]> andersk Git - openssh.git/blame - ChangeLog
- djm@cvs.openbsd.org 2002/09/19 01:58:18
[openssh.git] / ChangeLog
CommitLineData
792e7d2d 120020919
2 - (djm) OpenBSD CVS Sync
3 - stevesk@cvs.openbsd.org 2002/09/12 19:11:52
4 [ssh-agent.c]
5 %u for uid print; ok markus@
da0561eb 6 - stevesk@cvs.openbsd.org 2002/09/12 19:50:36
7 [session.c ssh.1]
8 add SSH_CONNECTION and deprecate SSH_CLIENT; bug #384. ok markus@
facfd613 9 - stevesk@cvs.openbsd.org 2002/09/13 19:23:09
10 [channels.c sshconnect.c sshd.c]
11 remove use of SO_LINGER, it should not be needed. error check
12 SO_REUSEADDR. fixup comments. ok markus@
8bd4e2ae 13 - stevesk@cvs.openbsd.org 2002/09/16 19:55:33
14 [session.c]
15 log when _PATH_NOLOGIN exists; ok markus@
e6fe1bab 16 - stevesk@cvs.openbsd.org 2002/09/16 20:12:11
17 [sshd_config.5]
18 more details on X11Forwarding security issues and threats; ok markus@
f1dcc34e 19 - stevesk@cvs.openbsd.org 2002/09/16 22:03:13
20 [sshd.8]
21 reference moduli(5) in FILES /etc/moduli.
5c0d0e90 22 - itojun@cvs.openbsd.org 2002/09/17 07:47:02
23 [channels.c]
24 don't quit while creating X11 listening socket.
25 http://mail-index.netbsd.org/current-users/2002/09/16/0005.html
26 got from portable. markus ok
6939bbd4 27 - djm@cvs.openbsd.org 2002/09/19 01:58:18
28 [ssh.c sshconnect.c]
29 bugzilla.mindrot.org #223 - ProxyCommands don't exit.
30 Patch from dtucker@zip.com.au; ok markus@
792e7d2d 31
4f3834e8 3220020912
eee2215e 33 - (djm) Made GNOME askpass programs return non-zero if cancel button is
34 pressed.
10a560d4 35 - (djm) Added getpeereid() replacement. Properly implemented for systems
36 with SO_PEERCRED support. Faked for systems which lack it.
9fd2a215 37 - (djm) Sync sys/tree.h with OpenBSD -current. Rename tree.h and
38 fake-queue.h to sys-tree.h and sys-queue.h
4f3834e8 39 - (djm) OpenBSD CVS Sync
40 - markus@cvs.openbsd.org 2002/09/08 20:24:08
41 [hostfile.h]
42 no comma at end of enumerator list
696f6bef 43 - itojun@cvs.openbsd.org 2002/09/09 06:48:06
44 [auth1.c auth.h auth-krb5.c monitor.c monitor.h]
45 [monitor_wrap.c monitor_wrap.h]
46 kerberos support for privsep. confirmed to work by lha@stacken.kth.se
47 patch from markus
661e45a0 48 - markus@cvs.openbsd.org 2002/09/09 14:54:15
49 [channels.c kex.h key.c monitor.c monitor_wrap.c radix.c uuencode.c]
50 signed vs unsigned from -pedantic; ok henning@
87f4111f 51 - markus@cvs.openbsd.org 2002/09/10 20:24:47
52 [ssh-agent.c]
53 check the euid of the connecting process with getpeereid(2);
54 ok provos deraadt stevesk
07d688d5 55 - stevesk@cvs.openbsd.org 2002/09/11 17:55:03
56 [ssh.1]
57 add agent and X11 forwarding warning text from ssh_config.5; ok markus@
8b10e20e 58 - stevesk@cvs.openbsd.org 2002/09/11 18:27:26
59 [authfd.c authfd.h ssh.c]
60 don't connect to agent to test for presence if we've previously
61 connected; ok markus@
00b3ad3e 62 - djm@cvs.openbsd.org 2002/09/11 22:41:50
63 [sftp.1 sftp-client.c sftp-client.h sftp-common.c sftp-common.h]
64 [sftp-glob.c sftp-glob.h sftp-int.c sftp-server.c]
65 support for short/long listings and globbing in "ls"; ok markus@
be0cd512 66 - djm@cvs.openbsd.org 2002/09/12 00:13:06
67 [sftp-int.c]
68 zap unused var introduced in last commit
4f3834e8 69
ac8802eb 7020020911
71 - (djm) Sync openbsd-compat with OpenBSD -current
72
e2e36358 7320020910
74 - (djm) Bug #365: Read /.ssh/environment properly under CygWin.
75 Patch from Mark Bradshaw <bradshaw@staff.crosswalk.com>
35c4faf5 76 - (djm) Bug #138: Make protocol 1 blowfish work with old OpenSSL.
77 Patch from Robert Halubek <rob@adso.com.pl>
e2e36358 78
3445ca02 7920020905
80 - (djm) OpenBSD CVS Sync
81 - stevesk@cvs.openbsd.org 2002/09/04 18:52:42
82 [servconf.c sshd.8 sshd_config.5]
83 default LoginGraceTime to 2m; 1m may be too short for slow systems.
84 ok markus@
cbecf1ed 85 - (djm) Merge openssh-TODO.patch from Redhat (null) beta
c4ee4c60 86 - (djm) Add gnome-ssh-askpass2.c (gtk2) by merge with patch from
87 Nalin Dahyabhai <nalin@redhat.com>
3c1dff28 88 - (djm) Add support for building gtk2 password requestor from Redhat beta
3445ca02 89
954640a4 9020020903
33e2e066 91 - (djm) Patch from itojun@ for Darwin OS: test getaddrinfo, reorder libcrypt
e18b7d35 92 - (djm) Fix Redhat RPM build dependancy test
954640a4 93 - (djm) OpenBSD CVS Sync
94 - markus@cvs.openbsd.org 2002/08/12 10:46:35
95 [ssh-agent.c]
96 make ssh-agent setgid, disallow ptrace.
755c4339 97 - espie@cvs.openbsd.org 2002/08/21 11:20:59
98 [sshd.8]
99 `RSA' updated to refer to `public key', where it matters.
100 okay markus@
6e0fbda1 101 - stevesk@cvs.openbsd.org 2002/08/21 19:38:06
102 [servconf.c sshd.8 sshd_config sshd_config.5]
103 change LoginGraceTime default to 1 minute; ok mouring@ markus@
00e41835 104 - stevesk@cvs.openbsd.org 2002/08/21 20:10:28
105 [ssh-agent.c]
106 raise listen backlog; ok markus@
c1a4eef1 107 - stevesk@cvs.openbsd.org 2002/08/22 19:27:53
108 [ssh-agent.c]
109 use common close function; ok markus@
1d77f8cb 110 - stevesk@cvs.openbsd.org 2002/08/22 19:38:42
111 [clientloop.c]
112 format with current EscapeChar; bugzilla #388 from wknox@mitre.org.
113 ok markus@
f34ec885 114 - stevesk@cvs.openbsd.org 2002/08/22 20:57:19
115 [ssh-agent.c]
116 shutdown(SHUT_RDWR) not needed before close here; ok markus@
848bf884 117 - markus@cvs.openbsd.org 2002/08/22 21:33:58
118 [auth1.c auth2.c]
119 auth_root_allowed() is handled by the monitor in the privsep case,
120 so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325
6c723e7c 121 - markus@cvs.openbsd.org 2002/08/22 21:45:41
122 [session.c]
123 send signal name (not signal number) in "exit-signal" message; noticed
124 by galb@vandyke.com
b41baf4d 125 - stevesk@cvs.openbsd.org 2002/08/27 17:13:56
126 [ssh-rsa.c]
127 RSA_public_decrypt() returns -1 on error so len must be signed;
128 ok markus@
dbcdea68 129 - stevesk@cvs.openbsd.org 2002/08/27 17:18:40
130 [ssh_config.5]
131 some warning text for ForwardAgent and ForwardX11; ok markus@
ba1566dd 132 - stevesk@cvs.openbsd.org 2002/08/29 15:57:25
133 [monitor.c session.c sshlogin.c sshlogin.h]
134 pass addrlen with sockaddr *; from Hajimu UMEMOTO <ume@FreeBSD.org>
135 NOTE: there are also p-specific parts to this patch. ok markus@
e59404d1 136 - stevesk@cvs.openbsd.org 2002/08/29 16:02:54
137 [ssh.1 ssh.c]
138 deprecate -P as UsePrivilegedPort defaults to no now; ok markus@
878b8992 139 - stevesk@cvs.openbsd.org 2002/08/29 16:09:02
140 [ssh_config.5]
141 more on UsePrivilegedPort and setuid root; ok markus@
9f324470 142 - stevesk@cvs.openbsd.org 2002/08/29 19:49:42
143 [ssh.c]
144 shrink initial privilege bracket for setuid case; ok markus@
57ff5eeb 145 - stevesk@cvs.openbsd.org 2002/08/29 22:54:10
146 [ssh_config.5 sshd_config.5]
147 state XAuthLocation is a full pathname
954640a4 148
b85698ab 14920020820
150 - OpenBSD CVS Sync
151 - millert@cvs.openbsd.org 2002/08/02 14:43:15
152 [monitor.c monitor_mm.c]
153 Change mm_zalloc() sanity checks to be more in line with what
154 we do in calloc() and add a check to monitor_mm.c.
155 OK provos@ and markus@
6a342527 156 - marc@cvs.openbsd.org 2002/08/02 16:00:07
157 [ssh.1 sshd.8]
158 note that .ssh/environment is only read when
159 allowed (PermitUserEnvironment in sshd_config).
160 OK markus@
4004c2ac 161 - markus@cvs.openbsd.org 2002/08/02 21:23:41
162 [ssh-rsa.c]
163 diff is u_int (2x); ok deraadt/provos
0caf874a 164 - markus@cvs.openbsd.org 2002/08/02 22:20:30
165 [ssh-rsa.c]
166 replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser
167 for authentication; ok deraadt/djm
75cf7563 168 - aaron@cvs.openbsd.org 2002/08/08 13:50:23
169 [sshconnect1.c]
170 Use & to test if bits are set, not &&; markus@ ok.
d6097023 171 - stevesk@cvs.openbsd.org 2002/08/08 23:54:52
172 [auth.c]
173 typo in comment
36535ee6 174 - stevesk@cvs.openbsd.org 2002/08/09 17:21:42
175 [sshd_config.5]
176 use Op for mdoc conformance; from esr@golux.thyrsus.com
177 ok aaron@
b3641662 178 - stevesk@cvs.openbsd.org 2002/08/09 17:41:12
179 [sshd_config.5]
180 proxy vs. fake display
35453849 181 - stevesk@cvs.openbsd.org 2002/08/12 17:30:35
182 [ssh.1 sshd.8 sshd_config.5]
183 more PermitUserEnvironment; ok markus@
24794905 184 - stevesk@cvs.openbsd.org 2002/08/17 23:07:14
185 [ssh.1]
186 ForwardAgent has defaulted to no for over 2 years; be more clear here.
4dcbbeea 187 - stevesk@cvs.openbsd.org 2002/08/17 23:55:01
188 [ssh_config.5]
189 ordered list here
7d3b91a6 190 - (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assign
191 it to ULONG_MAX.
b85698ab 192
cd018561 19320020813
194 - (tim) [configure.ac] Display OpenSSL header/library version.
195 Patch by dtucker@zip.com.au
196
8a48a7ef 19720020731
198 - (bal) OpenBSD CVS Sync
199 - markus@cvs.openbsd.org 2002/07/24 16:11:18
200 [hostfile.c hostfile.h sshconnect.c]
201 print out all known keys for a host if we get a unknown host key,
202 see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4
203
204 the ssharp mitm tool attacks users in a similar way, so i'd like to
205 pointed out again:
206 A MITM attack is always possible if the ssh client prints:
207 The authenticity of host 'bla' can't be established.
208 (protocol version 2 with pubkey authentication allows you to detect
209 MITM attacks)
5cb5518b 210 - mouring@cvs.openbsd.org 2002/07/25 01:16:59
211 [sftp.c]
212 FallBackToRsh does not exist anywhere else. Remove it from here.
213 OK deraadt.
567a05bf 214 - markus@cvs.openbsd.org 2002/07/29 18:57:30
215 [sshconnect.c]
216 print file:line
f00bab84 217 - markus@cvs.openbsd.org 2002/07/30 17:03:55
218 [auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5]
219 add PermitUserEnvironment (off by default!); from dot@dotat.at;
220 ok provos, deraadt
8a48a7ef 221
13979d47 22220020730
223 - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de
224
d228d9dd 22520020728
226 - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar
16c4a972 227 - (stevesk) [CREDITS] solar
75131bbd 228 - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned
229 char arg.
d228d9dd 230
d40af5fa 23120020725
232 - (djm) Remove some cruft from INSTALL
d91b4743 233 - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/
d40af5fa 234
56b54901 23520020723
236 - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger.
918ffb0b 237 - (bal) sync ID w/ ssh-agent.c
516f0d7d 238 - (bal) OpenBSD Sync
239 - markus@cvs.openbsd.org 2002/07/19 15:43:33
240 [log.c log.h session.c sshd.c]
241 remove fatal cleanups after fork; based on discussions with and code
242 from solar.
5d185586 243 - stevesk@cvs.openbsd.org 2002/07/19 17:42:40
244 [ssh.c]
245 display a warning from ssh when XAuthLocation does not exist or xauth
246 returned no authentication data. ok markus@
30998af1 247 - stevesk@cvs.openbsd.org 2002/07/21 18:32:20
248 [auth-options.c]
249 unneeded includes
dbc728ff 250 - stevesk@cvs.openbsd.org 2002/07/21 18:34:43
251 [auth-options.h]
252 remove invalid comment
97686bf9 253 - markus@cvs.openbsd.org 2002/07/22 11:03:06
254 [session.c]
255 fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors;
d341742a 256 - stevesk@cvs.openbsd.org 2002/07/22 17:32:56
257 [monitor.c]
258 u_int here; ok provos@
67f04db1 259 - stevesk@cvs.openbsd.org 2002/07/23 16:03:10
260 [sshd.c]
261 utmp_len is unsigned; display error consistent with other options.
262 ok markus@
0df3a240 263 - stevesk@cvs.openbsd.org 2002/07/15 17:15:31
264 [uidswap.c]
265 little more debugging; ok markus@
d341742a 266
21c2c5cd 26720020722
268 - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk
a93bd14c 269 - (stevesk) [xmmap.c] missing prototype for fatal()
ccbb983c 270 - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync
271 with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com.
d262b7f2 272 - (bal) [configure.ac] Missing ;; from cray patch.
30eab01d 273 - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines
274 into it's own header.
ee48c949 275 - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be
276 freed by the caller; add free_pam_environment() and use it.
1d3f4ae7 277 - (stevesk) [auth-pam.c] typo in comment
21c2c5cd 278
b992432e 27920020721
280 - (stevesk) [auth-pam.c] merge cosmetic changes from solar's
281 openssh-3.4p1-owl-password-changing.diff
277f55cf 282 - (stevesk) [auth-pam.c] merge rest of solar's PAM patch;
283 PAM_NEW_AUTHTOK_REQD remains in #if 0 for now.
f7808a93 284 - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch
285 warning on pam_conv struct conversation function.
337dde6b 286 - (stevesk) [auth-pam.h] license
8565f28e 287 - (stevesk) [auth-pam.h] unneeded include
e9b2c23d 288 - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h
b992432e 289
ce88d9df 29020020720
291 - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng().
292
4379c0e5 29320020719
294 - (tim) [contrib/solaris/buildpkg.sh] create privsep user/group if needed.
295 Patch by dtucker@zip.com.au
f75ca46d 296 - (tim) [configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au
4379c0e5 297
45491100 29820020718
299 - (tim) [defines.h] Bug 313 patch by dirk.meyer@dinoex.sub.org
300 - (tim) [monitor_mm.c] add missing declaration for xmmap(). Reported
301 by ayamura@ayamura.org
1cbbe6c8 302 - (tim) [configure.ac] Bug 267 rework int64_t test.
5749e709 303 - (tim) [includes.h] Bug 267 add stdint.h
45491100 304
dd3943d0 30520020717
306 - (bal) aixbff package updated by dtucker@zip.com.au
2bf42e4a 307 - (tim) [configure.ac] change how we do paths in AC_PATH_PROGS tests
308 for autoconf 2.53. Based on a patch by jrj@purdue.edu
dd3943d0 309
8fc47887 31020020716
311 - (tim) [contrib/solaris/opensshd.in] Only kill sshd if .pid file found
312
c750d869 31320020715
314 - (bal) OpenBSD CVS Sync
315 - itojun@cvs.openbsd.org 2002/07/12 13:29:09
316 [sshconnect.c]
317 print connect failure during debugging mode.
a2f883ce 318 - markus@cvs.openbsd.org 2002/07/12 15:50:17
319 [cipher.c]
320 EVP_CIPH_CUSTOM_IV for our own rijndael
2d199535 321 - (bal) Remove unused tty defined in do_setusercontext() pointed out by
322 dtucker@zip.com.au plus a a more KNF since I am near it.
846be3f4 323 - (bal) Privsep user creation support in Solaris buildpkg.sh by
324 dtucker@zip.com.au
c750d869 325
798c5808 32620020714
327 - (tim) [Makefile.in] replace "id sshd" with "sshd -t"
4165b82e 328 - (bal/tim) [acconfig.h configure.ac monitor_mm.c servconf.c
329 openbsd-compat/Makefile.in] support compression on platforms that
330 have no/broken MAP_ANON. Moved code to openbsd-compat/xmmap.c
331 Based on patch from nalin@redhat.com of code extracted from Owl's package
5fd8087a 332 - (tim) [ssh_prng_cmds.in] Bug 323 arp -n flag doesn't exist under Solaris.
333 report by chris@by-design.net
fdebdd4f 334 - (tim) [loginrec.c] Bug 347: Fix typo (WTMPX_FILE) report by rodney@bond.net
d80063fe 335 - (tim) [loginrec.c] Bug 348: add missing found = 1; to wtmpx_islogin()
336 report by rodney@bond.net
798c5808 337
6b2a3595 33820020712
339 - (tim) [Makefile.in] quiet down install-files: and check-user:
3085601b 340 - (tim) [configure.ac] remove unused filepriv line
6b2a3595 341
249f9903 34220020710
343 - (tim) [contrib/cygwin/ssh-host-config] explicitely sets the permissions
344 on /var/empty to 755 Patch by vinschen@redhat.com
6f901f8e 345 - (bal) OpenBSD CVS Sync
346 - itojun@cvs.openbsd.org 2002/07/09 11:56:50
347 [sshconnect.c]
348 silently try next address on connect(2). markus ok
59c825e1 349 - itojun@cvs.openbsd.org 2002/07/09 11:56:27
350 [canohost.c]
351 suppress log on reverse lookup failiure, as there's no real value in
352 doing so.
353 markus ok
aab5431b 354 - itojun@cvs.openbsd.org 2002/07/09 12:04:02
355 [sshconnect.c]
356 ed static function (less warnings)
94ad46d1 357 - stevesk@cvs.openbsd.org 2002/07/09 17:46:25
358 [sshd_config.5]
359 clarify no preference ordering in protocol list; ok markus@
9bd68577 360 - itojun@cvs.openbsd.org 2002/07/10 10:28:15
361 [sshconnect.c]
362 bark if all connection attempt fails.
09683edf 363 - deraadt@cvs.openbsd.org 2002/07/10 17:53:54
364 [rijndael.c]
365 use right sizeof in memcpy; markus ok
249f9903 366
e6f15ed1 36720020709
368 - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platforms
369 lacking that concept can share it. Patch by vinschen@redhat.com
370
4f9d6706 37120020708
372 - (tim) [openssh/contrib/solaris/buildpkg.sh] add PKG_INSTALL_ROOT to
373 work in a jumpstart environment. patch by kbrint@rufus.net
b451e27b 374 - (tim) [Makefile.in] workaround for broken pakadd on some systems.
cda1ebcb 375 - (tim) [configure.ac] fix libc89 utimes test. Mention default path for
376 --with-privsep-path=
4f9d6706 377
ac74561e 37820020707
379 - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH)
94d8258b 380 - (tim) [acconfig.h configure.ac sshd.c]
381 s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/
d41f8eed 382 - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes
383 patch from vinschen@redhat.com
0b832146 384 - (bal) [realpath.c] Updated with OpenBSD tree.
da2499f5 385 - (bal) OpenBSD CVS Sync
386 - deraadt@cvs.openbsd.org 2002/07/04 04:15:33
387 [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c]
388 patch memory leaks; grendel@zeitbombe.org
e1feb9bf 389 - deraadt@cvs.openbsd.org 2002/07/04 08:12:15
390 [channels.c packet.c]
391 blah blah minor nothing as i read and re-read and re-read...
eb9f2fab 392 - markus@cvs.openbsd.org 2002/07/04 10:41:47
393 [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c]
394 don't allocate, copy, and discard if there is not interested in the data;
395 ok deraadt@
4394a17f 396 - deraadt@cvs.openbsd.org 2002/07/06 01:00:49
397 [log.c]
398 KNF
50d2fbbc 399 - deraadt@cvs.openbsd.org 2002/07/06 01:01:26
400 [ssh-keyscan.c]
401 KNF, realloc fix, and clean usage
12a3f2c3 402 - stevesk@cvs.openbsd.org 2002/07/06 17:47:58
403 [ssh-keyscan.c]
404 unused variable
41545cb6 405 - (bal) Minor KNF on ssh-keyscan.c
ac74561e 406
0764e748 40720020705
408 - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs.
409 Reported by Darren Tucker <dtucker@zip.com.au>
e12659f4 410 - (tim) [contrib/cygwin/ssh-host-config] double slash corrction
411 from vinschen@redhat.com
0764e748 412
64c0ce80 41320020704
414 - (bal) Limit data to TTY for AIX only (Newer versions can't handle the
415 faster data rate) Bug #124
375c1dee 416 - (bal) glob.c defines TILDE and AIX also defines it. #undef it first.
417 bug #265
ff2de800 418 - (bal) One too many nulls in ports-aix.c
64c0ce80 419
d2f95449 42020020703
421 - (bal) Updated contrib/cygwin/ patch by vinschen@redhat.com
619a6aff 422 - (bal) minor correction to utimes() replacement. Patch by
423 onoe@sm.sony.co.jp
f11fe301 424 - OpenBSD CVS Sync
425 - markus@cvs.openbsd.org 2002/06/27 08:49:44
426 [dh.c ssh-keyscan.c sshconnect.c]
427 more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@
181d6635 428 - deraadt@cvs.openbsd.org 2002/06/27 09:08:00
429 [monitor.c]
430 improve mm_zalloc check; markus ok
30e37ee6 431 - deraadt@cvs.openbsd.org 2002/06/27 10:35:47
432 [auth2-none.c monitor.c sftp-client.c]
433 use xfree()
c8f94200 434 - stevesk@cvs.openbsd.org 2002/06/27 19:49:08
435 [ssh-keyscan.c]
436 use convtime(); ok markus@
a64d3560 437 - millert@cvs.openbsd.org 2002/06/28 01:49:31
438 [monitor_mm.c]
439 tree(3) wants an int return value for its compare functions and
440 the difference between two pointers is not an int. Just do the
441 safest thing and store the result in a long and then return 0,
442 -1, or 1 based on that result.
405a0d43 443 - deraadt@cvs.openbsd.org 2002/06/28 01:50:37
444 [monitor_wrap.c]
445 use ssize_t
4efd85b2 446 - deraadt@cvs.openbsd.org 2002/06/28 10:08:25
447 [sshd.c]
448 range check -u option at invocation
6ded293b 449 - deraadt@cvs.openbsd.org 2002/06/28 23:05:06
450 [sshd.c]
451 gidset[2] -> gidset[1]; markus ok
7fdc56c5 452 - deraadt@cvs.openbsd.org 2002/06/30 21:54:16
453 [auth2.c session.c sshd.c]
454 lint asks that we use names that do not overlap
343288b8 455 - deraadt@cvs.openbsd.org 2002/06/30 21:59:45
456 [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c
457 monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c
458 sshconnect2.c sshd.c]
459 minor KNF
7d60d74c 460 - deraadt@cvs.openbsd.org 2002/07/01 16:15:25
461 [msg.c]
462 %u
713f6cd9 463 - markus@cvs.openbsd.org 2002/07/01 19:48:46
464 [sshconnect2.c]
465 for compression=yes, we fallback to no-compression if the server does
466 not support compression, vice versa for compression=no. ok mouring@
261189cc 467 - markus@cvs.openbsd.org 2002/07/03 09:55:38
468 [ssh-keysign.c]
469 use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld)
470 in order to avoid a possible Kocher timing attack pointed out by Charles
471 Hannum; ok provos@
60cd0a97 472 - markus@cvs.openbsd.org 2002/07/03 14:21:05
473 [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config]
474 re-enable ssh-keysign's sbit, but make ssh-keysign read
475 /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled
476 globally. based on discussions with deraadt, itojun and sommerfeld;
477 ok itojun@
56fd97d7 478 - (bal) Failed password attempts don't increment counter on AIX. Bug #145
e8aa0a5c 479 - (bal) Missed Makefile.in change. keysign needs readconf.o
0ba40daa 480 - (bal) Clean up aix_usrinfo(). Ignore TTY= period I guess.
56fd97d7 481
b2f295dc 48220020702
483 - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc &
484 friends consistently. Spotted by Solar Designer <solar@openwall.com>
485
3c3e878a 48620020629
487 - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style
488 clean up while I'm near it.
489
811ee370 49020020628
491 - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented
492 options should contain default value. from solar.
b9b82dab 493 - (bal) Cygwin uid0 fix by vinschen@redhat.com
17962c40 494 - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c. Otherwise wise
495 have issues of our fixes not propogating right (ie bcopy instead of
496 memmove). OK tim
4fa4fb00 497 - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported.
498 Bug #303
811ee370 499
ce88d9df 50020020627
d1ff09ba 501 - OpenBSD CVS Sync
502 - deraadt@cvs.openbsd.org 2002/06/26 14:49:36
503 [monitor.c]
504 correct %u
63b5f1a1 505 - deraadt@cvs.openbsd.org 2002/06/26 14:50:04
506 [monitor_fdpass.c]
507 use ssize_t for recvmsg() and sendmsg() return
1431a900 508 - markus@cvs.openbsd.org 2002/06/26 14:51:33
509 [ssh-add.c]
510 fix exit code for -X/-x
bb0640b2 511 - deraadt@cvs.openbsd.org 2002/06/26 15:00:32
512 [monitor_wrap.c]
513 more %u
20e79e98 514 - markus@cvs.openbsd.org 2002/06/26 22:27:32
515 [ssh-keysign.c]
516 bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu
d1ff09ba 517
4bfa8bb6 51820020626
519 - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM
a594fa74 520 - (bal) OpenBSD CVS Sync
521 - markus@cvs.openbsd.org 2002/06/23 21:34:07
522 [channels.c]
523 tcode is u_int
38501509 524 - markus@cvs.openbsd.org 2002/06/24 13:12:23
525 [ssh-agent.1]
526 the socket name contains ssh-agent's ppid; via mpech@ from form@
f91d9a89 527 - markus@cvs.openbsd.org 2002/06/24 14:33:27
528 [channels.c channels.h clientloop.c serverloop.c]
529 move channel counter to u_int
1169c3df 530 - markus@cvs.openbsd.org 2002/06/24 14:55:38
531 [authfile.c kex.c ssh-agent.c]
532 cat to (void) when output from buffer_get_X is ignored
09915dc1 533 - itojun@cvs.openbsd.org 2002/06/24 15:49:22
534 [msg.c]
535 printf type pedant
d0a1c5d1 536 - deraadt@cvs.openbsd.org 2002/06/24 17:57:20
537 [sftp-server.c sshpty.c]
538 explicit (u_int) for uid and gid
6c69a6a9 539 - markus@cvs.openbsd.org 2002/06/25 16:22:42
540 [authfd.c]
541 unnecessary cast
87809a1f 542 - markus@cvs.openbsd.org 2002/06/25 18:51:04
543 [sshd.c]
544 lightweight do_setusercontext after chroot()
924681ee 545 - (bal) Updated AIX package build. Patch by dtucker@zip.com.au
46c8ebb3 546 - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8
78beb77d 547 - (bal) added back in error check for mmap(). I screwed up, Pointed
548 out by stevesk@
f2d9a1f8 549 - (tim) [README.privsep] UnixWare tip no longer needed.
88cb875c 550 - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP,
551 but it all damned lies.
0d0270e6 552 - (stevesk) [README.privsep] more for sshd pseudo-account.
8029e7fc 553 - (tim) [contrib/caldera/openssh.spec] add support for privsep
8695f9f7 554 - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@
b29fe4ea 555 - (djm) OpenBSD CVS Sync
556 - markus@cvs.openbsd.org 2002/06/26 08:53:12
557 [bufaux.c]
558 limit size of BNs to 8KB; ok provos/deraadt
22d62d31 559 - markus@cvs.openbsd.org 2002/06/26 08:54:18
560 [buffer.c]
561 limit append to 1MB and buffers to 10MB
5df8c731 562 - markus@cvs.openbsd.org 2002/06/26 08:55:02
563 [channels.c]
564 limit # of channels to 10000
87f18810 565 - markus@cvs.openbsd.org 2002/06/26 08:58:26
566 [session.c]
567 limit # of env vars to 1000; ok deraadt/djm
2f095a0e 568 - deraadt@cvs.openbsd.org 2002/06/26 13:20:57
569 [monitor.c]
570 be careful in mm_zalloc
66087567 571 - deraadt@cvs.openbsd.org 2002/06/26 13:49:26
572 [session.c]
573 disclose less information from environment files; based on input
574 from djm, and dschultz@uclink.Berkeley.EDU
477edc5d 575 - markus@cvs.openbsd.org 2002/06/26 13:55:37
576 [auth2-chall.c]
577 make sure # of response matches # of queries, fixes int overflow;
578 from ISS
03b14b6f 579 - markus@cvs.openbsd.org 2002/06/26 13:56:27
580 [version.h]
581 3.4
9c696d0d 582 - (djm) Require krb5 devel for RPM build w/ KrbV
c4186be7 583 - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai
584 <nalin@redhat.com>
1e7bc74c 585 - (djm) Update spec files for release
49b53b03 586 - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS
03b14b6f 587 - (djm) Release 3.4p1
6519cfd6 588 - (tim) [contrib/caldera/openssh.spec] remove 2 configure options I put in
589 by mistake
4bfa8bb6 590
ef1ac12b 59120020625
592 - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh
1a44c6f7 593 - (stevesk) [README.privsep] minor updates
fd3cbf67 594 - (djm) Create privsep directory and warn if privsep user is missing
595 during make install
702b2855 596 - (bal) Started list of PrivSep issues in TODO
1c6249af 597 - (bal) if mmap() is substandard, don't allow compression on server side.
598 Post 'event' we will add more options.
cbaa3d44 599 - (tim) [contrib/caldera/openssh.spec] Sync with Caldera
e2bc41f9 600 - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by
601 dtucker@zip.com.au
d170feb1 602 - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus
603 for Cygwin, Cray, & SCO
ef1ac12b 604
d5803314 60520020624
606 - OpenBSD CVS Sync
607 - deraadt@cvs.openbsd.org 2002/06/23 03:25:50
608 [tildexpand.c]
609 KNF
3ddc795d 610 - deraadt@cvs.openbsd.org 2002/06/23 03:26:19
611 [cipher.c key.c]
612 KNF
d6133f43 613 - deraadt@cvs.openbsd.org 2002/06/23 03:30:58
614 [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c
615 sshpty.c]
616 various KNF and %d for unsigned
9906a836 617 - deraadt@cvs.openbsd.org 2002/06/23 09:30:14
618 [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c
619 sftp.c]
620 bunch of u_int vs int stuff
512df038 621 - deraadt@cvs.openbsd.org 2002/06/23 09:39:55
622 [ssh-keygen.c]
623 u_int stuff
7528d467 624 - deraadt@cvs.openbsd.org 2002/06/23 09:46:51
625 [bufaux.c servconf.c]
626 minor KNF. things the fingers do while you read
e424e241 627 - deraadt@cvs.openbsd.org 2002/06/23 10:29:52
628 [ssh-agent.c sshd.c]
629 some minor KNF and %u
7138ebd9 630 - deraadt@cvs.openbsd.org 2002/06/23 20:39:45
631 [session.c]
632 compression_level is u_int
f09ce20a 633 - deraadt@cvs.openbsd.org 2002/06/23 21:06:13
634 [sshpty.c]
635 KNF
57f228e8 636 - deraadt@cvs.openbsd.org 2002/06/23 21:06:41
637 [channels.c channels.h session.c session.h]
638 display, screen, row, col, xpixel, ypixel are u_int; markus ok
0bc50167 639 - deraadt@cvs.openbsd.org 2002/06/23 21:10:02
640 [packet.c]
641 packet_get_int() returns unsigned for reason & seqnr
57f228e8 642 - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col,
643 xpixel are u_int.
644
d5803314 645
58177c0a 64620020623
647 - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX.
dc43acd2 648 - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset.
ef3912be 649 - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au
a8bbdc75 650 - OpenBSD CVS Sync
651 - stevesk@cvs.openbsd.org 2002/06/22 02:00:29
652 [ssh.h]
653 correct comment
1ae02182 654 - stevesk@cvs.openbsd.org 2002/06/22 02:40:23
655 [ssh.1]
656 section 5 not 4 for ssh_config
b2843ec6 657 - naddy@cvs.openbsd.org 2002/06/22 11:51:39
658 [ssh.1]
659 typo
75653d3e 660 - stevesk@cvs.openbsd.org 2002/06/22 16:32:54
661 [sshd.8]
662 add /var/empty in FILES section
a56313d7 663 - stevesk@cvs.openbsd.org 2002/06/22 16:40:19
664 [sshd.c]
665 check /var/empty owner mode; ok provos@
e4e83d70 666 - stevesk@cvs.openbsd.org 2002/06/22 16:41:57
667 [scp.1]
668 typo
baa08b92 669 - stevesk@cvs.openbsd.org 2002/06/22 16:45:29
670 [ssh-agent.1 sshd.8 sshd_config.5]
671 use process ID vs. pid/PID/process identifier
c28876e9 672 - stevesk@cvs.openbsd.org 2002/06/22 20:05:27
673 [sshd.c]
674 don't call setsid() if debugging or run from inetd; no "Operation not
675 permitted" errors now; ok millert@ markus@
d17ef027 676 - stevesk@cvs.openbsd.org 2002/06/22 23:09:51
677 [monitor.c]
678 save auth method before monitor_reset_key_state(); bugzilla bug #284;
679 ok provos@
58177c0a 680
0b202697 681$Id$
This page took 0.369411 seconds and 5 git commands to generate.