]> andersk Git - openssh.git/blame - ChangeLog
- (djm) Always use mysignal() for SIGALRM
[openssh.git] / ChangeLog
CommitLineData
b08a39ff 120030604
d60e487c 2 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
3 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
8acdec60 4 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
11f1e60e 5 Patch from larsch@trustcenter.de; ok markus@
6 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
7 larsch@trustcenter.de; ok markus@
d453a600 8 - (djm) OpenBSD CVS Sync
9 - djm@cvs.openbsd.org 2003/06/04 08:25:18
10 [sshconnect.c]
11 disable challenge/response and keyboard-interactive auth methods
12 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
13 bz #580; ok markus@
ee50371d 14 - djm@cvs.openbsd.org 2003/06/04 10:23:48
15 [sshd.c]
16 remove duplicated group-dropping code; ok markus@
b08a39ff 17 - djm@cvs.openbsd.org 2003/06/04 12:03:59
18 [serverloop.c]
19 remove bitrotten commet; ok markus@
cf3248b8 20 - djm@cvs.openbsd.org 2003/06/04 12:18:49
21 [scp.c]
22 ansify; ok markus@
0f764b2f 23 - djm@cvs.openbsd.org 2003/06/04 12:40:39
24 [scp.c]
25 kill ssh process upon receipt of signal, bz #241.
26 based on patch from esb AT hawaii.edu; ok markus@
1b558925 27 - djm@cvs.openbsd.org 2003/06/04 12:41:22
28 [sftp.c]
29 kill ssh process on receipt of signal; ok markus@
fba33e81 30 - (djm) Update to fix of bug #584: lock card before return.
31 From larsch@trustcenter.de
8d9bb5dd 32 - (djm) Always use mysignal() for SIGALRM
d60e487c 33
3a2b2b44 3420030603
35 - (djm) Replace setproctitle replacement with code derived from
36 UCB sendmail
c5a7d788 37 - (djm) OpenBSD CVS Sync
38 - markus@cvs.openbsd.org 2003/06/02 09:17:34
39 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
40 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
41 [sshd_config.5]
42 deprecate VerifyReverseMapping since it's dangerous if combined
43 with IP based access control as noted by Mike Harding; replace with
44 a UseDNS option, UseDNS is on by default and includes the
45 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
46 ok deraadt@, djm@
d981089c 47 - millert@cvs.openbsd.org 2003/06/03 02:56:16
48 [scp.c]
49 Remove the advertising clause in the UCB license which Berkeley
50 rescinded 22 July 1999. Proofed by myself and Theo.
c5a7d788 51 - (djm) Fix portable-specific uses of verify_reverse_mapping too
3e67f7df 52 - (djm) Sync openbsd-compat with OpenBSD CVS.
484d59c7 53 - No more 4-term BSD licenses in linked code
5d8ca8c7 54 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
3a2b2b44 55
aff561f9 5620030602
57 - (djm) Fix segv from bad reordering in auth-pam.c
416c732d 58 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
59 clobber
1b7342ab 60 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
61 CVS ID.
8862e142 62 - (djm) Remove "noip6" option from RedHat spec file. This may now be
63 set at runtime using AddressFamily option.
58ba3cb7 64 - (djm) Fix use of macro before #define in cipher-aes.c
382fe2fa 65 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
b0545fe6 66 - (djm) OpenBSD CVS Sync
67 - djm@cvs.openbsd.org 2003/05/26 12:54:40
68 [sshconnect.c]
69 fix format strings; ok markus@
fa5120a0 70 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
71 [sshd.c uidswap.c]
72 seteuid and setegid; markus ok
0f92946c 73 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
74 [ssh_config.5]
75 VerifyHostKeyDNS is v2 only. ok markus@
aff561f9 76
4f178be8 7720030530
78 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
79 roumenpetrov.info
eabb99c6 80 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
4f178be8 81
4881aebb 8220030526
83 - (djm) Avoid auth2-chall.c warning when compiling without
84 PAM, BSD_AUTH and SKEY
85
5b0fe364 8620030525
87- (djm) OpenBSD CVS Sync
88 - djm@cvs.openbsd.org 2003/05/24 09:02:22
89 [log.c]
90 pass logged data through strnvis; ok markus
b9ed513a 91 - djm@cvs.openbsd.org 2003/05/24 09:30:40
92 [authfile.c monitor.c sftp-common.c sshpty.c]
93 cast some types for printing; ok markus@
5b0fe364 94
44c78996 9520030524
96 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
97
d83ebe4a 9820030523
99 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
100 encoding (which encodes many more characters)
bd47824b 101 - OpenBSD CVS Sync
102 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
103 [sftp.1]
104 - new sentence, new line
105 - added .Xr's
106 - typos
107 ok djm@
3cbc677d 108 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
109 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
110 new sentence, new line
da54f5be 111 - djm@cvs.openbsd.org 2003/05/23 08:29:30
112 [sshconnect.c]
113 fix leak; ok markus@
d83ebe4a 114
c453493f 11520030520
116 - (djm) OpenBSD CVS Sync
117 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
118 [log.c]
119 use syslog_r() in a signal handler called place; markus ok
79d4fc55 120 - (djm) Configure logic to detect syslog_r and friends
c453493f 121
acb50584 12220030519
123 - (djm) Sync auth-pam.h with what we actually implement
124
12520030518
5ff453c0 126 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
127 recent merge
f811e52a 128 - (djm) OpenBSD CVS Sync
129 - djm@cvs.openbsd.org 2003/05/16 03:27:12
130 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
131 add AddressFamily option to ssh_config (like -4, -6 on commandline).
132 Portable bug #534; ok markus@
013b1214 133 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
134 [auth-rhosts.c]
135 just in case, put numbers to sscanf %s arg.
25b66522 136 - markus@cvs.openbsd.org 2003/05/17 04:27:52
137 [cipher.c cipher-ctr.c myproposal.h]
138 experimental support for aes-ctr modes from
139 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
140 ok djm@
25351757 141 - (djm) Remove IPv4 by default hack now that we can specify AF in config
3bf784bc 142 - (djm) Tidy and trim TODO
bffa6723 143 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
9901cb37 144 - (djm) Big KNF on openbsd-compat/
f1da2b8b 145 - (djm) KNF on md5crypt.[ch]
146 - (djm) KNF on auth-sia.[ch]
5ff453c0 147
f123055b 14820030517
149 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
150
c936c243 15120030516
152 - (djm) OpenBSD CVS Sync
153 - djm@cvs.openbsd.org 2003/05/15 13:52:10
154 [ssh.c]
155 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
156 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
a2144546 157 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
158 [readconf.c servconf.c]
159 warn for unsupported config option. ok markus@
5bdfde81 160 - markus@cvs.openbsd.org 2003/05/15 14:09:21
161 [auth2-krb5.c]
162 fix 64bit issue; report itojun@
09ab3296 163 - djm@cvs.openbsd.org 2003/05/15 14:55:25
164 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
165 add a ConnectTimeout option to ssh, based on patch from
166 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
b06b11ad 167 - (djm) Add warning for UsePAM when built without PAM support
7be625e1 168 - (djm) A few type mismatch fixes from Bug #565
0eb6370a 169 - (djm) Guard free_pam_environment against NULL argument. Works around
170 HP/UX PAM problems debugged by dtucker
c936c243 171
7efc7f57 17220030515
173 - (djm) OpenBSD CVS Sync
174 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
175 [ssh-agent.1]
176 setup -> set up;
177 from wiz@netbsd
21289cd0 178 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
179 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
180 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
181 add experimental support for verifying hos keys using DNS as described
182 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
183 ok markus@ and henning@
16a79097 184 - markus@cvs.openbsd.org 2003/05/14 22:24:42
185 [clientloop.c session.c ssh.1]
186 allow to send a BREAK to the remote system; ok various
b8c2031b 187 - markus@cvs.openbsd.org 2003/05/15 00:28:28
188 [sshconnect2.c]
189 cleanup unregister of per-method packet handlers; ok djm@
d0ec7f42 190 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
191 [readconf.c readconf.h servconf.c servconf.h]
192 always parse kerberos options. ok djm@ markus@
b414a17b 193 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
194 [dns.c]
195 add missing freerrset
3b6e3da9 196 - markus@cvs.openbsd.org 2003/05/15 03:08:29
197 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
198 split out custom EVP ciphers
02159d9b 199 - djm@cvs.openbsd.org 2003/05/15 03:10:52
200 [ssh-keygen.c]
201 avoid warning; ok jakob@
4a26f5c5 202 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
203 [sftp-int.c]
204 Make put/get (globed and nonglobed) code more consistant. OK djm@
c44f10c6 205 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
dc69f53c 206 [sftp-int.c sftp.c]
c44f10c6 207 Teach ls how to display multiple column display and allow users
208 to return to single column format via 'ls -1'. OK @djm
1457e7ff 209 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
210 [readconf.c servconf.c]
211 disable kerberos when not supported. ok markus@
861f0365 212 - markus@cvs.openbsd.org 2003/05/15 04:08:41
213 [ssh.1]
214 ~B is ssh2 only
d0ec7f42 215 - (djm) Always parse UsePAM
3e05e934 216 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
4460d509 217 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
86ee6794 218 - (djm) Tidy Makefile clean targets
2636769c 219 - (djm) Adapt README.dns for portable
2d2e4a34 220 - (djm) Avoid uuencode.c warnings
1457e7ff 221 - (djm) Enable UsePAM when built --with-pam
67467c30 222 - (djm) Only build getrrsetbyname replacement when using --with-dns
f420d2ba 223 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
224 correctly)
3c49ef10 225 - (djm) Bug #444: Wrong paths after reconfigure
321735c7 226 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
f420d2ba 227
dd3ebb5a 22820030514
229 - (djm) Bug #117: Don't lie to PAM about username
0608f8a7 230 - (djm) RCSID sync w/ OpenBSD
204fde99 231 - (djm) OpenBSD CVS Sync
232 - djm@cvs.openbsd.org 2003/04/09 12:00:37
233 [readconf.c]
234 strip trailing whitespace from config lines before parsing.
235 Fixes bz 528; ok markus@
18ae3c67 236 - markus@cvs.openbsd.org 2003/04/12 10:13:57
237 [cipher.c]
238 hide cipher details; ok djm@
45c42d58 239 - markus@cvs.openbsd.org 2003/04/12 10:15:36
240 [misc.c]
241 debug->debug2
c825cd79 242 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
243 [ssh.1]
244 document -V switch, fix wording; ok markus@
3e131a6d 245 - markus@cvs.openbsd.org 2003/04/14 14:17:50
246 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
247 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
927e9f8b 248 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
249 [sftp-int.c]
250 Missing globfree(&g) in process_put() spotted by Vince Brimhall
251 <VBrimhall@novell.com>. ok@ Theo
252 - markus@cvs.openbsd.org 2003/04/16 14:35:27
253 [auth.h]
254 document struct Authctxt; with solar
b9e5aff6 255 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
256 [ssh-keyscan.c]
257 -t in usage(); rogier@quaak.org
9a26a6e2 258 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
259 [sshd.8 sshd_config.5]
260 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
261 Bug #550 and * escaping suggested by jmc@.
09dc8896 262 - david@cvs.openbsd.org 2003/04/30 20:41:07
263 [sshd.8]
264 fix invalid .Pf macro usage introduced in previous commit
265 ok jmc@ mouring@
3566c73c 266 - markus@cvs.openbsd.org 2003/05/11 16:56:48
267 [authfile.c ssh-keygen.c]
268 change key_load_public to try to read a public from:
269 rsa1 private or rsa1 public and ssh2 keys.
270 this makes ssh-keygen -e fail for ssh1 keys more gracefully
271 for example; report from itojun (netbsd pr 20550).
0d942eff 272 - markus@cvs.openbsd.org 2003/05/11 20:30:25
273 [channels.c clientloop.c serverloop.c session.c ssh.c]
274 make channel_new() strdup the 'remote_name' (not the caller); ok theo
43348518 275 - markus@cvs.openbsd.org 2003/05/12 16:55:37
276 [sshconnect2.c]
277 for pubkey authentication try the user keys in the following order:
278 1. agent keys that are found in the config file
279 2. other agent keys
280 3. keys that are only listed in the config file
281 this helps when an agent has many keys, where the server might
282 close the connection before the correct key is used. report & ok pb@
dc109cfe 283 - markus@cvs.openbsd.org 2003/05/12 18:35:18
284 [ssh-keyscan.1]
285 typo: DSA keys are of type ssh-dss; Brian Poole
81466908 286 - markus@cvs.openbsd.org 2003/05/14 00:52:59
287 [ssh2.h]
288 ranges for per auth method messages
289 - djm@cvs.openbsd.org 2003/05/14 01:00:44
290 [sftp.1]
291 emphasise the batchmode functionality and make reference to pubkey auth,
292 both of which are FAQs; ok markus@
802e01b8 293 - markus@cvs.openbsd.org 2003/05/14 02:15:47
294 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
295 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
296 server interops with commercial client; ok jakob@ djm@
72c5fe79 297 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
298 [sftp.1]
299 - better formatting in SYNOPSIS
300 - whitespace at EOL
301 ok djm@
3a39206f 302 - markus@cvs.openbsd.org 2003/05/14 08:57:49
303 [monitor.c]
304 http://bugzilla.mindrot.org/show_bug.cgi?id=560
305 Privsep child continues to run after monitor killed.
306 Pass monitor signals through to child; Darren Tucker
751092f9 307 - (djm) Make portable build with MIT krb5 (some issues remain)
7fceb20d 308 - (djm) Add new UsePAM configuration directive to allow runtime control
309 over usage of PAM. This allows non-root use of sshd when built with
310 --with-pam
817e6d38 311 - (djm) Die screaming if start_pam() is called when UsePAM=no
83ccf11a 312 - (djm) Avoid KrbV leak for MIT Kerberos
b1848832 313 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
fa065de2 314 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
dd3ebb5a 315
91f3aa9b 31620030512
317 - (djm) Redhat spec: Don't install profile.d scripts when not
318 building with GNOME/GTK askpass (patch from bet@rahul.net)
319
5def520a 32020030510
321 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
322 "make install". Patch by roth@feep.net.
ad84c479 323 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
324 problem on Linux (fixes "could not set controlling tty" errors).
05114c74 325 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
326 proper challenge-response module
23ab1f36 327 - (djm) 2-clause license on loginrec.c, with permission from
328 andre@ae-35.com
5def520a 329
43ce025d 33020030504
dd594f99 331 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
332 Patch from vinschen@redhat.com.
43ce025d 333
2cd5dbba 33420030503
335 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
336 by wendyp@cray.com.
337
bf7c1e6c 33820030502
339 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
340 privsep should now work.
73d9dad3 341 - (dtucker) Move handling of bad password authentications into a platform
990278ef 342 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
bf7c1e6c 343
68ece370 34420030429
345 - (djm) Add back radix.o (used by AFS support), after it went missing from
346 Makefile many moons ago
347 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
348 - (djm) Fix blibpath specification for AIX/gcc
349 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
350
ded9dd18 35120030428
352 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
353 hacked code.
354
aceb0423 35520030427
356 - (bal) Bug #541: return; was dropped by mistake. Reported by
357 furrier@iglou.com
c8a50a34 358 - (bal) Since we don't support platforms lacking u_int_64. We may
359 as well clean out some of those evil #ifdefs
9a6fee8b 360 - (bal) auth1.c minor resync while looking at the code.
d7cf277b 361 - (bal) auth2.c same changed as above.
aceb0423 362
0a626302 36320030409
364 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
365 from matth@eecs.berkeley.edu
d35929b5 366 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
ffd7b36b 367 - (djm) OpenBSD CVS Sync
368 - markus@cvs.openbsd.org 2003/04/02 09:48:07
369 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
370 [readconf.h serverloop.c sshconnect2.c]
371 reapply rekeying chage, tested by henning@, ok djm@
16f1b5ca 372 - markus@cvs.openbsd.org 2003/04/02 14:36:26
373 [ssh-keysign.c]
374 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
6c1bc5c5 375 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
376 [progressmeter.c]
377 $OpenBSD$
378 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
379 [progressmeter.c]
380 remove $OpenBSD$, as other *.c does not have it.
806e4c11 381 - markus@cvs.openbsd.org 2003/04/07 08:29:57
382 [monitor_wrap.c]
383 typo: get correct counters; introduced during rekeying change.
2f5b2528 384 - millert@cvs.openbsd.org 2003/04/07 21:58:05
385 [progressmeter.c]
386 The UCB copyright here is incorrect. This code did not originate
387 at UCB, it was written by Luke Mewburn. Updated the copyright at
388 the author's request. markus@ OK
389 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
390 [*.c *.h]
391 rename log() into logit() to avoid name conflict. markus ok, from
392 netbsd
393 - (djm) XXX - Performed locally using:
394 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
70e1f62f 395 - hin@cvs.openbsd.org 2003/04/09 08:23:52
396 [servconf.c]
397 Don't include <krb.h> when compiling with Kerberos 5 support
2f5b2528 398 - (djm) Fix up missing include for packet.c
a3568201 399 - (djm) Fix missed log => logit occurance (reference by function pointer)
0a626302 400
4d0cb2e5 40120030402
402 - (bal) if IP_TOS is not found or broken don't try to compile in
403 packet_set_tos() function call. bug #527
404
a4e5acef 40520030401
406 - (djm) OpenBSD CVS Sync
407 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
408 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
409 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
410 - killed whitespace
411 - new sentence new line
412 - .Bk for arguments
413 ok markus@
177f584b 414 - markus@cvs.openbsd.org 2003/04/01 10:10:23
415 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
416 [readconf.h serverloop.c sshconnect2.c]
417 rekeying bugfixes and automatic rekeying:
418 * both client and server rekey _automatically_
419 (a) after 2^31 packets, because after 2^32 packets
420 the sequence number for packets wraps
421 (b) after 2^(blocksize_in_bits/4) blocks
422 (see: draft-ietf-secsh-newmodes-00.txt)
423 (a) and (b) are _enabled_ by default, and only disabled for known
424 openssh versions, that don't support rekeying properly.
425 * client option 'RekeyLimit'
426 * do not reply to requests during rekeying
427 - markus@cvs.openbsd.org 2003/04/01 10:22:21
428 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
429 [readconf.h serverloop.c sshconnect2.c]
430 backout rekeying changes (for 3.6.1)
519bdfe8 431 - markus@cvs.openbsd.org 2003/04/01 10:31:26
432 [compat.c compat.h kex.c]
433 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
434 tested by ho@ and myself
9dd240a3 435 - markus@cvs.openbsd.org 2003/04/01 10:56:46
436 [version.h]
437 3.6.1
ac01b518 438 - (djm) Crank spec file versions
b32453fe 439 - (djm) Release 3.6.1p1
a4e5acef 440
fd77a40f 44120030326
442 - (djm) OpenBSD CVS Sync
443 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
444 [sftp-server.c]
445 one last fix to the tree: race fix broke stuff; pr 3169;
446 srp@srparish.net, help from djm
447
8021857c 44820030325
449 - (djm) Fix getpeerid support for 64 bit BE systems. From
450 Arnd Bergmann <arndb@de.ibm.com>
451
cdb64c4d 45220030324
453 - (djm) OpenBSD CVS Sync
454 - markus@cvs.openbsd.org 2003/03/23 19:02:00
455 [monitor.c]
456 unbreak rekeying for privsep; ok millert@
457 - Release 3.6p1
62086365 458 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
459 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
cdb64c4d 460
0b202697 461$Id$
This page took 0.465138 seconds and 5 git commands to generate.