg variants of loginfailed.
bc7dfc06 25 - (dtucker) [session.c] Check return value of setpcred().
26 - (dtucker) [auth-passwd.c auth.c session.c sshd.c port-aix.c port-aix.h]
27 Convert aixloginmsg into platform-independant Buffer loginmsg.
f58c0e01 28
309709db 2920030707
30 - (dtucker) [configure.ac] Bug #600: Check that getrusage is declared before
31 searching libraries for it. Fixes build errors on NCR MP-RAS.
32
d72f7b79 3320030706
34 - (dtucker) [ssh-rand-helper.c loginrec.c]
35 Apply atomicio typing change to these too.
36
71b9ced0 3720030703
38 - (dtucker) OpenBSD CVS Sync
39 - djm@cvs.openbsd.org 2003/06/28 07:48:10
40 [sshd.c]
41 report pidfile creation errors, based on patch from Roumen Petrov;
42 ok markus@
dc54438a 43 - deraadt@cvs.openbsd.org 2003/06/28 16:23:06
44 [atomicio.c atomicio.h authfd.c clientloop.c monitor_wrap.c msg.c
45 progressmeter.c scp.c sftp-client.c ssh-keyscan.c ssh.h sshconnect.c
46 sshd.c]
47 deal with typing of write vs read in atomicio
7caca6d4 48 - markus@cvs.openbsd.org 2003/06/29 12:44:38
49 [sshconnect.c]
50 memset 0, not \0; andrushock@korovino.net
8e7c9afc 51 - markus@cvs.openbsd.org 2003/07/02 12:56:34
52 [channels.c]
53 deny dynamic forwarding with -R for v1, too; ok djm@
f49658f5 54 - markus@cvs.openbsd.org 2003/07/02 14:51:16
55 [channels.c ssh.1 ssh_config.5]
56 (re)add socks5 suppport to -D; ok djm@
57 now ssh(1) can act both as a socks 4 and socks 5 server and
58 dynamically forward ports.
03c82656 59 - markus@cvs.openbsd.org 2003/07/02 20:37:48
60 [ssh.c]
61 convert hostkeyalias to lowercase, otherwise uppercase aliases will
62 not match at all; ok henning@
1768a611 63 - markus@cvs.openbsd.org 2003/07/03 08:21:46
64 [regress/dynamic-forward.sh]
65 add socks5; speedup; reformat; based on patch from dtucker@zip.com.au
7664edb6 66 - markus@cvs.openbsd.org 2003/07/03 08:24:13
67 [regress/Makefile]
68 enable tests for dynamic fwd via socks (-D), uses nc(1)
1572b90f 69 - djm@cvs.openbsd.org 2003/07/03 08:09:06
70 [readconf.c readconf.h ssh-keysign.c ssh.c]
71 fix AddressFamily option in config file, from brent@graveland.net;
72 ok markus@
71b9ced0 73
4e00038c 7420030630
75 - (djm) Search for support functions necessary to build our
76 getrrsetbyname() replacement. Patch from Roumen Petrov
77
9f59c5a3 7820030629
c5829391 79 - (dtucker) [includes.h] Bug #602: move #include of netdb.h to after in.h
80 (fixes compiler warnings on Solaris 2.5.1).
81 - (dtucker) [configure.ac] Add sanity test after system-dependant compiler
82 flag modifications.
9f59c5a3 83
9ea150a7 8420030628
85 - (djm) Bug #591: use PKCS#15 private key label as a comment in case
86 of OpenSC. Report and patch from larsch@trustcenter.de
d2168412 87 - (djm) Bug #593: Sanity check OpenSC card reader number; patch from
88 aj@dungeon.inka.de
f0677b69 89 - (dtucker) OpenBSD CVS Sync
90 - markus@cvs.openbsd.org 2003/06/23 09:02:44
91 [ssh_config.5]
92 document EnableSSHKeysign; bugzilla #599; ok deraadt@, jmc@
a27002e5 93 - markus@cvs.openbsd.org 2003/06/24 08:23:46
94 [auth2-hostbased.c auth2-pubkey.c auth2.c channels.c key.c key.h
95 monitor.c packet.c packet.h serverloop.c sshconnect2.c sshd.c]
96 int -> u_int; ok djm@, deraadt@, mouring@
d7ded285 97 - miod@cvs.openbsd.org 2003/06/25 22:39:36
98 [sftp-server.c]
99 Typo police: attribute is better written with an 'r'.
2d9c1828 100 - markus@cvs.openbsd.org 2003/06/26 20:08:33
101 [readconf.c]
102 do not dump core for 'ssh -o proxycommand host'; ok deraadt@
78b2dd04 103 - (dtucker) [regress/dynamic-forward.sh] Import new regression test.
ddb154b3 104 - (dtucker) [configure.ac] Bug #570: Have ./configure --enable-FEATURE
105 actually enable the feature, for those normally disabled. Patch by
106 openssh (at) roumenpetrov.info.
f0677b69 107
e15ba28b 10820030624
109 - (dtucker) Have configure refer the user to config.log and
110 contrib/findssl.sh for OpenSSL header/library mismatches.
111
63a556df 11220030622
c1ffd4bd 113 - (dtucker) OpenBSD CVS Sync
63a556df 114 - markus@cvs.openbsd.org 2003/06/21 09:14:05
c1ffd4bd 115 [regress/reconfigure.sh]
63a556df 116 missing $SUDO; from dtucker@zip.com.au
93527718 117 - markus@cvs.openbsd.org 2003/06/18 11:28:11
c1ffd4bd 118 [ssh-rsa.c]
119 backout last change, since it violates pkcs#1
120 switch to share/misc/license.template
1891396b 121 - djm@cvs.openbsd.org 2003/06/20 05:47:58
122 [sshd_config.5]
123 sync description of protocol 2 cipher proposal; ok markus
4db4d313 124 - djm@cvs.openbsd.org 2003/06/20 05:48:21
125 [sshd_config]
126 sync some implemented options; ok markus@
63a556df 127 - (dtucker) [regress/authorized_keys_root] Remove temp data file from CVS.
39ef3618 128 - (dtucker) [openbsd-compat/setproctitle.c] Ensure SPT_TYPE is defined before
129 testing its value.
63a556df 130
b8e04133 13120030618
132 - (djm) OpenBSD CVS Sync
133 - markus@cvs.openbsd.org 2003/06/12 07:57:38
134 [monitor.c sshlogin.c sshpty.c]
135 typos; dtucker at zip.com.au
b9ad9d13 136 - djm@cvs.openbsd.org 2003/06/12 12:22:47
137 [LICENCE]
138 mention more copyright holders; ok markus@
1fb23629 139 - nino@cvs.openbsd.org 2003/06/12 15:34:09
140 [scp.c]
141 Typo. Ok markus@.
244e796f 142 - markus@cvs.openbsd.org 2003/06/12 19:12:03
143 [scard.c scard.h ssh-agent.c ssh.c]
144 add sc_get_key_label; larsch at trustcenter.de; bugzilla#591
9250058a 145 - markus@cvs.openbsd.org 2003/06/16 08:22:35
146 [ssh-rsa.c]
147 make sure the signature has at least the expected length (don't
148 insist on len == hlen + oidlen, since this breaks some smartcards)
149 bugzilla #592; ok djm@
360a4aae 150 - markus@cvs.openbsd.org 2003/06/16 10:22:45
151 [ssh-add.c]
152 print out key comment on each prompt; make ssh-askpass more useable; ok djm@
0a59bd6b 153 - markus@cvs.openbsd.org 2003/06/17 18:14:23
154 [cipher-ctr.c]
155 use license from /usr/share/misc/license.template for new code
1d6c0b69 156 - (dtucker) [reconfigure.sh rekey.sh sftp-badcmds.sh]
157 Import new regression tests from OpenBSD
d4d84f5f 158 - (dtucker) [regress/copy.1 regress/copy.2] Remove temp data files from CVS.
ed49cc81 159 - (dtucker) OpenBSD CVS Sync (regress/)
160 - markus@cvs.openbsd.org 2003/04/02 12:21:13
161 [Makefile]
162 enable rekey test
2c670155 163 - djm@cvs.openbsd.org 2003/04/04 09:34:22
164 [Makefile sftp-cmds.sh]
165 More regression tests, including recent directory rename bug; ok markus@
737447ad 166 - markus@cvs.openbsd.org 2003/05/14 22:08:27
167 [ssh-com-client.sh ssh-com-keygen.sh ssh-com-sftp.sh ssh-com.sh]
168 test against some new commerical versions
68df2aa0 169 - mouring@cvs.openbsd.org 2003/05/15 04:07:12
170 [sftp-cmds.sh]
171 Advanced put/get testing for sftp. OK @djm
eb9bf761 172 - markus@cvs.openbsd.org 2003/06/12 15:40:01
173 [try-ciphers.sh]
174 add ctr
39c0191e 175 - markus@cvs.openbsd.org 2003/06/12 15:43:32
176 [Makefile]
177 test -HUP; dtucker at zip.com.au
b8e04133 178
f5827134 17920030614
180 - (djm) Update license on fake-rfc2553.[ch]; ok itojun@
181
be193d89 18220030611
c12c6ef8 183 - (djm) Mention portable copyright holders in LICENSE
e52ca1e5 184 - (djm) Put licenses on substantial header files
8cb3fa9d 185 - (djm) Sync LICENSE against OpenBSD
be193d89 186 - (djm) OpenBSD CVS Sync
187 - jmc@cvs.openbsd.org 2003/06/10 09:12:11
188 [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5]
189 [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
190 - section reorder
191 - COMPATIBILITY merge
192 - macro cleanup
193 - kill whitespace at EOL
194 - new sentence, new line
195 ssh pages ok markus@
0daa6547 196 - deraadt@cvs.openbsd.org 2003/06/10 22:20:52
197 [packet.c progressmeter.c]
198 mostly ansi cleanup; pval ok
1432b5c4 199 - jakob@cvs.openbsd.org 2003/06/11 10:16:16
200 [sshconnect.c]
201 clean up check_host_key() and improve SSHFP feedback. ok markus@
cc263107 202 - jakob@cvs.openbsd.org 2003/06/11 10:18:47
203 [dns.c]
204 sync with check_host_key() change
ca719034 205 - djm@cvs.openbsd.org 2003/06/11 11:18:38
206 [authfd.c authfd.h ssh-add.c ssh-agent.c]
207 make agent constraints (lifetime, confirm) work with smartcard keys;
208 ok markus@
be193d89 209
210
8a547250 21120030609
212 - (djm) Sync README.smartcard with OpenBSD -current
a1864983 213 - (djm) Re-merge OpenSC info into README.smartcard
8a547250 214
f5db6a03 21520030606
216 - (dtucker) [uidswap.c] Fix setreuid and add missing args to fatal(). ok djm@
217
02e2a074 21820030605
219 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
220 canohost.c changes.
688eed4a 221 - (djm) Implement paranoid priv dropping checks, based on:
222 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
223 Proceedings of USENIX Security Symposium 2002
d6bd2b5a 224 - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
52d58495 225 - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
57c917f8 226 - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
227 Patch from larsch@trustcenter.de
7b7f164b 228 - (djm) Bug #589 - scard-opensc: load only keys with a private keys
229 Patch from larsch@trustcenter.de
4ed465ec 230 - (dtucker) Add includes.h to fake-rfc2553.c so it will build.
e932f447 231 - (dtucker) Define EAI_NONAME in fake-rfc2553.h (used by fake-rfc2553.c).
02e2a074 232
b08a39ff 23320030604
d60e487c 234 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
235 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
8acdec60 236 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
11f1e60e 237 Patch from larsch@trustcenter.de; ok markus@
238 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
239 larsch@trustcenter.de; ok markus@
d453a600 240 - (djm) OpenBSD CVS Sync
241 - djm@cvs.openbsd.org 2003/06/04 08:25:18
242 [sshconnect.c]
243 disable challenge/response and keyboard-interactive auth methods
244 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
245 bz #580; ok markus@
ee50371d 246 - djm@cvs.openbsd.org 2003/06/04 10:23:48
247 [sshd.c]
248 remove duplicated group-dropping code; ok markus@
b08a39ff 249 - djm@cvs.openbsd.org 2003/06/04 12:03:59
250 [serverloop.c]
251 remove bitrotten commet; ok markus@
cf3248b8 252 - djm@cvs.openbsd.org 2003/06/04 12:18:49
253 [scp.c]
254 ansify; ok markus@
0f764b2f 255 - djm@cvs.openbsd.org 2003/06/04 12:40:39
256 [scp.c]
257 kill ssh process upon receipt of signal, bz #241.
258 based on patch from esb AT hawaii.edu; ok markus@
1b558925 259 - djm@cvs.openbsd.org 2003/06/04 12:41:22
260 [sftp.c]
261 kill ssh process on receipt of signal; ok markus@
fba33e81 262 - (djm) Update to fix of bug #584: lock card before return.
263 From larsch@trustcenter.de
8d9bb5dd 264 - (djm) Always use mysignal() for SIGALRM
d60e487c 265
3a2b2b44 26620030603
267 - (djm) Replace setproctitle replacement with code derived from
268 UCB sendmail
c5a7d788 269 - (djm) OpenBSD CVS Sync
270 - markus@cvs.openbsd.org 2003/06/02 09:17:34
271 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
272 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
273 [sshd_config.5]
274 deprecate VerifyReverseMapping since it's dangerous if combined
275 with IP based access control as noted by Mike Harding; replace with
276 a UseDNS option, UseDNS is on by default and includes the
277 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
278 ok deraadt@, djm@
d981089c 279 - millert@cvs.openbsd.org 2003/06/03 02:56:16
280 [scp.c]
281 Remove the advertising clause in the UCB license which Berkeley
282 rescinded 22 July 1999. Proofed by myself and Theo.
c5a7d788 283 - (djm) Fix portable-specific uses of verify_reverse_mapping too
3e67f7df 284 - (djm) Sync openbsd-compat with OpenBSD CVS.
484d59c7 285 - No more 4-term BSD licenses in linked code
5d8ca8c7 286 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
3a2b2b44 287
aff561f9 28820030602
289 - (djm) Fix segv from bad reordering in auth-pam.c
416c732d 290 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
291 clobber
1b7342ab 292 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
293 CVS ID.
8862e142 294 - (djm) Remove "noip6" option from RedHat spec file. This may now be
295 set at runtime using AddressFamily option.
58ba3cb7 296 - (djm) Fix use of macro before #define in cipher-aes.c
382fe2fa 297 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
b0545fe6 298 - (djm) OpenBSD CVS Sync
299 - djm@cvs.openbsd.org 2003/05/26 12:54:40
300 [sshconnect.c]
301 fix format strings; ok markus@
fa5120a0 302 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
303 [sshd.c uidswap.c]
304 seteuid and setegid; markus ok
0f92946c 305 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
306 [ssh_config.5]
307 VerifyHostKeyDNS is v2 only. ok markus@
aff561f9 308
4f178be8 30920030530
310 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
311 roumenpetrov.info
eabb99c6 312 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
4f178be8 313
4881aebb 31420030526
315 - (djm) Avoid auth2-chall.c warning when compiling without
316 PAM, BSD_AUTH and SKEY
317
5b0fe364 31820030525
319- (djm) OpenBSD CVS Sync
320 - djm@cvs.openbsd.org 2003/05/24 09:02:22
321 [log.c]
322 pass logged data through strnvis; ok markus
b9ed513a 323 - djm@cvs.openbsd.org 2003/05/24 09:30:40
324 [authfile.c monitor.c sftp-common.c sshpty.c]
325 cast some types for printing; ok markus@
5b0fe364 326
44c78996 32720030524
328 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
329
d83ebe4a 33020030523
331 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
332 encoding (which encodes many more characters)
bd47824b 333 - OpenBSD CVS Sync
334 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
335 [sftp.1]
336 - new sentence, new line
337 - added .Xr's
338 - typos
339 ok djm@
3cbc677d 340 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
341 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
342 new sentence, new line
da54f5be 343 - djm@cvs.openbsd.org 2003/05/23 08:29:30
344 [sshconnect.c]
345 fix leak; ok markus@
d83ebe4a 346
c453493f 34720030520
348 - (djm) OpenBSD CVS Sync
349 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
350 [log.c]
351 use syslog_r() in a signal handler called place; markus ok
79d4fc55 352 - (djm) Configure logic to detect syslog_r and friends
c453493f 353
acb50584 35420030519
355 - (djm) Sync auth-pam.h with what we actually implement
356
35720030518
5ff453c0 358 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
359 recent merge
f811e52a 360 - (djm) OpenBSD CVS Sync
361 - djm@cvs.openbsd.org 2003/05/16 03:27:12
362 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
363 add AddressFamily option to ssh_config (like -4, -6 on commandline).
364 Portable bug #534; ok markus@
013b1214 365 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
366 [auth-rhosts.c]
367 just in case, put numbers to sscanf %s arg.
25b66522 368 - markus@cvs.openbsd.org 2003/05/17 04:27:52
369 [cipher.c cipher-ctr.c myproposal.h]
370 experimental support for aes-ctr modes from
371 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
372 ok djm@
25351757 373 - (djm) Remove IPv4 by default hack now that we can specify AF in config
3bf784bc 374 - (djm) Tidy and trim TODO
bffa6723 375 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
9901cb37 376 - (djm) Big KNF on openbsd-compat/
f1da2b8b 377 - (djm) KNF on md5crypt.[ch]
378 - (djm) KNF on auth-sia.[ch]
5ff453c0 379
f123055b 38020030517
381 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
382
c936c243 38320030516
384 - (djm) OpenBSD CVS Sync
385 - djm@cvs.openbsd.org 2003/05/15 13:52:10
386 [ssh.c]
387 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
388 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
a2144546 389 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
390 [readconf.c servconf.c]
391 warn for unsupported config option. ok markus@
5bdfde81 392 - markus@cvs.openbsd.org 2003/05/15 14:09:21
393 [auth2-krb5.c]
394 fix 64bit issue; report itojun@
09ab3296 395 - djm@cvs.openbsd.org 2003/05/15 14:55:25
396 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
397 add a ConnectTimeout option to ssh, based on patch from
398 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
b06b11ad 399 - (djm) Add warning for UsePAM when built without PAM support
7be625e1 400 - (djm) A few type mismatch fixes from Bug #565
0eb6370a 401 - (djm) Guard free_pam_environment against NULL argument. Works around
402 HP/UX PAM problems debugged by dtucker
c936c243 403
7efc7f57 40420030515
405 - (djm) OpenBSD CVS Sync
406 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
407 [ssh-agent.1]
408 setup -> set up;
409 from wiz@netbsd
21289cd0 410 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
411 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
412 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
413 add experimental support for verifying hos keys using DNS as described
414 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
415 ok markus@ and henning@
16a79097 416 - markus@cvs.openbsd.org 2003/05/14 22:24:42
417 [clientloop.c session.c ssh.1]
418 allow to send a BREAK to the remote system; ok various
b8c2031b 419 - markus@cvs.openbsd.org 2003/05/15 00:28:28
420 [sshconnect2.c]
421 cleanup unregister of per-method packet handlers; ok djm@
d0ec7f42 422 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
423 [readconf.c readconf.h servconf.c servconf.h]
424 always parse kerberos options. ok djm@ markus@
b414a17b 425 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
426 [dns.c]
427 add missing freerrset
3b6e3da9 428 - markus@cvs.openbsd.org 2003/05/15 03:08:29
429 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
430 split out custom EVP ciphers
02159d9b 431 - djm@cvs.openbsd.org 2003/05/15 03:10:52
432 [ssh-keygen.c]
433 avoid warning; ok jakob@
4a26f5c5 434 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
435 [sftp-int.c]
436 Make put/get (globed and nonglobed) code more consistant. OK djm@
c44f10c6 437 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
dc69f53c 438 [sftp-int.c sftp.c]
c44f10c6 439 Teach ls how to display multiple column display and allow users
440 to return to single column format via 'ls -1'. OK @djm
1457e7ff 441 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
442 [readconf.c servconf.c]
443 disable kerberos when not supported. ok markus@
861f0365 444 - markus@cvs.openbsd.org 2003/05/15 04:08:41
445 [ssh.1]
446 ~B is ssh2 only
d0ec7f42 447 - (djm) Always parse UsePAM
3e05e934 448 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
4460d509 449 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
86ee6794 450 - (djm) Tidy Makefile clean targets
2636769c 451 - (djm) Adapt README.dns for portable
2d2e4a34 452 - (djm) Avoid uuencode.c warnings
1457e7ff 453 - (djm) Enable UsePAM when built --with-pam
67467c30 454 - (djm) Only build getrrsetbyname replacement when using --with-dns
f420d2ba 455 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
456 correctly)
3c49ef10 457 - (djm) Bug #444: Wrong paths after reconfigure
321735c7 458 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
f420d2ba 459
dd3ebb5a 46020030514
461 - (djm) Bug #117: Don't lie to PAM about username
0608f8a7 462 - (djm) RCSID sync w/ OpenBSD
204fde99 463 - (djm) OpenBSD CVS Sync
464 - djm@cvs.openbsd.org 2003/04/09 12:00:37
465 [readconf.c]
466 strip trailing whitespace from config lines before parsing.
467 Fixes bz 528; ok markus@
18ae3c67 468 - markus@cvs.openbsd.org 2003/04/12 10:13:57
469 [cipher.c]
470 hide cipher details; ok djm@
45c42d58 471 - markus@cvs.openbsd.org 2003/04/12 10:15:36
472 [misc.c]
473 debug->debug2
c825cd79 474 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
475 [ssh.1]
476 document -V switch, fix wording; ok markus@
3e131a6d 477 - markus@cvs.openbsd.org 2003/04/14 14:17:50
478 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
479 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
927e9f8b 480 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
481 [sftp-int.c]
482 Missing globfree(&g) in process_put() spotted by Vince Brimhall
483 <VBrimhall@novell.com>. ok@ Theo
484 - markus@cvs.openbsd.org 2003/04/16 14:35:27
485 [auth.h]
486 document struct Authctxt; with solar
b9e5aff6 487 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
488 [ssh-keyscan.c]
489 -t in usage(); rogier@quaak.org
9a26a6e2 490 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
491 [sshd.8 sshd_config.5]
492 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
493 Bug #550 and * escaping suggested by jmc@.
09dc8896 494 - david@cvs.openbsd.org 2003/04/30 20:41:07
495 [sshd.8]
496 fix invalid .Pf macro usage introduced in previous commit
497 ok jmc@ mouring@
3566c73c 498 - markus@cvs.openbsd.org 2003/05/11 16:56:48
499 [authfile.c ssh-keygen.c]
500 change key_load_public to try to read a public from:
501 rsa1 private or rsa1 public and ssh2 keys.
502 this makes ssh-keygen -e fail for ssh1 keys more gracefully
503 for example; report from itojun (netbsd pr 20550).
0d942eff 504 - markus@cvs.openbsd.org 2003/05/11 20:30:25
505 [channels.c clientloop.c serverloop.c session.c ssh.c]
506 make channel_new() strdup the 'remote_name' (not the caller); ok theo
43348518 507 - markus@cvs.openbsd.org 2003/05/12 16:55:37
508 [sshconnect2.c]
509 for pubkey authentication try the user keys in the following order:
510 1. agent keys that are found in the config file
511 2. other agent keys
512 3. keys that are only listed in the config file
513 this helps when an agent has many keys, where the server might
514 close the connection before the correct key is used. report & ok pb@
dc109cfe 515 - markus@cvs.openbsd.org 2003/05/12 18:35:18
516 [ssh-keyscan.1]
517 typo: DSA keys are of type ssh-dss; Brian Poole
81466908 518 - markus@cvs.openbsd.org 2003/05/14 00:52:59
519 [ssh2.h]
520 ranges for per auth method messages
521 - djm@cvs.openbsd.org 2003/05/14 01:00:44
522 [sftp.1]
523 emphasise the batchmode functionality and make reference to pubkey auth,
524 both of which are FAQs; ok markus@
802e01b8 525 - markus@cvs.openbsd.org 2003/05/14 02:15:47
526 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
527 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
528 server interops with commercial client; ok jakob@ djm@
72c5fe79 529 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
530 [sftp.1]
531 - better formatting in SYNOPSIS
532 - whitespace at EOL
533 ok djm@
3a39206f 534 - markus@cvs.openbsd.org 2003/05/14 08:57:49
535 [monitor.c]
536 http://bugzilla.mindrot.org/show_bug.cgi?id=560
537 Privsep child continues to run after monitor killed.
538 Pass monitor signals through to child; Darren Tucker
751092f9 539 - (djm) Make portable build with MIT krb5 (some issues remain)
7fceb20d 540 - (djm) Add new UsePAM configuration directive to allow runtime control
541 over usage of PAM. This allows non-root use of sshd when built with
542 --with-pam
817e6d38 543 - (djm) Die screaming if start_pam() is called when UsePAM=no
83ccf11a 544 - (djm) Avoid KrbV leak for MIT Kerberos
b1848832 545 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
fa065de2 546 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
dd3ebb5a 547
91f3aa9b 54820030512
549 - (djm) Redhat spec: Don't install profile.d scripts when not
550 building with GNOME/GTK askpass (patch from bet@rahul.net)
551
5def520a 55220030510
553 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
554 "make install". Patch by roth@feep.net.
ad84c479 555 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
556 problem on Linux (fixes "could not set controlling tty" errors).
05114c74 557 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
558 proper challenge-response module
23ab1f36 559 - (djm) 2-clause license on loginrec.c, with permission from
560 andre@ae-35.com
5def520a 561
43ce025d 56220030504
dd594f99 563 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
564 Patch from vinschen@redhat.com.
43ce025d 565
2cd5dbba 56620030503
567 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
568 by wendyp@cray.com.
569
bf7c1e6c 57020030502
571 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
572 privsep should now work.
73d9dad3 573 - (dtucker) Move handling of bad password authentications into a platform
990278ef 574 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
bf7c1e6c 575
68ece370 57620030429
577 - (djm) Add back radix.o (used by AFS support), after it went missing from
578 Makefile many moons ago
579 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
580 - (djm) Fix blibpath specification for AIX/gcc
581 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
582
ded9dd18 58320030428
584 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
585 hacked code.
586
aceb0423 58720030427
588 - (bal) Bug #541: return; was dropped by mistake. Reported by
589 furrier@iglou.com
c8a50a34 590 - (bal) Since we don't support platforms lacking u_int_64. We may
591 as well clean out some of those evil #ifdefs
9a6fee8b 592 - (bal) auth1.c minor resync while looking at the code.
d7cf277b 593 - (bal) auth2.c same changed as above.
aceb0423 594
0a626302 59520030409
596 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
597 from matth@eecs.berkeley.edu
d35929b5 598 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
ffd7b36b 599 - (djm) OpenBSD CVS Sync
600 - markus@cvs.openbsd.org 2003/04/02 09:48:07
601 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
602 [readconf.h serverloop.c sshconnect2.c]
603 reapply rekeying chage, tested by henning@, ok djm@
16f1b5ca 604 - markus@cvs.openbsd.org 2003/04/02 14:36:26
605 [ssh-keysign.c]
606 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
6c1bc5c5 607 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
608 [progressmeter.c]
609 $OpenBSD$
610 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
611 [progressmeter.c]
612 remove $OpenBSD$, as other *.c does not have it.
806e4c11 613 - markus@cvs.openbsd.org 2003/04/07 08:29:57
614 [monitor_wrap.c]
615 typo: get correct counters; introduced during rekeying change.
2f5b2528 616 - millert@cvs.openbsd.org 2003/04/07 21:58:05
617 [progressmeter.c]
618 The UCB copyright here is incorrect. This code did not originate
619 at UCB, it was written by Luke Mewburn. Updated the copyright at
620 the author's request. markus@ OK
621 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
622 [*.c *.h]
623 rename log() into logit() to avoid name conflict. markus ok, from
624 netbsd
625 - (djm) XXX - Performed locally using:
626 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
70e1f62f 627 - hin@cvs.openbsd.org 2003/04/09 08:23:52
628 [servconf.c]
629 Don't include <krb.h> when compiling with Kerberos 5 support
2f5b2528 630 - (djm) Fix up missing include for packet.c
a3568201 631 - (djm) Fix missed log => logit occurance (reference by function pointer)
0a626302 632
4d0cb2e5 63320030402
634 - (bal) if IP_TOS is not found or broken don't try to compile in
635 packet_set_tos() function call. bug #527
636
a4e5acef 63720030401
638 - (djm) OpenBSD CVS Sync
639 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
640 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
641 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
642 - killed whitespace
643 - new sentence new line
644 - .Bk for arguments
645 ok markus@
177f584b 646 - markus@cvs.openbsd.org 2003/04/01 10:10:23
647 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
648 [readconf.h serverloop.c sshconnect2.c]
649 rekeying bugfixes and automatic rekeying:
650 * both client and server rekey _automatically_
651 (a) after 2^31 packets, because after 2^32 packets
652 the sequence number for packets wraps
653 (b) after 2^(blocksize_in_bits/4) blocks
654 (see: draft-ietf-secsh-newmodes-00.txt)
655 (a) and (b) are _enabled_ by default, and only disabled for known
656 openssh versions, that don't support rekeying properly.
657 * client option 'RekeyLimit'
658 * do not reply to requests during rekeying
659 - markus@cvs.openbsd.org 2003/04/01 10:22:21
660 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
661 [readconf.h serverloop.c sshconnect2.c]
662 backout rekeying changes (for 3.6.1)
519bdfe8 663 - markus@cvs.openbsd.org 2003/04/01 10:31:26
664 [compat.c compat.h kex.c]
665 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
666 tested by ho@ and myself
9dd240a3 667 - markus@cvs.openbsd.org 2003/04/01 10:56:46
668 [version.h]
669 3.6.1
ac01b518 670 - (djm) Crank spec file versions
b32453fe 671 - (djm) Release 3.6.1p1
a4e5acef 672
fd77a40f 67320030326
674 - (djm) OpenBSD CVS Sync
675 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
676 [sftp-server.c]
677 one last fix to the tree: race fix broke stuff; pr 3169;
678 srp@srparish.net, help from djm
679
8021857c 68020030325
681 - (djm) Fix getpeerid support for 64 bit BE systems. From
682 Arnd Bergmann <arndb@de.ibm.com>
683
cdb64c4d 68420030324
685 - (djm) OpenBSD CVS Sync
686 - markus@cvs.openbsd.org 2003/03/23 19:02:00
687 [monitor.c]
688 unbreak rekeying for privsep; ok millert@
689 - Release 3.6p1
62086365 690 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
691 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
cdb64c4d 692
0b202697 693$Id$
This page took 0.525815 seconds and 5 git commands to generate.