]>
Commit | Line | Data |
---|---|---|
b264bd39 | 1 | 20020620 |
8bbfc882 | 2 | - (bal) Fixed AIX environment handling, use setpcred() instead of existing |
3 | code. (Bugzilla Bug 261) | |
b264bd39 | 4 | - (bal) OpenBSD CVS Sync |
5 | - todd@cvs.openbsd.org 2002/06/14 21:35:00 | |
6 | [monitor_wrap.c] | |
7 | spelling; from Brian Poole <raj@cerias.purdue.edu> | |
37500e74 | 8 | - markus@cvs.openbsd.org 2002/06/15 00:01:36 |
9 | [authfd.c authfd.h ssh-add.c ssh-agent.c] | |
10 | break agent key lifetime protocol and allow other contraints for key | |
11 | usage. | |
405e0c5e | 12 | - markus@cvs.openbsd.org 2002/06/15 00:07:38 |
13 | [authfd.c authfd.h ssh-add.c ssh-agent.c] | |
14 | fix stupid typo | |
3015d321 | 15 | - markus@cvs.openbsd.org 2002/06/15 01:27:48 |
ee900f87 | 16 | [authfd.c authfd.h ssh-add.c ssh-agent.c] |
17 | remove the CONSTRAIN_IDENTITY messages and introduce a new | |
18 | ADD_ID message with contraints instead. contraints can be | |
19 | only added together with the private key. | |
48ba8dc8 | 20 | - itojun@cvs.openbsd.org 2002/06/16 21:30:58 |
21 | [ssh-keyscan.c] | |
22 | use TAILQ_xx macro. from lukem@netbsd. markus ok | |
3015d321 | 23 | - deraadt@cvs.openbsd.org 2002/06/17 06:05:56 |
24 | [scp.c] | |
25 | make usage like man page | |
7203d6bb | 26 | - deraadt@cvs.openbsd.org 2002/06/19 00:27:55 |
27 | [auth-bsdauth.c auth-skey.c auth1.c auth2-chall.c auth2-none.c authfd.c | |
28 | authfd.h monitor_wrap.c msg.c nchan.c radix.c readconf.c scp.c sftp.1 | |
29 | ssh-add.1 ssh-add.c ssh-agent.1 ssh-agent.c ssh-keygen.1 ssh-keygen.c | |
30 | ssh-keysign.c ssh.1 sshconnect.c sshconnect.h sshconnect2.c ttymodes.c | |
31 | xmalloc.h] | |
32 | KNF done automatically while reading.... | |
9459414c | 33 | - markus@cvs.openbsd.org 2002/06/19 18:01:00 |
34 | [cipher.c monitor.c monitor_wrap.c packet.c packet.h] | |
35 | make the monitor sync the transfer ssh1 session key; | |
36 | transfer keycontext only for RC4 (this is still depends on EVP | |
37 | implementation details and is broken). | |
588df31a | 38 | - stevesk@cvs.openbsd.org 2002/06/20 19:56:07 |
39 | [ssh.1 sshd.8] | |
40 | move configuration file options from ssh.1/sshd.8 to | |
41 | ssh_config.5/sshd_config.5; ok deraadt@ millert@ | |
add52dd0 | 42 | - stevesk@cvs.openbsd.org 2002/06/20 20:00:05 |
43 | [scp.1 sftp.1] | |
44 | ssh_config(5) | |
54e5539d | 45 | - stevesk@cvs.openbsd.org 2002/06/20 20:03:34 |
46 | [ssh_config sshd_config] | |
47 | refer to config file man page | |
636f76ca | 48 | - markus@cvs.openbsd.org 2002/06/20 23:05:56 |
49 | [servconf.c servconf.h session.c sshd.c] | |
50 | allow Compression=yes/no in sshd_config | |
6f26d43d | 51 | - markus@cvs.openbsd.org 2002/06/20 23:37:12 |
52 | [sshd_config] | |
53 | add Compression | |
2fee5e28 | 54 | - stevesk@cvs.openbsd.org 2002/05/25 20:40:08 |
55 | [LICENCE] | |
56 | missed Per Allansson (auth2-chall.c) | |
fa7a0d52 | 57 | - (bal) Cygwin special handling of empty passwords wrong. Patch by |
58 | vinschen@redhat.com | |
668e6050 | 59 | - (bal) Missed integrating ssh_config.5 and sshd_config.5 |
73bc9b18 | 60 | - (bal) Still more Makefile.in updates for ssh{d}_config.5 |
b264bd39 | 61 | |
f2d02e44 | 62 | 20020613 |
63 | - (bal) typo of setgroup for cygwin. Patch by vinschen@redhat.com | |
64 | ||
b34bec32 | 65 | 20020612 |
66 | - (bal) OpenBSD CVS Sync | |
67 | - markus@cvs.openbsd.org 2002/06/11 23:03:54 | |
68 | [ssh.c] | |
69 | remove unused cruft. | |
de60473e | 70 | - markus@cvs.openbsd.org 2002/06/12 01:09:52 |
71 | [ssh.c] | |
72 | ssh_connect returns 0 on success | |
246446cd | 73 | - (bal) Build noop setgroups() for cygwin to clean up code (For other |
74 | platforms without the setgroups() requirement, you MUST define | |
75 | SETGROUPS_NOOP in the configure.ac) Based on patch by vinschen@redhat.com | |
75136d8b | 76 | - (bal) Some platforms don't have ONLCR (Notable Mint) |
b34bec32 | 77 | |
74a6c7bd | 78 | 20020611 |
79 | - (bal) ssh-agent.c RCSD fix (|unexpand already done) | |
d83cbdc3 | 80 | - (bal) OpenBSD CVS Sync |
81 | - stevesk@cvs.openbsd.org 2002/06/09 22:15:15 | |
82 | [ssh.1] | |
83 | update for no setuid root and ssh-keysign; ok deraadt@ | |
01ca0dfe | 84 | - itojun@cvs.openbsd.org 2002/06/09 22:17:21 |
85 | [sshconnect.c] | |
86 | pass salen to sockaddr_ntop so that we are happy on linux/solaris | |
b7ced7d1 | 87 | - stevesk@cvs.openbsd.org 2002/06/10 16:53:06 |
88 | [auth-rsa.c ssh-rsa.c] | |
89 | display minimum RSA modulus in error(); ok markus@ | |
9cf07a6e | 90 | - stevesk@cvs.openbsd.org 2002/06/10 16:56:30 |
91 | [ssh-keysign.8] | |
92 | merge in stuff from my man page; ok markus@ | |
c3baacd1 | 93 | - stevesk@cvs.openbsd.org 2002/06/10 17:36:23 |
94 | [ssh-add.1 ssh-add.c] | |
95 | use convtime() to parse and validate key lifetime. can now | |
96 | use '-t 2h' etc. ok markus@ provos@ | |
4b3d23b4 | 97 | - stevesk@cvs.openbsd.org 2002/06/10 17:45:20 |
98 | [readconf.c ssh.1] | |
99 | change RhostsRSAAuthentication and RhostsAuthentication default to no | |
100 | since ssh is no longer setuid root by default; ok markus@ | |
ad2e1857 | 101 | - stevesk@cvs.openbsd.org 2002/06/10 21:21:10 |
102 | [ssh_config] | |
103 | update defaults for RhostsRSAAuthentication and RhostsAuthentication | |
104 | here too (all options commented out with default value). | |
149cdb60 | 105 | - markus@cvs.openbsd.org 2002/06/10 22:28:41 |
106 | [channels.c channels.h session.c] | |
107 | move creation of agent socket to session.c; no need for uidswapping | |
108 | in channel.c. | |
3fb156df | 109 | - markus@cvs.openbsd.org 2002/06/11 04:14:26 |
110 | [ssh.c sshconnect.c sshconnect.h] | |
111 | no longer use uidswap.[ch] from the ssh client | |
112 | run less code with euid==0 if ssh is installed setuid root | |
113 | just switch the euid, don't switch the complete set of groups | |
114 | (this is only needed by sshd). ok provos@ | |
c457707e | 115 | - mpech@cvs.openbsd.org 2002/06/11 05:46:20 |
116 | [auth-krb4.c monitor.h serverloop.c session.c ssh-agent.c sshd.c] | |
117 | pid_t cleanup. Markus need this now to keep hacking. | |
118 | markus@, millert@ ok | |
aa686c54 | 119 | - itojun@cvs.openbsd.org 2002/06/11 08:11:45 |
120 | [canohost.c] | |
121 | use "ntop" only after initialized | |
d514c907 | 122 | - (bal) Cygwin fix up from swap uid clean up in ssh.c patch by |
123 | vinschen@redhat.com | |
74a6c7bd | 124 | |
0073b70f | 125 | 20020609 |
126 | - (bal) OpenBSD CVS Sync | |
127 | - markus@cvs.openbsd.org 2002/06/08 05:07:56 | |
128 | [ssh.c] | |
129 | nuke ptrace comment | |
1f143cf2 | 130 | - markus@cvs.openbsd.org 2002/06/08 05:07:09 |
131 | [ssh-keysign.c] | |
132 | only accept 20 byte session ids | |
80fcb74e | 133 | - markus@cvs.openbsd.org 2002/06/08 05:17:01 |
134 | [readconf.c readconf.h ssh.1 ssh.c] | |
135 | deprecate FallBackToRsh and UseRsh; patch from djm@ | |
6c792785 | 136 | - markus@cvs.openbsd.org 2002/06/08 05:40:01 |
137 | [readconf.c] | |
138 | just warn about Deprecated options for now | |
c8e0103c | 139 | - markus@cvs.openbsd.org 2002/06/08 05:41:18 |
140 | [ssh_config] | |
141 | remove FallBackToRsh/UseRsh | |
61eb812e | 142 | - markus@cvs.openbsd.org 2002/06/08 12:36:53 |
143 | [scp.c] | |
144 | remove FallBackToRsh | |
4feae93d | 145 | - markus@cvs.openbsd.org 2002/06/08 12:46:14 |
146 | [readconf.c] | |
147 | silently ignore deprecated options, since FallBackToRsh might be passed | |
148 | by remote scp commands. | |
35ad6a0a | 149 | - itojun@cvs.openbsd.org 2002/06/08 21:15:27 |
150 | [sshconnect.c] | |
151 | always use getnameinfo. (diag message only) | |
b0ff7493 | 152 | - markus@cvs.openbsd.org 2002/06/09 04:33:27 |
153 | [sshconnect.c] | |
154 | abort() - > fatal() | |
e434ac29 | 155 | - (bal) RCSID tag updates on channels.c, clientloop.c, nchan.c, |
156 | sftp-client.c, ssh-agenet.c, ssh-keygen.c and connect.h (we did unexpand | |
157 | independant of them) | |
0073b70f | 158 | |
95d5ebf7 | 159 | 20020607 |
11a3dcde | 160 | - (bal) Removed --{enable/disable}-suid-ssh |
95d5ebf7 | 161 | - (bal) Missed __progname in ssh-keysign.c patch by dtucker@zip.com.au |
85cc9118 | 162 | - (bal) use 'LOGIN_PROGRAM' not '/usr/bin/login' in session.c patch by |
163 | Bertrand.Velle@apogee-com.fr | |
95d5ebf7 | 164 | |
2ee1b704 | 165 | 20020606 |
166 | - (bal) OpenBSD CVS Sync | |
167 | - markus@cvs.openbsd.org 2002/05/15 21:56:38 | |
168 | [servconf.c sshd.8 sshd_config] | |
169 | re-enable privsep and disable setuid for post-3.2.2 | |
7b5edc2b | 170 | - markus@cvs.openbsd.org 2002/05/16 22:02:50 |
171 | [cipher.c kex.h mac.c] | |
172 | fix warnings (openssl 0.9.7 requires const) | |
375e20e7 | 173 | - stevesk@cvs.openbsd.org 2002/05/16 22:09:59 |
174 | [session.c ssh.c] | |
175 | don't limit xauth pathlen on client side and longer print length on | |
176 | server when debug; ok markus@ | |
a4ae736b | 177 | - deraadt@cvs.openbsd.org 2002/05/19 20:54:52 |
178 | [log.h] | |
179 | extra commas in enum not 100% portable | |
c242fc96 | 180 | - deraadt@cvs.openbsd.org 2002/05/22 23:18:25 |
181 | [ssh.c sshd.c] | |
182 | spelling; abishoff@arc.nasa.gov | |
39c00dc2 | 183 | - markus@cvs.openbsd.org 2002/05/23 19:24:30 |
184 | [authfile.c authfile.h pathnames.h ssh.c sshconnect.c sshconnect.h | |
185 | sshconnect1.c sshconnect2.c ssh-keysign.8 ssh-keysign.c Makefile.in] | |
186 | add /usr/libexec/ssh-keysign: a setuid helper program for hostbased | |
187 | authentication in protocol v2 (needs to access the hostkeys). | |
78660ed4 | 188 | - markus@cvs.openbsd.org 2002/05/23 19:39:34 |
189 | [ssh.c] | |
190 | add comment about ssh-keysign | |
7091a26b | 191 | - markus@cvs.openbsd.org 2002/05/24 08:45:14 |
192 | [sshconnect2.c] | |
193 | stat ssh-keysign first, print error if stat fails; | |
194 | some debug->error; fix comment | |
a3f69458 | 195 | - markus@cvs.openbsd.org 2002/05/25 08:50:39 |
196 | [sshconnect2.c] | |
197 | execlp->execl; from stevesk | |
013eab17 | 198 | - markus@cvs.openbsd.org 2002/05/25 18:51:07 |
199 | [auth.h auth2.c auth2-hostbased.c auth2-kbdint.c auth2-none.c | |
200 | auth2-passwd.c auth2-pubkey.c Makefile.in] | |
201 | split auth2.c into one file per method; ok provos@/deraadt@ | |
bd4d0f49 | 202 | - stevesk@cvs.openbsd.org 2002/05/26 20:35:10 |
203 | [ssh.1] | |
204 | sort ChallengeResponseAuthentication; ok markus@ | |
c22d8cc0 | 205 | - stevesk@cvs.openbsd.org 2002/05/28 16:45:27 |
206 | [monitor_mm.c] | |
207 | print strerror(errno) on mmap/munmap error; ok markus@ | |
caa49784 | 208 | - stevesk@cvs.openbsd.org 2002/05/28 17:28:02 |
209 | [uidswap.c] | |
210 | format spec change/casts and some KNF; ok markus@ | |
fd7bc9fc | 211 | - stevesk@cvs.openbsd.org 2002/05/28 21:24:00 |
212 | [uidswap.c] | |
213 | use correct function name in fatal() | |
cb19b38a | 214 | - stevesk@cvs.openbsd.org 2002/05/29 03:06:30 |
215 | [ssh.1 sshd.8] | |
216 | spelling | |
3cc54fbb | 217 | - markus@cvs.openbsd.org 2002/05/29 11:21:57 |
218 | [sshd.c] | |
219 | don't start if privsep is enabled and SSH_PRIVSEP_USER or | |
220 | _PATH_PRIVSEP_CHROOT_DIR are missing; ok deraadt@ | |
135247df | 221 | - markus@cvs.openbsd.org 2002/05/30 08:07:31 |
222 | [cipher.c] | |
223 | use rijndael/aes from libcrypto (openssl >= 0.9.7) instead of | |
224 | our own implementation. allow use of AES hardware via libcrypto, | |
225 | ok deraadt@ | |
d4826734 | 226 | - markus@cvs.openbsd.org 2002/05/31 10:30:33 |
227 | [sshconnect2.c] | |
228 | extent ssh-keysign protocol: | |
229 | pass # of socket-fd to ssh-keysign, keysign verfies locally used | |
230 | ip-address using this socket-fd, restricts fake local hostnames | |
231 | to actual local hostnames; ok stevesk@ | |
01c24737 | 232 | - markus@cvs.openbsd.org 2002/05/31 11:35:15 |
233 | [auth.h auth2.c] | |
234 | move Authmethod definitons to per-method file. | |
3ed81c99 | 235 | - markus@cvs.openbsd.org 2002/05/31 13:16:48 |
236 | [key.c] | |
237 | add comment: | |
238 | key_verify returns 1 for a correct signature, 0 for an incorrect signature | |
239 | and -1 on error. | |
88f24e9d | 240 | - markus@cvs.openbsd.org 2002/05/31 13:20:50 |
241 | [ssh-rsa.c] | |
242 | pad received signature with leading zeros, because RSA_verify expects | |
243 | a signature of RSA_size. the drafts says the signature is transmitted | |
244 | unpadded (e.g. putty does not pad), reported by anakin@pobox.com | |
7f056bc5 | 245 | - deraadt@cvs.openbsd.org 2002/06/03 12:04:07 |
246 | [ssh.h] | |
247 | compatiblity -> compatibility | |
248 | decriptor -> descriptor | |
249 | authentciated -> authenticated | |
250 | transmition -> transmission | |
aa586f8e | 251 | - markus@cvs.openbsd.org 2002/06/04 19:42:35 |
252 | [monitor.c] | |
253 | only allow enabled authentication methods; ok provos@ | |
521d606b | 254 | - markus@cvs.openbsd.org 2002/06/04 19:53:40 |
255 | [monitor.c] | |
256 | save the session id (hash) for ssh2 (it will be passed with the | |
257 | initial sign request) and verify that this value is used during | |
258 | authentication; ok provos@ | |
91647fe6 | 259 | - markus@cvs.openbsd.org 2002/06/04 23:02:06 |
260 | [packet.c] | |
261 | remove __FUNCTION__ | |
1588c277 | 262 | - markus@cvs.openbsd.org 2002/06/04 23:05:49 |
263 | [cipher.c monitor.c monitor_fdpass.c monitor_mm.c monitor_wrap.c] | |
264 | __FUNCTION__ -> __func__ | |
3e7efb37 | 265 | - markus@cvs.openbsd.org 2002/06/05 16:08:07 |
266 | [ssh-agent.1 ssh-agent.c] | |
267 | '-a bind_address' binds the agent to user-specified unix-domain | |
268 | socket instead of /tmp/ssh-XXXXXXXX/agent.<pid>; ok djm@ (some time ago). | |
9aa28a7f | 269 | - markus@cvs.openbsd.org 2002/06/05 16:08:07 |
270 | [ssh-agent.1 ssh-agent.c] | |
271 | '-a bind_address' binds the agent to user-specified unix-domain | |
272 | socket instead of /tmp/ssh-XXXXXXXX/agent.<pid>; ok djm@ (some time ago). | |
b9dd5ca1 | 273 | - markus@cvs.openbsd.org 2002/06/05 16:48:54 |
274 | [ssh-agent.c] | |
275 | copy current request into an extra buffer and just flush this | |
276 | request on errors, ok provos@ | |
3db7f994 | 277 | - markus@cvs.openbsd.org 2002/06/05 19:57:12 |
278 | [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c] | |
279 | ssh-add -x for lock and -X for unlocking the agent. | |
280 | todo: encrypt private keys with locked... | |
73861c4e | 281 | - markus@cvs.openbsd.org 2002/06/05 20:56:39 |
282 | [ssh-add.c] | |
283 | add -x/-X to usage | |
264572cc | 284 | - markus@cvs.openbsd.org 2002/06/05 21:55:44 |
285 | [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c] | |
286 | ssh-add -t life, Set lifetime (in seconds) when adding identities; | |
287 | ok provos@ | |
c6f1f67c | 288 | - stevesk@cvs.openbsd.org 2002/06/06 01:09:41 |
289 | [monitor.h] | |
290 | no trailing comma in enum; china@thewrittenword.com | |
9b4ac641 | 291 | - markus@cvs.openbsd.org 2002/06/06 17:12:44 |
292 | [sftp-server.c] | |
293 | discard remaining bytes of current request; ok provos@ | |
802d93bb | 294 | - markus@cvs.openbsd.org 2002/06/06 17:30:11 |
295 | [sftp-server.c] | |
296 | use get_int() macro (hide iqueue) | |
8afe456d | 297 | - (bal) Missed msg.[ch] in merge. Required for ssh-keysign. |
5a30b173 | 298 | - (bal) Forgot to add msg.c Makefile.in. |
441b3f63 | 299 | - (bal) monitor_mm.c typos. |
e5c59e31 | 300 | - (bal) Refixed auth2.c. It was never fully commited while spliting out |
d4d77d64 | 301 | authentication to different files. |
04eb391d | 302 | - (bal) ssh-keysign should build and install correctly now. Phase two |
303 | would be to clean out any dead wood and disable ssh setuid on install. | |
d4d77d64 | 304 | - (bal) Reverse logic, use __func__ first since it's C99 |
95f20fe8 | 305 | |
688aaeda | 306 | 20020604 |
307 | - (stevesk) [channels.c] bug #164 patch from YOSHIFUJI Hideaki (changed | |
308 | setsockopt from debug to error for now). | |
309 | ||
637f9177 | 310 | 20020527 |
311 | - (tim) [configure.ac.orig monitor_fdpass.c] Enahnce msghdr tests to address | |
312 | build problem on Irix reported by Dave Love <d.love@dl.ac.uk>. Back out | |
313 | last monitor_fdpass.c changes that are no longer needed with new tests. | |
314 | Patch tested on Irix by Jan-Frode Myklebust <janfrode@parallab.uib.no> | |
315 | ||
a23a769d | 316 | 20020522 |
317 | - (djm) Fix spelling mistakes, spotted by Solar Designer i | |
318 | <solar@openwall.com> | |
2880ad5e | 319 | - Sync scard/ (not sure when it drifted) |
68604c75 | 320 | - (djm) OpenBSD CVS Sync: |
321 | [auth.c] | |
322 | Fix typo/thinko. Pass in as to auth_approval(), not NULL. | |
323 | Closes PR 2659. | |
324 | - Crank version | |
3ed9ebdb | 325 | - Crank RPM spec versions |
a23a769d | 326 | |
30321a9b | 327 | 20020521 |
328 | - (stevesk) [sshd.c] bug 245; disable setsid() for now | |
20ded834 | 329 | - (stevesk) [sshd.c] #ifndef HAVE_CYGWIN for setgroups() |
30321a9b | 330 | |
9a499a03 | 331 | 20020517 |
332 | - (tim) [configure.ac] remove extra MD5_MSG="no" line. | |
333 | ||
68a9cd3e | 334 | 20020515 |
335 | - (bal) CVS ID fix up on auth-passwd.c | |
e0740430 | 336 | - (bal) OpenBSD CVS Sync |
337 | - deraadt@cvs.openbsd.org 2002/05/07 19:54:36 | |
338 | [ssh.h] | |
339 | use ssh uid | |
897fecd3 | 340 | - deraadt@cvs.openbsd.org 2002/05/08 21:06:34 |
341 | [ssh.h] | |
342 | move to sshd.sshd instead | |
5de727d6 | 343 | - stevesk@cvs.openbsd.org 2002/05/11 20:24:48 |
344 | [ssh.h] | |
345 | typo in comment | |
69538b0c | 346 | - itojun@cvs.openbsd.org 2002/05/13 02:37:39 |
347 | [auth-skey.c auth2.c] | |
348 | less warnings. skey_{respond,query} are public (in auth.h) | |
01dafcb5 | 349 | - markus@cvs.openbsd.org 2002/05/13 20:44:58 |
350 | [auth-options.c auth.c auth.h] | |
351 | move the packet_send_debug handling from auth-options.c to auth.c; | |
352 | ok provos@ | |
4ac8556b | 353 | - millert@cvs.openbsd.org 2002/05/13 15:53:19 |
354 | [sshd.c] | |
355 | Call setsid() in the child after sshd accepts the connection and forks. | |
356 | This is needed for privsep which calls setlogin() when it changes uids. | |
357 | Without this, there is a race where the login name of an existing | |
358 | connection, as returned by getlogin(), may be changed to the privsep | |
359 | user (sshd). markus@ OK | |
b3ad3d88 | 360 | - markus@cvs.openbsd.org 2002/05/13 21:26:49 |
361 | [auth-rhosts.c] | |
362 | handle debug messages during rhosts-rsa and hostbased authentication; | |
363 | ok provos@ | |
b5a28cbc | 364 | - mouring@cvs.openbsd.org 2002/05/15 15:47:49 |
365 | [kex.c monitor.c monitor_wrap.c sshd.c] | |
366 | 'monitor' variable clashes with at least one lame platform (NeXT). i | |
367 | Renamed to 'pmonitor'. provos@ | |
1642b888 | 368 | - deraadt@cvs.openbsd.org 2002/05/04 02:39:35 |
369 | [servconf.c sshd.8 sshd_config] | |
370 | enable privsep by default; provos ok | |
7e276482 | 371 | - millert@cvs.openbsd.org 2002/05/06 23:34:33 |
372 | [ssh.1 sshd.8] | |
373 | Kill/adjust r(login|exec)d? references now that those are no longer in | |
374 | the tree. | |
6c172f95 | 375 | - markus@cvs.openbsd.org 2002/05/15 21:02:53 |
376 | [servconf.c sshd.8 sshd_config] | |
377 | disable privsep and enable setuid for the 3.2.2 release | |
b5a28cbc | 378 | - (bal) Fixed up PAM case. I think. |
0c83d9ea | 379 | - (bal) Clarified openbsd-compat/*-cray.* Licence provided by Wendy |
3a034dc5 | 380 | - (bal) OpenBSD CVS Sync |
381 | - markus@cvs.openbsd.org 2002/05/15 21:05:29 | |
382 | [version.h] | |
383 | enter OpenSSH_3.2.2 | |
384 | - (bal) Caldara, Suse, and Redhat openssh.specs updated. | |
68a9cd3e | 385 | |
545ba36e | 386 | 20020514 |
387 | - (stevesk) [README.privsep] PAM+privsep works with Solaris 8. | |
f65fbec1 | 388 | - (tim) [sshpty.c] set tty modes when allocating old style bsd ptys to |
389 | match what newer style ptys have when allocated. Based on a patch by | |
390 | Roger Cornelius <rac@tenzing.org> | |
47cdfcbe | 391 | - (tim) [README.privsep] UnixWare 7 and OpenUNIX 8 work. |
392 | - (tim) [README.privsep] remove reference to UnixWare 7 and OpenUNIX 8 | |
393 | from PAM-enabled pragraph. UnixWare has no PAM. | |
3c1a6277 | 394 | - (tim) [contrib/caldera/openssh.spec] update version. |
545ba36e | 395 | |
06617857 | 396 | 20020513 |
3d1beaf2 | 397 | - (stevesk) add initial README.privsep |
5222e7ef | 398 | - (stevesk) [configure.ac] nicer message: --with-privsep-user=user |
fdff2c55 | 399 | - (djm) Add --with-superuser-path=xxx configure option to specify |
400 | what $PATH the superuser receives. | |
94a73cdc | 401 | - (djm) Bug #231: UsePrivilegeSeparation turns off Banner. |
ecac8ee5 | 402 | - (djm) Add --with-privsep-path configure option |
80e92e5d | 403 | - (djm) Update RPM spec file: different superuser path, use |
404 | /var/empty/sshd for privsep | |
75817f90 | 405 | - (djm) Bug #234: missing readpassphrase declaration and defines |
fdff2c55 | 406 | - (djm) Add INSTALL warning about SSH protocol 1 blowfish w/ |
407 | OpenSSL < 0.9.6 | |
06617857 | 408 | |
5b991353 | 409 | 20020511 |
410 | - (tim) [configure.ac] applied a rework of djm's OpenSSL search cleanup patch. | |
411 | Now only searches system and /usr/local/ssl (OpenSSL's default install path) | |
412 | Others must use --with-ssl-dir=.... | |
d73cbfe3 | 413 | - (tim) [monitor_fdpass.c] fix for systems that have both |
fdff2c55 | 414 | HAVE_ACCRIGHTS_IN_MSGHDR and HAVE_CONTROL_IN_MSGHDR. Ie. sys/socket.h |
415 | has #define msg_accrights msg_control | |
5b991353 | 416 | |
3ef3d901 | 417 | 20020510 |
5b29f152 | 418 | - (stevesk) [auth.c] Shadow account and expiration cleanup. Now |
419 | check for root forced expire. Still don't check for inactive. | |
3ef3d901 | 420 | - (djm) Rework RedHat RPM files. Based on spec from Nalin |
421 | Dahyabhai <nalin@redhat.com> and patches from | |
422 | Pekka Savola <pekkas@netcore.fi> | |
018a5ea3 | 423 | - (djm) Try to drop supplemental groups at daemon startup. Patch from |
424 | RedHat | |
f656b61e | 425 | - (bal) Back all the way out of auth-passwd.c changes. Breaks too many |
426 | things that don't set pw->pw_passwd. | |
3ef3d901 | 427 | |
075682c1 | 428 | 20020509 |
429 | - (tim) [Makefile.in] Unbreak make -f Makefile.in distprep | |
fea8a8e8 | 430 | |
075682c1 | 431 | 20020508 |
af5ee4e4 | 432 | - (tim) [openbsd-compat/bsd-arc4random.c] fix logic on when seed_rng() is |
433 | called. Report by Chris Maxwell <maxwell@cs.dal.ca> | |
6193497b | 434 | - (tim) [Makefile.in configure.ac] set SHELL variable in Makefile |
075682c1 | 435 | - (djm) Disable PAM kbd-int auth if privsep is turned on (it doesn't work) |
af5ee4e4 | 436 | |
f25cd32c | 437 | 20020507 |
438 | - (tim) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h] | |
439 | Add truncate() emulation to address Bug 208 | |
440 | ||
69406cab | 441 | 20020506 |
442 | - (djm) Unbreak auth-passwd.c for PAM and SIA | |
efe44db6 | 443 | - (djm) Unbreak PAM auth for protocol 1. Report from Pekka Savola |
444 | <pekkas@netcore.fi> | |
39ce53de | 445 | - (djm) Don't reinitialise PAM credentials before we have started PAM. |
446 | Report from Pekka Savola <pekkas@netcore.fi> | |
447 | ||
d9891c59 | 448 | 20020506 |
449 | - (bal) Fixed auth-passwd.c to resolve PermitEmptyPassword issue | |
450 | ||
836d58d7 | 451 | 20020501 |
452 | - (djm) Import OpenBSD regression tests. Requires BSD make to run | |
50903cc7 | 453 | - (djm) Fix readpassphase compilation for systems which have it |
836d58d7 | 454 | |
f0c180c3 | 455 | 20020429 |
456 | - (tim) [contrib/caldera/openssh.spec] update fixUP to reflect changes in | |
457 | sshd_config. | |
458 | - (tim) [contrib/cygwin/README] remove reference to regex. | |
459 | patch from Corinna Vinschen <vinschen@redhat.com> | |
460 | ||
db8dbb6a | 461 | 20020426 |
462 | - (djm) Bug #137, #209: fix make problems for scard/Ssh.bin, do uudecode | |
463 | during distprep only | |
fdff2c55 | 464 | - (djm) Disable PAM password expiry until a complete fix for bug #188 |
465 | exists | |
782e2103 | 466 | - (djm) Bug #180: Set ToS bits on IPv4-in-IPv6 mapped addresses. Based on |
467 | patch from openssh@misc.tecq.org | |
db8dbb6a | 468 | |
369e787a | 469 | 20020425 |
470 | - (stevesk) [defines.h] remove USE_TIMEVAL; unused | |
6e879cb4 | 471 | - (stevesk) [acconfig.h auth-passwd.c configure.ac sshd.c] HP-UX 10.26 |
472 | support. bug #184. most from dcole@keysoftsys.com. | |
369e787a | 473 | |
8c1f70d8 | 474 | 20020424 |
475 | - (djm) OpenBSD CVS Sync | |
476 | - markus@cvs.openbsd.org 2002/04/23 12:54:10 | |
477 | [version.h] | |
478 | 3.2.1 | |
cdc4fc39 | 479 | - djm@cvs.openbsd.org 2002/04/23 22:16:29 |
480 | [sshd.c] | |
481 | Improve error message; ok markus@ stevesk@ | |
8c1f70d8 | 482 | |
520b41b2 | 483 | 20020423 |
a2572aa7 | 484 | - (stevesk) [acconfig.h configure.ac session.c] LOGIN_NO_ENDOPT for HP-UX |
7615ed55 | 485 | - (stevesk) [acconfig.h] NEED_IN_SYSTM_H unused |
744d788b | 486 | - (markus) OpenBSD CVS Sync |
487 | - markus@cvs.openbsd.org 2002/04/23 12:58:26 | |
488 | [radix.c] | |
489 | send complete ticket; semerad@ss1000.ms.mff.cuni.cz | |
3b307f85 | 490 | - (djm) Trim ChangeLog to include only post-3.1 changes |
48862e93 | 491 | - (djm) Update RPM spec file versions |
03dd62aa | 492 | - (djm) Redhat spec enables KrbV by default |
1352689f | 493 | - (djm) Applied OpenSC smartcard updates from Markus & |
494 | Antti Tapaninen <aet@cc.hut.fi> | |
495 | - (djm) Define BROKEN_REALPATH for AIX, patch from | |
496 | Antti Tapaninen <aet@cc.hut.fi> | |
0e8f4eba | 497 | - (djm) Bug #214: Fix utmp for Irix (don't strip "tty"). Patch from |
498 | Kevin Taylor <no@nowhere.org> (??) via Philipp Grau | |
499 | <phgrau@zedat.fu-berlin.de> | |
2805b943 | 500 | - (djm) Bug #213: Simplify CMSG_ALIGN macros to avoid symbol clashes. |
501 | Reported by Doug Manton <dmanton@emea.att.com> | |
520b41b2 | 502 | - (djm) Bug #222: Fix tests for getaddrinfo on OSF/1. Spotted by |
503 | Robert Urban <urban@spielwiese.de> | |
52f1ccb2 | 504 | - (djm) Bug #206 - blibpath isn't always needed for AIX ld, avoid |
505 | sizeof(long long int) == 4 breakage. Patch from Matthew Clarke | |
506 | <Matthew_Clarke@mindlink.bc.ca> | |
ad200abb | 507 | - (djm) Make privsep work with PAM (still experimental) |
9b26c596 | 508 | - (djm) OpenBSD CVS Sync |
509 | - deraadt@cvs.openbsd.org 2002/04/20 09:02:03 | |
510 | [servconf.c] | |
511 | No, afs requires explicit enabling | |
512 | - markus@cvs.openbsd.org 2002/04/20 09:14:58 | |
513 | [bufaux.c bufaux.h] | |
514 | add buffer_{get,put}_short | |
3b358a0e | 515 | - markus@cvs.openbsd.org 2002/04/20 09:17:19 |
516 | [radix.c] | |
517 | rewrite using the buffer_* API, fixes overflow; ok deraadt@ | |
22d0faff | 518 | - stevesk@cvs.openbsd.org 2002/04/21 16:19:27 |
519 | [sshd.8 sshd_config] | |
520 | document default AFSTokenPassing no; ok deraadt@ | |
134c552b | 521 | - stevesk@cvs.openbsd.org 2002/04/21 16:25:06 |
522 | [sshconnect1.c] | |
523 | spelling in error message; ok markus@ | |
afb8fdb4 | 524 | - markus@cvs.openbsd.org 2002/04/22 06:15:47 |
525 | [radix.c] | |
526 | fix check for overflow | |
eadc806d | 527 | - markus@cvs.openbsd.org 2002/04/22 16:16:53 |
528 | [servconf.c sshd.8 sshd_config] | |
529 | do not auto-enable KerberosAuthentication; ok djm@, provos@, deraadt@ | |
e0ae8728 | 530 | - markus@cvs.openbsd.org 2002/04/22 21:04:52 |
531 | [channels.c clientloop.c clientloop.h ssh.c] | |
532 | request reply (success/failure) for -R style fwd in protocol v2, | |
533 | depends on ordered replies. | |
534 | fixes http://bugzilla.mindrot.org/show_bug.cgi?id=215; ok provos@ | |
520b41b2 | 535 | |
ac033f8c | 536 | 20020421 |
537 | - (tim) [entropy.c.] Portability fix for SCO Unix 3.2v4.x (SCO OSR 3.0). | |
fdff2c55 | 538 | entropy.c needs seteuid(getuid()) for the setuid(original_uid) to |
539 | succeed. Patch by gert@greenie.muc.de. This fixes one part of Bug 208 | |
ac033f8c | 540 | |
6dc63b4f | 541 | 20020418 |
542 | - (djm) Avoid SIGCHLD breakage when run from rsync. Fix from | |
543 | Sturle Sunde <sturle.sunde@usit.uio.no> | |
544 | ||
230c7a8f | 545 | 20020417 |
fdff2c55 | 546 | - (djm) Tell users to configure /dev/random support into OpenSSL in |
547 | INSTALL | |
1a7220c2 | 548 | - (djm) Fix .Nm in mdoc2man.pl from pspencer@fields.utoronto.ca |
8d184c09 | 549 | - (tim) [configure.ac] Issue warning on --with-default-path=/some_path |
550 | if LOGIN_CAP is enabled. Report & testing by Tuc <tuc@ttsg.com> | |
230c7a8f | 551 | |
9ae68cce | 552 | 20020415 |
fdff2c55 | 553 | - (djm) Unbreak "make install". Fix from Darren Tucker |
554 | <dtucker@zip.com.au> | |
4e51cc76 | 555 | - (stevesk) bsd-cygwin_util.[ch] BSD license from Corinna Vinschen |
1b06e75e | 556 | - (tim) [configure.ac] add tests for recvmsg and sendmsg. |
557 | [monitor_fdpass.c] add checks for HAVE_SENDMSG and HAVE_RECVMSG for | |
558 | systems that HAVE_ACCRIGHTS_IN_MSGHDR but no recvmsg or sendmsg. | |
9ae68cce | 559 | |
f6e6303d | 560 | 20020414 |
561 | - (djm) ssh-rand-helper improvements | |
562 | - Add commandline debugging options | |
563 | - Don't write binary data if stdout is a tty (use hex instead) | |
564 | - Give it a manpage | |
cbe5b851 | 565 | - (djm) Random number collection doc fixes from Ben |
f6e6303d | 566 | |
12928e80 | 567 | 20020413 |
568 | - (djm) Add KrbV support patch from Simon Wilkinson <simon@sxw.org.uk> | |
569 | ||
40b74b3f | 570 | 20020412 |
571 | - (stevesk) [auth-sia.[ch]] add BSD license from Chris Adams | |
f95c8ce8 | 572 | - (tim) [configure.ac] add <sys/types.h> to msghdr tests. Change -L |
573 | to -h on testing for /bin being symbolic link | |
e2c9b9e3 | 574 | - (bal) Mistaken in Cygwin scripts for ssh starting. Patch by |
575 | Corinna Vinschen <vinschen@redhat.com> | |
e75b61db | 576 | - (bal) disable privsep if no MAP_ANON. We can re-enable it |
577 | after the release when we can do more testing. | |
40b74b3f | 578 | |
65b91c76 | 579 | 20020411 |
580 | - (stevesk) [auth-sia.c] cleanup | |
7b0737a4 | 581 | - (tim) [acconfig.h defines.h includes.h] put includes in includes.h and |
582 | defines in defines.h [rijndael.c openbsd-compat/fake-socket.h | |
583 | openbsd-compat/inet_aton.c] include "includes.h" instead of "config.h" | |
584 | ok stevesk@ | |
65b91c76 | 585 | |
ca8aba40 | 586 | 20020410 |
f1af2dbf | 587 | - (stevesk) [configure.ac monitor.c] HAVE_SOCKETPAIR |
ca8aba40 | 588 | - (stevesk) [auth-sia.c] compile fix Chris Adams <cmadams@hiwaay.net> |
d8ff54e6 | 589 | - (bal) OpenBSD CVS Sync |
590 | - markus@cvs.openbsd.org 2002/04/10 08:21:47 | |
591 | [auth1.c compat.c compat.h] | |
fdff2c55 | 592 | strip '@' from username only for KerbV and known broken clients, |
593 | bug #204 | |
f14a5033 | 594 | - markus@cvs.openbsd.org 2002/04/10 08:56:01 |
595 | [version.h] | |
596 | OpenSSH_3.2 | |
597 | - Added p1 to idenify Portable release version. | |
ca8aba40 | 598 | |
46c8e0f6 | 599 | 20020408 |
600 | - (bal) Minor OpenSC updates. Fix up header locations and update | |
601 | README.smartcard provided by Juha Yrjölä <jyrjola@cc.hut.fi> | |
602 | ||
7176df4f | 603 | 20020407 |
604 | - (stevesk) HAVE_CONTROL_IN_MSGHDR; not used right now. | |
605 | Future: we may want to test if fd passing works correctly. | |
84071420 | 606 | - (stevesk) [monitor_fdpass.c] fatal() for UsePrivilegeSeparation=yes |
607 | and no fd passing support. | |
1e8f8c5b | 608 | - (stevesk) HAVE_MMAP and HAVE_SYS_MMAN_H and use them in |
609 | monitor_mm.c | |
a90419b8 | 610 | - (stevesk) remove configure support for poll.h; it was removed |
611 | from sshd.c a long time ago. | |
9a0fbcb3 | 612 | - (stevesk) --with-privsep-user; default sshd |
1bf74eac | 613 | - (stevesk) wrap munmap() with HAVE_MMAP also. |
7176df4f | 614 | |
b17d6a47 | 615 | 20020406 |
616 | - (djm) Typo in Suse SPEC file. Fix from Carsten Grohmann | |
617 | <carsten.grohmann@dr-baldeweg.de> | |
23aa1237 | 618 | - (bal) Added MAP_FAILED to allow AIX and Trusted HP to compile. |
af2b3cd9 | 619 | - (bal) OpenBSD CVS Sync |
620 | - djm@cvs.openbsd.org 2002/04/06 00:30:08 | |
621 | [sftp-client.c] | |
1d6d408a | 622 | Fix occasional corruption on upload due to bad reuse of request |
623 | id, spotted by chombier@mac.com; ok markus@ | |
39f9599a | 624 | - mouring@cvs.openbsd.org 2002/04/06 18:24:09 |
625 | [scp.c] | |
626 | Fixes potental double // within path. | |
627 | http://bugzilla.mindrot.org/show_bug.cgi?id=76 | |
5866adb0 | 628 | - (bal) Slight update to OpenSC support. Better version checking. patch |
629 | by Juha Yrjölä <jyrjola@cc.hut.fi> | |
b5171f93 | 630 | - (bal) Revered out of runtime IRIX detection of joblimits. Code is |
631 | incomplete. | |
419e4769 | 632 | - (bal) Quiet down configure.ac if /bin/test does not exist. |
14f35963 | 633 | - (bal) We no longer use atexit()/xatexit()/on_exit() |
b17d6a47 | 634 | |
295c8801 | 635 | 20020405 |
636 | - (bal) Patch for OpenSC SmartCard library; ok markus@; patch by | |
637 | Juha Yrjölä <jyrjola@cc.hut.fi> | |
638 | - (bal) Minor documentation update to reflect smartcard library | |
639 | support changes. | |
ab33e02a | 640 | - (bal) Too many <sys/queue.h> issues. Remove all workarounds and |
641 | using internal version only. | |
d4c6ddff | 642 | - (bal) OpenBSD CVS Sync |
643 | - stevesk@cvs.openbsd.org 2002/04/05 20:56:21 | |
644 | [sshd.8] | |
645 | clarify sshrc some and handle X11UseLocalhost=yes; ok markus@ | |
295c8801 | 646 | |
fde58bd4 | 647 | 20020404 |
648 | - (stevesk) [auth-pam.c auth-pam.h auth-passwd.c auth-sia.c auth-sia.h | |
649 | auth1.c auth2.c] PAM, OSF_SIA password auth cleanup; from djm. | |
bf03f2da | 650 | - (bal) OpenBSD CVS Sync |
651 | - markus@cvs.openbsd.org 2002/04/03 09:26:11 | |
652 | [cipher.c myproposal.h] | |
653 | re-add rijndael-cbc@lysator.liu.se for MacSSH; ash@lab.poc.net | |
fde58bd4 | 654 | |
ca7e8e1e | 655 | 20020402 |
656 | - (bal) Hand Sync of scp.c (reverted to upstream code) | |
657 | - deraadt@cvs.openbsd.org 2002/03/30 17:45:46 | |
658 | [scp.c] | |
659 | stretch banners | |
c572a874 | 660 | - (bal) CVS ID sync of uidswap.c |
783dbbdc | 661 | - (bal) OpenBSD CVS Sync (now for the real sync) |
662 | - markus@cvs.openbsd.org 2002/03/27 22:21:45 | |
663 | [ssh-keygen.c] | |
fdff2c55 | 664 | try to import keys with extra trailing === (seen with ssh.com < |
665 | 2.0.12) | |
49a34e84 | 666 | - markus@cvs.openbsd.org 2002/03/28 15:34:51 |
667 | [session.c] | |
668 | do not call record_login twice (for use_privsep) | |
ffbf7323 | 669 | - markus@cvs.openbsd.org 2002/03/29 18:59:32 |
670 | [session.c session.h] | |
fdff2c55 | 671 | retrieve last login time before the pty is allocated, store per |
672 | session | |
3bc822df | 673 | - stevesk@cvs.openbsd.org 2002/03/29 19:16:22 |
674 | [sshd.8] | |
675 | RSA key modulus size minimum 768; ok markus@ | |
82b00264 | 676 | - stevesk@cvs.openbsd.org 2002/03/29 19:18:33 |
677 | [auth-rsa.c ssh-rsa.c ssh.h] | |
678 | make RSA modulus minimum #define; ok markus@ | |
8c38e88b | 679 | - markus@cvs.openbsd.org 2002/03/30 18:51:15 |
680 | [monitor.c serverloop.c sftp-int.c sftp.c sshd.c] | |
681 | check waitpid for EINTR; based on patch from peter@ifm.liu.se | |
92053302 | 682 | - markus@cvs.openbsd.org 2002/04/01 22:02:16 |
683 | [sftp-client.c] | |
684 | 20480 is an upper limit for older server | |
9c74a24d | 685 | - markus@cvs.openbsd.org 2002/04/01 22:07:17 |
686 | [sftp-client.c] | |
687 | fallback to stat if server does not support lstat | |
b745a2f2 | 688 | - markus@cvs.openbsd.org 2002/04/02 11:49:39 |
689 | [ssh-agent.c] | |
690 | check $SHELL for -k and -d, too; | |
691 | http://bugzilla.mindrot.org/show_bug.cgi?id=199 | |
b69145c2 | 692 | - markus@cvs.openbsd.org 2002/04/02 17:37:48 |
693 | [sftp.c] | |
694 | always call log_init() | |
c9336aed | 695 | - markus@cvs.openbsd.org 2002/04/02 20:11:38 |
696 | [ssh-rsa.c] | |
697 | ignore SSH_BUG_SIGBLOB for ssh-rsa; #187 | |
c895376b | 698 | - (bal) mispelling in uidswap.c (portable only) |
ca7e8e1e | 699 | |
8b314ec9 | 700 | 20020401 |
701 | - (stevesk) [monitor.c] PAM should work again; will *not* work with | |
702 | UsePrivilegeSeparation=yes. | |
3906af0f | 703 | - (stevesk) [auth1.c] fix password auth for protocol 1 when |
704 | !USE_PAM && !HAVE_OSF_SIA; merge issue. | |
8b314ec9 | 705 | |
267e920e | 706 | 20020331 |
707 | - (tim) [configure.ac] use /bin/test -L to work around broken builtin on | |
708 | Solaris 8 | |
ef077e37 | 709 | - (tim) [sshconnect2.c] change uint32_t to u_int32_t |
267e920e | 710 | |
0461c355 | 711 | 20020330 |
712 | - (stevesk) [configure.ac] remove header check for sys/ttcompat.h | |
713 | bug 167 | |
714 | ||
dd466ff8 | 715 | 20020327 |
716 | - (bal) 'pw' should be 'authctxt->pw' in auth1.c spotted by | |
717 | kent@lysator.liu.se | |
17f5e68a | 718 | - (bal) OpenBSD CVS Sync |
719 | - markus@cvs.openbsd.org 2002/03/26 11:34:49 | |
720 | [ssh.1 sshd.8] | |
721 | update to recent drafts | |
5fb274c1 | 722 | - markus@cvs.openbsd.org 2002/03/26 11:37:05 |
723 | [ssh.c] | |
724 | update Copyright | |
19f40184 | 725 | - markus@cvs.openbsd.org 2002/03/26 15:23:40 |
726 | [bufaux.c] | |
727 | do not talk about packets in bufaux | |
7341fad9 | 728 | - rees@cvs.openbsd.org 2002/03/26 18:46:59 |
729 | [scard.c] | |
fdff2c55 | 730 | try_AUT0 in read_pubkey too, for those paranoid few who want to |
731 | acl 'sh' | |
6c112aca | 732 | - markus@cvs.openbsd.org 2002/03/26 22:50:39 |
733 | [channels.h] | |
734 | CHANNEL_EFD_OUTPUT_ACTIVE is false for CHAN_CLOSE_RCVD, too | |
52103b10 | 735 | - markus@cvs.openbsd.org 2002/03/26 23:13:03 |
736 | [auth-rsa.c] | |
737 | disallow RSA keys < 768 for protocol 1, too (rhosts-rsa and rsa auth) | |
76bf34f1 | 738 | - markus@cvs.openbsd.org 2002/03/26 23:14:51 |
739 | [kex.c] | |
740 | generate a new cookie for each SSH2_MSG_KEXINIT message we send out | |
300e01c4 | 741 | - mouring@cvs.openbsd.org 2002/03/27 11:45:42 |
742 | [monitor.c] | |
743 | monitor_allowed_key() returns int instead of pointer. ok markus@ | |
744 | ||
eb4652f4 | 745 | 20020325 |
746 | - (stevesk) import OpenBSD <sys/tree.h> as "openbsd-compat/tree.h" | |
47c36e5b | 747 | - (bal) OpenBSD CVS Sync |
748 | - stevesk@cvs.openbsd.org 2002/03/23 20:57:26 | |
749 | [sshd.c] | |
750 | setproctitle() after preauth child; ok markus@ | |
d452ec1a | 751 | - markus@cvs.openbsd.org 2002/03/24 16:00:27 |
752 | [serverloop.c] | |
753 | remove unused debug | |
a49dfdec | 754 | - markus@cvs.openbsd.org 2002/03/24 16:01:13 |
755 | [packet.c] | |
756 | debug->debug3 for extra padding | |
5b0d7dc1 | 757 | - stevesk@cvs.openbsd.org 2002/03/24 17:27:03 |
758 | [kexgex.c] | |
759 | typo; ok markus@ | |
d4355079 | 760 | - stevesk@cvs.openbsd.org 2002/03/24 17:53:16 |
761 | [monitor_fdpass.c] | |
762 | minor cleanup and more error checking; ok markus@ | |
9fc0407d | 763 | - markus@cvs.openbsd.org 2002/03/24 18:05:29 |
764 | [scard.c] | |
765 | we need to figure out AUT0 for sc_private_encrypt, too | |
38c1c52a | 766 | - stevesk@cvs.openbsd.org 2002/03/24 23:20:00 |
767 | [monitor.c] | |
768 | remove "\n" from fatal() | |
159897f3 | 769 | - markus@cvs.openbsd.org 2002/03/25 09:21:13 |
770 | [auth-rsa.c] | |
771 | return 0 (not NULL); tomh@po.crl.go.jp | |
6f33c8cd | 772 | - markus@cvs.openbsd.org 2002/03/25 09:25:06 |
773 | [auth-rh-rsa.c] | |
774 | rm bogus comment | |
0659cace | 775 | - markus@cvs.openbsd.org 2002/03/25 17:34:27 |
776 | [scard.c scard.h ssh-agent.c ssh-keygen.c ssh.c] | |
777 | change sc_get_key to sc_get_keys and hide smartcard details in scard.c | |
3074b20c | 778 | - stevesk@cvs.openbsd.org 2002/03/25 20:12:10 |
779 | [monitor_mm.c monitor_wrap.c] | |
780 | ssize_t args use "%ld" and cast to (long) | |
781 | size_t args use "%lu" and cast to (u_long) | |
782 | ok markus@ and thanks millert@ | |
1c2deed1 | 783 | - markus@cvs.openbsd.org 2002/03/25 21:04:02 |
784 | [ssh.c] | |
785 | simplify num_identity_files handling | |
d2296ed7 | 786 | - markus@cvs.openbsd.org 2002/03/25 21:13:51 |
787 | [channels.c channels.h compat.c compat.h nchan.c] | |
fdff2c55 | 788 | don't send stderr data after EOF, accept this from older known |
789 | (broken) sshd servers only, fixes | |
790 | http://bugzilla.mindrot.org/show_bug.cgi?id=179 | |
8e4fd4a1 | 791 | - stevesk@cvs.openbsd.org 2002/03/26 03:24:01 |
792 | [monitor.h monitor_fdpass.h monitor_mm.h monitor_wrap.h] | |
793 | $OpenBSD$ | |
eb4652f4 | 794 | |
1178e8db | 795 | 20020324 |
796 | - (stevesk) [session.c] disable LOGIN_NEEDS_TERM until we are sure | |
797 | it can be removed. only used on solaris. will no longer compile with | |
798 | privsep shuffling. | |
799 | ||
6f34652e | 800 | 20020322 |
801 | - (stevesk) HAVE_ACCRIGHTS_IN_MSGHDR configure support | |
7b18c353 | 802 | - (stevesk) [monitor.c monitor_wrap.c] #ifdef HAVE_PW_CLASS_IN_PASSWD |
c921ee00 | 803 | - (stevesk) configure and cpp __FUNCTION__ gymnastics to handle nielsisms |
dc90b259 | 804 | - (stevesk) [monitor_fdpass.c] support for access rights style file |
805 | descriptor passing | |
f7ed12f1 | 806 | - (stevesk) [auth2.c] merge cleanup/sync |
cfadc43b | 807 | - (stevesk) [defines.h] hp-ux 11 has ancillary data style fd passing, but |
808 | is missing CMSG_LEN() and CMSG_SPACE() macros. | |
cc58061e | 809 | - (stevesk) [defines.h] #define MAP_ANON MAP_ANONYMOUS for HP-UX; other |
810 | platforms may need this--I'm not sure. mmap() issues will need to be | |
811 | addressed further. | |
05976246 | 812 | - (tim) [cipher.c] fix problem with OpenBSD sync |
9242fa1b | 813 | - (stevesk) [LICENCE] OpenBSD sync |
6f34652e | 814 | |
8627f3e0 | 815 | 20020321 |
816 | - (bal) OpenBSD CVS Sync | |
817 | - itojun@cvs.openbsd.org 2002/03/08 06:10:16 | |
818 | [sftp-client.c] | |
819 | printf type mismatch | |
bfa7f960 | 820 | - itojun@cvs.openbsd.org 2002/03/11 03:18:49 |
821 | [sftp-client.c] | |
822 | correct type mismatches (u_int64_t != unsigned long long) | |
5fc7dbc9 | 823 | - itojun@cvs.openbsd.org 2002/03/11 03:19:53 |
824 | [sftp-client.c] | |
825 | indent | |
150a5466 | 826 | - markus@cvs.openbsd.org 2002/03/14 15:24:27 |
827 | [sshconnect1.c] | |
fdff2c55 | 828 | don't trust size sent by (rogue) server; noted by |
829 | s.esser@e-matters.de | |
4f08e98d | 830 | - markus@cvs.openbsd.org 2002/03/14 16:38:26 |
831 | [sshd.c] | |
832 | split out ssh1 session key decryption; ok provos@ | |
46f1eece | 833 | - markus@cvs.openbsd.org 2002/03/14 16:56:33 |
834 | [auth-rh-rsa.c auth-rsa.c auth.h] | |
835 | split auth_rsa() for better readability and privsep; ok provos@ | |
c390a3c8 | 836 | - itojun@cvs.openbsd.org 2002/03/15 11:00:38 |
837 | [auth.c] | |
838 | fix file type checking (use S_ISREG). ok by markus | |
bcb68a8f | 839 | - markus@cvs.openbsd.org 2002/03/16 11:24:53 |
840 | [compress.c] | |
841 | skip inflateEnd if inflate fails; ok provos@ | |
3e65880e | 842 | - markus@cvs.openbsd.org 2002/03/16 17:22:09 |
843 | [auth-rh-rsa.c auth.h] | |
844 | split auth_rhosts_rsa(), ok provos@ | |
bb15f28b | 845 | - stevesk@cvs.openbsd.org 2002/03/16 17:41:25 |
846 | [auth-krb5.c] | |
847 | BSD license. from Daniel Kouril via Dug Song. ok markus@ | |
443fa1cd | 848 | - provos@cvs.openbsd.org 2002/03/17 20:25:56 |
849 | [auth.c auth.h auth1.c auth2.c] | |
fdff2c55 | 850 | getpwnamallow returns struct passwd * only if user valid; |
851 | okay markus@ | |
1b34c1b3 | 852 | - provos@cvs.openbsd.org 2002/03/18 01:12:14 |
853 | [auth.h auth1.c auth2.c sshd.c] | |
854 | have the authentication functions return the authentication context | |
855 | and then do_authenticated; okay millert@ | |
9d0844e3 | 856 | - dugsong@cvs.openbsd.org 2002/03/18 01:30:10 |
857 | [auth-krb4.c] | |
858 | set client to NULL after xfree(), from Rolf Braun | |
859 | <rbraun+ssh@andrew.cmu.edu> | |
1836f69f | 860 | - provos@cvs.openbsd.org 2002/03/18 03:41:08 |
861 | [auth.c session.c] | |
862 | move auth_approval into getpwnamallow with help from millert@ | |
bf8269a9 | 863 | - markus@cvs.openbsd.org 2002/03/18 17:13:15 |
864 | [cipher.c cipher.h] | |
865 | export/import cipher states; needed by ssh-privsep | |
e050d348 | 866 | - markus@cvs.openbsd.org 2002/03/18 17:16:38 |
867 | [packet.c packet.h] | |
868 | export/import cipher state, iv and ssh2 seqnr; needed by ssh-privsep | |
d0074658 | 869 | - markus@cvs.openbsd.org 2002/03/18 17:23:31 |
870 | [key.c key.h] | |
871 | add key_demote() for ssh-privsep | |
b625ad75 | 872 | - provos@cvs.openbsd.org 2002/03/18 17:25:29 |
873 | [bufaux.c bufaux.h] | |
874 | buffer_skip_string and extra sanity checking; needed by ssh-privsep | |
3d6fc2f8 | 875 | - provos@cvs.openbsd.org 2002/03/18 17:31:54 |
876 | [compress.c] | |
877 | export compression streams for ssh-privsep | |
1853d1ef | 878 | - provos@cvs.openbsd.org 2002/03/18 17:50:31 |
9759df31 | 879 | [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c] |
880 | [auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c] | |
881 | [kexgex.c servconf.c] | |
882 | [session.h servconf.h serverloop.c session.c sshd.c] | |
883 | integrate privilege separated openssh; its turned off by default | |
884 | for now. work done by me and markus@ | |
ce19ff48 | 885 | - provos@cvs.openbsd.org 2002/03/18 17:53:08 |
886 | [sshd.8] | |
887 | credits for privsep | |
70aa9ff4 | 888 | - provos@cvs.openbsd.org 2002/03/18 17:59:09 |
889 | [sshd.8] | |
890 | document UsePrivilegeSeparation | |
73fbf637 | 891 | - stevesk@cvs.openbsd.org 2002/03/18 23:52:51 |
892 | [servconf.c] | |
893 | UnprivUser/UnprivGroup usable now--specify numeric user/group; ok | |
894 | provos@ | |
1c352e97 | 895 | - stevesk@cvs.openbsd.org 2002/03/19 03:03:43 |
896 | [pathnames.h servconf.c servconf.h sshd.c] | |
897 | _PATH_PRIVSEP_CHROOT_DIR; ok provos@ | |
fffbaee2 | 898 | - stevesk@cvs.openbsd.org 2002/03/19 05:23:08 |
899 | [sshd.8] | |
900 | Banner has no default. | |
702b7dd8 | 901 | - mpech@cvs.openbsd.org 2002/03/19 06:32:56 |
902 | [sftp-int.c] | |
903 | use xfree() after xstrdup(). | |
904 | ||
905 | markus@ ok | |
51aeb639 | 906 | - markus@cvs.openbsd.org 2002/03/19 10:35:39 |
907 | [auth-options.c auth.h session.c session.h sshd.c] | |
908 | clean up prototypes | |
762715ce | 909 | - markus@cvs.openbsd.org 2002/03/19 10:49:35 |
9759df31 | 910 | [auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h] |
911 | [packet.c session.c sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c] | |
912 | [sshconnect2.c sshd.c ttymodes.c] | |
762715ce | 913 | KNF whitespace |
5f1f36b5 | 914 | - markus@cvs.openbsd.org 2002/03/19 14:27:39 |
915 | [auth.c auth1.c auth2.c] | |
916 | make getpwnamallow() allways call pwcopy() | |
06bea668 | 917 | - markus@cvs.openbsd.org 2002/03/19 15:31:47 |
918 | [auth.c] | |
919 | check for NULL; from provos@ | |
2ea6de2b | 920 | - stevesk@cvs.openbsd.org 2002/03/20 19:12:25 |
921 | [servconf.c servconf.h ssh.h sshd.c] | |
922 | for unprivileged user, group do: | |
923 | pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@ | |
256debd0 | 924 | - stevesk@cvs.openbsd.org 2002/03/20 21:08:08 |
925 | [sshd.c] | |
926 | strerror() on chdir() fail; ok provos@ | |
edfb66cb | 927 | - markus@cvs.openbsd.org 2002/03/21 10:21:20 |
928 | [ssh-add.c] | |
929 | ignore errors for nonexisting default keys in ssh-add, | |
930 | fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158 | |
c53c54c2 | 931 | - jakob@cvs.openbsd.org 2002/03/21 15:17:26 |
932 | [clientloop.c ssh.1] | |
933 | add built-in command line for adding new port forwardings on the fly. | |
934 | based on a patch from brian wellington. ok markus@. | |
7649bbfe | 935 | - markus@cvs.openbsd.org 2002/03/21 16:38:06 |
936 | [scard.c] | |
937 | make compile w/ openssl 0.9.7 | |
b9f62352 | 938 | - markus@cvs.openbsd.org 2002/03/21 16:54:53 |
939 | [scard.c scard.h ssh-keygen.c] | |
940 | move key upload to scard.[ch] | |
941 | - markus@cvs.openbsd.org 2002/03/21 16:57:15 | |
942 | [scard.c] | |
943 | remove const | |
39ac8430 | 944 | - markus@cvs.openbsd.org 2002/03/21 16:58:13 |
945 | [clientloop.c] | |
946 | remove unused | |
514b94dc | 947 | - rees@cvs.openbsd.org 2002/03/21 18:08:15 |
948 | [scard.c] | |
949 | In sc_put_key(), sc_reader_id should be id. | |
ce1ba33a | 950 | - markus@cvs.openbsd.org 2002/03/21 20:51:12 |
951 | [sshd_config] | |
952 | add privsep (off) | |
324bf712 | 953 | - markus@cvs.openbsd.org 2002/03/21 21:23:34 |
954 | [sshd.c] | |
955 | add privsep_preauth() and remove 1 goto; ok provos@ | |
86c4f63d | 956 | - rees@cvs.openbsd.org 2002/03/21 21:54:34 |
957 | [scard.c scard.h ssh-keygen.c] | |
958 | Add PIN-protection for secret key. | |
76139bd8 | 959 | - rees@cvs.openbsd.org 2002/03/21 22:44:05 |
960 | [authfd.c authfd.h ssh-add.c ssh-agent.c ssh.c] | |
961 | Add PIN-protection for secret key. | |
ec9b7086 | 962 | - markus@cvs.openbsd.org 2002/03/21 23:07:37 |
963 | [clientloop.c] | |
964 | remove unused, sync w/ cmdline patch in my tree. | |
ce1ba33a | 965 | |
81dadca3 | 966 | 20020317 |
fdff2c55 | 967 | - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is |
968 | wanted, warn if directory does not exist. Put system directories in | |
969 | front of PATH for finding entorpy commands. | |
43e41c2c | 970 | - (tim) [contrib/aix/buildbff.sh contrib/aix/inventory.sh] AIX package |
971 | build fixes. Patch by Darren Tucker <dtucker@zip.com.au> | |
972 | [contrib/solaris/buildpkg.sh] add missing dirs to SYSTEM_DIR. Have | |
973 | postinstall check for $piddir and add if necessary. | |
81dadca3 | 974 | |
e4abf75b | 975 | 20020311 |
976 | - (tim) [contrib/solaris/buildpkg.sh, contrib/solaris/README] Updated to | |
977 | build on all platforms that support SVR4 style package tools. Now runs | |
978 | from build dir. Parts are based on patches from Antonio Navarro, and | |
979 | Darren Tucker. | |
980 | ||
fb8f3dc9 | 981 | 20020308 |
a068d86f | 982 | - (djm) Revert bits of Markus' OpenSSL compat patch which was |
983 | accidentally committed. | |
984 | - (djm) Add Markus' patch for compat wih OpenSSL < 0.9.6. | |
985 | Known issue: Blowfish for SSH1 does not work | |
dc254471 | 986 | - (stevesk) entropy.c: typo in debug message |
633151a3 | 987 | - (djm) ssh-keygen -i needs seeded RNG; report from markus@ |
fb8f3dc9 | 988 | |
0b202697 | 989 | $Id$ |