]> andersk Git - openssh.git/blame - ChangeLog
- (djm) Sync LICENSE against OpenBSD
[openssh.git] / ChangeLog
CommitLineData
be193d89 120030611
8cb3fa9d 2 - (djm) Sync LICENSE against OpenBSD
be193d89 3 - (djm) OpenBSD CVS Sync
4 - jmc@cvs.openbsd.org 2003/06/10 09:12:11
5 [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5]
6 [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
7 - section reorder
8 - COMPATIBILITY merge
9 - macro cleanup
10 - kill whitespace at EOL
11 - new sentence, new line
12 ssh pages ok markus@
0daa6547 13 - deraadt@cvs.openbsd.org 2003/06/10 22:20:52
14 [packet.c progressmeter.c]
15 mostly ansi cleanup; pval ok
1432b5c4 16 - jakob@cvs.openbsd.org 2003/06/11 10:16:16
17 [sshconnect.c]
18 clean up check_host_key() and improve SSHFP feedback. ok markus@
cc263107 19 - jakob@cvs.openbsd.org 2003/06/11 10:18:47
20 [dns.c]
21 sync with check_host_key() change
ca719034 22 - djm@cvs.openbsd.org 2003/06/11 11:18:38
23 [authfd.c authfd.h ssh-add.c ssh-agent.c]
24 make agent constraints (lifetime, confirm) work with smartcard keys;
25 ok markus@
be193d89 26
27
8a547250 2820030609
29 - (djm) Sync README.smartcard with OpenBSD -current
a1864983 30 - (djm) Re-merge OpenSC info into README.smartcard
8a547250 31
f5db6a03 3220030606
33 - (dtucker) [uidswap.c] Fix setreuid and add missing args to fatal(). ok djm@
34
02e2a074 3520030605
36 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
37 canohost.c changes.
688eed4a 38 - (djm) Implement paranoid priv dropping checks, based on:
39 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
40 Proceedings of USENIX Security Symposium 2002
d6bd2b5a 41 - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
52d58495 42 - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
57c917f8 43 - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
44 Patch from larsch@trustcenter.de
7b7f164b 45 - (djm) Bug #589 - scard-opensc: load only keys with a private keys
46 Patch from larsch@trustcenter.de
4ed465ec 47 - (dtucker) Add includes.h to fake-rfc2553.c so it will build.
e932f447 48 - (dtucker) Define EAI_NONAME in fake-rfc2553.h (used by fake-rfc2553.c).
02e2a074 49
b08a39ff 5020030604
d60e487c 51 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
52 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
8acdec60 53 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
11f1e60e 54 Patch from larsch@trustcenter.de; ok markus@
55 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
56 larsch@trustcenter.de; ok markus@
d453a600 57 - (djm) OpenBSD CVS Sync
58 - djm@cvs.openbsd.org 2003/06/04 08:25:18
59 [sshconnect.c]
60 disable challenge/response and keyboard-interactive auth methods
61 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
62 bz #580; ok markus@
ee50371d 63 - djm@cvs.openbsd.org 2003/06/04 10:23:48
64 [sshd.c]
65 remove duplicated group-dropping code; ok markus@
b08a39ff 66 - djm@cvs.openbsd.org 2003/06/04 12:03:59
67 [serverloop.c]
68 remove bitrotten commet; ok markus@
cf3248b8 69 - djm@cvs.openbsd.org 2003/06/04 12:18:49
70 [scp.c]
71 ansify; ok markus@
0f764b2f 72 - djm@cvs.openbsd.org 2003/06/04 12:40:39
73 [scp.c]
74 kill ssh process upon receipt of signal, bz #241.
75 based on patch from esb AT hawaii.edu; ok markus@
1b558925 76 - djm@cvs.openbsd.org 2003/06/04 12:41:22
77 [sftp.c]
78 kill ssh process on receipt of signal; ok markus@
fba33e81 79 - (djm) Update to fix of bug #584: lock card before return.
80 From larsch@trustcenter.de
8d9bb5dd 81 - (djm) Always use mysignal() for SIGALRM
d60e487c 82
3a2b2b44 8320030603
84 - (djm) Replace setproctitle replacement with code derived from
85 UCB sendmail
c5a7d788 86 - (djm) OpenBSD CVS Sync
87 - markus@cvs.openbsd.org 2003/06/02 09:17:34
88 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
89 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
90 [sshd_config.5]
91 deprecate VerifyReverseMapping since it's dangerous if combined
92 with IP based access control as noted by Mike Harding; replace with
93 a UseDNS option, UseDNS is on by default and includes the
94 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
95 ok deraadt@, djm@
d981089c 96 - millert@cvs.openbsd.org 2003/06/03 02:56:16
97 [scp.c]
98 Remove the advertising clause in the UCB license which Berkeley
99 rescinded 22 July 1999. Proofed by myself and Theo.
c5a7d788 100 - (djm) Fix portable-specific uses of verify_reverse_mapping too
3e67f7df 101 - (djm) Sync openbsd-compat with OpenBSD CVS.
484d59c7 102 - No more 4-term BSD licenses in linked code
5d8ca8c7 103 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
3a2b2b44 104
aff561f9 10520030602
106 - (djm) Fix segv from bad reordering in auth-pam.c
416c732d 107 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
108 clobber
1b7342ab 109 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
110 CVS ID.
8862e142 111 - (djm) Remove "noip6" option from RedHat spec file. This may now be
112 set at runtime using AddressFamily option.
58ba3cb7 113 - (djm) Fix use of macro before #define in cipher-aes.c
382fe2fa 114 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
b0545fe6 115 - (djm) OpenBSD CVS Sync
116 - djm@cvs.openbsd.org 2003/05/26 12:54:40
117 [sshconnect.c]
118 fix format strings; ok markus@
fa5120a0 119 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
120 [sshd.c uidswap.c]
121 seteuid and setegid; markus ok
0f92946c 122 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
123 [ssh_config.5]
124 VerifyHostKeyDNS is v2 only. ok markus@
aff561f9 125
4f178be8 12620030530
127 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
128 roumenpetrov.info
eabb99c6 129 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
4f178be8 130
4881aebb 13120030526
132 - (djm) Avoid auth2-chall.c warning when compiling without
133 PAM, BSD_AUTH and SKEY
134
5b0fe364 13520030525
136- (djm) OpenBSD CVS Sync
137 - djm@cvs.openbsd.org 2003/05/24 09:02:22
138 [log.c]
139 pass logged data through strnvis; ok markus
b9ed513a 140 - djm@cvs.openbsd.org 2003/05/24 09:30:40
141 [authfile.c monitor.c sftp-common.c sshpty.c]
142 cast some types for printing; ok markus@
5b0fe364 143
44c78996 14420030524
145 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
146
d83ebe4a 14720030523
148 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
149 encoding (which encodes many more characters)
bd47824b 150 - OpenBSD CVS Sync
151 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
152 [sftp.1]
153 - new sentence, new line
154 - added .Xr's
155 - typos
156 ok djm@
3cbc677d 157 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
158 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
159 new sentence, new line
da54f5be 160 - djm@cvs.openbsd.org 2003/05/23 08:29:30
161 [sshconnect.c]
162 fix leak; ok markus@
d83ebe4a 163
c453493f 16420030520
165 - (djm) OpenBSD CVS Sync
166 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
167 [log.c]
168 use syslog_r() in a signal handler called place; markus ok
79d4fc55 169 - (djm) Configure logic to detect syslog_r and friends
c453493f 170
acb50584 17120030519
172 - (djm) Sync auth-pam.h with what we actually implement
173
17420030518
5ff453c0 175 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
176 recent merge
f811e52a 177 - (djm) OpenBSD CVS Sync
178 - djm@cvs.openbsd.org 2003/05/16 03:27:12
179 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
180 add AddressFamily option to ssh_config (like -4, -6 on commandline).
181 Portable bug #534; ok markus@
013b1214 182 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
183 [auth-rhosts.c]
184 just in case, put numbers to sscanf %s arg.
25b66522 185 - markus@cvs.openbsd.org 2003/05/17 04:27:52
186 [cipher.c cipher-ctr.c myproposal.h]
187 experimental support for aes-ctr modes from
188 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
189 ok djm@
25351757 190 - (djm) Remove IPv4 by default hack now that we can specify AF in config
3bf784bc 191 - (djm) Tidy and trim TODO
bffa6723 192 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
9901cb37 193 - (djm) Big KNF on openbsd-compat/
f1da2b8b 194 - (djm) KNF on md5crypt.[ch]
195 - (djm) KNF on auth-sia.[ch]
5ff453c0 196
f123055b 19720030517
198 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
199
c936c243 20020030516
201 - (djm) OpenBSD CVS Sync
202 - djm@cvs.openbsd.org 2003/05/15 13:52:10
203 [ssh.c]
204 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
205 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
a2144546 206 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
207 [readconf.c servconf.c]
208 warn for unsupported config option. ok markus@
5bdfde81 209 - markus@cvs.openbsd.org 2003/05/15 14:09:21
210 [auth2-krb5.c]
211 fix 64bit issue; report itojun@
09ab3296 212 - djm@cvs.openbsd.org 2003/05/15 14:55:25
213 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
214 add a ConnectTimeout option to ssh, based on patch from
215 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
b06b11ad 216 - (djm) Add warning for UsePAM when built without PAM support
7be625e1 217 - (djm) A few type mismatch fixes from Bug #565
0eb6370a 218 - (djm) Guard free_pam_environment against NULL argument. Works around
219 HP/UX PAM problems debugged by dtucker
c936c243 220
7efc7f57 22120030515
222 - (djm) OpenBSD CVS Sync
223 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
224 [ssh-agent.1]
225 setup -> set up;
226 from wiz@netbsd
21289cd0 227 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
228 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
229 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
230 add experimental support for verifying hos keys using DNS as described
231 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
232 ok markus@ and henning@
16a79097 233 - markus@cvs.openbsd.org 2003/05/14 22:24:42
234 [clientloop.c session.c ssh.1]
235 allow to send a BREAK to the remote system; ok various
b8c2031b 236 - markus@cvs.openbsd.org 2003/05/15 00:28:28
237 [sshconnect2.c]
238 cleanup unregister of per-method packet handlers; ok djm@
d0ec7f42 239 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
240 [readconf.c readconf.h servconf.c servconf.h]
241 always parse kerberos options. ok djm@ markus@
b414a17b 242 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
243 [dns.c]
244 add missing freerrset
3b6e3da9 245 - markus@cvs.openbsd.org 2003/05/15 03:08:29
246 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
247 split out custom EVP ciphers
02159d9b 248 - djm@cvs.openbsd.org 2003/05/15 03:10:52
249 [ssh-keygen.c]
250 avoid warning; ok jakob@
4a26f5c5 251 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
252 [sftp-int.c]
253 Make put/get (globed and nonglobed) code more consistant. OK djm@
c44f10c6 254 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
dc69f53c 255 [sftp-int.c sftp.c]
c44f10c6 256 Teach ls how to display multiple column display and allow users
257 to return to single column format via 'ls -1'. OK @djm
1457e7ff 258 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
259 [readconf.c servconf.c]
260 disable kerberos when not supported. ok markus@
861f0365 261 - markus@cvs.openbsd.org 2003/05/15 04:08:41
262 [ssh.1]
263 ~B is ssh2 only
d0ec7f42 264 - (djm) Always parse UsePAM
3e05e934 265 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
4460d509 266 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
86ee6794 267 - (djm) Tidy Makefile clean targets
2636769c 268 - (djm) Adapt README.dns for portable
2d2e4a34 269 - (djm) Avoid uuencode.c warnings
1457e7ff 270 - (djm) Enable UsePAM when built --with-pam
67467c30 271 - (djm) Only build getrrsetbyname replacement when using --with-dns
f420d2ba 272 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
273 correctly)
3c49ef10 274 - (djm) Bug #444: Wrong paths after reconfigure
321735c7 275 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
f420d2ba 276
dd3ebb5a 27720030514
278 - (djm) Bug #117: Don't lie to PAM about username
0608f8a7 279 - (djm) RCSID sync w/ OpenBSD
204fde99 280 - (djm) OpenBSD CVS Sync
281 - djm@cvs.openbsd.org 2003/04/09 12:00:37
282 [readconf.c]
283 strip trailing whitespace from config lines before parsing.
284 Fixes bz 528; ok markus@
18ae3c67 285 - markus@cvs.openbsd.org 2003/04/12 10:13:57
286 [cipher.c]
287 hide cipher details; ok djm@
45c42d58 288 - markus@cvs.openbsd.org 2003/04/12 10:15:36
289 [misc.c]
290 debug->debug2
c825cd79 291 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
292 [ssh.1]
293 document -V switch, fix wording; ok markus@
3e131a6d 294 - markus@cvs.openbsd.org 2003/04/14 14:17:50
295 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
296 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
927e9f8b 297 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
298 [sftp-int.c]
299 Missing globfree(&g) in process_put() spotted by Vince Brimhall
300 <VBrimhall@novell.com>. ok@ Theo
301 - markus@cvs.openbsd.org 2003/04/16 14:35:27
302 [auth.h]
303 document struct Authctxt; with solar
b9e5aff6 304 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
305 [ssh-keyscan.c]
306 -t in usage(); rogier@quaak.org
9a26a6e2 307 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
308 [sshd.8 sshd_config.5]
309 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
310 Bug #550 and * escaping suggested by jmc@.
09dc8896 311 - david@cvs.openbsd.org 2003/04/30 20:41:07
312 [sshd.8]
313 fix invalid .Pf macro usage introduced in previous commit
314 ok jmc@ mouring@
3566c73c 315 - markus@cvs.openbsd.org 2003/05/11 16:56:48
316 [authfile.c ssh-keygen.c]
317 change key_load_public to try to read a public from:
318 rsa1 private or rsa1 public and ssh2 keys.
319 this makes ssh-keygen -e fail for ssh1 keys more gracefully
320 for example; report from itojun (netbsd pr 20550).
0d942eff 321 - markus@cvs.openbsd.org 2003/05/11 20:30:25
322 [channels.c clientloop.c serverloop.c session.c ssh.c]
323 make channel_new() strdup the 'remote_name' (not the caller); ok theo
43348518 324 - markus@cvs.openbsd.org 2003/05/12 16:55:37
325 [sshconnect2.c]
326 for pubkey authentication try the user keys in the following order:
327 1. agent keys that are found in the config file
328 2. other agent keys
329 3. keys that are only listed in the config file
330 this helps when an agent has many keys, where the server might
331 close the connection before the correct key is used. report & ok pb@
dc109cfe 332 - markus@cvs.openbsd.org 2003/05/12 18:35:18
333 [ssh-keyscan.1]
334 typo: DSA keys are of type ssh-dss; Brian Poole
81466908 335 - markus@cvs.openbsd.org 2003/05/14 00:52:59
336 [ssh2.h]
337 ranges for per auth method messages
338 - djm@cvs.openbsd.org 2003/05/14 01:00:44
339 [sftp.1]
340 emphasise the batchmode functionality and make reference to pubkey auth,
341 both of which are FAQs; ok markus@
802e01b8 342 - markus@cvs.openbsd.org 2003/05/14 02:15:47
343 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
344 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
345 server interops with commercial client; ok jakob@ djm@
72c5fe79 346 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
347 [sftp.1]
348 - better formatting in SYNOPSIS
349 - whitespace at EOL
350 ok djm@
3a39206f 351 - markus@cvs.openbsd.org 2003/05/14 08:57:49
352 [monitor.c]
353 http://bugzilla.mindrot.org/show_bug.cgi?id=560
354 Privsep child continues to run after monitor killed.
355 Pass monitor signals through to child; Darren Tucker
751092f9 356 - (djm) Make portable build with MIT krb5 (some issues remain)
7fceb20d 357 - (djm) Add new UsePAM configuration directive to allow runtime control
358 over usage of PAM. This allows non-root use of sshd when built with
359 --with-pam
817e6d38 360 - (djm) Die screaming if start_pam() is called when UsePAM=no
83ccf11a 361 - (djm) Avoid KrbV leak for MIT Kerberos
b1848832 362 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
fa065de2 363 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
dd3ebb5a 364
91f3aa9b 36520030512
366 - (djm) Redhat spec: Don't install profile.d scripts when not
367 building with GNOME/GTK askpass (patch from bet@rahul.net)
368
5def520a 36920030510
370 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
371 "make install". Patch by roth@feep.net.
ad84c479 372 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
373 problem on Linux (fixes "could not set controlling tty" errors).
05114c74 374 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
375 proper challenge-response module
23ab1f36 376 - (djm) 2-clause license on loginrec.c, with permission from
377 andre@ae-35.com
5def520a 378
43ce025d 37920030504
dd594f99 380 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
381 Patch from vinschen@redhat.com.
43ce025d 382
2cd5dbba 38320030503
384 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
385 by wendyp@cray.com.
386
bf7c1e6c 38720030502
388 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
389 privsep should now work.
73d9dad3 390 - (dtucker) Move handling of bad password authentications into a platform
990278ef 391 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
bf7c1e6c 392
68ece370 39320030429
394 - (djm) Add back radix.o (used by AFS support), after it went missing from
395 Makefile many moons ago
396 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
397 - (djm) Fix blibpath specification for AIX/gcc
398 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
399
ded9dd18 40020030428
401 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
402 hacked code.
403
aceb0423 40420030427
405 - (bal) Bug #541: return; was dropped by mistake. Reported by
406 furrier@iglou.com
c8a50a34 407 - (bal) Since we don't support platforms lacking u_int_64. We may
408 as well clean out some of those evil #ifdefs
9a6fee8b 409 - (bal) auth1.c minor resync while looking at the code.
d7cf277b 410 - (bal) auth2.c same changed as above.
aceb0423 411
0a626302 41220030409
413 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
414 from matth@eecs.berkeley.edu
d35929b5 415 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
ffd7b36b 416 - (djm) OpenBSD CVS Sync
417 - markus@cvs.openbsd.org 2003/04/02 09:48:07
418 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
419 [readconf.h serverloop.c sshconnect2.c]
420 reapply rekeying chage, tested by henning@, ok djm@
16f1b5ca 421 - markus@cvs.openbsd.org 2003/04/02 14:36:26
422 [ssh-keysign.c]
423 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
6c1bc5c5 424 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
425 [progressmeter.c]
426 $OpenBSD$
427 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
428 [progressmeter.c]
429 remove $OpenBSD$, as other *.c does not have it.
806e4c11 430 - markus@cvs.openbsd.org 2003/04/07 08:29:57
431 [monitor_wrap.c]
432 typo: get correct counters; introduced during rekeying change.
2f5b2528 433 - millert@cvs.openbsd.org 2003/04/07 21:58:05
434 [progressmeter.c]
435 The UCB copyright here is incorrect. This code did not originate
436 at UCB, it was written by Luke Mewburn. Updated the copyright at
437 the author's request. markus@ OK
438 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
439 [*.c *.h]
440 rename log() into logit() to avoid name conflict. markus ok, from
441 netbsd
442 - (djm) XXX - Performed locally using:
443 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
70e1f62f 444 - hin@cvs.openbsd.org 2003/04/09 08:23:52
445 [servconf.c]
446 Don't include <krb.h> when compiling with Kerberos 5 support
2f5b2528 447 - (djm) Fix up missing include for packet.c
a3568201 448 - (djm) Fix missed log => logit occurance (reference by function pointer)
0a626302 449
4d0cb2e5 45020030402
451 - (bal) if IP_TOS is not found or broken don't try to compile in
452 packet_set_tos() function call. bug #527
453
a4e5acef 45420030401
455 - (djm) OpenBSD CVS Sync
456 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
457 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
458 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
459 - killed whitespace
460 - new sentence new line
461 - .Bk for arguments
462 ok markus@
177f584b 463 - markus@cvs.openbsd.org 2003/04/01 10:10:23
464 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
465 [readconf.h serverloop.c sshconnect2.c]
466 rekeying bugfixes and automatic rekeying:
467 * both client and server rekey _automatically_
468 (a) after 2^31 packets, because after 2^32 packets
469 the sequence number for packets wraps
470 (b) after 2^(blocksize_in_bits/4) blocks
471 (see: draft-ietf-secsh-newmodes-00.txt)
472 (a) and (b) are _enabled_ by default, and only disabled for known
473 openssh versions, that don't support rekeying properly.
474 * client option 'RekeyLimit'
475 * do not reply to requests during rekeying
476 - markus@cvs.openbsd.org 2003/04/01 10:22:21
477 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
478 [readconf.h serverloop.c sshconnect2.c]
479 backout rekeying changes (for 3.6.1)
519bdfe8 480 - markus@cvs.openbsd.org 2003/04/01 10:31:26
481 [compat.c compat.h kex.c]
482 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
483 tested by ho@ and myself
9dd240a3 484 - markus@cvs.openbsd.org 2003/04/01 10:56:46
485 [version.h]
486 3.6.1
ac01b518 487 - (djm) Crank spec file versions
b32453fe 488 - (djm) Release 3.6.1p1
a4e5acef 489
fd77a40f 49020030326
491 - (djm) OpenBSD CVS Sync
492 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
493 [sftp-server.c]
494 one last fix to the tree: race fix broke stuff; pr 3169;
495 srp@srparish.net, help from djm
496
8021857c 49720030325
498 - (djm) Fix getpeerid support for 64 bit BE systems. From
499 Arnd Bergmann <arndb@de.ibm.com>
500
cdb64c4d 50120030324
502 - (djm) OpenBSD CVS Sync
503 - markus@cvs.openbsd.org 2003/03/23 19:02:00
504 [monitor.c]
505 unbreak rekeying for privsep; ok millert@
506 - Release 3.6p1
62086365 507 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
508 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
cdb64c4d 509
0b202697 510$Id$
This page took 6.247296 seconds and 5 git commands to generate.