]> andersk Git - openssh.git/blame - ChangeLog
- (bal) The days of lack of int64_t support are over. Sorry kids.
[openssh.git] / ChangeLog
CommitLineData
9c4cd3ef 120030320
2 - (djm) OpenBSD CVS Sync
3 - markus@cvs.openbsd.org 2003/03/17 10:38:38
4 [progressmeter.c]
5 don't print \n if backgrounded; from ho@
57f5c15b 6 - markus@cvs.openbsd.org 2003/03/17 11:43:47
7 [version.h]
8 enter 3.6
85abc74b 9 - (bal) The days of lack of int64_t support are over. Sorry kids.
9c4cd3ef 10
5271b55c 1120030318
12 - (tim) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
13 add nanosleep(). testing/corrections by Darren Tucker <dtucker@zip.com.au>
14
d8eb5247 1520030317
16 - (djm) Fix return value checks for RAND_bytes. Report from
17 Steve G <linux_4ever@yahoo.com>
18
15e98f49 1920030315
20 - (djm) OpenBSD CVS Sync
21 - markus@cvs.openbsd.org 2003/03/13 11:42:19
22 [authfile.c ssh-keysign.c]
23 move RSA_blinding_on to generic key load method
cb0e1d67 24 - markus@cvs.openbsd.org 2003/03/13 11:44:50
25 [ssh-agent.c]
26 ssh-agent is similar to ssh-keysign (allows other processes to use
27 private rsa keys). however, it gets key over socket and not from
28 a file, so we have to do blinding here as well.
15e98f49 29
3e2f2431 3020030310
31- (djm) OpenBSD CVS Sync
32 - markus@cvs.openbsd.org 2003/03/05 22:33:43
33 [channels.c monitor.c scp.c session.c sftp-client.c sftp-int.c]
34 [sftp-server.c ssh-add.c sshconnect2.c]
35 fix memory leaks; from dlheine@suif.Stanford.EDU/CLOUSEAU; ok djm@
6cef88bc 36 - (djm) One more portable-specific one from dlheine@suif.Stanford.EDU/
37 CLOUSEAU
6ecd00f8 38 - (djm) Bug #245: TTY problems on Solaris. Fix by stevesk@ and
39 dtucker@zip.com.au
21e3ecaf 40 - (djm) AIX package builder update from dtucker@zip.com.au
3e2f2431 41
3a082d0a 4220030225
43 - (djm) Fix some compile errors spotted by dtucker and his fabulous
44 tinderbox
45
b2d033b4 4620030224
47 - (djm) Tweak gnome-ssh-askpass2:
48 - Retry kb and mouse grab a couple of times, so passphrase dialog doesn't
49 immediately fail if you are doing something else when it appears (e.g.
50 dragging a window)
51 - Perform server grab after we have the keyboard and/or pointer to avoid
52 races.
5f021474 53 - (djm) OpenBSD CVS Sync
54 - markus@cvs.openbsd.org 2003/01/27 17:06:31
55 [sshd.c]
56 more specific error message when /var/empty has wrong permissions;
57 bug #46, map@appgate.com; ok henning@, provos@, stevesk@
bd9f564f 58 - markus@cvs.openbsd.org 2003/01/28 16:11:52
59 [scp.1]
60 document -l; pekkas@netcore.fi
00019895 61 - stevesk@cvs.openbsd.org 2003/01/28 17:24:51
62 [scp.1]
63 remove example not pertinent with -1 addition; ok markus@
6691e41b 64 - jmc@cvs.openbsd.org 2003/01/31 21:54:40
65 [sshd.8]
66 typos; sshd(8): help and ok markus@
67 help and ok millert@
0ec7661a 68 - markus@cvs.openbsd.org 2003/02/02 10:51:13
69 [scp.c]
70 call okname() only when using system(3) for remote-remote copy;
71 fixes bugs #483, #472; ok deraadt@, mouring@
eed8e583 72 - markus@cvs.openbsd.org 2003/02/02 10:56:08
73 [kex.c]
74 add support for key exchange guesses; based on work by
75 avraham.fraenkel@commatch.com; fixes bug #148; ok deraadt@
d6dc3576 76 - markus@cvs.openbsd.org 2003/02/03 08:56:16
77 [sshpty.c]
78 don't call error() for readonly /dev; from soekris list; ok mcbride,
79 henning, deraadt.
79cfe67c 80 - markus@cvs.openbsd.org 2003/02/04 09:32:08
81 [key.c]
82 better debug3 message
6d6c25e3 83 - markus@cvs.openbsd.org 2003/02/04 09:33:22
84 [monitor.c monitor_wrap.c]
85 skey/bsdauth: use 0 to indicate failure instead of -1, because
86 the buffer API only supports unsigned ints.
d718e75d 87 - markus@cvs.openbsd.org 2003/02/05 09:02:28
88 [readconf.c]
89 simplify ProxyCommand parsing, remove strcat/xrealloc; ok henning@, djm@
381b021b 90 - markus@cvs.openbsd.org 2003/02/06 09:26:23
91 [session.c]
92 missing call to setproctitle() after authentication; ok provos@
f78bde70 93 - markus@cvs.openbsd.org 2003/02/06 09:27:29
94 [ssh.c ssh_config.5]
95 support 'ProxyCommand none'; bugzilla #433; binder@arago.de; ok djm@
f2f28f1f 96 - markus@cvs.openbsd.org 2003/02/06 09:29:18
97 [sftp-server.c]
98 fix races in rename/symlink; from Tony Finch; ok djm@
5d47f1d4 99 - markus@cvs.openbsd.org 2003/02/06 21:22:43
100 [auth1.c auth2.c]
101 undo broken fix for #387, fixes #486
f7272340 102 - markus@cvs.openbsd.org 2003/02/10 11:51:47
103 [ssh-add.1]
104 xref sshd_config.5 (not sshd.8); mark@summersault.com; bug #490
2a79da70 105 - markus@cvs.openbsd.org 2003/02/12 09:33:04
106 [key.c key.h ssh-dss.c ssh-rsa.c]
107 merge ssh-dss.h ssh-rsa.h into key.h; ok deraadt@
770432dd 108 - markus@cvs.openbsd.org 2003/02/12 21:39:50
109 [crc32.c crc32.h]
110 replace crc32.c with a BSD licensed version; noted by David Turner
98a58eda 111 - markus@cvs.openbsd.org 2003/02/16 17:09:57
112 [kex.c kexdh.c kexgex.c kex.h sshconnect2.c sshd.c ssh-keyscan.c]
113 split kex into client and server code, no need to link
114 server code into the client; ok provos@
92e15201 115 - markus@cvs.openbsd.org 2003/02/16 17:30:33
116 [monitor.c monitor_wrap.c]
117 fix permitrootlogin forced-commands-only for privsep; bux #387;
118 ok provos@
34934506 119 - markus@cvs.openbsd.org 2003/02/21 09:05:53
120 [servconf.c]
121 print sshd_config filename in debug2 mode.
98a0a51a 122 - mpech@cvs.openbsd.org 2003/02/21 10:34:48
123 [auth-krb4.c]
124 ...sizeof(&adat.session) is not good here.
125 henning@, deraadt@, millert@
bb102e8e 126 - (djm) Add new object files to Makefile and reorder
4a35ae8b 127 - (djm) Bug #501: gai_strerror should return char*;
128 fix from dtucker@zip.com.au
2731632a 129 - (djm) Most of Bug #499: Cygwin compile fixes for new progressmeter;
130 From vinschen@redhat.com
2d0c443a 131 - (djm) Rest of Bug #499: Import a basename() function from OpenBSD libc
2731632a 132 - (djm) Bug #494: Allow multiple accounts on Windows 9x/Me;
133 From vinschen@redhat.com
19160674 134 - (djm) Bug #456: Support for NEC SX6 with Unicos; from wendyp@cray.com
b2d033b4 135
a52997bd 13620030211
137 - (djm) Cygwin needs libcrypt too. Patch from vinschen@redhat.com
138
ecc03386 13920030206
140 - (djm) Teach fake-getaddrinfo to use getservbyname() when provided a
141 string service name. Suggested by markus@, review by itojun@
142
ad137007 14320030131
144 - (bal) AIX 4.2.1 lacks nanosleep(). Patch to use nsleep() provided by
145 dtucker@zip.com.au
146
63ba3638 14720030130
148 - (djm) Unbreak root password auth. Spotted by dtucker@zip.com.au
149
92b1decf 150200301028
151 - (djm) Search libposix4 and librt for nanosleep. From dtucker@zip.com.au
152 and openssh-unix-dev@thewrittenword.com
153
96e85e17 154200301027
155 - (bal) Bugzilla 477 patch by wendyp@cray.com. Define TIOCGPGRP for
156 cray. Also removed test for tcgetpgrp in configure.ac since it
157 is no longer used.
158
1be697b6 15920030124
160 - (djm) OpenBSD CVS Sync
161 - jmc@cvs.openbsd.org 2003/01/23 08:58:47
162 [sshd_config.5]
163 typos; ok millert@
c4087616 164 - markus@cvs.openbsd.org 2003/01/23 13:50:27
165 [authfd.c authfd.h readpass.c ssh-add.1 ssh-add.c ssh-agent.c]
166 ssh-add -c, prompt user for confirmation (using ssh-askpass) when
167 private agent key is used; with djm@; test by dugsong@, djm@;
168 ok deraadt@
6ea3c52a 169 - markus@cvs.openbsd.org 2003/01/23 14:01:53
170 [scp.c]
171 bandwidth limitation patch (scp -l) from niels@; ok todd@, deraadt@
e6b15f23 172 - markus@cvs.openbsd.org 2003/01/23 14:06:15
173 [scp.1 scp.c]
174 scp -12; Sam Smith and others; ok provos@, deraadt@
c7578bb6 175 - (djm) Add TIMEVAL_TO_TIMESPEC macros
1be697b6 176
0df3cb2b 17720030123
178 - (djm) OpenBSD CVS Sync
179 - djm@cvs.openbsd.org 2003/01/23 00:03:00
180 [auth1.c]
181 Don't log TIS auth response; "get rid of it" - markus@
182
494b267f 18320030122
184 - (djm) OpenBSD CVS Sync
185 - marc@cvs.openbsd.org 2003/01/21 18:14:36
186 [ssh-agent.1 ssh-agent.c]
187 Add a -t life option to ssh-agent that set the default lifetime.
188 The default can still be overriden by using -t in ssh-add.
189 OK markus@
882a3870 190 - (djm) Reorganise PAM & SIA password handling to eliminate some common code
8582624b 191 - (djm) Sync regress with OpenBSD -current
494b267f 192
877c5ea2 19320030120
194 - (djm) Fix compilation for NetBSD from dtucker@zip.com.au
115dc20f 195 - (tim) [progressmeter.c] make compilers without long long happy.
21710e39 196 - (tim) [configure.ac] Add -belf to build ELF binaries on OpenServer 5 when
197 using cc. (gcc already did)
877c5ea2 198
5ed5468f 19920030118
200 - (djm) Revert fix for Bug #442 for now.
201
9e2b44f5 20220030117
203 - (djm) Bug #470: Detect strnvis, not strvis in configure.
204 From d_wllms@lanl.gov
205
280806cf 20620030116
207 - (djm) OpenBSD CVS Sync
208 - djm@cvs.openbsd.org 2003/01/16 03:41:55
209 [sftp-int.c]
210 explicitly use first glob result
211
33364f27 21220030114
213 - (djm) OpenBSD CVS Sync
214 - fgsch@cvs.openbsd.org 2003/01/10 23:23:24
215 [sftp-int.c]
216 typo; from Nils Nordman <nino at nforced dot com>.
083d2e97 217 - markus@cvs.openbsd.org 2003/01/11 18:29:43
218 [log.c]
219 set fatal_cleanups to NULL in fatal_remove_all_cleanups();
220 dtucker@zip.com.au
b7fd001f 221 - markus@cvs.openbsd.org 2003/01/12 16:57:02
222 [progressmeter.c]
223 allow WARNINGS=yes; ok djm@
c1e07c81 224 - djm@cvs.openbsd.org 2003/01/13 11:04:04
225 [sftp-int.c]
226 make cmds[] array static to avoid conflict with BSDI libc.
209d3126 227 mindrot bug #466. Fix from mdev@idg.nl; ok markus@
538840a2 228 - djm@cvs.openbsd.org 2003/01/14 10:58:00
229 [sftp-client.c sftp-int.c]
230 Don't try to upload or download non-regular files. Report from
231 apoloval@pantuflo.escet.urjc.es; ok markus@
33364f27 232
23320030113
e80fb2a0 234 - (djm) Rework openbsd-compat/setproctitle.c a bit: move emulation type
235 detection to configure.ac. Prompted by stevesk@
65a4b4af 236 - (djm) Bug #467: Add a --disable-strip option to turn off stripping of
237 installed binaries. From mdev@idg.nl
e80fb2a0 238
d0104542 23920030110
240 - (djm) Enable new setproctitle emulation for Linux, AIX and HP/UX. More
241 systems may be added later.
9a36208d 242 - (djm) OpenBSD CVS Sync
243 - djm@cvs.openbsd.org 2003/01/08 23:53:26
244 [sftp.1 sftp.c sftp-int.c sftp-int.h]
245 Cleanup error handling for batchmode
246 Allow blank lines and comments in input
247 Ability to suppress abort on error in batchmode ("-put blah")
248 Fixes mindrot bug #452; markus@ ok
b65c3807 249 - fgsch@cvs.openbsd.org 2003/01/10 08:19:07
c9c38b73 250 [scp.c sftp.1 sftp.c sftp-client.c sftp-int.c progressmeter.c]
251 [progressmeter.h]
b65c3807 252 sftp progress meter support.
253 original diffs by Nils Nordman <nino at nforced dot com> via
254 markus@, merged to -current by me, djm@ ok.
bf0bf24b 255 - djm@cvs.openbsd.org 2003/01/10 08:48:15
256 [sftp-client.c]
257 Simplify and avoid redundancy in packet send and receive
258 functions; ok fgs@
25a6efd8 259 - djm@cvs.openbsd.org 2003/01/10 10:29:35
260 [scp.c]
261 Don't ftruncate after write error, creating sparse files of
262 incorrect length
263 mindrot bug #403, reported by rusr@cup.hp.com; ok markus@
4940c411 264 - djm@cvs.openbsd.org 2003/01/10 10:32:54
265 [channels.c]
266 hush socket() errors, except last. Fixes mindrot bug #408; ok markus@
d0104542 267
7bb526ce 26820030108
269 - (djm) Sync openbsd-compat/ with OpenBSD -current
93c63b8d 270 - (djm) Avoid redundant xstrdup/xfree in auth2-pam.c. From Solar via markus@
faa483fa 271 - (djm) OpenBSD CVS Sync
272 - markus@cvs.openbsd.org 2003/01/01 18:08:52
273 [channels.c]
274 move big output buffer messages to debug2
bfd934b9 275 - djm@cvs.openbsd.org 2003/01/06 23:51:22
276 [sftp-client.c]
277 Fix "get -p" download to not add user-write perm. mindrot bug #426
278 reported by gfernandez@livevault.com; ok markus@
048ff12c 279 - fgsch@cvs.openbsd.org 2003/01/07 23:42:54
280 [sftp.1]
281 add version; from Nils Nordman <nino at nforced dot com> via markus@.
282 markus@ ok
c9c462e4 283 - (djm) Update README to reflect AIX's status as a well supported platform.
284 From dtucker@zip.com.au
c3690df3 285 - (tim) [Makefile.in configure.ac] replace fixpath with sed script. Patch
a2144d93 286 by Mo DeJong.
ad0279ff 287 - (tim) [auth.c] declare today at top of allowed_user() to keep
288 older compilers happy.
a2144d93 289 - (tim) [scp.c] make compilers without long long happy.
7bb526ce 290
e7ccd20d 29120030107
292 - (djm) Bug #401: Work around Linux breakage with IPv6 mapped addresses.
293 Based on fix from yoshfuji@linux-ipv6.org
e2ef2342 294 - (djm) Bug #442: Check for and deny access to accounts with locked
295 passwords. Patch from dtucker@zip.com.au
41b7cf42 296 - (djm) Bug #44: Use local mkstemp() rather than glibc's silly one. Fixes
70e7d0b0 297 Can't pass KRB4 TGT passing. Fix from: jan.iven@cern.ch
93a9a35a 298 - (djm) Fix Bug #442 for PAM case
ed05a983 299 - (djm) Bug #110: bogus error messages in lastlog_get_entry(). Fix based
300 on one by peak@argo.troja.mff.cuni.cz
63cada0a 301 - (djm) Bug #111: Run syslog and stderr logging through strnvis to eliminate
302 nasties. Report from peak@argo.troja.mff.cuni.cz
99f4fb69 303 - (djm) Bug #178: On AIX /etc/nologin wasnt't shown to users. Fix from
304 Ralf.Wenk@fh-karlsruhe.de and dtucker@zip.com.au
b57c8e20 305 - (djm) Fix my fix of the fix for the Bug #442 for PAM case. Spotted by
306 dtucker@zip.com.au. Reorder for clarity too.
e7ccd20d 307
9300be60 30820030103
309 - (djm) Bug #461: ssh-copy-id fails with no arguments. Patch from
310 cjwatson@debian.org
9746ee4b 311 - (djm) Bug #460: Filling utmp[x]->ut_addr_v6 if present. Patch from
312 cjwatson@debian.org
17ed08c5 313 - (djm) Bug #446: Set LOGIN env var to pw_name on AIX. Patch from
314 mii@ornl.gov
315
d4ac26ed 31620030101
317 - (stevesk) [session.c sshlogin.c sshlogin.h] complete portable
318 parts of pass addrlen with sockaddr * fix.
319 from Hajimu UMEMOTO <ume@FreeBSD.org>
320
378d9956 32120021222
322 - (bal) OpenBSD CVS Sync
323 - fgsch@cvs.openbsd.org 2002/11/15 10:03:09
324 [authfile.c]
325 lseek(2) may return -1 when getting the public/private key lenght.
326 Simplify the code and check for errors using fstat(2).
327
328 Problem reported by Mauricio Sanchez, markus@ ok.
3c93c917 329 - markus@cvs.openbsd.org 2002/11/18 16:43:44
330 [clientloop.c]
331 don't overwrite SIG{INT,QUIT,TERM} handler if set to SIG_IGN;
332 e.g. if ssh is used for backup; report Joerg Schilling; ok millert@
35efb24c 333 - markus@cvs.openbsd.org 2002/11/21 22:22:50
334 [dh.c]
335 debug->debug2
a77673cc 336 - markus@cvs.openbsd.org 2002/11/21 22:45:31
337 [cipher.c kex.c packet.c sshconnect.c sshconnect2.c]
338 debug->debug2, unify debug messages
b77a87e5 339 - deraadt@cvs.openbsd.org 2002/11/21 23:03:51
340 [auth-krb5.c auth1.c hostfile.h monitor_wrap.c sftp-client.c sftp-int.c ssh-add.c ssh-rsa.c
341 sshconnect.c]
342 KNF
556f1c05 343 - markus@cvs.openbsd.org 2002/11/21 23:04:33
83bbc162 344 [ssh.c]
345 debug->debug2
556f1c05 346 - stevesk@cvs.openbsd.org 2002/11/24 21:46:24
eef52fa7 347 [ssh-keysign.8]
348 typo: "the the"
6d58d81e 349 - wcobb@cvs.openbsd.org 2002/11/26 00:45:03
350 [scp.c ssh-keygen.c]
351 Remove unnecessary fflush(stderr) calls, stderr is unbuffered by default.
352 ok markus@
556f1c05 353 - stevesk@cvs.openbsd.org 2002/11/26 02:35:30
63baa058 354 [ssh-keygen.1]
355 remove outdated statement; ok markus@ deraadt@
649bb60b 356 - stevesk@cvs.openbsd.org 2002/11/26 02:38:54
357 [canohost.c]
358 KNF, comment and error message repair; ok markus@
15748b4d 359 - markus@cvs.openbsd.org 2002/11/27 17:53:35
360 [scp.c sftp.c ssh.c]
361 allow usernames with embedded '@', e.g. scp user@vhost@realhost:file /tmp;
362 http://bugzilla.mindrot.org/show_bug.cgi?id=447; ok mouring@, millert@
fe661d8f 363 - stevesk@cvs.openbsd.org 2002/12/04 04:36:47
364 [session.c]
365 remove xauth entries before add; PR 2994 from janjaap@stack.nl.
366 ok markus@
a0a14bcd 367 - markus@cvs.openbsd.org 2002/12/05 11:08:35
368 [scp.c]
369 use roundup() similar to rcp/util.c and avoid problems with strange
370 filesystem block sizes, noted by tjr@freebsd.org; ok djm@
556f1c05 371 - djm@cvs.openbsd.org 2002/12/06 05:20:02
2ea16b0b 372 [sftp.1]
373 Fix cut'n'paste error, spotted by matthias.riese@b-novative.de; ok deraadt@
978ebf99 374 - millert@cvs.openbsd.org 2002/12/09 16:50:30
375 [ssh.c]
376 Avoid setting optind to 0 as GNU getopt treats that like we do optreset.
377 markus@ OK
32214c88 378 - markus@cvs.openbsd.org 2002/12/10 08:56:00
379 [session.c]
380 Make sure $SHELL points to the shell from the password file, even if shell
381 is overridden from login.conf; bug#453; semen at online.sinor.ru; ok millert@
48f636b2 382 - markus@cvs.openbsd.org 2002/12/10 19:26:50
383 [packet.c]
384 move tos handling to packet_set_tos; ok provos/henning/deraadt
9e637910 385 - markus@cvs.openbsd.org 2002/12/10 19:47:14
386 [packet.c]
387 static
6226a8f8 388 - markus@cvs.openbsd.org 2002/12/13 10:03:15
389 [channels.c misc.c sshconnect2.c]
390 cleanup debug messages, more useful information for the client user.
556f1c05 391 - markus@cvs.openbsd.org 2002/12/13 15:20:52
392 [scp.c]
393 1) include stalling time in total time
394 2) truncate filenames to 45 instead of 20 characters
395 3) print rate instead of progress bar, no more stars
396 4) scale output to tty width
397 based on a patch from Niels; ok fries@ lebel@ fgs@ millert@
3075ac59 398 - (bal) [msg.c msg.h scp.c ssh-keysign.c sshconnect2.c] Resync CVS IDs since
399 we already did s/msg_send/ssh_msg_send/
378d9956 400
a76550cf 40120021205
402 - (djm) PERL-free fixpaths from stuge-openssh-unix-dev@cdy.org
403
d9a4e55b 40420021122
405 - (tim) [configure.ac] fix STDPATH test for IRIX. First reported by
406 advax@triumf.ca. This type of solution tested by <herb@sgi.com>
407
f825dbf4 40820021113
409 - (tim) [configure.ac] remove unused variables no_libsocket and no_libnsl
410
17d429bb 41120021111
412 - (tim) [contrib/solaris/opensshd.in] add umask 022 so sshd.pid is
413 not world writable.
414
c9826b28 41520021109
416 - (bal) OpenBSD CVS Sync
417 - itojun@cvs.openbsd.org 2002/10/16 14:31:48
418 [sftp-common.c]
419 64bit pedant. %llu is "unsigned long long". markus ok
2fe3c2db 420 - markus@cvs.openbsd.org 2002/10/23 10:32:13
421 [packet.c]
422 use %u for u_int
358b576b 423 - markus@cvs.openbsd.org 2002/10/23 10:40:16
424 [bufaux.c]
425 %u for u_int
f6f02456 426 - markus@cvs.openbsd.org 2002/11/04 10:07:53
427 [auth.c]
428 don't compare against pw_home if realpath fails for pw_home (seen
429 on AFS); ok djm@
2ccb7bde 430 - markus@cvs.openbsd.org 2002/11/04 10:09:51
431 [packet.c]
432 log before send disconnect; ok djm@
39e71188 433 - markus@cvs.openbsd.org 2002/11/05 19:45:20
434 [monitor.c]
435 handle overflows for size_t larger than u_int; siw@goneko.de, bug #425
9db1a8e9 436 - markus@cvs.openbsd.org 2002/11/05 20:10:37
437 [sftp-client.c]
438 typo; GaryF@livevault.com
51efad8c 439 - markus@cvs.openbsd.org 2002/11/07 16:28:47
440 [sshd.c]
441 log to stderr if -ie is given, bug #414, prj@po.cwru.edu
cc46e2ee 442 - markus@cvs.openbsd.org 2002/11/07 22:08:07
443 [readconf.c readconf.h ssh-keysign.8 ssh-keysign.c]
444 we cannot use HostbasedAuthentication for enabling ssh-keysign(8),
445 because HostbasedAuthentication might be enabled based on the
446 target host and ssh-keysign(8) does not know the remote hostname
447 and not trust ssh(1) about the hostname, so we add a new option
448 EnableSSHKeysign; ok djm@, report from zierke@informatik.uni-hamburg.de
252d1a24 449 - markus@cvs.openbsd.org 2002/11/07 22:35:38
450 [scp.c]
451 check exit status from ssh, and exit(1) if ssh fails; bug#369;
452 binder@arago.de
f00addc9 453 - (bal) Update ssh-host-config and minor rewrite of bsd-cygwin_util.c
454 ntsec now default if cygwin version beginning w/ version 56. Patch
455 by Corinna Vinschen <vinschen@redhat.com>
819d3f09 456 - (bal) AIX does not log login attempts for unknown users (bug #432).
457 patch by dtucker@zip.com.au
c9826b28 458
4e6f1c4f 45920021021
f0e27f3d 460 - (djm) Bug #400: Kill ssh-rand-helper children on timeout, patch from
461 dtucker@zip.com.au
cacd2e7a 462 - (djm) Bug #317: FreeBSD needs libutil.h for openpty() Report from
463 dirk.meyer@dinoex.sub.org
4e6f1c4f 464
f3e87063 46520021015
466 - (bal) Fix bug id 383 and only call loginrestrict for AIX if not root.
08412d26 467 - (bal) More advanced strsep test by Darren Tucker <dtucker@zip.com.au>
f3e87063 468
57872969 46920021015
470 - (tim) [contrib/caldera/openssh.spec] make ssh-agent setgid nobody
471
6af8f131 47220021004
473 - (bal) Disable post-authentication Privsep for OSF/1. It conflicts with
474 SIA.
475
e139021d 47620021003
477 - (djm) OpenBSD CVS Sync
478 - markus@cvs.openbsd.org 2002/10/01 20:34:12
479 [ssh-agent.c]
480 allow root to access the agent, since there is no protection from root.
886cd2bb 481 - markus@cvs.openbsd.org 2002/10/01 13:24:50
482 [version.h]
483 OpenSSH 3.5
0855868a 484 - (djm) Bump RPM spec version numbers
e987fdbe 485 - (djm) Bug #406: s/msg_send/ssh_msg_send/ for Mac OS X 1.2
e139021d 486
1d677676 48720020930
9a87e2ac 488 - (djm) Tidy contrib/, add Makefile for GNOME passphrase dialogs,
489 tweak README
490 - (djm) OpenBSD CVS Sync
491 - mickey@cvs.openbsd.org 2002/09/27 10:42:09
492 [compat.c compat.h sshd.c]
493 add a generic match for a prober, such as sie big brother;
494 idea from stevesk@; markus@ ok
05960cf0 495 - stevesk@cvs.openbsd.org 2002/09/27 15:46:21
496 [ssh.1]
497 clarify compression level protocol 1 only; ok markus@ deraadt@
1d677676 498
0d3d0e82 49920020927
500 - (djm) OpenBSD CVS Sync
501 - markus@cvs.openbsd.org 2002/09/25 11:17:16
502 [sshd_config]
503 sync LoginGraceTime with default
26b9a3d2 504 - markus@cvs.openbsd.org 2002/09/25 15:19:02
505 [sshd.c]
506 typo; pilot@monkey.org
2db9d8aa 507 - markus@cvs.openbsd.org 2002/09/26 11:38:43
508 [auth1.c auth.h auth-krb4.c monitor.c monitor.h monitor_wrap.c]
509 [monitor_wrap.h]
510 krb4 + privsep; ok dugsong@, deraadt@
0d3d0e82 511
b7c4a4cc 51220020925
513 - (bal) Fix issue where successfull login does not clear failure counts
514 in AIX. Patch by dtucker@zip.com.au ok by djm
ef51930f 515 - (tim) Cray fixes (bug 367) based on patch from Wendy Palm @ cray.
516 This does not include the deattack.c fixes.
b7c4a4cc 517
99443922 51820020923
519 - (djm) OpenBSD CVS Sync
520 - stevesk@cvs.openbsd.org 2002/09/23 20:46:27
521 [canohost.c]
522 change get_peer_ipaddr() and get_local_ipaddr() to not return NULL for
523 non-sockets; fixes a problem passing NULL to snprintf(). ok markus@
0082ad34 524 - markus@cvs.openbsd.org 2002/09/23 22:11:05
525 [monitor.c]
526 only call auth_krb5 if kerberos is enabled; ok deraadt@
4741e3a6 527 - markus@cvs.openbsd.org 2002/09/24 08:46:04
528 [monitor.c]
529 only call kerberos code for authctxt->valid
cb11b555 530 - todd@cvs.openbsd.org 2002/09/24 20:59:44
531 [sshd.8]
532 tweak the example $HOME/.ssh/rc script to not show on any cmdline the
533 sensitive data it handles. This fixes bug # 402 as reported by
534 kolya@mit.edu (Nickolai Zeldovich).
535 ok markus@ and stevesk@
99443922 536
aec4cb4f 53720020923
538 - (tim) [configure.ac] s/return/exit/ patch by dtucker@zip.com.au
539
f86b0eef 54020020922
541 - (djm) OpenBSD CVS Sync
542 - stevesk@cvs.openbsd.org 2002/09/19 14:53:14
543 [compat.c]
c7724abb 544 - markus@cvs.openbsd.org 2002/09/19 15:51:23
545 [ssh-add.c]
546 typo; cd@kalkatraz.de
00e842d8 547 - stevesk@cvs.openbsd.org 2002/09/19 16:03:15
548 [serverloop.c]
549 log IP address also; ok markus@
c2802d92 550 - stevesk@cvs.openbsd.org 2002/09/20 18:41:29
551 [auth.c]
552 log illegal user here for missing privsep case (ssh2).
553 this is executed in the monitor. ok markus@
f86b0eef 554
792e7d2d 55520020919
556 - (djm) OpenBSD CVS Sync
557 - stevesk@cvs.openbsd.org 2002/09/12 19:11:52
558 [ssh-agent.c]
559 %u for uid print; ok markus@
da0561eb 560 - stevesk@cvs.openbsd.org 2002/09/12 19:50:36
561 [session.c ssh.1]
562 add SSH_CONNECTION and deprecate SSH_CLIENT; bug #384. ok markus@
facfd613 563 - stevesk@cvs.openbsd.org 2002/09/13 19:23:09
564 [channels.c sshconnect.c sshd.c]
565 remove use of SO_LINGER, it should not be needed. error check
566 SO_REUSEADDR. fixup comments. ok markus@
8bd4e2ae 567 - stevesk@cvs.openbsd.org 2002/09/16 19:55:33
568 [session.c]
569 log when _PATH_NOLOGIN exists; ok markus@
e6fe1bab 570 - stevesk@cvs.openbsd.org 2002/09/16 20:12:11
571 [sshd_config.5]
572 more details on X11Forwarding security issues and threats; ok markus@
f1dcc34e 573 - stevesk@cvs.openbsd.org 2002/09/16 22:03:13
574 [sshd.8]
575 reference moduli(5) in FILES /etc/moduli.
5c0d0e90 576 - itojun@cvs.openbsd.org 2002/09/17 07:47:02
577 [channels.c]
578 don't quit while creating X11 listening socket.
579 http://mail-index.netbsd.org/current-users/2002/09/16/0005.html
580 got from portable. markus ok
6939bbd4 581 - djm@cvs.openbsd.org 2002/09/19 01:58:18
582 [ssh.c sshconnect.c]
583 bugzilla.mindrot.org #223 - ProxyCommands don't exit.
584 Patch from dtucker@zip.com.au; ok markus@
792e7d2d 585
4f3834e8 58620020912
eee2215e 587 - (djm) Made GNOME askpass programs return non-zero if cancel button is
588 pressed.
10a560d4 589 - (djm) Added getpeereid() replacement. Properly implemented for systems
590 with SO_PEERCRED support. Faked for systems which lack it.
9fd2a215 591 - (djm) Sync sys/tree.h with OpenBSD -current. Rename tree.h and
592 fake-queue.h to sys-tree.h and sys-queue.h
4f3834e8 593 - (djm) OpenBSD CVS Sync
594 - markus@cvs.openbsd.org 2002/09/08 20:24:08
595 [hostfile.h]
596 no comma at end of enumerator list
696f6bef 597 - itojun@cvs.openbsd.org 2002/09/09 06:48:06
598 [auth1.c auth.h auth-krb5.c monitor.c monitor.h]
599 [monitor_wrap.c monitor_wrap.h]
600 kerberos support for privsep. confirmed to work by lha@stacken.kth.se
601 patch from markus
661e45a0 602 - markus@cvs.openbsd.org 2002/09/09 14:54:15
603 [channels.c kex.h key.c monitor.c monitor_wrap.c radix.c uuencode.c]
604 signed vs unsigned from -pedantic; ok henning@
87f4111f 605 - markus@cvs.openbsd.org 2002/09/10 20:24:47
606 [ssh-agent.c]
607 check the euid of the connecting process with getpeereid(2);
608 ok provos deraadt stevesk
07d688d5 609 - stevesk@cvs.openbsd.org 2002/09/11 17:55:03
610 [ssh.1]
611 add agent and X11 forwarding warning text from ssh_config.5; ok markus@
8b10e20e 612 - stevesk@cvs.openbsd.org 2002/09/11 18:27:26
613 [authfd.c authfd.h ssh.c]
614 don't connect to agent to test for presence if we've previously
615 connected; ok markus@
00b3ad3e 616 - djm@cvs.openbsd.org 2002/09/11 22:41:50
617 [sftp.1 sftp-client.c sftp-client.h sftp-common.c sftp-common.h]
618 [sftp-glob.c sftp-glob.h sftp-int.c sftp-server.c]
619 support for short/long listings and globbing in "ls"; ok markus@
be0cd512 620 - djm@cvs.openbsd.org 2002/09/12 00:13:06
621 [sftp-int.c]
622 zap unused var introduced in last commit
4f3834e8 623
ac8802eb 62420020911
625 - (djm) Sync openbsd-compat with OpenBSD -current
626
e2e36358 62720020910
628 - (djm) Bug #365: Read /.ssh/environment properly under CygWin.
629 Patch from Mark Bradshaw <bradshaw@staff.crosswalk.com>
35c4faf5 630 - (djm) Bug #138: Make protocol 1 blowfish work with old OpenSSL.
631 Patch from Robert Halubek <rob@adso.com.pl>
e2e36358 632
3445ca02 63320020905
634 - (djm) OpenBSD CVS Sync
635 - stevesk@cvs.openbsd.org 2002/09/04 18:52:42
636 [servconf.c sshd.8 sshd_config.5]
637 default LoginGraceTime to 2m; 1m may be too short for slow systems.
638 ok markus@
cbecf1ed 639 - (djm) Merge openssh-TODO.patch from Redhat (null) beta
c4ee4c60 640 - (djm) Add gnome-ssh-askpass2.c (gtk2) by merge with patch from
641 Nalin Dahyabhai <nalin@redhat.com>
3c1dff28 642 - (djm) Add support for building gtk2 password requestor from Redhat beta
3445ca02 643
954640a4 64420020903
33e2e066 645 - (djm) Patch from itojun@ for Darwin OS: test getaddrinfo, reorder libcrypt
e18b7d35 646 - (djm) Fix Redhat RPM build dependancy test
954640a4 647 - (djm) OpenBSD CVS Sync
648 - markus@cvs.openbsd.org 2002/08/12 10:46:35
649 [ssh-agent.c]
650 make ssh-agent setgid, disallow ptrace.
755c4339 651 - espie@cvs.openbsd.org 2002/08/21 11:20:59
652 [sshd.8]
653 `RSA' updated to refer to `public key', where it matters.
654 okay markus@
6e0fbda1 655 - stevesk@cvs.openbsd.org 2002/08/21 19:38:06
656 [servconf.c sshd.8 sshd_config sshd_config.5]
657 change LoginGraceTime default to 1 minute; ok mouring@ markus@
00e41835 658 - stevesk@cvs.openbsd.org 2002/08/21 20:10:28
659 [ssh-agent.c]
660 raise listen backlog; ok markus@
c1a4eef1 661 - stevesk@cvs.openbsd.org 2002/08/22 19:27:53
662 [ssh-agent.c]
663 use common close function; ok markus@
1d77f8cb 664 - stevesk@cvs.openbsd.org 2002/08/22 19:38:42
665 [clientloop.c]
666 format with current EscapeChar; bugzilla #388 from wknox@mitre.org.
667 ok markus@
f34ec885 668 - stevesk@cvs.openbsd.org 2002/08/22 20:57:19
669 [ssh-agent.c]
670 shutdown(SHUT_RDWR) not needed before close here; ok markus@
848bf884 671 - markus@cvs.openbsd.org 2002/08/22 21:33:58
672 [auth1.c auth2.c]
673 auth_root_allowed() is handled by the monitor in the privsep case,
674 so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325
6c723e7c 675 - markus@cvs.openbsd.org 2002/08/22 21:45:41
676 [session.c]
677 send signal name (not signal number) in "exit-signal" message; noticed
678 by galb@vandyke.com
b41baf4d 679 - stevesk@cvs.openbsd.org 2002/08/27 17:13:56
680 [ssh-rsa.c]
681 RSA_public_decrypt() returns -1 on error so len must be signed;
682 ok markus@
dbcdea68 683 - stevesk@cvs.openbsd.org 2002/08/27 17:18:40
684 [ssh_config.5]
685 some warning text for ForwardAgent and ForwardX11; ok markus@
ba1566dd 686 - stevesk@cvs.openbsd.org 2002/08/29 15:57:25
687 [monitor.c session.c sshlogin.c sshlogin.h]
688 pass addrlen with sockaddr *; from Hajimu UMEMOTO <ume@FreeBSD.org>
689 NOTE: there are also p-specific parts to this patch. ok markus@
e59404d1 690 - stevesk@cvs.openbsd.org 2002/08/29 16:02:54
691 [ssh.1 ssh.c]
692 deprecate -P as UsePrivilegedPort defaults to no now; ok markus@
878b8992 693 - stevesk@cvs.openbsd.org 2002/08/29 16:09:02
694 [ssh_config.5]
695 more on UsePrivilegedPort and setuid root; ok markus@
9f324470 696 - stevesk@cvs.openbsd.org 2002/08/29 19:49:42
697 [ssh.c]
698 shrink initial privilege bracket for setuid case; ok markus@
57ff5eeb 699 - stevesk@cvs.openbsd.org 2002/08/29 22:54:10
700 [ssh_config.5 sshd_config.5]
701 state XAuthLocation is a full pathname
954640a4 702
b85698ab 70320020820
704 - OpenBSD CVS Sync
705 - millert@cvs.openbsd.org 2002/08/02 14:43:15
706 [monitor.c monitor_mm.c]
707 Change mm_zalloc() sanity checks to be more in line with what
708 we do in calloc() and add a check to monitor_mm.c.
709 OK provos@ and markus@
6a342527 710 - marc@cvs.openbsd.org 2002/08/02 16:00:07
711 [ssh.1 sshd.8]
712 note that .ssh/environment is only read when
713 allowed (PermitUserEnvironment in sshd_config).
714 OK markus@
4004c2ac 715 - markus@cvs.openbsd.org 2002/08/02 21:23:41
716 [ssh-rsa.c]
717 diff is u_int (2x); ok deraadt/provos
0caf874a 718 - markus@cvs.openbsd.org 2002/08/02 22:20:30
719 [ssh-rsa.c]
720 replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser
721 for authentication; ok deraadt/djm
75cf7563 722 - aaron@cvs.openbsd.org 2002/08/08 13:50:23
723 [sshconnect1.c]
724 Use & to test if bits are set, not &&; markus@ ok.
d6097023 725 - stevesk@cvs.openbsd.org 2002/08/08 23:54:52
726 [auth.c]
727 typo in comment
36535ee6 728 - stevesk@cvs.openbsd.org 2002/08/09 17:21:42
729 [sshd_config.5]
730 use Op for mdoc conformance; from esr@golux.thyrsus.com
731 ok aaron@
b3641662 732 - stevesk@cvs.openbsd.org 2002/08/09 17:41:12
733 [sshd_config.5]
734 proxy vs. fake display
35453849 735 - stevesk@cvs.openbsd.org 2002/08/12 17:30:35
736 [ssh.1 sshd.8 sshd_config.5]
737 more PermitUserEnvironment; ok markus@
24794905 738 - stevesk@cvs.openbsd.org 2002/08/17 23:07:14
739 [ssh.1]
740 ForwardAgent has defaulted to no for over 2 years; be more clear here.
4dcbbeea 741 - stevesk@cvs.openbsd.org 2002/08/17 23:55:01
742 [ssh_config.5]
743 ordered list here
7d3b91a6 744 - (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assign
745 it to ULONG_MAX.
b85698ab 746
cd018561 74720020813
748 - (tim) [configure.ac] Display OpenSSL header/library version.
749 Patch by dtucker@zip.com.au
750
8a48a7ef 75120020731
752 - (bal) OpenBSD CVS Sync
753 - markus@cvs.openbsd.org 2002/07/24 16:11:18
754 [hostfile.c hostfile.h sshconnect.c]
755 print out all known keys for a host if we get a unknown host key,
756 see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4
757
758 the ssharp mitm tool attacks users in a similar way, so i'd like to
759 pointed out again:
760 A MITM attack is always possible if the ssh client prints:
761 The authenticity of host 'bla' can't be established.
762 (protocol version 2 with pubkey authentication allows you to detect
763 MITM attacks)
5cb5518b 764 - mouring@cvs.openbsd.org 2002/07/25 01:16:59
765 [sftp.c]
766 FallBackToRsh does not exist anywhere else. Remove it from here.
767 OK deraadt.
567a05bf 768 - markus@cvs.openbsd.org 2002/07/29 18:57:30
769 [sshconnect.c]
770 print file:line
f00bab84 771 - markus@cvs.openbsd.org 2002/07/30 17:03:55
772 [auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5]
773 add PermitUserEnvironment (off by default!); from dot@dotat.at;
774 ok provos, deraadt
8a48a7ef 775
13979d47 77620020730
777 - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de
778
d228d9dd 77920020728
780 - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar
16c4a972 781 - (stevesk) [CREDITS] solar
75131bbd 782 - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned
783 char arg.
d228d9dd 784
d40af5fa 78520020725
786 - (djm) Remove some cruft from INSTALL
d91b4743 787 - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/
d40af5fa 788
56b54901 78920020723
790 - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger.
918ffb0b 791 - (bal) sync ID w/ ssh-agent.c
516f0d7d 792 - (bal) OpenBSD Sync
793 - markus@cvs.openbsd.org 2002/07/19 15:43:33
794 [log.c log.h session.c sshd.c]
795 remove fatal cleanups after fork; based on discussions with and code
796 from solar.
5d185586 797 - stevesk@cvs.openbsd.org 2002/07/19 17:42:40
798 [ssh.c]
799 display a warning from ssh when XAuthLocation does not exist or xauth
800 returned no authentication data. ok markus@
30998af1 801 - stevesk@cvs.openbsd.org 2002/07/21 18:32:20
802 [auth-options.c]
803 unneeded includes
dbc728ff 804 - stevesk@cvs.openbsd.org 2002/07/21 18:34:43
805 [auth-options.h]
806 remove invalid comment
97686bf9 807 - markus@cvs.openbsd.org 2002/07/22 11:03:06
808 [session.c]
809 fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors;
d341742a 810 - stevesk@cvs.openbsd.org 2002/07/22 17:32:56
811 [monitor.c]
812 u_int here; ok provos@
67f04db1 813 - stevesk@cvs.openbsd.org 2002/07/23 16:03:10
814 [sshd.c]
815 utmp_len is unsigned; display error consistent with other options.
816 ok markus@
0df3a240 817 - stevesk@cvs.openbsd.org 2002/07/15 17:15:31
818 [uidswap.c]
819 little more debugging; ok markus@
d341742a 820
21c2c5cd 82120020722
822 - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk
a93bd14c 823 - (stevesk) [xmmap.c] missing prototype for fatal()
ccbb983c 824 - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync
825 with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com.
d262b7f2 826 - (bal) [configure.ac] Missing ;; from cray patch.
30eab01d 827 - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines
828 into it's own header.
ee48c949 829 - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be
830 freed by the caller; add free_pam_environment() and use it.
1d3f4ae7 831 - (stevesk) [auth-pam.c] typo in comment
21c2c5cd 832
b992432e 83320020721
834 - (stevesk) [auth-pam.c] merge cosmetic changes from solar's
835 openssh-3.4p1-owl-password-changing.diff
277f55cf 836 - (stevesk) [auth-pam.c] merge rest of solar's PAM patch;
837 PAM_NEW_AUTHTOK_REQD remains in #if 0 for now.
f7808a93 838 - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch
839 warning on pam_conv struct conversation function.
337dde6b 840 - (stevesk) [auth-pam.h] license
8565f28e 841 - (stevesk) [auth-pam.h] unneeded include
e9b2c23d 842 - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h
b992432e 843
ce88d9df 84420020720
845 - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng().
846
4379c0e5 84720020719
848 - (tim) [contrib/solaris/buildpkg.sh] create privsep user/group if needed.
849 Patch by dtucker@zip.com.au
f75ca46d 850 - (tim) [configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au
4379c0e5 851
45491100 85220020718
853 - (tim) [defines.h] Bug 313 patch by dirk.meyer@dinoex.sub.org
854 - (tim) [monitor_mm.c] add missing declaration for xmmap(). Reported
855 by ayamura@ayamura.org
1cbbe6c8 856 - (tim) [configure.ac] Bug 267 rework int64_t test.
5749e709 857 - (tim) [includes.h] Bug 267 add stdint.h
45491100 858
dd3943d0 85920020717
860 - (bal) aixbff package updated by dtucker@zip.com.au
2bf42e4a 861 - (tim) [configure.ac] change how we do paths in AC_PATH_PROGS tests
862 for autoconf 2.53. Based on a patch by jrj@purdue.edu
dd3943d0 863
8fc47887 86420020716
865 - (tim) [contrib/solaris/opensshd.in] Only kill sshd if .pid file found
866
c750d869 86720020715
868 - (bal) OpenBSD CVS Sync
869 - itojun@cvs.openbsd.org 2002/07/12 13:29:09
870 [sshconnect.c]
871 print connect failure during debugging mode.
a2f883ce 872 - markus@cvs.openbsd.org 2002/07/12 15:50:17
873 [cipher.c]
874 EVP_CIPH_CUSTOM_IV for our own rijndael
2d199535 875 - (bal) Remove unused tty defined in do_setusercontext() pointed out by
876 dtucker@zip.com.au plus a a more KNF since I am near it.
846be3f4 877 - (bal) Privsep user creation support in Solaris buildpkg.sh by
878 dtucker@zip.com.au
c750d869 879
798c5808 88020020714
881 - (tim) [Makefile.in] replace "id sshd" with "sshd -t"
4165b82e 882 - (bal/tim) [acconfig.h configure.ac monitor_mm.c servconf.c
883 openbsd-compat/Makefile.in] support compression on platforms that
884 have no/broken MAP_ANON. Moved code to openbsd-compat/xmmap.c
885 Based on patch from nalin@redhat.com of code extracted from Owl's package
5fd8087a 886 - (tim) [ssh_prng_cmds.in] Bug 323 arp -n flag doesn't exist under Solaris.
887 report by chris@by-design.net
fdebdd4f 888 - (tim) [loginrec.c] Bug 347: Fix typo (WTMPX_FILE) report by rodney@bond.net
d80063fe 889 - (tim) [loginrec.c] Bug 348: add missing found = 1; to wtmpx_islogin()
890 report by rodney@bond.net
798c5808 891
6b2a3595 89220020712
893 - (tim) [Makefile.in] quiet down install-files: and check-user:
3085601b 894 - (tim) [configure.ac] remove unused filepriv line
6b2a3595 895
249f9903 89620020710
897 - (tim) [contrib/cygwin/ssh-host-config] explicitely sets the permissions
898 on /var/empty to 755 Patch by vinschen@redhat.com
6f901f8e 899 - (bal) OpenBSD CVS Sync
900 - itojun@cvs.openbsd.org 2002/07/09 11:56:50
901 [sshconnect.c]
902 silently try next address on connect(2). markus ok
59c825e1 903 - itojun@cvs.openbsd.org 2002/07/09 11:56:27
904 [canohost.c]
905 suppress log on reverse lookup failiure, as there's no real value in
906 doing so.
907 markus ok
aab5431b 908 - itojun@cvs.openbsd.org 2002/07/09 12:04:02
909 [sshconnect.c]
910 ed static function (less warnings)
94ad46d1 911 - stevesk@cvs.openbsd.org 2002/07/09 17:46:25
912 [sshd_config.5]
913 clarify no preference ordering in protocol list; ok markus@
9bd68577 914 - itojun@cvs.openbsd.org 2002/07/10 10:28:15
915 [sshconnect.c]
916 bark if all connection attempt fails.
09683edf 917 - deraadt@cvs.openbsd.org 2002/07/10 17:53:54
918 [rijndael.c]
919 use right sizeof in memcpy; markus ok
249f9903 920
e6f15ed1 92120020709
922 - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platforms
923 lacking that concept can share it. Patch by vinschen@redhat.com
924
4f9d6706 92520020708
926 - (tim) [openssh/contrib/solaris/buildpkg.sh] add PKG_INSTALL_ROOT to
927 work in a jumpstart environment. patch by kbrint@rufus.net
b451e27b 928 - (tim) [Makefile.in] workaround for broken pakadd on some systems.
cda1ebcb 929 - (tim) [configure.ac] fix libc89 utimes test. Mention default path for
930 --with-privsep-path=
4f9d6706 931
ac74561e 93220020707
933 - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH)
94d8258b 934 - (tim) [acconfig.h configure.ac sshd.c]
935 s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/
d41f8eed 936 - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes
937 patch from vinschen@redhat.com
0b832146 938 - (bal) [realpath.c] Updated with OpenBSD tree.
da2499f5 939 - (bal) OpenBSD CVS Sync
940 - deraadt@cvs.openbsd.org 2002/07/04 04:15:33
941 [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c]
942 patch memory leaks; grendel@zeitbombe.org
e1feb9bf 943 - deraadt@cvs.openbsd.org 2002/07/04 08:12:15
944 [channels.c packet.c]
945 blah blah minor nothing as i read and re-read and re-read...
eb9f2fab 946 - markus@cvs.openbsd.org 2002/07/04 10:41:47
947 [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c]
948 don't allocate, copy, and discard if there is not interested in the data;
949 ok deraadt@
4394a17f 950 - deraadt@cvs.openbsd.org 2002/07/06 01:00:49
951 [log.c]
952 KNF
50d2fbbc 953 - deraadt@cvs.openbsd.org 2002/07/06 01:01:26
954 [ssh-keyscan.c]
955 KNF, realloc fix, and clean usage
12a3f2c3 956 - stevesk@cvs.openbsd.org 2002/07/06 17:47:58
957 [ssh-keyscan.c]
958 unused variable
41545cb6 959 - (bal) Minor KNF on ssh-keyscan.c
ac74561e 960
0764e748 96120020705
962 - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs.
963 Reported by Darren Tucker <dtucker@zip.com.au>
e12659f4 964 - (tim) [contrib/cygwin/ssh-host-config] double slash corrction
965 from vinschen@redhat.com
0764e748 966
64c0ce80 96720020704
968 - (bal) Limit data to TTY for AIX only (Newer versions can't handle the
969 faster data rate) Bug #124
375c1dee 970 - (bal) glob.c defines TILDE and AIX also defines it. #undef it first.
971 bug #265
ff2de800 972 - (bal) One too many nulls in ports-aix.c
64c0ce80 973
d2f95449 97420020703
975 - (bal) Updated contrib/cygwin/ patch by vinschen@redhat.com
619a6aff 976 - (bal) minor correction to utimes() replacement. Patch by
977 onoe@sm.sony.co.jp
f11fe301 978 - OpenBSD CVS Sync
979 - markus@cvs.openbsd.org 2002/06/27 08:49:44
980 [dh.c ssh-keyscan.c sshconnect.c]
981 more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@
181d6635 982 - deraadt@cvs.openbsd.org 2002/06/27 09:08:00
983 [monitor.c]
984 improve mm_zalloc check; markus ok
30e37ee6 985 - deraadt@cvs.openbsd.org 2002/06/27 10:35:47
986 [auth2-none.c monitor.c sftp-client.c]
987 use xfree()
c8f94200 988 - stevesk@cvs.openbsd.org 2002/06/27 19:49:08
989 [ssh-keyscan.c]
990 use convtime(); ok markus@
a64d3560 991 - millert@cvs.openbsd.org 2002/06/28 01:49:31
992 [monitor_mm.c]
993 tree(3) wants an int return value for its compare functions and
994 the difference between two pointers is not an int. Just do the
995 safest thing and store the result in a long and then return 0,
996 -1, or 1 based on that result.
405a0d43 997 - deraadt@cvs.openbsd.org 2002/06/28 01:50:37
998 [monitor_wrap.c]
999 use ssize_t
4efd85b2 1000 - deraadt@cvs.openbsd.org 2002/06/28 10:08:25
1001 [sshd.c]
1002 range check -u option at invocation
6ded293b 1003 - deraadt@cvs.openbsd.org 2002/06/28 23:05:06
1004 [sshd.c]
1005 gidset[2] -> gidset[1]; markus ok
7fdc56c5 1006 - deraadt@cvs.openbsd.org 2002/06/30 21:54:16
1007 [auth2.c session.c sshd.c]
1008 lint asks that we use names that do not overlap
343288b8 1009 - deraadt@cvs.openbsd.org 2002/06/30 21:59:45
1010 [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c
1011 monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c
1012 sshconnect2.c sshd.c]
1013 minor KNF
7d60d74c 1014 - deraadt@cvs.openbsd.org 2002/07/01 16:15:25
1015 [msg.c]
1016 %u
713f6cd9 1017 - markus@cvs.openbsd.org 2002/07/01 19:48:46
1018 [sshconnect2.c]
1019 for compression=yes, we fallback to no-compression if the server does
1020 not support compression, vice versa for compression=no. ok mouring@
261189cc 1021 - markus@cvs.openbsd.org 2002/07/03 09:55:38
1022 [ssh-keysign.c]
1023 use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld)
1024 in order to avoid a possible Kocher timing attack pointed out by Charles
1025 Hannum; ok provos@
60cd0a97 1026 - markus@cvs.openbsd.org 2002/07/03 14:21:05
1027 [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config]
1028 re-enable ssh-keysign's sbit, but make ssh-keysign read
1029 /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled
1030 globally. based on discussions with deraadt, itojun and sommerfeld;
1031 ok itojun@
56fd97d7 1032 - (bal) Failed password attempts don't increment counter on AIX. Bug #145
e8aa0a5c 1033 - (bal) Missed Makefile.in change. keysign needs readconf.o
0ba40daa 1034 - (bal) Clean up aix_usrinfo(). Ignore TTY= period I guess.
56fd97d7 1035
b2f295dc 103620020702
1037 - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc &
1038 friends consistently. Spotted by Solar Designer <solar@openwall.com>
1039
3c3e878a 104020020629
1041 - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style
1042 clean up while I'm near it.
1043
811ee370 104420020628
1045 - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented
1046 options should contain default value. from solar.
b9b82dab 1047 - (bal) Cygwin uid0 fix by vinschen@redhat.com
17962c40 1048 - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c. Otherwise wise
1049 have issues of our fixes not propogating right (ie bcopy instead of
1050 memmove). OK tim
4fa4fb00 1051 - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported.
1052 Bug #303
811ee370 1053
ce88d9df 105420020627
d1ff09ba 1055 - OpenBSD CVS Sync
1056 - deraadt@cvs.openbsd.org 2002/06/26 14:49:36
1057 [monitor.c]
1058 correct %u
63b5f1a1 1059 - deraadt@cvs.openbsd.org 2002/06/26 14:50:04
1060 [monitor_fdpass.c]
1061 use ssize_t for recvmsg() and sendmsg() return
1431a900 1062 - markus@cvs.openbsd.org 2002/06/26 14:51:33
1063 [ssh-add.c]
1064 fix exit code for -X/-x
bb0640b2 1065 - deraadt@cvs.openbsd.org 2002/06/26 15:00:32
1066 [monitor_wrap.c]
1067 more %u
20e79e98 1068 - markus@cvs.openbsd.org 2002/06/26 22:27:32
1069 [ssh-keysign.c]
1070 bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu
d1ff09ba 1071
4bfa8bb6 107220020626
1073 - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM
a594fa74 1074 - (bal) OpenBSD CVS Sync
1075 - markus@cvs.openbsd.org 2002/06/23 21:34:07
1076 [channels.c]
1077 tcode is u_int
38501509 1078 - markus@cvs.openbsd.org 2002/06/24 13:12:23
1079 [ssh-agent.1]
1080 the socket name contains ssh-agent's ppid; via mpech@ from form@
f91d9a89 1081 - markus@cvs.openbsd.org 2002/06/24 14:33:27
1082 [channels.c channels.h clientloop.c serverloop.c]
1083 move channel counter to u_int
1169c3df 1084 - markus@cvs.openbsd.org 2002/06/24 14:55:38
1085 [authfile.c kex.c ssh-agent.c]
1086 cat to (void) when output from buffer_get_X is ignored
09915dc1 1087 - itojun@cvs.openbsd.org 2002/06/24 15:49:22
1088 [msg.c]
1089 printf type pedant
d0a1c5d1 1090 - deraadt@cvs.openbsd.org 2002/06/24 17:57:20
1091 [sftp-server.c sshpty.c]
1092 explicit (u_int) for uid and gid
6c69a6a9 1093 - markus@cvs.openbsd.org 2002/06/25 16:22:42
1094 [authfd.c]
1095 unnecessary cast
87809a1f 1096 - markus@cvs.openbsd.org 2002/06/25 18:51:04
1097 [sshd.c]
1098 lightweight do_setusercontext after chroot()
924681ee 1099 - (bal) Updated AIX package build. Patch by dtucker@zip.com.au
46c8ebb3 1100 - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8
78beb77d 1101 - (bal) added back in error check for mmap(). I screwed up, Pointed
1102 out by stevesk@
f2d9a1f8 1103 - (tim) [README.privsep] UnixWare tip no longer needed.
88cb875c 1104 - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP,
1105 but it all damned lies.
0d0270e6 1106 - (stevesk) [README.privsep] more for sshd pseudo-account.
8029e7fc 1107 - (tim) [contrib/caldera/openssh.spec] add support for privsep
8695f9f7 1108 - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@
b29fe4ea 1109 - (djm) OpenBSD CVS Sync
1110 - markus@cvs.openbsd.org 2002/06/26 08:53:12
1111 [bufaux.c]
1112 limit size of BNs to 8KB; ok provos/deraadt
22d62d31 1113 - markus@cvs.openbsd.org 2002/06/26 08:54:18
1114 [buffer.c]
1115 limit append to 1MB and buffers to 10MB
5df8c731 1116 - markus@cvs.openbsd.org 2002/06/26 08:55:02
1117 [channels.c]
1118 limit # of channels to 10000
87f18810 1119 - markus@cvs.openbsd.org 2002/06/26 08:58:26
1120 [session.c]
1121 limit # of env vars to 1000; ok deraadt/djm
2f095a0e 1122 - deraadt@cvs.openbsd.org 2002/06/26 13:20:57
1123 [monitor.c]
1124 be careful in mm_zalloc
66087567 1125 - deraadt@cvs.openbsd.org 2002/06/26 13:49:26
1126 [session.c]
1127 disclose less information from environment files; based on input
1128 from djm, and dschultz@uclink.Berkeley.EDU
477edc5d 1129 - markus@cvs.openbsd.org 2002/06/26 13:55:37
1130 [auth2-chall.c]
1131 make sure # of response matches # of queries, fixes int overflow;
1132 from ISS
03b14b6f 1133 - markus@cvs.openbsd.org 2002/06/26 13:56:27
1134 [version.h]
1135 3.4
9c696d0d 1136 - (djm) Require krb5 devel for RPM build w/ KrbV
c4186be7 1137 - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai
1138 <nalin@redhat.com>
1e7bc74c 1139 - (djm) Update spec files for release
49b53b03 1140 - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS
03b14b6f 1141 - (djm) Release 3.4p1
6519cfd6 1142 - (tim) [contrib/caldera/openssh.spec] remove 2 configure options I put in
1143 by mistake
4bfa8bb6 1144
ef1ac12b 114520020625
1146 - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh
1a44c6f7 1147 - (stevesk) [README.privsep] minor updates
fd3cbf67 1148 - (djm) Create privsep directory and warn if privsep user is missing
1149 during make install
702b2855 1150 - (bal) Started list of PrivSep issues in TODO
1c6249af 1151 - (bal) if mmap() is substandard, don't allow compression on server side.
1152 Post 'event' we will add more options.
cbaa3d44 1153 - (tim) [contrib/caldera/openssh.spec] Sync with Caldera
e2bc41f9 1154 - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by
1155 dtucker@zip.com.au
d170feb1 1156 - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus
1157 for Cygwin, Cray, & SCO
ef1ac12b 1158
d5803314 115920020624
1160 - OpenBSD CVS Sync
1161 - deraadt@cvs.openbsd.org 2002/06/23 03:25:50
1162 [tildexpand.c]
1163 KNF
3ddc795d 1164 - deraadt@cvs.openbsd.org 2002/06/23 03:26:19
1165 [cipher.c key.c]
1166 KNF
d6133f43 1167 - deraadt@cvs.openbsd.org 2002/06/23 03:30:58
1168 [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c
1169 sshpty.c]
1170 various KNF and %d for unsigned
9906a836 1171 - deraadt@cvs.openbsd.org 2002/06/23 09:30:14
1172 [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c
1173 sftp.c]
1174 bunch of u_int vs int stuff
512df038 1175 - deraadt@cvs.openbsd.org 2002/06/23 09:39:55
1176 [ssh-keygen.c]
1177 u_int stuff
7528d467 1178 - deraadt@cvs.openbsd.org 2002/06/23 09:46:51
1179 [bufaux.c servconf.c]
1180 minor KNF. things the fingers do while you read
e424e241 1181 - deraadt@cvs.openbsd.org 2002/06/23 10:29:52
1182 [ssh-agent.c sshd.c]
1183 some minor KNF and %u
7138ebd9 1184 - deraadt@cvs.openbsd.org 2002/06/23 20:39:45
1185 [session.c]
1186 compression_level is u_int
f09ce20a 1187 - deraadt@cvs.openbsd.org 2002/06/23 21:06:13
1188 [sshpty.c]
1189 KNF
57f228e8 1190 - deraadt@cvs.openbsd.org 2002/06/23 21:06:41
1191 [channels.c channels.h session.c session.h]
1192 display, screen, row, col, xpixel, ypixel are u_int; markus ok
0bc50167 1193 - deraadt@cvs.openbsd.org 2002/06/23 21:10:02
1194 [packet.c]
1195 packet_get_int() returns unsigned for reason & seqnr
57f228e8 1196 - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col,
1197 xpixel are u_int.
1198
d5803314 1199
58177c0a 120020020623
1201 - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX.
dc43acd2 1202 - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset.
ef3912be 1203 - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au
a8bbdc75 1204 - OpenBSD CVS Sync
1205 - stevesk@cvs.openbsd.org 2002/06/22 02:00:29
1206 [ssh.h]
1207 correct comment
1ae02182 1208 - stevesk@cvs.openbsd.org 2002/06/22 02:40:23
1209 [ssh.1]
1210 section 5 not 4 for ssh_config
b2843ec6 1211 - naddy@cvs.openbsd.org 2002/06/22 11:51:39
1212 [ssh.1]
1213 typo
75653d3e 1214 - stevesk@cvs.openbsd.org 2002/06/22 16:32:54
1215 [sshd.8]
1216 add /var/empty in FILES section
a56313d7 1217 - stevesk@cvs.openbsd.org 2002/06/22 16:40:19
1218 [sshd.c]
1219 check /var/empty owner mode; ok provos@
e4e83d70 1220 - stevesk@cvs.openbsd.org 2002/06/22 16:41:57
1221 [scp.1]
1222 typo
baa08b92 1223 - stevesk@cvs.openbsd.org 2002/06/22 16:45:29
1224 [ssh-agent.1 sshd.8 sshd_config.5]
1225 use process ID vs. pid/PID/process identifier
c28876e9 1226 - stevesk@cvs.openbsd.org 2002/06/22 20:05:27
1227 [sshd.c]
1228 don't call setsid() if debugging or run from inetd; no "Operation not
1229 permitted" errors now; ok millert@ markus@
d17ef027 1230 - stevesk@cvs.openbsd.org 2002/06/22 23:09:51
1231 [monitor.c]
1232 save auth method before monitor_reset_key_state(); bugzilla bug #284;
1233 ok provos@
58177c0a 1234
0b202697 1235$Id$
This page took 0.507483 seconds and 5 git commands to generate.