]> andersk Git - openssh.git/blame - ChangeLog
- (dtucker) [sshlogin.c] Move the NO_SSH_LASTLOG #ifndef line to include
[openssh.git] / ChangeLog
CommitLineData
6ee76eea 120090504
2 - (dtucker) [sshlogin.c] Move the NO_SSH_LASTLOG #ifndef line to include
3 variable declarations. Should prevent unused warnings anywhere it's set
4 (only Crays as far as I can tell) and be a no-op everywhere else.
5
bc9a470b 620090318
7 - (tim) [configure.ac] Remove setting IP_TOS_IS_BROKEN for Cygwin. The problem
8 that setsockopt(IP_TOS) doesn't work on Cygwin has been fixed since 2005.
9 Based on patch from vinschen at redhat com.
10
5077a5f6 1120090308
12 - (dtucker) [auth-passwd.c auth1.c auth2-kbdint.c auth2-none.c auth2-passwd.c
13 auth2-pubkey.c session.c openbsd-compat/bsd-cygwin_util.{c,h}
14 openbsd-compat/daemon.c] Remove support for Windows 95/98/ME and very old
15 version of Cygwin. Patch from vinschen at redhat com.
16
3e566c29 1720090307
18 - (dtucker) [contrib/aix/buildbff.sh] Only try to rename ssh_prng_cmds if it
19 exists (it's not created if OpenSSL's PRNG is self-seeded, eg if the OS
20 has a /dev/random).
36b68fd5 21 - (dtucker) [schnorr.c openbsd-compat/openssl-compat.{c,h}] Add
22 EVP_DigestUpdate to the OLD_EVP compatibility functions and tell schnorr.c
23 to use them. Allows building with older OpenSSL versions.
aeed50df 24 - (dtucker) [configure.ac defines.h] Check for in_port_t and typedef if needed.
86783a32 25 - (dtucker) [configure.ac] Missing comma in type list.
14e380c6 26 - (dtucker) [configure.ac openbsd-compat/openssl-compat.{c,h}]
27 EVP_DigestUpdate does not exactly match the other OLD_EVP functions (eg
28 in openssl 0.9.6) so add an explicit test for it.
3e566c29 29
5b01421b 3020090306
31 - (djm) OpenBSD CVS Sync
32 - djm@cvs.openbsd.org 2009/03/05 07:18:19
33 [auth2-jpake.c jpake.c jpake.h monitor_wrap.c monitor_wrap.h schnorr.c]
34 [sshconnect2.c]
35 refactor the (disabled) Schnorr proof code to make it a little more
36 generally useful
4f983ff5 37 - djm@cvs.openbsd.org 2009/03/05 11:30:50
38 [uuencode.c]
39 document what these functions do so I don't ever have to recuse into
40 b64_pton/ntop to remember their return values
5b01421b 41
ebf012a2 4220090223
43 - (djm) OpenBSD CVS Sync
44 - djm@cvs.openbsd.org 2009/02/22 23:50:57
45 [ssh_config.5 sshd_config.5]
46 don't advertise experimental options
09b37352 47 - djm@cvs.openbsd.org 2009/02/22 23:59:25
48 [sshd_config.5]
49 missing period
52d8f3f6 50 - djm@cvs.openbsd.org 2009/02/23 00:06:15
51 [version.h]
52 openssh-5.2
dc336a3b 53 - (djm) [README] update for 5.2
0e8d25c9 54 - (djm) Release openssh-5.2p1
ebf012a2 55
7eec82ab 5620090222
57 - (djm) OpenBSD CVS Sync
58 - tobias@cvs.openbsd.org 2009/02/21 19:32:04
59 [misc.c sftp-server-main.c ssh-keygen.c]
60 Added missing newlines in error messages.
61 ok dtucker
62
1925d16d 6320090221
64 - (djm) OpenBSD CVS Sync
65 - djm@cvs.openbsd.org 2009/02/17 01:28:32
66 [ssh_config]
67 sync with revised default ciphers; pointed out by dkrause@
dca75d4b 68 - djm@cvs.openbsd.org 2009/02/18 04:31:21
69 [schnorr.c]
70 signature should hash over the entire group, not just the generator
71 (this is still disabled code)
9a4a047b 72 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
73 [contrib/suse/openssh.spec] Prepare for 5.2p1
1925d16d 74
aa10bde9 7520090216
76 - (djm) [regress/conch-ciphers.sh regress/putty-ciphers.sh]
77 [regress/putty-kex.sh regress/putty-transfer.sh] Downgrade disabled
78 interop tests from FATAL error to a warning. Allows some interop
79 tests to proceed if others are missing necessary prerequisites.
4c3b7423 80 - (djm) [configure.ac] support GNU/kFreeBSD and GNU/kOpensolaris
81 systems; patch from Aurelien Jarno via rmh AT aybabtu.com
aa10bde9 82
69354fe2 8320090214
84 - (djm) OpenBSD CVS Sync
85 - dtucker@cvs.openbsd.org 2009/02/02 11:15:14
86 [sftp.c]
87 Initialize a few variables to prevent spurious "may be used
88 uninitialized" warnings from newer gcc's. ok djm@
17525a70 89 - djm@cvs.openbsd.org 2009/02/12 03:00:56
90 [canohost.c canohost.h channels.c channels.h clientloop.c readconf.c]
91 [readconf.h serverloop.c ssh.c]
92 support remote port forwarding with a zero listen port (-R0:...) to
93 dyamically allocate a listen port at runtime (this is actually
94 specified in rfc4254); bz#1003 ok markus@
1d68c50a 95 - djm@cvs.openbsd.org 2009/02/12 03:16:01
96 [serverloop.c]
97 tighten check for -R0:... forwarding: only allow dynamic allocation
98 if want_reply is set in the packet
28b5d376 99 - djm@cvs.openbsd.org 2009/02/12 03:26:22
100 [monitor.c]
101 some paranoia: check that the serialised key is really KEY_RSA before
102 diddling its internals
db9039d0 103 - djm@cvs.openbsd.org 2009/02/12 03:42:09
104 [ssh.1]
105 document -R0:... usage
1e709459 106 - djm@cvs.openbsd.org 2009/02/12 03:44:25
107 [ssh.1]
108 consistency: Dq => Ql
c6b2c0e0 109 - djm@cvs.openbsd.org 2009/02/12 03:46:17
110 [ssh_config.5]
111 document RemoteForward usage with 0 listen port
e12d3e21 112 - jmc@cvs.openbsd.org 2009/02/12 07:34:20
113 [ssh_config.5]
114 kill trailing whitespace;
8b773163 115 - markus@cvs.openbsd.org 2009/02/13 11:50:21
116 [packet.c]
117 check for enc !=NULL in packet_start_discard
e75a14a1 118 - djm@cvs.openbsd.org 2009/02/14 06:35:49
119 [PROTOCOL]
120 mention that eow and no-more-sessions extensions are sent only to
121 OpenSSH peers
69354fe2 122
12320090212
f7b8146b 124 - (djm) [sshpty.c] bz#1419: OSX uses cloning ptys that automagically
125 set ownership and modes, so avoid explicitly setting them
295dd642 126 - (djm) [configure.ac loginrec.c] bz#1421: fix lastlog support for OSX.
127 OSX provides a getlastlogxbyname function that automates the reading of
128 a lastlog file. Also, the pututxline function will update lastlog so
129 there is no need for loginrec.c to do it explicitly. Collapse some
130 overly verbose code while I'm in there.
f7b8146b 131
b4341d7a 13220090201
133 - (dtucker) [defines.h sshconnect.c] INET6_ADDRSTRLEN is now needed in
134 channels.c too, so move the definition for non-IP6 platforms to defines.h
135 where it can be shared.
136
e1986e0a 13720090129
138 - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
139 If the CYGWIN environment variable is empty, the installer script
140 should not install the service with an empty CYGWIN variable, but
141 rather without setting CYGWNI entirely.
863ba23a 142 - (tim) [contrib/cygwin/ssh-host-config] Whitespace cleanup. No code changes.
e1986e0a 143
7f24626b 14420090128
145 - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
146 Changes to work on Cygwin 1.5.x as well as on the new Cygwin 1.7.x.
147 The information given for the setting of the CYGWIN environment variable
148 is wrong for both releases so I just removed it, together with the
149 unnecessary (Cygwin 1.5.x) or wrong (Cygwin 1.7.x) default setting.
150
68405671 15120081228
152 - (djm) OpenBSD CVS Sync
153 - stevesk@cvs.openbsd.org 2008/12/09 03:20:42
154 [channels.c servconf.c]
155 channel_print_adm_permitted_opens() should deal with all the printing
156 for that config option. suggested by markus@; ok markus@ djm@
157 dtucker@
7efff8ce 158 - djm@cvs.openbsd.org 2008/12/09 04:32:22
159 [auth2-chall.c]
160 replace by-hand string building with xasprinf(); ok deraadt@
d3cd4016 161 - sobrado@cvs.openbsd.org 2008/12/09 15:35:00
162 [sftp.1 sftp.c]
163 update for the synopses displayed by the 'help' command, there are a
164 few missing flags; add 'bye' to the output of 'help'; sorting and spacing.
165 jmc@ suggested replacing .Oo/.Oc with a single .Op macro.
166 ok jmc@
6c20a13f 167 - stevesk@cvs.openbsd.org 2008/12/09 22:37:33
168 [clientloop.c]
169 fix typo in error message
fd2ce9c6 170 - stevesk@cvs.openbsd.org 2008/12/10 03:55:20
171 [addrmatch.c]
172 o cannot be NULL here but use xfree() to be consistent; ok djm@
8647612c 173 - stevesk@cvs.openbsd.org 2008/12/29 01:12:36
174 [ssh-keyscan.1]
175 fix example, default key type is rsa for 3+ years; from
176 frederic.perrin@resel.fr
040d6b1f 177 - stevesk@cvs.openbsd.org 2008/12/29 02:23:26
178 [pathnames.h]
179 no need to escape single quotes in comments
d4bfdc62 180 - okan@cvs.openbsd.org 2008/12/30 00:46:56
181 [sshd_config.5]
182 add AllowAgentForwarding to available Match keywords list
183 ok djm
6cf44b6a 184 - djm@cvs.openbsd.org 2009/01/01 21:14:35
185 [channels.c]
186 call channel destroy callbacks on receipt of open failure messages.
187 fixes client hangs when connecting to a server that has MaxSessions=0
188 set spotted by imorgan AT nas.nasa.gov; ok markus@
546202d0 189 - djm@cvs.openbsd.org 2009/01/01 21:17:36
190 [kexgexs.c]
191 fix hash calculation for KEXGEX: hash over the original client-supplied
192 values and not the sanity checked versions that we acutally use;
193 bz#1540 reported by john.smith AT arrows.demon.co.uk
194 ok markus@
4866a6d6 195 - djm@cvs.openbsd.org 2009/01/14 01:38:06
196 [channels.c]
197 support SOCKS4A protocol, from dwmw2 AT infradead.org via bz#1482;
198 "looks ok" markus@
9b4b86c2 199 - stevesk@cvs.openbsd.org 2009/01/15 17:38:43
200 [readconf.c]
201 1) use obsolete instead of alias for consistency
202 2) oUserKnownHostsFile not obsolete but oGlobalKnownHostsFile2 is
203 so move the comment.
204 3) reorder so like options are together
205 ok djm@
1338ba77 206 - djm@cvs.openbsd.org 2009/01/22 09:46:01
207 [channels.c channels.h session.c]
208 make Channel->path an allocated string, saving a few bytes here and
209 there and fixing bz#1380 in the process; ok markus@
920706fd 210 - djm@cvs.openbsd.org 2009/01/22 09:49:57
211 [channels.c]
212 oops! I committed the wrong version of the Channel->path diff,
213 it was missing some tweaks suggested by stevesk@
5134115d 214 - djm@cvs.openbsd.org 2009/01/22 10:02:34
215 [clientloop.c misc.c readconf.c readconf.h servconf.c servconf.h]
216 [serverloop.c ssh-keyscan.c ssh.c sshd.c]
217 make a2port() return -1 when it encounters an invalid port number
218 rather than 0, which it will now treat as valid (needed for future work)
219 adjust current consumers of a2port() to check its return value is <= 0,
220 which in turn required some things to be converted from u_short => int
221 make use of int vs. u_short consistent in some other places too
222 feedback & ok markus@
368e246f 223 - djm@cvs.openbsd.org 2009/01/22 10:09:16
224 [auth-options.c]
225 another chunk of a2port() diff that got away. wtfdjm??
700fd7e7 226 - djm@cvs.openbsd.org 2009/01/23 07:58:11
227 [myproposal.h]
228 prefer CTR modes and revised arcfour (i.e w/ discard) modes to CBC
229 modes; ok markus@
29ec8eb3 230 - naddy@cvs.openbsd.org 2009/01/24 17:10:22
231 [ssh_config.5 sshd_config.5]
232 sync list of preferred ciphers; ok djm@
608bcf58 233 - markus@cvs.openbsd.org 2009/01/26 09:58:15
234 [cipher.c cipher.h packet.c]
235 Work around the CPNI-957037 Plaintext Recovery Attack by always
236 reading 256K of data on packet size or HMAC errors (in CBC mode only).
237 Help, feedback and ok djm@
238 Feedback from Martin Albrecht and Paterson Kenny
68405671 239
a25d08b3 24020090107
241 - (djm) [uidswap.c] bz#1412: Support >16 supplemental groups in OS X.
242 Patch based on one from vgiffin AT apple.com; ok dtucker@
b5a1596f 243 - (djm) [channels.c] bz#1419: support "on demand" X11 forwarding via
244 launchd on OS X; patch from vgiffin AT apple.com, slightly tweaked;
245 ok dtucker@
23b3ed0b 246 - (djm) [contrib/ssh-copy-id.1 contrib/ssh-copy-id] bz#1492: Make
247 ssh-copy-id copy id_rsa.pub by default (instead of the legacy "identity"
248 key). Patch from cjwatson AT debian.org
a25d08b3 249
16076ac9 25020090107
251 - (tim) [configure.ac defines.h openbsd-compat/port-uw.c
252 openbsd-compat/xcrypt.c] Add SECUREWARE support to OpenServer 6 SVR5 ABI.
253 OK djm@ dtucker@
44a71983 254 - (tim) [configure.ac] Move check_for_libcrypt_later=1 in *-*-sysv5*) section.
255 OpenServer 6 doesn't need libcrypt.
16076ac9 256
09925c00 25720081209
258 - (djm) OpenBSD CVS Sync
259 - djm@cvs.openbsd.org 2008/12/09 02:38:18
260 [clientloop.c]
261 The ~C escape handler does not work correctly for multiplexed sessions -
262 it opens a commandline on the master session, instead of on the slave
263 that requested it. Disable it on slave sessions until such time as it
264 is fixed; bz#1543 report from Adrian Bridgett via Colin Watson
265 ok markus@
ddb5e00f 266 - djm@cvs.openbsd.org 2008/12/09 02:39:59
267 [sftp.c]
268 Deal correctly with failures in remote stat() operation in sftp,
269 correcting fail-on-error behaviour in batchmode. bz#1541 report and
270 fix from anedvedicky AT gmail.com; ok markus@
bab3d903 271 - djm@cvs.openbsd.org 2008/12/09 02:58:16
272 [readconf.c]
273 don't leave junk (free'd) pointers around in Forward *fwd argument on
274 failure; avoids double-free in ~C -L handler when given an invalid
275 forwarding specification; bz#1539 report from adejong AT debian.org
276 via Colin Watson; ok markus@ dtucker@
83cd8c39 277 - djm@cvs.openbsd.org 2008/12/09 03:02:37
278 [sftp.1 sftp.c]
279 correct sftp(1) and corresponding usage syntax;
280 bz#1518 patch from imorgan AT nas.nasa.gov; ok deraadt@ improved diff jmc@
09925c00 281
53e2660a 28220081208
283 - (djm) [configure.ac] bz#1538: better test for ProPolice/SSP: actually
284 use some stack in main().
285 Report and suggested fix from vapier AT gentoo.org
66e16767 286 - (djm) OpenBSD CVS Sync
287 - markus@cvs.openbsd.org 2008/12/02 19:01:07
288 [clientloop.c]
289 we have to use the recipient's channel number (RFC 4254) for
290 SSH2_MSG_CHANNEL_SUCCESS/SSH2_MSG_CHANNEL_FAILURE messages,
291 otherwise we trigger 'Non-public channel' error messages on sshd
292 systems with clientkeepalive enabled; noticed by sturm; ok djm;
7ec2b275 293 - markus@cvs.openbsd.org 2008/12/02 19:08:59
294 [serverloop.c]
295 backout 1.149, since it's not necessary and openssh clients send
296 broken CHANNEL_FAILURE/SUCCESS messages since about 2004; ok djm@
b09b559d 297 - markus@cvs.openbsd.org 2008/12/02 19:09:38
298 [channels.c]
299 s/remote_id/id/ to be more consistent with other code; ok djm@
53e2660a 300
de470c82 30120081201
302 - (dtucker) [contrib/cygwin/{Makefile,ssh-host-config}] Add new doc files
303 and tweak the is-sshd-running check in ssh-host-config. Patch from
304 vinschen at redhat com.
66af1c21 305 - (dtucker) OpenBSD CVS Sync
306 - markus@cvs.openbsd.org 2008/11/21 15:47:38
307 [packet.c]
308 packet_disconnect() on padding error, too. should reduce the success
309 probability for the CPNI-957037 Plaintext Recovery Attack to 2^-18
310 ok djm@
8e10da10 311 - dtucker@cvs.openbsd.org 2008/11/30 11:59:26
312 [monitor_fdpass.c]
313 Retry sendmsg/recvmsg on EAGAIN and EINTR; ok djm@
de470c82 314
d2aa725a 31520081123
316 - (dtucker) [monitor_fdpass.c] Reduce diff vs OpenBSD by moving some
317 declarations, removing an unnecessary union member and adding whitespace.
c037a517 318 cmsgbuf.tmp thing spotted by des at des no, ok djm some time ago.
d2aa725a 319
95e16084 32020081118
321 - (tim) [addrmatch.c configure.ac] Some platforms do not have sin6_scope_id
322 member of sockaddr_in6. Also reported in Bug 1491 by David Leonard. OK and
323 feedback by djm@
324
0bd3332c 32520081111
326 - (dtucker) OpenBSD CVS Sync
327 - jmc@cvs.openbsd.org 2008/11/05 11:22:54
328 [servconf.c]
329 passord -> password;
330 fixes user/5975 from Rene Maroufi
1890bf8b 331 - stevesk@cvs.openbsd.org 2008/11/07 00:42:12
332 [ssh-keygen.c]
333 spelling/typo in comment
92d0164c 334 - stevesk@cvs.openbsd.org 2008/11/07 18:50:18
335 [nchan.c]
336 add space to some log/debug messages for readability; ok djm@ markus@
3d7f6c3d 337 - dtucker@cvs.openbsd.org 2008/11/07 23:34:48
338 [auth2-jpake.c]
339 Move JPAKE define to make life easier for portable. ok djm@
94087553 340 - tobias@cvs.openbsd.org 2008/11/09 12:34:47
341 [session.c ssh.1]
342 typo fixed (overriden -> overridden)
343 ok espie, jmc
2505b891 344 - stevesk@cvs.openbsd.org 2008/11/11 02:58:09
345 [servconf.c]
346 USE_AFS not referenced so remove #ifdef. fixes sshd -T not printing
347 kerberosgetafstoken. ok dtucker@
348 (Id sync only, we still want the ifdef in portable)
861e9e53 349 - stevesk@cvs.openbsd.org 2008/11/11 03:55:11
350 [channels.c]
351 for sshd -T print 'permitopen any' vs. 'permitopen' for case of no
352 permitopen's; ok and input dtucker@
0771f5dd 353 - djm@cvs.openbsd.org 2008/11/10 02:06:35
354 [regress/putty-ciphers.sh]
355 PuTTY supports AES CTR modes, so interop test against them too
0bd3332c 356
39aa8698 35720081105
358 - OpenBSD CVS Sync
359 - djm@cvs.openbsd.org 2008/11/03 08:59:41
360 [servconf.c]
361 include MaxSessions in sshd -T output; patch from imorgan AT nas.nasa.gov
a28625a6 362 - djm@cvs.openbsd.org 2008/11/04 07:58:09
363 [auth.c]
364 need unistd.h for close() prototype
365 (ID sync only)
5adf6b9a 366 - djm@cvs.openbsd.org 2008/11/04 08:22:13
367 [auth.h auth2.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h]
368 [readconf.c readconf.h servconf.c servconf.h ssh2.h ssh_config.5]
369 [sshconnect2.c sshd_config.5 jpake.c jpake.h schnorr.c auth2-jpake.c]
370 [Makefile.in]
371 Add support for an experimental zero-knowledge password authentication
372 method using the J-PAKE protocol described in F. Hao, P. Ryan,
373 "Password Authenticated Key Exchange by Juggling", 16th Workshop on
374 Security Protocols, Cambridge, April 2008.
375
376 This method allows password-based authentication without exposing
377 the password to the server. Instead, the client and server exchange
378 cryptographic proofs to demonstrate of knowledge of the password while
379 revealing nothing useful to an attacker or compromised endpoint.
380
381 This is experimental, work-in-progress code and is presently
382 compiled-time disabled (turn on -DJPAKE in Makefile.inc).
383
384 "just commit it. It isn't too intrusive." deraadt@
d35f707e 385 - stevesk@cvs.openbsd.org 2008/11/04 19:18:00
386 [readconf.c]
387 because parse_forward() is now used to parse all forward types (DLR),
388 and it malloc's space for host variables, we don't need to malloc
389 here. fixes small memory leaks.
390
391 previously dynamic forwards were not parsed in parse_forward() and
392 space was not malloc'd in that case.
393
394 ok djm@
10cf2ac3 395 - stevesk@cvs.openbsd.org 2008/11/05 03:23:09
396 [clientloop.c ssh.1]
397 add dynamic forward escape command line; ok djm@
39aa8698 398
94f36816 39920081103
400 - OpenBSD CVS Sync
401 - sthen@cvs.openbsd.org 2008/07/24 23:55:30
402 [ssh-keygen.1]
403 Add "ssh-keygen -F -l" to synopsis (displays fingerprint from
404 known_hosts). ok djm@
405 - grunk@cvs.openbsd.org 2008/07/25 06:56:35
406 [ssh_config]
407 Add VisualHostKey to example file, ok djm@
5ca42ddb 408 - grunk@cvs.openbsd.org 2008/07/25 07:05:16
409 [key.c]
410 In random art visualization, make sure to use the end marker only at the
411 end. Initial diff by Dirk Loss, tweaks and ok djm@
341cb46b 412 - markus@cvs.openbsd.org 2008/07/31 14:48:28
413 [sshconnect2.c]
414 don't allocate space for empty banners; report t8m at centrum.cz;
415 ok deraadt
686bdcbd 416 - krw@cvs.openbsd.org 2008/08/02 04:29:51
417 [ssh_config.5]
418 whitepsace -> whitespace. From Matthew Clarke via bugs@.
e3ef5245 419 - djm@cvs.openbsd.org 2008/08/21 04:09:57
420 [session.c]
421 allow ForceCommand internal-sftp with arguments. based on patch from
422 michael.barabanov AT gmail.com; ok markus@
1975fb98 423 - djm@cvs.openbsd.org 2008/09/06 12:24:13
424 [kex.c]
425 OpenSSL 0.9.8h supplies a real EVP_sha256 so we do not need our
426 replacement anymore
427 (ID sync only for portable - we still need this)
72bd2fca 428 - markus@cvs.openbsd.org 2008/09/11 14:22:37
429 [compat.c compat.h nchan.c ssh.c]
430 only send eow and no-more-sessions requests to openssh 5 and newer;
431 fixes interop problems with broken ssh v2 implementations; ok djm@
2e96832c 432 - millert@cvs.openbsd.org 2008/10/02 14:39:35
433 [session.c]
434 Convert an unchecked strdup to xstrdup. OK deraadt@
dc94d57e 435 - jmc@cvs.openbsd.org 2008/10/03 13:08:12
436 [sshd.8]
437 do not give an example of how to chmod files: we can presume the user
438 knows that. removes an ambiguity in the permission of authorized_keys;
439 ok deraadt
90d5350e 440 - deraadt@cvs.openbsd.org 2008/10/03 23:56:28
441 [sshconnect2.c]
442 Repair strnvis() buffersize of 4*n+1, with termination gauranteed by the
443 function.
444 spotted by des@freebsd, who commited an incorrect fix to the freebsd tree
445 and (as is fairly typical) did not report the problem to us. But this fix
446 is correct.
447 ok djm
bf793210 448 - djm@cvs.openbsd.org 2008/10/08 23:34:03
449 [ssh.1 ssh.c]
450 Add -y option to force logging via syslog rather than stderr.
451 Useful for daemonised ssh connection (ssh -f). Patch originally from
452 and ok'd by markus@
e68868a1 453 - djm@cvs.openbsd.org 2008/10/09 03:50:54
454 [servconf.c sshd_config.5]
455 support setting PermitEmptyPasswords in a Match block
456 requested in PR3891; ok dtucker@
f3a4d0d0 457 - jmc@cvs.openbsd.org 2008/10/09 06:54:22
458 [ssh.c]
459 add -y to usage();
6503dc91 460 - stevesk@cvs.openbsd.org 2008/10/10 04:55:16
461 [scp.c]
462 spelling in comment; ok djm@
260bf88a 463 - stevesk@cvs.openbsd.org 2008/10/10 05:00:12
464 [key.c]
465 typo in error message; ok djm@
96a00a9d 466 - stevesk@cvs.openbsd.org 2008/10/10 16:43:27
467 [ssh_config.5]
468 use 'Privileged ports can be forwarded only when logging in as root on
469 the remote machine.' for RemoteForward just like ssh.1 -R.
470 ok djm@ jmc@
471 - stevesk@cvs.openbsd.org 2008/10/14 18:11:33
472 [sshconnect.c]
473 use #define ROQUIET here; no binary change. ok dtucker@
8d20b087 474 - stevesk@cvs.openbsd.org 2008/10/17 18:36:24
475 [ssh_config.5]
476 correct and clarify VisualHostKey; ok jmc@
25f93f2c 477 - stevesk@cvs.openbsd.org 2008/10/30 19:31:16
478 [clientloop.c sshd.c]
479 don't need to #include "monitor_fdpass.h"
b8974c94 480 - stevesk@cvs.openbsd.org 2008/10/31 15:05:34
481 [dispatch.c]
482 remove unused #define DISPATCH_MIN; ok markus@
e64399cc 483 - djm@cvs.openbsd.org 2008/11/01 04:50:08
484 [sshconnect2.c]
485 sprinkle ARGSUSED on dispatch handlers
486 nuke stale unusued prototype
2ea438c2 487 - stevesk@cvs.openbsd.org 2008/11/01 06:43:33
488 [channels.c]
489 fix some typos in log messages; ok djm@
9995aaa3 490 - sobrado@cvs.openbsd.org 2008/11/01 11:14:36
491 [ssh-keyscan.1 ssh-keyscan.c]
492 the ellipsis is not an optional argument; while here, improve spacing.
30573fea 493 - stevesk@cvs.openbsd.org 2008/11/01 17:40:33
494 [clientloop.c readconf.c readconf.h ssh.c]
495 merge dynamic forward parsing into parse_forward();
496 'i think this is OK' djm@
9bbba34b 497 - stevesk@cvs.openbsd.org 2008/11/02 00:16:16
498 [ttymodes.c]
499 protocol 2 tty modes support is now 7.5 years old so remove these
500 debug3()s; ok deraadt@
b626b7ae 501 - stevesk@cvs.openbsd.org 2008/11/03 01:07:02
502 [readconf.c]
503 remove valueless comment
c8eaf0ec 504 - stevesk@cvs.openbsd.org 2008/11/03 02:44:41
505 [readconf.c]
506 fix comment
fce91335 507 - (djm) [contrib/caldera/ssh-host-keygen contrib/suse/rc.sshd]
508 Make example scripts generate keys with default sizes rather than fixed,
509 non-default 1024 bits; patch from imorgan AT nas.nasa.gov
933e2f91 510 - (djm) [contrib/sshd.pam.generic contrib/caldera/sshd.pam]
511 [contrib/redhat/sshd.pam] Move pam_nologin to account group from
512 incorrect auth group in example files;
513 patch from imorgan AT nas.nasa.gov
94f36816 514
d6339843 51520080906
516 - (dtucker) [config.guess config.sub] Update to latest versions from
517 http://git.savannah.gnu.org/gitweb/ (2008-04-14 and 2008-06-16
518 respectively).
519
974ce4a0 52020080830
521 - (dtucker) [openbsd-compat/bsd-poll.c] correctly check for number of FDs
522 larger than FD_SETSIZE (OpenSSH only ever uses poll with one fd). Patch
523 from Nicholas Marriott.
524
e888d981 52520080721
526 - (djm) OpenBSD CVS Sync
527 - djm@cvs.openbsd.org 2008/07/23 07:36:55
528 [servconf.c]
529 do not try to print options that have been compile-time disabled
530 in config test mode (sshd -T); report from nix-corp AT esperi.org.uk
531 ok dtucker@
cee47c9f 532 - (djm) [servconf.c] Print UsePAM option in config test mode (when it
533 has been compiled in); report from nix-corp AT esperi.org.uk
534 ok dtucker@
e888d981 535
b14e719f 53620080721
537 - (djm) OpenBSD CVS Sync
538 - jmc@cvs.openbsd.org 2008/07/18 22:51:01
539 [sftp-server.8]
540 no need for .Pp before or after .Sh;
f3b93df3 541 - djm@cvs.openbsd.org 2008/07/21 08:19:07
542 [version.h]
543 openssh-5.1
11368183 544 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
545 [contrib/suse/openssh.spec] Update version number in README and RPM specs
55d5db1c 546 - (djm) Release OpenSSH-5.1
b14e719f 547
e5df5ff2 54820080717
549 - (djm) OpenBSD CVS Sync
550 - djm@cvs.openbsd.org 2008/07/17 08:48:00
551 [sshconnect2.c]
552 strnvis preauth banner; pointed out by mpf@ ok markus@
2800468d 553 - djm@cvs.openbsd.org 2008/07/17 08:51:07
554 [auth2-hostbased.c]
555 strip trailing '.' from hostname when HostbasedUsesNameFromPacketOnly=yes
556 report and patch from res AT qoxp.net (bz#1200); ok markus@
d9d96f7a 557 - (dtucker) [openbsd-compat/bsd-cygwin_util.c] Remove long-unneeded compat
558 code, replace with equivalent cygwin library call. Patch from vinschen
3a69fb58 559 at redhat.com, ok djm@.
560 - (djm) [sshconnect2.c] vis.h isn't available everywhere
e5df5ff2 561
b8c9ea19 56220080716
563 - OpenBSD CVS Sync
564 - djm@cvs.openbsd.org 2008/07/15 02:23:14
565 [sftp.1]
566 number of pipelined requests is now 64;
567 prodded by Iain.Morgan AT nasa.gov
dfe666f6 568 - djm@cvs.openbsd.org 2008/07/16 11:51:14
569 [clientloop.c]
570 rename variable first_gc -> last_gc (since it is actually the last
571 in the list).
cdfbc829 572 - djm@cvs.openbsd.org 2008/07/16 11:52:19
573 [channels.c]
574 this loop index should be automatic, not static
b8c9ea19 575
322b3f02 57620080714
577 - (djm) OpenBSD CVS Sync
578 - sthen@cvs.openbsd.org 2008/07/13 21:22:52
579 [ssh-keygen.c]
580 Change "ssh-keygen -F [host] -l" to not display random art unless
581 -v is also specified, making it consistent with the manual and other
582 uses of -l.
583 ok grunk@
9fb764ab 584 - djm@cvs.openbsd.org 2008/07/13 22:13:07
585 [channels.c]
586 use struct sockaddr_storage instead of struct sockaddr for accept(2)
587 address argument. from visibilis AT yahoo.com in bz#1485; ok markus@
873722cc 588 - djm@cvs.openbsd.org 2008/07/13 22:16:03
589 [sftp.c]
590 increase number of piplelined requests so they properly fill the
591 (recently increased) channel window. prompted by rapier AT psc.edu;
592 ok markus@
66fba053 593 - djm@cvs.openbsd.org 2008/07/14 01:55:56
594 [sftp-server.8]
595 mention requirement for /dev/log inside chroot when using sftp-server
596 with ChrootDirectory
6c6bb9a6 597 - (djm) [openbsd-compat/bindresvport.c] Rename variables s/sin/in/ to
598 avoid clash with sin(3) function; reported by
599 cristian.ionescu-idbohrn AT axis.com
7be182d4 600 - (djm) [openbsd-compat/rresvport.c] Add unistd.h for missing close()
601 prototype; reported by cristian.ionescu-idbohrn AT axis.com
6a9c22a5 602 - (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash;
603 reported by cristian.ionescu-idbohrn AT axis.com
7ea1abf7 604 - (djm) [contrib/cygwin/Makefile contrib/cygwin/ssh-host-config]
605 [contrib/cygwin/ssh-user-config contrib/cygwin/sshd-inetd]
606 Revamped and simplified Cygwin ssh-host-config script that uses
607 unified csih configuration tool. Requires recent Cygwin.
608 Patch from vinschen AT redhat.com
322b3f02 609
267d5589 61020080712
611 - (djm) OpenBSD CVS Sync
612 - djm@cvs.openbsd.org 2008/07/12 04:52:50
613 [channels.c]
614 unbreak; move clearing of cctx struct to before first use
615 reported by dkrause@
da9a823d 616 - djm@cvs.openbsd.org 2008/07/12 05:33:41
617 [scp.1]
618 better description for -i flag:
619 s/RSA authentication/public key authentication/
2ade01eb 620 - (djm) [openbsd-compat/fake-rfc2553.c openbsd-compat/fake-rfc2553.h]
621 return EAI_FAMILY when trying to lookup unsupported address family;
622 from vinschen AT redhat.com
267d5589 623
971deff8 62420080711
625 - (djm) OpenBSD CVS Sync
626 - stevesk@cvs.openbsd.org 2008/07/07 00:31:41
627 [ttymodes.c]
628 we don't need arg after the debug3() was removed. from lint.
629 ok djm@
d5b5b8f6 630 - stevesk@cvs.openbsd.org 2008/07/07 23:32:51
631 [key.c]
632 /*NOTREACHED*/ for lint warning:
633 warning: function key_equal falls off bottom without returning value
634 ok djm@
6eb3f18c 635 - markus@cvs.openbsd.org 2008/07/10 18:05:58
636 [channels.c]
637 missing bzero; from mickey; ok djm@
e8e08a80 638 - markus@cvs.openbsd.org 2008/07/10 18:08:11
639 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h sshd.c]
640 sync v1 and v2 traffic accounting; add it to sshd, too;
641 ok djm@, dtucker@
971deff8 642
17969fcc 64320080709
644 - (djm) [Makefile.in] Print "all tests passed" when all regress tests pass
b5fc5d94 645 - (djm) [auth1.c] Fix format string vulnerability in protocol 1 PAM
646 account check failure path. The vulnerable format buffer is supplied
647 from PAM and should not contain attacker-supplied data.
78cb4705 648 - (djm) [auth.c] Missing unistd.h for close()
b5902374 649 - (djm) [configure.ac] Add -Wformat-security to CFLAGS for gcc 3.x and 4.x
17969fcc 650
3fde0623 65120080705
652 - (djm) [auth.c] Fixed test for locked account on HP/UX with shadowed
653 passwords disabled. bz#1083 report & patch from senthilkumar_sen AT
654 hotpop.com, w/ dtucker@
e8983917 655 - (djm) [atomicio.c configure.ac] Disable poll() fallback in atomiciov for
656 Tru64. readv doesn't seem to be a comparable object there.
657 bz#1386, patch from dtucker@ ok me
b8d635d0 658 - (djm) [Makefile.in] Pass though pass to conch for interop tests
6ed8a3ae 659 - (djm) [configure.ac] unbreak: remove extra closing brace
d38d9a80 660 - (djm) OpenBSD CVS Sync
661 - djm@cvs.openbsd.org 2008/07/04 23:08:25
662 [packet.c]
663 handle EINTR in packet_write_poll()l ok dtucker@
71709bcd 664 - djm@cvs.openbsd.org 2008/07/04 23:30:16
665 [auth1.c auth2.c]
666 Make protocol 1 MaxAuthTries logic match protocol 2's.
667 Do not treat the first protocol 2 authentication attempt as
668 a failure IFF it is for method "none".
669 Makes MaxAuthTries' user-visible behaviour identical for
670 protocol 1 vs 2.
671 ok dtucker@
3086db6e 672 - djm@cvs.openbsd.org 2008/07/05 05:16:01
673 [PROTOCOL]
674 grammar
3fde0623 675
a0d38609 67620080704
677 - (dtucker) OpenBSD CVS Sync
678 - djm@cvs.openbsd.org 2008/07/02 13:30:34
679 [auth2.c]
680 really really remove the freebie "none" auth try for protocol 2
6c777090 681 - djm@cvs.openbsd.org 2008/07/02 13:47:39
682 [ssh.1 ssh.c]
683 When forking after authentication ("ssh -f") with ExitOnForwardFailure
684 enabled, delay the fork until after replies for any -R forwards have
685 been seen. Allows for robust detection of -R forward failure when
686 using -f (similar to bz#92); ok dtucker@
f0b9fde3 687 - otto@cvs.openbsd.org 2008/07/03 21:46:58
688 [auth2-pubkey.c]
689 avoid nasty double free; ok dtucker@ djm@
cece208b 690 - djm@cvs.openbsd.org 2008/07/04 03:44:59
691 [servconf.c groupaccess.h groupaccess.c]
692 support negation of groups in "Match group" block (bz#1315); ok dtucker@
c54d3d1c 693 - dtucker@cvs.openbsd.org 2008/07/04 03:47:02
694 [monitor.c]
695 Make debug a little clearer. ok djm@
c7cbf377 696 - djm@cvs.openbsd.org 2008/06/30 08:07:34
697 [regress/key-options.sh]
698 shell portability: use "=" instead of "==" in test(1) expressions,
699 double-quote string with backslash escaped /
8a972082 700 - djm@cvs.openbsd.org 2008/06/30 10:31:11
701 [regress/{putty-transfer,putty-kex,putty-ciphers}.sh]
702 remove "set -e" left over from debugging
9b0c87d9 703 - djm@cvs.openbsd.org 2008/06/30 10:43:03
704 [regress/conch-ciphers.sh]
705 explicitly disable conch options that could interfere with the test
97e61398 706 - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link
707 returns EXDEV. Patch from Mike Garrison, ok djm@
5a0c8771 708 - (djm) [atomicio.c channels.c clientloop.c defines.h includes.h]
709 [packet.c scp.c serverloop.c sftp-client.c ssh-agent.c ssh-keyscan.c]
710 [sshd.c] Explicitly handle EWOULDBLOCK wherever we handle EAGAIN, on
711 some platforms (HP nonstop) it is a distinct errno;
712 bz#1467 reported by sconeu AT yahoo.com; ok dtucker@
713
8f02e0be 71420080702
715 - (dtucker) OpenBSD CVS Sync
716 - djm@cvs.openbsd.org 2008/06/30 08:05:59
717 [PROTOCOL.agent]
718 typo: s/constraint_date/constraint_data/
fb5582f7 719 - djm@cvs.openbsd.org 2008/06/30 12:15:39
720 [serverloop.c]
721 only pass channel requests on session channels through to the session
722 channel handler, avoiding spurious log messages; ok! markus@
4d92dbc1 723 - djm@cvs.openbsd.org 2008/06/30 12:16:02
724 [nchan.c]
725 only send eow@openssh.com notifications for session channels; ok! markus@
8fb1ddc9 726 - djm@cvs.openbsd.org 2008/06/30 12:18:34
727 [PROTOCOL]
728 clarify that eow@openssh.com is only sent on session channels
979b31ed 729 - dtucker@cvs.openbsd.org 2008/07/01 07:20:52
730 [sshconnect.c]
731 Check ExitOnForwardFailure if forwardings are disabled due to a failed
732 host key check. ok djm@
f9b45eaf 733 - dtucker@cvs.openbsd.org 2008/07/01 07:24:22
734 [sshconnect.c sshd.c]
735 Send CR LF during protocol banner exchanges, but only for Protocol 2 only,
736 in order to comply with RFC 4253. bz #1443, ok djm@
5ebed98d 737 - stevesk@cvs.openbsd.org 2008/07/01 23:12:47
738 [PROTOCOL.agent]
739 fix some typos; ok djm@
39ceddb7 740 - djm@cvs.openbsd.org 2008/07/02 02:24:18
741 [sshd_config sshd_config.5 sshd.8 servconf.c]
742 increase default size of ssh protocol 1 ephemeral key from 768 to 1024
743 bits; prodded by & ok dtucker@ ok deraadt@
f7c2a004 744 - dtucker@cvs.openbsd.org 2008/07/02 12:03:51
745 [auth-rsa.c auth.c auth2-pubkey.c auth.h]
746 Merge duplicate host key file checks, based in part on a patch from Rob
747 Holland via bz #1348 . Also checks for non-regular files during protocol
748 1 RSA auth. ok djm@
221fc73c 749 - djm@cvs.openbsd.org 2008/07/02 12:36:39
750 [auth2-none.c auth2.c]
751 Make protocol 2 MaxAuthTries behaviour a little more sensible:
752 Check whether client has exceeded MaxAuthTries before running
753 an authentication method and skip it if they have, previously it
754 would always allow one try (for "none" auth).
755 Preincrement failure count before post-auth test - previously this
756 checked and postincremented, also to allow one "none" try.
757 Together, these two changes always count the "none" auth method
758 which could be skipped by a malicious client (e.g. an SSH worm)
759 to get an extra attempt at a real auth method. They also make
760 MaxAuthTries=0 a useful way to block users entirely (esp. in a
761 sshd_config Match block).
762 Also, move sending of any preauth banner from "none" auth method
763 to the first call to input_userauth_request(), so worms that skip
764 the "none" method get to see it too.
8f02e0be 765
00b7389d 76620080630
767 - (djm) OpenBSD CVS Sync
768 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
769 [regress/Makefile regress/key-options.sh]
770 Add regress test for key options. ok djm@
86d745dc 771 - dtucker@cvs.openbsd.org 2008/06/11 23:11:40
014f1b23 772 [regress/Makefile]
86d745dc 773 Don't run cipher-speed test by default; mistakenly enabled by me
014f1b23 774 - djm@cvs.openbsd.org 2008/06/28 13:57:25
775 [regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh]
776 very basic regress test against Twisted Conch in "make interop"
777 target (conch is available in ports/devel/py-twisted/conch);
778 ok markus@
8476b024 779 - (djm) [regress/Makefile] search for conch by path, like we do putty
00b7389d 780
aa47edcc 78120080629
782 - (djm) OpenBSD CVS Sync
783 - martynas@cvs.openbsd.org 2008/06/21 07:46:46
784 [sftp.c]
785 use optopt to get invalid flag, instead of return value of getopt,
786 which is always '?'; ok djm@
ccf0fcb6 787 - otto@cvs.openbsd.org 2008/06/25 11:13:43
788 [key.c]
789 add key length to visual fingerprint; zap magical constants;
790 ok grunk@ djm@
681efe9f 791 - djm@cvs.openbsd.org 2008/06/26 06:10:09
792 [sftp-client.c sftp-server.c]
793 allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky
794 bits. Note that this only affects explicit setting of modes (e.g. via
795 sftp(1)'s chmod command) and not file transfers. (bz#1310)
796 ok deraadt@ at c2k8
b080d398 797 - djm@cvs.openbsd.org 2008/06/26 09:19:40
798 [dh.c dh.h moduli.c]
799 when loading moduli from /etc/moduli in sshd(8), check that they
800 are of the expected "safe prime" structure and have had
801 appropriate primality tests performed;
802 feedback and ok dtucker@
7b3999b8 803 - grunk@cvs.openbsd.org 2008/06/26 11:46:31
804 [readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c]
805 Move SSH Fingerprint Visualization away from sharing the config option
806 CheckHostIP to an own config option named VisualHostKey.
807 While there, fix the behaviour that ssh would draw a random art picture
808 on every newly seen host even when the option was not enabled.
809 prodded by deraadt@, discussions,
810 help and ok markus@ djm@ dtucker@
2e8d3306 811 - jmc@cvs.openbsd.org 2008/06/26 21:11:46
812 [ssh.1]
813 add VisualHostKey to the list of options listed in -o;
cda43f66 814 - djm@cvs.openbsd.org 2008/06/28 07:25:07
815 [PROTOCOL]
816 spelling fixes
c525650a 817 - djm@cvs.openbsd.org 2008/06/28 13:58:23
818 [ssh-agent.c]
819 refuse to add a key that has unknown constraints specified;
820 ok markus
9ee2fb0e 821 - djm@cvs.openbsd.org 2008/06/28 14:05:15
822 [ssh-agent.c]
823 reset global compat flag after processing a protocol 2 signature
824 request with the legacy DSA encoding flag set; ok markus
ab3eb078 825 - djm@cvs.openbsd.org 2008/06/28 14:08:30
826 [PROTOCOL PROTOCOL.agent]
827 document the protocol used by ssh-agent; "looks ok" markus@
aa47edcc 828
f6351d4d 82920080628
830 - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec]
831 RFC.nroff lacks a license, remove it (it is long gone in OpenBSD).
832
bd6b3feb 83320080626
834 - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD.
835 (bz#1372)
a32d8b38 836 - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
837 [contrib/suse/openssh.spec] Include moduli.5 in RPM spec files.
bd6b3feb 838
b3784859 83920080616
840 - (dtucker) OpenBSD CVS Sync
841 - dtucker@cvs.openbsd.org 2008/06/16 13:22:53
842 [session.c channels.c]
843 Rename the isatty argument to is_tty so we don't shadow
844 isatty(3). ok markus@
245f4d36 845 - (dtucker) [channels.c] isatty -> is_tty here too.
b3784859 846
b55b0285 84720080615
848 - (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc.
081573fe 849 - OpenBSD CVS Sync
850 - dtucker@cvs.openbsd.org 2008/06/14 15:49:48
851 [sshd.c]
852 wrap long line at 80 chars
26512357 853 - dtucker@cvs.openbsd.org 2008/06/14 17:07:11
854 [sshd.c]
855 ensure default umask disallows at least group and world write; ok djm@
2608aa2b 856 - djm@cvs.openbsd.org 2008/06/14 18:33:43
857 [session.c]
858 suppress the warning message from chdir(homedir) failures
859 when chrooted (bz#1461); ok dtucker
49c5f262 860 - dtucker@cvs.openbsd.org 2008/06/14 19:42:10
861 [scp.1]
862 Mention that scp follows symlinks during -r. bz #1466,
863 from nectar at apple
d97287d3 864 - dtucker@cvs.openbsd.org 2008/06/15 16:55:38
865 [sshd_config.5]
866 MaxSessions is allowed in a Match block too
8086aeb2 867 - dtucker@cvs.openbsd.org 2008/06/15 16:58:40
868 [servconf.c sshd_config.5]
869 Allow MaxAuthTries within a Match block. ok djm@
c9478090 870 - djm@cvs.openbsd.org 2008/06/15 20:06:26
871 [channels.c channels.h session.c]
872 don't call isatty() on a pty master, instead pass a flag down to
873 channel_set_fds() indicating that te fds refer to a tty. Fixes a
874 hang on exit on Solaris (bz#1463) in portable but is actually
875 a generic bug; ok dtucker deraadt markus
b55b0285 876
add357c6 87720080614
878 - (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction
879 replacement code; patch from ighighi AT gmail.com in bz#1240;
880 ok dtucker
881
849d3ceb 88220080613
883 - (dtucker) OpenBSD CVS Sync
884 - deraadt@cvs.openbsd.org 2008/06/13 09:44:36
885 [packet.c]
886 compile on older gcc; no decl after code
52ad6b9a 887 - dtucker@cvs.openbsd.org 2008/06/13 13:56:59
888 [monitor.c]
889 Clear key options in the monitor on failed authentication, prevents
890 applying additional restrictions to non-pubkey authentications in
891 the case where pubkey fails but another method subsequently succeeds.
892 bz #1472, found by Colin Watson, ok markus@ djm@
1d0b7aaa 893 - dtucker@cvs.openbsd.org 2008/06/13 14:18:51
894 [auth2-pubkey.c auth-rhosts.c]
895 Include unistd.h for close(), prevents warnings in -portable
a3f13d60 896 - dtucker@cvs.openbsd.org 2008/06/13 17:21:20
897 [mux.c]
898 Friendlier error messages for mux fallback. ok djm@
a15e7da1 899 - dtucker@cvs.openbsd.org 2008/06/13 18:55:22
900 [scp.c]
901 Prevent -Wsign-compare warnings on LP64 systems. bz #1192, ok deraadt@
990ada29 902 - grunk@cvs.openbsd.org 2008/06/13 20:13:26
903 [ssh.1]
904 Explain the use of SSH fpr visualization using random art, and cite the
905 original scientific paper inspiring that technique.
906 Much help with English and nroff by jmc@, thanks.
596a825b 907 - (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which
908 despite its name doesn't seem to implement all of GSSAPI. Patch from
909 Jan Engelhardt, sanity checked by Simon Wilkinson.
849d3ceb 910
9754b94b 91120080612
912 - (dtucker) OpenBSD CVS Sync
913 - jmc@cvs.openbsd.org 2008/06/11 07:30:37
914 [sshd.8]
915 kill trailing whitespace;
aff73c5f 916 - grunk@cvs.openbsd.org 2008/06/11 21:01:35
917 [ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
918 sshconnect.c]
919 Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
920 graphical hash visualization schemes known as "random art", and by
921 Dan Kaminsky's musings on the subject during a BlackOp talk at the
922 23C3 in Berlin.
923 Scientific publication (original paper):
924 "Hash Visualization: a New Technique to improve Real-World Security",
925 Perrig A. and Song D., 1999, International Workshop on Cryptographic
926 Techniques and E-Commerce (CrypTEC '99)
927 http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
928 The algorithm used here is a worm crawling over a discrete plane,
929 leaving a trace (augmenting the field) everywhere it goes.
930 Movement is taken from dgst_raw 2bit-wise. Bumping into walls
931 makes the respective movement vector be ignored for this turn,
932 thus switching to the other color of the chessboard.
933 Graphs are not unambiguous for now, because circles in graphs can be
934 walked in either direction.
935 discussions with several people,
936 help, corrections and ok markus@ djm@
93778882 937 - grunk@cvs.openbsd.org 2008/06/11 21:38:25
938 [ssh-keygen.c]
939 ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub
940 would not display you the random art as intended, spotted by canacar@
639211b7 941 - grunk@cvs.openbsd.org 2008/06/11 22:20:46
942 [ssh-keygen.c ssh-keygen.1]
943 ssh-keygen would write fingerprints to STDOUT, and random art to STDERR,
944 that is not how it was envisioned.
945 Also correct manpage saying that -v is needed along with -l for it to work.
946 spotted by naddy@
e3115002 947 - otto@cvs.openbsd.org 2008/06/11 23:02:22
948 [key.c]
949 simpler way of computing the augmentations; ok grunk@
fe88400f 950 - grunk@cvs.openbsd.org 2008/06/11 23:03:56
951 [ssh_config.5]
952 CheckHostIP set to ``fingerprint'' will display both hex and random art
953 spotted by naddy@
97841001 954 - grunk@cvs.openbsd.org 2008/06/11 23:51:57
955 [key.c]
956 #define statements that are not atoms need braces around them, else they
957 will cause trouble in some cases.
958 Also do a computation of -1 once, and not in a loop several times.
959 spotted by otto@
e907df41 960 - dtucker@cvs.openbsd.org 2008/06/12 00:03:49
961 [dns.c canohost.c sshconnect.c]
962 Do not pass "0" strings as ports to getaddrinfo because the lookups
963 can slow things down and we never use the service info anyway. bz
964 #859, patch from YOSHIFUJI Hideaki and John Devitofranceschi. ok
965 deraadt@ djm@
966 djm belives that the reason for the "0" strings is to ensure that
967 it's not possible to call getaddrinfo with both host and port being
968 NULL. In the case of canohost.c host is a local array. In the
969 case of sshconnect.c, it's checked for null immediately before use.
970 In dns.c it ultimately comes from ssh.c:main() and is guaranteed to
971 be non-null but it's not obvious, so I added a warning message in
972 case it is ever passed a null.
973 - grunk@cvs.openbsd.org 2008/06/12 00:13:55
974 [sshconnect.c]
975 Make ssh print the random art also when ssh'ing to a host using IP only.
976 spotted by naddy@, ok and help djm@ dtucker@
208cc0ee 977 - otto@cvs.openbsd.org 2008/06/12 00:13:13
978 [key.c]
979 use an odd number of rows and columns and a separate start marker, looks
980 better; ok grunk@
f17f705b 981 - djm@cvs.openbsd.org 2008/06/12 03:40:52
982 [clientloop.h mux.c channels.c clientloop.c channels.h]
983 Enable ~ escapes for multiplex slave sessions; give each channel
984 its own escape state and hook the escape filters up to muxed
985 channels. bz #1331
986 Mux slaves do not currently support the ~^Z and ~& escapes.
987 NB. this change cranks the mux protocol version, so a new ssh
988 mux client will not be able to connect to a running old ssh
989 mux master.
990 ok dtucker@
72becb62 991 - djm@cvs.openbsd.org 2008/06/12 04:06:00
992 [clientloop.h ssh.c clientloop.c]
993 maintain an ordered queue of outstanding global requests that we
994 expect replies to, similar to the per-channel confirmation queue.
995 Use this queue to verify success or failure for remote forward
996 establishment in a race free way.
997 ok dtucker@
344f1d3d 998 - djm@cvs.openbsd.org 2008/06/12 04:17:47
999 [clientloop.c]
1000 thall shalt not code past the eightieth column
e8097dc9 1001 - djm@cvs.openbsd.org 2008/06/12 04:24:06
1002 [ssh.c]
1003 thal shalt not code past the eightieth column
9bcf03ce 1004 - djm@cvs.openbsd.org 2008/06/12 05:15:41
1005 [PROTOCOL]
1006 document tun@openssh.com forwarding method
aacab402 1007 - djm@cvs.openbsd.org 2008/06/12 05:32:30
1008 [mux.c]
1009 some more TODO for me
2bb50d23 1010 - grunk@cvs.openbsd.org 2008/06/12 05:42:46
1011 [key.c]
1012 supply the key type (rsa1, rsa, dsa) as a caption in the frame of the
1013 random art. while there, stress the fact that the field base should at
1014 least be 8 characters for the pictures to make sense.
1015 comment and ok djm@
1016 - grunk@cvs.openbsd.org 2008/06/12 06:32:59
1017 [key.c]
1018 We already mark the start of the worm, now also mark the end of the worm
1019 in our random art drawings.
1020 ok djm@
e74caf1e 1021 - djm@cvs.openbsd.org 2008/06/12 15:19:17
1022 [clientloop.h channels.h clientloop.c channels.c mux.c]
1023 The multiplexing escape char handler commit last night introduced a
1024 small memory leak per session; plug it.
e9d0b573 1025 - dtucker@cvs.openbsd.org 2008/06/12 16:35:31
1026 [ssh_config.5 ssh.c]
1027 keyword expansion for localcommand. ok djm@
a64f8307 1028 - jmc@cvs.openbsd.org 2008/06/12 19:10:09
1029 [ssh_config.5 ssh-keygen.1]
1030 tweak the ascii art text; ok grunk
bc2d97c8 1031 - dtucker@cvs.openbsd.org 2008/06/12 20:38:28
1032 [sshd.c sshconnect.c packet.h misc.c misc.h packet.c]
1033 Make keepalive timeouts apply while waiting for a packet, particularly
1034 during key renegotiation (bz #1363). With djm and Matt Day, ok djm@
ad39a852 1035 - djm@cvs.openbsd.org 2008/06/12 20:47:04
1036 [sftp-client.c]
1037 print extension revisions for extensions that we understand
07d8d480 1038 - djm@cvs.openbsd.org 2008/06/12 21:06:25
1039 [clientloop.c]
1040 I was coalescing expected global request confirmation replies at
1041 the wrong end of the queue - fix; prompted by markus@
31de76cc 1042 - grunk@cvs.openbsd.org 2008/06/12 21:14:46
1043 [ssh-keygen.c]
1044 make ssh-keygen -lf show the key type just as ssh-add -l would do it
1045 ok djm@ markus@
f97fb6ca 1046 - grunk@cvs.openbsd.org 2008/06/12 22:03:36
1047 [key.c]
1048 add my copyright, ok djm@
6d8216ff 1049 - ian@cvs.openbsd.org 2008/06/12 23:24:58
1050 [sshconnect.c]
1051 tweak wording in message, ok deraadt@ jmc@
2c83cd01 1052 - dtucker@cvs.openbsd.org 2008/06/13 00:12:02
1053 [sftp.h log.h]
1054 replace __dead with __attribute__((noreturn)), makes things
1055 a little easier to port. Also, add it to sigdie(). ok djm@
b97ea6eb 1056 - djm@cvs.openbsd.org 2008/06/13 00:16:49
1057 [mux.c]
1058 fall back to creating a new TCP connection on most multiplexing errors
1059 (socket connect fail, invalid version, refused permittion, corrupted
1060 messages, etc.); bz #1329 ok dtucker@
243cc316 1061 - dtucker@cvs.openbsd.org 2008/06/13 00:47:53
1062 [mux.c]
1063 upcast size_t to u_long to match format arg; ok djm@
041f11dc 1064 - dtucker@cvs.openbsd.org 2008/06/13 00:51:47
1065 [mac.c]
1066 upcast another size_t to u_long to match format
852eb76b 1067 - dtucker@cvs.openbsd.org 2008/06/13 01:38:23
1068 [misc.c]
1069 upcast uid to long with matching %ld, prevents warnings in portable
632f2669 1070 - djm@cvs.openbsd.org 2008/06/13 04:40:22
1071 [auth2-pubkey.c auth-rhosts.c]
1072 refuse to read ~/.shosts or ~/.ssh/authorized_keys that are not
1073 regular files; report from Solar Designer via Colin Watson in bz#1471
1074 ok dtucker@ deraadt
136d0181 1075 - (dtucker) [clientloop.c serverloop.c] channel_register_filter now
1076 takes 2 more args. with djm@
49190c3d 1077 - (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch
1078 from Todd Vierling.
02e605ed 1079 - (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA
1080 systems. Patch from R. Scott Bailey.
c694c610 1081 - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used
1082 on big endian machines, so ifdef them for little-endian only to prevent
1083 unused function warnings on big-endians.
56f77432 1084 - (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent
1085 compiler warnings on some platforms. Based on a discussion with otto@
9754b94b 1086
554ebbed 108720080611
1088 - (djm) [channels.c configure.ac]
1089 Do not set SO_REUSEADDR on wildcard X11 listeners (X11UseLocalhost=no)
1090 bz#1464; ok dtucker
1091
15b5fa9b 109220080610
1093 - (dtucker) OpenBSD CVS Sync
1094 - djm@cvs.openbsd.org 2008/06/10 03:57:27
1095 [servconf.c match.h sshd_config.5]
1096 support CIDR address matching in sshd_config "Match address" blocks, with
1097 full support for negation and fall-back to classic wildcard matching.
1098 For example:
1099 Match address 192.0.2.0/24,3ffe:ffff::/32,!10.*
1100 PasswordAuthentication yes
1101 addrmatch.c code mostly lifted from flowd's addr.c
1102 feedback and ok dtucker@
8b671558 1103 - djm@cvs.openbsd.org 2008/06/10 04:17:46
1104 [sshd_config.5]
1105 better reference for pattern-list
1760c982 1106 - dtucker@cvs.openbsd.org 2008/06/10 04:50:25
1107 [sshd.c channels.h channels.c log.c servconf.c log.h servconf.h sshd.8]
1108 Add extended test mode (-T) and connection parameters for test mode (-C).
1109 -T causes sshd to write its effective configuration to stdout and exit.
1110 -C causes any relevant Match rules to be applied before output. The
1111 combination allows tesing of the parser and config files. ok deraadt djm
01e9e424 1112 - jmc@cvs.openbsd.org 2008/06/10 07:12:00
1113 [sshd_config.5]
1114 tweak previous;
3b42e3ac 1115 - jmc@cvs.openbsd.org 2008/06/10 08:17:40
1116 [sshd.8 sshd.c]
1117 - update usage()
1118 - fix SYNOPSIS, and sort options
1119 - some minor additional fixes
f0528444 1120 - dtucker@cvs.openbsd.org 2008/06/09 18:06:32
1121 [regress/test-exec.sh]
1122 Don't generate putty keys if we're not going to use them. ok djm
16d46c30 1123 - dtucker@cvs.openbsd.org 2008/06/10 05:23:32
1124 [regress/addrmatch.sh regress/Makefile]
1125 Regress test for Match CIDR rules. ok djm@
94edc013 1126 - dtucker@cvs.openbsd.org 2008/06/10 15:21:41
1127 [test-exec.sh]
1128 Use a more portable construct for checking if we're running a putty test
64c576e9 1129 - dtucker@cvs.openbsd.org 2008/06/10 15:28:49
1130 [test-exec.sh]
1131 Add quotes
f6748d7b 1132 - dtucker@cvs.openbsd.org 2008/06/10 18:21:24
1133 [ssh_config.5]
1134 clarify that Host patterns are space-separated. ok deraadt
3f0444ca 1135 - djm@cvs.openbsd.org 2008/06/10 22:15:23
1136 [PROTOCOL ssh.c serverloop.c]
1137 Add a no-more-sessions@openssh.com global request extension that the
1138 client sends when it knows that it will never request another session
1139 (i.e. when session multiplexing is disabled). This allows a server to
1140 disallow further session requests and terminate the session.
1141 Why would a non-multiplexing client ever issue additional session
1142 requests? It could have been attacked with something like SSH'jack:
1143 http://www.storm.net.nz/projects/7
1144 feedback & ok markus
b3b048d6 1145 - djm@cvs.openbsd.org 2008/06/10 23:06:19
1146 [auth-options.c match.c servconf.c addrmatch.c sshd.8]
1147 support CIDR address matching in .ssh/authorized_keys from="..." stanzas
1148 ok and extensive testing dtucker@
8fb12ef0 1149 - dtucker@cvs.openbsd.org 2008/06/10 23:21:34
1150 [bufaux.c]
1151 Use '\0' for a nul byte rather than unadorned 0. ok djm@
a6d05adf 1152 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
1153 [Makefile regress/key-options.sh]
1154 Add regress test for key options. ok djm@
edee47f5 1155 - (dtucker) [openbsd-compat/fake-rfc2553.h] Add sin6_scope_id to sockaddr_in6
1156 since the new CIDR code in addmatch.c references it.
1157 - (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6
1158 specific tests on platforms that don't do IPv6.
8ac1d2eb 1159 - (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well
1160 as environment.
0694c78f 1161 - (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now.
15b5fa9b 1162
10e804f4 116320080609
1164 - (dtucker) OpenBSD CVS Sync
1165 - dtucker@cvs.openbsd.org 2008/06/08 17:04:41
1166 [sftp-server.c]
1167 Add case for ENOSYS in errno_to_portable; ok deraadt
5a3cde15 1168 - dtucker@cvs.openbsd.org 2008/06/08 20:15:29
1169 [sftp.c sftp-client.c sftp-client.h]
1170 Have the sftp client store the statvfs replies in wire format,
1171 which prevents problems when the server's native sizes exceed the
1172 client's.
1173 Also extends the sizes of the remaining 32bit wire format to 64bit,
1174 they're specified as unsigned long in the standard.
7290afcb 1175 - dtucker@cvs.openbsd.org 2008/06/09 13:02:39
2626070f 1176 [sftp-server.c]
7290afcb 1177 Extend 32bit -> 64bit values for statvfs extension missed in previous
1178 commit.
2626070f 1179 - dtucker@cvs.openbsd.org 2008/06/09 13:38:46
1180 [PROTOCOL]
1181 Use a $OpenBSD tag so our scripts will sync changes.
10e804f4 1182
22f5e872 118320080608
1184 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c
1185 openbsd-compat/Makefile.in openbsd-compat/openbsd-compat.h
1186 openbsd-compat/bsd-statvfs.{c,h}] Add a null implementation of statvfs and
1187 fstatvfs and remove #defines around statvfs code. ok djm@
7a4f468b 1188 - (dtucker) [configure.ac defines.h sftp-client.c M sftp-server.c] Add a
1189 macro to convert fsid to unsigned long for platforms where fsid is a
1190 2-member array.
22f5e872 1191
0894bbed 119220080607
1193 - (dtucker) [mux.c] Include paths.h inside ifdef HAVE_PATHS_H.
4538e135 1194 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c]
1195 Do not enable statvfs extensions on platforms that do not have statvfs.
2abb1ef5 1196 - (dtucker) OpenBSD CVS Sync
1197 - djm@cvs.openbsd.org 2008/05/19 06:14:02
1198 [packet.c] unbreak protocol keepalive timeouts bz#1465; ok dtucker@
82bb6f20 1199 - djm@cvs.openbsd.org 2008/05/19 15:45:07
1200 [sshtty.c ttymodes.c sshpty.h]
1201 Fix sending tty modes when stdin is not a tty (bz#1199). Previously
1202 we would send the modes corresponding to a zeroed struct termios,
1203 whereas we should have been sending an empty list of modes.
1204 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
048acbeb 1205 - djm@cvs.openbsd.org 2008/05/19 15:46:31
1206 [ssh-keygen.c]
1207 support -l (print fingerprint) in combination with -F (find host) to
1208 search for a host in ~/.ssh/known_hosts and display its fingerprint;
1209 ok markus@
4651c790 1210 - djm@cvs.openbsd.org 2008/05/19 20:53:52
1211 [clientloop.c]
1212 unbreak tree by committing this bit that I missed from:
1213 Fix sending tty modes when stdin is not a tty (bz#1199). Previously
1214 we would send the modes corresponding to a zeroed struct termios,
1215 whereas we should have been sending an empty list of modes.
1216 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
0894bbed 1217
07e61b8a 121820080604
1219 - (djm) [openbsd-compat/bsd-arc4random.c] Fix math bug that caused bias
1220 in arc4random_uniform with upper_bound in (2^30,2*31). Note that
1221 OpenSSH did not make requests with upper bounds in this range.
1222
b3ef88dc 122320080519
1224 - (djm) [configure.ac mux.c sftp.c openbsd-compat/Makefile.in]
1225 [openbsd-compat/fmt_scaled.c openbsd-compat/openbsd-compat.h]
1226 Fix compilation on Linux, including pulling in fmt_scaled(3)
1227 implementation from OpenBSD's libutil.
1228
9b04dbaa 122920080518
1230 - (djm) OpenBSD CVS Sync
1231 - djm@cvs.openbsd.org 2008/04/04 05:14:38
1232 [sshd_config.5]
1233 ChrootDirectory is supported in Match blocks (in fact, it is most useful
1234 there). Spotted by Minstrel AT minstrel.org.uk
5b76e3ef 1235 - djm@cvs.openbsd.org 2008/04/04 06:44:26
1236 [sshd_config.5]
1237 oops, some unrelated stuff crept into that commit - backout.
1238 spotted by jmc@
ade21243 1239 - djm@cvs.openbsd.org 2008/04/05 02:46:02
1240 [sshd_config.5]
1241 HostbasedAuthentication is supported under Match too
185adaf8 1242 - (djm) [openbsd-compat/bsd-arc4random.c openbsd-compat/openbsd-compat.c]
1243 [configure.ac] Implement arc4random_buf(), import implementation of
1244 arc4random_uniform() from OpenBSD
936e7c8c 1245 - (djm) [openbsd-compat/bsd-arc4random.c] Warning fixes
c49ce62e 1246 - (djm) [openbsd-compat/port-tun.c] needs sys/queue.h
c1d152b8 1247 - (djm) OpenBSD CVS Sync
1248 - djm@cvs.openbsd.org 2008/04/13 00:22:17
1249 [dh.c sshd.c]
1250 Use arc4random_buf() when requesting more than a single word of output
1251 Use arc4random_uniform() when the desired random number upper bound
1252 is not a power of two
1253 ok deraadt@ millert@
360b43ab 1254 - djm@cvs.openbsd.org 2008/04/18 12:32:11
1255 [sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c sftp.h]
1256 introduce sftp extension methods statvfs@openssh.com and
1257 fstatvfs@openssh.com that implement statvfs(2)-like operations,
1258 based on a patch from miklos AT szeredi.hu (bz#1399)
1259 also add a "df" command to the sftp client that uses the
1260 statvfs@openssh.com to produce a df(1)-like display of filesystem
1261 space and inode utilisation
1262 ok markus@
ea530517 1263 - jmc@cvs.openbsd.org 2008/04/18 17:15:47
1264 [sftp.1]
1265 macro fixage;
48fbfda0 1266 - djm@cvs.openbsd.org 2008/04/18 22:01:33
1267 [session.c]
1268 remove unneccessary parentheses
0bb7755b 1269 - otto@cvs.openbsd.org 2008/04/29 11:20:31
1270 [monitor_mm.h]
1271 garbage collect two unused fields in struct mm_master; ok markus@
c47ff7a6 1272 - djm@cvs.openbsd.org 2008/04/30 10:14:03
1273 [ssh-keyscan.1 ssh-keyscan.c]
1274 default to rsa (protocol 2) keys, instead of rsa1 keys; spotted by
1275 larsnooden AT openoffice.org
43c3f85c 1276 - pyr@cvs.openbsd.org 2008/05/07 05:49:37
1277 [servconf.c servconf.h session.c sshd_config.5]
1278 Enable the AllowAgentForwarding option in sshd_config (global and match
1279 context), to specify if agents should be permitted on the server.
1280 As the man page states:
1281 ``Note that disabling Agent forwarding does not improve security
1282 unless users are also denied shell access, as they can always install
1283 their own forwarders.''
1284 ok djm@, ok and a mild frown markus@
5c7e2b47 1285 - pyr@cvs.openbsd.org 2008/05/07 06:43:35
1286 [sshd_config]
1287 push the sshd_config bits in, spotted by ajacoutot@
94569631 1288 - jmc@cvs.openbsd.org 2008/05/07 08:00:14
1289 [sshd_config.5]
1290 sort;
17f02f0a 1291 - markus@cvs.openbsd.org 2008/05/08 06:59:01
1292 [bufaux.c buffer.h channels.c packet.c packet.h]
1293 avoid extra malloc/copy/free when receiving data over the net;
1294 ~10% speedup for localhost-scp; ok djm@
3593bdc0 1295 - djm@cvs.openbsd.org 2008/05/08 12:02:23
1296 [auth-options.c auth1.c channels.c channels.h clientloop.c gss-serv.c]
1297 [monitor.c monitor_wrap.c nchan.c servconf.c serverloop.c session.c]
1298 [ssh.c sshd.c]
1299 Implement a channel success/failure status confirmation callback
1300 mechanism. Each channel maintains a queue of callbacks, which will
1301 be drained in order (RFC4253 guarantees confirm messages are not
1302 reordered within an channel).
1303 Also includes a abandonment callback to clean up if a channel is
1304 closed without sending confirmation messages. This probably
1305 shouldn't happen in compliant implementations, but it could be
1306 abused to leak memory.
1307 ok markus@ (as part of a larger diff)
c6dca55e 1308 - djm@cvs.openbsd.org 2008/05/08 12:21:16
1309 [monitor.c monitor_wrap.c session.h servconf.c servconf.h session.c]
1310 [sshd_config sshd_config.5]
1311 Make the maximum number of sessions run-time controllable via
1312 a sshd_config MaxSessions knob. This is useful for disabling
1313 login/shell/subsystem access while leaving port-forwarding working
1314 (MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or
1315 simply increasing the number of allows multiplexed sessions.
1316 Because some bozos are sure to configure MaxSessions in excess of the
1317 number of available file descriptors in sshd (which, at peak, might be
1318 as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds
1319 on error paths, and make it fail gracefully on out-of-fd conditions -
1320 sending channel errors instead of than exiting with fatal().
1321 bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com
1322 ok markus@
95d3c124 1323 - djm@cvs.openbsd.org 2008/05/08 13:06:11
1324 [clientloop.c clientloop.h ssh.c]
1325 Use new channel status confirmation callback system to properly deal
1326 with "important" channel requests that fail, in particular command exec,
1327 shell and subsystem requests. Previously we would optimistically assume
1328 that the requests would always succeed, which could cause hangs if they
1329 did not (e.g. when the server runs out of fds) or were unimplemented by
1330 the server (bz #1384)
1331 Also, properly report failing multiplex channel requests via the mux
1332 client stderr (subject to LogLevel in the mux master) - better than
1333 silently failing.
1334 most bits ok markus@ (as part of a larger diff)
e07e21ad 1335 - djm@cvs.openbsd.org 2008/05/09 04:55:56
1336 [channels.c channels.h clientloop.c serverloop.c]
1337 Try additional addresses when connecting to a port forward destination
1338 whose DNS name resolves to more than one address. The previous behaviour
1339 was to try the first address and give up.
1340 Reported by stig AT venaas.com in bz#343
1341 great feedback and ok markus@
3bcced4c 1342 - djm@cvs.openbsd.org 2008/05/09 14:18:44
1343 [clientloop.c clientloop.h ssh.c mux.c]
1344 tidy up session multiplexing code, moving it into its own file and
1345 making the function names more consistent - making ssh.c and
1346 clientloop.c a fair bit more readable.
1347 ok markus@
6cd3e678 1348 - djm@cvs.openbsd.org 2008/05/09 14:26:08
1349 [ssh.c]
1350 dingo stole my diff hunk
ee7c3e92 1351 - markus@cvs.openbsd.org 2008/05/09 16:16:06
1352 [session.c]
1353 re-add the USE_PIPES code and enable it.
1354 without pipes shutdown-read from the sshd does not trigger
1355 a SIGPIPE when the forked program does a write.
1356 ok djm@
1357 (Id sync only, USE_PIPES never left portable OpenSSH)
271f4a13 1358 - markus@cvs.openbsd.org 2008/05/09 16:17:51
1359 [channels.c]
1360 error-fd race: don't enable the error fd in the select bitmask
1361 for channels with both in- and output closed, since the channel
1362 will go away before we call select();
1363 report, lots of debugging help and ok djm@
50c96367 1364 - markus@cvs.openbsd.org 2008/05/09 16:21:13
1365 [channels.h clientloop.c nchan.c serverloop.c]
1366 unbreak
1367 ssh -2 localhost od /bin/ls | true
1368 ignoring SIGPIPE by adding a new channel message (EOW) that signals
1369 the peer that we're not interested in any data it might send.
1370 fixes bz #85; discussion, debugging and ok djm@
d5820099 1371 - pvalchev@cvs.openbsd.org 2008/05/12 20:52:20
1372 [umac.c]
1373 Ensure nh_result lies on a 64-bit boundary (fixes warnings observed
1374 on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@
56b12440 1375 - djm@cvs.openbsd.org 2008/05/15 23:52:24
1376 [nchan2.ms]
1377 document eow message in ssh protocol 2 channel state machine;
1378 feedback and ok markus@
f8db3345 1379 - djm@cvs.openbsd.org 2008/05/18 21:29:05
1380 [sftp-server.c]
1381 comment extension announcement
8be03682 1382 - djm@cvs.openbsd.org 2008/05/16 08:30:42
1383 [PROTOCOL]
1384 document our protocol extensions and deviations; ok markus@
1385 - djm@cvs.openbsd.org 2008/05/17 01:31:56
1386 [PROTOCOL]
1387 grammar and correctness fixes from stevesk@
9b04dbaa 1388
490c3105 138920080403
1390 - (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile-
1391 time warnings on LynxOS. Patch from ops AT iki.fi
1ebb73e4 1392 - (djm) Force string arguments to replacement setproctitle() though
1393 strnvis first. Ok dtucker@
490c3105 1394
2b363e83 139520080403
1396 - (djm) OpenBSD CVS sync:
1397 - markus@cvs.openbsd.org 2008/04/02 15:36:51
1398 [channels.c]
1399 avoid possible hijacking of x11-forwarded connections (back out 1.183)
1400 CVE-2008-1483; ok djm@
adb7acbc 1401 - jmc@cvs.openbsd.org 2008/03/27 22:37:57
1402 [sshd.8]
1403 remove trailing whitespace;
53e0dc70 1404 - djm@cvs.openbsd.org 2008/04/03 09:50:14
1405 [version.h]
1406 openssh-5.0
31b1b2c8 1407 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
1408 [contrib/suse/openssh.spec] Crank version numbers in RPM spec files
dd052df9 1409 - (djm) [README] Update link to release notes
098ebea7 1410 - (djm) Release 5.0p1
This page took 0.424271 seconds and 5 git commands to generate.