]> andersk Git - openssh.git/blame - ChangeLog
- (djm) Reorganise PAM & SIA password handling to eliminate some common code
[openssh.git] / ChangeLog
CommitLineData
494b267f 120030122
2 - (djm) OpenBSD CVS Sync
3 - marc@cvs.openbsd.org 2003/01/21 18:14:36
4 [ssh-agent.1 ssh-agent.c]
5 Add a -t life option to ssh-agent that set the default lifetime.
6 The default can still be overriden by using -t in ssh-add.
7 OK markus@
882a3870 8 - (djm) Reorganise PAM & SIA password handling to eliminate some common code
494b267f 9
877c5ea2 1020030120
11 - (djm) Fix compilation for NetBSD from dtucker@zip.com.au
115dc20f 12 - (tim) [progressmeter.c] make compilers without long long happy.
21710e39 13 - (tim) [configure.ac] Add -belf to build ELF binaries on OpenServer 5 when
14 using cc. (gcc already did)
877c5ea2 15
5ed5468f 1620030118
17 - (djm) Revert fix for Bug #442 for now.
18
9e2b44f5 1920030117
20 - (djm) Bug #470: Detect strnvis, not strvis in configure.
21 From d_wllms@lanl.gov
22
280806cf 2320030116
24 - (djm) OpenBSD CVS Sync
25 - djm@cvs.openbsd.org 2003/01/16 03:41:55
26 [sftp-int.c]
27 explicitly use first glob result
28
33364f27 2920030114
30 - (djm) OpenBSD CVS Sync
31 - fgsch@cvs.openbsd.org 2003/01/10 23:23:24
32 [sftp-int.c]
33 typo; from Nils Nordman <nino at nforced dot com>.
083d2e97 34 - markus@cvs.openbsd.org 2003/01/11 18:29:43
35 [log.c]
36 set fatal_cleanups to NULL in fatal_remove_all_cleanups();
37 dtucker@zip.com.au
b7fd001f 38 - markus@cvs.openbsd.org 2003/01/12 16:57:02
39 [progressmeter.c]
40 allow WARNINGS=yes; ok djm@
c1e07c81 41 - djm@cvs.openbsd.org 2003/01/13 11:04:04
42 [sftp-int.c]
43 make cmds[] array static to avoid conflict with BSDI libc.
209d3126 44 mindrot bug #466. Fix from mdev@idg.nl; ok markus@
538840a2 45 - djm@cvs.openbsd.org 2003/01/14 10:58:00
46 [sftp-client.c sftp-int.c]
47 Don't try to upload or download non-regular files. Report from
48 apoloval@pantuflo.escet.urjc.es; ok markus@
33364f27 49
5020030113
e80fb2a0 51 - (djm) Rework openbsd-compat/setproctitle.c a bit: move emulation type
52 detection to configure.ac. Prompted by stevesk@
65a4b4af 53 - (djm) Bug #467: Add a --disable-strip option to turn off stripping of
54 installed binaries. From mdev@idg.nl
e80fb2a0 55
d0104542 5620030110
57 - (djm) Enable new setproctitle emulation for Linux, AIX and HP/UX. More
58 systems may be added later.
9a36208d 59 - (djm) OpenBSD CVS Sync
60 - djm@cvs.openbsd.org 2003/01/08 23:53:26
61 [sftp.1 sftp.c sftp-int.c sftp-int.h]
62 Cleanup error handling for batchmode
63 Allow blank lines and comments in input
64 Ability to suppress abort on error in batchmode ("-put blah")
65 Fixes mindrot bug #452; markus@ ok
b65c3807 66 - fgsch@cvs.openbsd.org 2003/01/10 08:19:07
c9c38b73 67 [scp.c sftp.1 sftp.c sftp-client.c sftp-int.c progressmeter.c]
68 [progressmeter.h]
b65c3807 69 sftp progress meter support.
70 original diffs by Nils Nordman <nino at nforced dot com> via
71 markus@, merged to -current by me, djm@ ok.
bf0bf24b 72 - djm@cvs.openbsd.org 2003/01/10 08:48:15
73 [sftp-client.c]
74 Simplify and avoid redundancy in packet send and receive
75 functions; ok fgs@
25a6efd8 76 - djm@cvs.openbsd.org 2003/01/10 10:29:35
77 [scp.c]
78 Don't ftruncate after write error, creating sparse files of
79 incorrect length
80 mindrot bug #403, reported by rusr@cup.hp.com; ok markus@
4940c411 81 - djm@cvs.openbsd.org 2003/01/10 10:32:54
82 [channels.c]
83 hush socket() errors, except last. Fixes mindrot bug #408; ok markus@
d0104542 84
7bb526ce 8520030108
86 - (djm) Sync openbsd-compat/ with OpenBSD -current
93c63b8d 87 - (djm) Avoid redundant xstrdup/xfree in auth2-pam.c. From Solar via markus@
faa483fa 88 - (djm) OpenBSD CVS Sync
89 - markus@cvs.openbsd.org 2003/01/01 18:08:52
90 [channels.c]
91 move big output buffer messages to debug2
bfd934b9 92 - djm@cvs.openbsd.org 2003/01/06 23:51:22
93 [sftp-client.c]
94 Fix "get -p" download to not add user-write perm. mindrot bug #426
95 reported by gfernandez@livevault.com; ok markus@
048ff12c 96 - fgsch@cvs.openbsd.org 2003/01/07 23:42:54
97 [sftp.1]
98 add version; from Nils Nordman <nino at nforced dot com> via markus@.
99 markus@ ok
c9c462e4 100 - (djm) Update README to reflect AIX's status as a well supported platform.
101 From dtucker@zip.com.au
c3690df3 102 - (tim) [Makefile.in configure.ac] replace fixpath with sed script. Patch
a2144d93 103 by Mo DeJong.
ad0279ff 104 - (tim) [auth.c] declare today at top of allowed_user() to keep
105 older compilers happy.
a2144d93 106 - (tim) [scp.c] make compilers without long long happy.
7bb526ce 107
e7ccd20d 10820030107
109 - (djm) Bug #401: Work around Linux breakage with IPv6 mapped addresses.
110 Based on fix from yoshfuji@linux-ipv6.org
e2ef2342 111 - (djm) Bug #442: Check for and deny access to accounts with locked
112 passwords. Patch from dtucker@zip.com.au
70e7d0b0 113 - (djm) Bug #26: Use local mkstemp() rather than glibc's silly one. Fixes
114 Can't pass KRB4 TGT passing. Fix from: jan.iven@cern.ch
93a9a35a 115 - (djm) Fix Bug #442 for PAM case
ed05a983 116 - (djm) Bug #110: bogus error messages in lastlog_get_entry(). Fix based
117 on one by peak@argo.troja.mff.cuni.cz
63cada0a 118 - (djm) Bug #111: Run syslog and stderr logging through strnvis to eliminate
119 nasties. Report from peak@argo.troja.mff.cuni.cz
99f4fb69 120 - (djm) Bug #178: On AIX /etc/nologin wasnt't shown to users. Fix from
121 Ralf.Wenk@fh-karlsruhe.de and dtucker@zip.com.au
b57c8e20 122 - (djm) Fix my fix of the fix for the Bug #442 for PAM case. Spotted by
123 dtucker@zip.com.au. Reorder for clarity too.
e7ccd20d 124
9300be60 12520030103
126 - (djm) Bug #461: ssh-copy-id fails with no arguments. Patch from
127 cjwatson@debian.org
9746ee4b 128 - (djm) Bug #460: Filling utmp[x]->ut_addr_v6 if present. Patch from
129 cjwatson@debian.org
17ed08c5 130 - (djm) Bug #446: Set LOGIN env var to pw_name on AIX. Patch from
131 mii@ornl.gov
132
d4ac26ed 13320030101
134 - (stevesk) [session.c sshlogin.c sshlogin.h] complete portable
135 parts of pass addrlen with sockaddr * fix.
136 from Hajimu UMEMOTO <ume@FreeBSD.org>
137
378d9956 13820021222
139 - (bal) OpenBSD CVS Sync
140 - fgsch@cvs.openbsd.org 2002/11/15 10:03:09
141 [authfile.c]
142 lseek(2) may return -1 when getting the public/private key lenght.
143 Simplify the code and check for errors using fstat(2).
144
145 Problem reported by Mauricio Sanchez, markus@ ok.
3c93c917 146 - markus@cvs.openbsd.org 2002/11/18 16:43:44
147 [clientloop.c]
148 don't overwrite SIG{INT,QUIT,TERM} handler if set to SIG_IGN;
149 e.g. if ssh is used for backup; report Joerg Schilling; ok millert@
35efb24c 150 - markus@cvs.openbsd.org 2002/11/21 22:22:50
151 [dh.c]
152 debug->debug2
a77673cc 153 - markus@cvs.openbsd.org 2002/11/21 22:45:31
154 [cipher.c kex.c packet.c sshconnect.c sshconnect2.c]
155 debug->debug2, unify debug messages
b77a87e5 156 - deraadt@cvs.openbsd.org 2002/11/21 23:03:51
157 [auth-krb5.c auth1.c hostfile.h monitor_wrap.c sftp-client.c sftp-int.c ssh-add.c ssh-rsa.c
158 sshconnect.c]
159 KNF
556f1c05 160 - markus@cvs.openbsd.org 2002/11/21 23:04:33
83bbc162 161 [ssh.c]
162 debug->debug2
556f1c05 163 - stevesk@cvs.openbsd.org 2002/11/24 21:46:24
eef52fa7 164 [ssh-keysign.8]
165 typo: "the the"
6d58d81e 166 - wcobb@cvs.openbsd.org 2002/11/26 00:45:03
167 [scp.c ssh-keygen.c]
168 Remove unnecessary fflush(stderr) calls, stderr is unbuffered by default.
169 ok markus@
556f1c05 170 - stevesk@cvs.openbsd.org 2002/11/26 02:35:30
63baa058 171 [ssh-keygen.1]
172 remove outdated statement; ok markus@ deraadt@
649bb60b 173 - stevesk@cvs.openbsd.org 2002/11/26 02:38:54
174 [canohost.c]
175 KNF, comment and error message repair; ok markus@
15748b4d 176 - markus@cvs.openbsd.org 2002/11/27 17:53:35
177 [scp.c sftp.c ssh.c]
178 allow usernames with embedded '@', e.g. scp user@vhost@realhost:file /tmp;
179 http://bugzilla.mindrot.org/show_bug.cgi?id=447; ok mouring@, millert@
fe661d8f 180 - stevesk@cvs.openbsd.org 2002/12/04 04:36:47
181 [session.c]
182 remove xauth entries before add; PR 2994 from janjaap@stack.nl.
183 ok markus@
a0a14bcd 184 - markus@cvs.openbsd.org 2002/12/05 11:08:35
185 [scp.c]
186 use roundup() similar to rcp/util.c and avoid problems with strange
187 filesystem block sizes, noted by tjr@freebsd.org; ok djm@
556f1c05 188 - djm@cvs.openbsd.org 2002/12/06 05:20:02
2ea16b0b 189 [sftp.1]
190 Fix cut'n'paste error, spotted by matthias.riese@b-novative.de; ok deraadt@
978ebf99 191 - millert@cvs.openbsd.org 2002/12/09 16:50:30
192 [ssh.c]
193 Avoid setting optind to 0 as GNU getopt treats that like we do optreset.
194 markus@ OK
32214c88 195 - markus@cvs.openbsd.org 2002/12/10 08:56:00
196 [session.c]
197 Make sure $SHELL points to the shell from the password file, even if shell
198 is overridden from login.conf; bug#453; semen at online.sinor.ru; ok millert@
48f636b2 199 - markus@cvs.openbsd.org 2002/12/10 19:26:50
200 [packet.c]
201 move tos handling to packet_set_tos; ok provos/henning/deraadt
9e637910 202 - markus@cvs.openbsd.org 2002/12/10 19:47:14
203 [packet.c]
204 static
6226a8f8 205 - markus@cvs.openbsd.org 2002/12/13 10:03:15
206 [channels.c misc.c sshconnect2.c]
207 cleanup debug messages, more useful information for the client user.
556f1c05 208 - markus@cvs.openbsd.org 2002/12/13 15:20:52
209 [scp.c]
210 1) include stalling time in total time
211 2) truncate filenames to 45 instead of 20 characters
212 3) print rate instead of progress bar, no more stars
213 4) scale output to tty width
214 based on a patch from Niels; ok fries@ lebel@ fgs@ millert@
3075ac59 215 - (bal) [msg.c msg.h scp.c ssh-keysign.c sshconnect2.c] Resync CVS IDs since
216 we already did s/msg_send/ssh_msg_send/
378d9956 217
a76550cf 21820021205
219 - (djm) PERL-free fixpaths from stuge-openssh-unix-dev@cdy.org
220
d9a4e55b 22120021122
222 - (tim) [configure.ac] fix STDPATH test for IRIX. First reported by
223 advax@triumf.ca. This type of solution tested by <herb@sgi.com>
224
f825dbf4 22520021113
226 - (tim) [configure.ac] remove unused variables no_libsocket and no_libnsl
227
17d429bb 22820021111
229 - (tim) [contrib/solaris/opensshd.in] add umask 022 so sshd.pid is
230 not world writable.
231
c9826b28 23220021109
233 - (bal) OpenBSD CVS Sync
234 - itojun@cvs.openbsd.org 2002/10/16 14:31:48
235 [sftp-common.c]
236 64bit pedant. %llu is "unsigned long long". markus ok
2fe3c2db 237 - markus@cvs.openbsd.org 2002/10/23 10:32:13
238 [packet.c]
239 use %u for u_int
358b576b 240 - markus@cvs.openbsd.org 2002/10/23 10:40:16
241 [bufaux.c]
242 %u for u_int
f6f02456 243 - markus@cvs.openbsd.org 2002/11/04 10:07:53
244 [auth.c]
245 don't compare against pw_home if realpath fails for pw_home (seen
246 on AFS); ok djm@
2ccb7bde 247 - markus@cvs.openbsd.org 2002/11/04 10:09:51
248 [packet.c]
249 log before send disconnect; ok djm@
39e71188 250 - markus@cvs.openbsd.org 2002/11/05 19:45:20
251 [monitor.c]
252 handle overflows for size_t larger than u_int; siw@goneko.de, bug #425
9db1a8e9 253 - markus@cvs.openbsd.org 2002/11/05 20:10:37
254 [sftp-client.c]
255 typo; GaryF@livevault.com
51efad8c 256 - markus@cvs.openbsd.org 2002/11/07 16:28:47
257 [sshd.c]
258 log to stderr if -ie is given, bug #414, prj@po.cwru.edu
cc46e2ee 259 - markus@cvs.openbsd.org 2002/11/07 22:08:07
260 [readconf.c readconf.h ssh-keysign.8 ssh-keysign.c]
261 we cannot use HostbasedAuthentication for enabling ssh-keysign(8),
262 because HostbasedAuthentication might be enabled based on the
263 target host and ssh-keysign(8) does not know the remote hostname
264 and not trust ssh(1) about the hostname, so we add a new option
265 EnableSSHKeysign; ok djm@, report from zierke@informatik.uni-hamburg.de
252d1a24 266 - markus@cvs.openbsd.org 2002/11/07 22:35:38
267 [scp.c]
268 check exit status from ssh, and exit(1) if ssh fails; bug#369;
269 binder@arago.de
f00addc9 270 - (bal) Update ssh-host-config and minor rewrite of bsd-cygwin_util.c
271 ntsec now default if cygwin version beginning w/ version 56. Patch
272 by Corinna Vinschen <vinschen@redhat.com>
819d3f09 273 - (bal) AIX does not log login attempts for unknown users (bug #432).
274 patch by dtucker@zip.com.au
c9826b28 275
4e6f1c4f 27620021021
f0e27f3d 277 - (djm) Bug #400: Kill ssh-rand-helper children on timeout, patch from
278 dtucker@zip.com.au
cacd2e7a 279 - (djm) Bug #317: FreeBSD needs libutil.h for openpty() Report from
280 dirk.meyer@dinoex.sub.org
4e6f1c4f 281
f3e87063 28220021015
283 - (bal) Fix bug id 383 and only call loginrestrict for AIX if not root.
08412d26 284 - (bal) More advanced strsep test by Darren Tucker <dtucker@zip.com.au>
f3e87063 285
57872969 28620021015
287 - (tim) [contrib/caldera/openssh.spec] make ssh-agent setgid nobody
288
6af8f131 28920021004
290 - (bal) Disable post-authentication Privsep for OSF/1. It conflicts with
291 SIA.
292
e139021d 29320021003
294 - (djm) OpenBSD CVS Sync
295 - markus@cvs.openbsd.org 2002/10/01 20:34:12
296 [ssh-agent.c]
297 allow root to access the agent, since there is no protection from root.
886cd2bb 298 - markus@cvs.openbsd.org 2002/10/01 13:24:50
299 [version.h]
300 OpenSSH 3.5
0855868a 301 - (djm) Bump RPM spec version numbers
e987fdbe 302 - (djm) Bug #406: s/msg_send/ssh_msg_send/ for Mac OS X 1.2
e139021d 303
1d677676 30420020930
9a87e2ac 305 - (djm) Tidy contrib/, add Makefile for GNOME passphrase dialogs,
306 tweak README
307 - (djm) OpenBSD CVS Sync
308 - mickey@cvs.openbsd.org 2002/09/27 10:42:09
309 [compat.c compat.h sshd.c]
310 add a generic match for a prober, such as sie big brother;
311 idea from stevesk@; markus@ ok
05960cf0 312 - stevesk@cvs.openbsd.org 2002/09/27 15:46:21
313 [ssh.1]
314 clarify compression level protocol 1 only; ok markus@ deraadt@
1d677676 315
0d3d0e82 31620020927
317 - (djm) OpenBSD CVS Sync
318 - markus@cvs.openbsd.org 2002/09/25 11:17:16
319 [sshd_config]
320 sync LoginGraceTime with default
26b9a3d2 321 - markus@cvs.openbsd.org 2002/09/25 15:19:02
322 [sshd.c]
323 typo; pilot@monkey.org
2db9d8aa 324 - markus@cvs.openbsd.org 2002/09/26 11:38:43
325 [auth1.c auth.h auth-krb4.c monitor.c monitor.h monitor_wrap.c]
326 [monitor_wrap.h]
327 krb4 + privsep; ok dugsong@, deraadt@
0d3d0e82 328
b7c4a4cc 32920020925
330 - (bal) Fix issue where successfull login does not clear failure counts
331 in AIX. Patch by dtucker@zip.com.au ok by djm
ef51930f 332 - (tim) Cray fixes (bug 367) based on patch from Wendy Palm @ cray.
333 This does not include the deattack.c fixes.
b7c4a4cc 334
99443922 33520020923
336 - (djm) OpenBSD CVS Sync
337 - stevesk@cvs.openbsd.org 2002/09/23 20:46:27
338 [canohost.c]
339 change get_peer_ipaddr() and get_local_ipaddr() to not return NULL for
340 non-sockets; fixes a problem passing NULL to snprintf(). ok markus@
0082ad34 341 - markus@cvs.openbsd.org 2002/09/23 22:11:05
342 [monitor.c]
343 only call auth_krb5 if kerberos is enabled; ok deraadt@
4741e3a6 344 - markus@cvs.openbsd.org 2002/09/24 08:46:04
345 [monitor.c]
346 only call kerberos code for authctxt->valid
cb11b555 347 - todd@cvs.openbsd.org 2002/09/24 20:59:44
348 [sshd.8]
349 tweak the example $HOME/.ssh/rc script to not show on any cmdline the
350 sensitive data it handles. This fixes bug # 402 as reported by
351 kolya@mit.edu (Nickolai Zeldovich).
352 ok markus@ and stevesk@
99443922 353
aec4cb4f 35420020923
355 - (tim) [configure.ac] s/return/exit/ patch by dtucker@zip.com.au
356
f86b0eef 35720020922
358 - (djm) OpenBSD CVS Sync
359 - stevesk@cvs.openbsd.org 2002/09/19 14:53:14
360 [compat.c]
c7724abb 361 - markus@cvs.openbsd.org 2002/09/19 15:51:23
362 [ssh-add.c]
363 typo; cd@kalkatraz.de
00e842d8 364 - stevesk@cvs.openbsd.org 2002/09/19 16:03:15
365 [serverloop.c]
366 log IP address also; ok markus@
c2802d92 367 - stevesk@cvs.openbsd.org 2002/09/20 18:41:29
368 [auth.c]
369 log illegal user here for missing privsep case (ssh2).
370 this is executed in the monitor. ok markus@
f86b0eef 371
792e7d2d 37220020919
373 - (djm) OpenBSD CVS Sync
374 - stevesk@cvs.openbsd.org 2002/09/12 19:11:52
375 [ssh-agent.c]
376 %u for uid print; ok markus@
da0561eb 377 - stevesk@cvs.openbsd.org 2002/09/12 19:50:36
378 [session.c ssh.1]
379 add SSH_CONNECTION and deprecate SSH_CLIENT; bug #384. ok markus@
facfd613 380 - stevesk@cvs.openbsd.org 2002/09/13 19:23:09
381 [channels.c sshconnect.c sshd.c]
382 remove use of SO_LINGER, it should not be needed. error check
383 SO_REUSEADDR. fixup comments. ok markus@
8bd4e2ae 384 - stevesk@cvs.openbsd.org 2002/09/16 19:55:33
385 [session.c]
386 log when _PATH_NOLOGIN exists; ok markus@
e6fe1bab 387 - stevesk@cvs.openbsd.org 2002/09/16 20:12:11
388 [sshd_config.5]
389 more details on X11Forwarding security issues and threats; ok markus@
f1dcc34e 390 - stevesk@cvs.openbsd.org 2002/09/16 22:03:13
391 [sshd.8]
392 reference moduli(5) in FILES /etc/moduli.
5c0d0e90 393 - itojun@cvs.openbsd.org 2002/09/17 07:47:02
394 [channels.c]
395 don't quit while creating X11 listening socket.
396 http://mail-index.netbsd.org/current-users/2002/09/16/0005.html
397 got from portable. markus ok
6939bbd4 398 - djm@cvs.openbsd.org 2002/09/19 01:58:18
399 [ssh.c sshconnect.c]
400 bugzilla.mindrot.org #223 - ProxyCommands don't exit.
401 Patch from dtucker@zip.com.au; ok markus@
792e7d2d 402
4f3834e8 40320020912
eee2215e 404 - (djm) Made GNOME askpass programs return non-zero if cancel button is
405 pressed.
10a560d4 406 - (djm) Added getpeereid() replacement. Properly implemented for systems
407 with SO_PEERCRED support. Faked for systems which lack it.
9fd2a215 408 - (djm) Sync sys/tree.h with OpenBSD -current. Rename tree.h and
409 fake-queue.h to sys-tree.h and sys-queue.h
4f3834e8 410 - (djm) OpenBSD CVS Sync
411 - markus@cvs.openbsd.org 2002/09/08 20:24:08
412 [hostfile.h]
413 no comma at end of enumerator list
696f6bef 414 - itojun@cvs.openbsd.org 2002/09/09 06:48:06
415 [auth1.c auth.h auth-krb5.c monitor.c monitor.h]
416 [monitor_wrap.c monitor_wrap.h]
417 kerberos support for privsep. confirmed to work by lha@stacken.kth.se
418 patch from markus
661e45a0 419 - markus@cvs.openbsd.org 2002/09/09 14:54:15
420 [channels.c kex.h key.c monitor.c monitor_wrap.c radix.c uuencode.c]
421 signed vs unsigned from -pedantic; ok henning@
87f4111f 422 - markus@cvs.openbsd.org 2002/09/10 20:24:47
423 [ssh-agent.c]
424 check the euid of the connecting process with getpeereid(2);
425 ok provos deraadt stevesk
07d688d5 426 - stevesk@cvs.openbsd.org 2002/09/11 17:55:03
427 [ssh.1]
428 add agent and X11 forwarding warning text from ssh_config.5; ok markus@
8b10e20e 429 - stevesk@cvs.openbsd.org 2002/09/11 18:27:26
430 [authfd.c authfd.h ssh.c]
431 don't connect to agent to test for presence if we've previously
432 connected; ok markus@
00b3ad3e 433 - djm@cvs.openbsd.org 2002/09/11 22:41:50
434 [sftp.1 sftp-client.c sftp-client.h sftp-common.c sftp-common.h]
435 [sftp-glob.c sftp-glob.h sftp-int.c sftp-server.c]
436 support for short/long listings and globbing in "ls"; ok markus@
be0cd512 437 - djm@cvs.openbsd.org 2002/09/12 00:13:06
438 [sftp-int.c]
439 zap unused var introduced in last commit
4f3834e8 440
ac8802eb 44120020911
442 - (djm) Sync openbsd-compat with OpenBSD -current
443
e2e36358 44420020910
445 - (djm) Bug #365: Read /.ssh/environment properly under CygWin.
446 Patch from Mark Bradshaw <bradshaw@staff.crosswalk.com>
35c4faf5 447 - (djm) Bug #138: Make protocol 1 blowfish work with old OpenSSL.
448 Patch from Robert Halubek <rob@adso.com.pl>
e2e36358 449
3445ca02 45020020905
451 - (djm) OpenBSD CVS Sync
452 - stevesk@cvs.openbsd.org 2002/09/04 18:52:42
453 [servconf.c sshd.8 sshd_config.5]
454 default LoginGraceTime to 2m; 1m may be too short for slow systems.
455 ok markus@
cbecf1ed 456 - (djm) Merge openssh-TODO.patch from Redhat (null) beta
c4ee4c60 457 - (djm) Add gnome-ssh-askpass2.c (gtk2) by merge with patch from
458 Nalin Dahyabhai <nalin@redhat.com>
3c1dff28 459 - (djm) Add support for building gtk2 password requestor from Redhat beta
3445ca02 460
954640a4 46120020903
33e2e066 462 - (djm) Patch from itojun@ for Darwin OS: test getaddrinfo, reorder libcrypt
e18b7d35 463 - (djm) Fix Redhat RPM build dependancy test
954640a4 464 - (djm) OpenBSD CVS Sync
465 - markus@cvs.openbsd.org 2002/08/12 10:46:35
466 [ssh-agent.c]
467 make ssh-agent setgid, disallow ptrace.
755c4339 468 - espie@cvs.openbsd.org 2002/08/21 11:20:59
469 [sshd.8]
470 `RSA' updated to refer to `public key', where it matters.
471 okay markus@
6e0fbda1 472 - stevesk@cvs.openbsd.org 2002/08/21 19:38:06
473 [servconf.c sshd.8 sshd_config sshd_config.5]
474 change LoginGraceTime default to 1 minute; ok mouring@ markus@
00e41835 475 - stevesk@cvs.openbsd.org 2002/08/21 20:10:28
476 [ssh-agent.c]
477 raise listen backlog; ok markus@
c1a4eef1 478 - stevesk@cvs.openbsd.org 2002/08/22 19:27:53
479 [ssh-agent.c]
480 use common close function; ok markus@
1d77f8cb 481 - stevesk@cvs.openbsd.org 2002/08/22 19:38:42
482 [clientloop.c]
483 format with current EscapeChar; bugzilla #388 from wknox@mitre.org.
484 ok markus@
f34ec885 485 - stevesk@cvs.openbsd.org 2002/08/22 20:57:19
486 [ssh-agent.c]
487 shutdown(SHUT_RDWR) not needed before close here; ok markus@
848bf884 488 - markus@cvs.openbsd.org 2002/08/22 21:33:58
489 [auth1.c auth2.c]
490 auth_root_allowed() is handled by the monitor in the privsep case,
491 so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325
6c723e7c 492 - markus@cvs.openbsd.org 2002/08/22 21:45:41
493 [session.c]
494 send signal name (not signal number) in "exit-signal" message; noticed
495 by galb@vandyke.com
b41baf4d 496 - stevesk@cvs.openbsd.org 2002/08/27 17:13:56
497 [ssh-rsa.c]
498 RSA_public_decrypt() returns -1 on error so len must be signed;
499 ok markus@
dbcdea68 500 - stevesk@cvs.openbsd.org 2002/08/27 17:18:40
501 [ssh_config.5]
502 some warning text for ForwardAgent and ForwardX11; ok markus@
ba1566dd 503 - stevesk@cvs.openbsd.org 2002/08/29 15:57:25
504 [monitor.c session.c sshlogin.c sshlogin.h]
505 pass addrlen with sockaddr *; from Hajimu UMEMOTO <ume@FreeBSD.org>
506 NOTE: there are also p-specific parts to this patch. ok markus@
e59404d1 507 - stevesk@cvs.openbsd.org 2002/08/29 16:02:54
508 [ssh.1 ssh.c]
509 deprecate -P as UsePrivilegedPort defaults to no now; ok markus@
878b8992 510 - stevesk@cvs.openbsd.org 2002/08/29 16:09:02
511 [ssh_config.5]
512 more on UsePrivilegedPort and setuid root; ok markus@
9f324470 513 - stevesk@cvs.openbsd.org 2002/08/29 19:49:42
514 [ssh.c]
515 shrink initial privilege bracket for setuid case; ok markus@
57ff5eeb 516 - stevesk@cvs.openbsd.org 2002/08/29 22:54:10
517 [ssh_config.5 sshd_config.5]
518 state XAuthLocation is a full pathname
954640a4 519
b85698ab 52020020820
521 - OpenBSD CVS Sync
522 - millert@cvs.openbsd.org 2002/08/02 14:43:15
523 [monitor.c monitor_mm.c]
524 Change mm_zalloc() sanity checks to be more in line with what
525 we do in calloc() and add a check to monitor_mm.c.
526 OK provos@ and markus@
6a342527 527 - marc@cvs.openbsd.org 2002/08/02 16:00:07
528 [ssh.1 sshd.8]
529 note that .ssh/environment is only read when
530 allowed (PermitUserEnvironment in sshd_config).
531 OK markus@
4004c2ac 532 - markus@cvs.openbsd.org 2002/08/02 21:23:41
533 [ssh-rsa.c]
534 diff is u_int (2x); ok deraadt/provos
0caf874a 535 - markus@cvs.openbsd.org 2002/08/02 22:20:30
536 [ssh-rsa.c]
537 replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser
538 for authentication; ok deraadt/djm
75cf7563 539 - aaron@cvs.openbsd.org 2002/08/08 13:50:23
540 [sshconnect1.c]
541 Use & to test if bits are set, not &&; markus@ ok.
d6097023 542 - stevesk@cvs.openbsd.org 2002/08/08 23:54:52
543 [auth.c]
544 typo in comment
36535ee6 545 - stevesk@cvs.openbsd.org 2002/08/09 17:21:42
546 [sshd_config.5]
547 use Op for mdoc conformance; from esr@golux.thyrsus.com
548 ok aaron@
b3641662 549 - stevesk@cvs.openbsd.org 2002/08/09 17:41:12
550 [sshd_config.5]
551 proxy vs. fake display
35453849 552 - stevesk@cvs.openbsd.org 2002/08/12 17:30:35
553 [ssh.1 sshd.8 sshd_config.5]
554 more PermitUserEnvironment; ok markus@
24794905 555 - stevesk@cvs.openbsd.org 2002/08/17 23:07:14
556 [ssh.1]
557 ForwardAgent has defaulted to no for over 2 years; be more clear here.
4dcbbeea 558 - stevesk@cvs.openbsd.org 2002/08/17 23:55:01
559 [ssh_config.5]
560 ordered list here
7d3b91a6 561 - (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assign
562 it to ULONG_MAX.
b85698ab 563
cd018561 56420020813
565 - (tim) [configure.ac] Display OpenSSL header/library version.
566 Patch by dtucker@zip.com.au
567
8a48a7ef 56820020731
569 - (bal) OpenBSD CVS Sync
570 - markus@cvs.openbsd.org 2002/07/24 16:11:18
571 [hostfile.c hostfile.h sshconnect.c]
572 print out all known keys for a host if we get a unknown host key,
573 see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4
574
575 the ssharp mitm tool attacks users in a similar way, so i'd like to
576 pointed out again:
577 A MITM attack is always possible if the ssh client prints:
578 The authenticity of host 'bla' can't be established.
579 (protocol version 2 with pubkey authentication allows you to detect
580 MITM attacks)
5cb5518b 581 - mouring@cvs.openbsd.org 2002/07/25 01:16:59
582 [sftp.c]
583 FallBackToRsh does not exist anywhere else. Remove it from here.
584 OK deraadt.
567a05bf 585 - markus@cvs.openbsd.org 2002/07/29 18:57:30
586 [sshconnect.c]
587 print file:line
f00bab84 588 - markus@cvs.openbsd.org 2002/07/30 17:03:55
589 [auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5]
590 add PermitUserEnvironment (off by default!); from dot@dotat.at;
591 ok provos, deraadt
8a48a7ef 592
13979d47 59320020730
594 - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de
595
d228d9dd 59620020728
597 - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar
16c4a972 598 - (stevesk) [CREDITS] solar
75131bbd 599 - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned
600 char arg.
d228d9dd 601
d40af5fa 60220020725
603 - (djm) Remove some cruft from INSTALL
d91b4743 604 - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/
d40af5fa 605
56b54901 60620020723
607 - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger.
918ffb0b 608 - (bal) sync ID w/ ssh-agent.c
516f0d7d 609 - (bal) OpenBSD Sync
610 - markus@cvs.openbsd.org 2002/07/19 15:43:33
611 [log.c log.h session.c sshd.c]
612 remove fatal cleanups after fork; based on discussions with and code
613 from solar.
5d185586 614 - stevesk@cvs.openbsd.org 2002/07/19 17:42:40
615 [ssh.c]
616 display a warning from ssh when XAuthLocation does not exist or xauth
617 returned no authentication data. ok markus@
30998af1 618 - stevesk@cvs.openbsd.org 2002/07/21 18:32:20
619 [auth-options.c]
620 unneeded includes
dbc728ff 621 - stevesk@cvs.openbsd.org 2002/07/21 18:34:43
622 [auth-options.h]
623 remove invalid comment
97686bf9 624 - markus@cvs.openbsd.org 2002/07/22 11:03:06
625 [session.c]
626 fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors;
d341742a 627 - stevesk@cvs.openbsd.org 2002/07/22 17:32:56
628 [monitor.c]
629 u_int here; ok provos@
67f04db1 630 - stevesk@cvs.openbsd.org 2002/07/23 16:03:10
631 [sshd.c]
632 utmp_len is unsigned; display error consistent with other options.
633 ok markus@
0df3a240 634 - stevesk@cvs.openbsd.org 2002/07/15 17:15:31
635 [uidswap.c]
636 little more debugging; ok markus@
d341742a 637
21c2c5cd 63820020722
639 - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk
a93bd14c 640 - (stevesk) [xmmap.c] missing prototype for fatal()
ccbb983c 641 - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync
642 with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com.
d262b7f2 643 - (bal) [configure.ac] Missing ;; from cray patch.
30eab01d 644 - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines
645 into it's own header.
ee48c949 646 - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be
647 freed by the caller; add free_pam_environment() and use it.
1d3f4ae7 648 - (stevesk) [auth-pam.c] typo in comment
21c2c5cd 649
b992432e 65020020721
651 - (stevesk) [auth-pam.c] merge cosmetic changes from solar's
652 openssh-3.4p1-owl-password-changing.diff
277f55cf 653 - (stevesk) [auth-pam.c] merge rest of solar's PAM patch;
654 PAM_NEW_AUTHTOK_REQD remains in #if 0 for now.
f7808a93 655 - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch
656 warning on pam_conv struct conversation function.
337dde6b 657 - (stevesk) [auth-pam.h] license
8565f28e 658 - (stevesk) [auth-pam.h] unneeded include
e9b2c23d 659 - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h
b992432e 660
ce88d9df 66120020720
662 - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng().
663
4379c0e5 66420020719
665 - (tim) [contrib/solaris/buildpkg.sh] create privsep user/group if needed.
666 Patch by dtucker@zip.com.au
f75ca46d 667 - (tim) [configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au
4379c0e5 668
45491100 66920020718
670 - (tim) [defines.h] Bug 313 patch by dirk.meyer@dinoex.sub.org
671 - (tim) [monitor_mm.c] add missing declaration for xmmap(). Reported
672 by ayamura@ayamura.org
1cbbe6c8 673 - (tim) [configure.ac] Bug 267 rework int64_t test.
5749e709 674 - (tim) [includes.h] Bug 267 add stdint.h
45491100 675
dd3943d0 67620020717
677 - (bal) aixbff package updated by dtucker@zip.com.au
2bf42e4a 678 - (tim) [configure.ac] change how we do paths in AC_PATH_PROGS tests
679 for autoconf 2.53. Based on a patch by jrj@purdue.edu
dd3943d0 680
8fc47887 68120020716
682 - (tim) [contrib/solaris/opensshd.in] Only kill sshd if .pid file found
683
c750d869 68420020715
685 - (bal) OpenBSD CVS Sync
686 - itojun@cvs.openbsd.org 2002/07/12 13:29:09
687 [sshconnect.c]
688 print connect failure during debugging mode.
a2f883ce 689 - markus@cvs.openbsd.org 2002/07/12 15:50:17
690 [cipher.c]
691 EVP_CIPH_CUSTOM_IV for our own rijndael
2d199535 692 - (bal) Remove unused tty defined in do_setusercontext() pointed out by
693 dtucker@zip.com.au plus a a more KNF since I am near it.
846be3f4 694 - (bal) Privsep user creation support in Solaris buildpkg.sh by
695 dtucker@zip.com.au
c750d869 696
798c5808 69720020714
698 - (tim) [Makefile.in] replace "id sshd" with "sshd -t"
4165b82e 699 - (bal/tim) [acconfig.h configure.ac monitor_mm.c servconf.c
700 openbsd-compat/Makefile.in] support compression on platforms that
701 have no/broken MAP_ANON. Moved code to openbsd-compat/xmmap.c
702 Based on patch from nalin@redhat.com of code extracted from Owl's package
5fd8087a 703 - (tim) [ssh_prng_cmds.in] Bug 323 arp -n flag doesn't exist under Solaris.
704 report by chris@by-design.net
fdebdd4f 705 - (tim) [loginrec.c] Bug 347: Fix typo (WTMPX_FILE) report by rodney@bond.net
d80063fe 706 - (tim) [loginrec.c] Bug 348: add missing found = 1; to wtmpx_islogin()
707 report by rodney@bond.net
798c5808 708
6b2a3595 70920020712
710 - (tim) [Makefile.in] quiet down install-files: and check-user:
3085601b 711 - (tim) [configure.ac] remove unused filepriv line
6b2a3595 712
249f9903 71320020710
714 - (tim) [contrib/cygwin/ssh-host-config] explicitely sets the permissions
715 on /var/empty to 755 Patch by vinschen@redhat.com
6f901f8e 716 - (bal) OpenBSD CVS Sync
717 - itojun@cvs.openbsd.org 2002/07/09 11:56:50
718 [sshconnect.c]
719 silently try next address on connect(2). markus ok
59c825e1 720 - itojun@cvs.openbsd.org 2002/07/09 11:56:27
721 [canohost.c]
722 suppress log on reverse lookup failiure, as there's no real value in
723 doing so.
724 markus ok
aab5431b 725 - itojun@cvs.openbsd.org 2002/07/09 12:04:02
726 [sshconnect.c]
727 ed static function (less warnings)
94ad46d1 728 - stevesk@cvs.openbsd.org 2002/07/09 17:46:25
729 [sshd_config.5]
730 clarify no preference ordering in protocol list; ok markus@
9bd68577 731 - itojun@cvs.openbsd.org 2002/07/10 10:28:15
732 [sshconnect.c]
733 bark if all connection attempt fails.
09683edf 734 - deraadt@cvs.openbsd.org 2002/07/10 17:53:54
735 [rijndael.c]
736 use right sizeof in memcpy; markus ok
249f9903 737
e6f15ed1 73820020709
739 - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platforms
740 lacking that concept can share it. Patch by vinschen@redhat.com
741
4f9d6706 74220020708
743 - (tim) [openssh/contrib/solaris/buildpkg.sh] add PKG_INSTALL_ROOT to
744 work in a jumpstart environment. patch by kbrint@rufus.net
b451e27b 745 - (tim) [Makefile.in] workaround for broken pakadd on some systems.
cda1ebcb 746 - (tim) [configure.ac] fix libc89 utimes test. Mention default path for
747 --with-privsep-path=
4f9d6706 748
ac74561e 74920020707
750 - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH)
94d8258b 751 - (tim) [acconfig.h configure.ac sshd.c]
752 s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/
d41f8eed 753 - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes
754 patch from vinschen@redhat.com
0b832146 755 - (bal) [realpath.c] Updated with OpenBSD tree.
da2499f5 756 - (bal) OpenBSD CVS Sync
757 - deraadt@cvs.openbsd.org 2002/07/04 04:15:33
758 [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c]
759 patch memory leaks; grendel@zeitbombe.org
e1feb9bf 760 - deraadt@cvs.openbsd.org 2002/07/04 08:12:15
761 [channels.c packet.c]
762 blah blah minor nothing as i read and re-read and re-read...
eb9f2fab 763 - markus@cvs.openbsd.org 2002/07/04 10:41:47
764 [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c]
765 don't allocate, copy, and discard if there is not interested in the data;
766 ok deraadt@
4394a17f 767 - deraadt@cvs.openbsd.org 2002/07/06 01:00:49
768 [log.c]
769 KNF
50d2fbbc 770 - deraadt@cvs.openbsd.org 2002/07/06 01:01:26
771 [ssh-keyscan.c]
772 KNF, realloc fix, and clean usage
12a3f2c3 773 - stevesk@cvs.openbsd.org 2002/07/06 17:47:58
774 [ssh-keyscan.c]
775 unused variable
41545cb6 776 - (bal) Minor KNF on ssh-keyscan.c
ac74561e 777
0764e748 77820020705
779 - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs.
780 Reported by Darren Tucker <dtucker@zip.com.au>
e12659f4 781 - (tim) [contrib/cygwin/ssh-host-config] double slash corrction
782 from vinschen@redhat.com
0764e748 783
64c0ce80 78420020704
785 - (bal) Limit data to TTY for AIX only (Newer versions can't handle the
786 faster data rate) Bug #124
375c1dee 787 - (bal) glob.c defines TILDE and AIX also defines it. #undef it first.
788 bug #265
ff2de800 789 - (bal) One too many nulls in ports-aix.c
64c0ce80 790
d2f95449 79120020703
792 - (bal) Updated contrib/cygwin/ patch by vinschen@redhat.com
619a6aff 793 - (bal) minor correction to utimes() replacement. Patch by
794 onoe@sm.sony.co.jp
f11fe301 795 - OpenBSD CVS Sync
796 - markus@cvs.openbsd.org 2002/06/27 08:49:44
797 [dh.c ssh-keyscan.c sshconnect.c]
798 more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@
181d6635 799 - deraadt@cvs.openbsd.org 2002/06/27 09:08:00
800 [monitor.c]
801 improve mm_zalloc check; markus ok
30e37ee6 802 - deraadt@cvs.openbsd.org 2002/06/27 10:35:47
803 [auth2-none.c monitor.c sftp-client.c]
804 use xfree()
c8f94200 805 - stevesk@cvs.openbsd.org 2002/06/27 19:49:08
806 [ssh-keyscan.c]
807 use convtime(); ok markus@
a64d3560 808 - millert@cvs.openbsd.org 2002/06/28 01:49:31
809 [monitor_mm.c]
810 tree(3) wants an int return value for its compare functions and
811 the difference between two pointers is not an int. Just do the
812 safest thing and store the result in a long and then return 0,
813 -1, or 1 based on that result.
405a0d43 814 - deraadt@cvs.openbsd.org 2002/06/28 01:50:37
815 [monitor_wrap.c]
816 use ssize_t
4efd85b2 817 - deraadt@cvs.openbsd.org 2002/06/28 10:08:25
818 [sshd.c]
819 range check -u option at invocation
6ded293b 820 - deraadt@cvs.openbsd.org 2002/06/28 23:05:06
821 [sshd.c]
822 gidset[2] -> gidset[1]; markus ok
7fdc56c5 823 - deraadt@cvs.openbsd.org 2002/06/30 21:54:16
824 [auth2.c session.c sshd.c]
825 lint asks that we use names that do not overlap
343288b8 826 - deraadt@cvs.openbsd.org 2002/06/30 21:59:45
827 [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c
828 monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c
829 sshconnect2.c sshd.c]
830 minor KNF
7d60d74c 831 - deraadt@cvs.openbsd.org 2002/07/01 16:15:25
832 [msg.c]
833 %u
713f6cd9 834 - markus@cvs.openbsd.org 2002/07/01 19:48:46
835 [sshconnect2.c]
836 for compression=yes, we fallback to no-compression if the server does
837 not support compression, vice versa for compression=no. ok mouring@
261189cc 838 - markus@cvs.openbsd.org 2002/07/03 09:55:38
839 [ssh-keysign.c]
840 use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld)
841 in order to avoid a possible Kocher timing attack pointed out by Charles
842 Hannum; ok provos@
60cd0a97 843 - markus@cvs.openbsd.org 2002/07/03 14:21:05
844 [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config]
845 re-enable ssh-keysign's sbit, but make ssh-keysign read
846 /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled
847 globally. based on discussions with deraadt, itojun and sommerfeld;
848 ok itojun@
56fd97d7 849 - (bal) Failed password attempts don't increment counter on AIX. Bug #145
e8aa0a5c 850 - (bal) Missed Makefile.in change. keysign needs readconf.o
0ba40daa 851 - (bal) Clean up aix_usrinfo(). Ignore TTY= period I guess.
56fd97d7 852
b2f295dc 85320020702
854 - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc &
855 friends consistently. Spotted by Solar Designer <solar@openwall.com>
856
3c3e878a 85720020629
858 - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style
859 clean up while I'm near it.
860
811ee370 86120020628
862 - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented
863 options should contain default value. from solar.
b9b82dab 864 - (bal) Cygwin uid0 fix by vinschen@redhat.com
17962c40 865 - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c. Otherwise wise
866 have issues of our fixes not propogating right (ie bcopy instead of
867 memmove). OK tim
4fa4fb00 868 - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported.
869 Bug #303
811ee370 870
ce88d9df 87120020627
d1ff09ba 872 - OpenBSD CVS Sync
873 - deraadt@cvs.openbsd.org 2002/06/26 14:49:36
874 [monitor.c]
875 correct %u
63b5f1a1 876 - deraadt@cvs.openbsd.org 2002/06/26 14:50:04
877 [monitor_fdpass.c]
878 use ssize_t for recvmsg() and sendmsg() return
1431a900 879 - markus@cvs.openbsd.org 2002/06/26 14:51:33
880 [ssh-add.c]
881 fix exit code for -X/-x
bb0640b2 882 - deraadt@cvs.openbsd.org 2002/06/26 15:00:32
883 [monitor_wrap.c]
884 more %u
20e79e98 885 - markus@cvs.openbsd.org 2002/06/26 22:27:32
886 [ssh-keysign.c]
887 bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu
d1ff09ba 888
4bfa8bb6 88920020626
890 - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM
a594fa74 891 - (bal) OpenBSD CVS Sync
892 - markus@cvs.openbsd.org 2002/06/23 21:34:07
893 [channels.c]
894 tcode is u_int
38501509 895 - markus@cvs.openbsd.org 2002/06/24 13:12:23
896 [ssh-agent.1]
897 the socket name contains ssh-agent's ppid; via mpech@ from form@
f91d9a89 898 - markus@cvs.openbsd.org 2002/06/24 14:33:27
899 [channels.c channels.h clientloop.c serverloop.c]
900 move channel counter to u_int
1169c3df 901 - markus@cvs.openbsd.org 2002/06/24 14:55:38
902 [authfile.c kex.c ssh-agent.c]
903 cat to (void) when output from buffer_get_X is ignored
09915dc1 904 - itojun@cvs.openbsd.org 2002/06/24 15:49:22
905 [msg.c]
906 printf type pedant
d0a1c5d1 907 - deraadt@cvs.openbsd.org 2002/06/24 17:57:20
908 [sftp-server.c sshpty.c]
909 explicit (u_int) for uid and gid
6c69a6a9 910 - markus@cvs.openbsd.org 2002/06/25 16:22:42
911 [authfd.c]
912 unnecessary cast
87809a1f 913 - markus@cvs.openbsd.org 2002/06/25 18:51:04
914 [sshd.c]
915 lightweight do_setusercontext after chroot()
924681ee 916 - (bal) Updated AIX package build. Patch by dtucker@zip.com.au
46c8ebb3 917 - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8
78beb77d 918 - (bal) added back in error check for mmap(). I screwed up, Pointed
919 out by stevesk@
f2d9a1f8 920 - (tim) [README.privsep] UnixWare tip no longer needed.
88cb875c 921 - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP,
922 but it all damned lies.
0d0270e6 923 - (stevesk) [README.privsep] more for sshd pseudo-account.
8029e7fc 924 - (tim) [contrib/caldera/openssh.spec] add support for privsep
8695f9f7 925 - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@
b29fe4ea 926 - (djm) OpenBSD CVS Sync
927 - markus@cvs.openbsd.org 2002/06/26 08:53:12
928 [bufaux.c]
929 limit size of BNs to 8KB; ok provos/deraadt
22d62d31 930 - markus@cvs.openbsd.org 2002/06/26 08:54:18
931 [buffer.c]
932 limit append to 1MB and buffers to 10MB
5df8c731 933 - markus@cvs.openbsd.org 2002/06/26 08:55:02
934 [channels.c]
935 limit # of channels to 10000
87f18810 936 - markus@cvs.openbsd.org 2002/06/26 08:58:26
937 [session.c]
938 limit # of env vars to 1000; ok deraadt/djm
2f095a0e 939 - deraadt@cvs.openbsd.org 2002/06/26 13:20:57
940 [monitor.c]
941 be careful in mm_zalloc
66087567 942 - deraadt@cvs.openbsd.org 2002/06/26 13:49:26
943 [session.c]
944 disclose less information from environment files; based on input
945 from djm, and dschultz@uclink.Berkeley.EDU
477edc5d 946 - markus@cvs.openbsd.org 2002/06/26 13:55:37
947 [auth2-chall.c]
948 make sure # of response matches # of queries, fixes int overflow;
949 from ISS
03b14b6f 950 - markus@cvs.openbsd.org 2002/06/26 13:56:27
951 [version.h]
952 3.4
9c696d0d 953 - (djm) Require krb5 devel for RPM build w/ KrbV
c4186be7 954 - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai
955 <nalin@redhat.com>
1e7bc74c 956 - (djm) Update spec files for release
49b53b03 957 - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS
03b14b6f 958 - (djm) Release 3.4p1
6519cfd6 959 - (tim) [contrib/caldera/openssh.spec] remove 2 configure options I put in
960 by mistake
4bfa8bb6 961
ef1ac12b 96220020625
963 - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh
1a44c6f7 964 - (stevesk) [README.privsep] minor updates
fd3cbf67 965 - (djm) Create privsep directory and warn if privsep user is missing
966 during make install
702b2855 967 - (bal) Started list of PrivSep issues in TODO
1c6249af 968 - (bal) if mmap() is substandard, don't allow compression on server side.
969 Post 'event' we will add more options.
cbaa3d44 970 - (tim) [contrib/caldera/openssh.spec] Sync with Caldera
e2bc41f9 971 - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by
972 dtucker@zip.com.au
d170feb1 973 - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus
974 for Cygwin, Cray, & SCO
ef1ac12b 975
d5803314 97620020624
977 - OpenBSD CVS Sync
978 - deraadt@cvs.openbsd.org 2002/06/23 03:25:50
979 [tildexpand.c]
980 KNF
3ddc795d 981 - deraadt@cvs.openbsd.org 2002/06/23 03:26:19
982 [cipher.c key.c]
983 KNF
d6133f43 984 - deraadt@cvs.openbsd.org 2002/06/23 03:30:58
985 [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c
986 sshpty.c]
987 various KNF and %d for unsigned
9906a836 988 - deraadt@cvs.openbsd.org 2002/06/23 09:30:14
989 [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c
990 sftp.c]
991 bunch of u_int vs int stuff
512df038 992 - deraadt@cvs.openbsd.org 2002/06/23 09:39:55
993 [ssh-keygen.c]
994 u_int stuff
7528d467 995 - deraadt@cvs.openbsd.org 2002/06/23 09:46:51
996 [bufaux.c servconf.c]
997 minor KNF. things the fingers do while you read
e424e241 998 - deraadt@cvs.openbsd.org 2002/06/23 10:29:52
999 [ssh-agent.c sshd.c]
1000 some minor KNF and %u
7138ebd9 1001 - deraadt@cvs.openbsd.org 2002/06/23 20:39:45
1002 [session.c]
1003 compression_level is u_int
f09ce20a 1004 - deraadt@cvs.openbsd.org 2002/06/23 21:06:13
1005 [sshpty.c]
1006 KNF
57f228e8 1007 - deraadt@cvs.openbsd.org 2002/06/23 21:06:41
1008 [channels.c channels.h session.c session.h]
1009 display, screen, row, col, xpixel, ypixel are u_int; markus ok
0bc50167 1010 - deraadt@cvs.openbsd.org 2002/06/23 21:10:02
1011 [packet.c]
1012 packet_get_int() returns unsigned for reason & seqnr
57f228e8 1013 - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col,
1014 xpixel are u_int.
1015
d5803314 1016
58177c0a 101720020623
1018 - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX.
dc43acd2 1019 - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset.
ef3912be 1020 - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au
a8bbdc75 1021 - OpenBSD CVS Sync
1022 - stevesk@cvs.openbsd.org 2002/06/22 02:00:29
1023 [ssh.h]
1024 correct comment
1ae02182 1025 - stevesk@cvs.openbsd.org 2002/06/22 02:40:23
1026 [ssh.1]
1027 section 5 not 4 for ssh_config
b2843ec6 1028 - naddy@cvs.openbsd.org 2002/06/22 11:51:39
1029 [ssh.1]
1030 typo
75653d3e 1031 - stevesk@cvs.openbsd.org 2002/06/22 16:32:54
1032 [sshd.8]
1033 add /var/empty in FILES section
a56313d7 1034 - stevesk@cvs.openbsd.org 2002/06/22 16:40:19
1035 [sshd.c]
1036 check /var/empty owner mode; ok provos@
e4e83d70 1037 - stevesk@cvs.openbsd.org 2002/06/22 16:41:57
1038 [scp.1]
1039 typo
baa08b92 1040 - stevesk@cvs.openbsd.org 2002/06/22 16:45:29
1041 [ssh-agent.1 sshd.8 sshd_config.5]
1042 use process ID vs. pid/PID/process identifier
c28876e9 1043 - stevesk@cvs.openbsd.org 2002/06/22 20:05:27
1044 [sshd.c]
1045 don't call setsid() if debugging or run from inetd; no "Operation not
1046 permitted" errors now; ok millert@ markus@
d17ef027 1047 - stevesk@cvs.openbsd.org 2002/06/22 23:09:51
1048 [monitor.c]
1049 save auth method before monitor_reset_key_state(); bugzilla bug #284;
1050 ok provos@
58177c0a 1051
0b202697 1052$Id$
This page took 0.610775 seconds and 5 git commands to generate.