]> andersk Git - openssh.git/blame - ChangeLog
20030622
[openssh.git] / ChangeLog
CommitLineData
63a556df 120030622
c1ffd4bd 2 - (dtucker) OpenBSD CVS Sync
63a556df 3 - markus@cvs.openbsd.org 2003/06/21 09:14:05
c1ffd4bd 4 [regress/reconfigure.sh]
63a556df 5 missing $SUDO; from dtucker@zip.com.au
c1ffd4bd 6 [ssh-rsa.c]
7 backout last change, since it violates pkcs#1
8 switch to share/misc/license.template
1891396b 9 - djm@cvs.openbsd.org 2003/06/20 05:47:58
10 [sshd_config.5]
11 sync description of protocol 2 cipher proposal; ok markus
4db4d313 12 - djm@cvs.openbsd.org 2003/06/20 05:48:21
13 [sshd_config]
14 sync some implemented options; ok markus@
63a556df 15 - (dtucker) [regress/authorized_keys_root] Remove temp data file from CVS.
39ef3618 16 - (dtucker) [openbsd-compat/setproctitle.c] Ensure SPT_TYPE is defined before
17 testing its value.
63a556df 18
b8e04133 1920030618
20 - (djm) OpenBSD CVS Sync
21 - markus@cvs.openbsd.org 2003/06/12 07:57:38
22 [monitor.c sshlogin.c sshpty.c]
23 typos; dtucker at zip.com.au
b9ad9d13 24 - djm@cvs.openbsd.org 2003/06/12 12:22:47
25 [LICENCE]
26 mention more copyright holders; ok markus@
1fb23629 27 - nino@cvs.openbsd.org 2003/06/12 15:34:09
28 [scp.c]
29 Typo. Ok markus@.
244e796f 30 - markus@cvs.openbsd.org 2003/06/12 19:12:03
31 [scard.c scard.h ssh-agent.c ssh.c]
32 add sc_get_key_label; larsch at trustcenter.de; bugzilla#591
9250058a 33 - markus@cvs.openbsd.org 2003/06/16 08:22:35
34 [ssh-rsa.c]
35 make sure the signature has at least the expected length (don't
36 insist on len == hlen + oidlen, since this breaks some smartcards)
37 bugzilla #592; ok djm@
360a4aae 38 - markus@cvs.openbsd.org 2003/06/16 10:22:45
39 [ssh-add.c]
40 print out key comment on each prompt; make ssh-askpass more useable; ok djm@
0a59bd6b 41 - markus@cvs.openbsd.org 2003/06/17 18:14:23
42 [cipher-ctr.c]
43 use license from /usr/share/misc/license.template for new code
1d6c0b69 44 - (dtucker) [reconfigure.sh rekey.sh sftp-badcmds.sh]
45 Import new regression tests from OpenBSD
d4d84f5f 46 - (dtucker) [regress/copy.1 regress/copy.2] Remove temp data files from CVS.
ed49cc81 47 - (dtucker) OpenBSD CVS Sync (regress/)
48 - markus@cvs.openbsd.org 2003/04/02 12:21:13
49 [Makefile]
50 enable rekey test
2c670155 51 - djm@cvs.openbsd.org 2003/04/04 09:34:22
52 [Makefile sftp-cmds.sh]
53 More regression tests, including recent directory rename bug; ok markus@
737447ad 54 - markus@cvs.openbsd.org 2003/05/14 22:08:27
55 [ssh-com-client.sh ssh-com-keygen.sh ssh-com-sftp.sh ssh-com.sh]
56 test against some new commerical versions
68df2aa0 57 - mouring@cvs.openbsd.org 2003/05/15 04:07:12
58 [sftp-cmds.sh]
59 Advanced put/get testing for sftp. OK @djm
eb9bf761 60 - markus@cvs.openbsd.org 2003/06/12 15:40:01
61 [try-ciphers.sh]
62 add ctr
39c0191e 63 - markus@cvs.openbsd.org 2003/06/12 15:43:32
64 [Makefile]
65 test -HUP; dtucker at zip.com.au
b8e04133 66
f5827134 6720030614
68 - (djm) Update license on fake-rfc2553.[ch]; ok itojun@
69
be193d89 7020030611
c12c6ef8 71 - (djm) Mention portable copyright holders in LICENSE
e52ca1e5 72 - (djm) Put licenses on substantial header files
8cb3fa9d 73 - (djm) Sync LICENSE against OpenBSD
be193d89 74 - (djm) OpenBSD CVS Sync
75 - jmc@cvs.openbsd.org 2003/06/10 09:12:11
76 [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5]
77 [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
78 - section reorder
79 - COMPATIBILITY merge
80 - macro cleanup
81 - kill whitespace at EOL
82 - new sentence, new line
83 ssh pages ok markus@
0daa6547 84 - deraadt@cvs.openbsd.org 2003/06/10 22:20:52
85 [packet.c progressmeter.c]
86 mostly ansi cleanup; pval ok
1432b5c4 87 - jakob@cvs.openbsd.org 2003/06/11 10:16:16
88 [sshconnect.c]
89 clean up check_host_key() and improve SSHFP feedback. ok markus@
cc263107 90 - jakob@cvs.openbsd.org 2003/06/11 10:18:47
91 [dns.c]
92 sync with check_host_key() change
ca719034 93 - djm@cvs.openbsd.org 2003/06/11 11:18:38
94 [authfd.c authfd.h ssh-add.c ssh-agent.c]
95 make agent constraints (lifetime, confirm) work with smartcard keys;
96 ok markus@
be193d89 97
98
8a547250 9920030609
100 - (djm) Sync README.smartcard with OpenBSD -current
a1864983 101 - (djm) Re-merge OpenSC info into README.smartcard
8a547250 102
f5db6a03 10320030606
104 - (dtucker) [uidswap.c] Fix setreuid and add missing args to fatal(). ok djm@
105
02e2a074 10620030605
107 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
108 canohost.c changes.
688eed4a 109 - (djm) Implement paranoid priv dropping checks, based on:
110 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
111 Proceedings of USENIX Security Symposium 2002
d6bd2b5a 112 - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
52d58495 113 - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
57c917f8 114 - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
115 Patch from larsch@trustcenter.de
7b7f164b 116 - (djm) Bug #589 - scard-opensc: load only keys with a private keys
117 Patch from larsch@trustcenter.de
4ed465ec 118 - (dtucker) Add includes.h to fake-rfc2553.c so it will build.
e932f447 119 - (dtucker) Define EAI_NONAME in fake-rfc2553.h (used by fake-rfc2553.c).
02e2a074 120
b08a39ff 12120030604
d60e487c 122 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
123 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
8acdec60 124 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
11f1e60e 125 Patch from larsch@trustcenter.de; ok markus@
126 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
127 larsch@trustcenter.de; ok markus@
d453a600 128 - (djm) OpenBSD CVS Sync
129 - djm@cvs.openbsd.org 2003/06/04 08:25:18
130 [sshconnect.c]
131 disable challenge/response and keyboard-interactive auth methods
132 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
133 bz #580; ok markus@
ee50371d 134 - djm@cvs.openbsd.org 2003/06/04 10:23:48
135 [sshd.c]
136 remove duplicated group-dropping code; ok markus@
b08a39ff 137 - djm@cvs.openbsd.org 2003/06/04 12:03:59
138 [serverloop.c]
139 remove bitrotten commet; ok markus@
cf3248b8 140 - djm@cvs.openbsd.org 2003/06/04 12:18:49
141 [scp.c]
142 ansify; ok markus@
0f764b2f 143 - djm@cvs.openbsd.org 2003/06/04 12:40:39
144 [scp.c]
145 kill ssh process upon receipt of signal, bz #241.
146 based on patch from esb AT hawaii.edu; ok markus@
1b558925 147 - djm@cvs.openbsd.org 2003/06/04 12:41:22
148 [sftp.c]
149 kill ssh process on receipt of signal; ok markus@
fba33e81 150 - (djm) Update to fix of bug #584: lock card before return.
151 From larsch@trustcenter.de
8d9bb5dd 152 - (djm) Always use mysignal() for SIGALRM
d60e487c 153
3a2b2b44 15420030603
155 - (djm) Replace setproctitle replacement with code derived from
156 UCB sendmail
c5a7d788 157 - (djm) OpenBSD CVS Sync
158 - markus@cvs.openbsd.org 2003/06/02 09:17:34
159 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
160 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
161 [sshd_config.5]
162 deprecate VerifyReverseMapping since it's dangerous if combined
163 with IP based access control as noted by Mike Harding; replace with
164 a UseDNS option, UseDNS is on by default and includes the
165 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
166 ok deraadt@, djm@
d981089c 167 - millert@cvs.openbsd.org 2003/06/03 02:56:16
168 [scp.c]
169 Remove the advertising clause in the UCB license which Berkeley
170 rescinded 22 July 1999. Proofed by myself and Theo.
c5a7d788 171 - (djm) Fix portable-specific uses of verify_reverse_mapping too
3e67f7df 172 - (djm) Sync openbsd-compat with OpenBSD CVS.
484d59c7 173 - No more 4-term BSD licenses in linked code
5d8ca8c7 174 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
3a2b2b44 175
aff561f9 17620030602
177 - (djm) Fix segv from bad reordering in auth-pam.c
416c732d 178 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
179 clobber
1b7342ab 180 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
181 CVS ID.
8862e142 182 - (djm) Remove "noip6" option from RedHat spec file. This may now be
183 set at runtime using AddressFamily option.
58ba3cb7 184 - (djm) Fix use of macro before #define in cipher-aes.c
382fe2fa 185 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
b0545fe6 186 - (djm) OpenBSD CVS Sync
187 - djm@cvs.openbsd.org 2003/05/26 12:54:40
188 [sshconnect.c]
189 fix format strings; ok markus@
fa5120a0 190 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
191 [sshd.c uidswap.c]
192 seteuid and setegid; markus ok
0f92946c 193 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
194 [ssh_config.5]
195 VerifyHostKeyDNS is v2 only. ok markus@
aff561f9 196
4f178be8 19720030530
198 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
199 roumenpetrov.info
eabb99c6 200 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
4f178be8 201
4881aebb 20220030526
203 - (djm) Avoid auth2-chall.c warning when compiling without
204 PAM, BSD_AUTH and SKEY
205
5b0fe364 20620030525
207- (djm) OpenBSD CVS Sync
208 - djm@cvs.openbsd.org 2003/05/24 09:02:22
209 [log.c]
210 pass logged data through strnvis; ok markus
b9ed513a 211 - djm@cvs.openbsd.org 2003/05/24 09:30:40
212 [authfile.c monitor.c sftp-common.c sshpty.c]
213 cast some types for printing; ok markus@
5b0fe364 214
44c78996 21520030524
216 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
217
d83ebe4a 21820030523
219 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
220 encoding (which encodes many more characters)
bd47824b 221 - OpenBSD CVS Sync
222 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
223 [sftp.1]
224 - new sentence, new line
225 - added .Xr's
226 - typos
227 ok djm@
3cbc677d 228 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
229 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
230 new sentence, new line
da54f5be 231 - djm@cvs.openbsd.org 2003/05/23 08:29:30
232 [sshconnect.c]
233 fix leak; ok markus@
d83ebe4a 234
c453493f 23520030520
236 - (djm) OpenBSD CVS Sync
237 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
238 [log.c]
239 use syslog_r() in a signal handler called place; markus ok
79d4fc55 240 - (djm) Configure logic to detect syslog_r and friends
c453493f 241
acb50584 24220030519
243 - (djm) Sync auth-pam.h with what we actually implement
244
24520030518
5ff453c0 246 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
247 recent merge
f811e52a 248 - (djm) OpenBSD CVS Sync
249 - djm@cvs.openbsd.org 2003/05/16 03:27:12
250 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
251 add AddressFamily option to ssh_config (like -4, -6 on commandline).
252 Portable bug #534; ok markus@
013b1214 253 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
254 [auth-rhosts.c]
255 just in case, put numbers to sscanf %s arg.
25b66522 256 - markus@cvs.openbsd.org 2003/05/17 04:27:52
257 [cipher.c cipher-ctr.c myproposal.h]
258 experimental support for aes-ctr modes from
259 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
260 ok djm@
25351757 261 - (djm) Remove IPv4 by default hack now that we can specify AF in config
3bf784bc 262 - (djm) Tidy and trim TODO
bffa6723 263 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
9901cb37 264 - (djm) Big KNF on openbsd-compat/
f1da2b8b 265 - (djm) KNF on md5crypt.[ch]
266 - (djm) KNF on auth-sia.[ch]
5ff453c0 267
f123055b 26820030517
269 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
270
c936c243 27120030516
272 - (djm) OpenBSD CVS Sync
273 - djm@cvs.openbsd.org 2003/05/15 13:52:10
274 [ssh.c]
275 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
276 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
a2144546 277 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
278 [readconf.c servconf.c]
279 warn for unsupported config option. ok markus@
5bdfde81 280 - markus@cvs.openbsd.org 2003/05/15 14:09:21
281 [auth2-krb5.c]
282 fix 64bit issue; report itojun@
09ab3296 283 - djm@cvs.openbsd.org 2003/05/15 14:55:25
284 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
285 add a ConnectTimeout option to ssh, based on patch from
286 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
b06b11ad 287 - (djm) Add warning for UsePAM when built without PAM support
7be625e1 288 - (djm) A few type mismatch fixes from Bug #565
0eb6370a 289 - (djm) Guard free_pam_environment against NULL argument. Works around
290 HP/UX PAM problems debugged by dtucker
c936c243 291
7efc7f57 29220030515
293 - (djm) OpenBSD CVS Sync
294 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
295 [ssh-agent.1]
296 setup -> set up;
297 from wiz@netbsd
21289cd0 298 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
299 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
300 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
301 add experimental support for verifying hos keys using DNS as described
302 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
303 ok markus@ and henning@
16a79097 304 - markus@cvs.openbsd.org 2003/05/14 22:24:42
305 [clientloop.c session.c ssh.1]
306 allow to send a BREAK to the remote system; ok various
b8c2031b 307 - markus@cvs.openbsd.org 2003/05/15 00:28:28
308 [sshconnect2.c]
309 cleanup unregister of per-method packet handlers; ok djm@
d0ec7f42 310 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
311 [readconf.c readconf.h servconf.c servconf.h]
312 always parse kerberos options. ok djm@ markus@
b414a17b 313 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
314 [dns.c]
315 add missing freerrset
3b6e3da9 316 - markus@cvs.openbsd.org 2003/05/15 03:08:29
317 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
318 split out custom EVP ciphers
02159d9b 319 - djm@cvs.openbsd.org 2003/05/15 03:10:52
320 [ssh-keygen.c]
321 avoid warning; ok jakob@
4a26f5c5 322 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
323 [sftp-int.c]
324 Make put/get (globed and nonglobed) code more consistant. OK djm@
c44f10c6 325 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
dc69f53c 326 [sftp-int.c sftp.c]
c44f10c6 327 Teach ls how to display multiple column display and allow users
328 to return to single column format via 'ls -1'. OK @djm
1457e7ff 329 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
330 [readconf.c servconf.c]
331 disable kerberos when not supported. ok markus@
861f0365 332 - markus@cvs.openbsd.org 2003/05/15 04:08:41
333 [ssh.1]
334 ~B is ssh2 only
d0ec7f42 335 - (djm) Always parse UsePAM
3e05e934 336 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
4460d509 337 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
86ee6794 338 - (djm) Tidy Makefile clean targets
2636769c 339 - (djm) Adapt README.dns for portable
2d2e4a34 340 - (djm) Avoid uuencode.c warnings
1457e7ff 341 - (djm) Enable UsePAM when built --with-pam
67467c30 342 - (djm) Only build getrrsetbyname replacement when using --with-dns
f420d2ba 343 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
344 correctly)
3c49ef10 345 - (djm) Bug #444: Wrong paths after reconfigure
321735c7 346 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
f420d2ba 347
dd3ebb5a 34820030514
349 - (djm) Bug #117: Don't lie to PAM about username
0608f8a7 350 - (djm) RCSID sync w/ OpenBSD
204fde99 351 - (djm) OpenBSD CVS Sync
352 - djm@cvs.openbsd.org 2003/04/09 12:00:37
353 [readconf.c]
354 strip trailing whitespace from config lines before parsing.
355 Fixes bz 528; ok markus@
18ae3c67 356 - markus@cvs.openbsd.org 2003/04/12 10:13:57
357 [cipher.c]
358 hide cipher details; ok djm@
45c42d58 359 - markus@cvs.openbsd.org 2003/04/12 10:15:36
360 [misc.c]
361 debug->debug2
c825cd79 362 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
363 [ssh.1]
364 document -V switch, fix wording; ok markus@
3e131a6d 365 - markus@cvs.openbsd.org 2003/04/14 14:17:50
366 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
367 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
927e9f8b 368 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
369 [sftp-int.c]
370 Missing globfree(&g) in process_put() spotted by Vince Brimhall
371 <VBrimhall@novell.com>. ok@ Theo
372 - markus@cvs.openbsd.org 2003/04/16 14:35:27
373 [auth.h]
374 document struct Authctxt; with solar
b9e5aff6 375 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
376 [ssh-keyscan.c]
377 -t in usage(); rogier@quaak.org
9a26a6e2 378 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
379 [sshd.8 sshd_config.5]
380 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
381 Bug #550 and * escaping suggested by jmc@.
09dc8896 382 - david@cvs.openbsd.org 2003/04/30 20:41:07
383 [sshd.8]
384 fix invalid .Pf macro usage introduced in previous commit
385 ok jmc@ mouring@
3566c73c 386 - markus@cvs.openbsd.org 2003/05/11 16:56:48
387 [authfile.c ssh-keygen.c]
388 change key_load_public to try to read a public from:
389 rsa1 private or rsa1 public and ssh2 keys.
390 this makes ssh-keygen -e fail for ssh1 keys more gracefully
391 for example; report from itojun (netbsd pr 20550).
0d942eff 392 - markus@cvs.openbsd.org 2003/05/11 20:30:25
393 [channels.c clientloop.c serverloop.c session.c ssh.c]
394 make channel_new() strdup the 'remote_name' (not the caller); ok theo
43348518 395 - markus@cvs.openbsd.org 2003/05/12 16:55:37
396 [sshconnect2.c]
397 for pubkey authentication try the user keys in the following order:
398 1. agent keys that are found in the config file
399 2. other agent keys
400 3. keys that are only listed in the config file
401 this helps when an agent has many keys, where the server might
402 close the connection before the correct key is used. report & ok pb@
dc109cfe 403 - markus@cvs.openbsd.org 2003/05/12 18:35:18
404 [ssh-keyscan.1]
405 typo: DSA keys are of type ssh-dss; Brian Poole
81466908 406 - markus@cvs.openbsd.org 2003/05/14 00:52:59
407 [ssh2.h]
408 ranges for per auth method messages
409 - djm@cvs.openbsd.org 2003/05/14 01:00:44
410 [sftp.1]
411 emphasise the batchmode functionality and make reference to pubkey auth,
412 both of which are FAQs; ok markus@
802e01b8 413 - markus@cvs.openbsd.org 2003/05/14 02:15:47
414 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
415 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
416 server interops with commercial client; ok jakob@ djm@
72c5fe79 417 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
418 [sftp.1]
419 - better formatting in SYNOPSIS
420 - whitespace at EOL
421 ok djm@
3a39206f 422 - markus@cvs.openbsd.org 2003/05/14 08:57:49
423 [monitor.c]
424 http://bugzilla.mindrot.org/show_bug.cgi?id=560
425 Privsep child continues to run after monitor killed.
426 Pass monitor signals through to child; Darren Tucker
751092f9 427 - (djm) Make portable build with MIT krb5 (some issues remain)
7fceb20d 428 - (djm) Add new UsePAM configuration directive to allow runtime control
429 over usage of PAM. This allows non-root use of sshd when built with
430 --with-pam
817e6d38 431 - (djm) Die screaming if start_pam() is called when UsePAM=no
83ccf11a 432 - (djm) Avoid KrbV leak for MIT Kerberos
b1848832 433 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
fa065de2 434 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
dd3ebb5a 435
91f3aa9b 43620030512
437 - (djm) Redhat spec: Don't install profile.d scripts when not
438 building with GNOME/GTK askpass (patch from bet@rahul.net)
439
5def520a 44020030510
441 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
442 "make install". Patch by roth@feep.net.
ad84c479 443 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
444 problem on Linux (fixes "could not set controlling tty" errors).
05114c74 445 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
446 proper challenge-response module
23ab1f36 447 - (djm) 2-clause license on loginrec.c, with permission from
448 andre@ae-35.com
5def520a 449
43ce025d 45020030504
dd594f99 451 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
452 Patch from vinschen@redhat.com.
43ce025d 453
2cd5dbba 45420030503
455 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
456 by wendyp@cray.com.
457
bf7c1e6c 45820030502
459 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
460 privsep should now work.
73d9dad3 461 - (dtucker) Move handling of bad password authentications into a platform
990278ef 462 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
bf7c1e6c 463
68ece370 46420030429
465 - (djm) Add back radix.o (used by AFS support), after it went missing from
466 Makefile many moons ago
467 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
468 - (djm) Fix blibpath specification for AIX/gcc
469 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
470
ded9dd18 47120030428
472 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
473 hacked code.
474
aceb0423 47520030427
476 - (bal) Bug #541: return; was dropped by mistake. Reported by
477 furrier@iglou.com
c8a50a34 478 - (bal) Since we don't support platforms lacking u_int_64. We may
479 as well clean out some of those evil #ifdefs
9a6fee8b 480 - (bal) auth1.c minor resync while looking at the code.
d7cf277b 481 - (bal) auth2.c same changed as above.
aceb0423 482
0a626302 48320030409
484 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
485 from matth@eecs.berkeley.edu
d35929b5 486 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
ffd7b36b 487 - (djm) OpenBSD CVS Sync
488 - markus@cvs.openbsd.org 2003/04/02 09:48:07
489 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
490 [readconf.h serverloop.c sshconnect2.c]
491 reapply rekeying chage, tested by henning@, ok djm@
16f1b5ca 492 - markus@cvs.openbsd.org 2003/04/02 14:36:26
493 [ssh-keysign.c]
494 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
6c1bc5c5 495 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
496 [progressmeter.c]
497 $OpenBSD$
498 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
499 [progressmeter.c]
500 remove $OpenBSD$, as other *.c does not have it.
806e4c11 501 - markus@cvs.openbsd.org 2003/04/07 08:29:57
502 [monitor_wrap.c]
503 typo: get correct counters; introduced during rekeying change.
2f5b2528 504 - millert@cvs.openbsd.org 2003/04/07 21:58:05
505 [progressmeter.c]
506 The UCB copyright here is incorrect. This code did not originate
507 at UCB, it was written by Luke Mewburn. Updated the copyright at
508 the author's request. markus@ OK
509 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
510 [*.c *.h]
511 rename log() into logit() to avoid name conflict. markus ok, from
512 netbsd
513 - (djm) XXX - Performed locally using:
514 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
70e1f62f 515 - hin@cvs.openbsd.org 2003/04/09 08:23:52
516 [servconf.c]
517 Don't include <krb.h> when compiling with Kerberos 5 support
2f5b2528 518 - (djm) Fix up missing include for packet.c
a3568201 519 - (djm) Fix missed log => logit occurance (reference by function pointer)
0a626302 520
4d0cb2e5 52120030402
522 - (bal) if IP_TOS is not found or broken don't try to compile in
523 packet_set_tos() function call. bug #527
524
a4e5acef 52520030401
526 - (djm) OpenBSD CVS Sync
527 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
528 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
529 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
530 - killed whitespace
531 - new sentence new line
532 - .Bk for arguments
533 ok markus@
177f584b 534 - markus@cvs.openbsd.org 2003/04/01 10:10:23
535 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
536 [readconf.h serverloop.c sshconnect2.c]
537 rekeying bugfixes and automatic rekeying:
538 * both client and server rekey _automatically_
539 (a) after 2^31 packets, because after 2^32 packets
540 the sequence number for packets wraps
541 (b) after 2^(blocksize_in_bits/4) blocks
542 (see: draft-ietf-secsh-newmodes-00.txt)
543 (a) and (b) are _enabled_ by default, and only disabled for known
544 openssh versions, that don't support rekeying properly.
545 * client option 'RekeyLimit'
546 * do not reply to requests during rekeying
547 - markus@cvs.openbsd.org 2003/04/01 10:22:21
548 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
549 [readconf.h serverloop.c sshconnect2.c]
550 backout rekeying changes (for 3.6.1)
519bdfe8 551 - markus@cvs.openbsd.org 2003/04/01 10:31:26
552 [compat.c compat.h kex.c]
553 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
554 tested by ho@ and myself
9dd240a3 555 - markus@cvs.openbsd.org 2003/04/01 10:56:46
556 [version.h]
557 3.6.1
ac01b518 558 - (djm) Crank spec file versions
b32453fe 559 - (djm) Release 3.6.1p1
a4e5acef 560
fd77a40f 56120030326
562 - (djm) OpenBSD CVS Sync
563 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
564 [sftp-server.c]
565 one last fix to the tree: race fix broke stuff; pr 3169;
566 srp@srparish.net, help from djm
567
8021857c 56820030325
569 - (djm) Fix getpeerid support for 64 bit BE systems. From
570 Arnd Bergmann <arndb@de.ibm.com>
571
cdb64c4d 57220030324
573 - (djm) OpenBSD CVS Sync
574 - markus@cvs.openbsd.org 2003/03/23 19:02:00
575 [monitor.c]
576 unbreak rekeying for privsep; ok millert@
577 - Release 3.6p1
62086365 578 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
579 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
cdb64c4d 580
0b202697 581$Id$
This page took 0.452327 seconds and 5 git commands to generate.