]> andersk Git - openssh.git/blame - ChangeLog
- djm@cvs.openbsd.org 2009/08/13 00:57:17
[openssh.git] / ChangeLog
CommitLineData
3496b8d4 120091007
2 - (dtucker) OpenBSD CVS Sync
3 - djm@cvs.openbsd.org 2009/08/12 00:13:00
4 [sftp.c sftp.1]
5 support most of scp(1)'s commandline arguments in sftp(1), as a first
6 step towards making sftp(1) a drop-in replacement for scp(1).
7 One conflicting option (-P) has not been changed, pending further
8 discussion.
9 Patch from carlosvsilvapt@gmail.com as part of his work in the
10 Google Summer of Code
b68241c3 11 - jmc@cvs.openbsd.org 2009/08/12 06:31:42
12 [sftp.1]
13 sort options;
97658f13 14 - djm@cvs.openbsd.org 2009/08/13 01:11:19
15 [sftp.1 sftp.c]
16 Swizzle options: "-P sftp_server_path" moves to "-D sftp_server_path",
17 add "-P port" to match scp(1). Fortunately, the -P option is only really
18 used by our regression scripts.
19 part of larger patch from carlosvsilvapt@gmail.com for his Google Summer
20 of Code work; ok deraadt markus
5aa0f160 21 - jmc@cvs.openbsd.org 2009/08/13 13:39:54
22 [sftp.1 sftp.c]
23 sync synopsis and usage();
e746280c 24 - djm@cvs.openbsd.org 2009/08/14 18:17:49
25 [sftp-client.c]
26 make the "get_handle: ..." error messages vaguely useful by allowing
27 callers to specify their own error message strings.
5d799258 28 - fgsch@cvs.openbsd.org 2009/08/15 18:56:34
29 [auth.h]
30 remove unused define. markus@ ok.
31 (Id sync only, Portable still uses this.)
7b3a24aa 32 - dtucker@cvs.openbsd.org 2009/08/16 23:29:26
33 [sshd_config.5]
34 Add PubkeyAuthentication to the list allowed in a Match block (bz #1577)
d141f964 35 - djm@cvs.openbsd.org 2009/08/18 18:36:21
36 [sftp-client.h sftp.1 sftp-client.c sftp.c]
37 recursive transfer support for get/put and on the commandline
38 work mostly by carlosvsilvapt@gmail.com for the Google Summer of Code
39 with some tweaks by me; "go for it" deraadt@
e83f55f9 40 - djm@cvs.openbsd.org 2009/08/18 21:15:59
41 [sftp.1]
42 fix "get" command usage, spotted by jmc@
3829cbca 43 - jmc@cvs.openbsd.org 2009/08/19 04:56:03
44 [sftp.1]
45 ether -> either;
2e2c33ad 46 - dtucker@cvs.openbsd.org 2009/08/20 23:54:28
47 [mux.c]
48 subsystem_flag is defined in ssh.c so it's extern; ok djm
99c5cf8e 49 - djm@cvs.openbsd.org 2009/08/27 17:28:52
50 [sftp-server.c]
51 allow setting an explicit umask on the commandline to override whatever
52 default the user has. bz#1229; ok dtucker@ deraadt@ markus@
bf3290be 53 - djm@cvs.openbsd.org 2009/08/27 17:33:49
54 [ssh-keygen.c]
55 force use of correct hash function for random-art signature display
56 as it was inheriting the wrong one when bubblebabble signatures were
57 activated; bz#1611 report and patch from fwojcik+openssh AT besh.com;
58 ok markus@
62b92bdc 59 - djm@cvs.openbsd.org 2009/08/27 17:43:00
60 [sftp-server.8]
61 allow setting an explicit umask on the commandline to override whatever
62 default the user has. bz#1229; ok dtucker@ deraadt@ markus@
b4741f94 63 - djm@cvs.openbsd.org 2009/08/27 17:44:52
64 [authfd.c ssh-add.c authfd.h]
65 Do not fall back to adding keys without contraints (ssh-add -c / -t ...)
66 when the agent refuses the constrained add request. This was a useful
67 migration measure back in 2002 when constraints were new, but just
68 adds risk now.
69 bz #1612, report and patch from dkg AT fifthhorseman.net; ok markus@
57a6b5dd 70 - djm@cvs.openbsd.org 2009/08/31 20:56:02
71 [sftp-server.c]
72 check correct variable for error message, spotted by martynas@
b7177174 73 - djm@cvs.openbsd.org 2009/08/31 21:01:29
74 [sftp-server.8]
75 document -e and -h; prodded by jmc@
5561856d 76 - djm@cvs.openbsd.org 2009/09/01 14:43:17
77 [ssh-agent.c]
78 fix a race condition in ssh-agent that could result in a wedged or
79 spinning agent: don't read off the end of the allocated fd_sets, and
80 don't issue blocking read/write on agent sockets - just fall back to
81 select() on retriable read/write errors. bz#1633 reported and tested
82 by "noodle10000 AT googlemail.com"; ok dtucker@ markus@
fd8b10fa 83 - grunk@cvs.openbsd.org 2009/10/01 11:37:33
84 [dh.c]
85 fix a cast
86 ok djm@ markus@
45bb6142 87 - djm@cvs.openbsd.org 2009/10/06 04:46:40
88 [session.c]
89 bz#1596: fflush(NULL) before exec() to ensure that everying (motd
90 in particular) has made it out before the streams go away.
1aeac41e 91 - djm@cvs.openbsd.org 2008/12/07 22:17:48
92 [regress/addrmatch.sh]
93 match string "passwordauthentication" only at start of line, not anywhere
94 in sshd -T output
cbc2c3e5 95 - dtucker@cvs.openbsd.org 2009/05/05 07:51:36
96 [regress/multiplex.sh]
97 Always specify ssh_config for multiplex tests: prevents breakage caused
98 by options in ~/.ssh/config. From Dan Peterson.
95744748 99 - djm@cvs.openbsd.org 2009/08/13 00:57:17
100 [regress/Makefile]
101 regression test for port number parsing. written as part of the a2port
102 change that went into 5.2 but I forgot to commit it at the time...
3496b8d4 103
2391a73c 10420091002
105 - (djm) [Makefile.in] Mention readconf.o in ssh-keysign's make deps.
106 spotted by des AT des.no
107
018fda87 10820090926
109 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
110 [contrib/suse/openssh.spec] Update for release
111 - (djm) [README] update relnotes URL
112 - (djm) [packet.c] Restore EWOULDBLOCK handling that got lost somewhere
113 - (djm) Release 5.3p1
114
a37250f4 11520090911
116 - (dtucker) [configure.ac] Change the -lresolv check so it works on Mac OS X
117 10.6 (which doesn't have BIND8_COMPAT and thus uses res_9_query). Patch
118 from jbasney at ncsa uiuc edu.
119
bc33f6d6 12020090908
121 - (djm) [serverloop.c] Fix test for server-assigned remote forwarding port
122 (-R 0:...); bz#1578, spotted and fix by gavin AT emf.net; ok dtucker@
123
3acad382 12420090901
125 - (dtucker) [configure.ac] Bug #1639: use AC_PATH_PROG to search the path for
126 krb5-config if it's not in the location specified by --with-kerberos5.
127 Patch from jchadima at redhat.
128
84c645ec 12920090829
130 - (dtucker) [README.platform] Add text about development packages, based on
131 text from Chris Pepper in bug #1631.
132
7a51ce05 13320090828
134 - dtucker [auth-sia.c] Roll back the change for bug #1241 as it apparently
135 causes problems in some Tru64 configurations.
d108641a 136 - (djm) [sshd_config.5] downgrade mention of login.conf to be an example
137 and mention PAM as another provider for ChallengeResponseAuthentication;
138 bz#1408; ok dtucker@
6ecb350f 139 - (djm) [sftp-server.c] bz#1535: accept ENOSYS as a fallback error when
140 attempting atomic rename(); ok dtucker@
36141cb8 141 - (djm) [Makefile.in] bz#1505: Solaris make(1) doesn't accept make variables
142 in argv, so pass them in the environment; ok dtucker@
5e934f78 143 - (dtucker) [channels.c configure.ac] Bug #1528: skip the tcgetattr call on
144 the pty master on Solaris, since it never succeeds and can hang if large
145 amounts of data is sent to the slave (eg a copy-paste). Based on a patch
146 originally from Doke Scott, ok djm@
e7ac4a90 147 - (dtucker) [clientloop.c configure.ac defines.h] Make the client's IO buffer
148 size a compile-time option and set it to 64k on Cygwin, since Corinna
149 reports that it makes a significant difference to performance. ok djm@
00789f24 150 - (dtucker) [configure.ac] Fix the syntax of the Solaris tcgetattr entry.
7a51ce05 151
bf87c429 15220090820
153 - (dtucker) [includes.h] Bug #1634: do not include system glob.h if we're not
154 using it since the type conflicts can cause problems on FreeBSD. Patch
155 from Jonathan Chen.
406dc01a 156 - (dtucker) [session.c openbsd-compat/port-aix.h] Bugs #1249 and #1567: move
157 the setpcred call on AIX to immediately before the permanently_set_uid().
158 Ensures that we still have privileges when we call chroot and
159 pam_open_sesson. Based on a patch from David Leonard.
bf87c429 160
8295689f 16120090817
162 - (dtucker) [configure.ac] Check for headers before libraries for openssl an
163 zlib, which should make the errors slightly more meaningful on platforms
164 where there's separate "-devel" packages for those.
e339fa25 165 - (dtucker) [sshlogin.c openbsd-compat/port-aix.{c,h}] Bug #1595: make
166 PrintLastLog work on AIX. Based in part on a patch from Miguel Sanders.
8295689f 167
852de6fd 16820090729
169 - (tim) [contrib/cygwin/ssh-user-config] Change script to call correct error
170 function. Patch from Corinna Vinschen.
171
14a260e8 17220090713
173 - (dtucker) [openbsd-compat/getrrsetbyname.c] Reduce answer buffer size so it
174 fits into 16 bits to work around a bug in glibc's resolver where it masks
175 off the buffer size at 16 bits. Patch from Hauke Lampe, ok djm jakob.
176
0a008a4d 17720090712
178 - (dtucker) [configure.ac] Include sys/param.h for the sys/mount.h test,
179 prevents configure complaining on older BSDs.
74973c95 180 - (dtucker [contrib/cygwin/ssh-{host,user}-config] Add license text. Patch
181 from Corinna Vinschen.
f12c178c 182 - (dtucker) [auth-pam.c] Bug #1534: move the deletion of PAM credentials on
1d5c49e0 183 logout to after the session close. Patch from Anicka Bernathova,
184 originally from Andreas Schwab via Novelll ok djm.
0a008a4d 185
78576c54 18620090707
187 - (dtucker) [contrib/cygwin/ssh-host-config] better support for automated
188 scripts and fix usage of eval. Patch from Corinna Vinschen.
189
19020090705
dc11a83a 191 - (dtucker) OpenBSD CVS Sync
192 - andreas@cvs.openbsd.org 2009/06/27 09:29:06
193 [packet.h packet.c]
194 packet_bacup_state() and packet_restore_state() will be used to
195 temporarily save the current state ren resuming a suspended connection.
196 ok markus@
197 - andreas@cvs.openbsd.org 2009/06/27 09:32:43
198 [roaming_common.c roaming.h]
199 It may be necessary to retransmit some data when resuming, so add it
200 to a buffer when roaming is enabled.
201 Most of this code was written by Martin Forssen, maf at appgate dot com.
202 ok markus@
203 - andreas@cvs.openbsd.org 2009/06/27 09:35:06
204 [readconf.h readconf.c]
205 Add client option UseRoaming. It doesn't do anything yet but will
206 control whether the client tries to use roaming if enabled on the
207 server. From Martin Forssen.
208 ok markus@
209 - markus@cvs.openbsd.org 2009/06/30 14:54:40
210 [version.h]
211 crank version; ok deraadt
212 - dtucker@cvs.openbsd.org 2009/07/02 02:11:47
213 [ssh.c]
214 allow for long home dir paths (bz #1615). ok deraadt
215 (based in part on a patch from jchadima at redhat)
216 - stevesk@cvs.openbsd.org 2009/07/05 19:28:33
217 [clientloop.c]
218 only send SSH2_MSG_DISCONNECT if we're in compat20; from dtucker@
219 ok deraadt@ markus@
220
127c96db 22120090622
222 - (dtucker) OpenBSD CVS Sync
223 - dtucker@cvs.openbsd.org 2009/06/22 05:39:28
224 [monitor_wrap.c monitor_mm.c ssh-keygen.c auth2.c gss-genr.c sftp-client.c]
225 alphabetize includes; reduces diff vs portable and style(9).
226 ok stevesk djm
227 (Id sync only; these were already in order in -portable)
228
f0956980 22920090621
230 - (dtucker) OpenBSD CVS Sync
231 - markus@cvs.openbsd.org 2009/03/17 21:37:00
232 [ssh.c]
233 pass correct argv[0] to openlog(); ok djm@
8fe25329 234 - jmc@cvs.openbsd.org 2009/03/19 15:15:09
235 [ssh.1]
236 for "Ciphers", just point the reader to the keyword in ssh_config(5), just
237 as we do for "MACs": this stops us getting out of sync when the lists
238 change;
239 fixes documentation/6102, submitted by Peter J. Philipp
240 alternative fix proposed by djm
241 ok markus
230d03b6 242 - tobias@cvs.openbsd.org 2009/03/23 08:31:19
243 [ssh-agent.c]
244 Fixed a possible out-of-bounds memory access if the environment variable
245 SHELL is shorter than 3 characters.
246 with input by and ok dtucker
7027325d 247 - tobias@cvs.openbsd.org 2009/03/23 19:38:04
248 [ssh-agent.c]
249 My previous commit didn't fix the problem at all, so stick at my first
250 version of the fix presented to dtucker.
251 Issue notified by Matthias Barkhoff (matthias dot barkhoff at gmx dot de).
252 ok dtucker
b31ae930 253 - sobrado@cvs.openbsd.org 2009/03/26 08:38:39
254 [sftp-server.8 sshd.8 ssh-agent.1]
255 fix a few typographical errors found by spell(1).
256 ok dtucker@, jmc@
640f440b 257 - stevesk@cvs.openbsd.org 2009/04/13 19:07:44
258 [sshd_config.5]
259 fix possessive; ok djm@
7bd399ce 260 - stevesk@cvs.openbsd.org 2009/04/14 16:33:42
261 [sftp-server.c]
262 remove unused option character from getopt() optstring; ok markus@
3e576dfe 263 - jj@cvs.openbsd.org 2009/04/14 21:10:54
264 [servconf.c]
265 Fixed a few the-the misspellings in comments. Skipped a bunch in
266 binutils,gcc and so on. ok jmc@
02d56d32 267 - stevesk@cvs.openbsd.org 2009/04/17 19:23:06
268 [session.c]
269 use INTERNAL_SFTP_NAME for setproctitle() of in-process sftp-server;
270 ok djm@ markus@
db1f5925 271 - stevesk@cvs.openbsd.org 2009/04/17 19:40:17
272 [sshd_config.5]
273 clarify that even internal-sftp needs /dev/log for logging to work; ok
274 markus@
47f4188a 275 - jmc@cvs.openbsd.org 2009/04/18 18:39:10
276 [sshd_config.5]
277 tweak previous; ok stevesk
5df1f0e3 278 - stevesk@cvs.openbsd.org 2009/04/21 15:13:17
279 [sshd_config.5]
280 clarify we cd to user's home after chroot; ok markus@ on
281 earlier version; tweaks and ok jmc@
dc1f1948 282 - andreas@cvs.openbsd.org 2009/05/25 06:48:01
283 [channels.c packet.c clientloop.c packet.h serverloop.c monitor_wrap.c
284 monitor.c]
285 Put the globals in packet.c into a struct and don't access it directly
286 from other files. No functional changes.
287 ok markus@ djm@
288 - andreas@cvs.openbsd.org 2009/05/27 06:31:25
289 [canohost.h canohost.c]
290 Add clear_cached_addr(), needed for upcoming changes allowing the peer
291 address to change.
292 ok markus@
f936c5d4 293 - andreas@cvs.openbsd.org 2009/05/27 06:33:39
294 [clientloop.c]
295 Send SSH2_MSG_DISCONNECT when the client disconnects. From a larger
296 change from Martin Forssen, maf at appgate dot com.
297 ok markus@
abdc5018 298 - andreas@cvs.openbsd.org 2009/05/27 06:34:36
299 [kex.c kex.h]
300 Move the KEX_COOKIE_LEN define to kex.h
301 ok markus@
87db7000 302 - andreas@cvs.openbsd.org 2009/05/27 06:36:07
303 [packet.h packet.c]
304 Add packet_put_int64() and packet_get_int64(), part of a larger change
305 from Martin Forssen.
c6063ed7 306 ok markus@
307 - andreas@cvs.openbsd.org 2009/05/27 06:38:16
308 [sshconnect.h sshconnect.c]
309 Un-static ssh_exchange_identification(), part of a larger change from
310 Martin Forssen and needed for upcoming changes.
311 ok markus@
5d4d25cd 312 - andreas@cvs.openbsd.org 2009/05/28 16:50:16
313 [sshd.c packet.c serverloop.c monitor_wrap.c clientloop.c sshconnect.c
d0137ef8 314 monitor.c Added roaming.h roaming_common.c roaming_dummy.c]
5d4d25cd 315 Keep track of number of bytes read and written. Needed for upcoming
316 changes. Most code from Martin Forssen, maf at appgate dot com.
317 ok markus@
d0137ef8 318 Also, applied appropriate changes to Makefile.in
adb5cc1b 319 - andreas@cvs.openbsd.org 2009/06/12 20:43:22
320 [monitor.c packet.c]
321 Fix warnings found by chl@ and djm@ and change roaming_atomicio's
322 return type to match atomicio's
323 Diff from djm@, ok markus@
6a49252d 324 - andreas@cvs.openbsd.org 2009/06/12 20:58:32
325 [packet.c]
326 Move some more statics into session_state
327 ok markus@ djm@
ac692f84 328 - dtucker@cvs.openbsd.org 2009/06/21 07:37:15
329 [kexdhs.c kexgexs.c]
330 abort if key_sign fails, preventing possible null deref. Based on report
331 from Paolo Ganci, ok markus@ djm@
332 - dtucker@cvs.openbsd.org 2009/06/21 09:04:03
333 [roaming.h roaming_common.c roaming_dummy.c]
334 Add tags for the benefit of the sync scripts
335 Also: pull in the changes for 1.1->1.2 missed in the previous sync.
9b9302ea 336 - (dtucker) [auth2-jpake.c auth2.c canohost.h session.c] Whitespace and
337 header-order changes to reduce diff vs OpenBSD.
c8dc0909 338 - (dtucker) [servconf.c sshd.c] More whitespace sync.
e85016d4 339 - (dtucker) [roaming_common.c roaming_dummy.c] Wrap #include <inttypes.h> in
340 ifdef.
f0956980 341
87562a58 34220090616
343 - (dtucker) [configure.ac defines.h] Bug #1607: handle the case where fsid_t
344 is a struct with a __val member. Fixes build on, eg, Redhat 6.2.
345
6ee76eea 34620090504
347 - (dtucker) [sshlogin.c] Move the NO_SSH_LASTLOG #ifndef line to include
348 variable declarations. Should prevent unused warnings anywhere it's set
349 (only Crays as far as I can tell) and be a no-op everywhere else.
350
bc9a470b 35120090318
352 - (tim) [configure.ac] Remove setting IP_TOS_IS_BROKEN for Cygwin. The problem
353 that setsockopt(IP_TOS) doesn't work on Cygwin has been fixed since 2005.
354 Based on patch from vinschen at redhat com.
355
5077a5f6 35620090308
357 - (dtucker) [auth-passwd.c auth1.c auth2-kbdint.c auth2-none.c auth2-passwd.c
358 auth2-pubkey.c session.c openbsd-compat/bsd-cygwin_util.{c,h}
359 openbsd-compat/daemon.c] Remove support for Windows 95/98/ME and very old
360 version of Cygwin. Patch from vinschen at redhat com.
361
3e566c29 36220090307
363 - (dtucker) [contrib/aix/buildbff.sh] Only try to rename ssh_prng_cmds if it
364 exists (it's not created if OpenSSL's PRNG is self-seeded, eg if the OS
365 has a /dev/random).
36b68fd5 366 - (dtucker) [schnorr.c openbsd-compat/openssl-compat.{c,h}] Add
367 EVP_DigestUpdate to the OLD_EVP compatibility functions and tell schnorr.c
368 to use them. Allows building with older OpenSSL versions.
aeed50df 369 - (dtucker) [configure.ac defines.h] Check for in_port_t and typedef if needed.
86783a32 370 - (dtucker) [configure.ac] Missing comma in type list.
14e380c6 371 - (dtucker) [configure.ac openbsd-compat/openssl-compat.{c,h}]
372 EVP_DigestUpdate does not exactly match the other OLD_EVP functions (eg
373 in openssl 0.9.6) so add an explicit test for it.
3e566c29 374
5b01421b 37520090306
376 - (djm) OpenBSD CVS Sync
377 - djm@cvs.openbsd.org 2009/03/05 07:18:19
378 [auth2-jpake.c jpake.c jpake.h monitor_wrap.c monitor_wrap.h schnorr.c]
379 [sshconnect2.c]
380 refactor the (disabled) Schnorr proof code to make it a little more
381 generally useful
4f983ff5 382 - djm@cvs.openbsd.org 2009/03/05 11:30:50
383 [uuencode.c]
384 document what these functions do so I don't ever have to recuse into
385 b64_pton/ntop to remember their return values
5b01421b 386
ebf012a2 38720090223
388 - (djm) OpenBSD CVS Sync
389 - djm@cvs.openbsd.org 2009/02/22 23:50:57
390 [ssh_config.5 sshd_config.5]
391 don't advertise experimental options
09b37352 392 - djm@cvs.openbsd.org 2009/02/22 23:59:25
393 [sshd_config.5]
394 missing period
52d8f3f6 395 - djm@cvs.openbsd.org 2009/02/23 00:06:15
396 [version.h]
397 openssh-5.2
dc336a3b 398 - (djm) [README] update for 5.2
0e8d25c9 399 - (djm) Release openssh-5.2p1
ebf012a2 400
7eec82ab 40120090222
402 - (djm) OpenBSD CVS Sync
403 - tobias@cvs.openbsd.org 2009/02/21 19:32:04
404 [misc.c sftp-server-main.c ssh-keygen.c]
405 Added missing newlines in error messages.
406 ok dtucker
407
1925d16d 40820090221
409 - (djm) OpenBSD CVS Sync
410 - djm@cvs.openbsd.org 2009/02/17 01:28:32
411 [ssh_config]
412 sync with revised default ciphers; pointed out by dkrause@
dca75d4b 413 - djm@cvs.openbsd.org 2009/02/18 04:31:21
414 [schnorr.c]
415 signature should hash over the entire group, not just the generator
416 (this is still disabled code)
9a4a047b 417 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
418 [contrib/suse/openssh.spec] Prepare for 5.2p1
1925d16d 419
aa10bde9 42020090216
421 - (djm) [regress/conch-ciphers.sh regress/putty-ciphers.sh]
422 [regress/putty-kex.sh regress/putty-transfer.sh] Downgrade disabled
423 interop tests from FATAL error to a warning. Allows some interop
424 tests to proceed if others are missing necessary prerequisites.
4c3b7423 425 - (djm) [configure.ac] support GNU/kFreeBSD and GNU/kOpensolaris
426 systems; patch from Aurelien Jarno via rmh AT aybabtu.com
aa10bde9 427
69354fe2 42820090214
429 - (djm) OpenBSD CVS Sync
430 - dtucker@cvs.openbsd.org 2009/02/02 11:15:14
431 [sftp.c]
432 Initialize a few variables to prevent spurious "may be used
433 uninitialized" warnings from newer gcc's. ok djm@
17525a70 434 - djm@cvs.openbsd.org 2009/02/12 03:00:56
435 [canohost.c canohost.h channels.c channels.h clientloop.c readconf.c]
436 [readconf.h serverloop.c ssh.c]
437 support remote port forwarding with a zero listen port (-R0:...) to
438 dyamically allocate a listen port at runtime (this is actually
439 specified in rfc4254); bz#1003 ok markus@
1d68c50a 440 - djm@cvs.openbsd.org 2009/02/12 03:16:01
441 [serverloop.c]
442 tighten check for -R0:... forwarding: only allow dynamic allocation
443 if want_reply is set in the packet
28b5d376 444 - djm@cvs.openbsd.org 2009/02/12 03:26:22
445 [monitor.c]
446 some paranoia: check that the serialised key is really KEY_RSA before
447 diddling its internals
db9039d0 448 - djm@cvs.openbsd.org 2009/02/12 03:42:09
449 [ssh.1]
450 document -R0:... usage
1e709459 451 - djm@cvs.openbsd.org 2009/02/12 03:44:25
452 [ssh.1]
453 consistency: Dq => Ql
c6b2c0e0 454 - djm@cvs.openbsd.org 2009/02/12 03:46:17
455 [ssh_config.5]
456 document RemoteForward usage with 0 listen port
e12d3e21 457 - jmc@cvs.openbsd.org 2009/02/12 07:34:20
458 [ssh_config.5]
459 kill trailing whitespace;
8b773163 460 - markus@cvs.openbsd.org 2009/02/13 11:50:21
461 [packet.c]
462 check for enc !=NULL in packet_start_discard
e75a14a1 463 - djm@cvs.openbsd.org 2009/02/14 06:35:49
464 [PROTOCOL]
465 mention that eow and no-more-sessions extensions are sent only to
466 OpenSSH peers
69354fe2 467
46820090212
f7b8146b 469 - (djm) [sshpty.c] bz#1419: OSX uses cloning ptys that automagically
470 set ownership and modes, so avoid explicitly setting them
295dd642 471 - (djm) [configure.ac loginrec.c] bz#1421: fix lastlog support for OSX.
472 OSX provides a getlastlogxbyname function that automates the reading of
473 a lastlog file. Also, the pututxline function will update lastlog so
474 there is no need for loginrec.c to do it explicitly. Collapse some
475 overly verbose code while I'm in there.
f7b8146b 476
b4341d7a 47720090201
478 - (dtucker) [defines.h sshconnect.c] INET6_ADDRSTRLEN is now needed in
479 channels.c too, so move the definition for non-IP6 platforms to defines.h
480 where it can be shared.
481
e1986e0a 48220090129
483 - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
484 If the CYGWIN environment variable is empty, the installer script
485 should not install the service with an empty CYGWIN variable, but
486 rather without setting CYGWNI entirely.
863ba23a 487 - (tim) [contrib/cygwin/ssh-host-config] Whitespace cleanup. No code changes.
e1986e0a 488
7f24626b 48920090128
490 - (tim) [contrib/cygwin/ssh-host-config] Patch from Corinna Vinschen.
491 Changes to work on Cygwin 1.5.x as well as on the new Cygwin 1.7.x.
492 The information given for the setting of the CYGWIN environment variable
493 is wrong for both releases so I just removed it, together with the
494 unnecessary (Cygwin 1.5.x) or wrong (Cygwin 1.7.x) default setting.
495
68405671 49620081228
497 - (djm) OpenBSD CVS Sync
498 - stevesk@cvs.openbsd.org 2008/12/09 03:20:42
499 [channels.c servconf.c]
500 channel_print_adm_permitted_opens() should deal with all the printing
501 for that config option. suggested by markus@; ok markus@ djm@
502 dtucker@
7efff8ce 503 - djm@cvs.openbsd.org 2008/12/09 04:32:22
504 [auth2-chall.c]
505 replace by-hand string building with xasprinf(); ok deraadt@
d3cd4016 506 - sobrado@cvs.openbsd.org 2008/12/09 15:35:00
507 [sftp.1 sftp.c]
508 update for the synopses displayed by the 'help' command, there are a
509 few missing flags; add 'bye' to the output of 'help'; sorting and spacing.
510 jmc@ suggested replacing .Oo/.Oc with a single .Op macro.
511 ok jmc@
6c20a13f 512 - stevesk@cvs.openbsd.org 2008/12/09 22:37:33
513 [clientloop.c]
514 fix typo in error message
fd2ce9c6 515 - stevesk@cvs.openbsd.org 2008/12/10 03:55:20
516 [addrmatch.c]
517 o cannot be NULL here but use xfree() to be consistent; ok djm@
8647612c 518 - stevesk@cvs.openbsd.org 2008/12/29 01:12:36
519 [ssh-keyscan.1]
520 fix example, default key type is rsa for 3+ years; from
521 frederic.perrin@resel.fr
040d6b1f 522 - stevesk@cvs.openbsd.org 2008/12/29 02:23:26
523 [pathnames.h]
524 no need to escape single quotes in comments
d4bfdc62 525 - okan@cvs.openbsd.org 2008/12/30 00:46:56
526 [sshd_config.5]
527 add AllowAgentForwarding to available Match keywords list
528 ok djm
6cf44b6a 529 - djm@cvs.openbsd.org 2009/01/01 21:14:35
530 [channels.c]
531 call channel destroy callbacks on receipt of open failure messages.
532 fixes client hangs when connecting to a server that has MaxSessions=0
533 set spotted by imorgan AT nas.nasa.gov; ok markus@
546202d0 534 - djm@cvs.openbsd.org 2009/01/01 21:17:36
535 [kexgexs.c]
536 fix hash calculation for KEXGEX: hash over the original client-supplied
537 values and not the sanity checked versions that we acutally use;
538 bz#1540 reported by john.smith AT arrows.demon.co.uk
539 ok markus@
4866a6d6 540 - djm@cvs.openbsd.org 2009/01/14 01:38:06
541 [channels.c]
542 support SOCKS4A protocol, from dwmw2 AT infradead.org via bz#1482;
543 "looks ok" markus@
9b4b86c2 544 - stevesk@cvs.openbsd.org 2009/01/15 17:38:43
545 [readconf.c]
546 1) use obsolete instead of alias for consistency
547 2) oUserKnownHostsFile not obsolete but oGlobalKnownHostsFile2 is
548 so move the comment.
549 3) reorder so like options are together
550 ok djm@
1338ba77 551 - djm@cvs.openbsd.org 2009/01/22 09:46:01
552 [channels.c channels.h session.c]
553 make Channel->path an allocated string, saving a few bytes here and
554 there and fixing bz#1380 in the process; ok markus@
920706fd 555 - djm@cvs.openbsd.org 2009/01/22 09:49:57
556 [channels.c]
557 oops! I committed the wrong version of the Channel->path diff,
558 it was missing some tweaks suggested by stevesk@
5134115d 559 - djm@cvs.openbsd.org 2009/01/22 10:02:34
560 [clientloop.c misc.c readconf.c readconf.h servconf.c servconf.h]
561 [serverloop.c ssh-keyscan.c ssh.c sshd.c]
562 make a2port() return -1 when it encounters an invalid port number
563 rather than 0, which it will now treat as valid (needed for future work)
564 adjust current consumers of a2port() to check its return value is <= 0,
565 which in turn required some things to be converted from u_short => int
566 make use of int vs. u_short consistent in some other places too
567 feedback & ok markus@
368e246f 568 - djm@cvs.openbsd.org 2009/01/22 10:09:16
569 [auth-options.c]
570 another chunk of a2port() diff that got away. wtfdjm??
700fd7e7 571 - djm@cvs.openbsd.org 2009/01/23 07:58:11
572 [myproposal.h]
573 prefer CTR modes and revised arcfour (i.e w/ discard) modes to CBC
574 modes; ok markus@
29ec8eb3 575 - naddy@cvs.openbsd.org 2009/01/24 17:10:22
576 [ssh_config.5 sshd_config.5]
577 sync list of preferred ciphers; ok djm@
608bcf58 578 - markus@cvs.openbsd.org 2009/01/26 09:58:15
579 [cipher.c cipher.h packet.c]
580 Work around the CPNI-957037 Plaintext Recovery Attack by always
581 reading 256K of data on packet size or HMAC errors (in CBC mode only).
582 Help, feedback and ok djm@
583 Feedback from Martin Albrecht and Paterson Kenny
68405671 584
a25d08b3 58520090107
586 - (djm) [uidswap.c] bz#1412: Support >16 supplemental groups in OS X.
587 Patch based on one from vgiffin AT apple.com; ok dtucker@
b5a1596f 588 - (djm) [channels.c] bz#1419: support "on demand" X11 forwarding via
589 launchd on OS X; patch from vgiffin AT apple.com, slightly tweaked;
590 ok dtucker@
23b3ed0b 591 - (djm) [contrib/ssh-copy-id.1 contrib/ssh-copy-id] bz#1492: Make
592 ssh-copy-id copy id_rsa.pub by default (instead of the legacy "identity"
593 key). Patch from cjwatson AT debian.org
a25d08b3 594
16076ac9 59520090107
596 - (tim) [configure.ac defines.h openbsd-compat/port-uw.c
597 openbsd-compat/xcrypt.c] Add SECUREWARE support to OpenServer 6 SVR5 ABI.
598 OK djm@ dtucker@
44a71983 599 - (tim) [configure.ac] Move check_for_libcrypt_later=1 in *-*-sysv5*) section.
600 OpenServer 6 doesn't need libcrypt.
16076ac9 601
09925c00 60220081209
603 - (djm) OpenBSD CVS Sync
604 - djm@cvs.openbsd.org 2008/12/09 02:38:18
605 [clientloop.c]
606 The ~C escape handler does not work correctly for multiplexed sessions -
607 it opens a commandline on the master session, instead of on the slave
608 that requested it. Disable it on slave sessions until such time as it
609 is fixed; bz#1543 report from Adrian Bridgett via Colin Watson
610 ok markus@
ddb5e00f 611 - djm@cvs.openbsd.org 2008/12/09 02:39:59
612 [sftp.c]
613 Deal correctly with failures in remote stat() operation in sftp,
614 correcting fail-on-error behaviour in batchmode. bz#1541 report and
615 fix from anedvedicky AT gmail.com; ok markus@
bab3d903 616 - djm@cvs.openbsd.org 2008/12/09 02:58:16
617 [readconf.c]
618 don't leave junk (free'd) pointers around in Forward *fwd argument on
619 failure; avoids double-free in ~C -L handler when given an invalid
620 forwarding specification; bz#1539 report from adejong AT debian.org
621 via Colin Watson; ok markus@ dtucker@
83cd8c39 622 - djm@cvs.openbsd.org 2008/12/09 03:02:37
623 [sftp.1 sftp.c]
624 correct sftp(1) and corresponding usage syntax;
625 bz#1518 patch from imorgan AT nas.nasa.gov; ok deraadt@ improved diff jmc@
09925c00 626
53e2660a 62720081208
628 - (djm) [configure.ac] bz#1538: better test for ProPolice/SSP: actually
629 use some stack in main().
630 Report and suggested fix from vapier AT gentoo.org
66e16767 631 - (djm) OpenBSD CVS Sync
632 - markus@cvs.openbsd.org 2008/12/02 19:01:07
633 [clientloop.c]
634 we have to use the recipient's channel number (RFC 4254) for
635 SSH2_MSG_CHANNEL_SUCCESS/SSH2_MSG_CHANNEL_FAILURE messages,
636 otherwise we trigger 'Non-public channel' error messages on sshd
637 systems with clientkeepalive enabled; noticed by sturm; ok djm;
7ec2b275 638 - markus@cvs.openbsd.org 2008/12/02 19:08:59
639 [serverloop.c]
640 backout 1.149, since it's not necessary and openssh clients send
641 broken CHANNEL_FAILURE/SUCCESS messages since about 2004; ok djm@
b09b559d 642 - markus@cvs.openbsd.org 2008/12/02 19:09:38
643 [channels.c]
644 s/remote_id/id/ to be more consistent with other code; ok djm@
53e2660a 645
de470c82 64620081201
647 - (dtucker) [contrib/cygwin/{Makefile,ssh-host-config}] Add new doc files
648 and tweak the is-sshd-running check in ssh-host-config. Patch from
649 vinschen at redhat com.
66af1c21 650 - (dtucker) OpenBSD CVS Sync
651 - markus@cvs.openbsd.org 2008/11/21 15:47:38
652 [packet.c]
653 packet_disconnect() on padding error, too. should reduce the success
654 probability for the CPNI-957037 Plaintext Recovery Attack to 2^-18
655 ok djm@
8e10da10 656 - dtucker@cvs.openbsd.org 2008/11/30 11:59:26
657 [monitor_fdpass.c]
658 Retry sendmsg/recvmsg on EAGAIN and EINTR; ok djm@
de470c82 659
d2aa725a 66020081123
661 - (dtucker) [monitor_fdpass.c] Reduce diff vs OpenBSD by moving some
662 declarations, removing an unnecessary union member and adding whitespace.
c037a517 663 cmsgbuf.tmp thing spotted by des at des no, ok djm some time ago.
d2aa725a 664
95e16084 66520081118
666 - (tim) [addrmatch.c configure.ac] Some platforms do not have sin6_scope_id
667 member of sockaddr_in6. Also reported in Bug 1491 by David Leonard. OK and
668 feedback by djm@
669
0bd3332c 67020081111
671 - (dtucker) OpenBSD CVS Sync
672 - jmc@cvs.openbsd.org 2008/11/05 11:22:54
673 [servconf.c]
674 passord -> password;
675 fixes user/5975 from Rene Maroufi
1890bf8b 676 - stevesk@cvs.openbsd.org 2008/11/07 00:42:12
677 [ssh-keygen.c]
678 spelling/typo in comment
92d0164c 679 - stevesk@cvs.openbsd.org 2008/11/07 18:50:18
680 [nchan.c]
681 add space to some log/debug messages for readability; ok djm@ markus@
3d7f6c3d 682 - dtucker@cvs.openbsd.org 2008/11/07 23:34:48
683 [auth2-jpake.c]
684 Move JPAKE define to make life easier for portable. ok djm@
94087553 685 - tobias@cvs.openbsd.org 2008/11/09 12:34:47
686 [session.c ssh.1]
687 typo fixed (overriden -> overridden)
688 ok espie, jmc
2505b891 689 - stevesk@cvs.openbsd.org 2008/11/11 02:58:09
690 [servconf.c]
691 USE_AFS not referenced so remove #ifdef. fixes sshd -T not printing
692 kerberosgetafstoken. ok dtucker@
693 (Id sync only, we still want the ifdef in portable)
861e9e53 694 - stevesk@cvs.openbsd.org 2008/11/11 03:55:11
695 [channels.c]
696 for sshd -T print 'permitopen any' vs. 'permitopen' for case of no
697 permitopen's; ok and input dtucker@
0771f5dd 698 - djm@cvs.openbsd.org 2008/11/10 02:06:35
699 [regress/putty-ciphers.sh]
700 PuTTY supports AES CTR modes, so interop test against them too
0bd3332c 701
39aa8698 70220081105
703 - OpenBSD CVS Sync
704 - djm@cvs.openbsd.org 2008/11/03 08:59:41
705 [servconf.c]
706 include MaxSessions in sshd -T output; patch from imorgan AT nas.nasa.gov
a28625a6 707 - djm@cvs.openbsd.org 2008/11/04 07:58:09
708 [auth.c]
709 need unistd.h for close() prototype
710 (ID sync only)
5adf6b9a 711 - djm@cvs.openbsd.org 2008/11/04 08:22:13
712 [auth.h auth2.c monitor.c monitor.h monitor_wrap.c monitor_wrap.h]
713 [readconf.c readconf.h servconf.c servconf.h ssh2.h ssh_config.5]
714 [sshconnect2.c sshd_config.5 jpake.c jpake.h schnorr.c auth2-jpake.c]
715 [Makefile.in]
716 Add support for an experimental zero-knowledge password authentication
717 method using the J-PAKE protocol described in F. Hao, P. Ryan,
718 "Password Authenticated Key Exchange by Juggling", 16th Workshop on
719 Security Protocols, Cambridge, April 2008.
720
721 This method allows password-based authentication without exposing
722 the password to the server. Instead, the client and server exchange
723 cryptographic proofs to demonstrate of knowledge of the password while
724 revealing nothing useful to an attacker or compromised endpoint.
725
726 This is experimental, work-in-progress code and is presently
727 compiled-time disabled (turn on -DJPAKE in Makefile.inc).
728
729 "just commit it. It isn't too intrusive." deraadt@
d35f707e 730 - stevesk@cvs.openbsd.org 2008/11/04 19:18:00
731 [readconf.c]
732 because parse_forward() is now used to parse all forward types (DLR),
733 and it malloc's space for host variables, we don't need to malloc
734 here. fixes small memory leaks.
735
736 previously dynamic forwards were not parsed in parse_forward() and
737 space was not malloc'd in that case.
738
739 ok djm@
10cf2ac3 740 - stevesk@cvs.openbsd.org 2008/11/05 03:23:09
741 [clientloop.c ssh.1]
742 add dynamic forward escape command line; ok djm@
39aa8698 743
94f36816 74420081103
745 - OpenBSD CVS Sync
746 - sthen@cvs.openbsd.org 2008/07/24 23:55:30
747 [ssh-keygen.1]
748 Add "ssh-keygen -F -l" to synopsis (displays fingerprint from
749 known_hosts). ok djm@
750 - grunk@cvs.openbsd.org 2008/07/25 06:56:35
751 [ssh_config]
752 Add VisualHostKey to example file, ok djm@
5ca42ddb 753 - grunk@cvs.openbsd.org 2008/07/25 07:05:16
754 [key.c]
755 In random art visualization, make sure to use the end marker only at the
756 end. Initial diff by Dirk Loss, tweaks and ok djm@
341cb46b 757 - markus@cvs.openbsd.org 2008/07/31 14:48:28
758 [sshconnect2.c]
759 don't allocate space for empty banners; report t8m at centrum.cz;
760 ok deraadt
686bdcbd 761 - krw@cvs.openbsd.org 2008/08/02 04:29:51
762 [ssh_config.5]
763 whitepsace -> whitespace. From Matthew Clarke via bugs@.
e3ef5245 764 - djm@cvs.openbsd.org 2008/08/21 04:09:57
765 [session.c]
766 allow ForceCommand internal-sftp with arguments. based on patch from
767 michael.barabanov AT gmail.com; ok markus@
1975fb98 768 - djm@cvs.openbsd.org 2008/09/06 12:24:13
769 [kex.c]
770 OpenSSL 0.9.8h supplies a real EVP_sha256 so we do not need our
771 replacement anymore
772 (ID sync only for portable - we still need this)
72bd2fca 773 - markus@cvs.openbsd.org 2008/09/11 14:22:37
774 [compat.c compat.h nchan.c ssh.c]
775 only send eow and no-more-sessions requests to openssh 5 and newer;
776 fixes interop problems with broken ssh v2 implementations; ok djm@
2e96832c 777 - millert@cvs.openbsd.org 2008/10/02 14:39:35
778 [session.c]
779 Convert an unchecked strdup to xstrdup. OK deraadt@
dc94d57e 780 - jmc@cvs.openbsd.org 2008/10/03 13:08:12
781 [sshd.8]
782 do not give an example of how to chmod files: we can presume the user
783 knows that. removes an ambiguity in the permission of authorized_keys;
784 ok deraadt
90d5350e 785 - deraadt@cvs.openbsd.org 2008/10/03 23:56:28
786 [sshconnect2.c]
787 Repair strnvis() buffersize of 4*n+1, with termination gauranteed by the
788 function.
789 spotted by des@freebsd, who commited an incorrect fix to the freebsd tree
790 and (as is fairly typical) did not report the problem to us. But this fix
791 is correct.
792 ok djm
bf793210 793 - djm@cvs.openbsd.org 2008/10/08 23:34:03
794 [ssh.1 ssh.c]
795 Add -y option to force logging via syslog rather than stderr.
796 Useful for daemonised ssh connection (ssh -f). Patch originally from
797 and ok'd by markus@
e68868a1 798 - djm@cvs.openbsd.org 2008/10/09 03:50:54
799 [servconf.c sshd_config.5]
800 support setting PermitEmptyPasswords in a Match block
801 requested in PR3891; ok dtucker@
f3a4d0d0 802 - jmc@cvs.openbsd.org 2008/10/09 06:54:22
803 [ssh.c]
804 add -y to usage();
6503dc91 805 - stevesk@cvs.openbsd.org 2008/10/10 04:55:16
806 [scp.c]
807 spelling in comment; ok djm@
260bf88a 808 - stevesk@cvs.openbsd.org 2008/10/10 05:00:12
809 [key.c]
810 typo in error message; ok djm@
96a00a9d 811 - stevesk@cvs.openbsd.org 2008/10/10 16:43:27
812 [ssh_config.5]
813 use 'Privileged ports can be forwarded only when logging in as root on
814 the remote machine.' for RemoteForward just like ssh.1 -R.
815 ok djm@ jmc@
816 - stevesk@cvs.openbsd.org 2008/10/14 18:11:33
817 [sshconnect.c]
818 use #define ROQUIET here; no binary change. ok dtucker@
8d20b087 819 - stevesk@cvs.openbsd.org 2008/10/17 18:36:24
820 [ssh_config.5]
821 correct and clarify VisualHostKey; ok jmc@
25f93f2c 822 - stevesk@cvs.openbsd.org 2008/10/30 19:31:16
823 [clientloop.c sshd.c]
824 don't need to #include "monitor_fdpass.h"
b8974c94 825 - stevesk@cvs.openbsd.org 2008/10/31 15:05:34
826 [dispatch.c]
827 remove unused #define DISPATCH_MIN; ok markus@
e64399cc 828 - djm@cvs.openbsd.org 2008/11/01 04:50:08
829 [sshconnect2.c]
830 sprinkle ARGSUSED on dispatch handlers
831 nuke stale unusued prototype
2ea438c2 832 - stevesk@cvs.openbsd.org 2008/11/01 06:43:33
833 [channels.c]
834 fix some typos in log messages; ok djm@
9995aaa3 835 - sobrado@cvs.openbsd.org 2008/11/01 11:14:36
836 [ssh-keyscan.1 ssh-keyscan.c]
837 the ellipsis is not an optional argument; while here, improve spacing.
30573fea 838 - stevesk@cvs.openbsd.org 2008/11/01 17:40:33
839 [clientloop.c readconf.c readconf.h ssh.c]
840 merge dynamic forward parsing into parse_forward();
841 'i think this is OK' djm@
9bbba34b 842 - stevesk@cvs.openbsd.org 2008/11/02 00:16:16
843 [ttymodes.c]
844 protocol 2 tty modes support is now 7.5 years old so remove these
845 debug3()s; ok deraadt@
b626b7ae 846 - stevesk@cvs.openbsd.org 2008/11/03 01:07:02
847 [readconf.c]
848 remove valueless comment
c8eaf0ec 849 - stevesk@cvs.openbsd.org 2008/11/03 02:44:41
850 [readconf.c]
851 fix comment
fce91335 852 - (djm) [contrib/caldera/ssh-host-keygen contrib/suse/rc.sshd]
853 Make example scripts generate keys with default sizes rather than fixed,
854 non-default 1024 bits; patch from imorgan AT nas.nasa.gov
933e2f91 855 - (djm) [contrib/sshd.pam.generic contrib/caldera/sshd.pam]
856 [contrib/redhat/sshd.pam] Move pam_nologin to account group from
857 incorrect auth group in example files;
858 patch from imorgan AT nas.nasa.gov
94f36816 859
d6339843 86020080906
861 - (dtucker) [config.guess config.sub] Update to latest versions from
862 http://git.savannah.gnu.org/gitweb/ (2008-04-14 and 2008-06-16
863 respectively).
864
974ce4a0 86520080830
866 - (dtucker) [openbsd-compat/bsd-poll.c] correctly check for number of FDs
867 larger than FD_SETSIZE (OpenSSH only ever uses poll with one fd). Patch
868 from Nicholas Marriott.
869
e888d981 87020080721
871 - (djm) OpenBSD CVS Sync
872 - djm@cvs.openbsd.org 2008/07/23 07:36:55
873 [servconf.c]
874 do not try to print options that have been compile-time disabled
875 in config test mode (sshd -T); report from nix-corp AT esperi.org.uk
876 ok dtucker@
cee47c9f 877 - (djm) [servconf.c] Print UsePAM option in config test mode (when it
878 has been compiled in); report from nix-corp AT esperi.org.uk
879 ok dtucker@
e888d981 880
b14e719f 88120080721
882 - (djm) OpenBSD CVS Sync
883 - jmc@cvs.openbsd.org 2008/07/18 22:51:01
884 [sftp-server.8]
885 no need for .Pp before or after .Sh;
f3b93df3 886 - djm@cvs.openbsd.org 2008/07/21 08:19:07
887 [version.h]
888 openssh-5.1
11368183 889 - (djm) [README contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
890 [contrib/suse/openssh.spec] Update version number in README and RPM specs
55d5db1c 891 - (djm) Release OpenSSH-5.1
b14e719f 892
e5df5ff2 89320080717
894 - (djm) OpenBSD CVS Sync
895 - djm@cvs.openbsd.org 2008/07/17 08:48:00
896 [sshconnect2.c]
897 strnvis preauth banner; pointed out by mpf@ ok markus@
2800468d 898 - djm@cvs.openbsd.org 2008/07/17 08:51:07
899 [auth2-hostbased.c]
900 strip trailing '.' from hostname when HostbasedUsesNameFromPacketOnly=yes
901 report and patch from res AT qoxp.net (bz#1200); ok markus@
d9d96f7a 902 - (dtucker) [openbsd-compat/bsd-cygwin_util.c] Remove long-unneeded compat
903 code, replace with equivalent cygwin library call. Patch from vinschen
3a69fb58 904 at redhat.com, ok djm@.
905 - (djm) [sshconnect2.c] vis.h isn't available everywhere
e5df5ff2 906
b8c9ea19 90720080716
908 - OpenBSD CVS Sync
909 - djm@cvs.openbsd.org 2008/07/15 02:23:14
910 [sftp.1]
911 number of pipelined requests is now 64;
912 prodded by Iain.Morgan AT nasa.gov
dfe666f6 913 - djm@cvs.openbsd.org 2008/07/16 11:51:14
914 [clientloop.c]
915 rename variable first_gc -> last_gc (since it is actually the last
916 in the list).
cdfbc829 917 - djm@cvs.openbsd.org 2008/07/16 11:52:19
918 [channels.c]
919 this loop index should be automatic, not static
b8c9ea19 920
322b3f02 92120080714
922 - (djm) OpenBSD CVS Sync
923 - sthen@cvs.openbsd.org 2008/07/13 21:22:52
924 [ssh-keygen.c]
925 Change "ssh-keygen -F [host] -l" to not display random art unless
926 -v is also specified, making it consistent with the manual and other
927 uses of -l.
928 ok grunk@
9fb764ab 929 - djm@cvs.openbsd.org 2008/07/13 22:13:07
930 [channels.c]
931 use struct sockaddr_storage instead of struct sockaddr for accept(2)
932 address argument. from visibilis AT yahoo.com in bz#1485; ok markus@
873722cc 933 - djm@cvs.openbsd.org 2008/07/13 22:16:03
934 [sftp.c]
935 increase number of piplelined requests so they properly fill the
936 (recently increased) channel window. prompted by rapier AT psc.edu;
937 ok markus@
66fba053 938 - djm@cvs.openbsd.org 2008/07/14 01:55:56
939 [sftp-server.8]
940 mention requirement for /dev/log inside chroot when using sftp-server
941 with ChrootDirectory
6c6bb9a6 942 - (djm) [openbsd-compat/bindresvport.c] Rename variables s/sin/in/ to
943 avoid clash with sin(3) function; reported by
944 cristian.ionescu-idbohrn AT axis.com
7be182d4 945 - (djm) [openbsd-compat/rresvport.c] Add unistd.h for missing close()
946 prototype; reported by cristian.ionescu-idbohrn AT axis.com
6a9c22a5 947 - (djm) [umac.c] Rename variable s/buffer_ptr/bufp/ to avoid clash;
948 reported by cristian.ionescu-idbohrn AT axis.com
7ea1abf7 949 - (djm) [contrib/cygwin/Makefile contrib/cygwin/ssh-host-config]
950 [contrib/cygwin/ssh-user-config contrib/cygwin/sshd-inetd]
951 Revamped and simplified Cygwin ssh-host-config script that uses
952 unified csih configuration tool. Requires recent Cygwin.
953 Patch from vinschen AT redhat.com
322b3f02 954
267d5589 95520080712
956 - (djm) OpenBSD CVS Sync
957 - djm@cvs.openbsd.org 2008/07/12 04:52:50
958 [channels.c]
959 unbreak; move clearing of cctx struct to before first use
960 reported by dkrause@
da9a823d 961 - djm@cvs.openbsd.org 2008/07/12 05:33:41
962 [scp.1]
963 better description for -i flag:
964 s/RSA authentication/public key authentication/
2ade01eb 965 - (djm) [openbsd-compat/fake-rfc2553.c openbsd-compat/fake-rfc2553.h]
966 return EAI_FAMILY when trying to lookup unsupported address family;
967 from vinschen AT redhat.com
267d5589 968
971deff8 96920080711
970 - (djm) OpenBSD CVS Sync
971 - stevesk@cvs.openbsd.org 2008/07/07 00:31:41
972 [ttymodes.c]
973 we don't need arg after the debug3() was removed. from lint.
974 ok djm@
d5b5b8f6 975 - stevesk@cvs.openbsd.org 2008/07/07 23:32:51
976 [key.c]
977 /*NOTREACHED*/ for lint warning:
978 warning: function key_equal falls off bottom without returning value
979 ok djm@
6eb3f18c 980 - markus@cvs.openbsd.org 2008/07/10 18:05:58
981 [channels.c]
982 missing bzero; from mickey; ok djm@
e8e08a80 983 - markus@cvs.openbsd.org 2008/07/10 18:08:11
984 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h sshd.c]
985 sync v1 and v2 traffic accounting; add it to sshd, too;
986 ok djm@, dtucker@
971deff8 987
17969fcc 98820080709
989 - (djm) [Makefile.in] Print "all tests passed" when all regress tests pass
b5fc5d94 990 - (djm) [auth1.c] Fix format string vulnerability in protocol 1 PAM
991 account check failure path. The vulnerable format buffer is supplied
992 from PAM and should not contain attacker-supplied data.
78cb4705 993 - (djm) [auth.c] Missing unistd.h for close()
b5902374 994 - (djm) [configure.ac] Add -Wformat-security to CFLAGS for gcc 3.x and 4.x
17969fcc 995
3fde0623 99620080705
997 - (djm) [auth.c] Fixed test for locked account on HP/UX with shadowed
998 passwords disabled. bz#1083 report & patch from senthilkumar_sen AT
999 hotpop.com, w/ dtucker@
e8983917 1000 - (djm) [atomicio.c configure.ac] Disable poll() fallback in atomiciov for
1001 Tru64. readv doesn't seem to be a comparable object there.
1002 bz#1386, patch from dtucker@ ok me
b8d635d0 1003 - (djm) [Makefile.in] Pass though pass to conch for interop tests
6ed8a3ae 1004 - (djm) [configure.ac] unbreak: remove extra closing brace
d38d9a80 1005 - (djm) OpenBSD CVS Sync
1006 - djm@cvs.openbsd.org 2008/07/04 23:08:25
1007 [packet.c]
1008 handle EINTR in packet_write_poll()l ok dtucker@
71709bcd 1009 - djm@cvs.openbsd.org 2008/07/04 23:30:16
1010 [auth1.c auth2.c]
1011 Make protocol 1 MaxAuthTries logic match protocol 2's.
1012 Do not treat the first protocol 2 authentication attempt as
1013 a failure IFF it is for method "none".
1014 Makes MaxAuthTries' user-visible behaviour identical for
1015 protocol 1 vs 2.
1016 ok dtucker@
3086db6e 1017 - djm@cvs.openbsd.org 2008/07/05 05:16:01
1018 [PROTOCOL]
1019 grammar
3fde0623 1020
a0d38609 102120080704
1022 - (dtucker) OpenBSD CVS Sync
1023 - djm@cvs.openbsd.org 2008/07/02 13:30:34
1024 [auth2.c]
1025 really really remove the freebie "none" auth try for protocol 2
6c777090 1026 - djm@cvs.openbsd.org 2008/07/02 13:47:39
1027 [ssh.1 ssh.c]
1028 When forking after authentication ("ssh -f") with ExitOnForwardFailure
1029 enabled, delay the fork until after replies for any -R forwards have
1030 been seen. Allows for robust detection of -R forward failure when
1031 using -f (similar to bz#92); ok dtucker@
f0b9fde3 1032 - otto@cvs.openbsd.org 2008/07/03 21:46:58
1033 [auth2-pubkey.c]
1034 avoid nasty double free; ok dtucker@ djm@
cece208b 1035 - djm@cvs.openbsd.org 2008/07/04 03:44:59
1036 [servconf.c groupaccess.h groupaccess.c]
1037 support negation of groups in "Match group" block (bz#1315); ok dtucker@
c54d3d1c 1038 - dtucker@cvs.openbsd.org 2008/07/04 03:47:02
1039 [monitor.c]
1040 Make debug a little clearer. ok djm@
c7cbf377 1041 - djm@cvs.openbsd.org 2008/06/30 08:07:34
1042 [regress/key-options.sh]
1043 shell portability: use "=" instead of "==" in test(1) expressions,
1044 double-quote string with backslash escaped /
8a972082 1045 - djm@cvs.openbsd.org 2008/06/30 10:31:11
1046 [regress/{putty-transfer,putty-kex,putty-ciphers}.sh]
1047 remove "set -e" left over from debugging
9b0c87d9 1048 - djm@cvs.openbsd.org 2008/06/30 10:43:03
1049 [regress/conch-ciphers.sh]
1050 explicitly disable conch options that could interfere with the test
97e61398 1051 - (dtucker) [sftp-server.c] Bug #1447: fall back to racy rename if link
1052 returns EXDEV. Patch from Mike Garrison, ok djm@
5a0c8771 1053 - (djm) [atomicio.c channels.c clientloop.c defines.h includes.h]
1054 [packet.c scp.c serverloop.c sftp-client.c ssh-agent.c ssh-keyscan.c]
1055 [sshd.c] Explicitly handle EWOULDBLOCK wherever we handle EAGAIN, on
1056 some platforms (HP nonstop) it is a distinct errno;
1057 bz#1467 reported by sconeu AT yahoo.com; ok dtucker@
1058
8f02e0be 105920080702
1060 - (dtucker) OpenBSD CVS Sync
1061 - djm@cvs.openbsd.org 2008/06/30 08:05:59
1062 [PROTOCOL.agent]
1063 typo: s/constraint_date/constraint_data/
fb5582f7 1064 - djm@cvs.openbsd.org 2008/06/30 12:15:39
1065 [serverloop.c]
1066 only pass channel requests on session channels through to the session
1067 channel handler, avoiding spurious log messages; ok! markus@
4d92dbc1 1068 - djm@cvs.openbsd.org 2008/06/30 12:16:02
1069 [nchan.c]
1070 only send eow@openssh.com notifications for session channels; ok! markus@
8fb1ddc9 1071 - djm@cvs.openbsd.org 2008/06/30 12:18:34
1072 [PROTOCOL]
1073 clarify that eow@openssh.com is only sent on session channels
979b31ed 1074 - dtucker@cvs.openbsd.org 2008/07/01 07:20:52
1075 [sshconnect.c]
1076 Check ExitOnForwardFailure if forwardings are disabled due to a failed
1077 host key check. ok djm@
f9b45eaf 1078 - dtucker@cvs.openbsd.org 2008/07/01 07:24:22
1079 [sshconnect.c sshd.c]
1080 Send CR LF during protocol banner exchanges, but only for Protocol 2 only,
1081 in order to comply with RFC 4253. bz #1443, ok djm@
5ebed98d 1082 - stevesk@cvs.openbsd.org 2008/07/01 23:12:47
1083 [PROTOCOL.agent]
1084 fix some typos; ok djm@
39ceddb7 1085 - djm@cvs.openbsd.org 2008/07/02 02:24:18
1086 [sshd_config sshd_config.5 sshd.8 servconf.c]
1087 increase default size of ssh protocol 1 ephemeral key from 768 to 1024
1088 bits; prodded by & ok dtucker@ ok deraadt@
f7c2a004 1089 - dtucker@cvs.openbsd.org 2008/07/02 12:03:51
1090 [auth-rsa.c auth.c auth2-pubkey.c auth.h]
1091 Merge duplicate host key file checks, based in part on a patch from Rob
1092 Holland via bz #1348 . Also checks for non-regular files during protocol
1093 1 RSA auth. ok djm@
221fc73c 1094 - djm@cvs.openbsd.org 2008/07/02 12:36:39
1095 [auth2-none.c auth2.c]
1096 Make protocol 2 MaxAuthTries behaviour a little more sensible:
1097 Check whether client has exceeded MaxAuthTries before running
1098 an authentication method and skip it if they have, previously it
1099 would always allow one try (for "none" auth).
1100 Preincrement failure count before post-auth test - previously this
1101 checked and postincremented, also to allow one "none" try.
1102 Together, these two changes always count the "none" auth method
1103 which could be skipped by a malicious client (e.g. an SSH worm)
1104 to get an extra attempt at a real auth method. They also make
1105 MaxAuthTries=0 a useful way to block users entirely (esp. in a
1106 sshd_config Match block).
1107 Also, move sending of any preauth banner from "none" auth method
1108 to the first call to input_userauth_request(), so worms that skip
1109 the "none" method get to see it too.
8f02e0be 1110
00b7389d 111120080630
1112 - (djm) OpenBSD CVS Sync
1113 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
1114 [regress/Makefile regress/key-options.sh]
1115 Add regress test for key options. ok djm@
86d745dc 1116 - dtucker@cvs.openbsd.org 2008/06/11 23:11:40
014f1b23 1117 [regress/Makefile]
86d745dc 1118 Don't run cipher-speed test by default; mistakenly enabled by me
014f1b23 1119 - djm@cvs.openbsd.org 2008/06/28 13:57:25
1120 [regress/Makefile regress/test-exec.sh regress/conch-ciphers.sh]
1121 very basic regress test against Twisted Conch in "make interop"
1122 target (conch is available in ports/devel/py-twisted/conch);
1123 ok markus@
8476b024 1124 - (djm) [regress/Makefile] search for conch by path, like we do putty
00b7389d 1125
aa47edcc 112620080629
1127 - (djm) OpenBSD CVS Sync
1128 - martynas@cvs.openbsd.org 2008/06/21 07:46:46
1129 [sftp.c]
1130 use optopt to get invalid flag, instead of return value of getopt,
1131 which is always '?'; ok djm@
ccf0fcb6 1132 - otto@cvs.openbsd.org 2008/06/25 11:13:43
1133 [key.c]
1134 add key length to visual fingerprint; zap magical constants;
1135 ok grunk@ djm@
681efe9f 1136 - djm@cvs.openbsd.org 2008/06/26 06:10:09
1137 [sftp-client.c sftp-server.c]
1138 allow the sftp chmod(2)-equivalent operation to set set[ug]id/sticky
1139 bits. Note that this only affects explicit setting of modes (e.g. via
1140 sftp(1)'s chmod command) and not file transfers. (bz#1310)
1141 ok deraadt@ at c2k8
b080d398 1142 - djm@cvs.openbsd.org 2008/06/26 09:19:40
1143 [dh.c dh.h moduli.c]
1144 when loading moduli from /etc/moduli in sshd(8), check that they
1145 are of the expected "safe prime" structure and have had
1146 appropriate primality tests performed;
1147 feedback and ok dtucker@
7b3999b8 1148 - grunk@cvs.openbsd.org 2008/06/26 11:46:31
1149 [readconf.c readconf.h ssh.1 ssh_config.5 sshconnect.c]
1150 Move SSH Fingerprint Visualization away from sharing the config option
1151 CheckHostIP to an own config option named VisualHostKey.
1152 While there, fix the behaviour that ssh would draw a random art picture
1153 on every newly seen host even when the option was not enabled.
1154 prodded by deraadt@, discussions,
1155 help and ok markus@ djm@ dtucker@
2e8d3306 1156 - jmc@cvs.openbsd.org 2008/06/26 21:11:46
1157 [ssh.1]
1158 add VisualHostKey to the list of options listed in -o;
cda43f66 1159 - djm@cvs.openbsd.org 2008/06/28 07:25:07
1160 [PROTOCOL]
1161 spelling fixes
c525650a 1162 - djm@cvs.openbsd.org 2008/06/28 13:58:23
1163 [ssh-agent.c]
1164 refuse to add a key that has unknown constraints specified;
1165 ok markus
9ee2fb0e 1166 - djm@cvs.openbsd.org 2008/06/28 14:05:15
1167 [ssh-agent.c]
1168 reset global compat flag after processing a protocol 2 signature
1169 request with the legacy DSA encoding flag set; ok markus
ab3eb078 1170 - djm@cvs.openbsd.org 2008/06/28 14:08:30
1171 [PROTOCOL PROTOCOL.agent]
1172 document the protocol used by ssh-agent; "looks ok" markus@
aa47edcc 1173
f6351d4d 117420080628
1175 - (djm) [RFC.nroff contrib/cygwin/Makefile contrib/suse/openssh.spec]
1176 RFC.nroff lacks a license, remove it (it is long gone in OpenBSD).
1177
bd6b3feb 117820080626
1179 - (djm) [Makefile.in moduli.5] Include moduli(5) manpage from OpenBSD.
1180 (bz#1372)
a32d8b38 1181 - (djm) [ contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
1182 [contrib/suse/openssh.spec] Include moduli.5 in RPM spec files.
bd6b3feb 1183
b3784859 118420080616
1185 - (dtucker) OpenBSD CVS Sync
1186 - dtucker@cvs.openbsd.org 2008/06/16 13:22:53
1187 [session.c channels.c]
1188 Rename the isatty argument to is_tty so we don't shadow
1189 isatty(3). ok markus@
245f4d36 1190 - (dtucker) [channels.c] isatty -> is_tty here too.
b3784859 1191
b55b0285 119220080615
1193 - (dtucker) [configure.ac] Enable -fno-builtin-memset when using gcc.
081573fe 1194 - OpenBSD CVS Sync
1195 - dtucker@cvs.openbsd.org 2008/06/14 15:49:48
1196 [sshd.c]
1197 wrap long line at 80 chars
26512357 1198 - dtucker@cvs.openbsd.org 2008/06/14 17:07:11
1199 [sshd.c]
1200 ensure default umask disallows at least group and world write; ok djm@
2608aa2b 1201 - djm@cvs.openbsd.org 2008/06/14 18:33:43
1202 [session.c]
1203 suppress the warning message from chdir(homedir) failures
1204 when chrooted (bz#1461); ok dtucker
49c5f262 1205 - dtucker@cvs.openbsd.org 2008/06/14 19:42:10
1206 [scp.1]
1207 Mention that scp follows symlinks during -r. bz #1466,
1208 from nectar at apple
d97287d3 1209 - dtucker@cvs.openbsd.org 2008/06/15 16:55:38
1210 [sshd_config.5]
1211 MaxSessions is allowed in a Match block too
8086aeb2 1212 - dtucker@cvs.openbsd.org 2008/06/15 16:58:40
1213 [servconf.c sshd_config.5]
1214 Allow MaxAuthTries within a Match block. ok djm@
c9478090 1215 - djm@cvs.openbsd.org 2008/06/15 20:06:26
1216 [channels.c channels.h session.c]
1217 don't call isatty() on a pty master, instead pass a flag down to
1218 channel_set_fds() indicating that te fds refer to a tty. Fixes a
1219 hang on exit on Solaris (bz#1463) in portable but is actually
1220 a generic bug; ok dtucker deraadt markus
b55b0285 1221
add357c6 122220080614
1223 - (djm) [openbsd-compat/sigact.c] Avoid NULL derefs in ancient sigaction
1224 replacement code; patch from ighighi AT gmail.com in bz#1240;
1225 ok dtucker
1226
849d3ceb 122720080613
1228 - (dtucker) OpenBSD CVS Sync
1229 - deraadt@cvs.openbsd.org 2008/06/13 09:44:36
1230 [packet.c]
1231 compile on older gcc; no decl after code
52ad6b9a 1232 - dtucker@cvs.openbsd.org 2008/06/13 13:56:59
1233 [monitor.c]
1234 Clear key options in the monitor on failed authentication, prevents
1235 applying additional restrictions to non-pubkey authentications in
1236 the case where pubkey fails but another method subsequently succeeds.
1237 bz #1472, found by Colin Watson, ok markus@ djm@
1d0b7aaa 1238 - dtucker@cvs.openbsd.org 2008/06/13 14:18:51
1239 [auth2-pubkey.c auth-rhosts.c]
1240 Include unistd.h for close(), prevents warnings in -portable
a3f13d60 1241 - dtucker@cvs.openbsd.org 2008/06/13 17:21:20
1242 [mux.c]
1243 Friendlier error messages for mux fallback. ok djm@
a15e7da1 1244 - dtucker@cvs.openbsd.org 2008/06/13 18:55:22
1245 [scp.c]
1246 Prevent -Wsign-compare warnings on LP64 systems. bz #1192, ok deraadt@
990ada29 1247 - grunk@cvs.openbsd.org 2008/06/13 20:13:26
1248 [ssh.1]
1249 Explain the use of SSH fpr visualization using random art, and cite the
1250 original scientific paper inspiring that technique.
1251 Much help with English and nroff by jmc@, thanks.
596a825b 1252 - (dtucker) [configure.ac] Bug #1276: avoid linking against libgssapi, which
1253 despite its name doesn't seem to implement all of GSSAPI. Patch from
1254 Jan Engelhardt, sanity checked by Simon Wilkinson.
849d3ceb 1255
9754b94b 125620080612
1257 - (dtucker) OpenBSD CVS Sync
1258 - jmc@cvs.openbsd.org 2008/06/11 07:30:37
1259 [sshd.8]
1260 kill trailing whitespace;
aff73c5f 1261 - grunk@cvs.openbsd.org 2008/06/11 21:01:35
1262 [ssh_config.5 key.h readconf.c readconf.h ssh-keygen.1 ssh-keygen.c key.c
1263 sshconnect.c]
1264 Introduce SSH Fingerprint ASCII Visualization, a technique inspired by the
1265 graphical hash visualization schemes known as "random art", and by
1266 Dan Kaminsky's musings on the subject during a BlackOp talk at the
1267 23C3 in Berlin.
1268 Scientific publication (original paper):
1269 "Hash Visualization: a New Technique to improve Real-World Security",
1270 Perrig A. and Song D., 1999, International Workshop on Cryptographic
1271 Techniques and E-Commerce (CrypTEC '99)
1272 http://sparrow.ece.cmu.edu/~adrian/projects/validation/validation.pdf
1273 The algorithm used here is a worm crawling over a discrete plane,
1274 leaving a trace (augmenting the field) everywhere it goes.
1275 Movement is taken from dgst_raw 2bit-wise. Bumping into walls
1276 makes the respective movement vector be ignored for this turn,
1277 thus switching to the other color of the chessboard.
1278 Graphs are not unambiguous for now, because circles in graphs can be
1279 walked in either direction.
1280 discussions with several people,
1281 help, corrections and ok markus@ djm@
93778882 1282 - grunk@cvs.openbsd.org 2008/06/11 21:38:25
1283 [ssh-keygen.c]
1284 ssh-keygen -lv -f /etc/ssh/ssh_host_rsa_key.pub
1285 would not display you the random art as intended, spotted by canacar@
639211b7 1286 - grunk@cvs.openbsd.org 2008/06/11 22:20:46
1287 [ssh-keygen.c ssh-keygen.1]
1288 ssh-keygen would write fingerprints to STDOUT, and random art to STDERR,
1289 that is not how it was envisioned.
1290 Also correct manpage saying that -v is needed along with -l for it to work.
1291 spotted by naddy@
e3115002 1292 - otto@cvs.openbsd.org 2008/06/11 23:02:22
1293 [key.c]
1294 simpler way of computing the augmentations; ok grunk@
fe88400f 1295 - grunk@cvs.openbsd.org 2008/06/11 23:03:56
1296 [ssh_config.5]
1297 CheckHostIP set to ``fingerprint'' will display both hex and random art
1298 spotted by naddy@
97841001 1299 - grunk@cvs.openbsd.org 2008/06/11 23:51:57
1300 [key.c]
1301 #define statements that are not atoms need braces around them, else they
1302 will cause trouble in some cases.
1303 Also do a computation of -1 once, and not in a loop several times.
1304 spotted by otto@
e907df41 1305 - dtucker@cvs.openbsd.org 2008/06/12 00:03:49
1306 [dns.c canohost.c sshconnect.c]
1307 Do not pass "0" strings as ports to getaddrinfo because the lookups
1308 can slow things down and we never use the service info anyway. bz
1309 #859, patch from YOSHIFUJI Hideaki and John Devitofranceschi. ok
1310 deraadt@ djm@
1311 djm belives that the reason for the "0" strings is to ensure that
1312 it's not possible to call getaddrinfo with both host and port being
1313 NULL. In the case of canohost.c host is a local array. In the
1314 case of sshconnect.c, it's checked for null immediately before use.
1315 In dns.c it ultimately comes from ssh.c:main() and is guaranteed to
1316 be non-null but it's not obvious, so I added a warning message in
1317 case it is ever passed a null.
1318 - grunk@cvs.openbsd.org 2008/06/12 00:13:55
1319 [sshconnect.c]
1320 Make ssh print the random art also when ssh'ing to a host using IP only.
1321 spotted by naddy@, ok and help djm@ dtucker@
208cc0ee 1322 - otto@cvs.openbsd.org 2008/06/12 00:13:13
1323 [key.c]
1324 use an odd number of rows and columns and a separate start marker, looks
1325 better; ok grunk@
f17f705b 1326 - djm@cvs.openbsd.org 2008/06/12 03:40:52
1327 [clientloop.h mux.c channels.c clientloop.c channels.h]
1328 Enable ~ escapes for multiplex slave sessions; give each channel
1329 its own escape state and hook the escape filters up to muxed
1330 channels. bz #1331
1331 Mux slaves do not currently support the ~^Z and ~& escapes.
1332 NB. this change cranks the mux protocol version, so a new ssh
1333 mux client will not be able to connect to a running old ssh
1334 mux master.
1335 ok dtucker@
72becb62 1336 - djm@cvs.openbsd.org 2008/06/12 04:06:00
1337 [clientloop.h ssh.c clientloop.c]
1338 maintain an ordered queue of outstanding global requests that we
1339 expect replies to, similar to the per-channel confirmation queue.
1340 Use this queue to verify success or failure for remote forward
1341 establishment in a race free way.
1342 ok dtucker@
344f1d3d 1343 - djm@cvs.openbsd.org 2008/06/12 04:17:47
1344 [clientloop.c]
1345 thall shalt not code past the eightieth column
e8097dc9 1346 - djm@cvs.openbsd.org 2008/06/12 04:24:06
1347 [ssh.c]
1348 thal shalt not code past the eightieth column
9bcf03ce 1349 - djm@cvs.openbsd.org 2008/06/12 05:15:41
1350 [PROTOCOL]
1351 document tun@openssh.com forwarding method
aacab402 1352 - djm@cvs.openbsd.org 2008/06/12 05:32:30
1353 [mux.c]
1354 some more TODO for me
2bb50d23 1355 - grunk@cvs.openbsd.org 2008/06/12 05:42:46
1356 [key.c]
1357 supply the key type (rsa1, rsa, dsa) as a caption in the frame of the
1358 random art. while there, stress the fact that the field base should at
1359 least be 8 characters for the pictures to make sense.
1360 comment and ok djm@
1361 - grunk@cvs.openbsd.org 2008/06/12 06:32:59
1362 [key.c]
1363 We already mark the start of the worm, now also mark the end of the worm
1364 in our random art drawings.
1365 ok djm@
e74caf1e 1366 - djm@cvs.openbsd.org 2008/06/12 15:19:17
1367 [clientloop.h channels.h clientloop.c channels.c mux.c]
1368 The multiplexing escape char handler commit last night introduced a
1369 small memory leak per session; plug it.
e9d0b573 1370 - dtucker@cvs.openbsd.org 2008/06/12 16:35:31
1371 [ssh_config.5 ssh.c]
1372 keyword expansion for localcommand. ok djm@
a64f8307 1373 - jmc@cvs.openbsd.org 2008/06/12 19:10:09
1374 [ssh_config.5 ssh-keygen.1]
1375 tweak the ascii art text; ok grunk
bc2d97c8 1376 - dtucker@cvs.openbsd.org 2008/06/12 20:38:28
1377 [sshd.c sshconnect.c packet.h misc.c misc.h packet.c]
1378 Make keepalive timeouts apply while waiting for a packet, particularly
1379 during key renegotiation (bz #1363). With djm and Matt Day, ok djm@
ad39a852 1380 - djm@cvs.openbsd.org 2008/06/12 20:47:04
1381 [sftp-client.c]
1382 print extension revisions for extensions that we understand
07d8d480 1383 - djm@cvs.openbsd.org 2008/06/12 21:06:25
1384 [clientloop.c]
1385 I was coalescing expected global request confirmation replies at
1386 the wrong end of the queue - fix; prompted by markus@
31de76cc 1387 - grunk@cvs.openbsd.org 2008/06/12 21:14:46
1388 [ssh-keygen.c]
1389 make ssh-keygen -lf show the key type just as ssh-add -l would do it
1390 ok djm@ markus@
f97fb6ca 1391 - grunk@cvs.openbsd.org 2008/06/12 22:03:36
1392 [key.c]
1393 add my copyright, ok djm@
6d8216ff 1394 - ian@cvs.openbsd.org 2008/06/12 23:24:58
1395 [sshconnect.c]
1396 tweak wording in message, ok deraadt@ jmc@
2c83cd01 1397 - dtucker@cvs.openbsd.org 2008/06/13 00:12:02
1398 [sftp.h log.h]
1399 replace __dead with __attribute__((noreturn)), makes things
1400 a little easier to port. Also, add it to sigdie(). ok djm@
b97ea6eb 1401 - djm@cvs.openbsd.org 2008/06/13 00:16:49
1402 [mux.c]
1403 fall back to creating a new TCP connection on most multiplexing errors
1404 (socket connect fail, invalid version, refused permittion, corrupted
1405 messages, etc.); bz #1329 ok dtucker@
243cc316 1406 - dtucker@cvs.openbsd.org 2008/06/13 00:47:53
1407 [mux.c]
1408 upcast size_t to u_long to match format arg; ok djm@
041f11dc 1409 - dtucker@cvs.openbsd.org 2008/06/13 00:51:47
1410 [mac.c]
1411 upcast another size_t to u_long to match format
852eb76b 1412 - dtucker@cvs.openbsd.org 2008/06/13 01:38:23
1413 [misc.c]
1414 upcast uid to long with matching %ld, prevents warnings in portable
632f2669 1415 - djm@cvs.openbsd.org 2008/06/13 04:40:22
1416 [auth2-pubkey.c auth-rhosts.c]
1417 refuse to read ~/.shosts or ~/.ssh/authorized_keys that are not
1418 regular files; report from Solar Designer via Colin Watson in bz#1471
1419 ok dtucker@ deraadt
136d0181 1420 - (dtucker) [clientloop.c serverloop.c] channel_register_filter now
1421 takes 2 more args. with djm@
49190c3d 1422 - (dtucker) [defines.h] Bug #1112: __dead is, well dead. Based on a patch
1423 from Todd Vierling.
02e605ed 1424 - (dtucker) [auth-sia.c] Bug #1241: support password expiry on Tru64 SIA
1425 systems. Patch from R. Scott Bailey.
c694c610 1426 - (dtucker) [umac.c] STORE_UINT32_REVERSED and endian_convert are never used
1427 on big endian machines, so ifdef them for little-endian only to prevent
1428 unused function warnings on big-endians.
56f77432 1429 - (dtucker) [openbsd-compat/setenv.c] Make offsets size_t to prevent
1430 compiler warnings on some platforms. Based on a discussion with otto@
9754b94b 1431
554ebbed 143220080611
1433 - (djm) [channels.c configure.ac]
1434 Do not set SO_REUSEADDR on wildcard X11 listeners (X11UseLocalhost=no)
1435 bz#1464; ok dtucker
1436
15b5fa9b 143720080610
1438 - (dtucker) OpenBSD CVS Sync
1439 - djm@cvs.openbsd.org 2008/06/10 03:57:27
1440 [servconf.c match.h sshd_config.5]
1441 support CIDR address matching in sshd_config "Match address" blocks, with
1442 full support for negation and fall-back to classic wildcard matching.
1443 For example:
1444 Match address 192.0.2.0/24,3ffe:ffff::/32,!10.*
1445 PasswordAuthentication yes
1446 addrmatch.c code mostly lifted from flowd's addr.c
1447 feedback and ok dtucker@
8b671558 1448 - djm@cvs.openbsd.org 2008/06/10 04:17:46
1449 [sshd_config.5]
1450 better reference for pattern-list
1760c982 1451 - dtucker@cvs.openbsd.org 2008/06/10 04:50:25
1452 [sshd.c channels.h channels.c log.c servconf.c log.h servconf.h sshd.8]
1453 Add extended test mode (-T) and connection parameters for test mode (-C).
1454 -T causes sshd to write its effective configuration to stdout and exit.
1455 -C causes any relevant Match rules to be applied before output. The
1456 combination allows tesing of the parser and config files. ok deraadt djm
01e9e424 1457 - jmc@cvs.openbsd.org 2008/06/10 07:12:00
1458 [sshd_config.5]
1459 tweak previous;
3b42e3ac 1460 - jmc@cvs.openbsd.org 2008/06/10 08:17:40
1461 [sshd.8 sshd.c]
1462 - update usage()
1463 - fix SYNOPSIS, and sort options
1464 - some minor additional fixes
f0528444 1465 - dtucker@cvs.openbsd.org 2008/06/09 18:06:32
1466 [regress/test-exec.sh]
1467 Don't generate putty keys if we're not going to use them. ok djm
16d46c30 1468 - dtucker@cvs.openbsd.org 2008/06/10 05:23:32
1469 [regress/addrmatch.sh regress/Makefile]
1470 Regress test for Match CIDR rules. ok djm@
94edc013 1471 - dtucker@cvs.openbsd.org 2008/06/10 15:21:41
1472 [test-exec.sh]
1473 Use a more portable construct for checking if we're running a putty test
64c576e9 1474 - dtucker@cvs.openbsd.org 2008/06/10 15:28:49
1475 [test-exec.sh]
1476 Add quotes
f6748d7b 1477 - dtucker@cvs.openbsd.org 2008/06/10 18:21:24
1478 [ssh_config.5]
1479 clarify that Host patterns are space-separated. ok deraadt
3f0444ca 1480 - djm@cvs.openbsd.org 2008/06/10 22:15:23
1481 [PROTOCOL ssh.c serverloop.c]
1482 Add a no-more-sessions@openssh.com global request extension that the
1483 client sends when it knows that it will never request another session
1484 (i.e. when session multiplexing is disabled). This allows a server to
1485 disallow further session requests and terminate the session.
1486 Why would a non-multiplexing client ever issue additional session
1487 requests? It could have been attacked with something like SSH'jack:
1488 http://www.storm.net.nz/projects/7
1489 feedback & ok markus
b3b048d6 1490 - djm@cvs.openbsd.org 2008/06/10 23:06:19
1491 [auth-options.c match.c servconf.c addrmatch.c sshd.8]
1492 support CIDR address matching in .ssh/authorized_keys from="..." stanzas
1493 ok and extensive testing dtucker@
8fb12ef0 1494 - dtucker@cvs.openbsd.org 2008/06/10 23:21:34
1495 [bufaux.c]
1496 Use '\0' for a nul byte rather than unadorned 0. ok djm@
a6d05adf 1497 - dtucker@cvs.openbsd.org 2008/06/10 23:13:43
1498 [Makefile regress/key-options.sh]
1499 Add regress test for key options. ok djm@
edee47f5 1500 - (dtucker) [openbsd-compat/fake-rfc2553.h] Add sin6_scope_id to sockaddr_in6
1501 since the new CIDR code in addmatch.c references it.
1502 - (dtucker) [Makefile.in configure.ac regress/addrmatch.sh] Skip IPv6
1503 specific tests on platforms that don't do IPv6.
8ac1d2eb 1504 - (dtucker) [Makefile.in] Define TEST_SSH_IPV6 in make's arguments as well
1505 as environment.
0694c78f 1506 - (dtucker) [Makefile.in] Move addrmatch.o to libssh.a where it's needed now.
15b5fa9b 1507
10e804f4 150820080609
1509 - (dtucker) OpenBSD CVS Sync
1510 - dtucker@cvs.openbsd.org 2008/06/08 17:04:41
1511 [sftp-server.c]
1512 Add case for ENOSYS in errno_to_portable; ok deraadt
5a3cde15 1513 - dtucker@cvs.openbsd.org 2008/06/08 20:15:29
1514 [sftp.c sftp-client.c sftp-client.h]
1515 Have the sftp client store the statvfs replies in wire format,
1516 which prevents problems when the server's native sizes exceed the
1517 client's.
1518 Also extends the sizes of the remaining 32bit wire format to 64bit,
1519 they're specified as unsigned long in the standard.
7290afcb 1520 - dtucker@cvs.openbsd.org 2008/06/09 13:02:39
2626070f 1521 [sftp-server.c]
7290afcb 1522 Extend 32bit -> 64bit values for statvfs extension missed in previous
1523 commit.
2626070f 1524 - dtucker@cvs.openbsd.org 2008/06/09 13:38:46
1525 [PROTOCOL]
1526 Use a $OpenBSD tag so our scripts will sync changes.
10e804f4 1527
22f5e872 152820080608
1529 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c
1530 openbsd-compat/Makefile.in openbsd-compat/openbsd-compat.h
1531 openbsd-compat/bsd-statvfs.{c,h}] Add a null implementation of statvfs and
1532 fstatvfs and remove #defines around statvfs code. ok djm@
7a4f468b 1533 - (dtucker) [configure.ac defines.h sftp-client.c M sftp-server.c] Add a
1534 macro to convert fsid to unsigned long for platforms where fsid is a
1535 2-member array.
22f5e872 1536
0894bbed 153720080607
1538 - (dtucker) [mux.c] Include paths.h inside ifdef HAVE_PATHS_H.
4538e135 1539 - (dtucker) [configure.ac defines.h sftp-client.c sftp-server.c sftp.c]
1540 Do not enable statvfs extensions on platforms that do not have statvfs.
2abb1ef5 1541 - (dtucker) OpenBSD CVS Sync
1542 - djm@cvs.openbsd.org 2008/05/19 06:14:02
1543 [packet.c] unbreak protocol keepalive timeouts bz#1465; ok dtucker@
82bb6f20 1544 - djm@cvs.openbsd.org 2008/05/19 15:45:07
1545 [sshtty.c ttymodes.c sshpty.h]
1546 Fix sending tty modes when stdin is not a tty (bz#1199). Previously
1547 we would send the modes corresponding to a zeroed struct termios,
1548 whereas we should have been sending an empty list of modes.
1549 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
048acbeb 1550 - djm@cvs.openbsd.org 2008/05/19 15:46:31
1551 [ssh-keygen.c]
1552 support -l (print fingerprint) in combination with -F (find host) to
1553 search for a host in ~/.ssh/known_hosts and display its fingerprint;
1554 ok markus@
4651c790 1555 - djm@cvs.openbsd.org 2008/05/19 20:53:52
1556 [clientloop.c]
1557 unbreak tree by committing this bit that I missed from:
1558 Fix sending tty modes when stdin is not a tty (bz#1199). Previously
1559 we would send the modes corresponding to a zeroed struct termios,
1560 whereas we should have been sending an empty list of modes.
1561 Based on patch from daniel.ritz AT alcatel.ch; ok dtucker@ markus@
0894bbed 1562
07e61b8a 156320080604
1564 - (djm) [openbsd-compat/bsd-arc4random.c] Fix math bug that caused bias
1565 in arc4random_uniform with upper_bound in (2^30,2*31). Note that
1566 OpenSSH did not make requests with upper bounds in this range.
1567
b3ef88dc 156820080519
1569 - (djm) [configure.ac mux.c sftp.c openbsd-compat/Makefile.in]
1570 [openbsd-compat/fmt_scaled.c openbsd-compat/openbsd-compat.h]
1571 Fix compilation on Linux, including pulling in fmt_scaled(3)
1572 implementation from OpenBSD's libutil.
1573
9b04dbaa 157420080518
1575 - (djm) OpenBSD CVS Sync
1576 - djm@cvs.openbsd.org 2008/04/04 05:14:38
1577 [sshd_config.5]
1578 ChrootDirectory is supported in Match blocks (in fact, it is most useful
1579 there). Spotted by Minstrel AT minstrel.org.uk
5b76e3ef 1580 - djm@cvs.openbsd.org 2008/04/04 06:44:26
1581 [sshd_config.5]
1582 oops, some unrelated stuff crept into that commit - backout.
1583 spotted by jmc@
ade21243 1584 - djm@cvs.openbsd.org 2008/04/05 02:46:02
1585 [sshd_config.5]
1586 HostbasedAuthentication is supported under Match too
185adaf8 1587 - (djm) [openbsd-compat/bsd-arc4random.c openbsd-compat/openbsd-compat.c]
1588 [configure.ac] Implement arc4random_buf(), import implementation of
1589 arc4random_uniform() from OpenBSD
936e7c8c 1590 - (djm) [openbsd-compat/bsd-arc4random.c] Warning fixes
c49ce62e 1591 - (djm) [openbsd-compat/port-tun.c] needs sys/queue.h
c1d152b8 1592 - (djm) OpenBSD CVS Sync
1593 - djm@cvs.openbsd.org 2008/04/13 00:22:17
1594 [dh.c sshd.c]
1595 Use arc4random_buf() when requesting more than a single word of output
1596 Use arc4random_uniform() when the desired random number upper bound
1597 is not a power of two
1598 ok deraadt@ millert@
360b43ab 1599 - djm@cvs.openbsd.org 2008/04/18 12:32:11
1600 [sftp-client.c sftp-client.h sftp-server.c sftp.1 sftp.c sftp.h]
1601 introduce sftp extension methods statvfs@openssh.com and
1602 fstatvfs@openssh.com that implement statvfs(2)-like operations,
1603 based on a patch from miklos AT szeredi.hu (bz#1399)
1604 also add a "df" command to the sftp client that uses the
1605 statvfs@openssh.com to produce a df(1)-like display of filesystem
1606 space and inode utilisation
1607 ok markus@
ea530517 1608 - jmc@cvs.openbsd.org 2008/04/18 17:15:47
1609 [sftp.1]
1610 macro fixage;
48fbfda0 1611 - djm@cvs.openbsd.org 2008/04/18 22:01:33
1612 [session.c]
1613 remove unneccessary parentheses
0bb7755b 1614 - otto@cvs.openbsd.org 2008/04/29 11:20:31
1615 [monitor_mm.h]
1616 garbage collect two unused fields in struct mm_master; ok markus@
c47ff7a6 1617 - djm@cvs.openbsd.org 2008/04/30 10:14:03
1618 [ssh-keyscan.1 ssh-keyscan.c]
1619 default to rsa (protocol 2) keys, instead of rsa1 keys; spotted by
1620 larsnooden AT openoffice.org
43c3f85c 1621 - pyr@cvs.openbsd.org 2008/05/07 05:49:37
1622 [servconf.c servconf.h session.c sshd_config.5]
1623 Enable the AllowAgentForwarding option in sshd_config (global and match
1624 context), to specify if agents should be permitted on the server.
1625 As the man page states:
1626 ``Note that disabling Agent forwarding does not improve security
1627 unless users are also denied shell access, as they can always install
1628 their own forwarders.''
1629 ok djm@, ok and a mild frown markus@
5c7e2b47 1630 - pyr@cvs.openbsd.org 2008/05/07 06:43:35
1631 [sshd_config]
1632 push the sshd_config bits in, spotted by ajacoutot@
94569631 1633 - jmc@cvs.openbsd.org 2008/05/07 08:00:14
1634 [sshd_config.5]
1635 sort;
17f02f0a 1636 - markus@cvs.openbsd.org 2008/05/08 06:59:01
1637 [bufaux.c buffer.h channels.c packet.c packet.h]
1638 avoid extra malloc/copy/free when receiving data over the net;
1639 ~10% speedup for localhost-scp; ok djm@
3593bdc0 1640 - djm@cvs.openbsd.org 2008/05/08 12:02:23
1641 [auth-options.c auth1.c channels.c channels.h clientloop.c gss-serv.c]
1642 [monitor.c monitor_wrap.c nchan.c servconf.c serverloop.c session.c]
1643 [ssh.c sshd.c]
1644 Implement a channel success/failure status confirmation callback
1645 mechanism. Each channel maintains a queue of callbacks, which will
1646 be drained in order (RFC4253 guarantees confirm messages are not
1647 reordered within an channel).
1648 Also includes a abandonment callback to clean up if a channel is
1649 closed without sending confirmation messages. This probably
1650 shouldn't happen in compliant implementations, but it could be
1651 abused to leak memory.
1652 ok markus@ (as part of a larger diff)
c6dca55e 1653 - djm@cvs.openbsd.org 2008/05/08 12:21:16
1654 [monitor.c monitor_wrap.c session.h servconf.c servconf.h session.c]
1655 [sshd_config sshd_config.5]
1656 Make the maximum number of sessions run-time controllable via
1657 a sshd_config MaxSessions knob. This is useful for disabling
1658 login/shell/subsystem access while leaving port-forwarding working
1659 (MaxSessions 0), disabling connection multiplexing (MaxSessions 1) or
1660 simply increasing the number of allows multiplexed sessions.
1661 Because some bozos are sure to configure MaxSessions in excess of the
1662 number of available file descriptors in sshd (which, at peak, might be
1663 as many as 9*MaxSessions), audit sshd to ensure that it doesn't leak fds
1664 on error paths, and make it fail gracefully on out-of-fd conditions -
1665 sending channel errors instead of than exiting with fatal().
1666 bz#1090; MaxSessions config bits and manpage from junyer AT gmail.com
1667 ok markus@
95d3c124 1668 - djm@cvs.openbsd.org 2008/05/08 13:06:11
1669 [clientloop.c clientloop.h ssh.c]
1670 Use new channel status confirmation callback system to properly deal
1671 with "important" channel requests that fail, in particular command exec,
1672 shell and subsystem requests. Previously we would optimistically assume
1673 that the requests would always succeed, which could cause hangs if they
1674 did not (e.g. when the server runs out of fds) or were unimplemented by
1675 the server (bz #1384)
1676 Also, properly report failing multiplex channel requests via the mux
1677 client stderr (subject to LogLevel in the mux master) - better than
1678 silently failing.
1679 most bits ok markus@ (as part of a larger diff)
e07e21ad 1680 - djm@cvs.openbsd.org 2008/05/09 04:55:56
1681 [channels.c channels.h clientloop.c serverloop.c]
1682 Try additional addresses when connecting to a port forward destination
1683 whose DNS name resolves to more than one address. The previous behaviour
1684 was to try the first address and give up.
1685 Reported by stig AT venaas.com in bz#343
1686 great feedback and ok markus@
3bcced4c 1687 - djm@cvs.openbsd.org 2008/05/09 14:18:44
1688 [clientloop.c clientloop.h ssh.c mux.c]
1689 tidy up session multiplexing code, moving it into its own file and
1690 making the function names more consistent - making ssh.c and
1691 clientloop.c a fair bit more readable.
1692 ok markus@
6cd3e678 1693 - djm@cvs.openbsd.org 2008/05/09 14:26:08
1694 [ssh.c]
1695 dingo stole my diff hunk
ee7c3e92 1696 - markus@cvs.openbsd.org 2008/05/09 16:16:06
1697 [session.c]
1698 re-add the USE_PIPES code and enable it.
1699 without pipes shutdown-read from the sshd does not trigger
1700 a SIGPIPE when the forked program does a write.
1701 ok djm@
1702 (Id sync only, USE_PIPES never left portable OpenSSH)
271f4a13 1703 - markus@cvs.openbsd.org 2008/05/09 16:17:51
1704 [channels.c]
1705 error-fd race: don't enable the error fd in the select bitmask
1706 for channels with both in- and output closed, since the channel
1707 will go away before we call select();
1708 report, lots of debugging help and ok djm@
50c96367 1709 - markus@cvs.openbsd.org 2008/05/09 16:21:13
1710 [channels.h clientloop.c nchan.c serverloop.c]
1711 unbreak
1712 ssh -2 localhost od /bin/ls | true
1713 ignoring SIGPIPE by adding a new channel message (EOW) that signals
1714 the peer that we're not interested in any data it might send.
1715 fixes bz #85; discussion, debugging and ok djm@
d5820099 1716 - pvalchev@cvs.openbsd.org 2008/05/12 20:52:20
1717 [umac.c]
1718 Ensure nh_result lies on a 64-bit boundary (fixes warnings observed
1719 on Itanium on Linux); from Dale Talcott (bug #1462); ok djm@
56b12440 1720 - djm@cvs.openbsd.org 2008/05/15 23:52:24
1721 [nchan2.ms]
1722 document eow message in ssh protocol 2 channel state machine;
1723 feedback and ok markus@
f8db3345 1724 - djm@cvs.openbsd.org 2008/05/18 21:29:05
1725 [sftp-server.c]
1726 comment extension announcement
8be03682 1727 - djm@cvs.openbsd.org 2008/05/16 08:30:42
1728 [PROTOCOL]
1729 document our protocol extensions and deviations; ok markus@
1730 - djm@cvs.openbsd.org 2008/05/17 01:31:56
1731 [PROTOCOL]
1732 grammar and correctness fixes from stevesk@
9b04dbaa 1733
490c3105 173420080403
1735 - (djm) [openbsd-compat/bsd-poll.c] Include stdlib.h to avoid compile-
1736 time warnings on LynxOS. Patch from ops AT iki.fi
1ebb73e4 1737 - (djm) Force string arguments to replacement setproctitle() though
1738 strnvis first. Ok dtucker@
490c3105 1739
2b363e83 174020080403
1741 - (djm) OpenBSD CVS sync:
1742 - markus@cvs.openbsd.org 2008/04/02 15:36:51
1743 [channels.c]
1744 avoid possible hijacking of x11-forwarded connections (back out 1.183)
1745 CVE-2008-1483; ok djm@
adb7acbc 1746 - jmc@cvs.openbsd.org 2008/03/27 22:37:57
1747 [sshd.8]
1748 remove trailing whitespace;
53e0dc70 1749 - djm@cvs.openbsd.org 2008/04/03 09:50:14
1750 [version.h]
1751 openssh-5.0
31b1b2c8 1752 - (djm) [contrib/caldera/openssh.spec contrib/redhat/openssh.spec]
1753 [contrib/suse/openssh.spec] Crank version numbers in RPM spec files
dd052df9 1754 - (djm) [README] Update link to release notes
098ebea7 1755 - (djm) Release 5.0p1
This page took 0.416596 seconds and 5 git commands to generate.