]> andersk Git - openssh.git/blame - ChangeLog
- (bal) [auth-passwd.c openbsd-compat/Makefile.in openbsd-compat/xcrypt.c
[openssh.git] / ChangeLog
CommitLineData
7c6eb32f 120030724
2 - (bal) [auth-passwd.c openbsd-compat/Makefile.in openbsd-compat/xcrypt.c
3 openbsd-compat/xcrypt.h] Split off encryption into xcrypt() interface,
4 and isolate shadow password functions. Tested in Solaris, but should
5 not break other platforms too badly (except maybe HP =). Also brings
6 auth-passwd.c into full sync with OpenBSD tree.
7
82e5907c 820030723
9 - (dtucker) [configure.ac] Back out change for bug #620.
10
defb525d 1120030719
12 - (dtucker) [configure.ac] Bug #620: Define BROKEN_GETADDRINFO for
13 Solaris/x86. Patch from jrhett at isite.net.
7b390973 14 - (dtucker) OpenBSD CVS Sync
15 - markus@cvs.openbsd.org 2003/07/14 12:36:37
16 [sshd.c]
17 remove undocumented -V option. would be only useful if openssh is used
18 as ssh v1 server for ssh.com's ssh v2.
e053cd2c 19 - markus@cvs.openbsd.org 2003/07/16 10:34:53
20 [ssh.c sshd.c]
21 don't exit on multiple -v or -d; ok deraadt@
145d23ca 22 - markus@cvs.openbsd.org 2003/07/16 10:36:28
23 [sshtty.c]
24 clear IUCLC in enter_raw_mode; from rob@pitman.co.za; ok deraadt@, fgs@
261bd618 25 - deraadt@cvs.openbsd.org 2003/07/18 01:54:25
26 [scp.c]
27 userid is unsigned, but well, force it anyways; andrushock@korovino.net
b3d04e37 28 - djm@cvs.openbsd.org 2003/07/19 00:45:53
29 [sftp-int.c]
30 fix sftp filename parsing for arguments with escaped quotes. bz #517;
31 ok markus
86d0260c 32 - djm@cvs.openbsd.org 2003/07/19 00:46:31
33 [regress/sftp-cmds.sh]
34 regress test for sftp arguments with escaped quotes; ok markus
defb525d 35
e351e493 3620030714
37 - (dtucker) [acconfig.h configure.ac port-aix.c] Older AIXes don't declare
38 loginfailed at all, so assume 3-arg loginfailed if not declared.
1cd5765d 39 - (dtucker) [port-aix.h] Work around name collision on AIX for r_type by
40 undef'ing it.
2aa3a16c 41 - (dtucker) Bug #543: [configure.ac port-aix.c port-aix.h]
42 Call setauthdb() before loginfailed(), which may load password registry-
defb525d 43 specific functions. Based on patch by cawlfiel at us.ibm.com.
b4777c18 44 - (dtucker) [port-aix.h] Fix prototypes.
956b0f56 45 - (dtucker) OpenBSD CVS Sync
46 - avsm@cvs.openbsd.org 2003/07/09 13:58:19
47 [key.c]
48 minor tweak: when generating the hex fingerprint, give strlcat the full
49 bound to the buffer, and add a comment below explaining why the
50 zero-termination is one less than the bound. markus@ ok
40729edd 51 - markus@cvs.openbsd.org 2003/07/10 14:42:28
52 [packet.c]
53 the 2^(blocksize*2) rekeying limit is too expensive for 3DES,
54 blowfish, etc, so enforce a 1GB limit for small blocksizes.
659912db 55 - markus@cvs.openbsd.org 2003/07/10 20:05:55
56 [sftp.c]
57 sync usage with manpage, add missing -R
e351e493 58
f58c0e01 5920030708
60 - (dtucker) [acconfig.h auth-passwd.c configure.ac session.c port-aix.[ch]]
61 Include AIX headers for authentication functions and make calls match
e351e493 62 prototypes. Test for and handle 3-arg and 4-arg variants of loginfailed.
bc7dfc06 63 - (dtucker) [session.c] Check return value of setpcred().
64 - (dtucker) [auth-passwd.c auth.c session.c sshd.c port-aix.c port-aix.h]
65 Convert aixloginmsg into platform-independant Buffer loginmsg.
f58c0e01 66
309709db 6720030707
68 - (dtucker) [configure.ac] Bug #600: Check that getrusage is declared before
69 searching libraries for it. Fixes build errors on NCR MP-RAS.
70
d72f7b79 7120030706
72 - (dtucker) [ssh-rand-helper.c loginrec.c]
73 Apply atomicio typing change to these too.
74
71b9ced0 7520030703
76 - (dtucker) OpenBSD CVS Sync
77 - djm@cvs.openbsd.org 2003/06/28 07:48:10
78 [sshd.c]
79 report pidfile creation errors, based on patch from Roumen Petrov;
80 ok markus@
dc54438a 81 - deraadt@cvs.openbsd.org 2003/06/28 16:23:06
82 [atomicio.c atomicio.h authfd.c clientloop.c monitor_wrap.c msg.c
83 progressmeter.c scp.c sftp-client.c ssh-keyscan.c ssh.h sshconnect.c
84 sshd.c]
85 deal with typing of write vs read in atomicio
7caca6d4 86 - markus@cvs.openbsd.org 2003/06/29 12:44:38
87 [sshconnect.c]
88 memset 0, not \0; andrushock@korovino.net
8e7c9afc 89 - markus@cvs.openbsd.org 2003/07/02 12:56:34
90 [channels.c]
91 deny dynamic forwarding with -R for v1, too; ok djm@
f49658f5 92 - markus@cvs.openbsd.org 2003/07/02 14:51:16
93 [channels.c ssh.1 ssh_config.5]
94 (re)add socks5 suppport to -D; ok djm@
95 now ssh(1) can act both as a socks 4 and socks 5 server and
96 dynamically forward ports.
03c82656 97 - markus@cvs.openbsd.org 2003/07/02 20:37:48
98 [ssh.c]
99 convert hostkeyalias to lowercase, otherwise uppercase aliases will
100 not match at all; ok henning@
1768a611 101 - markus@cvs.openbsd.org 2003/07/03 08:21:46
102 [regress/dynamic-forward.sh]
103 add socks5; speedup; reformat; based on patch from dtucker@zip.com.au
7664edb6 104 - markus@cvs.openbsd.org 2003/07/03 08:24:13
105 [regress/Makefile]
106 enable tests for dynamic fwd via socks (-D), uses nc(1)
1572b90f 107 - djm@cvs.openbsd.org 2003/07/03 08:09:06
108 [readconf.c readconf.h ssh-keysign.c ssh.c]
109 fix AddressFamily option in config file, from brent@graveland.net;
110 ok markus@
71b9ced0 111
4e00038c 11220030630
113 - (djm) Search for support functions necessary to build our
114 getrrsetbyname() replacement. Patch from Roumen Petrov
115
9f59c5a3 11620030629
c5829391 117 - (dtucker) [includes.h] Bug #602: move #include of netdb.h to after in.h
118 (fixes compiler warnings on Solaris 2.5.1).
119 - (dtucker) [configure.ac] Add sanity test after system-dependant compiler
120 flag modifications.
9f59c5a3 121
9ea150a7 12220030628
123 - (djm) Bug #591: use PKCS#15 private key label as a comment in case
124 of OpenSC. Report and patch from larsch@trustcenter.de
d2168412 125 - (djm) Bug #593: Sanity check OpenSC card reader number; patch from
126 aj@dungeon.inka.de
f0677b69 127 - (dtucker) OpenBSD CVS Sync
128 - markus@cvs.openbsd.org 2003/06/23 09:02:44
129 [ssh_config.5]
130 document EnableSSHKeysign; bugzilla #599; ok deraadt@, jmc@
a27002e5 131 - markus@cvs.openbsd.org 2003/06/24 08:23:46
132 [auth2-hostbased.c auth2-pubkey.c auth2.c channels.c key.c key.h
133 monitor.c packet.c packet.h serverloop.c sshconnect2.c sshd.c]
134 int -> u_int; ok djm@, deraadt@, mouring@
d7ded285 135 - miod@cvs.openbsd.org 2003/06/25 22:39:36
136 [sftp-server.c]
137 Typo police: attribute is better written with an 'r'.
2d9c1828 138 - markus@cvs.openbsd.org 2003/06/26 20:08:33
139 [readconf.c]
140 do not dump core for 'ssh -o proxycommand host'; ok deraadt@
78b2dd04 141 - (dtucker) [regress/dynamic-forward.sh] Import new regression test.
ddb154b3 142 - (dtucker) [configure.ac] Bug #570: Have ./configure --enable-FEATURE
143 actually enable the feature, for those normally disabled. Patch by
144 openssh (at) roumenpetrov.info.
f0677b69 145
e15ba28b 14620030624
147 - (dtucker) Have configure refer the user to config.log and
148 contrib/findssl.sh for OpenSSL header/library mismatches.
149
63a556df 15020030622
c1ffd4bd 151 - (dtucker) OpenBSD CVS Sync
63a556df 152 - markus@cvs.openbsd.org 2003/06/21 09:14:05
c1ffd4bd 153 [regress/reconfigure.sh]
63a556df 154 missing $SUDO; from dtucker@zip.com.au
93527718 155 - markus@cvs.openbsd.org 2003/06/18 11:28:11
c1ffd4bd 156 [ssh-rsa.c]
157 backout last change, since it violates pkcs#1
158 switch to share/misc/license.template
1891396b 159 - djm@cvs.openbsd.org 2003/06/20 05:47:58
160 [sshd_config.5]
161 sync description of protocol 2 cipher proposal; ok markus
4db4d313 162 - djm@cvs.openbsd.org 2003/06/20 05:48:21
163 [sshd_config]
164 sync some implemented options; ok markus@
63a556df 165 - (dtucker) [regress/authorized_keys_root] Remove temp data file from CVS.
39ef3618 166 - (dtucker) [openbsd-compat/setproctitle.c] Ensure SPT_TYPE is defined before
167 testing its value.
63a556df 168
b8e04133 16920030618
170 - (djm) OpenBSD CVS Sync
171 - markus@cvs.openbsd.org 2003/06/12 07:57:38
172 [monitor.c sshlogin.c sshpty.c]
173 typos; dtucker at zip.com.au
b9ad9d13 174 - djm@cvs.openbsd.org 2003/06/12 12:22:47
175 [LICENCE]
176 mention more copyright holders; ok markus@
1fb23629 177 - nino@cvs.openbsd.org 2003/06/12 15:34:09
178 [scp.c]
179 Typo. Ok markus@.
244e796f 180 - markus@cvs.openbsd.org 2003/06/12 19:12:03
181 [scard.c scard.h ssh-agent.c ssh.c]
182 add sc_get_key_label; larsch at trustcenter.de; bugzilla#591
9250058a 183 - markus@cvs.openbsd.org 2003/06/16 08:22:35
184 [ssh-rsa.c]
185 make sure the signature has at least the expected length (don't
186 insist on len == hlen + oidlen, since this breaks some smartcards)
187 bugzilla #592; ok djm@
360a4aae 188 - markus@cvs.openbsd.org 2003/06/16 10:22:45
189 [ssh-add.c]
190 print out key comment on each prompt; make ssh-askpass more useable; ok djm@
0a59bd6b 191 - markus@cvs.openbsd.org 2003/06/17 18:14:23
192 [cipher-ctr.c]
193 use license from /usr/share/misc/license.template for new code
1d6c0b69 194 - (dtucker) [reconfigure.sh rekey.sh sftp-badcmds.sh]
195 Import new regression tests from OpenBSD
d4d84f5f 196 - (dtucker) [regress/copy.1 regress/copy.2] Remove temp data files from CVS.
ed49cc81 197 - (dtucker) OpenBSD CVS Sync (regress/)
198 - markus@cvs.openbsd.org 2003/04/02 12:21:13
199 [Makefile]
200 enable rekey test
2c670155 201 - djm@cvs.openbsd.org 2003/04/04 09:34:22
202 [Makefile sftp-cmds.sh]
203 More regression tests, including recent directory rename bug; ok markus@
737447ad 204 - markus@cvs.openbsd.org 2003/05/14 22:08:27
205 [ssh-com-client.sh ssh-com-keygen.sh ssh-com-sftp.sh ssh-com.sh]
206 test against some new commerical versions
68df2aa0 207 - mouring@cvs.openbsd.org 2003/05/15 04:07:12
208 [sftp-cmds.sh]
209 Advanced put/get testing for sftp. OK @djm
eb9bf761 210 - markus@cvs.openbsd.org 2003/06/12 15:40:01
211 [try-ciphers.sh]
212 add ctr
39c0191e 213 - markus@cvs.openbsd.org 2003/06/12 15:43:32
214 [Makefile]
215 test -HUP; dtucker at zip.com.au
b8e04133 216
f5827134 21720030614
218 - (djm) Update license on fake-rfc2553.[ch]; ok itojun@
219
be193d89 22020030611
c12c6ef8 221 - (djm) Mention portable copyright holders in LICENSE
e52ca1e5 222 - (djm) Put licenses on substantial header files
8cb3fa9d 223 - (djm) Sync LICENSE against OpenBSD
be193d89 224 - (djm) OpenBSD CVS Sync
225 - jmc@cvs.openbsd.org 2003/06/10 09:12:11
226 [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5]
227 [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
228 - section reorder
229 - COMPATIBILITY merge
230 - macro cleanup
231 - kill whitespace at EOL
232 - new sentence, new line
233 ssh pages ok markus@
0daa6547 234 - deraadt@cvs.openbsd.org 2003/06/10 22:20:52
235 [packet.c progressmeter.c]
236 mostly ansi cleanup; pval ok
1432b5c4 237 - jakob@cvs.openbsd.org 2003/06/11 10:16:16
238 [sshconnect.c]
239 clean up check_host_key() and improve SSHFP feedback. ok markus@
cc263107 240 - jakob@cvs.openbsd.org 2003/06/11 10:18:47
241 [dns.c]
242 sync with check_host_key() change
ca719034 243 - djm@cvs.openbsd.org 2003/06/11 11:18:38
244 [authfd.c authfd.h ssh-add.c ssh-agent.c]
245 make agent constraints (lifetime, confirm) work with smartcard keys;
246 ok markus@
be193d89 247
248
8a547250 24920030609
250 - (djm) Sync README.smartcard with OpenBSD -current
a1864983 251 - (djm) Re-merge OpenSC info into README.smartcard
8a547250 252
f5db6a03 25320030606
254 - (dtucker) [uidswap.c] Fix setreuid and add missing args to fatal(). ok djm@
255
02e2a074 25620030605
257 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
258 canohost.c changes.
688eed4a 259 - (djm) Implement paranoid priv dropping checks, based on:
260 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
261 Proceedings of USENIX Security Symposium 2002
d6bd2b5a 262 - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
52d58495 263 - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
57c917f8 264 - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
265 Patch from larsch@trustcenter.de
7b7f164b 266 - (djm) Bug #589 - scard-opensc: load only keys with a private keys
267 Patch from larsch@trustcenter.de
4ed465ec 268 - (dtucker) Add includes.h to fake-rfc2553.c so it will build.
e932f447 269 - (dtucker) Define EAI_NONAME in fake-rfc2553.h (used by fake-rfc2553.c).
02e2a074 270
b08a39ff 27120030604
d60e487c 272 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
273 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
8acdec60 274 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
11f1e60e 275 Patch from larsch@trustcenter.de; ok markus@
276 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
277 larsch@trustcenter.de; ok markus@
d453a600 278 - (djm) OpenBSD CVS Sync
279 - djm@cvs.openbsd.org 2003/06/04 08:25:18
280 [sshconnect.c]
281 disable challenge/response and keyboard-interactive auth methods
282 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
283 bz #580; ok markus@
ee50371d 284 - djm@cvs.openbsd.org 2003/06/04 10:23:48
285 [sshd.c]
286 remove duplicated group-dropping code; ok markus@
b08a39ff 287 - djm@cvs.openbsd.org 2003/06/04 12:03:59
288 [serverloop.c]
289 remove bitrotten commet; ok markus@
cf3248b8 290 - djm@cvs.openbsd.org 2003/06/04 12:18:49
291 [scp.c]
292 ansify; ok markus@
0f764b2f 293 - djm@cvs.openbsd.org 2003/06/04 12:40:39
294 [scp.c]
295 kill ssh process upon receipt of signal, bz #241.
296 based on patch from esb AT hawaii.edu; ok markus@
1b558925 297 - djm@cvs.openbsd.org 2003/06/04 12:41:22
298 [sftp.c]
299 kill ssh process on receipt of signal; ok markus@
fba33e81 300 - (djm) Update to fix of bug #584: lock card before return.
301 From larsch@trustcenter.de
8d9bb5dd 302 - (djm) Always use mysignal() for SIGALRM
d60e487c 303
3a2b2b44 30420030603
305 - (djm) Replace setproctitle replacement with code derived from
306 UCB sendmail
c5a7d788 307 - (djm) OpenBSD CVS Sync
308 - markus@cvs.openbsd.org 2003/06/02 09:17:34
309 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
310 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
311 [sshd_config.5]
312 deprecate VerifyReverseMapping since it's dangerous if combined
313 with IP based access control as noted by Mike Harding; replace with
314 a UseDNS option, UseDNS is on by default and includes the
315 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
316 ok deraadt@, djm@
d981089c 317 - millert@cvs.openbsd.org 2003/06/03 02:56:16
318 [scp.c]
319 Remove the advertising clause in the UCB license which Berkeley
320 rescinded 22 July 1999. Proofed by myself and Theo.
c5a7d788 321 - (djm) Fix portable-specific uses of verify_reverse_mapping too
3e67f7df 322 - (djm) Sync openbsd-compat with OpenBSD CVS.
484d59c7 323 - No more 4-term BSD licenses in linked code
5d8ca8c7 324 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
3a2b2b44 325
aff561f9 32620030602
327 - (djm) Fix segv from bad reordering in auth-pam.c
416c732d 328 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
329 clobber
1b7342ab 330 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
331 CVS ID.
8862e142 332 - (djm) Remove "noip6" option from RedHat spec file. This may now be
333 set at runtime using AddressFamily option.
58ba3cb7 334 - (djm) Fix use of macro before #define in cipher-aes.c
382fe2fa 335 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
b0545fe6 336 - (djm) OpenBSD CVS Sync
337 - djm@cvs.openbsd.org 2003/05/26 12:54:40
338 [sshconnect.c]
339 fix format strings; ok markus@
fa5120a0 340 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
341 [sshd.c uidswap.c]
342 seteuid and setegid; markus ok
0f92946c 343 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
344 [ssh_config.5]
345 VerifyHostKeyDNS is v2 only. ok markus@
aff561f9 346
4f178be8 34720030530
348 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
349 roumenpetrov.info
eabb99c6 350 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
4f178be8 351
4881aebb 35220030526
353 - (djm) Avoid auth2-chall.c warning when compiling without
354 PAM, BSD_AUTH and SKEY
355
5b0fe364 35620030525
357- (djm) OpenBSD CVS Sync
358 - djm@cvs.openbsd.org 2003/05/24 09:02:22
359 [log.c]
360 pass logged data through strnvis; ok markus
b9ed513a 361 - djm@cvs.openbsd.org 2003/05/24 09:30:40
362 [authfile.c monitor.c sftp-common.c sshpty.c]
363 cast some types for printing; ok markus@
5b0fe364 364
44c78996 36520030524
366 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
367
d83ebe4a 36820030523
369 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
370 encoding (which encodes many more characters)
bd47824b 371 - OpenBSD CVS Sync
372 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
373 [sftp.1]
374 - new sentence, new line
375 - added .Xr's
376 - typos
377 ok djm@
3cbc677d 378 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
379 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
380 new sentence, new line
da54f5be 381 - djm@cvs.openbsd.org 2003/05/23 08:29:30
382 [sshconnect.c]
383 fix leak; ok markus@
d83ebe4a 384
c453493f 38520030520
386 - (djm) OpenBSD CVS Sync
387 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
388 [log.c]
389 use syslog_r() in a signal handler called place; markus ok
79d4fc55 390 - (djm) Configure logic to detect syslog_r and friends
c453493f 391
acb50584 39220030519
393 - (djm) Sync auth-pam.h with what we actually implement
394
39520030518
5ff453c0 396 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
397 recent merge
f811e52a 398 - (djm) OpenBSD CVS Sync
399 - djm@cvs.openbsd.org 2003/05/16 03:27:12
400 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
401 add AddressFamily option to ssh_config (like -4, -6 on commandline).
402 Portable bug #534; ok markus@
013b1214 403 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
404 [auth-rhosts.c]
405 just in case, put numbers to sscanf %s arg.
25b66522 406 - markus@cvs.openbsd.org 2003/05/17 04:27:52
407 [cipher.c cipher-ctr.c myproposal.h]
408 experimental support for aes-ctr modes from
409 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
410 ok djm@
25351757 411 - (djm) Remove IPv4 by default hack now that we can specify AF in config
3bf784bc 412 - (djm) Tidy and trim TODO
bffa6723 413 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
9901cb37 414 - (djm) Big KNF on openbsd-compat/
f1da2b8b 415 - (djm) KNF on md5crypt.[ch]
416 - (djm) KNF on auth-sia.[ch]
5ff453c0 417
f123055b 41820030517
419 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
420
c936c243 42120030516
422 - (djm) OpenBSD CVS Sync
423 - djm@cvs.openbsd.org 2003/05/15 13:52:10
424 [ssh.c]
425 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
426 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
a2144546 427 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
428 [readconf.c servconf.c]
429 warn for unsupported config option. ok markus@
5bdfde81 430 - markus@cvs.openbsd.org 2003/05/15 14:09:21
431 [auth2-krb5.c]
432 fix 64bit issue; report itojun@
09ab3296 433 - djm@cvs.openbsd.org 2003/05/15 14:55:25
434 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
435 add a ConnectTimeout option to ssh, based on patch from
436 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
b06b11ad 437 - (djm) Add warning for UsePAM when built without PAM support
7be625e1 438 - (djm) A few type mismatch fixes from Bug #565
0eb6370a 439 - (djm) Guard free_pam_environment against NULL argument. Works around
440 HP/UX PAM problems debugged by dtucker
c936c243 441
7efc7f57 44220030515
443 - (djm) OpenBSD CVS Sync
444 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
445 [ssh-agent.1]
446 setup -> set up;
447 from wiz@netbsd
21289cd0 448 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
449 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
450 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
451 add experimental support for verifying hos keys using DNS as described
452 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
453 ok markus@ and henning@
16a79097 454 - markus@cvs.openbsd.org 2003/05/14 22:24:42
455 [clientloop.c session.c ssh.1]
456 allow to send a BREAK to the remote system; ok various
b8c2031b 457 - markus@cvs.openbsd.org 2003/05/15 00:28:28
458 [sshconnect2.c]
459 cleanup unregister of per-method packet handlers; ok djm@
d0ec7f42 460 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
461 [readconf.c readconf.h servconf.c servconf.h]
462 always parse kerberos options. ok djm@ markus@
b414a17b 463 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
464 [dns.c]
465 add missing freerrset
3b6e3da9 466 - markus@cvs.openbsd.org 2003/05/15 03:08:29
467 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
468 split out custom EVP ciphers
02159d9b 469 - djm@cvs.openbsd.org 2003/05/15 03:10:52
470 [ssh-keygen.c]
471 avoid warning; ok jakob@
4a26f5c5 472 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
473 [sftp-int.c]
474 Make put/get (globed and nonglobed) code more consistant. OK djm@
c44f10c6 475 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
dc69f53c 476 [sftp-int.c sftp.c]
c44f10c6 477 Teach ls how to display multiple column display and allow users
478 to return to single column format via 'ls -1'. OK @djm
1457e7ff 479 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
480 [readconf.c servconf.c]
481 disable kerberos when not supported. ok markus@
861f0365 482 - markus@cvs.openbsd.org 2003/05/15 04:08:41
483 [ssh.1]
484 ~B is ssh2 only
d0ec7f42 485 - (djm) Always parse UsePAM
3e05e934 486 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
4460d509 487 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
86ee6794 488 - (djm) Tidy Makefile clean targets
2636769c 489 - (djm) Adapt README.dns for portable
2d2e4a34 490 - (djm) Avoid uuencode.c warnings
1457e7ff 491 - (djm) Enable UsePAM when built --with-pam
67467c30 492 - (djm) Only build getrrsetbyname replacement when using --with-dns
f420d2ba 493 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
494 correctly)
3c49ef10 495 - (djm) Bug #444: Wrong paths after reconfigure
321735c7 496 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
f420d2ba 497
dd3ebb5a 49820030514
499 - (djm) Bug #117: Don't lie to PAM about username
0608f8a7 500 - (djm) RCSID sync w/ OpenBSD
204fde99 501 - (djm) OpenBSD CVS Sync
502 - djm@cvs.openbsd.org 2003/04/09 12:00:37
503 [readconf.c]
504 strip trailing whitespace from config lines before parsing.
505 Fixes bz 528; ok markus@
18ae3c67 506 - markus@cvs.openbsd.org 2003/04/12 10:13:57
507 [cipher.c]
508 hide cipher details; ok djm@
45c42d58 509 - markus@cvs.openbsd.org 2003/04/12 10:15:36
510 [misc.c]
511 debug->debug2
c825cd79 512 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
513 [ssh.1]
514 document -V switch, fix wording; ok markus@
3e131a6d 515 - markus@cvs.openbsd.org 2003/04/14 14:17:50
516 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
517 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
927e9f8b 518 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
519 [sftp-int.c]
520 Missing globfree(&g) in process_put() spotted by Vince Brimhall
521 <VBrimhall@novell.com>. ok@ Theo
522 - markus@cvs.openbsd.org 2003/04/16 14:35:27
523 [auth.h]
524 document struct Authctxt; with solar
b9e5aff6 525 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
526 [ssh-keyscan.c]
527 -t in usage(); rogier@quaak.org
9a26a6e2 528 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
529 [sshd.8 sshd_config.5]
530 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
531 Bug #550 and * escaping suggested by jmc@.
09dc8896 532 - david@cvs.openbsd.org 2003/04/30 20:41:07
533 [sshd.8]
534 fix invalid .Pf macro usage introduced in previous commit
535 ok jmc@ mouring@
3566c73c 536 - markus@cvs.openbsd.org 2003/05/11 16:56:48
537 [authfile.c ssh-keygen.c]
538 change key_load_public to try to read a public from:
539 rsa1 private or rsa1 public and ssh2 keys.
540 this makes ssh-keygen -e fail for ssh1 keys more gracefully
541 for example; report from itojun (netbsd pr 20550).
0d942eff 542 - markus@cvs.openbsd.org 2003/05/11 20:30:25
543 [channels.c clientloop.c serverloop.c session.c ssh.c]
544 make channel_new() strdup the 'remote_name' (not the caller); ok theo
43348518 545 - markus@cvs.openbsd.org 2003/05/12 16:55:37
546 [sshconnect2.c]
547 for pubkey authentication try the user keys in the following order:
548 1. agent keys that are found in the config file
549 2. other agent keys
550 3. keys that are only listed in the config file
551 this helps when an agent has many keys, where the server might
552 close the connection before the correct key is used. report & ok pb@
dc109cfe 553 - markus@cvs.openbsd.org 2003/05/12 18:35:18
554 [ssh-keyscan.1]
555 typo: DSA keys are of type ssh-dss; Brian Poole
81466908 556 - markus@cvs.openbsd.org 2003/05/14 00:52:59
557 [ssh2.h]
558 ranges for per auth method messages
559 - djm@cvs.openbsd.org 2003/05/14 01:00:44
560 [sftp.1]
561 emphasise the batchmode functionality and make reference to pubkey auth,
562 both of which are FAQs; ok markus@
802e01b8 563 - markus@cvs.openbsd.org 2003/05/14 02:15:47
564 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
565 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
566 server interops with commercial client; ok jakob@ djm@
72c5fe79 567 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
568 [sftp.1]
569 - better formatting in SYNOPSIS
570 - whitespace at EOL
571 ok djm@
3a39206f 572 - markus@cvs.openbsd.org 2003/05/14 08:57:49
573 [monitor.c]
574 http://bugzilla.mindrot.org/show_bug.cgi?id=560
575 Privsep child continues to run after monitor killed.
576 Pass monitor signals through to child; Darren Tucker
751092f9 577 - (djm) Make portable build with MIT krb5 (some issues remain)
7fceb20d 578 - (djm) Add new UsePAM configuration directive to allow runtime control
579 over usage of PAM. This allows non-root use of sshd when built with
580 --with-pam
817e6d38 581 - (djm) Die screaming if start_pam() is called when UsePAM=no
83ccf11a 582 - (djm) Avoid KrbV leak for MIT Kerberos
b1848832 583 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
fa065de2 584 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
dd3ebb5a 585
91f3aa9b 58620030512
587 - (djm) Redhat spec: Don't install profile.d scripts when not
588 building with GNOME/GTK askpass (patch from bet@rahul.net)
589
5def520a 59020030510
591 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
592 "make install". Patch by roth@feep.net.
ad84c479 593 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
594 problem on Linux (fixes "could not set controlling tty" errors).
05114c74 595 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
596 proper challenge-response module
23ab1f36 597 - (djm) 2-clause license on loginrec.c, with permission from
598 andre@ae-35.com
5def520a 599
43ce025d 60020030504
dd594f99 601 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
602 Patch from vinschen@redhat.com.
43ce025d 603
2cd5dbba 60420030503
605 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
606 by wendyp@cray.com.
607
bf7c1e6c 60820030502
609 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
610 privsep should now work.
73d9dad3 611 - (dtucker) Move handling of bad password authentications into a platform
990278ef 612 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
bf7c1e6c 613
68ece370 61420030429
615 - (djm) Add back radix.o (used by AFS support), after it went missing from
616 Makefile many moons ago
617 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
618 - (djm) Fix blibpath specification for AIX/gcc
619 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
620
ded9dd18 62120030428
622 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
623 hacked code.
624
aceb0423 62520030427
626 - (bal) Bug #541: return; was dropped by mistake. Reported by
627 furrier@iglou.com
c8a50a34 628 - (bal) Since we don't support platforms lacking u_int_64. We may
629 as well clean out some of those evil #ifdefs
9a6fee8b 630 - (bal) auth1.c minor resync while looking at the code.
d7cf277b 631 - (bal) auth2.c same changed as above.
aceb0423 632
0a626302 63320030409
634 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
635 from matth@eecs.berkeley.edu
d35929b5 636 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
ffd7b36b 637 - (djm) OpenBSD CVS Sync
638 - markus@cvs.openbsd.org 2003/04/02 09:48:07
639 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
640 [readconf.h serverloop.c sshconnect2.c]
641 reapply rekeying chage, tested by henning@, ok djm@
16f1b5ca 642 - markus@cvs.openbsd.org 2003/04/02 14:36:26
643 [ssh-keysign.c]
644 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
6c1bc5c5 645 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
646 [progressmeter.c]
647 $OpenBSD$
648 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
649 [progressmeter.c]
650 remove $OpenBSD$, as other *.c does not have it.
806e4c11 651 - markus@cvs.openbsd.org 2003/04/07 08:29:57
652 [monitor_wrap.c]
653 typo: get correct counters; introduced during rekeying change.
2f5b2528 654 - millert@cvs.openbsd.org 2003/04/07 21:58:05
655 [progressmeter.c]
656 The UCB copyright here is incorrect. This code did not originate
657 at UCB, it was written by Luke Mewburn. Updated the copyright at
658 the author's request. markus@ OK
659 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
660 [*.c *.h]
661 rename log() into logit() to avoid name conflict. markus ok, from
662 netbsd
663 - (djm) XXX - Performed locally using:
664 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
70e1f62f 665 - hin@cvs.openbsd.org 2003/04/09 08:23:52
666 [servconf.c]
667 Don't include <krb.h> when compiling with Kerberos 5 support
2f5b2528 668 - (djm) Fix up missing include for packet.c
a3568201 669 - (djm) Fix missed log => logit occurance (reference by function pointer)
0a626302 670
4d0cb2e5 67120030402
672 - (bal) if IP_TOS is not found or broken don't try to compile in
673 packet_set_tos() function call. bug #527
674
a4e5acef 67520030401
676 - (djm) OpenBSD CVS Sync
677 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
678 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
679 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
680 - killed whitespace
681 - new sentence new line
682 - .Bk for arguments
683 ok markus@
177f584b 684 - markus@cvs.openbsd.org 2003/04/01 10:10:23
685 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
686 [readconf.h serverloop.c sshconnect2.c]
687 rekeying bugfixes and automatic rekeying:
688 * both client and server rekey _automatically_
689 (a) after 2^31 packets, because after 2^32 packets
690 the sequence number for packets wraps
691 (b) after 2^(blocksize_in_bits/4) blocks
692 (see: draft-ietf-secsh-newmodes-00.txt)
693 (a) and (b) are _enabled_ by default, and only disabled for known
694 openssh versions, that don't support rekeying properly.
695 * client option 'RekeyLimit'
696 * do not reply to requests during rekeying
697 - markus@cvs.openbsd.org 2003/04/01 10:22:21
698 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
699 [readconf.h serverloop.c sshconnect2.c]
700 backout rekeying changes (for 3.6.1)
519bdfe8 701 - markus@cvs.openbsd.org 2003/04/01 10:31:26
702 [compat.c compat.h kex.c]
703 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
704 tested by ho@ and myself
9dd240a3 705 - markus@cvs.openbsd.org 2003/04/01 10:56:46
706 [version.h]
707 3.6.1
ac01b518 708 - (djm) Crank spec file versions
b32453fe 709 - (djm) Release 3.6.1p1
a4e5acef 710
fd77a40f 71120030326
712 - (djm) OpenBSD CVS Sync
713 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
714 [sftp-server.c]
715 one last fix to the tree: race fix broke stuff; pr 3169;
716 srp@srparish.net, help from djm
717
8021857c 71820030325
719 - (djm) Fix getpeerid support for 64 bit BE systems. From
720 Arnd Bergmann <arndb@de.ibm.com>
721
cdb64c4d 72220030324
723 - (djm) OpenBSD CVS Sync
724 - markus@cvs.openbsd.org 2003/03/23 19:02:00
725 [monitor.c]
726 unbreak rekeying for privsep; ok millert@
727 - Release 3.6p1
62086365 728 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
729 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
cdb64c4d 730
0b202697 731$Id$
This page took 0.443011 seconds and 5 git commands to generate.