]> andersk Git - openssh.git/blame - ChangeLog
- markus@cvs.openbsd.org 2002/07/29 18:57:30
[openssh.git] / ChangeLog
CommitLineData
8a48a7ef 120020731
2 - (bal) OpenBSD CVS Sync
3 - markus@cvs.openbsd.org 2002/07/24 16:11:18
4 [hostfile.c hostfile.h sshconnect.c]
5 print out all known keys for a host if we get a unknown host key,
6 see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4
7
8 the ssharp mitm tool attacks users in a similar way, so i'd like to
9 pointed out again:
10 A MITM attack is always possible if the ssh client prints:
11 The authenticity of host 'bla' can't be established.
12 (protocol version 2 with pubkey authentication allows you to detect
13 MITM attacks)
5cb5518b 14 - mouring@cvs.openbsd.org 2002/07/25 01:16:59
15 [sftp.c]
16 FallBackToRsh does not exist anywhere else. Remove it from here.
17 OK deraadt.
567a05bf 18 - markus@cvs.openbsd.org 2002/07/29 18:57:30
19 [sshconnect.c]
20 print file:line
8a48a7ef 21
13979d47 2220020730
23 - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de
24
d228d9dd 2520020728
26 - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar
16c4a972 27 - (stevesk) [CREDITS] solar
75131bbd 28 - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned
29 char arg.
d228d9dd 30
d40af5fa 3120020725
32 - (djm) Remove some cruft from INSTALL
d91b4743 33 - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/
d40af5fa 34
56b54901 3520020723
36 - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger.
918ffb0b 37 - (bal) sync ID w/ ssh-agent.c
516f0d7d 38 - (bal) OpenBSD Sync
39 - markus@cvs.openbsd.org 2002/07/19 15:43:33
40 [log.c log.h session.c sshd.c]
41 remove fatal cleanups after fork; based on discussions with and code
42 from solar.
5d185586 43 - stevesk@cvs.openbsd.org 2002/07/19 17:42:40
44 [ssh.c]
45 display a warning from ssh when XAuthLocation does not exist or xauth
46 returned no authentication data. ok markus@
30998af1 47 - stevesk@cvs.openbsd.org 2002/07/21 18:32:20
48 [auth-options.c]
49 unneeded includes
dbc728ff 50 - stevesk@cvs.openbsd.org 2002/07/21 18:34:43
51 [auth-options.h]
52 remove invalid comment
97686bf9 53 - markus@cvs.openbsd.org 2002/07/22 11:03:06
54 [session.c]
55 fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors;
d341742a 56 - stevesk@cvs.openbsd.org 2002/07/22 17:32:56
57 [monitor.c]
58 u_int here; ok provos@
67f04db1 59 - stevesk@cvs.openbsd.org 2002/07/23 16:03:10
60 [sshd.c]
61 utmp_len is unsigned; display error consistent with other options.
62 ok markus@
0df3a240 63 - stevesk@cvs.openbsd.org 2002/07/15 17:15:31
64 [uidswap.c]
65 little more debugging; ok markus@
d341742a 66
21c2c5cd 6720020722
68 - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk
a93bd14c 69 - (stevesk) [xmmap.c] missing prototype for fatal()
ccbb983c 70 - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync
71 with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com.
d262b7f2 72 - (bal) [configure.ac] Missing ;; from cray patch.
30eab01d 73 - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines
74 into it's own header.
ee48c949 75 - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be
76 freed by the caller; add free_pam_environment() and use it.
1d3f4ae7 77 - (stevesk) [auth-pam.c] typo in comment
21c2c5cd 78
b992432e 7920020721
80 - (stevesk) [auth-pam.c] merge cosmetic changes from solar's
81 openssh-3.4p1-owl-password-changing.diff
277f55cf 82 - (stevesk) [auth-pam.c] merge rest of solar's PAM patch;
83 PAM_NEW_AUTHTOK_REQD remains in #if 0 for now.
f7808a93 84 - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch
85 warning on pam_conv struct conversation function.
337dde6b 86 - (stevesk) [auth-pam.h] license
8565f28e 87 - (stevesk) [auth-pam.h] unneeded include
e9b2c23d 88 - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h
b992432e 89
ce88d9df 9020020720
91 - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng().
92
4379c0e5 9320020719
94 - (tim) [contrib/solaris/buildpkg.sh] create privsep user/group if needed.
95 Patch by dtucker@zip.com.au
f75ca46d 96 - (tim) [configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au
4379c0e5 97
45491100 9820020718
99 - (tim) [defines.h] Bug 313 patch by dirk.meyer@dinoex.sub.org
100 - (tim) [monitor_mm.c] add missing declaration for xmmap(). Reported
101 by ayamura@ayamura.org
1cbbe6c8 102 - (tim) [configure.ac] Bug 267 rework int64_t test.
5749e709 103 - (tim) [includes.h] Bug 267 add stdint.h
45491100 104
dd3943d0 10520020717
106 - (bal) aixbff package updated by dtucker@zip.com.au
2bf42e4a 107 - (tim) [configure.ac] change how we do paths in AC_PATH_PROGS tests
108 for autoconf 2.53. Based on a patch by jrj@purdue.edu
dd3943d0 109
8fc47887 11020020716
111 - (tim) [contrib/solaris/opensshd.in] Only kill sshd if .pid file found
112
c750d869 11320020715
114 - (bal) OpenBSD CVS Sync
115 - itojun@cvs.openbsd.org 2002/07/12 13:29:09
116 [sshconnect.c]
117 print connect failure during debugging mode.
a2f883ce 118 - markus@cvs.openbsd.org 2002/07/12 15:50:17
119 [cipher.c]
120 EVP_CIPH_CUSTOM_IV for our own rijndael
2d199535 121 - (bal) Remove unused tty defined in do_setusercontext() pointed out by
122 dtucker@zip.com.au plus a a more KNF since I am near it.
846be3f4 123 - (bal) Privsep user creation support in Solaris buildpkg.sh by
124 dtucker@zip.com.au
c750d869 125
798c5808 12620020714
127 - (tim) [Makefile.in] replace "id sshd" with "sshd -t"
4165b82e 128 - (bal/tim) [acconfig.h configure.ac monitor_mm.c servconf.c
129 openbsd-compat/Makefile.in] support compression on platforms that
130 have no/broken MAP_ANON. Moved code to openbsd-compat/xmmap.c
131 Based on patch from nalin@redhat.com of code extracted from Owl's package
5fd8087a 132 - (tim) [ssh_prng_cmds.in] Bug 323 arp -n flag doesn't exist under Solaris.
133 report by chris@by-design.net
fdebdd4f 134 - (tim) [loginrec.c] Bug 347: Fix typo (WTMPX_FILE) report by rodney@bond.net
d80063fe 135 - (tim) [loginrec.c] Bug 348: add missing found = 1; to wtmpx_islogin()
136 report by rodney@bond.net
798c5808 137
6b2a3595 13820020712
139 - (tim) [Makefile.in] quiet down install-files: and check-user:
3085601b 140 - (tim) [configure.ac] remove unused filepriv line
6b2a3595 141
249f9903 14220020710
143 - (tim) [contrib/cygwin/ssh-host-config] explicitely sets the permissions
144 on /var/empty to 755 Patch by vinschen@redhat.com
6f901f8e 145 - (bal) OpenBSD CVS Sync
146 - itojun@cvs.openbsd.org 2002/07/09 11:56:50
147 [sshconnect.c]
148 silently try next address on connect(2). markus ok
59c825e1 149 - itojun@cvs.openbsd.org 2002/07/09 11:56:27
150 [canohost.c]
151 suppress log on reverse lookup failiure, as there's no real value in
152 doing so.
153 markus ok
aab5431b 154 - itojun@cvs.openbsd.org 2002/07/09 12:04:02
155 [sshconnect.c]
156 ed static function (less warnings)
94ad46d1 157 - stevesk@cvs.openbsd.org 2002/07/09 17:46:25
158 [sshd_config.5]
159 clarify no preference ordering in protocol list; ok markus@
9bd68577 160 - itojun@cvs.openbsd.org 2002/07/10 10:28:15
161 [sshconnect.c]
162 bark if all connection attempt fails.
09683edf 163 - deraadt@cvs.openbsd.org 2002/07/10 17:53:54
164 [rijndael.c]
165 use right sizeof in memcpy; markus ok
249f9903 166
e6f15ed1 16720020709
168 - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platforms
169 lacking that concept can share it. Patch by vinschen@redhat.com
170
4f9d6706 17120020708
172 - (tim) [openssh/contrib/solaris/buildpkg.sh] add PKG_INSTALL_ROOT to
173 work in a jumpstart environment. patch by kbrint@rufus.net
b451e27b 174 - (tim) [Makefile.in] workaround for broken pakadd on some systems.
cda1ebcb 175 - (tim) [configure.ac] fix libc89 utimes test. Mention default path for
176 --with-privsep-path=
4f9d6706 177
ac74561e 17820020707
179 - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH)
94d8258b 180 - (tim) [acconfig.h configure.ac sshd.c]
181 s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/
d41f8eed 182 - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes
183 patch from vinschen@redhat.com
0b832146 184 - (bal) [realpath.c] Updated with OpenBSD tree.
da2499f5 185 - (bal) OpenBSD CVS Sync
186 - deraadt@cvs.openbsd.org 2002/07/04 04:15:33
187 [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c]
188 patch memory leaks; grendel@zeitbombe.org
e1feb9bf 189 - deraadt@cvs.openbsd.org 2002/07/04 08:12:15
190 [channels.c packet.c]
191 blah blah minor nothing as i read and re-read and re-read...
eb9f2fab 192 - markus@cvs.openbsd.org 2002/07/04 10:41:47
193 [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c]
194 don't allocate, copy, and discard if there is not interested in the data;
195 ok deraadt@
4394a17f 196 - deraadt@cvs.openbsd.org 2002/07/06 01:00:49
197 [log.c]
198 KNF
50d2fbbc 199 - deraadt@cvs.openbsd.org 2002/07/06 01:01:26
200 [ssh-keyscan.c]
201 KNF, realloc fix, and clean usage
12a3f2c3 202 - stevesk@cvs.openbsd.org 2002/07/06 17:47:58
203 [ssh-keyscan.c]
204 unused variable
41545cb6 205 - (bal) Minor KNF on ssh-keyscan.c
ac74561e 206
0764e748 20720020705
208 - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs.
209 Reported by Darren Tucker <dtucker@zip.com.au>
e12659f4 210 - (tim) [contrib/cygwin/ssh-host-config] double slash corrction
211 from vinschen@redhat.com
0764e748 212
64c0ce80 21320020704
214 - (bal) Limit data to TTY for AIX only (Newer versions can't handle the
215 faster data rate) Bug #124
375c1dee 216 - (bal) glob.c defines TILDE and AIX also defines it. #undef it first.
217 bug #265
ff2de800 218 - (bal) One too many nulls in ports-aix.c
64c0ce80 219
d2f95449 22020020703
221 - (bal) Updated contrib/cygwin/ patch by vinschen@redhat.com
619a6aff 222 - (bal) minor correction to utimes() replacement. Patch by
223 onoe@sm.sony.co.jp
f11fe301 224 - OpenBSD CVS Sync
225 - markus@cvs.openbsd.org 2002/06/27 08:49:44
226 [dh.c ssh-keyscan.c sshconnect.c]
227 more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@
181d6635 228 - deraadt@cvs.openbsd.org 2002/06/27 09:08:00
229 [monitor.c]
230 improve mm_zalloc check; markus ok
30e37ee6 231 - deraadt@cvs.openbsd.org 2002/06/27 10:35:47
232 [auth2-none.c monitor.c sftp-client.c]
233 use xfree()
c8f94200 234 - stevesk@cvs.openbsd.org 2002/06/27 19:49:08
235 [ssh-keyscan.c]
236 use convtime(); ok markus@
a64d3560 237 - millert@cvs.openbsd.org 2002/06/28 01:49:31
238 [monitor_mm.c]
239 tree(3) wants an int return value for its compare functions and
240 the difference between two pointers is not an int. Just do the
241 safest thing and store the result in a long and then return 0,
242 -1, or 1 based on that result.
405a0d43 243 - deraadt@cvs.openbsd.org 2002/06/28 01:50:37
244 [monitor_wrap.c]
245 use ssize_t
4efd85b2 246 - deraadt@cvs.openbsd.org 2002/06/28 10:08:25
247 [sshd.c]
248 range check -u option at invocation
6ded293b 249 - deraadt@cvs.openbsd.org 2002/06/28 23:05:06
250 [sshd.c]
251 gidset[2] -> gidset[1]; markus ok
7fdc56c5 252 - deraadt@cvs.openbsd.org 2002/06/30 21:54:16
253 [auth2.c session.c sshd.c]
254 lint asks that we use names that do not overlap
343288b8 255 - deraadt@cvs.openbsd.org 2002/06/30 21:59:45
256 [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c
257 monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c
258 sshconnect2.c sshd.c]
259 minor KNF
7d60d74c 260 - deraadt@cvs.openbsd.org 2002/07/01 16:15:25
261 [msg.c]
262 %u
713f6cd9 263 - markus@cvs.openbsd.org 2002/07/01 19:48:46
264 [sshconnect2.c]
265 for compression=yes, we fallback to no-compression if the server does
266 not support compression, vice versa for compression=no. ok mouring@
261189cc 267 - markus@cvs.openbsd.org 2002/07/03 09:55:38
268 [ssh-keysign.c]
269 use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld)
270 in order to avoid a possible Kocher timing attack pointed out by Charles
271 Hannum; ok provos@
60cd0a97 272 - markus@cvs.openbsd.org 2002/07/03 14:21:05
273 [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config]
274 re-enable ssh-keysign's sbit, but make ssh-keysign read
275 /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled
276 globally. based on discussions with deraadt, itojun and sommerfeld;
277 ok itojun@
56fd97d7 278 - (bal) Failed password attempts don't increment counter on AIX. Bug #145
e8aa0a5c 279 - (bal) Missed Makefile.in change. keysign needs readconf.o
0ba40daa 280 - (bal) Clean up aix_usrinfo(). Ignore TTY= period I guess.
56fd97d7 281
b2f295dc 28220020702
283 - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc &
284 friends consistently. Spotted by Solar Designer <solar@openwall.com>
285
3c3e878a 28620020629
287 - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style
288 clean up while I'm near it.
289
811ee370 29020020628
291 - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented
292 options should contain default value. from solar.
b9b82dab 293 - (bal) Cygwin uid0 fix by vinschen@redhat.com
17962c40 294 - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c. Otherwise wise
295 have issues of our fixes not propogating right (ie bcopy instead of
296 memmove). OK tim
4fa4fb00 297 - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported.
298 Bug #303
811ee370 299
ce88d9df 30020020627
d1ff09ba 301 - OpenBSD CVS Sync
302 - deraadt@cvs.openbsd.org 2002/06/26 14:49:36
303 [monitor.c]
304 correct %u
63b5f1a1 305 - deraadt@cvs.openbsd.org 2002/06/26 14:50:04
306 [monitor_fdpass.c]
307 use ssize_t for recvmsg() and sendmsg() return
1431a900 308 - markus@cvs.openbsd.org 2002/06/26 14:51:33
309 [ssh-add.c]
310 fix exit code for -X/-x
bb0640b2 311 - deraadt@cvs.openbsd.org 2002/06/26 15:00:32
312 [monitor_wrap.c]
313 more %u
20e79e98 314 - markus@cvs.openbsd.org 2002/06/26 22:27:32
315 [ssh-keysign.c]
316 bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu
d1ff09ba 317
4bfa8bb6 31820020626
319 - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM
a594fa74 320 - (bal) OpenBSD CVS Sync
321 - markus@cvs.openbsd.org 2002/06/23 21:34:07
322 [channels.c]
323 tcode is u_int
38501509 324 - markus@cvs.openbsd.org 2002/06/24 13:12:23
325 [ssh-agent.1]
326 the socket name contains ssh-agent's ppid; via mpech@ from form@
f91d9a89 327 - markus@cvs.openbsd.org 2002/06/24 14:33:27
328 [channels.c channels.h clientloop.c serverloop.c]
329 move channel counter to u_int
1169c3df 330 - markus@cvs.openbsd.org 2002/06/24 14:55:38
331 [authfile.c kex.c ssh-agent.c]
332 cat to (void) when output from buffer_get_X is ignored
09915dc1 333 - itojun@cvs.openbsd.org 2002/06/24 15:49:22
334 [msg.c]
335 printf type pedant
d0a1c5d1 336 - deraadt@cvs.openbsd.org 2002/06/24 17:57:20
337 [sftp-server.c sshpty.c]
338 explicit (u_int) for uid and gid
6c69a6a9 339 - markus@cvs.openbsd.org 2002/06/25 16:22:42
340 [authfd.c]
341 unnecessary cast
87809a1f 342 - markus@cvs.openbsd.org 2002/06/25 18:51:04
343 [sshd.c]
344 lightweight do_setusercontext after chroot()
924681ee 345 - (bal) Updated AIX package build. Patch by dtucker@zip.com.au
46c8ebb3 346 - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8
78beb77d 347 - (bal) added back in error check for mmap(). I screwed up, Pointed
348 out by stevesk@
f2d9a1f8 349 - (tim) [README.privsep] UnixWare tip no longer needed.
88cb875c 350 - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP,
351 but it all damned lies.
0d0270e6 352 - (stevesk) [README.privsep] more for sshd pseudo-account.
8029e7fc 353 - (tim) [contrib/caldera/openssh.spec] add support for privsep
8695f9f7 354 - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@
b29fe4ea 355 - (djm) OpenBSD CVS Sync
356 - markus@cvs.openbsd.org 2002/06/26 08:53:12
357 [bufaux.c]
358 limit size of BNs to 8KB; ok provos/deraadt
22d62d31 359 - markus@cvs.openbsd.org 2002/06/26 08:54:18
360 [buffer.c]
361 limit append to 1MB and buffers to 10MB
5df8c731 362 - markus@cvs.openbsd.org 2002/06/26 08:55:02
363 [channels.c]
364 limit # of channels to 10000
87f18810 365 - markus@cvs.openbsd.org 2002/06/26 08:58:26
366 [session.c]
367 limit # of env vars to 1000; ok deraadt/djm
2f095a0e 368 - deraadt@cvs.openbsd.org 2002/06/26 13:20:57
369 [monitor.c]
370 be careful in mm_zalloc
66087567 371 - deraadt@cvs.openbsd.org 2002/06/26 13:49:26
372 [session.c]
373 disclose less information from environment files; based on input
374 from djm, and dschultz@uclink.Berkeley.EDU
477edc5d 375 - markus@cvs.openbsd.org 2002/06/26 13:55:37
376 [auth2-chall.c]
377 make sure # of response matches # of queries, fixes int overflow;
378 from ISS
03b14b6f 379 - markus@cvs.openbsd.org 2002/06/26 13:56:27
380 [version.h]
381 3.4
9c696d0d 382 - (djm) Require krb5 devel for RPM build w/ KrbV
c4186be7 383 - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai
384 <nalin@redhat.com>
1e7bc74c 385 - (djm) Update spec files for release
49b53b03 386 - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS
03b14b6f 387 - (djm) Release 3.4p1
6519cfd6 388 - (tim) [contrib/caldera/openssh.spec] remove 2 configure options I put in
389 by mistake
4bfa8bb6 390
ef1ac12b 39120020625
392 - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh
1a44c6f7 393 - (stevesk) [README.privsep] minor updates
fd3cbf67 394 - (djm) Create privsep directory and warn if privsep user is missing
395 during make install
702b2855 396 - (bal) Started list of PrivSep issues in TODO
1c6249af 397 - (bal) if mmap() is substandard, don't allow compression on server side.
398 Post 'event' we will add more options.
cbaa3d44 399 - (tim) [contrib/caldera/openssh.spec] Sync with Caldera
e2bc41f9 400 - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by
401 dtucker@zip.com.au
d170feb1 402 - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus
403 for Cygwin, Cray, & SCO
ef1ac12b 404
d5803314 40520020624
406 - OpenBSD CVS Sync
407 - deraadt@cvs.openbsd.org 2002/06/23 03:25:50
408 [tildexpand.c]
409 KNF
3ddc795d 410 - deraadt@cvs.openbsd.org 2002/06/23 03:26:19
411 [cipher.c key.c]
412 KNF
d6133f43 413 - deraadt@cvs.openbsd.org 2002/06/23 03:30:58
414 [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c
415 sshpty.c]
416 various KNF and %d for unsigned
9906a836 417 - deraadt@cvs.openbsd.org 2002/06/23 09:30:14
418 [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c
419 sftp.c]
420 bunch of u_int vs int stuff
512df038 421 - deraadt@cvs.openbsd.org 2002/06/23 09:39:55
422 [ssh-keygen.c]
423 u_int stuff
7528d467 424 - deraadt@cvs.openbsd.org 2002/06/23 09:46:51
425 [bufaux.c servconf.c]
426 minor KNF. things the fingers do while you read
e424e241 427 - deraadt@cvs.openbsd.org 2002/06/23 10:29:52
428 [ssh-agent.c sshd.c]
429 some minor KNF and %u
7138ebd9 430 - deraadt@cvs.openbsd.org 2002/06/23 20:39:45
431 [session.c]
432 compression_level is u_int
f09ce20a 433 - deraadt@cvs.openbsd.org 2002/06/23 21:06:13
434 [sshpty.c]
435 KNF
57f228e8 436 - deraadt@cvs.openbsd.org 2002/06/23 21:06:41
437 [channels.c channels.h session.c session.h]
438 display, screen, row, col, xpixel, ypixel are u_int; markus ok
0bc50167 439 - deraadt@cvs.openbsd.org 2002/06/23 21:10:02
440 [packet.c]
441 packet_get_int() returns unsigned for reason & seqnr
57f228e8 442 - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col,
443 xpixel are u_int.
444
d5803314 445
58177c0a 44620020623
447 - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX.
dc43acd2 448 - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset.
ef3912be 449 - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au
a8bbdc75 450 - OpenBSD CVS Sync
451 - stevesk@cvs.openbsd.org 2002/06/22 02:00:29
452 [ssh.h]
453 correct comment
1ae02182 454 - stevesk@cvs.openbsd.org 2002/06/22 02:40:23
455 [ssh.1]
456 section 5 not 4 for ssh_config
b2843ec6 457 - naddy@cvs.openbsd.org 2002/06/22 11:51:39
458 [ssh.1]
459 typo
75653d3e 460 - stevesk@cvs.openbsd.org 2002/06/22 16:32:54
461 [sshd.8]
462 add /var/empty in FILES section
a56313d7 463 - stevesk@cvs.openbsd.org 2002/06/22 16:40:19
464 [sshd.c]
465 check /var/empty owner mode; ok provos@
e4e83d70 466 - stevesk@cvs.openbsd.org 2002/06/22 16:41:57
467 [scp.1]
468 typo
baa08b92 469 - stevesk@cvs.openbsd.org 2002/06/22 16:45:29
470 [ssh-agent.1 sshd.8 sshd_config.5]
471 use process ID vs. pid/PID/process identifier
c28876e9 472 - stevesk@cvs.openbsd.org 2002/06/22 20:05:27
473 [sshd.c]
474 don't call setsid() if debugging or run from inetd; no "Operation not
475 permitted" errors now; ok millert@ markus@
d17ef027 476 - stevesk@cvs.openbsd.org 2002/06/22 23:09:51
477 [monitor.c]
478 save auth method before monitor_reset_key_state(); bugzilla bug #284;
479 ok provos@
58177c0a 480
ca449fd9 48120020622
482 - (djm) Update README.privsep; spotted by fries@
d5041f45 483 - (djm) Release 3.3p1
d76aa6fb 484 - (bal) getopt now can be staticly compiled on those platforms missing
485 optreset. Patch by binder@arago.de
ca449fd9 486
0496cf34 48720020621
488 - (djm) Sync:
489 - djm@cvs.openbsd.org 2002/06/21 05:50:51
490 [monitor.c]
491 Don't initialise compression buffers when compression=no in sshd_config;
492 ok Niels@
897ef106 493 - ID sync for auth-passwd.c
e299a298 494 - (djm) Warn and disable compression on platforms which can't handle both
495 useprivilegeseparation=yes and compression=yes
9f182968 496 - (djm) contrib/redhat/openssh.spec hacking:
497 - Merge in spec changes from seba@iq.pl (Sebastian Pachuta)
498 - Add new {ssh,sshd}_config.5 manpages
499 - Add new ssh-keysign program and remove setuid from ssh client
0496cf34 500
b264bd39 50120020620
8bbfc882 502 - (bal) Fixed AIX environment handling, use setpcred() instead of existing
503 code. (Bugzilla Bug 261)
b264bd39 504 - (bal) OpenBSD CVS Sync
505 - todd@cvs.openbsd.org 2002/06/14 21:35:00
506 [monitor_wrap.c]
507 spelling; from Brian Poole <raj@cerias.purdue.edu>
37500e74 508 - markus@cvs.openbsd.org 2002/06/15 00:01:36
509 [authfd.c authfd.h ssh-add.c ssh-agent.c]
510 break agent key lifetime protocol and allow other contraints for key
511 usage.
405e0c5e 512 - markus@cvs.openbsd.org 2002/06/15 00:07:38
513 [authfd.c authfd.h ssh-add.c ssh-agent.c]
514 fix stupid typo
3015d321 515 - markus@cvs.openbsd.org 2002/06/15 01:27:48
ee900f87 516 [authfd.c authfd.h ssh-add.c ssh-agent.c]
517 remove the CONSTRAIN_IDENTITY messages and introduce a new
518 ADD_ID message with contraints instead. contraints can be
519 only added together with the private key.
48ba8dc8 520 - itojun@cvs.openbsd.org 2002/06/16 21:30:58
521 [ssh-keyscan.c]
522 use TAILQ_xx macro. from lukem@netbsd. markus ok
3015d321 523 - deraadt@cvs.openbsd.org 2002/06/17 06:05:56
524 [scp.c]
525 make usage like man page
7203d6bb 526 - deraadt@cvs.openbsd.org 2002/06/19 00:27:55
527 [auth-bsdauth.c auth-skey.c auth1.c auth2-chall.c auth2-none.c authfd.c
528 authfd.h monitor_wrap.c msg.c nchan.c radix.c readconf.c scp.c sftp.1
529 ssh-add.1 ssh-add.c ssh-agent.1 ssh-agent.c ssh-keygen.1 ssh-keygen.c
530 ssh-keysign.c ssh.1 sshconnect.c sshconnect.h sshconnect2.c ttymodes.c
531 xmalloc.h]
532 KNF done automatically while reading....
9459414c 533 - markus@cvs.openbsd.org 2002/06/19 18:01:00
534 [cipher.c monitor.c monitor_wrap.c packet.c packet.h]
535 make the monitor sync the transfer ssh1 session key;
536 transfer keycontext only for RC4 (this is still depends on EVP
537 implementation details and is broken).
588df31a 538 - stevesk@cvs.openbsd.org 2002/06/20 19:56:07
539 [ssh.1 sshd.8]
540 move configuration file options from ssh.1/sshd.8 to
541 ssh_config.5/sshd_config.5; ok deraadt@ millert@
add52dd0 542 - stevesk@cvs.openbsd.org 2002/06/20 20:00:05
543 [scp.1 sftp.1]
544 ssh_config(5)
54e5539d 545 - stevesk@cvs.openbsd.org 2002/06/20 20:03:34
546 [ssh_config sshd_config]
547 refer to config file man page
636f76ca 548 - markus@cvs.openbsd.org 2002/06/20 23:05:56
549 [servconf.c servconf.h session.c sshd.c]
550 allow Compression=yes/no in sshd_config
6f26d43d 551 - markus@cvs.openbsd.org 2002/06/20 23:37:12
552 [sshd_config]
553 add Compression
2fee5e28 554 - stevesk@cvs.openbsd.org 2002/05/25 20:40:08
555 [LICENCE]
556 missed Per Allansson (auth2-chall.c)
fa7a0d52 557 - (bal) Cygwin special handling of empty passwords wrong. Patch by
558 vinschen@redhat.com
668e6050 559 - (bal) Missed integrating ssh_config.5 and sshd_config.5
73bc9b18 560 - (bal) Still more Makefile.in updates for ssh{d}_config.5
b264bd39 561
f2d02e44 56220020613
563 - (bal) typo of setgroup for cygwin. Patch by vinschen@redhat.com
564
b34bec32 56520020612
566 - (bal) OpenBSD CVS Sync
567 - markus@cvs.openbsd.org 2002/06/11 23:03:54
568 [ssh.c]
569 remove unused cruft.
de60473e 570 - markus@cvs.openbsd.org 2002/06/12 01:09:52
571 [ssh.c]
572 ssh_connect returns 0 on success
246446cd 573 - (bal) Build noop setgroups() for cygwin to clean up code (For other
574 platforms without the setgroups() requirement, you MUST define
575 SETGROUPS_NOOP in the configure.ac) Based on patch by vinschen@redhat.com
75136d8b 576 - (bal) Some platforms don't have ONLCR (Notable Mint)
b34bec32 577
74a6c7bd 57820020611
579 - (bal) ssh-agent.c RCSD fix (|unexpand already done)
d83cbdc3 580 - (bal) OpenBSD CVS Sync
581 - stevesk@cvs.openbsd.org 2002/06/09 22:15:15
582 [ssh.1]
583 update for no setuid root and ssh-keysign; ok deraadt@
01ca0dfe 584 - itojun@cvs.openbsd.org 2002/06/09 22:17:21
585 [sshconnect.c]
586 pass salen to sockaddr_ntop so that we are happy on linux/solaris
b7ced7d1 587 - stevesk@cvs.openbsd.org 2002/06/10 16:53:06
588 [auth-rsa.c ssh-rsa.c]
589 display minimum RSA modulus in error(); ok markus@
9cf07a6e 590 - stevesk@cvs.openbsd.org 2002/06/10 16:56:30
591 [ssh-keysign.8]
592 merge in stuff from my man page; ok markus@
c3baacd1 593 - stevesk@cvs.openbsd.org 2002/06/10 17:36:23
594 [ssh-add.1 ssh-add.c]
595 use convtime() to parse and validate key lifetime. can now
596 use '-t 2h' etc. ok markus@ provos@
4b3d23b4 597 - stevesk@cvs.openbsd.org 2002/06/10 17:45:20
598 [readconf.c ssh.1]
599 change RhostsRSAAuthentication and RhostsAuthentication default to no
600 since ssh is no longer setuid root by default; ok markus@
ad2e1857 601 - stevesk@cvs.openbsd.org 2002/06/10 21:21:10
602 [ssh_config]
603 update defaults for RhostsRSAAuthentication and RhostsAuthentication
604 here too (all options commented out with default value).
149cdb60 605 - markus@cvs.openbsd.org 2002/06/10 22:28:41
606 [channels.c channels.h session.c]
607 move creation of agent socket to session.c; no need for uidswapping
608 in channel.c.
3fb156df 609 - markus@cvs.openbsd.org 2002/06/11 04:14:26
610 [ssh.c sshconnect.c sshconnect.h]
611 no longer use uidswap.[ch] from the ssh client
612 run less code with euid==0 if ssh is installed setuid root
613 just switch the euid, don't switch the complete set of groups
614 (this is only needed by sshd). ok provos@
c457707e 615 - mpech@cvs.openbsd.org 2002/06/11 05:46:20
616 [auth-krb4.c monitor.h serverloop.c session.c ssh-agent.c sshd.c]
617 pid_t cleanup. Markus need this now to keep hacking.
618 markus@, millert@ ok
aa686c54 619 - itojun@cvs.openbsd.org 2002/06/11 08:11:45
620 [canohost.c]
621 use "ntop" only after initialized
d514c907 622 - (bal) Cygwin fix up from swap uid clean up in ssh.c patch by
623 vinschen@redhat.com
74a6c7bd 624
0073b70f 62520020609
626 - (bal) OpenBSD CVS Sync
627 - markus@cvs.openbsd.org 2002/06/08 05:07:56
628 [ssh.c]
629 nuke ptrace comment
1f143cf2 630 - markus@cvs.openbsd.org 2002/06/08 05:07:09
631 [ssh-keysign.c]
632 only accept 20 byte session ids
80fcb74e 633 - markus@cvs.openbsd.org 2002/06/08 05:17:01
634 [readconf.c readconf.h ssh.1 ssh.c]
635 deprecate FallBackToRsh and UseRsh; patch from djm@
6c792785 636 - markus@cvs.openbsd.org 2002/06/08 05:40:01
637 [readconf.c]
638 just warn about Deprecated options for now
c8e0103c 639 - markus@cvs.openbsd.org 2002/06/08 05:41:18
640 [ssh_config]
641 remove FallBackToRsh/UseRsh
61eb812e 642 - markus@cvs.openbsd.org 2002/06/08 12:36:53
643 [scp.c]
644 remove FallBackToRsh
4feae93d 645 - markus@cvs.openbsd.org 2002/06/08 12:46:14
646 [readconf.c]
647 silently ignore deprecated options, since FallBackToRsh might be passed
648 by remote scp commands.
35ad6a0a 649 - itojun@cvs.openbsd.org 2002/06/08 21:15:27
650 [sshconnect.c]
651 always use getnameinfo. (diag message only)
b0ff7493 652 - markus@cvs.openbsd.org 2002/06/09 04:33:27
653 [sshconnect.c]
654 abort() - > fatal()
e434ac29 655 - (bal) RCSID tag updates on channels.c, clientloop.c, nchan.c,
656 sftp-client.c, ssh-agenet.c, ssh-keygen.c and connect.h (we did unexpand
657 independant of them)
0073b70f 658
95d5ebf7 65920020607
11a3dcde 660 - (bal) Removed --{enable/disable}-suid-ssh
95d5ebf7 661 - (bal) Missed __progname in ssh-keysign.c patch by dtucker@zip.com.au
85cc9118 662 - (bal) use 'LOGIN_PROGRAM' not '/usr/bin/login' in session.c patch by
663 Bertrand.Velle@apogee-com.fr
95d5ebf7 664
2ee1b704 66520020606
666 - (bal) OpenBSD CVS Sync
667 - markus@cvs.openbsd.org 2002/05/15 21:56:38
668 [servconf.c sshd.8 sshd_config]
669 re-enable privsep and disable setuid for post-3.2.2
7b5edc2b 670 - markus@cvs.openbsd.org 2002/05/16 22:02:50
671 [cipher.c kex.h mac.c]
672 fix warnings (openssl 0.9.7 requires const)
375e20e7 673 - stevesk@cvs.openbsd.org 2002/05/16 22:09:59
674 [session.c ssh.c]
675 don't limit xauth pathlen on client side and longer print length on
676 server when debug; ok markus@
a4ae736b 677 - deraadt@cvs.openbsd.org 2002/05/19 20:54:52
678 [log.h]
679 extra commas in enum not 100% portable
c242fc96 680 - deraadt@cvs.openbsd.org 2002/05/22 23:18:25
681 [ssh.c sshd.c]
682 spelling; abishoff@arc.nasa.gov
39c00dc2 683 - markus@cvs.openbsd.org 2002/05/23 19:24:30
684 [authfile.c authfile.h pathnames.h ssh.c sshconnect.c sshconnect.h
685 sshconnect1.c sshconnect2.c ssh-keysign.8 ssh-keysign.c Makefile.in]
686 add /usr/libexec/ssh-keysign: a setuid helper program for hostbased
687 authentication in protocol v2 (needs to access the hostkeys).
78660ed4 688 - markus@cvs.openbsd.org 2002/05/23 19:39:34
689 [ssh.c]
690 add comment about ssh-keysign
7091a26b 691 - markus@cvs.openbsd.org 2002/05/24 08:45:14
692 [sshconnect2.c]
693 stat ssh-keysign first, print error if stat fails;
694 some debug->error; fix comment
a3f69458 695 - markus@cvs.openbsd.org 2002/05/25 08:50:39
696 [sshconnect2.c]
697 execlp->execl; from stevesk
013eab17 698 - markus@cvs.openbsd.org 2002/05/25 18:51:07
699 [auth.h auth2.c auth2-hostbased.c auth2-kbdint.c auth2-none.c
700 auth2-passwd.c auth2-pubkey.c Makefile.in]
701 split auth2.c into one file per method; ok provos@/deraadt@
bd4d0f49 702 - stevesk@cvs.openbsd.org 2002/05/26 20:35:10
703 [ssh.1]
704 sort ChallengeResponseAuthentication; ok markus@
c22d8cc0 705 - stevesk@cvs.openbsd.org 2002/05/28 16:45:27
706 [monitor_mm.c]
707 print strerror(errno) on mmap/munmap error; ok markus@
caa49784 708 - stevesk@cvs.openbsd.org 2002/05/28 17:28:02
709 [uidswap.c]
710 format spec change/casts and some KNF; ok markus@
fd7bc9fc 711 - stevesk@cvs.openbsd.org 2002/05/28 21:24:00
712 [uidswap.c]
713 use correct function name in fatal()
cb19b38a 714 - stevesk@cvs.openbsd.org 2002/05/29 03:06:30
715 [ssh.1 sshd.8]
716 spelling
3cc54fbb 717 - markus@cvs.openbsd.org 2002/05/29 11:21:57
718 [sshd.c]
719 don't start if privsep is enabled and SSH_PRIVSEP_USER or
720 _PATH_PRIVSEP_CHROOT_DIR are missing; ok deraadt@
135247df 721 - markus@cvs.openbsd.org 2002/05/30 08:07:31
722 [cipher.c]
723 use rijndael/aes from libcrypto (openssl >= 0.9.7) instead of
724 our own implementation. allow use of AES hardware via libcrypto,
725 ok deraadt@
d4826734 726 - markus@cvs.openbsd.org 2002/05/31 10:30:33
727 [sshconnect2.c]
728 extent ssh-keysign protocol:
729 pass # of socket-fd to ssh-keysign, keysign verfies locally used
730 ip-address using this socket-fd, restricts fake local hostnames
731 to actual local hostnames; ok stevesk@
01c24737 732 - markus@cvs.openbsd.org 2002/05/31 11:35:15
733 [auth.h auth2.c]
734 move Authmethod definitons to per-method file.
3ed81c99 735 - markus@cvs.openbsd.org 2002/05/31 13:16:48
736 [key.c]
737 add comment:
738 key_verify returns 1 for a correct signature, 0 for an incorrect signature
739 and -1 on error.
88f24e9d 740 - markus@cvs.openbsd.org 2002/05/31 13:20:50
741 [ssh-rsa.c]
742 pad received signature with leading zeros, because RSA_verify expects
743 a signature of RSA_size. the drafts says the signature is transmitted
744 unpadded (e.g. putty does not pad), reported by anakin@pobox.com
7f056bc5 745 - deraadt@cvs.openbsd.org 2002/06/03 12:04:07
746 [ssh.h]
747 compatiblity -> compatibility
748 decriptor -> descriptor
749 authentciated -> authenticated
750 transmition -> transmission
aa586f8e 751 - markus@cvs.openbsd.org 2002/06/04 19:42:35
752 [monitor.c]
753 only allow enabled authentication methods; ok provos@
521d606b 754 - markus@cvs.openbsd.org 2002/06/04 19:53:40
755 [monitor.c]
756 save the session id (hash) for ssh2 (it will be passed with the
757 initial sign request) and verify that this value is used during
758 authentication; ok provos@
91647fe6 759 - markus@cvs.openbsd.org 2002/06/04 23:02:06
760 [packet.c]
761 remove __FUNCTION__
1588c277 762 - markus@cvs.openbsd.org 2002/06/04 23:05:49
763 [cipher.c monitor.c monitor_fdpass.c monitor_mm.c monitor_wrap.c]
764 __FUNCTION__ -> __func__
3e7efb37 765 - markus@cvs.openbsd.org 2002/06/05 16:08:07
766 [ssh-agent.1 ssh-agent.c]
767 '-a bind_address' binds the agent to user-specified unix-domain
768 socket instead of /tmp/ssh-XXXXXXXX/agent.<pid>; ok djm@ (some time ago).
9aa28a7f 769 - markus@cvs.openbsd.org 2002/06/05 16:08:07
770 [ssh-agent.1 ssh-agent.c]
771 '-a bind_address' binds the agent to user-specified unix-domain
772 socket instead of /tmp/ssh-XXXXXXXX/agent.<pid>; ok djm@ (some time ago).
b9dd5ca1 773 - markus@cvs.openbsd.org 2002/06/05 16:48:54
774 [ssh-agent.c]
775 copy current request into an extra buffer and just flush this
776 request on errors, ok provos@
3db7f994 777 - markus@cvs.openbsd.org 2002/06/05 19:57:12
778 [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c]
779 ssh-add -x for lock and -X for unlocking the agent.
780 todo: encrypt private keys with locked...
73861c4e 781 - markus@cvs.openbsd.org 2002/06/05 20:56:39
782 [ssh-add.c]
783 add -x/-X to usage
264572cc 784 - markus@cvs.openbsd.org 2002/06/05 21:55:44
785 [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c]
786 ssh-add -t life, Set lifetime (in seconds) when adding identities;
787 ok provos@
c6f1f67c 788 - stevesk@cvs.openbsd.org 2002/06/06 01:09:41
789 [monitor.h]
790 no trailing comma in enum; china@thewrittenword.com
9b4ac641 791 - markus@cvs.openbsd.org 2002/06/06 17:12:44
792 [sftp-server.c]
793 discard remaining bytes of current request; ok provos@
802d93bb 794 - markus@cvs.openbsd.org 2002/06/06 17:30:11
795 [sftp-server.c]
796 use get_int() macro (hide iqueue)
8afe456d 797 - (bal) Missed msg.[ch] in merge. Required for ssh-keysign.
5a30b173 798 - (bal) Forgot to add msg.c Makefile.in.
441b3f63 799 - (bal) monitor_mm.c typos.
e5c59e31 800 - (bal) Refixed auth2.c. It was never fully commited while spliting out
d4d77d64 801 authentication to different files.
04eb391d 802 - (bal) ssh-keysign should build and install correctly now. Phase two
803 would be to clean out any dead wood and disable ssh setuid on install.
d4d77d64 804 - (bal) Reverse logic, use __func__ first since it's C99
95f20fe8 805
688aaeda 80620020604
807 - (stevesk) [channels.c] bug #164 patch from YOSHIFUJI Hideaki (changed
808 setsockopt from debug to error for now).
809
637f9177 81020020527
811 - (tim) [configure.ac.orig monitor_fdpass.c] Enahnce msghdr tests to address
812 build problem on Irix reported by Dave Love <d.love@dl.ac.uk>. Back out
813 last monitor_fdpass.c changes that are no longer needed with new tests.
814 Patch tested on Irix by Jan-Frode Myklebust <janfrode@parallab.uib.no>
815
a23a769d 81620020522
817 - (djm) Fix spelling mistakes, spotted by Solar Designer i
818 <solar@openwall.com>
2880ad5e 819 - Sync scard/ (not sure when it drifted)
68604c75 820 - (djm) OpenBSD CVS Sync:
821 [auth.c]
822 Fix typo/thinko. Pass in as to auth_approval(), not NULL.
823 Closes PR 2659.
824 - Crank version
3ed9ebdb 825 - Crank RPM spec versions
a23a769d 826
30321a9b 82720020521
828 - (stevesk) [sshd.c] bug 245; disable setsid() for now
20ded834 829 - (stevesk) [sshd.c] #ifndef HAVE_CYGWIN for setgroups()
30321a9b 830
9a499a03 83120020517
832 - (tim) [configure.ac] remove extra MD5_MSG="no" line.
833
68a9cd3e 83420020515
835 - (bal) CVS ID fix up on auth-passwd.c
e0740430 836 - (bal) OpenBSD CVS Sync
837 - deraadt@cvs.openbsd.org 2002/05/07 19:54:36
838 [ssh.h]
839 use ssh uid
897fecd3 840 - deraadt@cvs.openbsd.org 2002/05/08 21:06:34
841 [ssh.h]
842 move to sshd.sshd instead
5de727d6 843 - stevesk@cvs.openbsd.org 2002/05/11 20:24:48
844 [ssh.h]
845 typo in comment
69538b0c 846 - itojun@cvs.openbsd.org 2002/05/13 02:37:39
847 [auth-skey.c auth2.c]
848 less warnings. skey_{respond,query} are public (in auth.h)
01dafcb5 849 - markus@cvs.openbsd.org 2002/05/13 20:44:58
850 [auth-options.c auth.c auth.h]
851 move the packet_send_debug handling from auth-options.c to auth.c;
852 ok provos@
4ac8556b 853 - millert@cvs.openbsd.org 2002/05/13 15:53:19
854 [sshd.c]
855 Call setsid() in the child after sshd accepts the connection and forks.
856 This is needed for privsep which calls setlogin() when it changes uids.
857 Without this, there is a race where the login name of an existing
858 connection, as returned by getlogin(), may be changed to the privsep
859 user (sshd). markus@ OK
b3ad3d88 860 - markus@cvs.openbsd.org 2002/05/13 21:26:49
861 [auth-rhosts.c]
862 handle debug messages during rhosts-rsa and hostbased authentication;
863 ok provos@
b5a28cbc 864 - mouring@cvs.openbsd.org 2002/05/15 15:47:49
865 [kex.c monitor.c monitor_wrap.c sshd.c]
866 'monitor' variable clashes with at least one lame platform (NeXT). i
867 Renamed to 'pmonitor'. provos@
1642b888 868 - deraadt@cvs.openbsd.org 2002/05/04 02:39:35
869 [servconf.c sshd.8 sshd_config]
870 enable privsep by default; provos ok
7e276482 871 - millert@cvs.openbsd.org 2002/05/06 23:34:33
872 [ssh.1 sshd.8]
873 Kill/adjust r(login|exec)d? references now that those are no longer in
874 the tree.
6c172f95 875 - markus@cvs.openbsd.org 2002/05/15 21:02:53
876 [servconf.c sshd.8 sshd_config]
877 disable privsep and enable setuid for the 3.2.2 release
b5a28cbc 878 - (bal) Fixed up PAM case. I think.
0c83d9ea 879 - (bal) Clarified openbsd-compat/*-cray.* Licence provided by Wendy
3a034dc5 880 - (bal) OpenBSD CVS Sync
881 - markus@cvs.openbsd.org 2002/05/15 21:05:29
882 [version.h]
883 enter OpenSSH_3.2.2
884 - (bal) Caldara, Suse, and Redhat openssh.specs updated.
68a9cd3e 885
545ba36e 88620020514
887 - (stevesk) [README.privsep] PAM+privsep works with Solaris 8.
f65fbec1 888 - (tim) [sshpty.c] set tty modes when allocating old style bsd ptys to
889 match what newer style ptys have when allocated. Based on a patch by
890 Roger Cornelius <rac@tenzing.org>
47cdfcbe 891 - (tim) [README.privsep] UnixWare 7 and OpenUNIX 8 work.
892 - (tim) [README.privsep] remove reference to UnixWare 7 and OpenUNIX 8
893 from PAM-enabled pragraph. UnixWare has no PAM.
3c1a6277 894 - (tim) [contrib/caldera/openssh.spec] update version.
545ba36e 895
06617857 89620020513
3d1beaf2 897 - (stevesk) add initial README.privsep
5222e7ef 898 - (stevesk) [configure.ac] nicer message: --with-privsep-user=user
fdff2c55 899 - (djm) Add --with-superuser-path=xxx configure option to specify
900 what $PATH the superuser receives.
94a73cdc 901 - (djm) Bug #231: UsePrivilegeSeparation turns off Banner.
ecac8ee5 902 - (djm) Add --with-privsep-path configure option
80e92e5d 903 - (djm) Update RPM spec file: different superuser path, use
904 /var/empty/sshd for privsep
75817f90 905 - (djm) Bug #234: missing readpassphrase declaration and defines
fdff2c55 906 - (djm) Add INSTALL warning about SSH protocol 1 blowfish w/
907 OpenSSL < 0.9.6
06617857 908
5b991353 90920020511
910 - (tim) [configure.ac] applied a rework of djm's OpenSSL search cleanup patch.
911 Now only searches system and /usr/local/ssl (OpenSSL's default install path)
912 Others must use --with-ssl-dir=....
d73cbfe3 913 - (tim) [monitor_fdpass.c] fix for systems that have both
fdff2c55 914 HAVE_ACCRIGHTS_IN_MSGHDR and HAVE_CONTROL_IN_MSGHDR. Ie. sys/socket.h
915 has #define msg_accrights msg_control
5b991353 916
3ef3d901 91720020510
5b29f152 918 - (stevesk) [auth.c] Shadow account and expiration cleanup. Now
919 check for root forced expire. Still don't check for inactive.
3ef3d901 920 - (djm) Rework RedHat RPM files. Based on spec from Nalin
921 Dahyabhai <nalin@redhat.com> and patches from
922 Pekka Savola <pekkas@netcore.fi>
018a5ea3 923 - (djm) Try to drop supplemental groups at daemon startup. Patch from
924 RedHat
f656b61e 925 - (bal) Back all the way out of auth-passwd.c changes. Breaks too many
926 things that don't set pw->pw_passwd.
3ef3d901 927
075682c1 92820020509
929 - (tim) [Makefile.in] Unbreak make -f Makefile.in distprep
fea8a8e8 930
075682c1 93120020508
af5ee4e4 932 - (tim) [openbsd-compat/bsd-arc4random.c] fix logic on when seed_rng() is
933 called. Report by Chris Maxwell <maxwell@cs.dal.ca>
6193497b 934 - (tim) [Makefile.in configure.ac] set SHELL variable in Makefile
075682c1 935 - (djm) Disable PAM kbd-int auth if privsep is turned on (it doesn't work)
af5ee4e4 936
f25cd32c 93720020507
938 - (tim) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
939 Add truncate() emulation to address Bug 208
940
69406cab 94120020506
942 - (djm) Unbreak auth-passwd.c for PAM and SIA
efe44db6 943 - (djm) Unbreak PAM auth for protocol 1. Report from Pekka Savola
944 <pekkas@netcore.fi>
39ce53de 945 - (djm) Don't reinitialise PAM credentials before we have started PAM.
946 Report from Pekka Savola <pekkas@netcore.fi>
947
d9891c59 94820020506
949 - (bal) Fixed auth-passwd.c to resolve PermitEmptyPassword issue
950
836d58d7 95120020501
952 - (djm) Import OpenBSD regression tests. Requires BSD make to run
50903cc7 953 - (djm) Fix readpassphase compilation for systems which have it
836d58d7 954
f0c180c3 95520020429
956 - (tim) [contrib/caldera/openssh.spec] update fixUP to reflect changes in
957 sshd_config.
958 - (tim) [contrib/cygwin/README] remove reference to regex.
959 patch from Corinna Vinschen <vinschen@redhat.com>
960
db8dbb6a 96120020426
962 - (djm) Bug #137, #209: fix make problems for scard/Ssh.bin, do uudecode
963 during distprep only
fdff2c55 964 - (djm) Disable PAM password expiry until a complete fix for bug #188
965 exists
782e2103 966 - (djm) Bug #180: Set ToS bits on IPv4-in-IPv6 mapped addresses. Based on
967 patch from openssh@misc.tecq.org
db8dbb6a 968
369e787a 96920020425
970 - (stevesk) [defines.h] remove USE_TIMEVAL; unused
6e879cb4 971 - (stevesk) [acconfig.h auth-passwd.c configure.ac sshd.c] HP-UX 10.26
972 support. bug #184. most from dcole@keysoftsys.com.
369e787a 973
8c1f70d8 97420020424
975 - (djm) OpenBSD CVS Sync
976 - markus@cvs.openbsd.org 2002/04/23 12:54:10
977 [version.h]
978 3.2.1
cdc4fc39 979 - djm@cvs.openbsd.org 2002/04/23 22:16:29
980 [sshd.c]
981 Improve error message; ok markus@ stevesk@
8c1f70d8 982
520b41b2 98320020423
a2572aa7 984 - (stevesk) [acconfig.h configure.ac session.c] LOGIN_NO_ENDOPT for HP-UX
7615ed55 985 - (stevesk) [acconfig.h] NEED_IN_SYSTM_H unused
744d788b 986 - (markus) OpenBSD CVS Sync
987 - markus@cvs.openbsd.org 2002/04/23 12:58:26
988 [radix.c]
989 send complete ticket; semerad@ss1000.ms.mff.cuni.cz
3b307f85 990 - (djm) Trim ChangeLog to include only post-3.1 changes
48862e93 991 - (djm) Update RPM spec file versions
03dd62aa 992 - (djm) Redhat spec enables KrbV by default
1352689f 993 - (djm) Applied OpenSC smartcard updates from Markus &
994 Antti Tapaninen <aet@cc.hut.fi>
995 - (djm) Define BROKEN_REALPATH for AIX, patch from
996 Antti Tapaninen <aet@cc.hut.fi>
0e8f4eba 997 - (djm) Bug #214: Fix utmp for Irix (don't strip "tty"). Patch from
998 Kevin Taylor <no@nowhere.org> (??) via Philipp Grau
999 <phgrau@zedat.fu-berlin.de>
2805b943 1000 - (djm) Bug #213: Simplify CMSG_ALIGN macros to avoid symbol clashes.
1001 Reported by Doug Manton <dmanton@emea.att.com>
520b41b2 1002 - (djm) Bug #222: Fix tests for getaddrinfo on OSF/1. Spotted by
1003 Robert Urban <urban@spielwiese.de>
52f1ccb2 1004 - (djm) Bug #206 - blibpath isn't always needed for AIX ld, avoid
1005 sizeof(long long int) == 4 breakage. Patch from Matthew Clarke
1006 <Matthew_Clarke@mindlink.bc.ca>
ad200abb 1007 - (djm) Make privsep work with PAM (still experimental)
9b26c596 1008 - (djm) OpenBSD CVS Sync
1009 - deraadt@cvs.openbsd.org 2002/04/20 09:02:03
1010 [servconf.c]
1011 No, afs requires explicit enabling
1012 - markus@cvs.openbsd.org 2002/04/20 09:14:58
1013 [bufaux.c bufaux.h]
1014 add buffer_{get,put}_short
3b358a0e 1015 - markus@cvs.openbsd.org 2002/04/20 09:17:19
1016 [radix.c]
1017 rewrite using the buffer_* API, fixes overflow; ok deraadt@
22d0faff 1018 - stevesk@cvs.openbsd.org 2002/04/21 16:19:27
1019 [sshd.8 sshd_config]
1020 document default AFSTokenPassing no; ok deraadt@
134c552b 1021 - stevesk@cvs.openbsd.org 2002/04/21 16:25:06
1022 [sshconnect1.c]
1023 spelling in error message; ok markus@
afb8fdb4 1024 - markus@cvs.openbsd.org 2002/04/22 06:15:47
1025 [radix.c]
1026 fix check for overflow
eadc806d 1027 - markus@cvs.openbsd.org 2002/04/22 16:16:53
1028 [servconf.c sshd.8 sshd_config]
1029 do not auto-enable KerberosAuthentication; ok djm@, provos@, deraadt@
e0ae8728 1030 - markus@cvs.openbsd.org 2002/04/22 21:04:52
1031 [channels.c clientloop.c clientloop.h ssh.c]
1032 request reply (success/failure) for -R style fwd in protocol v2,
1033 depends on ordered replies.
1034 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=215; ok provos@
520b41b2 1035
ac033f8c 103620020421
1037 - (tim) [entropy.c.] Portability fix for SCO Unix 3.2v4.x (SCO OSR 3.0).
fdff2c55 1038 entropy.c needs seteuid(getuid()) for the setuid(original_uid) to
1039 succeed. Patch by gert@greenie.muc.de. This fixes one part of Bug 208
ac033f8c 1040
6dc63b4f 104120020418
1042 - (djm) Avoid SIGCHLD breakage when run from rsync. Fix from
1043 Sturle Sunde <sturle.sunde@usit.uio.no>
1044
230c7a8f 104520020417
fdff2c55 1046 - (djm) Tell users to configure /dev/random support into OpenSSL in
1047 INSTALL
1a7220c2 1048 - (djm) Fix .Nm in mdoc2man.pl from pspencer@fields.utoronto.ca
8d184c09 1049 - (tim) [configure.ac] Issue warning on --with-default-path=/some_path
1050 if LOGIN_CAP is enabled. Report & testing by Tuc <tuc@ttsg.com>
230c7a8f 1051
9ae68cce 105220020415
fdff2c55 1053 - (djm) Unbreak "make install". Fix from Darren Tucker
1054 <dtucker@zip.com.au>
4e51cc76 1055 - (stevesk) bsd-cygwin_util.[ch] BSD license from Corinna Vinschen
1b06e75e 1056 - (tim) [configure.ac] add tests for recvmsg and sendmsg.
1057 [monitor_fdpass.c] add checks for HAVE_SENDMSG and HAVE_RECVMSG for
1058 systems that HAVE_ACCRIGHTS_IN_MSGHDR but no recvmsg or sendmsg.
9ae68cce 1059
f6e6303d 106020020414
1061 - (djm) ssh-rand-helper improvements
1062 - Add commandline debugging options
1063 - Don't write binary data if stdout is a tty (use hex instead)
1064 - Give it a manpage
cbe5b851 1065 - (djm) Random number collection doc fixes from Ben
f6e6303d 1066
12928e80 106720020413
1068 - (djm) Add KrbV support patch from Simon Wilkinson <simon@sxw.org.uk>
1069
40b74b3f 107020020412
1071 - (stevesk) [auth-sia.[ch]] add BSD license from Chris Adams
f95c8ce8 1072 - (tim) [configure.ac] add <sys/types.h> to msghdr tests. Change -L
1073 to -h on testing for /bin being symbolic link
e2c9b9e3 1074 - (bal) Mistaken in Cygwin scripts for ssh starting. Patch by
1075 Corinna Vinschen <vinschen@redhat.com>
e75b61db 1076 - (bal) disable privsep if no MAP_ANON. We can re-enable it
1077 after the release when we can do more testing.
40b74b3f 1078
65b91c76 107920020411
1080 - (stevesk) [auth-sia.c] cleanup
7b0737a4 1081 - (tim) [acconfig.h defines.h includes.h] put includes in includes.h and
1082 defines in defines.h [rijndael.c openbsd-compat/fake-socket.h
1083 openbsd-compat/inet_aton.c] include "includes.h" instead of "config.h"
1084 ok stevesk@
65b91c76 1085
ca8aba40 108620020410
f1af2dbf 1087 - (stevesk) [configure.ac monitor.c] HAVE_SOCKETPAIR
ca8aba40 1088 - (stevesk) [auth-sia.c] compile fix Chris Adams <cmadams@hiwaay.net>
d8ff54e6 1089 - (bal) OpenBSD CVS Sync
1090 - markus@cvs.openbsd.org 2002/04/10 08:21:47
1091 [auth1.c compat.c compat.h]
fdff2c55 1092 strip '@' from username only for KerbV and known broken clients,
1093 bug #204
f14a5033 1094 - markus@cvs.openbsd.org 2002/04/10 08:56:01
1095 [version.h]
1096 OpenSSH_3.2
1097 - Added p1 to idenify Portable release version.
ca8aba40 1098
46c8e0f6 109920020408
1100 - (bal) Minor OpenSC updates. Fix up header locations and update
1101 README.smartcard provided by Juha Yrjölä <jyrjola@cc.hut.fi>
1102
7176df4f 110320020407
1104 - (stevesk) HAVE_CONTROL_IN_MSGHDR; not used right now.
1105 Future: we may want to test if fd passing works correctly.
84071420 1106 - (stevesk) [monitor_fdpass.c] fatal() for UsePrivilegeSeparation=yes
1107 and no fd passing support.
1e8f8c5b 1108 - (stevesk) HAVE_MMAP and HAVE_SYS_MMAN_H and use them in
1109 monitor_mm.c
a90419b8 1110 - (stevesk) remove configure support for poll.h; it was removed
1111 from sshd.c a long time ago.
9a0fbcb3 1112 - (stevesk) --with-privsep-user; default sshd
1bf74eac 1113 - (stevesk) wrap munmap() with HAVE_MMAP also.
7176df4f 1114
b17d6a47 111520020406
1116 - (djm) Typo in Suse SPEC file. Fix from Carsten Grohmann
1117 <carsten.grohmann@dr-baldeweg.de>
23aa1237 1118 - (bal) Added MAP_FAILED to allow AIX and Trusted HP to compile.
af2b3cd9 1119 - (bal) OpenBSD CVS Sync
1120 - djm@cvs.openbsd.org 2002/04/06 00:30:08
1121 [sftp-client.c]
1d6d408a 1122 Fix occasional corruption on upload due to bad reuse of request
1123 id, spotted by chombier@mac.com; ok markus@
39f9599a 1124 - mouring@cvs.openbsd.org 2002/04/06 18:24:09
1125 [scp.c]
1126 Fixes potental double // within path.
1127 http://bugzilla.mindrot.org/show_bug.cgi?id=76
5866adb0 1128 - (bal) Slight update to OpenSC support. Better version checking. patch
1129 by Juha Yrjölä <jyrjola@cc.hut.fi>
b5171f93 1130 - (bal) Revered out of runtime IRIX detection of joblimits. Code is
1131 incomplete.
419e4769 1132 - (bal) Quiet down configure.ac if /bin/test does not exist.
14f35963 1133 - (bal) We no longer use atexit()/xatexit()/on_exit()
b17d6a47 1134
295c8801 113520020405
1136 - (bal) Patch for OpenSC SmartCard library; ok markus@; patch by
1137 Juha Yrjölä <jyrjola@cc.hut.fi>
1138 - (bal) Minor documentation update to reflect smartcard library
1139 support changes.
ab33e02a 1140 - (bal) Too many <sys/queue.h> issues. Remove all workarounds and
1141 using internal version only.
d4c6ddff 1142 - (bal) OpenBSD CVS Sync
1143 - stevesk@cvs.openbsd.org 2002/04/05 20:56:21
1144 [sshd.8]
1145 clarify sshrc some and handle X11UseLocalhost=yes; ok markus@
295c8801 1146
fde58bd4 114720020404
1148 - (stevesk) [auth-pam.c auth-pam.h auth-passwd.c auth-sia.c auth-sia.h
1149 auth1.c auth2.c] PAM, OSF_SIA password auth cleanup; from djm.
bf03f2da 1150 - (bal) OpenBSD CVS Sync
1151 - markus@cvs.openbsd.org 2002/04/03 09:26:11
1152 [cipher.c myproposal.h]
1153 re-add rijndael-cbc@lysator.liu.se for MacSSH; ash@lab.poc.net
fde58bd4 1154
ca7e8e1e 115520020402
1156 - (bal) Hand Sync of scp.c (reverted to upstream code)
1157 - deraadt@cvs.openbsd.org 2002/03/30 17:45:46
1158 [scp.c]
1159 stretch banners
c572a874 1160 - (bal) CVS ID sync of uidswap.c
783dbbdc 1161 - (bal) OpenBSD CVS Sync (now for the real sync)
1162 - markus@cvs.openbsd.org 2002/03/27 22:21:45
1163 [ssh-keygen.c]
fdff2c55 1164 try to import keys with extra trailing === (seen with ssh.com <
1165 2.0.12)
49a34e84 1166 - markus@cvs.openbsd.org 2002/03/28 15:34:51
1167 [session.c]
1168 do not call record_login twice (for use_privsep)
ffbf7323 1169 - markus@cvs.openbsd.org 2002/03/29 18:59:32
1170 [session.c session.h]
fdff2c55 1171 retrieve last login time before the pty is allocated, store per
1172 session
3bc822df 1173 - stevesk@cvs.openbsd.org 2002/03/29 19:16:22
1174 [sshd.8]
1175 RSA key modulus size minimum 768; ok markus@
82b00264 1176 - stevesk@cvs.openbsd.org 2002/03/29 19:18:33
1177 [auth-rsa.c ssh-rsa.c ssh.h]
1178 make RSA modulus minimum #define; ok markus@
8c38e88b 1179 - markus@cvs.openbsd.org 2002/03/30 18:51:15
1180 [monitor.c serverloop.c sftp-int.c sftp.c sshd.c]
1181 check waitpid for EINTR; based on patch from peter@ifm.liu.se
92053302 1182 - markus@cvs.openbsd.org 2002/04/01 22:02:16
1183 [sftp-client.c]
1184 20480 is an upper limit for older server
9c74a24d 1185 - markus@cvs.openbsd.org 2002/04/01 22:07:17
1186 [sftp-client.c]
1187 fallback to stat if server does not support lstat
b745a2f2 1188 - markus@cvs.openbsd.org 2002/04/02 11:49:39
1189 [ssh-agent.c]
1190 check $SHELL for -k and -d, too;
1191 http://bugzilla.mindrot.org/show_bug.cgi?id=199
b69145c2 1192 - markus@cvs.openbsd.org 2002/04/02 17:37:48
1193 [sftp.c]
1194 always call log_init()
c9336aed 1195 - markus@cvs.openbsd.org 2002/04/02 20:11:38
1196 [ssh-rsa.c]
1197 ignore SSH_BUG_SIGBLOB for ssh-rsa; #187
c895376b 1198 - (bal) mispelling in uidswap.c (portable only)
ca7e8e1e 1199
8b314ec9 120020020401
1201 - (stevesk) [monitor.c] PAM should work again; will *not* work with
1202 UsePrivilegeSeparation=yes.
3906af0f 1203 - (stevesk) [auth1.c] fix password auth for protocol 1 when
1204 !USE_PAM && !HAVE_OSF_SIA; merge issue.
8b314ec9 1205
267e920e 120620020331
1207 - (tim) [configure.ac] use /bin/test -L to work around broken builtin on
1208 Solaris 8
ef077e37 1209 - (tim) [sshconnect2.c] change uint32_t to u_int32_t
267e920e 1210
0461c355 121120020330
1212 - (stevesk) [configure.ac] remove header check for sys/ttcompat.h
1213 bug 167
1214
dd466ff8 121520020327
1216 - (bal) 'pw' should be 'authctxt->pw' in auth1.c spotted by
1217 kent@lysator.liu.se
17f5e68a 1218 - (bal) OpenBSD CVS Sync
1219 - markus@cvs.openbsd.org 2002/03/26 11:34:49
1220 [ssh.1 sshd.8]
1221 update to recent drafts
5fb274c1 1222 - markus@cvs.openbsd.org 2002/03/26 11:37:05
1223 [ssh.c]
1224 update Copyright
19f40184 1225 - markus@cvs.openbsd.org 2002/03/26 15:23:40
1226 [bufaux.c]
1227 do not talk about packets in bufaux
7341fad9 1228 - rees@cvs.openbsd.org 2002/03/26 18:46:59
1229 [scard.c]
fdff2c55 1230 try_AUT0 in read_pubkey too, for those paranoid few who want to
1231 acl 'sh'
6c112aca 1232 - markus@cvs.openbsd.org 2002/03/26 22:50:39
1233 [channels.h]
1234 CHANNEL_EFD_OUTPUT_ACTIVE is false for CHAN_CLOSE_RCVD, too
52103b10 1235 - markus@cvs.openbsd.org 2002/03/26 23:13:03
1236 [auth-rsa.c]
1237 disallow RSA keys < 768 for protocol 1, too (rhosts-rsa and rsa auth)
76bf34f1 1238 - markus@cvs.openbsd.org 2002/03/26 23:14:51
1239 [kex.c]
1240 generate a new cookie for each SSH2_MSG_KEXINIT message we send out
300e01c4 1241 - mouring@cvs.openbsd.org 2002/03/27 11:45:42
1242 [monitor.c]
1243 monitor_allowed_key() returns int instead of pointer. ok markus@
1244
eb4652f4 124520020325
1246 - (stevesk) import OpenBSD <sys/tree.h> as "openbsd-compat/tree.h"
47c36e5b 1247 - (bal) OpenBSD CVS Sync
1248 - stevesk@cvs.openbsd.org 2002/03/23 20:57:26
1249 [sshd.c]
1250 setproctitle() after preauth child; ok markus@
d452ec1a 1251 - markus@cvs.openbsd.org 2002/03/24 16:00:27
1252 [serverloop.c]
1253 remove unused debug
a49dfdec 1254 - markus@cvs.openbsd.org 2002/03/24 16:01:13
1255 [packet.c]
1256 debug->debug3 for extra padding
5b0d7dc1 1257 - stevesk@cvs.openbsd.org 2002/03/24 17:27:03
1258 [kexgex.c]
1259 typo; ok markus@
d4355079 1260 - stevesk@cvs.openbsd.org 2002/03/24 17:53:16
1261 [monitor_fdpass.c]
1262 minor cleanup and more error checking; ok markus@
9fc0407d 1263 - markus@cvs.openbsd.org 2002/03/24 18:05:29
1264 [scard.c]
1265 we need to figure out AUT0 for sc_private_encrypt, too
38c1c52a 1266 - stevesk@cvs.openbsd.org 2002/03/24 23:20:00
1267 [monitor.c]
1268 remove "\n" from fatal()
159897f3 1269 - markus@cvs.openbsd.org 2002/03/25 09:21:13
1270 [auth-rsa.c]
1271 return 0 (not NULL); tomh@po.crl.go.jp
6f33c8cd 1272 - markus@cvs.openbsd.org 2002/03/25 09:25:06
1273 [auth-rh-rsa.c]
1274 rm bogus comment
0659cace 1275 - markus@cvs.openbsd.org 2002/03/25 17:34:27
1276 [scard.c scard.h ssh-agent.c ssh-keygen.c ssh.c]
1277 change sc_get_key to sc_get_keys and hide smartcard details in scard.c
3074b20c 1278 - stevesk@cvs.openbsd.org 2002/03/25 20:12:10
1279 [monitor_mm.c monitor_wrap.c]
1280 ssize_t args use "%ld" and cast to (long)
1281 size_t args use "%lu" and cast to (u_long)
1282 ok markus@ and thanks millert@
1c2deed1 1283 - markus@cvs.openbsd.org 2002/03/25 21:04:02
1284 [ssh.c]
1285 simplify num_identity_files handling
d2296ed7 1286 - markus@cvs.openbsd.org 2002/03/25 21:13:51
1287 [channels.c channels.h compat.c compat.h nchan.c]
fdff2c55 1288 don't send stderr data after EOF, accept this from older known
1289 (broken) sshd servers only, fixes
1290 http://bugzilla.mindrot.org/show_bug.cgi?id=179
8e4fd4a1 1291 - stevesk@cvs.openbsd.org 2002/03/26 03:24:01
1292 [monitor.h monitor_fdpass.h monitor_mm.h monitor_wrap.h]
1293 $OpenBSD$
eb4652f4 1294
1178e8db 129520020324
1296 - (stevesk) [session.c] disable LOGIN_NEEDS_TERM until we are sure
1297 it can be removed. only used on solaris. will no longer compile with
1298 privsep shuffling.
1299
6f34652e 130020020322
1301 - (stevesk) HAVE_ACCRIGHTS_IN_MSGHDR configure support
7b18c353 1302 - (stevesk) [monitor.c monitor_wrap.c] #ifdef HAVE_PW_CLASS_IN_PASSWD
c921ee00 1303 - (stevesk) configure and cpp __FUNCTION__ gymnastics to handle nielsisms
dc90b259 1304 - (stevesk) [monitor_fdpass.c] support for access rights style file
1305 descriptor passing
f7ed12f1 1306 - (stevesk) [auth2.c] merge cleanup/sync
cfadc43b 1307 - (stevesk) [defines.h] hp-ux 11 has ancillary data style fd passing, but
1308 is missing CMSG_LEN() and CMSG_SPACE() macros.
cc58061e 1309 - (stevesk) [defines.h] #define MAP_ANON MAP_ANONYMOUS for HP-UX; other
1310 platforms may need this--I'm not sure. mmap() issues will need to be
1311 addressed further.
05976246 1312 - (tim) [cipher.c] fix problem with OpenBSD sync
9242fa1b 1313 - (stevesk) [LICENCE] OpenBSD sync
6f34652e 1314
8627f3e0 131520020321
1316 - (bal) OpenBSD CVS Sync
1317 - itojun@cvs.openbsd.org 2002/03/08 06:10:16
1318 [sftp-client.c]
1319 printf type mismatch
bfa7f960 1320 - itojun@cvs.openbsd.org 2002/03/11 03:18:49
1321 [sftp-client.c]
1322 correct type mismatches (u_int64_t != unsigned long long)
5fc7dbc9 1323 - itojun@cvs.openbsd.org 2002/03/11 03:19:53
1324 [sftp-client.c]
1325 indent
150a5466 1326 - markus@cvs.openbsd.org 2002/03/14 15:24:27
1327 [sshconnect1.c]
fdff2c55 1328 don't trust size sent by (rogue) server; noted by
1329 s.esser@e-matters.de
4f08e98d 1330 - markus@cvs.openbsd.org 2002/03/14 16:38:26
1331 [sshd.c]
1332 split out ssh1 session key decryption; ok provos@
46f1eece 1333 - markus@cvs.openbsd.org 2002/03/14 16:56:33
1334 [auth-rh-rsa.c auth-rsa.c auth.h]
1335 split auth_rsa() for better readability and privsep; ok provos@
c390a3c8 1336 - itojun@cvs.openbsd.org 2002/03/15 11:00:38
1337 [auth.c]
1338 fix file type checking (use S_ISREG). ok by markus
bcb68a8f 1339 - markus@cvs.openbsd.org 2002/03/16 11:24:53
1340 [compress.c]
1341 skip inflateEnd if inflate fails; ok provos@
3e65880e 1342 - markus@cvs.openbsd.org 2002/03/16 17:22:09
1343 [auth-rh-rsa.c auth.h]
1344 split auth_rhosts_rsa(), ok provos@
bb15f28b 1345 - stevesk@cvs.openbsd.org 2002/03/16 17:41:25
1346 [auth-krb5.c]
1347 BSD license. from Daniel Kouril via Dug Song. ok markus@
443fa1cd 1348 - provos@cvs.openbsd.org 2002/03/17 20:25:56
1349 [auth.c auth.h auth1.c auth2.c]
fdff2c55 1350 getpwnamallow returns struct passwd * only if user valid;
1351 okay markus@
1b34c1b3 1352 - provos@cvs.openbsd.org 2002/03/18 01:12:14
1353 [auth.h auth1.c auth2.c sshd.c]
1354 have the authentication functions return the authentication context
1355 and then do_authenticated; okay millert@
9d0844e3 1356 - dugsong@cvs.openbsd.org 2002/03/18 01:30:10
1357 [auth-krb4.c]
1358 set client to NULL after xfree(), from Rolf Braun
1359 <rbraun+ssh@andrew.cmu.edu>
1836f69f 1360 - provos@cvs.openbsd.org 2002/03/18 03:41:08
1361 [auth.c session.c]
1362 move auth_approval into getpwnamallow with help from millert@
bf8269a9 1363 - markus@cvs.openbsd.org 2002/03/18 17:13:15
1364 [cipher.c cipher.h]
1365 export/import cipher states; needed by ssh-privsep
e050d348 1366 - markus@cvs.openbsd.org 2002/03/18 17:16:38
1367 [packet.c packet.h]
1368 export/import cipher state, iv and ssh2 seqnr; needed by ssh-privsep
d0074658 1369 - markus@cvs.openbsd.org 2002/03/18 17:23:31
1370 [key.c key.h]
1371 add key_demote() for ssh-privsep
b625ad75 1372 - provos@cvs.openbsd.org 2002/03/18 17:25:29
1373 [bufaux.c bufaux.h]
1374 buffer_skip_string and extra sanity checking; needed by ssh-privsep
3d6fc2f8 1375 - provos@cvs.openbsd.org 2002/03/18 17:31:54
1376 [compress.c]
1377 export compression streams for ssh-privsep
1853d1ef 1378 - provos@cvs.openbsd.org 2002/03/18 17:50:31
9759df31 1379 [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c]
1380 [auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c]
1381 [kexgex.c servconf.c]
1382 [session.h servconf.h serverloop.c session.c sshd.c]
1383 integrate privilege separated openssh; its turned off by default
1384 for now. work done by me and markus@
ce19ff48 1385 - provos@cvs.openbsd.org 2002/03/18 17:53:08
1386 [sshd.8]
1387 credits for privsep
70aa9ff4 1388 - provos@cvs.openbsd.org 2002/03/18 17:59:09
1389 [sshd.8]
1390 document UsePrivilegeSeparation
73fbf637 1391 - stevesk@cvs.openbsd.org 2002/03/18 23:52:51
1392 [servconf.c]
1393 UnprivUser/UnprivGroup usable now--specify numeric user/group; ok
1394 provos@
1c352e97 1395 - stevesk@cvs.openbsd.org 2002/03/19 03:03:43
1396 [pathnames.h servconf.c servconf.h sshd.c]
1397 _PATH_PRIVSEP_CHROOT_DIR; ok provos@
fffbaee2 1398 - stevesk@cvs.openbsd.org 2002/03/19 05:23:08
1399 [sshd.8]
1400 Banner has no default.
702b7dd8 1401 - mpech@cvs.openbsd.org 2002/03/19 06:32:56
1402 [sftp-int.c]
1403 use xfree() after xstrdup().
1404
1405 markus@ ok
51aeb639 1406 - markus@cvs.openbsd.org 2002/03/19 10:35:39
1407 [auth-options.c auth.h session.c session.h sshd.c]
1408 clean up prototypes
762715ce 1409 - markus@cvs.openbsd.org 2002/03/19 10:49:35
9759df31 1410 [auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h]
1411 [packet.c session.c sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c]
1412 [sshconnect2.c sshd.c ttymodes.c]
762715ce 1413 KNF whitespace
5f1f36b5 1414 - markus@cvs.openbsd.org 2002/03/19 14:27:39
1415 [auth.c auth1.c auth2.c]
1416 make getpwnamallow() allways call pwcopy()
06bea668 1417 - markus@cvs.openbsd.org 2002/03/19 15:31:47
1418 [auth.c]
1419 check for NULL; from provos@
2ea6de2b 1420 - stevesk@cvs.openbsd.org 2002/03/20 19:12:25
1421 [servconf.c servconf.h ssh.h sshd.c]
1422 for unprivileged user, group do:
1423 pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@
256debd0 1424 - stevesk@cvs.openbsd.org 2002/03/20 21:08:08
1425 [sshd.c]
1426 strerror() on chdir() fail; ok provos@
edfb66cb 1427 - markus@cvs.openbsd.org 2002/03/21 10:21:20
1428 [ssh-add.c]
1429 ignore errors for nonexisting default keys in ssh-add,
1430 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158
c53c54c2 1431 - jakob@cvs.openbsd.org 2002/03/21 15:17:26
1432 [clientloop.c ssh.1]
1433 add built-in command line for adding new port forwardings on the fly.
1434 based on a patch from brian wellington. ok markus@.
7649bbfe 1435 - markus@cvs.openbsd.org 2002/03/21 16:38:06
1436 [scard.c]
1437 make compile w/ openssl 0.9.7
b9f62352 1438 - markus@cvs.openbsd.org 2002/03/21 16:54:53
1439 [scard.c scard.h ssh-keygen.c]
1440 move key upload to scard.[ch]
1441 - markus@cvs.openbsd.org 2002/03/21 16:57:15
1442 [scard.c]
1443 remove const
39ac8430 1444 - markus@cvs.openbsd.org 2002/03/21 16:58:13
1445 [clientloop.c]
1446 remove unused
514b94dc 1447 - rees@cvs.openbsd.org 2002/03/21 18:08:15
1448 [scard.c]
1449 In sc_put_key(), sc_reader_id should be id.
ce1ba33a 1450 - markus@cvs.openbsd.org 2002/03/21 20:51:12
1451 [sshd_config]
1452 add privsep (off)
324bf712 1453 - markus@cvs.openbsd.org 2002/03/21 21:23:34
1454 [sshd.c]
1455 add privsep_preauth() and remove 1 goto; ok provos@
86c4f63d 1456 - rees@cvs.openbsd.org 2002/03/21 21:54:34
1457 [scard.c scard.h ssh-keygen.c]
1458 Add PIN-protection for secret key.
76139bd8 1459 - rees@cvs.openbsd.org 2002/03/21 22:44:05
1460 [authfd.c authfd.h ssh-add.c ssh-agent.c ssh.c]
1461 Add PIN-protection for secret key.
ec9b7086 1462 - markus@cvs.openbsd.org 2002/03/21 23:07:37
1463 [clientloop.c]
1464 remove unused, sync w/ cmdline patch in my tree.
ce1ba33a 1465
81dadca3 146620020317
fdff2c55 1467 - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is
1468 wanted, warn if directory does not exist. Put system directories in
1469 front of PATH for finding entorpy commands.
43e41c2c 1470 - (tim) [contrib/aix/buildbff.sh contrib/aix/inventory.sh] AIX package
1471 build fixes. Patch by Darren Tucker <dtucker@zip.com.au>
1472 [contrib/solaris/buildpkg.sh] add missing dirs to SYSTEM_DIR. Have
1473 postinstall check for $piddir and add if necessary.
81dadca3 1474
e4abf75b 147520020311
1476 - (tim) [contrib/solaris/buildpkg.sh, contrib/solaris/README] Updated to
1477 build on all platforms that support SVR4 style package tools. Now runs
1478 from build dir. Parts are based on patches from Antonio Navarro, and
1479 Darren Tucker.
1480
fb8f3dc9 148120020308
a068d86f 1482 - (djm) Revert bits of Markus' OpenSSL compat patch which was
1483 accidentally committed.
1484 - (djm) Add Markus' patch for compat wih OpenSSL < 0.9.6.
1485 Known issue: Blowfish for SSH1 does not work
dc254471 1486 - (stevesk) entropy.c: typo in debug message
633151a3 1487 - (djm) ssh-keygen -i needs seeded RNG; report from markus@
fb8f3dc9 1488
0b202697 1489$Id$
This page took 0.582267 seconds and 5 git commands to generate.