]> andersk Git - openssh.git/blame - ChangeLog
- (djm) Implement paranoid priv dropping checks, based on:
[openssh.git] / ChangeLog
CommitLineData
02e2a074 120030605
2 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
3 canohost.c changes.
688eed4a 4 - (djm) Implement paranoid priv dropping checks, based on:
5 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
6 Proceedings of USENIX Security Symposium 2002
02e2a074 7
b08a39ff 820030604
d60e487c 9 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
10 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
8acdec60 11 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
11f1e60e 12 Patch from larsch@trustcenter.de; ok markus@
13 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
14 larsch@trustcenter.de; ok markus@
d453a600 15 - (djm) OpenBSD CVS Sync
16 - djm@cvs.openbsd.org 2003/06/04 08:25:18
17 [sshconnect.c]
18 disable challenge/response and keyboard-interactive auth methods
19 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
20 bz #580; ok markus@
ee50371d 21 - djm@cvs.openbsd.org 2003/06/04 10:23:48
22 [sshd.c]
23 remove duplicated group-dropping code; ok markus@
b08a39ff 24 - djm@cvs.openbsd.org 2003/06/04 12:03:59
25 [serverloop.c]
26 remove bitrotten commet; ok markus@
cf3248b8 27 - djm@cvs.openbsd.org 2003/06/04 12:18:49
28 [scp.c]
29 ansify; ok markus@
0f764b2f 30 - djm@cvs.openbsd.org 2003/06/04 12:40:39
31 [scp.c]
32 kill ssh process upon receipt of signal, bz #241.
33 based on patch from esb AT hawaii.edu; ok markus@
1b558925 34 - djm@cvs.openbsd.org 2003/06/04 12:41:22
35 [sftp.c]
36 kill ssh process on receipt of signal; ok markus@
fba33e81 37 - (djm) Update to fix of bug #584: lock card before return.
38 From larsch@trustcenter.de
8d9bb5dd 39 - (djm) Always use mysignal() for SIGALRM
d60e487c 40
3a2b2b44 4120030603
42 - (djm) Replace setproctitle replacement with code derived from
43 UCB sendmail
c5a7d788 44 - (djm) OpenBSD CVS Sync
45 - markus@cvs.openbsd.org 2003/06/02 09:17:34
46 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
47 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
48 [sshd_config.5]
49 deprecate VerifyReverseMapping since it's dangerous if combined
50 with IP based access control as noted by Mike Harding; replace with
51 a UseDNS option, UseDNS is on by default and includes the
52 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
53 ok deraadt@, djm@
d981089c 54 - millert@cvs.openbsd.org 2003/06/03 02:56:16
55 [scp.c]
56 Remove the advertising clause in the UCB license which Berkeley
57 rescinded 22 July 1999. Proofed by myself and Theo.
c5a7d788 58 - (djm) Fix portable-specific uses of verify_reverse_mapping too
3e67f7df 59 - (djm) Sync openbsd-compat with OpenBSD CVS.
484d59c7 60 - No more 4-term BSD licenses in linked code
5d8ca8c7 61 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
3a2b2b44 62
aff561f9 6320030602
64 - (djm) Fix segv from bad reordering in auth-pam.c
416c732d 65 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
66 clobber
1b7342ab 67 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
68 CVS ID.
8862e142 69 - (djm) Remove "noip6" option from RedHat spec file. This may now be
70 set at runtime using AddressFamily option.
58ba3cb7 71 - (djm) Fix use of macro before #define in cipher-aes.c
382fe2fa 72 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
b0545fe6 73 - (djm) OpenBSD CVS Sync
74 - djm@cvs.openbsd.org 2003/05/26 12:54:40
75 [sshconnect.c]
76 fix format strings; ok markus@
fa5120a0 77 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
78 [sshd.c uidswap.c]
79 seteuid and setegid; markus ok
0f92946c 80 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
81 [ssh_config.5]
82 VerifyHostKeyDNS is v2 only. ok markus@
aff561f9 83
4f178be8 8420030530
85 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
86 roumenpetrov.info
eabb99c6 87 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
4f178be8 88
4881aebb 8920030526
90 - (djm) Avoid auth2-chall.c warning when compiling without
91 PAM, BSD_AUTH and SKEY
92
5b0fe364 9320030525
94- (djm) OpenBSD CVS Sync
95 - djm@cvs.openbsd.org 2003/05/24 09:02:22
96 [log.c]
97 pass logged data through strnvis; ok markus
b9ed513a 98 - djm@cvs.openbsd.org 2003/05/24 09:30:40
99 [authfile.c monitor.c sftp-common.c sshpty.c]
100 cast some types for printing; ok markus@
5b0fe364 101
44c78996 10220030524
103 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
104
d83ebe4a 10520030523
106 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
107 encoding (which encodes many more characters)
bd47824b 108 - OpenBSD CVS Sync
109 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
110 [sftp.1]
111 - new sentence, new line
112 - added .Xr's
113 - typos
114 ok djm@
3cbc677d 115 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
116 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
117 new sentence, new line
da54f5be 118 - djm@cvs.openbsd.org 2003/05/23 08:29:30
119 [sshconnect.c]
120 fix leak; ok markus@
d83ebe4a 121
c453493f 12220030520
123 - (djm) OpenBSD CVS Sync
124 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
125 [log.c]
126 use syslog_r() in a signal handler called place; markus ok
79d4fc55 127 - (djm) Configure logic to detect syslog_r and friends
c453493f 128
acb50584 12920030519
130 - (djm) Sync auth-pam.h with what we actually implement
131
13220030518
5ff453c0 133 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
134 recent merge
f811e52a 135 - (djm) OpenBSD CVS Sync
136 - djm@cvs.openbsd.org 2003/05/16 03:27:12
137 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
138 add AddressFamily option to ssh_config (like -4, -6 on commandline).
139 Portable bug #534; ok markus@
013b1214 140 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
141 [auth-rhosts.c]
142 just in case, put numbers to sscanf %s arg.
25b66522 143 - markus@cvs.openbsd.org 2003/05/17 04:27:52
144 [cipher.c cipher-ctr.c myproposal.h]
145 experimental support for aes-ctr modes from
146 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
147 ok djm@
25351757 148 - (djm) Remove IPv4 by default hack now that we can specify AF in config
3bf784bc 149 - (djm) Tidy and trim TODO
bffa6723 150 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
9901cb37 151 - (djm) Big KNF on openbsd-compat/
f1da2b8b 152 - (djm) KNF on md5crypt.[ch]
153 - (djm) KNF on auth-sia.[ch]
5ff453c0 154
f123055b 15520030517
156 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
157
c936c243 15820030516
159 - (djm) OpenBSD CVS Sync
160 - djm@cvs.openbsd.org 2003/05/15 13:52:10
161 [ssh.c]
162 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
163 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
a2144546 164 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
165 [readconf.c servconf.c]
166 warn for unsupported config option. ok markus@
5bdfde81 167 - markus@cvs.openbsd.org 2003/05/15 14:09:21
168 [auth2-krb5.c]
169 fix 64bit issue; report itojun@
09ab3296 170 - djm@cvs.openbsd.org 2003/05/15 14:55:25
171 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
172 add a ConnectTimeout option to ssh, based on patch from
173 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
b06b11ad 174 - (djm) Add warning for UsePAM when built without PAM support
7be625e1 175 - (djm) A few type mismatch fixes from Bug #565
0eb6370a 176 - (djm) Guard free_pam_environment against NULL argument. Works around
177 HP/UX PAM problems debugged by dtucker
c936c243 178
7efc7f57 17920030515
180 - (djm) OpenBSD CVS Sync
181 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
182 [ssh-agent.1]
183 setup -> set up;
184 from wiz@netbsd
21289cd0 185 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
186 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
187 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
188 add experimental support for verifying hos keys using DNS as described
189 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
190 ok markus@ and henning@
16a79097 191 - markus@cvs.openbsd.org 2003/05/14 22:24:42
192 [clientloop.c session.c ssh.1]
193 allow to send a BREAK to the remote system; ok various
b8c2031b 194 - markus@cvs.openbsd.org 2003/05/15 00:28:28
195 [sshconnect2.c]
196 cleanup unregister of per-method packet handlers; ok djm@
d0ec7f42 197 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
198 [readconf.c readconf.h servconf.c servconf.h]
199 always parse kerberos options. ok djm@ markus@
b414a17b 200 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
201 [dns.c]
202 add missing freerrset
3b6e3da9 203 - markus@cvs.openbsd.org 2003/05/15 03:08:29
204 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
205 split out custom EVP ciphers
02159d9b 206 - djm@cvs.openbsd.org 2003/05/15 03:10:52
207 [ssh-keygen.c]
208 avoid warning; ok jakob@
4a26f5c5 209 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
210 [sftp-int.c]
211 Make put/get (globed and nonglobed) code more consistant. OK djm@
c44f10c6 212 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
dc69f53c 213 [sftp-int.c sftp.c]
c44f10c6 214 Teach ls how to display multiple column display and allow users
215 to return to single column format via 'ls -1'. OK @djm
1457e7ff 216 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
217 [readconf.c servconf.c]
218 disable kerberos when not supported. ok markus@
861f0365 219 - markus@cvs.openbsd.org 2003/05/15 04:08:41
220 [ssh.1]
221 ~B is ssh2 only
d0ec7f42 222 - (djm) Always parse UsePAM
3e05e934 223 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
4460d509 224 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
86ee6794 225 - (djm) Tidy Makefile clean targets
2636769c 226 - (djm) Adapt README.dns for portable
2d2e4a34 227 - (djm) Avoid uuencode.c warnings
1457e7ff 228 - (djm) Enable UsePAM when built --with-pam
67467c30 229 - (djm) Only build getrrsetbyname replacement when using --with-dns
f420d2ba 230 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
231 correctly)
3c49ef10 232 - (djm) Bug #444: Wrong paths after reconfigure
321735c7 233 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
f420d2ba 234
dd3ebb5a 23520030514
236 - (djm) Bug #117: Don't lie to PAM about username
0608f8a7 237 - (djm) RCSID sync w/ OpenBSD
204fde99 238 - (djm) OpenBSD CVS Sync
239 - djm@cvs.openbsd.org 2003/04/09 12:00:37
240 [readconf.c]
241 strip trailing whitespace from config lines before parsing.
242 Fixes bz 528; ok markus@
18ae3c67 243 - markus@cvs.openbsd.org 2003/04/12 10:13:57
244 [cipher.c]
245 hide cipher details; ok djm@
45c42d58 246 - markus@cvs.openbsd.org 2003/04/12 10:15:36
247 [misc.c]
248 debug->debug2
c825cd79 249 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
250 [ssh.1]
251 document -V switch, fix wording; ok markus@
3e131a6d 252 - markus@cvs.openbsd.org 2003/04/14 14:17:50
253 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
254 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
927e9f8b 255 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
256 [sftp-int.c]
257 Missing globfree(&g) in process_put() spotted by Vince Brimhall
258 <VBrimhall@novell.com>. ok@ Theo
259 - markus@cvs.openbsd.org 2003/04/16 14:35:27
260 [auth.h]
261 document struct Authctxt; with solar
b9e5aff6 262 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
263 [ssh-keyscan.c]
264 -t in usage(); rogier@quaak.org
9a26a6e2 265 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
266 [sshd.8 sshd_config.5]
267 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
268 Bug #550 and * escaping suggested by jmc@.
09dc8896 269 - david@cvs.openbsd.org 2003/04/30 20:41:07
270 [sshd.8]
271 fix invalid .Pf macro usage introduced in previous commit
272 ok jmc@ mouring@
3566c73c 273 - markus@cvs.openbsd.org 2003/05/11 16:56:48
274 [authfile.c ssh-keygen.c]
275 change key_load_public to try to read a public from:
276 rsa1 private or rsa1 public and ssh2 keys.
277 this makes ssh-keygen -e fail for ssh1 keys more gracefully
278 for example; report from itojun (netbsd pr 20550).
0d942eff 279 - markus@cvs.openbsd.org 2003/05/11 20:30:25
280 [channels.c clientloop.c serverloop.c session.c ssh.c]
281 make channel_new() strdup the 'remote_name' (not the caller); ok theo
43348518 282 - markus@cvs.openbsd.org 2003/05/12 16:55:37
283 [sshconnect2.c]
284 for pubkey authentication try the user keys in the following order:
285 1. agent keys that are found in the config file
286 2. other agent keys
287 3. keys that are only listed in the config file
288 this helps when an agent has many keys, where the server might
289 close the connection before the correct key is used. report & ok pb@
dc109cfe 290 - markus@cvs.openbsd.org 2003/05/12 18:35:18
291 [ssh-keyscan.1]
292 typo: DSA keys are of type ssh-dss; Brian Poole
81466908 293 - markus@cvs.openbsd.org 2003/05/14 00:52:59
294 [ssh2.h]
295 ranges for per auth method messages
296 - djm@cvs.openbsd.org 2003/05/14 01:00:44
297 [sftp.1]
298 emphasise the batchmode functionality and make reference to pubkey auth,
299 both of which are FAQs; ok markus@
802e01b8 300 - markus@cvs.openbsd.org 2003/05/14 02:15:47
301 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
302 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
303 server interops with commercial client; ok jakob@ djm@
72c5fe79 304 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
305 [sftp.1]
306 - better formatting in SYNOPSIS
307 - whitespace at EOL
308 ok djm@
3a39206f 309 - markus@cvs.openbsd.org 2003/05/14 08:57:49
310 [monitor.c]
311 http://bugzilla.mindrot.org/show_bug.cgi?id=560
312 Privsep child continues to run after monitor killed.
313 Pass monitor signals through to child; Darren Tucker
751092f9 314 - (djm) Make portable build with MIT krb5 (some issues remain)
7fceb20d 315 - (djm) Add new UsePAM configuration directive to allow runtime control
316 over usage of PAM. This allows non-root use of sshd when built with
317 --with-pam
817e6d38 318 - (djm) Die screaming if start_pam() is called when UsePAM=no
83ccf11a 319 - (djm) Avoid KrbV leak for MIT Kerberos
b1848832 320 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
fa065de2 321 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
dd3ebb5a 322
91f3aa9b 32320030512
324 - (djm) Redhat spec: Don't install profile.d scripts when not
325 building with GNOME/GTK askpass (patch from bet@rahul.net)
326
5def520a 32720030510
328 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
329 "make install". Patch by roth@feep.net.
ad84c479 330 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
331 problem on Linux (fixes "could not set controlling tty" errors).
05114c74 332 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
333 proper challenge-response module
23ab1f36 334 - (djm) 2-clause license on loginrec.c, with permission from
335 andre@ae-35.com
5def520a 336
43ce025d 33720030504
dd594f99 338 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
339 Patch from vinschen@redhat.com.
43ce025d 340
2cd5dbba 34120030503
342 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
343 by wendyp@cray.com.
344
bf7c1e6c 34520030502
346 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
347 privsep should now work.
73d9dad3 348 - (dtucker) Move handling of bad password authentications into a platform
990278ef 349 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
bf7c1e6c 350
68ece370 35120030429
352 - (djm) Add back radix.o (used by AFS support), after it went missing from
353 Makefile many moons ago
354 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
355 - (djm) Fix blibpath specification for AIX/gcc
356 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
357
ded9dd18 35820030428
359 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
360 hacked code.
361
aceb0423 36220030427
363 - (bal) Bug #541: return; was dropped by mistake. Reported by
364 furrier@iglou.com
c8a50a34 365 - (bal) Since we don't support platforms lacking u_int_64. We may
366 as well clean out some of those evil #ifdefs
9a6fee8b 367 - (bal) auth1.c minor resync while looking at the code.
d7cf277b 368 - (bal) auth2.c same changed as above.
aceb0423 369
0a626302 37020030409
371 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
372 from matth@eecs.berkeley.edu
d35929b5 373 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
ffd7b36b 374 - (djm) OpenBSD CVS Sync
375 - markus@cvs.openbsd.org 2003/04/02 09:48:07
376 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
377 [readconf.h serverloop.c sshconnect2.c]
378 reapply rekeying chage, tested by henning@, ok djm@
16f1b5ca 379 - markus@cvs.openbsd.org 2003/04/02 14:36:26
380 [ssh-keysign.c]
381 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
6c1bc5c5 382 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
383 [progressmeter.c]
384 $OpenBSD$
385 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
386 [progressmeter.c]
387 remove $OpenBSD$, as other *.c does not have it.
806e4c11 388 - markus@cvs.openbsd.org 2003/04/07 08:29:57
389 [monitor_wrap.c]
390 typo: get correct counters; introduced during rekeying change.
2f5b2528 391 - millert@cvs.openbsd.org 2003/04/07 21:58:05
392 [progressmeter.c]
393 The UCB copyright here is incorrect. This code did not originate
394 at UCB, it was written by Luke Mewburn. Updated the copyright at
395 the author's request. markus@ OK
396 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
397 [*.c *.h]
398 rename log() into logit() to avoid name conflict. markus ok, from
399 netbsd
400 - (djm) XXX - Performed locally using:
401 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
70e1f62f 402 - hin@cvs.openbsd.org 2003/04/09 08:23:52
403 [servconf.c]
404 Don't include <krb.h> when compiling with Kerberos 5 support
2f5b2528 405 - (djm) Fix up missing include for packet.c
a3568201 406 - (djm) Fix missed log => logit occurance (reference by function pointer)
0a626302 407
4d0cb2e5 40820030402
409 - (bal) if IP_TOS is not found or broken don't try to compile in
410 packet_set_tos() function call. bug #527
411
a4e5acef 41220030401
413 - (djm) OpenBSD CVS Sync
414 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
415 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
416 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
417 - killed whitespace
418 - new sentence new line
419 - .Bk for arguments
420 ok markus@
177f584b 421 - markus@cvs.openbsd.org 2003/04/01 10:10:23
422 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
423 [readconf.h serverloop.c sshconnect2.c]
424 rekeying bugfixes and automatic rekeying:
425 * both client and server rekey _automatically_
426 (a) after 2^31 packets, because after 2^32 packets
427 the sequence number for packets wraps
428 (b) after 2^(blocksize_in_bits/4) blocks
429 (see: draft-ietf-secsh-newmodes-00.txt)
430 (a) and (b) are _enabled_ by default, and only disabled for known
431 openssh versions, that don't support rekeying properly.
432 * client option 'RekeyLimit'
433 * do not reply to requests during rekeying
434 - markus@cvs.openbsd.org 2003/04/01 10:22:21
435 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
436 [readconf.h serverloop.c sshconnect2.c]
437 backout rekeying changes (for 3.6.1)
519bdfe8 438 - markus@cvs.openbsd.org 2003/04/01 10:31:26
439 [compat.c compat.h kex.c]
440 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
441 tested by ho@ and myself
9dd240a3 442 - markus@cvs.openbsd.org 2003/04/01 10:56:46
443 [version.h]
444 3.6.1
ac01b518 445 - (djm) Crank spec file versions
b32453fe 446 - (djm) Release 3.6.1p1
a4e5acef 447
fd77a40f 44820030326
449 - (djm) OpenBSD CVS Sync
450 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
451 [sftp-server.c]
452 one last fix to the tree: race fix broke stuff; pr 3169;
453 srp@srparish.net, help from djm
454
8021857c 45520030325
456 - (djm) Fix getpeerid support for 64 bit BE systems. From
457 Arnd Bergmann <arndb@de.ibm.com>
458
cdb64c4d 45920030324
460 - (djm) OpenBSD CVS Sync
461 - markus@cvs.openbsd.org 2003/03/23 19:02:00
462 [monitor.c]
463 unbreak rekeying for privsep; ok millert@
464 - Release 3.6p1
62086365 465 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
466 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
cdb64c4d 467
0b202697 468$Id$
This page took 0.358993 seconds and 5 git commands to generate.