]> andersk Git - openssh.git/blame - ChangeLog
- markus@cvs.openbsd.org 2003/07/02 12:56:34
[openssh.git] / ChangeLog
CommitLineData
71b9ced0 120030703
2 - (dtucker) OpenBSD CVS Sync
3 - djm@cvs.openbsd.org 2003/06/28 07:48:10
4 [sshd.c]
5 report pidfile creation errors, based on patch from Roumen Petrov;
6 ok markus@
dc54438a 7 - deraadt@cvs.openbsd.org 2003/06/28 16:23:06
8 [atomicio.c atomicio.h authfd.c clientloop.c monitor_wrap.c msg.c
9 progressmeter.c scp.c sftp-client.c ssh-keyscan.c ssh.h sshconnect.c
10 sshd.c]
11 deal with typing of write vs read in atomicio
7caca6d4 12 - markus@cvs.openbsd.org 2003/06/29 12:44:38
13 [sshconnect.c]
14 memset 0, not \0; andrushock@korovino.net
8e7c9afc 15 - markus@cvs.openbsd.org 2003/07/02 12:56:34
16 [channels.c]
17 deny dynamic forwarding with -R for v1, too; ok djm@
71b9ced0 18
4e00038c 1920030630
20 - (djm) Search for support functions necessary to build our
21 getrrsetbyname() replacement. Patch from Roumen Petrov
22
9f59c5a3 2320030629
c5829391 24 - (dtucker) [includes.h] Bug #602: move #include of netdb.h to after in.h
25 (fixes compiler warnings on Solaris 2.5.1).
26 - (dtucker) [configure.ac] Add sanity test after system-dependant compiler
27 flag modifications.
9f59c5a3 28
9ea150a7 2920030628
30 - (djm) Bug #591: use PKCS#15 private key label as a comment in case
31 of OpenSC. Report and patch from larsch@trustcenter.de
d2168412 32 - (djm) Bug #593: Sanity check OpenSC card reader number; patch from
33 aj@dungeon.inka.de
f0677b69 34 - (dtucker) OpenBSD CVS Sync
35 - markus@cvs.openbsd.org 2003/06/23 09:02:44
36 [ssh_config.5]
37 document EnableSSHKeysign; bugzilla #599; ok deraadt@, jmc@
a27002e5 38 - markus@cvs.openbsd.org 2003/06/24 08:23:46
39 [auth2-hostbased.c auth2-pubkey.c auth2.c channels.c key.c key.h
40 monitor.c packet.c packet.h serverloop.c sshconnect2.c sshd.c]
41 int -> u_int; ok djm@, deraadt@, mouring@
d7ded285 42 - miod@cvs.openbsd.org 2003/06/25 22:39:36
43 [sftp-server.c]
44 Typo police: attribute is better written with an 'r'.
2d9c1828 45 - markus@cvs.openbsd.org 2003/06/26 20:08:33
46 [readconf.c]
47 do not dump core for 'ssh -o proxycommand host'; ok deraadt@
78b2dd04 48 - (dtucker) [regress/dynamic-forward.sh] Import new regression test.
ddb154b3 49 - (dtucker) [configure.ac] Bug #570: Have ./configure --enable-FEATURE
50 actually enable the feature, for those normally disabled. Patch by
51 openssh (at) roumenpetrov.info.
f0677b69 52
e15ba28b 5320030624
54 - (dtucker) Have configure refer the user to config.log and
55 contrib/findssl.sh for OpenSSL header/library mismatches.
56
63a556df 5720030622
c1ffd4bd 58 - (dtucker) OpenBSD CVS Sync
63a556df 59 - markus@cvs.openbsd.org 2003/06/21 09:14:05
c1ffd4bd 60 [regress/reconfigure.sh]
63a556df 61 missing $SUDO; from dtucker@zip.com.au
93527718 62 - markus@cvs.openbsd.org 2003/06/18 11:28:11
c1ffd4bd 63 [ssh-rsa.c]
64 backout last change, since it violates pkcs#1
65 switch to share/misc/license.template
1891396b 66 - djm@cvs.openbsd.org 2003/06/20 05:47:58
67 [sshd_config.5]
68 sync description of protocol 2 cipher proposal; ok markus
4db4d313 69 - djm@cvs.openbsd.org 2003/06/20 05:48:21
70 [sshd_config]
71 sync some implemented options; ok markus@
63a556df 72 - (dtucker) [regress/authorized_keys_root] Remove temp data file from CVS.
39ef3618 73 - (dtucker) [openbsd-compat/setproctitle.c] Ensure SPT_TYPE is defined before
74 testing its value.
63a556df 75
b8e04133 7620030618
77 - (djm) OpenBSD CVS Sync
78 - markus@cvs.openbsd.org 2003/06/12 07:57:38
79 [monitor.c sshlogin.c sshpty.c]
80 typos; dtucker at zip.com.au
b9ad9d13 81 - djm@cvs.openbsd.org 2003/06/12 12:22:47
82 [LICENCE]
83 mention more copyright holders; ok markus@
1fb23629 84 - nino@cvs.openbsd.org 2003/06/12 15:34:09
85 [scp.c]
86 Typo. Ok markus@.
244e796f 87 - markus@cvs.openbsd.org 2003/06/12 19:12:03
88 [scard.c scard.h ssh-agent.c ssh.c]
89 add sc_get_key_label; larsch at trustcenter.de; bugzilla#591
9250058a 90 - markus@cvs.openbsd.org 2003/06/16 08:22:35
91 [ssh-rsa.c]
92 make sure the signature has at least the expected length (don't
93 insist on len == hlen + oidlen, since this breaks some smartcards)
94 bugzilla #592; ok djm@
360a4aae 95 - markus@cvs.openbsd.org 2003/06/16 10:22:45
96 [ssh-add.c]
97 print out key comment on each prompt; make ssh-askpass more useable; ok djm@
0a59bd6b 98 - markus@cvs.openbsd.org 2003/06/17 18:14:23
99 [cipher-ctr.c]
100 use license from /usr/share/misc/license.template for new code
1d6c0b69 101 - (dtucker) [reconfigure.sh rekey.sh sftp-badcmds.sh]
102 Import new regression tests from OpenBSD
d4d84f5f 103 - (dtucker) [regress/copy.1 regress/copy.2] Remove temp data files from CVS.
ed49cc81 104 - (dtucker) OpenBSD CVS Sync (regress/)
105 - markus@cvs.openbsd.org 2003/04/02 12:21:13
106 [Makefile]
107 enable rekey test
2c670155 108 - djm@cvs.openbsd.org 2003/04/04 09:34:22
109 [Makefile sftp-cmds.sh]
110 More regression tests, including recent directory rename bug; ok markus@
737447ad 111 - markus@cvs.openbsd.org 2003/05/14 22:08:27
112 [ssh-com-client.sh ssh-com-keygen.sh ssh-com-sftp.sh ssh-com.sh]
113 test against some new commerical versions
68df2aa0 114 - mouring@cvs.openbsd.org 2003/05/15 04:07:12
115 [sftp-cmds.sh]
116 Advanced put/get testing for sftp. OK @djm
eb9bf761 117 - markus@cvs.openbsd.org 2003/06/12 15:40:01
118 [try-ciphers.sh]
119 add ctr
39c0191e 120 - markus@cvs.openbsd.org 2003/06/12 15:43:32
121 [Makefile]
122 test -HUP; dtucker at zip.com.au
b8e04133 123
f5827134 12420030614
125 - (djm) Update license on fake-rfc2553.[ch]; ok itojun@
126
be193d89 12720030611
c12c6ef8 128 - (djm) Mention portable copyright holders in LICENSE
e52ca1e5 129 - (djm) Put licenses on substantial header files
8cb3fa9d 130 - (djm) Sync LICENSE against OpenBSD
be193d89 131 - (djm) OpenBSD CVS Sync
132 - jmc@cvs.openbsd.org 2003/06/10 09:12:11
133 [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5]
134 [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
135 - section reorder
136 - COMPATIBILITY merge
137 - macro cleanup
138 - kill whitespace at EOL
139 - new sentence, new line
140 ssh pages ok markus@
0daa6547 141 - deraadt@cvs.openbsd.org 2003/06/10 22:20:52
142 [packet.c progressmeter.c]
143 mostly ansi cleanup; pval ok
1432b5c4 144 - jakob@cvs.openbsd.org 2003/06/11 10:16:16
145 [sshconnect.c]
146 clean up check_host_key() and improve SSHFP feedback. ok markus@
cc263107 147 - jakob@cvs.openbsd.org 2003/06/11 10:18:47
148 [dns.c]
149 sync with check_host_key() change
ca719034 150 - djm@cvs.openbsd.org 2003/06/11 11:18:38
151 [authfd.c authfd.h ssh-add.c ssh-agent.c]
152 make agent constraints (lifetime, confirm) work with smartcard keys;
153 ok markus@
be193d89 154
155
8a547250 15620030609
157 - (djm) Sync README.smartcard with OpenBSD -current
a1864983 158 - (djm) Re-merge OpenSC info into README.smartcard
8a547250 159
f5db6a03 16020030606
161 - (dtucker) [uidswap.c] Fix setreuid and add missing args to fatal(). ok djm@
162
02e2a074 16320030605
164 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
165 canohost.c changes.
688eed4a 166 - (djm) Implement paranoid priv dropping checks, based on:
167 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
168 Proceedings of USENIX Security Symposium 2002
d6bd2b5a 169 - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
52d58495 170 - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
57c917f8 171 - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
172 Patch from larsch@trustcenter.de
7b7f164b 173 - (djm) Bug #589 - scard-opensc: load only keys with a private keys
174 Patch from larsch@trustcenter.de
4ed465ec 175 - (dtucker) Add includes.h to fake-rfc2553.c so it will build.
e932f447 176 - (dtucker) Define EAI_NONAME in fake-rfc2553.h (used by fake-rfc2553.c).
02e2a074 177
b08a39ff 17820030604
d60e487c 179 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
180 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
8acdec60 181 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
11f1e60e 182 Patch from larsch@trustcenter.de; ok markus@
183 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
184 larsch@trustcenter.de; ok markus@
d453a600 185 - (djm) OpenBSD CVS Sync
186 - djm@cvs.openbsd.org 2003/06/04 08:25:18
187 [sshconnect.c]
188 disable challenge/response and keyboard-interactive auth methods
189 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
190 bz #580; ok markus@
ee50371d 191 - djm@cvs.openbsd.org 2003/06/04 10:23:48
192 [sshd.c]
193 remove duplicated group-dropping code; ok markus@
b08a39ff 194 - djm@cvs.openbsd.org 2003/06/04 12:03:59
195 [serverloop.c]
196 remove bitrotten commet; ok markus@
cf3248b8 197 - djm@cvs.openbsd.org 2003/06/04 12:18:49
198 [scp.c]
199 ansify; ok markus@
0f764b2f 200 - djm@cvs.openbsd.org 2003/06/04 12:40:39
201 [scp.c]
202 kill ssh process upon receipt of signal, bz #241.
203 based on patch from esb AT hawaii.edu; ok markus@
1b558925 204 - djm@cvs.openbsd.org 2003/06/04 12:41:22
205 [sftp.c]
206 kill ssh process on receipt of signal; ok markus@
fba33e81 207 - (djm) Update to fix of bug #584: lock card before return.
208 From larsch@trustcenter.de
8d9bb5dd 209 - (djm) Always use mysignal() for SIGALRM
d60e487c 210
3a2b2b44 21120030603
212 - (djm) Replace setproctitle replacement with code derived from
213 UCB sendmail
c5a7d788 214 - (djm) OpenBSD CVS Sync
215 - markus@cvs.openbsd.org 2003/06/02 09:17:34
216 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
217 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
218 [sshd_config.5]
219 deprecate VerifyReverseMapping since it's dangerous if combined
220 with IP based access control as noted by Mike Harding; replace with
221 a UseDNS option, UseDNS is on by default and includes the
222 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
223 ok deraadt@, djm@
d981089c 224 - millert@cvs.openbsd.org 2003/06/03 02:56:16
225 [scp.c]
226 Remove the advertising clause in the UCB license which Berkeley
227 rescinded 22 July 1999. Proofed by myself and Theo.
c5a7d788 228 - (djm) Fix portable-specific uses of verify_reverse_mapping too
3e67f7df 229 - (djm) Sync openbsd-compat with OpenBSD CVS.
484d59c7 230 - No more 4-term BSD licenses in linked code
5d8ca8c7 231 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
3a2b2b44 232
aff561f9 23320030602
234 - (djm) Fix segv from bad reordering in auth-pam.c
416c732d 235 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
236 clobber
1b7342ab 237 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
238 CVS ID.
8862e142 239 - (djm) Remove "noip6" option from RedHat spec file. This may now be
240 set at runtime using AddressFamily option.
58ba3cb7 241 - (djm) Fix use of macro before #define in cipher-aes.c
382fe2fa 242 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
b0545fe6 243 - (djm) OpenBSD CVS Sync
244 - djm@cvs.openbsd.org 2003/05/26 12:54:40
245 [sshconnect.c]
246 fix format strings; ok markus@
fa5120a0 247 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
248 [sshd.c uidswap.c]
249 seteuid and setegid; markus ok
0f92946c 250 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
251 [ssh_config.5]
252 VerifyHostKeyDNS is v2 only. ok markus@
aff561f9 253
4f178be8 25420030530
255 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
256 roumenpetrov.info
eabb99c6 257 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
4f178be8 258
4881aebb 25920030526
260 - (djm) Avoid auth2-chall.c warning when compiling without
261 PAM, BSD_AUTH and SKEY
262
5b0fe364 26320030525
264- (djm) OpenBSD CVS Sync
265 - djm@cvs.openbsd.org 2003/05/24 09:02:22
266 [log.c]
267 pass logged data through strnvis; ok markus
b9ed513a 268 - djm@cvs.openbsd.org 2003/05/24 09:30:40
269 [authfile.c monitor.c sftp-common.c sshpty.c]
270 cast some types for printing; ok markus@
5b0fe364 271
44c78996 27220030524
273 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
274
d83ebe4a 27520030523
276 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
277 encoding (which encodes many more characters)
bd47824b 278 - OpenBSD CVS Sync
279 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
280 [sftp.1]
281 - new sentence, new line
282 - added .Xr's
283 - typos
284 ok djm@
3cbc677d 285 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
286 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
287 new sentence, new line
da54f5be 288 - djm@cvs.openbsd.org 2003/05/23 08:29:30
289 [sshconnect.c]
290 fix leak; ok markus@
d83ebe4a 291
c453493f 29220030520
293 - (djm) OpenBSD CVS Sync
294 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
295 [log.c]
296 use syslog_r() in a signal handler called place; markus ok
79d4fc55 297 - (djm) Configure logic to detect syslog_r and friends
c453493f 298
acb50584 29920030519
300 - (djm) Sync auth-pam.h with what we actually implement
301
30220030518
5ff453c0 303 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
304 recent merge
f811e52a 305 - (djm) OpenBSD CVS Sync
306 - djm@cvs.openbsd.org 2003/05/16 03:27:12
307 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
308 add AddressFamily option to ssh_config (like -4, -6 on commandline).
309 Portable bug #534; ok markus@
013b1214 310 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
311 [auth-rhosts.c]
312 just in case, put numbers to sscanf %s arg.
25b66522 313 - markus@cvs.openbsd.org 2003/05/17 04:27:52
314 [cipher.c cipher-ctr.c myproposal.h]
315 experimental support for aes-ctr modes from
316 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
317 ok djm@
25351757 318 - (djm) Remove IPv4 by default hack now that we can specify AF in config
3bf784bc 319 - (djm) Tidy and trim TODO
bffa6723 320 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
9901cb37 321 - (djm) Big KNF on openbsd-compat/
f1da2b8b 322 - (djm) KNF on md5crypt.[ch]
323 - (djm) KNF on auth-sia.[ch]
5ff453c0 324
f123055b 32520030517
326 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
327
c936c243 32820030516
329 - (djm) OpenBSD CVS Sync
330 - djm@cvs.openbsd.org 2003/05/15 13:52:10
331 [ssh.c]
332 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
333 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
a2144546 334 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
335 [readconf.c servconf.c]
336 warn for unsupported config option. ok markus@
5bdfde81 337 - markus@cvs.openbsd.org 2003/05/15 14:09:21
338 [auth2-krb5.c]
339 fix 64bit issue; report itojun@
09ab3296 340 - djm@cvs.openbsd.org 2003/05/15 14:55:25
341 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
342 add a ConnectTimeout option to ssh, based on patch from
343 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
b06b11ad 344 - (djm) Add warning for UsePAM when built without PAM support
7be625e1 345 - (djm) A few type mismatch fixes from Bug #565
0eb6370a 346 - (djm) Guard free_pam_environment against NULL argument. Works around
347 HP/UX PAM problems debugged by dtucker
c936c243 348
7efc7f57 34920030515
350 - (djm) OpenBSD CVS Sync
351 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
352 [ssh-agent.1]
353 setup -> set up;
354 from wiz@netbsd
21289cd0 355 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
356 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
357 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
358 add experimental support for verifying hos keys using DNS as described
359 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
360 ok markus@ and henning@
16a79097 361 - markus@cvs.openbsd.org 2003/05/14 22:24:42
362 [clientloop.c session.c ssh.1]
363 allow to send a BREAK to the remote system; ok various
b8c2031b 364 - markus@cvs.openbsd.org 2003/05/15 00:28:28
365 [sshconnect2.c]
366 cleanup unregister of per-method packet handlers; ok djm@
d0ec7f42 367 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
368 [readconf.c readconf.h servconf.c servconf.h]
369 always parse kerberos options. ok djm@ markus@
b414a17b 370 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
371 [dns.c]
372 add missing freerrset
3b6e3da9 373 - markus@cvs.openbsd.org 2003/05/15 03:08:29
374 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
375 split out custom EVP ciphers
02159d9b 376 - djm@cvs.openbsd.org 2003/05/15 03:10:52
377 [ssh-keygen.c]
378 avoid warning; ok jakob@
4a26f5c5 379 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
380 [sftp-int.c]
381 Make put/get (globed and nonglobed) code more consistant. OK djm@
c44f10c6 382 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
dc69f53c 383 [sftp-int.c sftp.c]
c44f10c6 384 Teach ls how to display multiple column display and allow users
385 to return to single column format via 'ls -1'. OK @djm
1457e7ff 386 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
387 [readconf.c servconf.c]
388 disable kerberos when not supported. ok markus@
861f0365 389 - markus@cvs.openbsd.org 2003/05/15 04:08:41
390 [ssh.1]
391 ~B is ssh2 only
d0ec7f42 392 - (djm) Always parse UsePAM
3e05e934 393 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
4460d509 394 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
86ee6794 395 - (djm) Tidy Makefile clean targets
2636769c 396 - (djm) Adapt README.dns for portable
2d2e4a34 397 - (djm) Avoid uuencode.c warnings
1457e7ff 398 - (djm) Enable UsePAM when built --with-pam
67467c30 399 - (djm) Only build getrrsetbyname replacement when using --with-dns
f420d2ba 400 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
401 correctly)
3c49ef10 402 - (djm) Bug #444: Wrong paths after reconfigure
321735c7 403 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
f420d2ba 404
dd3ebb5a 40520030514
406 - (djm) Bug #117: Don't lie to PAM about username
0608f8a7 407 - (djm) RCSID sync w/ OpenBSD
204fde99 408 - (djm) OpenBSD CVS Sync
409 - djm@cvs.openbsd.org 2003/04/09 12:00:37
410 [readconf.c]
411 strip trailing whitespace from config lines before parsing.
412 Fixes bz 528; ok markus@
18ae3c67 413 - markus@cvs.openbsd.org 2003/04/12 10:13:57
414 [cipher.c]
415 hide cipher details; ok djm@
45c42d58 416 - markus@cvs.openbsd.org 2003/04/12 10:15:36
417 [misc.c]
418 debug->debug2
c825cd79 419 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
420 [ssh.1]
421 document -V switch, fix wording; ok markus@
3e131a6d 422 - markus@cvs.openbsd.org 2003/04/14 14:17:50
423 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
424 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
927e9f8b 425 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
426 [sftp-int.c]
427 Missing globfree(&g) in process_put() spotted by Vince Brimhall
428 <VBrimhall@novell.com>. ok@ Theo
429 - markus@cvs.openbsd.org 2003/04/16 14:35:27
430 [auth.h]
431 document struct Authctxt; with solar
b9e5aff6 432 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
433 [ssh-keyscan.c]
434 -t in usage(); rogier@quaak.org
9a26a6e2 435 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
436 [sshd.8 sshd_config.5]
437 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
438 Bug #550 and * escaping suggested by jmc@.
09dc8896 439 - david@cvs.openbsd.org 2003/04/30 20:41:07
440 [sshd.8]
441 fix invalid .Pf macro usage introduced in previous commit
442 ok jmc@ mouring@
3566c73c 443 - markus@cvs.openbsd.org 2003/05/11 16:56:48
444 [authfile.c ssh-keygen.c]
445 change key_load_public to try to read a public from:
446 rsa1 private or rsa1 public and ssh2 keys.
447 this makes ssh-keygen -e fail for ssh1 keys more gracefully
448 for example; report from itojun (netbsd pr 20550).
0d942eff 449 - markus@cvs.openbsd.org 2003/05/11 20:30:25
450 [channels.c clientloop.c serverloop.c session.c ssh.c]
451 make channel_new() strdup the 'remote_name' (not the caller); ok theo
43348518 452 - markus@cvs.openbsd.org 2003/05/12 16:55:37
453 [sshconnect2.c]
454 for pubkey authentication try the user keys in the following order:
455 1. agent keys that are found in the config file
456 2. other agent keys
457 3. keys that are only listed in the config file
458 this helps when an agent has many keys, where the server might
459 close the connection before the correct key is used. report & ok pb@
dc109cfe 460 - markus@cvs.openbsd.org 2003/05/12 18:35:18
461 [ssh-keyscan.1]
462 typo: DSA keys are of type ssh-dss; Brian Poole
81466908 463 - markus@cvs.openbsd.org 2003/05/14 00:52:59
464 [ssh2.h]
465 ranges for per auth method messages
466 - djm@cvs.openbsd.org 2003/05/14 01:00:44
467 [sftp.1]
468 emphasise the batchmode functionality and make reference to pubkey auth,
469 both of which are FAQs; ok markus@
802e01b8 470 - markus@cvs.openbsd.org 2003/05/14 02:15:47
471 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
472 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
473 server interops with commercial client; ok jakob@ djm@
72c5fe79 474 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
475 [sftp.1]
476 - better formatting in SYNOPSIS
477 - whitespace at EOL
478 ok djm@
3a39206f 479 - markus@cvs.openbsd.org 2003/05/14 08:57:49
480 [monitor.c]
481 http://bugzilla.mindrot.org/show_bug.cgi?id=560
482 Privsep child continues to run after monitor killed.
483 Pass monitor signals through to child; Darren Tucker
751092f9 484 - (djm) Make portable build with MIT krb5 (some issues remain)
7fceb20d 485 - (djm) Add new UsePAM configuration directive to allow runtime control
486 over usage of PAM. This allows non-root use of sshd when built with
487 --with-pam
817e6d38 488 - (djm) Die screaming if start_pam() is called when UsePAM=no
83ccf11a 489 - (djm) Avoid KrbV leak for MIT Kerberos
b1848832 490 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
fa065de2 491 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
dd3ebb5a 492
91f3aa9b 49320030512
494 - (djm) Redhat spec: Don't install profile.d scripts when not
495 building with GNOME/GTK askpass (patch from bet@rahul.net)
496
5def520a 49720030510
498 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
499 "make install". Patch by roth@feep.net.
ad84c479 500 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
501 problem on Linux (fixes "could not set controlling tty" errors).
05114c74 502 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
503 proper challenge-response module
23ab1f36 504 - (djm) 2-clause license on loginrec.c, with permission from
505 andre@ae-35.com
5def520a 506
43ce025d 50720030504
dd594f99 508 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
509 Patch from vinschen@redhat.com.
43ce025d 510
2cd5dbba 51120030503
512 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
513 by wendyp@cray.com.
514
bf7c1e6c 51520030502
516 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
517 privsep should now work.
73d9dad3 518 - (dtucker) Move handling of bad password authentications into a platform
990278ef 519 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
bf7c1e6c 520
68ece370 52120030429
522 - (djm) Add back radix.o (used by AFS support), after it went missing from
523 Makefile many moons ago
524 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
525 - (djm) Fix blibpath specification for AIX/gcc
526 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
527
ded9dd18 52820030428
529 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
530 hacked code.
531
aceb0423 53220030427
533 - (bal) Bug #541: return; was dropped by mistake. Reported by
534 furrier@iglou.com
c8a50a34 535 - (bal) Since we don't support platforms lacking u_int_64. We may
536 as well clean out some of those evil #ifdefs
9a6fee8b 537 - (bal) auth1.c minor resync while looking at the code.
d7cf277b 538 - (bal) auth2.c same changed as above.
aceb0423 539
0a626302 54020030409
541 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
542 from matth@eecs.berkeley.edu
d35929b5 543 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
ffd7b36b 544 - (djm) OpenBSD CVS Sync
545 - markus@cvs.openbsd.org 2003/04/02 09:48:07
546 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
547 [readconf.h serverloop.c sshconnect2.c]
548 reapply rekeying chage, tested by henning@, ok djm@
16f1b5ca 549 - markus@cvs.openbsd.org 2003/04/02 14:36:26
550 [ssh-keysign.c]
551 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
6c1bc5c5 552 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
553 [progressmeter.c]
554 $OpenBSD$
555 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
556 [progressmeter.c]
557 remove $OpenBSD$, as other *.c does not have it.
806e4c11 558 - markus@cvs.openbsd.org 2003/04/07 08:29:57
559 [monitor_wrap.c]
560 typo: get correct counters; introduced during rekeying change.
2f5b2528 561 - millert@cvs.openbsd.org 2003/04/07 21:58:05
562 [progressmeter.c]
563 The UCB copyright here is incorrect. This code did not originate
564 at UCB, it was written by Luke Mewburn. Updated the copyright at
565 the author's request. markus@ OK
566 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
567 [*.c *.h]
568 rename log() into logit() to avoid name conflict. markus ok, from
569 netbsd
570 - (djm) XXX - Performed locally using:
571 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
70e1f62f 572 - hin@cvs.openbsd.org 2003/04/09 08:23:52
573 [servconf.c]
574 Don't include <krb.h> when compiling with Kerberos 5 support
2f5b2528 575 - (djm) Fix up missing include for packet.c
a3568201 576 - (djm) Fix missed log => logit occurance (reference by function pointer)
0a626302 577
4d0cb2e5 57820030402
579 - (bal) if IP_TOS is not found or broken don't try to compile in
580 packet_set_tos() function call. bug #527
581
a4e5acef 58220030401
583 - (djm) OpenBSD CVS Sync
584 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
585 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
586 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
587 - killed whitespace
588 - new sentence new line
589 - .Bk for arguments
590 ok markus@
177f584b 591 - markus@cvs.openbsd.org 2003/04/01 10:10:23
592 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
593 [readconf.h serverloop.c sshconnect2.c]
594 rekeying bugfixes and automatic rekeying:
595 * both client and server rekey _automatically_
596 (a) after 2^31 packets, because after 2^32 packets
597 the sequence number for packets wraps
598 (b) after 2^(blocksize_in_bits/4) blocks
599 (see: draft-ietf-secsh-newmodes-00.txt)
600 (a) and (b) are _enabled_ by default, and only disabled for known
601 openssh versions, that don't support rekeying properly.
602 * client option 'RekeyLimit'
603 * do not reply to requests during rekeying
604 - markus@cvs.openbsd.org 2003/04/01 10:22:21
605 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
606 [readconf.h serverloop.c sshconnect2.c]
607 backout rekeying changes (for 3.6.1)
519bdfe8 608 - markus@cvs.openbsd.org 2003/04/01 10:31:26
609 [compat.c compat.h kex.c]
610 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
611 tested by ho@ and myself
9dd240a3 612 - markus@cvs.openbsd.org 2003/04/01 10:56:46
613 [version.h]
614 3.6.1
ac01b518 615 - (djm) Crank spec file versions
b32453fe 616 - (djm) Release 3.6.1p1
a4e5acef 617
fd77a40f 61820030326
619 - (djm) OpenBSD CVS Sync
620 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
621 [sftp-server.c]
622 one last fix to the tree: race fix broke stuff; pr 3169;
623 srp@srparish.net, help from djm
624
8021857c 62520030325
626 - (djm) Fix getpeerid support for 64 bit BE systems. From
627 Arnd Bergmann <arndb@de.ibm.com>
628
cdb64c4d 62920030324
630 - (djm) OpenBSD CVS Sync
631 - markus@cvs.openbsd.org 2003/03/23 19:02:00
632 [monitor.c]
633 unbreak rekeying for privsep; ok millert@
634 - Release 3.6p1
62086365 635 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
636 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
cdb64c4d 637
0b202697 638$Id$
This page took 0.508675 seconds and 5 git commands to generate.