]> andersk Git - openssh.git/blame - ChangeLog
- (djm) Die screaming if start_pam() is called when UsePAM=no
[openssh.git] / ChangeLog
CommitLineData
dd3ebb5a 120030514
2 - (djm) Bug #117: Don't lie to PAM about username
0608f8a7 3 - (djm) RCSID sync w/ OpenBSD
204fde99 4 - (djm) OpenBSD CVS Sync
5 - djm@cvs.openbsd.org 2003/04/09 12:00:37
6 [readconf.c]
7 strip trailing whitespace from config lines before parsing.
8 Fixes bz 528; ok markus@
18ae3c67 9 - markus@cvs.openbsd.org 2003/04/12 10:13:57
10 [cipher.c]
11 hide cipher details; ok djm@
45c42d58 12 - markus@cvs.openbsd.org 2003/04/12 10:15:36
13 [misc.c]
14 debug->debug2
c825cd79 15 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
16 [ssh.1]
17 document -V switch, fix wording; ok markus@
3e131a6d 18 - markus@cvs.openbsd.org 2003/04/14 14:17:50
19 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
20 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
927e9f8b 21 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
22 [sftp-int.c]
23 Missing globfree(&g) in process_put() spotted by Vince Brimhall
24 <VBrimhall@novell.com>. ok@ Theo
25 - markus@cvs.openbsd.org 2003/04/16 14:35:27
26 [auth.h]
27 document struct Authctxt; with solar
b9e5aff6 28 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
29 [ssh-keyscan.c]
30 -t in usage(); rogier@quaak.org
9a26a6e2 31 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
32 [sshd.8 sshd_config.5]
33 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
34 Bug #550 and * escaping suggested by jmc@.
09dc8896 35 - david@cvs.openbsd.org 2003/04/30 20:41:07
36 [sshd.8]
37 fix invalid .Pf macro usage introduced in previous commit
38 ok jmc@ mouring@
3566c73c 39 - markus@cvs.openbsd.org 2003/05/11 16:56:48
40 [authfile.c ssh-keygen.c]
41 change key_load_public to try to read a public from:
42 rsa1 private or rsa1 public and ssh2 keys.
43 this makes ssh-keygen -e fail for ssh1 keys more gracefully
44 for example; report from itojun (netbsd pr 20550).
0d942eff 45 - markus@cvs.openbsd.org 2003/05/11 20:30:25
46 [channels.c clientloop.c serverloop.c session.c ssh.c]
47 make channel_new() strdup the 'remote_name' (not the caller); ok theo
43348518 48 - markus@cvs.openbsd.org 2003/05/12 16:55:37
49 [sshconnect2.c]
50 for pubkey authentication try the user keys in the following order:
51 1. agent keys that are found in the config file
52 2. other agent keys
53 3. keys that are only listed in the config file
54 this helps when an agent has many keys, where the server might
55 close the connection before the correct key is used. report & ok pb@
dc109cfe 56 - markus@cvs.openbsd.org 2003/05/12 18:35:18
57 [ssh-keyscan.1]
58 typo: DSA keys are of type ssh-dss; Brian Poole
81466908 59 - markus@cvs.openbsd.org 2003/05/14 00:52:59
60 [ssh2.h]
61 ranges for per auth method messages
62 - djm@cvs.openbsd.org 2003/05/14 01:00:44
63 [sftp.1]
64 emphasise the batchmode functionality and make reference to pubkey auth,
65 both of which are FAQs; ok markus@
802e01b8 66 - markus@cvs.openbsd.org 2003/05/14 02:15:47
67 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
68 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
69 server interops with commercial client; ok jakob@ djm@
751092f9 70 - (djm) Make portable build with MIT krb5 (some issues remain)
7fceb20d 71 - (djm) Add new UsePAM configuration directive to allow runtime control
72 over usage of PAM. This allows non-root use of sshd when built with
73 --with-pam
817e6d38 74 - (djm) Die screaming if start_pam() is called when UsePAM=no
dd3ebb5a 75
91f3aa9b 7620030512
77 - (djm) Redhat spec: Don't install profile.d scripts when not
78 building with GNOME/GTK askpass (patch from bet@rahul.net)
79
5def520a 8020030510
81 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
82 "make install". Patch by roth@feep.net.
ad84c479 83 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
84 problem on Linux (fixes "could not set controlling tty" errors).
05114c74 85 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
86 proper challenge-response module
23ab1f36 87 - (djm) 2-clause license on loginrec.c, with permission from
88 andre@ae-35.com
5def520a 89
43ce025d 9020030504
dd594f99 91 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
92 Patch from vinschen@redhat.com.
43ce025d 93
2cd5dbba 9420030503
95 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
96 by wendyp@cray.com.
97
bf7c1e6c 9820030502
99 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
100 privsep should now work.
73d9dad3 101 - (dtucker) Move handling of bad password authentications into a platform
990278ef 102 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
bf7c1e6c 103
68ece370 10420030429
105 - (djm) Add back radix.o (used by AFS support), after it went missing from
106 Makefile many moons ago
107 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
108 - (djm) Fix blibpath specification for AIX/gcc
109 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
110
ded9dd18 11120030428
112 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
113 hacked code.
114
aceb0423 11520030427
116 - (bal) Bug #541: return; was dropped by mistake. Reported by
117 furrier@iglou.com
c8a50a34 118 - (bal) Since we don't support platforms lacking u_int_64. We may
119 as well clean out some of those evil #ifdefs
9a6fee8b 120 - (bal) auth1.c minor resync while looking at the code.
d7cf277b 121 - (bal) auth2.c same changed as above.
aceb0423 122
0a626302 12320030409
124 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
125 from matth@eecs.berkeley.edu
d35929b5 126 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
ffd7b36b 127 - (djm) OpenBSD CVS Sync
128 - markus@cvs.openbsd.org 2003/04/02 09:48:07
129 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
130 [readconf.h serverloop.c sshconnect2.c]
131 reapply rekeying chage, tested by henning@, ok djm@
16f1b5ca 132 - markus@cvs.openbsd.org 2003/04/02 14:36:26
133 [ssh-keysign.c]
134 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
6c1bc5c5 135 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
136 [progressmeter.c]
137 $OpenBSD$
138 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
139 [progressmeter.c]
140 remove $OpenBSD$, as other *.c does not have it.
806e4c11 141 - markus@cvs.openbsd.org 2003/04/07 08:29:57
142 [monitor_wrap.c]
143 typo: get correct counters; introduced during rekeying change.
2f5b2528 144 - millert@cvs.openbsd.org 2003/04/07 21:58:05
145 [progressmeter.c]
146 The UCB copyright here is incorrect. This code did not originate
147 at UCB, it was written by Luke Mewburn. Updated the copyright at
148 the author's request. markus@ OK
149 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
150 [*.c *.h]
151 rename log() into logit() to avoid name conflict. markus ok, from
152 netbsd
153 - (djm) XXX - Performed locally using:
154 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
70e1f62f 155 - hin@cvs.openbsd.org 2003/04/09 08:23:52
156 [servconf.c]
157 Don't include <krb.h> when compiling with Kerberos 5 support
2f5b2528 158 - (djm) Fix up missing include for packet.c
a3568201 159 - (djm) Fix missed log => logit occurance (reference by function pointer)
0a626302 160
4d0cb2e5 16120030402
162 - (bal) if IP_TOS is not found or broken don't try to compile in
163 packet_set_tos() function call. bug #527
164
a4e5acef 16520030401
166 - (djm) OpenBSD CVS Sync
167 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
168 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
169 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
170 - killed whitespace
171 - new sentence new line
172 - .Bk for arguments
173 ok markus@
177f584b 174 - markus@cvs.openbsd.org 2003/04/01 10:10:23
175 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
176 [readconf.h serverloop.c sshconnect2.c]
177 rekeying bugfixes and automatic rekeying:
178 * both client and server rekey _automatically_
179 (a) after 2^31 packets, because after 2^32 packets
180 the sequence number for packets wraps
181 (b) after 2^(blocksize_in_bits/4) blocks
182 (see: draft-ietf-secsh-newmodes-00.txt)
183 (a) and (b) are _enabled_ by default, and only disabled for known
184 openssh versions, that don't support rekeying properly.
185 * client option 'RekeyLimit'
186 * do not reply to requests during rekeying
187 - markus@cvs.openbsd.org 2003/04/01 10:22:21
188 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
189 [readconf.h serverloop.c sshconnect2.c]
190 backout rekeying changes (for 3.6.1)
519bdfe8 191 - markus@cvs.openbsd.org 2003/04/01 10:31:26
192 [compat.c compat.h kex.c]
193 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
194 tested by ho@ and myself
9dd240a3 195 - markus@cvs.openbsd.org 2003/04/01 10:56:46
196 [version.h]
197 3.6.1
ac01b518 198 - (djm) Crank spec file versions
b32453fe 199 - (djm) Release 3.6.1p1
a4e5acef 200
fd77a40f 20120030326
202 - (djm) OpenBSD CVS Sync
203 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
204 [sftp-server.c]
205 one last fix to the tree: race fix broke stuff; pr 3169;
206 srp@srparish.net, help from djm
207
8021857c 20820030325
209 - (djm) Fix getpeerid support for 64 bit BE systems. From
210 Arnd Bergmann <arndb@de.ibm.com>
211
cdb64c4d 21220030324
213 - (djm) OpenBSD CVS Sync
214 - markus@cvs.openbsd.org 2003/03/23 19:02:00
215 [monitor.c]
216 unbreak rekeying for privsep; ok millert@
217 - Release 3.6p1
62086365 218 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
219 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
cdb64c4d 220
9c4cd3ef 22120030320
222 - (djm) OpenBSD CVS Sync
223 - markus@cvs.openbsd.org 2003/03/17 10:38:38
224 [progressmeter.c]
225 don't print \n if backgrounded; from ho@
57f5c15b 226 - markus@cvs.openbsd.org 2003/03/17 11:43:47
227 [version.h]
228 enter 3.6
85abc74b 229 - (bal) The days of lack of int64_t support are over. Sorry kids.
eb180c2e 230 - (bal) scp.c 'limit' conflicts with Cray. Rename to 'limitbw'
af3cb693 231 - (bal) Collection of Cray patches (bsd-cray.h fix for CRAYT3E and improved
232 guessing rules)
58d0df4e 233 - (bal) Disable Privsep for Tru64 after pre-authentication due to issues
234 with SIA. Also, clean up of tru64 support patch by Chris Adams
235 <cmadams@hiwaay.net>
16c14233 236 - (tim) [contrib/caldera/openssh.spec] workaround RPM quirk. Fix %files
9c4cd3ef 237
5271b55c 23820030318
239 - (tim) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
240 add nanosleep(). testing/corrections by Darren Tucker <dtucker@zip.com.au>
241
d8eb5247 24220030317
243 - (djm) Fix return value checks for RAND_bytes. Report from
244 Steve G <linux_4ever@yahoo.com>
245
15e98f49 24620030315
247 - (djm) OpenBSD CVS Sync
248 - markus@cvs.openbsd.org 2003/03/13 11:42:19
249 [authfile.c ssh-keysign.c]
250 move RSA_blinding_on to generic key load method
cb0e1d67 251 - markus@cvs.openbsd.org 2003/03/13 11:44:50
252 [ssh-agent.c]
253 ssh-agent is similar to ssh-keysign (allows other processes to use
254 private rsa keys). however, it gets key over socket and not from
255 a file, so we have to do blinding here as well.
15e98f49 256
3e2f2431 25720030310
258- (djm) OpenBSD CVS Sync
259 - markus@cvs.openbsd.org 2003/03/05 22:33:43
260 [channels.c monitor.c scp.c session.c sftp-client.c sftp-int.c]
261 [sftp-server.c ssh-add.c sshconnect2.c]
262 fix memory leaks; from dlheine@suif.Stanford.EDU/CLOUSEAU; ok djm@
6cef88bc 263 - (djm) One more portable-specific one from dlheine@suif.Stanford.EDU/
264 CLOUSEAU
6ecd00f8 265 - (djm) Bug #245: TTY problems on Solaris. Fix by stevesk@ and
266 dtucker@zip.com.au
21e3ecaf 267 - (djm) AIX package builder update from dtucker@zip.com.au
3e2f2431 268
3a082d0a 26920030225
270 - (djm) Fix some compile errors spotted by dtucker and his fabulous
271 tinderbox
272
b2d033b4 27320030224
274 - (djm) Tweak gnome-ssh-askpass2:
275 - Retry kb and mouse grab a couple of times, so passphrase dialog doesn't
276 immediately fail if you are doing something else when it appears (e.g.
277 dragging a window)
278 - Perform server grab after we have the keyboard and/or pointer to avoid
279 races.
5f021474 280 - (djm) OpenBSD CVS Sync
281 - markus@cvs.openbsd.org 2003/01/27 17:06:31
282 [sshd.c]
283 more specific error message when /var/empty has wrong permissions;
284 bug #46, map@appgate.com; ok henning@, provos@, stevesk@
bd9f564f 285 - markus@cvs.openbsd.org 2003/01/28 16:11:52
286 [scp.1]
287 document -l; pekkas@netcore.fi
00019895 288 - stevesk@cvs.openbsd.org 2003/01/28 17:24:51
289 [scp.1]
290 remove example not pertinent with -1 addition; ok markus@
6691e41b 291 - jmc@cvs.openbsd.org 2003/01/31 21:54:40
292 [sshd.8]
293 typos; sshd(8): help and ok markus@
294 help and ok millert@
0ec7661a 295 - markus@cvs.openbsd.org 2003/02/02 10:51:13
296 [scp.c]
297 call okname() only when using system(3) for remote-remote copy;
298 fixes bugs #483, #472; ok deraadt@, mouring@
eed8e583 299 - markus@cvs.openbsd.org 2003/02/02 10:56:08
300 [kex.c]
301 add support for key exchange guesses; based on work by
302 avraham.fraenkel@commatch.com; fixes bug #148; ok deraadt@
d6dc3576 303 - markus@cvs.openbsd.org 2003/02/03 08:56:16
304 [sshpty.c]
305 don't call error() for readonly /dev; from soekris list; ok mcbride,
306 henning, deraadt.
79cfe67c 307 - markus@cvs.openbsd.org 2003/02/04 09:32:08
308 [key.c]
309 better debug3 message
6d6c25e3 310 - markus@cvs.openbsd.org 2003/02/04 09:33:22
311 [monitor.c monitor_wrap.c]
312 skey/bsdauth: use 0 to indicate failure instead of -1, because
313 the buffer API only supports unsigned ints.
d718e75d 314 - markus@cvs.openbsd.org 2003/02/05 09:02:28
315 [readconf.c]
316 simplify ProxyCommand parsing, remove strcat/xrealloc; ok henning@, djm@
381b021b 317 - markus@cvs.openbsd.org 2003/02/06 09:26:23
318 [session.c]
319 missing call to setproctitle() after authentication; ok provos@
f78bde70 320 - markus@cvs.openbsd.org 2003/02/06 09:27:29
321 [ssh.c ssh_config.5]
322 support 'ProxyCommand none'; bugzilla #433; binder@arago.de; ok djm@
f2f28f1f 323 - markus@cvs.openbsd.org 2003/02/06 09:29:18
324 [sftp-server.c]
325 fix races in rename/symlink; from Tony Finch; ok djm@
5d47f1d4 326 - markus@cvs.openbsd.org 2003/02/06 21:22:43
327 [auth1.c auth2.c]
328 undo broken fix for #387, fixes #486
f7272340 329 - markus@cvs.openbsd.org 2003/02/10 11:51:47
330 [ssh-add.1]
331 xref sshd_config.5 (not sshd.8); mark@summersault.com; bug #490
2a79da70 332 - markus@cvs.openbsd.org 2003/02/12 09:33:04
333 [key.c key.h ssh-dss.c ssh-rsa.c]
334 merge ssh-dss.h ssh-rsa.h into key.h; ok deraadt@
770432dd 335 - markus@cvs.openbsd.org 2003/02/12 21:39:50
336 [crc32.c crc32.h]
337 replace crc32.c with a BSD licensed version; noted by David Turner
98a58eda 338 - markus@cvs.openbsd.org 2003/02/16 17:09:57
339 [kex.c kexdh.c kexgex.c kex.h sshconnect2.c sshd.c ssh-keyscan.c]
340 split kex into client and server code, no need to link
341 server code into the client; ok provos@
92e15201 342 - markus@cvs.openbsd.org 2003/02/16 17:30:33
343 [monitor.c monitor_wrap.c]
344 fix permitrootlogin forced-commands-only for privsep; bux #387;
345 ok provos@
34934506 346 - markus@cvs.openbsd.org 2003/02/21 09:05:53
347 [servconf.c]
348 print sshd_config filename in debug2 mode.
98a0a51a 349 - mpech@cvs.openbsd.org 2003/02/21 10:34:48
350 [auth-krb4.c]
351 ...sizeof(&adat.session) is not good here.
352 henning@, deraadt@, millert@
bb102e8e 353 - (djm) Add new object files to Makefile and reorder
4a35ae8b 354 - (djm) Bug #501: gai_strerror should return char*;
355 fix from dtucker@zip.com.au
2731632a 356 - (djm) Most of Bug #499: Cygwin compile fixes for new progressmeter;
357 From vinschen@redhat.com
2d0c443a 358 - (djm) Rest of Bug #499: Import a basename() function from OpenBSD libc
2731632a 359 - (djm) Bug #494: Allow multiple accounts on Windows 9x/Me;
360 From vinschen@redhat.com
19160674 361 - (djm) Bug #456: Support for NEC SX6 with Unicos; from wendyp@cray.com
b2d033b4 362
a52997bd 36320030211
364 - (djm) Cygwin needs libcrypt too. Patch from vinschen@redhat.com
365
ecc03386 36620030206
367 - (djm) Teach fake-getaddrinfo to use getservbyname() when provided a
368 string service name. Suggested by markus@, review by itojun@
369
ad137007 37020030131
371 - (bal) AIX 4.2.1 lacks nanosleep(). Patch to use nsleep() provided by
372 dtucker@zip.com.au
373
63ba3638 37420030130
375 - (djm) Unbreak root password auth. Spotted by dtucker@zip.com.au
376
92b1decf 377200301028
378 - (djm) Search libposix4 and librt for nanosleep. From dtucker@zip.com.au
379 and openssh-unix-dev@thewrittenword.com
380
96e85e17 381200301027
382 - (bal) Bugzilla 477 patch by wendyp@cray.com. Define TIOCGPGRP for
383 cray. Also removed test for tcgetpgrp in configure.ac since it
384 is no longer used.
385
1be697b6 38620030124
387 - (djm) OpenBSD CVS Sync
388 - jmc@cvs.openbsd.org 2003/01/23 08:58:47
389 [sshd_config.5]
390 typos; ok millert@
c4087616 391 - markus@cvs.openbsd.org 2003/01/23 13:50:27
392 [authfd.c authfd.h readpass.c ssh-add.1 ssh-add.c ssh-agent.c]
393 ssh-add -c, prompt user for confirmation (using ssh-askpass) when
394 private agent key is used; with djm@; test by dugsong@, djm@;
395 ok deraadt@
6ea3c52a 396 - markus@cvs.openbsd.org 2003/01/23 14:01:53
397 [scp.c]
398 bandwidth limitation patch (scp -l) from niels@; ok todd@, deraadt@
e6b15f23 399 - markus@cvs.openbsd.org 2003/01/23 14:06:15
400 [scp.1 scp.c]
401 scp -12; Sam Smith and others; ok provos@, deraadt@
c7578bb6 402 - (djm) Add TIMEVAL_TO_TIMESPEC macros
1be697b6 403
0df3cb2b 40420030123
405 - (djm) OpenBSD CVS Sync
406 - djm@cvs.openbsd.org 2003/01/23 00:03:00
407 [auth1.c]
408 Don't log TIS auth response; "get rid of it" - markus@
409
494b267f 41020030122
411 - (djm) OpenBSD CVS Sync
412 - marc@cvs.openbsd.org 2003/01/21 18:14:36
413 [ssh-agent.1 ssh-agent.c]
414 Add a -t life option to ssh-agent that set the default lifetime.
415 The default can still be overriden by using -t in ssh-add.
416 OK markus@
882a3870 417 - (djm) Reorganise PAM & SIA password handling to eliminate some common code
8582624b 418 - (djm) Sync regress with OpenBSD -current
494b267f 419
877c5ea2 42020030120
421 - (djm) Fix compilation for NetBSD from dtucker@zip.com.au
115dc20f 422 - (tim) [progressmeter.c] make compilers without long long happy.
21710e39 423 - (tim) [configure.ac] Add -belf to build ELF binaries on OpenServer 5 when
424 using cc. (gcc already did)
877c5ea2 425
5ed5468f 42620030118
427 - (djm) Revert fix for Bug #442 for now.
428
9e2b44f5 42920030117
430 - (djm) Bug #470: Detect strnvis, not strvis in configure.
431 From d_wllms@lanl.gov
432
280806cf 43320030116
434 - (djm) OpenBSD CVS Sync
435 - djm@cvs.openbsd.org 2003/01/16 03:41:55
436 [sftp-int.c]
437 explicitly use first glob result
438
33364f27 43920030114
440 - (djm) OpenBSD CVS Sync
441 - fgsch@cvs.openbsd.org 2003/01/10 23:23:24
442 [sftp-int.c]
443 typo; from Nils Nordman <nino at nforced dot com>.
083d2e97 444 - markus@cvs.openbsd.org 2003/01/11 18:29:43
445 [log.c]
446 set fatal_cleanups to NULL in fatal_remove_all_cleanups();
447 dtucker@zip.com.au
b7fd001f 448 - markus@cvs.openbsd.org 2003/01/12 16:57:02
449 [progressmeter.c]
450 allow WARNINGS=yes; ok djm@
c1e07c81 451 - djm@cvs.openbsd.org 2003/01/13 11:04:04
452 [sftp-int.c]
453 make cmds[] array static to avoid conflict with BSDI libc.
209d3126 454 mindrot bug #466. Fix from mdev@idg.nl; ok markus@
538840a2 455 - djm@cvs.openbsd.org 2003/01/14 10:58:00
456 [sftp-client.c sftp-int.c]
457 Don't try to upload or download non-regular files. Report from
458 apoloval@pantuflo.escet.urjc.es; ok markus@
33364f27 459
46020030113
e80fb2a0 461 - (djm) Rework openbsd-compat/setproctitle.c a bit: move emulation type
462 detection to configure.ac. Prompted by stevesk@
65a4b4af 463 - (djm) Bug #467: Add a --disable-strip option to turn off stripping of
464 installed binaries. From mdev@idg.nl
e80fb2a0 465
d0104542 46620030110
467 - (djm) Enable new setproctitle emulation for Linux, AIX and HP/UX. More
468 systems may be added later.
9a36208d 469 - (djm) OpenBSD CVS Sync
470 - djm@cvs.openbsd.org 2003/01/08 23:53:26
471 [sftp.1 sftp.c sftp-int.c sftp-int.h]
472 Cleanup error handling for batchmode
473 Allow blank lines and comments in input
474 Ability to suppress abort on error in batchmode ("-put blah")
475 Fixes mindrot bug #452; markus@ ok
b65c3807 476 - fgsch@cvs.openbsd.org 2003/01/10 08:19:07
c9c38b73 477 [scp.c sftp.1 sftp.c sftp-client.c sftp-int.c progressmeter.c]
478 [progressmeter.h]
b65c3807 479 sftp progress meter support.
480 original diffs by Nils Nordman <nino at nforced dot com> via
481 markus@, merged to -current by me, djm@ ok.
bf0bf24b 482 - djm@cvs.openbsd.org 2003/01/10 08:48:15
483 [sftp-client.c]
484 Simplify and avoid redundancy in packet send and receive
485 functions; ok fgs@
25a6efd8 486 - djm@cvs.openbsd.org 2003/01/10 10:29:35
487 [scp.c]
488 Don't ftruncate after write error, creating sparse files of
489 incorrect length
490 mindrot bug #403, reported by rusr@cup.hp.com; ok markus@
4940c411 491 - djm@cvs.openbsd.org 2003/01/10 10:32:54
492 [channels.c]
493 hush socket() errors, except last. Fixes mindrot bug #408; ok markus@
d0104542 494
7bb526ce 49520030108
496 - (djm) Sync openbsd-compat/ with OpenBSD -current
93c63b8d 497 - (djm) Avoid redundant xstrdup/xfree in auth2-pam.c. From Solar via markus@
faa483fa 498 - (djm) OpenBSD CVS Sync
499 - markus@cvs.openbsd.org 2003/01/01 18:08:52
500 [channels.c]
501 move big output buffer messages to debug2
bfd934b9 502 - djm@cvs.openbsd.org 2003/01/06 23:51:22
503 [sftp-client.c]
504 Fix "get -p" download to not add user-write perm. mindrot bug #426
505 reported by gfernandez@livevault.com; ok markus@
048ff12c 506 - fgsch@cvs.openbsd.org 2003/01/07 23:42:54
507 [sftp.1]
508 add version; from Nils Nordman <nino at nforced dot com> via markus@.
509 markus@ ok
c9c462e4 510 - (djm) Update README to reflect AIX's status as a well supported platform.
511 From dtucker@zip.com.au
c3690df3 512 - (tim) [Makefile.in configure.ac] replace fixpath with sed script. Patch
a2144d93 513 by Mo DeJong.
ad0279ff 514 - (tim) [auth.c] declare today at top of allowed_user() to keep
515 older compilers happy.
a2144d93 516 - (tim) [scp.c] make compilers without long long happy.
7bb526ce 517
e7ccd20d 51820030107
519 - (djm) Bug #401: Work around Linux breakage with IPv6 mapped addresses.
520 Based on fix from yoshfuji@linux-ipv6.org
e2ef2342 521 - (djm) Bug #442: Check for and deny access to accounts with locked
522 passwords. Patch from dtucker@zip.com.au
41b7cf42 523 - (djm) Bug #44: Use local mkstemp() rather than glibc's silly one. Fixes
70e7d0b0 524 Can't pass KRB4 TGT passing. Fix from: jan.iven@cern.ch
93a9a35a 525 - (djm) Fix Bug #442 for PAM case
ed05a983 526 - (djm) Bug #110: bogus error messages in lastlog_get_entry(). Fix based
527 on one by peak@argo.troja.mff.cuni.cz
63cada0a 528 - (djm) Bug #111: Run syslog and stderr logging through strnvis to eliminate
529 nasties. Report from peak@argo.troja.mff.cuni.cz
99f4fb69 530 - (djm) Bug #178: On AIX /etc/nologin wasnt't shown to users. Fix from
531 Ralf.Wenk@fh-karlsruhe.de and dtucker@zip.com.au
b57c8e20 532 - (djm) Fix my fix of the fix for the Bug #442 for PAM case. Spotted by
533 dtucker@zip.com.au. Reorder for clarity too.
e7ccd20d 534
9300be60 53520030103
536 - (djm) Bug #461: ssh-copy-id fails with no arguments. Patch from
537 cjwatson@debian.org
9746ee4b 538 - (djm) Bug #460: Filling utmp[x]->ut_addr_v6 if present. Patch from
539 cjwatson@debian.org
17ed08c5 540 - (djm) Bug #446: Set LOGIN env var to pw_name on AIX. Patch from
541 mii@ornl.gov
542
d4ac26ed 54320030101
544 - (stevesk) [session.c sshlogin.c sshlogin.h] complete portable
545 parts of pass addrlen with sockaddr * fix.
546 from Hajimu UMEMOTO <ume@FreeBSD.org>
547
378d9956 54820021222
549 - (bal) OpenBSD CVS Sync
550 - fgsch@cvs.openbsd.org 2002/11/15 10:03:09
551 [authfile.c]
552 lseek(2) may return -1 when getting the public/private key lenght.
553 Simplify the code and check for errors using fstat(2).
554
555 Problem reported by Mauricio Sanchez, markus@ ok.
3c93c917 556 - markus@cvs.openbsd.org 2002/11/18 16:43:44
557 [clientloop.c]
558 don't overwrite SIG{INT,QUIT,TERM} handler if set to SIG_IGN;
559 e.g. if ssh is used for backup; report Joerg Schilling; ok millert@
35efb24c 560 - markus@cvs.openbsd.org 2002/11/21 22:22:50
561 [dh.c]
562 debug->debug2
a77673cc 563 - markus@cvs.openbsd.org 2002/11/21 22:45:31
564 [cipher.c kex.c packet.c sshconnect.c sshconnect2.c]
565 debug->debug2, unify debug messages
b77a87e5 566 - deraadt@cvs.openbsd.org 2002/11/21 23:03:51
567 [auth-krb5.c auth1.c hostfile.h monitor_wrap.c sftp-client.c sftp-int.c ssh-add.c ssh-rsa.c
568 sshconnect.c]
569 KNF
556f1c05 570 - markus@cvs.openbsd.org 2002/11/21 23:04:33
83bbc162 571 [ssh.c]
572 debug->debug2
556f1c05 573 - stevesk@cvs.openbsd.org 2002/11/24 21:46:24
eef52fa7 574 [ssh-keysign.8]
575 typo: "the the"
6d58d81e 576 - wcobb@cvs.openbsd.org 2002/11/26 00:45:03
577 [scp.c ssh-keygen.c]
578 Remove unnecessary fflush(stderr) calls, stderr is unbuffered by default.
579 ok markus@
556f1c05 580 - stevesk@cvs.openbsd.org 2002/11/26 02:35:30
63baa058 581 [ssh-keygen.1]
582 remove outdated statement; ok markus@ deraadt@
649bb60b 583 - stevesk@cvs.openbsd.org 2002/11/26 02:38:54
584 [canohost.c]
585 KNF, comment and error message repair; ok markus@
15748b4d 586 - markus@cvs.openbsd.org 2002/11/27 17:53:35
587 [scp.c sftp.c ssh.c]
588 allow usernames with embedded '@', e.g. scp user@vhost@realhost:file /tmp;
589 http://bugzilla.mindrot.org/show_bug.cgi?id=447; ok mouring@, millert@
fe661d8f 590 - stevesk@cvs.openbsd.org 2002/12/04 04:36:47
591 [session.c]
592 remove xauth entries before add; PR 2994 from janjaap@stack.nl.
593 ok markus@
a0a14bcd 594 - markus@cvs.openbsd.org 2002/12/05 11:08:35
595 [scp.c]
596 use roundup() similar to rcp/util.c and avoid problems with strange
597 filesystem block sizes, noted by tjr@freebsd.org; ok djm@
556f1c05 598 - djm@cvs.openbsd.org 2002/12/06 05:20:02
2ea16b0b 599 [sftp.1]
600 Fix cut'n'paste error, spotted by matthias.riese@b-novative.de; ok deraadt@
978ebf99 601 - millert@cvs.openbsd.org 2002/12/09 16:50:30
602 [ssh.c]
603 Avoid setting optind to 0 as GNU getopt treats that like we do optreset.
604 markus@ OK
32214c88 605 - markus@cvs.openbsd.org 2002/12/10 08:56:00
606 [session.c]
607 Make sure $SHELL points to the shell from the password file, even if shell
608 is overridden from login.conf; bug#453; semen at online.sinor.ru; ok millert@
48f636b2 609 - markus@cvs.openbsd.org 2002/12/10 19:26:50
610 [packet.c]
611 move tos handling to packet_set_tos; ok provos/henning/deraadt
9e637910 612 - markus@cvs.openbsd.org 2002/12/10 19:47:14
613 [packet.c]
614 static
6226a8f8 615 - markus@cvs.openbsd.org 2002/12/13 10:03:15
616 [channels.c misc.c sshconnect2.c]
617 cleanup debug messages, more useful information for the client user.
556f1c05 618 - markus@cvs.openbsd.org 2002/12/13 15:20:52
619 [scp.c]
620 1) include stalling time in total time
621 2) truncate filenames to 45 instead of 20 characters
622 3) print rate instead of progress bar, no more stars
623 4) scale output to tty width
624 based on a patch from Niels; ok fries@ lebel@ fgs@ millert@
3075ac59 625 - (bal) [msg.c msg.h scp.c ssh-keysign.c sshconnect2.c] Resync CVS IDs since
626 we already did s/msg_send/ssh_msg_send/
378d9956 627
a76550cf 62820021205
629 - (djm) PERL-free fixpaths from stuge-openssh-unix-dev@cdy.org
630
d9a4e55b 63120021122
632 - (tim) [configure.ac] fix STDPATH test for IRIX. First reported by
633 advax@triumf.ca. This type of solution tested by <herb@sgi.com>
634
f825dbf4 63520021113
636 - (tim) [configure.ac] remove unused variables no_libsocket and no_libnsl
637
17d429bb 63820021111
639 - (tim) [contrib/solaris/opensshd.in] add umask 022 so sshd.pid is
640 not world writable.
641
c9826b28 64220021109
643 - (bal) OpenBSD CVS Sync
644 - itojun@cvs.openbsd.org 2002/10/16 14:31:48
645 [sftp-common.c]
646 64bit pedant. %llu is "unsigned long long". markus ok
2fe3c2db 647 - markus@cvs.openbsd.org 2002/10/23 10:32:13
648 [packet.c]
649 use %u for u_int
358b576b 650 - markus@cvs.openbsd.org 2002/10/23 10:40:16
651 [bufaux.c]
652 %u for u_int
f6f02456 653 - markus@cvs.openbsd.org 2002/11/04 10:07:53
654 [auth.c]
655 don't compare against pw_home if realpath fails for pw_home (seen
656 on AFS); ok djm@
2ccb7bde 657 - markus@cvs.openbsd.org 2002/11/04 10:09:51
658 [packet.c]
659 log before send disconnect; ok djm@
39e71188 660 - markus@cvs.openbsd.org 2002/11/05 19:45:20
661 [monitor.c]
662 handle overflows for size_t larger than u_int; siw@goneko.de, bug #425
9db1a8e9 663 - markus@cvs.openbsd.org 2002/11/05 20:10:37
664 [sftp-client.c]
665 typo; GaryF@livevault.com
51efad8c 666 - markus@cvs.openbsd.org 2002/11/07 16:28:47
667 [sshd.c]
668 log to stderr if -ie is given, bug #414, prj@po.cwru.edu
cc46e2ee 669 - markus@cvs.openbsd.org 2002/11/07 22:08:07
670 [readconf.c readconf.h ssh-keysign.8 ssh-keysign.c]
671 we cannot use HostbasedAuthentication for enabling ssh-keysign(8),
672 because HostbasedAuthentication might be enabled based on the
673 target host and ssh-keysign(8) does not know the remote hostname
674 and not trust ssh(1) about the hostname, so we add a new option
675 EnableSSHKeysign; ok djm@, report from zierke@informatik.uni-hamburg.de
252d1a24 676 - markus@cvs.openbsd.org 2002/11/07 22:35:38
677 [scp.c]
678 check exit status from ssh, and exit(1) if ssh fails; bug#369;
679 binder@arago.de
f00addc9 680 - (bal) Update ssh-host-config and minor rewrite of bsd-cygwin_util.c
681 ntsec now default if cygwin version beginning w/ version 56. Patch
682 by Corinna Vinschen <vinschen@redhat.com>
819d3f09 683 - (bal) AIX does not log login attempts for unknown users (bug #432).
684 patch by dtucker@zip.com.au
c9826b28 685
4e6f1c4f 68620021021
f0e27f3d 687 - (djm) Bug #400: Kill ssh-rand-helper children on timeout, patch from
688 dtucker@zip.com.au
cacd2e7a 689 - (djm) Bug #317: FreeBSD needs libutil.h for openpty() Report from
690 dirk.meyer@dinoex.sub.org
4e6f1c4f 691
f3e87063 69220021015
693 - (bal) Fix bug id 383 and only call loginrestrict for AIX if not root.
08412d26 694 - (bal) More advanced strsep test by Darren Tucker <dtucker@zip.com.au>
f3e87063 695
57872969 69620021015
697 - (tim) [contrib/caldera/openssh.spec] make ssh-agent setgid nobody
698
6af8f131 69920021004
700 - (bal) Disable post-authentication Privsep for OSF/1. It conflicts with
701 SIA.
702
e139021d 70320021003
704 - (djm) OpenBSD CVS Sync
705 - markus@cvs.openbsd.org 2002/10/01 20:34:12
706 [ssh-agent.c]
707 allow root to access the agent, since there is no protection from root.
886cd2bb 708 - markus@cvs.openbsd.org 2002/10/01 13:24:50
709 [version.h]
710 OpenSSH 3.5
0855868a 711 - (djm) Bump RPM spec version numbers
e987fdbe 712 - (djm) Bug #406: s/msg_send/ssh_msg_send/ for Mac OS X 1.2
e139021d 713
1d677676 71420020930
9a87e2ac 715 - (djm) Tidy contrib/, add Makefile for GNOME passphrase dialogs,
716 tweak README
717 - (djm) OpenBSD CVS Sync
718 - mickey@cvs.openbsd.org 2002/09/27 10:42:09
719 [compat.c compat.h sshd.c]
720 add a generic match for a prober, such as sie big brother;
721 idea from stevesk@; markus@ ok
05960cf0 722 - stevesk@cvs.openbsd.org 2002/09/27 15:46:21
723 [ssh.1]
724 clarify compression level protocol 1 only; ok markus@ deraadt@
1d677676 725
0d3d0e82 72620020927
727 - (djm) OpenBSD CVS Sync
728 - markus@cvs.openbsd.org 2002/09/25 11:17:16
729 [sshd_config]
730 sync LoginGraceTime with default
26b9a3d2 731 - markus@cvs.openbsd.org 2002/09/25 15:19:02
732 [sshd.c]
733 typo; pilot@monkey.org
2db9d8aa 734 - markus@cvs.openbsd.org 2002/09/26 11:38:43
735 [auth1.c auth.h auth-krb4.c monitor.c monitor.h monitor_wrap.c]
736 [monitor_wrap.h]
737 krb4 + privsep; ok dugsong@, deraadt@
0d3d0e82 738
b7c4a4cc 73920020925
740 - (bal) Fix issue where successfull login does not clear failure counts
741 in AIX. Patch by dtucker@zip.com.au ok by djm
ef51930f 742 - (tim) Cray fixes (bug 367) based on patch from Wendy Palm @ cray.
743 This does not include the deattack.c fixes.
b7c4a4cc 744
99443922 74520020923
746 - (djm) OpenBSD CVS Sync
747 - stevesk@cvs.openbsd.org 2002/09/23 20:46:27
748 [canohost.c]
749 change get_peer_ipaddr() and get_local_ipaddr() to not return NULL for
750 non-sockets; fixes a problem passing NULL to snprintf(). ok markus@
0082ad34 751 - markus@cvs.openbsd.org 2002/09/23 22:11:05
752 [monitor.c]
753 only call auth_krb5 if kerberos is enabled; ok deraadt@
4741e3a6 754 - markus@cvs.openbsd.org 2002/09/24 08:46:04
755 [monitor.c]
756 only call kerberos code for authctxt->valid
cb11b555 757 - todd@cvs.openbsd.org 2002/09/24 20:59:44
758 [sshd.8]
759 tweak the example $HOME/.ssh/rc script to not show on any cmdline the
760 sensitive data it handles. This fixes bug # 402 as reported by
761 kolya@mit.edu (Nickolai Zeldovich).
762 ok markus@ and stevesk@
99443922 763
aec4cb4f 76420020923
765 - (tim) [configure.ac] s/return/exit/ patch by dtucker@zip.com.au
766
f86b0eef 76720020922
768 - (djm) OpenBSD CVS Sync
769 - stevesk@cvs.openbsd.org 2002/09/19 14:53:14
770 [compat.c]
c7724abb 771 - markus@cvs.openbsd.org 2002/09/19 15:51:23
772 [ssh-add.c]
773 typo; cd@kalkatraz.de
00e842d8 774 - stevesk@cvs.openbsd.org 2002/09/19 16:03:15
775 [serverloop.c]
776 log IP address also; ok markus@
c2802d92 777 - stevesk@cvs.openbsd.org 2002/09/20 18:41:29
778 [auth.c]
779 log illegal user here for missing privsep case (ssh2).
780 this is executed in the monitor. ok markus@
f86b0eef 781
792e7d2d 78220020919
783 - (djm) OpenBSD CVS Sync
784 - stevesk@cvs.openbsd.org 2002/09/12 19:11:52
785 [ssh-agent.c]
786 %u for uid print; ok markus@
da0561eb 787 - stevesk@cvs.openbsd.org 2002/09/12 19:50:36
788 [session.c ssh.1]
789 add SSH_CONNECTION and deprecate SSH_CLIENT; bug #384. ok markus@
facfd613 790 - stevesk@cvs.openbsd.org 2002/09/13 19:23:09
791 [channels.c sshconnect.c sshd.c]
792 remove use of SO_LINGER, it should not be needed. error check
793 SO_REUSEADDR. fixup comments. ok markus@
8bd4e2ae 794 - stevesk@cvs.openbsd.org 2002/09/16 19:55:33
795 [session.c]
796 log when _PATH_NOLOGIN exists; ok markus@
e6fe1bab 797 - stevesk@cvs.openbsd.org 2002/09/16 20:12:11
798 [sshd_config.5]
799 more details on X11Forwarding security issues and threats; ok markus@
f1dcc34e 800 - stevesk@cvs.openbsd.org 2002/09/16 22:03:13
801 [sshd.8]
802 reference moduli(5) in FILES /etc/moduli.
5c0d0e90 803 - itojun@cvs.openbsd.org 2002/09/17 07:47:02
804 [channels.c]
805 don't quit while creating X11 listening socket.
806 http://mail-index.netbsd.org/current-users/2002/09/16/0005.html
807 got from portable. markus ok
6939bbd4 808 - djm@cvs.openbsd.org 2002/09/19 01:58:18
809 [ssh.c sshconnect.c]
810 bugzilla.mindrot.org #223 - ProxyCommands don't exit.
811 Patch from dtucker@zip.com.au; ok markus@
792e7d2d 812
4f3834e8 81320020912
eee2215e 814 - (djm) Made GNOME askpass programs return non-zero if cancel button is
815 pressed.
10a560d4 816 - (djm) Added getpeereid() replacement. Properly implemented for systems
817 with SO_PEERCRED support. Faked for systems which lack it.
9fd2a215 818 - (djm) Sync sys/tree.h with OpenBSD -current. Rename tree.h and
819 fake-queue.h to sys-tree.h and sys-queue.h
4f3834e8 820 - (djm) OpenBSD CVS Sync
821 - markus@cvs.openbsd.org 2002/09/08 20:24:08
822 [hostfile.h]
823 no comma at end of enumerator list
696f6bef 824 - itojun@cvs.openbsd.org 2002/09/09 06:48:06
825 [auth1.c auth.h auth-krb5.c monitor.c monitor.h]
826 [monitor_wrap.c monitor_wrap.h]
827 kerberos support for privsep. confirmed to work by lha@stacken.kth.se
828 patch from markus
661e45a0 829 - markus@cvs.openbsd.org 2002/09/09 14:54:15
830 [channels.c kex.h key.c monitor.c monitor_wrap.c radix.c uuencode.c]
831 signed vs unsigned from -pedantic; ok henning@
87f4111f 832 - markus@cvs.openbsd.org 2002/09/10 20:24:47
833 [ssh-agent.c]
834 check the euid of the connecting process with getpeereid(2);
835 ok provos deraadt stevesk
07d688d5 836 - stevesk@cvs.openbsd.org 2002/09/11 17:55:03
837 [ssh.1]
838 add agent and X11 forwarding warning text from ssh_config.5; ok markus@
8b10e20e 839 - stevesk@cvs.openbsd.org 2002/09/11 18:27:26
840 [authfd.c authfd.h ssh.c]
841 don't connect to agent to test for presence if we've previously
842 connected; ok markus@
00b3ad3e 843 - djm@cvs.openbsd.org 2002/09/11 22:41:50
844 [sftp.1 sftp-client.c sftp-client.h sftp-common.c sftp-common.h]
845 [sftp-glob.c sftp-glob.h sftp-int.c sftp-server.c]
846 support for short/long listings and globbing in "ls"; ok markus@
be0cd512 847 - djm@cvs.openbsd.org 2002/09/12 00:13:06
848 [sftp-int.c]
849 zap unused var introduced in last commit
4f3834e8 850
ac8802eb 85120020911
852 - (djm) Sync openbsd-compat with OpenBSD -current
853
e2e36358 85420020910
855 - (djm) Bug #365: Read /.ssh/environment properly under CygWin.
856 Patch from Mark Bradshaw <bradshaw@staff.crosswalk.com>
35c4faf5 857 - (djm) Bug #138: Make protocol 1 blowfish work with old OpenSSL.
858 Patch from Robert Halubek <rob@adso.com.pl>
e2e36358 859
3445ca02 86020020905
861 - (djm) OpenBSD CVS Sync
862 - stevesk@cvs.openbsd.org 2002/09/04 18:52:42
863 [servconf.c sshd.8 sshd_config.5]
864 default LoginGraceTime to 2m; 1m may be too short for slow systems.
865 ok markus@
cbecf1ed 866 - (djm) Merge openssh-TODO.patch from Redhat (null) beta
c4ee4c60 867 - (djm) Add gnome-ssh-askpass2.c (gtk2) by merge with patch from
868 Nalin Dahyabhai <nalin@redhat.com>
3c1dff28 869 - (djm) Add support for building gtk2 password requestor from Redhat beta
3445ca02 870
954640a4 87120020903
33e2e066 872 - (djm) Patch from itojun@ for Darwin OS: test getaddrinfo, reorder libcrypt
e18b7d35 873 - (djm) Fix Redhat RPM build dependancy test
954640a4 874 - (djm) OpenBSD CVS Sync
875 - markus@cvs.openbsd.org 2002/08/12 10:46:35
876 [ssh-agent.c]
877 make ssh-agent setgid, disallow ptrace.
755c4339 878 - espie@cvs.openbsd.org 2002/08/21 11:20:59
879 [sshd.8]
880 `RSA' updated to refer to `public key', where it matters.
881 okay markus@
6e0fbda1 882 - stevesk@cvs.openbsd.org 2002/08/21 19:38:06
883 [servconf.c sshd.8 sshd_config sshd_config.5]
884 change LoginGraceTime default to 1 minute; ok mouring@ markus@
00e41835 885 - stevesk@cvs.openbsd.org 2002/08/21 20:10:28
886 [ssh-agent.c]
887 raise listen backlog; ok markus@
c1a4eef1 888 - stevesk@cvs.openbsd.org 2002/08/22 19:27:53
889 [ssh-agent.c]
890 use common close function; ok markus@
1d77f8cb 891 - stevesk@cvs.openbsd.org 2002/08/22 19:38:42
892 [clientloop.c]
893 format with current EscapeChar; bugzilla #388 from wknox@mitre.org.
894 ok markus@
f34ec885 895 - stevesk@cvs.openbsd.org 2002/08/22 20:57:19
896 [ssh-agent.c]
897 shutdown(SHUT_RDWR) not needed before close here; ok markus@
848bf884 898 - markus@cvs.openbsd.org 2002/08/22 21:33:58
899 [auth1.c auth2.c]
900 auth_root_allowed() is handled by the monitor in the privsep case,
901 so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325
6c723e7c 902 - markus@cvs.openbsd.org 2002/08/22 21:45:41
903 [session.c]
904 send signal name (not signal number) in "exit-signal" message; noticed
905 by galb@vandyke.com
b41baf4d 906 - stevesk@cvs.openbsd.org 2002/08/27 17:13:56
907 [ssh-rsa.c]
908 RSA_public_decrypt() returns -1 on error so len must be signed;
909 ok markus@
dbcdea68 910 - stevesk@cvs.openbsd.org 2002/08/27 17:18:40
911 [ssh_config.5]
912 some warning text for ForwardAgent and ForwardX11; ok markus@
ba1566dd 913 - stevesk@cvs.openbsd.org 2002/08/29 15:57:25
914 [monitor.c session.c sshlogin.c sshlogin.h]
915 pass addrlen with sockaddr *; from Hajimu UMEMOTO <ume@FreeBSD.org>
916 NOTE: there are also p-specific parts to this patch. ok markus@
e59404d1 917 - stevesk@cvs.openbsd.org 2002/08/29 16:02:54
918 [ssh.1 ssh.c]
919 deprecate -P as UsePrivilegedPort defaults to no now; ok markus@
878b8992 920 - stevesk@cvs.openbsd.org 2002/08/29 16:09:02
921 [ssh_config.5]
922 more on UsePrivilegedPort and setuid root; ok markus@
9f324470 923 - stevesk@cvs.openbsd.org 2002/08/29 19:49:42
924 [ssh.c]
925 shrink initial privilege bracket for setuid case; ok markus@
57ff5eeb 926 - stevesk@cvs.openbsd.org 2002/08/29 22:54:10
927 [ssh_config.5 sshd_config.5]
928 state XAuthLocation is a full pathname
954640a4 929
b85698ab 93020020820
931 - OpenBSD CVS Sync
932 - millert@cvs.openbsd.org 2002/08/02 14:43:15
933 [monitor.c monitor_mm.c]
934 Change mm_zalloc() sanity checks to be more in line with what
935 we do in calloc() and add a check to monitor_mm.c.
936 OK provos@ and markus@
6a342527 937 - marc@cvs.openbsd.org 2002/08/02 16:00:07
938 [ssh.1 sshd.8]
939 note that .ssh/environment is only read when
940 allowed (PermitUserEnvironment in sshd_config).
941 OK markus@
4004c2ac 942 - markus@cvs.openbsd.org 2002/08/02 21:23:41
943 [ssh-rsa.c]
944 diff is u_int (2x); ok deraadt/provos
0caf874a 945 - markus@cvs.openbsd.org 2002/08/02 22:20:30
946 [ssh-rsa.c]
947 replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser
948 for authentication; ok deraadt/djm
75cf7563 949 - aaron@cvs.openbsd.org 2002/08/08 13:50:23
950 [sshconnect1.c]
951 Use & to test if bits are set, not &&; markus@ ok.
d6097023 952 - stevesk@cvs.openbsd.org 2002/08/08 23:54:52
953 [auth.c]
954 typo in comment
36535ee6 955 - stevesk@cvs.openbsd.org 2002/08/09 17:21:42
956 [sshd_config.5]
957 use Op for mdoc conformance; from esr@golux.thyrsus.com
958 ok aaron@
b3641662 959 - stevesk@cvs.openbsd.org 2002/08/09 17:41:12
960 [sshd_config.5]
961 proxy vs. fake display
35453849 962 - stevesk@cvs.openbsd.org 2002/08/12 17:30:35
963 [ssh.1 sshd.8 sshd_config.5]
964 more PermitUserEnvironment; ok markus@
24794905 965 - stevesk@cvs.openbsd.org 2002/08/17 23:07:14
966 [ssh.1]
967 ForwardAgent has defaulted to no for over 2 years; be more clear here.
4dcbbeea 968 - stevesk@cvs.openbsd.org 2002/08/17 23:55:01
969 [ssh_config.5]
970 ordered list here
7d3b91a6 971 - (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assign
972 it to ULONG_MAX.
b85698ab 973
cd018561 97420020813
975 - (tim) [configure.ac] Display OpenSSL header/library version.
976 Patch by dtucker@zip.com.au
977
8a48a7ef 97820020731
979 - (bal) OpenBSD CVS Sync
980 - markus@cvs.openbsd.org 2002/07/24 16:11:18
981 [hostfile.c hostfile.h sshconnect.c]
982 print out all known keys for a host if we get a unknown host key,
983 see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4
984
985 the ssharp mitm tool attacks users in a similar way, so i'd like to
986 pointed out again:
987 A MITM attack is always possible if the ssh client prints:
988 The authenticity of host 'bla' can't be established.
989 (protocol version 2 with pubkey authentication allows you to detect
990 MITM attacks)
5cb5518b 991 - mouring@cvs.openbsd.org 2002/07/25 01:16:59
992 [sftp.c]
993 FallBackToRsh does not exist anywhere else. Remove it from here.
994 OK deraadt.
567a05bf 995 - markus@cvs.openbsd.org 2002/07/29 18:57:30
996 [sshconnect.c]
997 print file:line
f00bab84 998 - markus@cvs.openbsd.org 2002/07/30 17:03:55
999 [auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5]
1000 add PermitUserEnvironment (off by default!); from dot@dotat.at;
1001 ok provos, deraadt
8a48a7ef 1002
13979d47 100320020730
1004 - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de
1005
d228d9dd 100620020728
1007 - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar
16c4a972 1008 - (stevesk) [CREDITS] solar
75131bbd 1009 - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned
1010 char arg.
d228d9dd 1011
d40af5fa 101220020725
1013 - (djm) Remove some cruft from INSTALL
d91b4743 1014 - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/
d40af5fa 1015
56b54901 101620020723
1017 - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger.
918ffb0b 1018 - (bal) sync ID w/ ssh-agent.c
516f0d7d 1019 - (bal) OpenBSD Sync
1020 - markus@cvs.openbsd.org 2002/07/19 15:43:33
1021 [log.c log.h session.c sshd.c]
1022 remove fatal cleanups after fork; based on discussions with and code
1023 from solar.
5d185586 1024 - stevesk@cvs.openbsd.org 2002/07/19 17:42:40
1025 [ssh.c]
1026 display a warning from ssh when XAuthLocation does not exist or xauth
1027 returned no authentication data. ok markus@
30998af1 1028 - stevesk@cvs.openbsd.org 2002/07/21 18:32:20
1029 [auth-options.c]
1030 unneeded includes
dbc728ff 1031 - stevesk@cvs.openbsd.org 2002/07/21 18:34:43
1032 [auth-options.h]
1033 remove invalid comment
97686bf9 1034 - markus@cvs.openbsd.org 2002/07/22 11:03:06
1035 [session.c]
1036 fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors;
d341742a 1037 - stevesk@cvs.openbsd.org 2002/07/22 17:32:56
1038 [monitor.c]
1039 u_int here; ok provos@
67f04db1 1040 - stevesk@cvs.openbsd.org 2002/07/23 16:03:10
1041 [sshd.c]
1042 utmp_len is unsigned; display error consistent with other options.
1043 ok markus@
0df3a240 1044 - stevesk@cvs.openbsd.org 2002/07/15 17:15:31
1045 [uidswap.c]
1046 little more debugging; ok markus@
d341742a 1047
21c2c5cd 104820020722
1049 - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk
a93bd14c 1050 - (stevesk) [xmmap.c] missing prototype for fatal()
ccbb983c 1051 - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync
1052 with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com.
d262b7f2 1053 - (bal) [configure.ac] Missing ;; from cray patch.
30eab01d 1054 - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines
1055 into it's own header.
ee48c949 1056 - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be
1057 freed by the caller; add free_pam_environment() and use it.
1d3f4ae7 1058 - (stevesk) [auth-pam.c] typo in comment
21c2c5cd 1059
b992432e 106020020721
1061 - (stevesk) [auth-pam.c] merge cosmetic changes from solar's
1062 openssh-3.4p1-owl-password-changing.diff
277f55cf 1063 - (stevesk) [auth-pam.c] merge rest of solar's PAM patch;
1064 PAM_NEW_AUTHTOK_REQD remains in #if 0 for now.
f7808a93 1065 - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch
1066 warning on pam_conv struct conversation function.
337dde6b 1067 - (stevesk) [auth-pam.h] license
8565f28e 1068 - (stevesk) [auth-pam.h] unneeded include
e9b2c23d 1069 - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h
b992432e 1070
ce88d9df 107120020720
1072 - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng().
1073
4379c0e5 107420020719
1075 - (tim) [contrib/solaris/buildpkg.sh] create privsep user/group if needed.
1076 Patch by dtucker@zip.com.au
f75ca46d 1077 - (tim) [configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au
4379c0e5 1078
45491100 107920020718
1080 - (tim) [defines.h] Bug 313 patch by dirk.meyer@dinoex.sub.org
1081 - (tim) [monitor_mm.c] add missing declaration for xmmap(). Reported
1082 by ayamura@ayamura.org
1cbbe6c8 1083 - (tim) [configure.ac] Bug 267 rework int64_t test.
5749e709 1084 - (tim) [includes.h] Bug 267 add stdint.h
45491100 1085
dd3943d0 108620020717
1087 - (bal) aixbff package updated by dtucker@zip.com.au
2bf42e4a 1088 - (tim) [configure.ac] change how we do paths in AC_PATH_PROGS tests
1089 for autoconf 2.53. Based on a patch by jrj@purdue.edu
dd3943d0 1090
8fc47887 109120020716
1092 - (tim) [contrib/solaris/opensshd.in] Only kill sshd if .pid file found
1093
c750d869 109420020715
1095 - (bal) OpenBSD CVS Sync
1096 - itojun@cvs.openbsd.org 2002/07/12 13:29:09
1097 [sshconnect.c]
1098 print connect failure during debugging mode.
a2f883ce 1099 - markus@cvs.openbsd.org 2002/07/12 15:50:17
1100 [cipher.c]
1101 EVP_CIPH_CUSTOM_IV for our own rijndael
2d199535 1102 - (bal) Remove unused tty defined in do_setusercontext() pointed out by
1103 dtucker@zip.com.au plus a a more KNF since I am near it.
846be3f4 1104 - (bal) Privsep user creation support in Solaris buildpkg.sh by
1105 dtucker@zip.com.au
c750d869 1106
798c5808 110720020714
1108 - (tim) [Makefile.in] replace "id sshd" with "sshd -t"
4165b82e 1109 - (bal/tim) [acconfig.h configure.ac monitor_mm.c servconf.c
1110 openbsd-compat/Makefile.in] support compression on platforms that
1111 have no/broken MAP_ANON. Moved code to openbsd-compat/xmmap.c
1112 Based on patch from nalin@redhat.com of code extracted from Owl's package
5fd8087a 1113 - (tim) [ssh_prng_cmds.in] Bug 323 arp -n flag doesn't exist under Solaris.
1114 report by chris@by-design.net
fdebdd4f 1115 - (tim) [loginrec.c] Bug 347: Fix typo (WTMPX_FILE) report by rodney@bond.net
d80063fe 1116 - (tim) [loginrec.c] Bug 348: add missing found = 1; to wtmpx_islogin()
1117 report by rodney@bond.net
798c5808 1118
6b2a3595 111920020712
1120 - (tim) [Makefile.in] quiet down install-files: and check-user:
3085601b 1121 - (tim) [configure.ac] remove unused filepriv line
6b2a3595 1122
249f9903 112320020710
1124 - (tim) [contrib/cygwin/ssh-host-config] explicitely sets the permissions
1125 on /var/empty to 755 Patch by vinschen@redhat.com
6f901f8e 1126 - (bal) OpenBSD CVS Sync
1127 - itojun@cvs.openbsd.org 2002/07/09 11:56:50
1128 [sshconnect.c]
1129 silently try next address on connect(2). markus ok
59c825e1 1130 - itojun@cvs.openbsd.org 2002/07/09 11:56:27
1131 [canohost.c]
1132 suppress log on reverse lookup failiure, as there's no real value in
1133 doing so.
1134 markus ok
aab5431b 1135 - itojun@cvs.openbsd.org 2002/07/09 12:04:02
1136 [sshconnect.c]
1137 ed static function (less warnings)
94ad46d1 1138 - stevesk@cvs.openbsd.org 2002/07/09 17:46:25
1139 [sshd_config.5]
1140 clarify no preference ordering in protocol list; ok markus@
9bd68577 1141 - itojun@cvs.openbsd.org 2002/07/10 10:28:15
1142 [sshconnect.c]
1143 bark if all connection attempt fails.
09683edf 1144 - deraadt@cvs.openbsd.org 2002/07/10 17:53:54
1145 [rijndael.c]
1146 use right sizeof in memcpy; markus ok
249f9903 1147
e6f15ed1 114820020709
1149 - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platforms
1150 lacking that concept can share it. Patch by vinschen@redhat.com
1151
4f9d6706 115220020708
1153 - (tim) [openssh/contrib/solaris/buildpkg.sh] add PKG_INSTALL_ROOT to
1154 work in a jumpstart environment. patch by kbrint@rufus.net
b451e27b 1155 - (tim) [Makefile.in] workaround for broken pakadd on some systems.
cda1ebcb 1156 - (tim) [configure.ac] fix libc89 utimes test. Mention default path for
1157 --with-privsep-path=
4f9d6706 1158
ac74561e 115920020707
1160 - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH)
94d8258b 1161 - (tim) [acconfig.h configure.ac sshd.c]
1162 s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/
d41f8eed 1163 - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes
1164 patch from vinschen@redhat.com
0b832146 1165 - (bal) [realpath.c] Updated with OpenBSD tree.
da2499f5 1166 - (bal) OpenBSD CVS Sync
1167 - deraadt@cvs.openbsd.org 2002/07/04 04:15:33
1168 [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c]
1169 patch memory leaks; grendel@zeitbombe.org
e1feb9bf 1170 - deraadt@cvs.openbsd.org 2002/07/04 08:12:15
1171 [channels.c packet.c]
1172 blah blah minor nothing as i read and re-read and re-read...
eb9f2fab 1173 - markus@cvs.openbsd.org 2002/07/04 10:41:47
1174 [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c]
1175 don't allocate, copy, and discard if there is not interested in the data;
1176 ok deraadt@
4394a17f 1177 - deraadt@cvs.openbsd.org 2002/07/06 01:00:49
1178 [log.c]
1179 KNF
50d2fbbc 1180 - deraadt@cvs.openbsd.org 2002/07/06 01:01:26
1181 [ssh-keyscan.c]
1182 KNF, realloc fix, and clean usage
12a3f2c3 1183 - stevesk@cvs.openbsd.org 2002/07/06 17:47:58
1184 [ssh-keyscan.c]
1185 unused variable
41545cb6 1186 - (bal) Minor KNF on ssh-keyscan.c
ac74561e 1187
0764e748 118820020705
1189 - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs.
1190 Reported by Darren Tucker <dtucker@zip.com.au>
e12659f4 1191 - (tim) [contrib/cygwin/ssh-host-config] double slash corrction
1192 from vinschen@redhat.com
0764e748 1193
64c0ce80 119420020704
1195 - (bal) Limit data to TTY for AIX only (Newer versions can't handle the
1196 faster data rate) Bug #124
375c1dee 1197 - (bal) glob.c defines TILDE and AIX also defines it. #undef it first.
1198 bug #265
ff2de800 1199 - (bal) One too many nulls in ports-aix.c
64c0ce80 1200
d2f95449 120120020703
1202 - (bal) Updated contrib/cygwin/ patch by vinschen@redhat.com
619a6aff 1203 - (bal) minor correction to utimes() replacement. Patch by
1204 onoe@sm.sony.co.jp
f11fe301 1205 - OpenBSD CVS Sync
1206 - markus@cvs.openbsd.org 2002/06/27 08:49:44
1207 [dh.c ssh-keyscan.c sshconnect.c]
1208 more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@
181d6635 1209 - deraadt@cvs.openbsd.org 2002/06/27 09:08:00
1210 [monitor.c]
1211 improve mm_zalloc check; markus ok
30e37ee6 1212 - deraadt@cvs.openbsd.org 2002/06/27 10:35:47
1213 [auth2-none.c monitor.c sftp-client.c]
1214 use xfree()
c8f94200 1215 - stevesk@cvs.openbsd.org 2002/06/27 19:49:08
1216 [ssh-keyscan.c]
1217 use convtime(); ok markus@
a64d3560 1218 - millert@cvs.openbsd.org 2002/06/28 01:49:31
1219 [monitor_mm.c]
1220 tree(3) wants an int return value for its compare functions and
1221 the difference between two pointers is not an int. Just do the
1222 safest thing and store the result in a long and then return 0,
1223 -1, or 1 based on that result.
405a0d43 1224 - deraadt@cvs.openbsd.org 2002/06/28 01:50:37
1225 [monitor_wrap.c]
1226 use ssize_t
4efd85b2 1227 - deraadt@cvs.openbsd.org 2002/06/28 10:08:25
1228 [sshd.c]
1229 range check -u option at invocation
6ded293b 1230 - deraadt@cvs.openbsd.org 2002/06/28 23:05:06
1231 [sshd.c]
1232 gidset[2] -> gidset[1]; markus ok
7fdc56c5 1233 - deraadt@cvs.openbsd.org 2002/06/30 21:54:16
1234 [auth2.c session.c sshd.c]
1235 lint asks that we use names that do not overlap
343288b8 1236 - deraadt@cvs.openbsd.org 2002/06/30 21:59:45
1237 [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c
1238 monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c
1239 sshconnect2.c sshd.c]
1240 minor KNF
7d60d74c 1241 - deraadt@cvs.openbsd.org 2002/07/01 16:15:25
1242 [msg.c]
1243 %u
713f6cd9 1244 - markus@cvs.openbsd.org 2002/07/01 19:48:46
1245 [sshconnect2.c]
1246 for compression=yes, we fallback to no-compression if the server does
1247 not support compression, vice versa for compression=no. ok mouring@
261189cc 1248 - markus@cvs.openbsd.org 2002/07/03 09:55:38
1249 [ssh-keysign.c]
1250 use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld)
1251 in order to avoid a possible Kocher timing attack pointed out by Charles
1252 Hannum; ok provos@
60cd0a97 1253 - markus@cvs.openbsd.org 2002/07/03 14:21:05
1254 [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config]
1255 re-enable ssh-keysign's sbit, but make ssh-keysign read
1256 /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled
1257 globally. based on discussions with deraadt, itojun and sommerfeld;
1258 ok itojun@
56fd97d7 1259 - (bal) Failed password attempts don't increment counter on AIX. Bug #145
e8aa0a5c 1260 - (bal) Missed Makefile.in change. keysign needs readconf.o
0ba40daa 1261 - (bal) Clean up aix_usrinfo(). Ignore TTY= period I guess.
56fd97d7 1262
b2f295dc 126320020702
1264 - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc &
1265 friends consistently. Spotted by Solar Designer <solar@openwall.com>
1266
3c3e878a 126720020629
1268 - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style
1269 clean up while I'm near it.
1270
811ee370 127120020628
1272 - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented
1273 options should contain default value. from solar.
b9b82dab 1274 - (bal) Cygwin uid0 fix by vinschen@redhat.com
17962c40 1275 - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c. Otherwise wise
1276 have issues of our fixes not propogating right (ie bcopy instead of
1277 memmove). OK tim
4fa4fb00 1278 - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported.
1279 Bug #303
811ee370 1280
ce88d9df 128120020627
d1ff09ba 1282 - OpenBSD CVS Sync
1283 - deraadt@cvs.openbsd.org 2002/06/26 14:49:36
1284 [monitor.c]
1285 correct %u
63b5f1a1 1286 - deraadt@cvs.openbsd.org 2002/06/26 14:50:04
1287 [monitor_fdpass.c]
1288 use ssize_t for recvmsg() and sendmsg() return
1431a900 1289 - markus@cvs.openbsd.org 2002/06/26 14:51:33
1290 [ssh-add.c]
1291 fix exit code for -X/-x
bb0640b2 1292 - deraadt@cvs.openbsd.org 2002/06/26 15:00:32
1293 [monitor_wrap.c]
1294 more %u
20e79e98 1295 - markus@cvs.openbsd.org 2002/06/26 22:27:32
1296 [ssh-keysign.c]
1297 bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu
d1ff09ba 1298
4bfa8bb6 129920020626
1300 - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM
a594fa74 1301 - (bal) OpenBSD CVS Sync
1302 - markus@cvs.openbsd.org 2002/06/23 21:34:07
1303 [channels.c]
1304 tcode is u_int
38501509 1305 - markus@cvs.openbsd.org 2002/06/24 13:12:23
1306 [ssh-agent.1]
1307 the socket name contains ssh-agent's ppid; via mpech@ from form@
f91d9a89 1308 - markus@cvs.openbsd.org 2002/06/24 14:33:27
1309 [channels.c channels.h clientloop.c serverloop.c]
1310 move channel counter to u_int
1169c3df 1311 - markus@cvs.openbsd.org 2002/06/24 14:55:38
1312 [authfile.c kex.c ssh-agent.c]
1313 cat to (void) when output from buffer_get_X is ignored
09915dc1 1314 - itojun@cvs.openbsd.org 2002/06/24 15:49:22
1315 [msg.c]
1316 printf type pedant
d0a1c5d1 1317 - deraadt@cvs.openbsd.org 2002/06/24 17:57:20
1318 [sftp-server.c sshpty.c]
1319 explicit (u_int) for uid and gid
6c69a6a9 1320 - markus@cvs.openbsd.org 2002/06/25 16:22:42
1321 [authfd.c]
1322 unnecessary cast
87809a1f 1323 - markus@cvs.openbsd.org 2002/06/25 18:51:04
1324 [sshd.c]
1325 lightweight do_setusercontext after chroot()
924681ee 1326 - (bal) Updated AIX package build. Patch by dtucker@zip.com.au
46c8ebb3 1327 - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8
78beb77d 1328 - (bal) added back in error check for mmap(). I screwed up, Pointed
1329 out by stevesk@
f2d9a1f8 1330 - (tim) [README.privsep] UnixWare tip no longer needed.
88cb875c 1331 - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP,
1332 but it all damned lies.
0d0270e6 1333 - (stevesk) [README.privsep] more for sshd pseudo-account.
8029e7fc 1334 - (tim) [contrib/caldera/openssh.spec] add support for privsep
8695f9f7 1335 - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@
b29fe4ea 1336 - (djm) OpenBSD CVS Sync
1337 - markus@cvs.openbsd.org 2002/06/26 08:53:12
1338 [bufaux.c]
1339 limit size of BNs to 8KB; ok provos/deraadt
22d62d31 1340 - markus@cvs.openbsd.org 2002/06/26 08:54:18
1341 [buffer.c]
1342 limit append to 1MB and buffers to 10MB
5df8c731 1343 - markus@cvs.openbsd.org 2002/06/26 08:55:02
1344 [channels.c]
1345 limit # of channels to 10000
87f18810 1346 - markus@cvs.openbsd.org 2002/06/26 08:58:26
1347 [session.c]
1348 limit # of env vars to 1000; ok deraadt/djm
2f095a0e 1349 - deraadt@cvs.openbsd.org 2002/06/26 13:20:57
1350 [monitor.c]
1351 be careful in mm_zalloc
66087567 1352 - deraadt@cvs.openbsd.org 2002/06/26 13:49:26
1353 [session.c]
1354 disclose less information from environment files; based on input
1355 from djm, and dschultz@uclink.Berkeley.EDU
477edc5d 1356 - markus@cvs.openbsd.org 2002/06/26 13:55:37
1357 [auth2-chall.c]
1358 make sure # of response matches # of queries, fixes int overflow;
1359 from ISS
03b14b6f 1360 - markus@cvs.openbsd.org 2002/06/26 13:56:27
1361 [version.h]
1362 3.4
9c696d0d 1363 - (djm) Require krb5 devel for RPM build w/ KrbV
c4186be7 1364 - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai
1365 <nalin@redhat.com>
1e7bc74c 1366 - (djm) Update spec files for release
49b53b03 1367 - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS
03b14b6f 1368 - (djm) Release 3.4p1
6519cfd6 1369 - (tim) [contrib/caldera/openssh.spec] remove 2 configure options I put in
1370 by mistake
4bfa8bb6 1371
ef1ac12b 137220020625
1373 - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh
1a44c6f7 1374 - (stevesk) [README.privsep] minor updates
fd3cbf67 1375 - (djm) Create privsep directory and warn if privsep user is missing
1376 during make install
702b2855 1377 - (bal) Started list of PrivSep issues in TODO
1c6249af 1378 - (bal) if mmap() is substandard, don't allow compression on server side.
1379 Post 'event' we will add more options.
cbaa3d44 1380 - (tim) [contrib/caldera/openssh.spec] Sync with Caldera
e2bc41f9 1381 - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by
1382 dtucker@zip.com.au
d170feb1 1383 - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus
1384 for Cygwin, Cray, & SCO
ef1ac12b 1385
d5803314 138620020624
1387 - OpenBSD CVS Sync
1388 - deraadt@cvs.openbsd.org 2002/06/23 03:25:50
1389 [tildexpand.c]
1390 KNF
3ddc795d 1391 - deraadt@cvs.openbsd.org 2002/06/23 03:26:19
1392 [cipher.c key.c]
1393 KNF
d6133f43 1394 - deraadt@cvs.openbsd.org 2002/06/23 03:30:58
1395 [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c
1396 sshpty.c]
1397 various KNF and %d for unsigned
9906a836 1398 - deraadt@cvs.openbsd.org 2002/06/23 09:30:14
1399 [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c
1400 sftp.c]
1401 bunch of u_int vs int stuff
512df038 1402 - deraadt@cvs.openbsd.org 2002/06/23 09:39:55
1403 [ssh-keygen.c]
1404 u_int stuff
7528d467 1405 - deraadt@cvs.openbsd.org 2002/06/23 09:46:51
1406 [bufaux.c servconf.c]
1407 minor KNF. things the fingers do while you read
e424e241 1408 - deraadt@cvs.openbsd.org 2002/06/23 10:29:52
1409 [ssh-agent.c sshd.c]
1410 some minor KNF and %u
7138ebd9 1411 - deraadt@cvs.openbsd.org 2002/06/23 20:39:45
1412 [session.c]
1413 compression_level is u_int
f09ce20a 1414 - deraadt@cvs.openbsd.org 2002/06/23 21:06:13
1415 [sshpty.c]
1416 KNF
57f228e8 1417 - deraadt@cvs.openbsd.org 2002/06/23 21:06:41
1418 [channels.c channels.h session.c session.h]
1419 display, screen, row, col, xpixel, ypixel are u_int; markus ok
0bc50167 1420 - deraadt@cvs.openbsd.org 2002/06/23 21:10:02
1421 [packet.c]
1422 packet_get_int() returns unsigned for reason & seqnr
57f228e8 1423 - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col,
1424 xpixel are u_int.
1425
d5803314 1426
58177c0a 142720020623
1428 - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX.
dc43acd2 1429 - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset.
ef3912be 1430 - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au
a8bbdc75 1431 - OpenBSD CVS Sync
1432 - stevesk@cvs.openbsd.org 2002/06/22 02:00:29
1433 [ssh.h]
1434 correct comment
1ae02182 1435 - stevesk@cvs.openbsd.org 2002/06/22 02:40:23
1436 [ssh.1]
1437 section 5 not 4 for ssh_config
b2843ec6 1438 - naddy@cvs.openbsd.org 2002/06/22 11:51:39
1439 [ssh.1]
1440 typo
75653d3e 1441 - stevesk@cvs.openbsd.org 2002/06/22 16:32:54
1442 [sshd.8]
1443 add /var/empty in FILES section
a56313d7 1444 - stevesk@cvs.openbsd.org 2002/06/22 16:40:19
1445 [sshd.c]
1446 check /var/empty owner mode; ok provos@
e4e83d70 1447 - stevesk@cvs.openbsd.org 2002/06/22 16:41:57
1448 [scp.1]
1449 typo
baa08b92 1450 - stevesk@cvs.openbsd.org 2002/06/22 16:45:29
1451 [ssh-agent.1 sshd.8 sshd_config.5]
1452 use process ID vs. pid/PID/process identifier
c28876e9 1453 - stevesk@cvs.openbsd.org 2002/06/22 20:05:27
1454 [sshd.c]
1455 don't call setsid() if debugging or run from inetd; no "Operation not
1456 permitted" errors now; ok millert@ markus@
d17ef027 1457 - stevesk@cvs.openbsd.org 2002/06/22 23:09:51
1458 [monitor.c]
1459 save auth method before monitor_reset_key_state(); bugzilla bug #284;
1460 ok provos@
58177c0a 1461
0b202697 1462$Id$
This page took 0.522544 seconds and 5 git commands to generate.