]> andersk Git - openssh.git/blame - ChangeLog
- markus@cvs.openbsd.org 2003/06/24 08:23:46
[openssh.git] / ChangeLog
CommitLineData
f0677b69 120030628
2 - (dtucker) OpenBSD CVS Sync
3 - markus@cvs.openbsd.org 2003/06/23 09:02:44
4 [ssh_config.5]
5 document EnableSSHKeysign; bugzilla #599; ok deraadt@, jmc@
a27002e5 6 - markus@cvs.openbsd.org 2003/06/24 08:23:46
7 [auth2-hostbased.c auth2-pubkey.c auth2.c channels.c key.c key.h
8 monitor.c packet.c packet.h serverloop.c sshconnect2.c sshd.c]
9 int -> u_int; ok djm@, deraadt@, mouring@
f0677b69 10
e15ba28b 1120030624
12 - (dtucker) Have configure refer the user to config.log and
13 contrib/findssl.sh for OpenSSL header/library mismatches.
14
63a556df 1520030622
c1ffd4bd 16 - (dtucker) OpenBSD CVS Sync
63a556df 17 - markus@cvs.openbsd.org 2003/06/21 09:14:05
c1ffd4bd 18 [regress/reconfigure.sh]
63a556df 19 missing $SUDO; from dtucker@zip.com.au
93527718 20 - markus@cvs.openbsd.org 2003/06/18 11:28:11
c1ffd4bd 21 [ssh-rsa.c]
22 backout last change, since it violates pkcs#1
23 switch to share/misc/license.template
1891396b 24 - djm@cvs.openbsd.org 2003/06/20 05:47:58
25 [sshd_config.5]
26 sync description of protocol 2 cipher proposal; ok markus
4db4d313 27 - djm@cvs.openbsd.org 2003/06/20 05:48:21
28 [sshd_config]
29 sync some implemented options; ok markus@
63a556df 30 - (dtucker) [regress/authorized_keys_root] Remove temp data file from CVS.
39ef3618 31 - (dtucker) [openbsd-compat/setproctitle.c] Ensure SPT_TYPE is defined before
32 testing its value.
63a556df 33
b8e04133 3420030618
35 - (djm) OpenBSD CVS Sync
36 - markus@cvs.openbsd.org 2003/06/12 07:57:38
37 [monitor.c sshlogin.c sshpty.c]
38 typos; dtucker at zip.com.au
b9ad9d13 39 - djm@cvs.openbsd.org 2003/06/12 12:22:47
40 [LICENCE]
41 mention more copyright holders; ok markus@
1fb23629 42 - nino@cvs.openbsd.org 2003/06/12 15:34:09
43 [scp.c]
44 Typo. Ok markus@.
244e796f 45 - markus@cvs.openbsd.org 2003/06/12 19:12:03
46 [scard.c scard.h ssh-agent.c ssh.c]
47 add sc_get_key_label; larsch at trustcenter.de; bugzilla#591
9250058a 48 - markus@cvs.openbsd.org 2003/06/16 08:22:35
49 [ssh-rsa.c]
50 make sure the signature has at least the expected length (don't
51 insist on len == hlen + oidlen, since this breaks some smartcards)
52 bugzilla #592; ok djm@
360a4aae 53 - markus@cvs.openbsd.org 2003/06/16 10:22:45
54 [ssh-add.c]
55 print out key comment on each prompt; make ssh-askpass more useable; ok djm@
0a59bd6b 56 - markus@cvs.openbsd.org 2003/06/17 18:14:23
57 [cipher-ctr.c]
58 use license from /usr/share/misc/license.template for new code
1d6c0b69 59 - (dtucker) [reconfigure.sh rekey.sh sftp-badcmds.sh]
60 Import new regression tests from OpenBSD
d4d84f5f 61 - (dtucker) [regress/copy.1 regress/copy.2] Remove temp data files from CVS.
ed49cc81 62 - (dtucker) OpenBSD CVS Sync (regress/)
63 - markus@cvs.openbsd.org 2003/04/02 12:21:13
64 [Makefile]
65 enable rekey test
2c670155 66 - djm@cvs.openbsd.org 2003/04/04 09:34:22
67 [Makefile sftp-cmds.sh]
68 More regression tests, including recent directory rename bug; ok markus@
737447ad 69 - markus@cvs.openbsd.org 2003/05/14 22:08:27
70 [ssh-com-client.sh ssh-com-keygen.sh ssh-com-sftp.sh ssh-com.sh]
71 test against some new commerical versions
68df2aa0 72 - mouring@cvs.openbsd.org 2003/05/15 04:07:12
73 [sftp-cmds.sh]
74 Advanced put/get testing for sftp. OK @djm
eb9bf761 75 - markus@cvs.openbsd.org 2003/06/12 15:40:01
76 [try-ciphers.sh]
77 add ctr
39c0191e 78 - markus@cvs.openbsd.org 2003/06/12 15:43:32
79 [Makefile]
80 test -HUP; dtucker at zip.com.au
b8e04133 81
f5827134 8220030614
83 - (djm) Update license on fake-rfc2553.[ch]; ok itojun@
84
be193d89 8520030611
c12c6ef8 86 - (djm) Mention portable copyright holders in LICENSE
e52ca1e5 87 - (djm) Put licenses on substantial header files
8cb3fa9d 88 - (djm) Sync LICENSE against OpenBSD
be193d89 89 - (djm) OpenBSD CVS Sync
90 - jmc@cvs.openbsd.org 2003/06/10 09:12:11
91 [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5]
92 [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
93 - section reorder
94 - COMPATIBILITY merge
95 - macro cleanup
96 - kill whitespace at EOL
97 - new sentence, new line
98 ssh pages ok markus@
0daa6547 99 - deraadt@cvs.openbsd.org 2003/06/10 22:20:52
100 [packet.c progressmeter.c]
101 mostly ansi cleanup; pval ok
1432b5c4 102 - jakob@cvs.openbsd.org 2003/06/11 10:16:16
103 [sshconnect.c]
104 clean up check_host_key() and improve SSHFP feedback. ok markus@
cc263107 105 - jakob@cvs.openbsd.org 2003/06/11 10:18:47
106 [dns.c]
107 sync with check_host_key() change
ca719034 108 - djm@cvs.openbsd.org 2003/06/11 11:18:38
109 [authfd.c authfd.h ssh-add.c ssh-agent.c]
110 make agent constraints (lifetime, confirm) work with smartcard keys;
111 ok markus@
be193d89 112
113
8a547250 11420030609
115 - (djm) Sync README.smartcard with OpenBSD -current
a1864983 116 - (djm) Re-merge OpenSC info into README.smartcard
8a547250 117
f5db6a03 11820030606
119 - (dtucker) [uidswap.c] Fix setreuid and add missing args to fatal(). ok djm@
120
02e2a074 12120030605
122 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
123 canohost.c changes.
688eed4a 124 - (djm) Implement paranoid priv dropping checks, based on:
125 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
126 Proceedings of USENIX Security Symposium 2002
d6bd2b5a 127 - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
52d58495 128 - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
57c917f8 129 - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
130 Patch from larsch@trustcenter.de
7b7f164b 131 - (djm) Bug #589 - scard-opensc: load only keys with a private keys
132 Patch from larsch@trustcenter.de
4ed465ec 133 - (dtucker) Add includes.h to fake-rfc2553.c so it will build.
e932f447 134 - (dtucker) Define EAI_NONAME in fake-rfc2553.h (used by fake-rfc2553.c).
02e2a074 135
b08a39ff 13620030604
d60e487c 137 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
138 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
8acdec60 139 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
11f1e60e 140 Patch from larsch@trustcenter.de; ok markus@
141 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
142 larsch@trustcenter.de; ok markus@
d453a600 143 - (djm) OpenBSD CVS Sync
144 - djm@cvs.openbsd.org 2003/06/04 08:25:18
145 [sshconnect.c]
146 disable challenge/response and keyboard-interactive auth methods
147 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
148 bz #580; ok markus@
ee50371d 149 - djm@cvs.openbsd.org 2003/06/04 10:23:48
150 [sshd.c]
151 remove duplicated group-dropping code; ok markus@
b08a39ff 152 - djm@cvs.openbsd.org 2003/06/04 12:03:59
153 [serverloop.c]
154 remove bitrotten commet; ok markus@
cf3248b8 155 - djm@cvs.openbsd.org 2003/06/04 12:18:49
156 [scp.c]
157 ansify; ok markus@
0f764b2f 158 - djm@cvs.openbsd.org 2003/06/04 12:40:39
159 [scp.c]
160 kill ssh process upon receipt of signal, bz #241.
161 based on patch from esb AT hawaii.edu; ok markus@
1b558925 162 - djm@cvs.openbsd.org 2003/06/04 12:41:22
163 [sftp.c]
164 kill ssh process on receipt of signal; ok markus@
fba33e81 165 - (djm) Update to fix of bug #584: lock card before return.
166 From larsch@trustcenter.de
8d9bb5dd 167 - (djm) Always use mysignal() for SIGALRM
d60e487c 168
3a2b2b44 16920030603
170 - (djm) Replace setproctitle replacement with code derived from
171 UCB sendmail
c5a7d788 172 - (djm) OpenBSD CVS Sync
173 - markus@cvs.openbsd.org 2003/06/02 09:17:34
174 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
175 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
176 [sshd_config.5]
177 deprecate VerifyReverseMapping since it's dangerous if combined
178 with IP based access control as noted by Mike Harding; replace with
179 a UseDNS option, UseDNS is on by default and includes the
180 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
181 ok deraadt@, djm@
d981089c 182 - millert@cvs.openbsd.org 2003/06/03 02:56:16
183 [scp.c]
184 Remove the advertising clause in the UCB license which Berkeley
185 rescinded 22 July 1999. Proofed by myself and Theo.
c5a7d788 186 - (djm) Fix portable-specific uses of verify_reverse_mapping too
3e67f7df 187 - (djm) Sync openbsd-compat with OpenBSD CVS.
484d59c7 188 - No more 4-term BSD licenses in linked code
5d8ca8c7 189 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
3a2b2b44 190
aff561f9 19120030602
192 - (djm) Fix segv from bad reordering in auth-pam.c
416c732d 193 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
194 clobber
1b7342ab 195 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
196 CVS ID.
8862e142 197 - (djm) Remove "noip6" option from RedHat spec file. This may now be
198 set at runtime using AddressFamily option.
58ba3cb7 199 - (djm) Fix use of macro before #define in cipher-aes.c
382fe2fa 200 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
b0545fe6 201 - (djm) OpenBSD CVS Sync
202 - djm@cvs.openbsd.org 2003/05/26 12:54:40
203 [sshconnect.c]
204 fix format strings; ok markus@
fa5120a0 205 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
206 [sshd.c uidswap.c]
207 seteuid and setegid; markus ok
0f92946c 208 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
209 [ssh_config.5]
210 VerifyHostKeyDNS is v2 only. ok markus@
aff561f9 211
4f178be8 21220030530
213 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
214 roumenpetrov.info
eabb99c6 215 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
4f178be8 216
4881aebb 21720030526
218 - (djm) Avoid auth2-chall.c warning when compiling without
219 PAM, BSD_AUTH and SKEY
220
5b0fe364 22120030525
222- (djm) OpenBSD CVS Sync
223 - djm@cvs.openbsd.org 2003/05/24 09:02:22
224 [log.c]
225 pass logged data through strnvis; ok markus
b9ed513a 226 - djm@cvs.openbsd.org 2003/05/24 09:30:40
227 [authfile.c monitor.c sftp-common.c sshpty.c]
228 cast some types for printing; ok markus@
5b0fe364 229
44c78996 23020030524
231 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
232
d83ebe4a 23320030523
234 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
235 encoding (which encodes many more characters)
bd47824b 236 - OpenBSD CVS Sync
237 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
238 [sftp.1]
239 - new sentence, new line
240 - added .Xr's
241 - typos
242 ok djm@
3cbc677d 243 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
244 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
245 new sentence, new line
da54f5be 246 - djm@cvs.openbsd.org 2003/05/23 08:29:30
247 [sshconnect.c]
248 fix leak; ok markus@
d83ebe4a 249
c453493f 25020030520
251 - (djm) OpenBSD CVS Sync
252 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
253 [log.c]
254 use syslog_r() in a signal handler called place; markus ok
79d4fc55 255 - (djm) Configure logic to detect syslog_r and friends
c453493f 256
acb50584 25720030519
258 - (djm) Sync auth-pam.h with what we actually implement
259
26020030518
5ff453c0 261 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
262 recent merge
f811e52a 263 - (djm) OpenBSD CVS Sync
264 - djm@cvs.openbsd.org 2003/05/16 03:27:12
265 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
266 add AddressFamily option to ssh_config (like -4, -6 on commandline).
267 Portable bug #534; ok markus@
013b1214 268 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
269 [auth-rhosts.c]
270 just in case, put numbers to sscanf %s arg.
25b66522 271 - markus@cvs.openbsd.org 2003/05/17 04:27:52
272 [cipher.c cipher-ctr.c myproposal.h]
273 experimental support for aes-ctr modes from
274 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
275 ok djm@
25351757 276 - (djm) Remove IPv4 by default hack now that we can specify AF in config
3bf784bc 277 - (djm) Tidy and trim TODO
bffa6723 278 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
9901cb37 279 - (djm) Big KNF on openbsd-compat/
f1da2b8b 280 - (djm) KNF on md5crypt.[ch]
281 - (djm) KNF on auth-sia.[ch]
5ff453c0 282
f123055b 28320030517
284 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
285
c936c243 28620030516
287 - (djm) OpenBSD CVS Sync
288 - djm@cvs.openbsd.org 2003/05/15 13:52:10
289 [ssh.c]
290 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
291 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
a2144546 292 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
293 [readconf.c servconf.c]
294 warn for unsupported config option. ok markus@
5bdfde81 295 - markus@cvs.openbsd.org 2003/05/15 14:09:21
296 [auth2-krb5.c]
297 fix 64bit issue; report itojun@
09ab3296 298 - djm@cvs.openbsd.org 2003/05/15 14:55:25
299 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
300 add a ConnectTimeout option to ssh, based on patch from
301 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
b06b11ad 302 - (djm) Add warning for UsePAM when built without PAM support
7be625e1 303 - (djm) A few type mismatch fixes from Bug #565
0eb6370a 304 - (djm) Guard free_pam_environment against NULL argument. Works around
305 HP/UX PAM problems debugged by dtucker
c936c243 306
7efc7f57 30720030515
308 - (djm) OpenBSD CVS Sync
309 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
310 [ssh-agent.1]
311 setup -> set up;
312 from wiz@netbsd
21289cd0 313 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
314 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
315 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
316 add experimental support for verifying hos keys using DNS as described
317 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
318 ok markus@ and henning@
16a79097 319 - markus@cvs.openbsd.org 2003/05/14 22:24:42
320 [clientloop.c session.c ssh.1]
321 allow to send a BREAK to the remote system; ok various
b8c2031b 322 - markus@cvs.openbsd.org 2003/05/15 00:28:28
323 [sshconnect2.c]
324 cleanup unregister of per-method packet handlers; ok djm@
d0ec7f42 325 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
326 [readconf.c readconf.h servconf.c servconf.h]
327 always parse kerberos options. ok djm@ markus@
b414a17b 328 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
329 [dns.c]
330 add missing freerrset
3b6e3da9 331 - markus@cvs.openbsd.org 2003/05/15 03:08:29
332 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
333 split out custom EVP ciphers
02159d9b 334 - djm@cvs.openbsd.org 2003/05/15 03:10:52
335 [ssh-keygen.c]
336 avoid warning; ok jakob@
4a26f5c5 337 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
338 [sftp-int.c]
339 Make put/get (globed and nonglobed) code more consistant. OK djm@
c44f10c6 340 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
dc69f53c 341 [sftp-int.c sftp.c]
c44f10c6 342 Teach ls how to display multiple column display and allow users
343 to return to single column format via 'ls -1'. OK @djm
1457e7ff 344 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
345 [readconf.c servconf.c]
346 disable kerberos when not supported. ok markus@
861f0365 347 - markus@cvs.openbsd.org 2003/05/15 04:08:41
348 [ssh.1]
349 ~B is ssh2 only
d0ec7f42 350 - (djm) Always parse UsePAM
3e05e934 351 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
4460d509 352 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
86ee6794 353 - (djm) Tidy Makefile clean targets
2636769c 354 - (djm) Adapt README.dns for portable
2d2e4a34 355 - (djm) Avoid uuencode.c warnings
1457e7ff 356 - (djm) Enable UsePAM when built --with-pam
67467c30 357 - (djm) Only build getrrsetbyname replacement when using --with-dns
f420d2ba 358 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
359 correctly)
3c49ef10 360 - (djm) Bug #444: Wrong paths after reconfigure
321735c7 361 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
f420d2ba 362
dd3ebb5a 36320030514
364 - (djm) Bug #117: Don't lie to PAM about username
0608f8a7 365 - (djm) RCSID sync w/ OpenBSD
204fde99 366 - (djm) OpenBSD CVS Sync
367 - djm@cvs.openbsd.org 2003/04/09 12:00:37
368 [readconf.c]
369 strip trailing whitespace from config lines before parsing.
370 Fixes bz 528; ok markus@
18ae3c67 371 - markus@cvs.openbsd.org 2003/04/12 10:13:57
372 [cipher.c]
373 hide cipher details; ok djm@
45c42d58 374 - markus@cvs.openbsd.org 2003/04/12 10:15:36
375 [misc.c]
376 debug->debug2
c825cd79 377 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
378 [ssh.1]
379 document -V switch, fix wording; ok markus@
3e131a6d 380 - markus@cvs.openbsd.org 2003/04/14 14:17:50
381 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
382 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
927e9f8b 383 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
384 [sftp-int.c]
385 Missing globfree(&g) in process_put() spotted by Vince Brimhall
386 <VBrimhall@novell.com>. ok@ Theo
387 - markus@cvs.openbsd.org 2003/04/16 14:35:27
388 [auth.h]
389 document struct Authctxt; with solar
b9e5aff6 390 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
391 [ssh-keyscan.c]
392 -t in usage(); rogier@quaak.org
9a26a6e2 393 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
394 [sshd.8 sshd_config.5]
395 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
396 Bug #550 and * escaping suggested by jmc@.
09dc8896 397 - david@cvs.openbsd.org 2003/04/30 20:41:07
398 [sshd.8]
399 fix invalid .Pf macro usage introduced in previous commit
400 ok jmc@ mouring@
3566c73c 401 - markus@cvs.openbsd.org 2003/05/11 16:56:48
402 [authfile.c ssh-keygen.c]
403 change key_load_public to try to read a public from:
404 rsa1 private or rsa1 public and ssh2 keys.
405 this makes ssh-keygen -e fail for ssh1 keys more gracefully
406 for example; report from itojun (netbsd pr 20550).
0d942eff 407 - markus@cvs.openbsd.org 2003/05/11 20:30:25
408 [channels.c clientloop.c serverloop.c session.c ssh.c]
409 make channel_new() strdup the 'remote_name' (not the caller); ok theo
43348518 410 - markus@cvs.openbsd.org 2003/05/12 16:55:37
411 [sshconnect2.c]
412 for pubkey authentication try the user keys in the following order:
413 1. agent keys that are found in the config file
414 2. other agent keys
415 3. keys that are only listed in the config file
416 this helps when an agent has many keys, where the server might
417 close the connection before the correct key is used. report & ok pb@
dc109cfe 418 - markus@cvs.openbsd.org 2003/05/12 18:35:18
419 [ssh-keyscan.1]
420 typo: DSA keys are of type ssh-dss; Brian Poole
81466908 421 - markus@cvs.openbsd.org 2003/05/14 00:52:59
422 [ssh2.h]
423 ranges for per auth method messages
424 - djm@cvs.openbsd.org 2003/05/14 01:00:44
425 [sftp.1]
426 emphasise the batchmode functionality and make reference to pubkey auth,
427 both of which are FAQs; ok markus@
802e01b8 428 - markus@cvs.openbsd.org 2003/05/14 02:15:47
429 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
430 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
431 server interops with commercial client; ok jakob@ djm@
72c5fe79 432 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
433 [sftp.1]
434 - better formatting in SYNOPSIS
435 - whitespace at EOL
436 ok djm@
3a39206f 437 - markus@cvs.openbsd.org 2003/05/14 08:57:49
438 [monitor.c]
439 http://bugzilla.mindrot.org/show_bug.cgi?id=560
440 Privsep child continues to run after monitor killed.
441 Pass monitor signals through to child; Darren Tucker
751092f9 442 - (djm) Make portable build with MIT krb5 (some issues remain)
7fceb20d 443 - (djm) Add new UsePAM configuration directive to allow runtime control
444 over usage of PAM. This allows non-root use of sshd when built with
445 --with-pam
817e6d38 446 - (djm) Die screaming if start_pam() is called when UsePAM=no
83ccf11a 447 - (djm) Avoid KrbV leak for MIT Kerberos
b1848832 448 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
fa065de2 449 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
dd3ebb5a 450
91f3aa9b 45120030512
452 - (djm) Redhat spec: Don't install profile.d scripts when not
453 building with GNOME/GTK askpass (patch from bet@rahul.net)
454
5def520a 45520030510
456 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
457 "make install". Patch by roth@feep.net.
ad84c479 458 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
459 problem on Linux (fixes "could not set controlling tty" errors).
05114c74 460 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
461 proper challenge-response module
23ab1f36 462 - (djm) 2-clause license on loginrec.c, with permission from
463 andre@ae-35.com
5def520a 464
43ce025d 46520030504
dd594f99 466 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
467 Patch from vinschen@redhat.com.
43ce025d 468
2cd5dbba 46920030503
470 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
471 by wendyp@cray.com.
472
bf7c1e6c 47320030502
474 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
475 privsep should now work.
73d9dad3 476 - (dtucker) Move handling of bad password authentications into a platform
990278ef 477 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
bf7c1e6c 478
68ece370 47920030429
480 - (djm) Add back radix.o (used by AFS support), after it went missing from
481 Makefile many moons ago
482 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
483 - (djm) Fix blibpath specification for AIX/gcc
484 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
485
ded9dd18 48620030428
487 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
488 hacked code.
489
aceb0423 49020030427
491 - (bal) Bug #541: return; was dropped by mistake. Reported by
492 furrier@iglou.com
c8a50a34 493 - (bal) Since we don't support platforms lacking u_int_64. We may
494 as well clean out some of those evil #ifdefs
9a6fee8b 495 - (bal) auth1.c minor resync while looking at the code.
d7cf277b 496 - (bal) auth2.c same changed as above.
aceb0423 497
0a626302 49820030409
499 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
500 from matth@eecs.berkeley.edu
d35929b5 501 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
ffd7b36b 502 - (djm) OpenBSD CVS Sync
503 - markus@cvs.openbsd.org 2003/04/02 09:48:07
504 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
505 [readconf.h serverloop.c sshconnect2.c]
506 reapply rekeying chage, tested by henning@, ok djm@
16f1b5ca 507 - markus@cvs.openbsd.org 2003/04/02 14:36:26
508 [ssh-keysign.c]
509 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
6c1bc5c5 510 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
511 [progressmeter.c]
512 $OpenBSD$
513 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
514 [progressmeter.c]
515 remove $OpenBSD$, as other *.c does not have it.
806e4c11 516 - markus@cvs.openbsd.org 2003/04/07 08:29:57
517 [monitor_wrap.c]
518 typo: get correct counters; introduced during rekeying change.
2f5b2528 519 - millert@cvs.openbsd.org 2003/04/07 21:58:05
520 [progressmeter.c]
521 The UCB copyright here is incorrect. This code did not originate
522 at UCB, it was written by Luke Mewburn. Updated the copyright at
523 the author's request. markus@ OK
524 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
525 [*.c *.h]
526 rename log() into logit() to avoid name conflict. markus ok, from
527 netbsd
528 - (djm) XXX - Performed locally using:
529 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
70e1f62f 530 - hin@cvs.openbsd.org 2003/04/09 08:23:52
531 [servconf.c]
532 Don't include <krb.h> when compiling with Kerberos 5 support
2f5b2528 533 - (djm) Fix up missing include for packet.c
a3568201 534 - (djm) Fix missed log => logit occurance (reference by function pointer)
0a626302 535
4d0cb2e5 53620030402
537 - (bal) if IP_TOS is not found or broken don't try to compile in
538 packet_set_tos() function call. bug #527
539
a4e5acef 54020030401
541 - (djm) OpenBSD CVS Sync
542 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
543 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
544 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
545 - killed whitespace
546 - new sentence new line
547 - .Bk for arguments
548 ok markus@
177f584b 549 - markus@cvs.openbsd.org 2003/04/01 10:10:23
550 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
551 [readconf.h serverloop.c sshconnect2.c]
552 rekeying bugfixes and automatic rekeying:
553 * both client and server rekey _automatically_
554 (a) after 2^31 packets, because after 2^32 packets
555 the sequence number for packets wraps
556 (b) after 2^(blocksize_in_bits/4) blocks
557 (see: draft-ietf-secsh-newmodes-00.txt)
558 (a) and (b) are _enabled_ by default, and only disabled for known
559 openssh versions, that don't support rekeying properly.
560 * client option 'RekeyLimit'
561 * do not reply to requests during rekeying
562 - markus@cvs.openbsd.org 2003/04/01 10:22:21
563 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
564 [readconf.h serverloop.c sshconnect2.c]
565 backout rekeying changes (for 3.6.1)
519bdfe8 566 - markus@cvs.openbsd.org 2003/04/01 10:31:26
567 [compat.c compat.h kex.c]
568 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
569 tested by ho@ and myself
9dd240a3 570 - markus@cvs.openbsd.org 2003/04/01 10:56:46
571 [version.h]
572 3.6.1
ac01b518 573 - (djm) Crank spec file versions
b32453fe 574 - (djm) Release 3.6.1p1
a4e5acef 575
fd77a40f 57620030326
577 - (djm) OpenBSD CVS Sync
578 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
579 [sftp-server.c]
580 one last fix to the tree: race fix broke stuff; pr 3169;
581 srp@srparish.net, help from djm
582
8021857c 58320030325
584 - (djm) Fix getpeerid support for 64 bit BE systems. From
585 Arnd Bergmann <arndb@de.ibm.com>
586
cdb64c4d 58720030324
588 - (djm) OpenBSD CVS Sync
589 - markus@cvs.openbsd.org 2003/03/23 19:02:00
590 [monitor.c]
591 unbreak rekeying for privsep; ok millert@
592 - Release 3.6p1
62086365 593 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
594 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
cdb64c4d 595
0b202697 596$Id$
This page took 0.420131 seconds and 5 git commands to generate.