]> andersk Git - openssh.git/blame - ChangeLog
- OpenBSD CVS Sync
[openssh.git] / ChangeLog
CommitLineData
58177c0a 120020623
2 - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX.
dc43acd2 3 - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset.
ef3912be 4 - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au
a8bbdc75 5 - OpenBSD CVS Sync
6 - stevesk@cvs.openbsd.org 2002/06/22 02:00:29
7 [ssh.h]
8 correct comment
58177c0a 9
ca449fd9 1020020622
11 - (djm) Update README.privsep; spotted by fries@
d5041f45 12 - (djm) Release 3.3p1
d76aa6fb 13 - (bal) getopt now can be staticly compiled on those platforms missing
14 optreset. Patch by binder@arago.de
ca449fd9 15
0496cf34 1620020621
17 - (djm) Sync:
18 - djm@cvs.openbsd.org 2002/06/21 05:50:51
19 [monitor.c]
20 Don't initialise compression buffers when compression=no in sshd_config;
21 ok Niels@
897ef106 22 - ID sync for auth-passwd.c
e299a298 23 - (djm) Warn and disable compression on platforms which can't handle both
24 useprivilegeseparation=yes and compression=yes
9f182968 25 - (djm) contrib/redhat/openssh.spec hacking:
26 - Merge in spec changes from seba@iq.pl (Sebastian Pachuta)
27 - Add new {ssh,sshd}_config.5 manpages
28 - Add new ssh-keysign program and remove setuid from ssh client
0496cf34 29
b264bd39 3020020620
8bbfc882 31 - (bal) Fixed AIX environment handling, use setpcred() instead of existing
32 code. (Bugzilla Bug 261)
b264bd39 33 - (bal) OpenBSD CVS Sync
34 - todd@cvs.openbsd.org 2002/06/14 21:35:00
35 [monitor_wrap.c]
36 spelling; from Brian Poole <raj@cerias.purdue.edu>
37500e74 37 - markus@cvs.openbsd.org 2002/06/15 00:01:36
38 [authfd.c authfd.h ssh-add.c ssh-agent.c]
39 break agent key lifetime protocol and allow other contraints for key
40 usage.
405e0c5e 41 - markus@cvs.openbsd.org 2002/06/15 00:07:38
42 [authfd.c authfd.h ssh-add.c ssh-agent.c]
43 fix stupid typo
3015d321 44 - markus@cvs.openbsd.org 2002/06/15 01:27:48
ee900f87 45 [authfd.c authfd.h ssh-add.c ssh-agent.c]
46 remove the CONSTRAIN_IDENTITY messages and introduce a new
47 ADD_ID message with contraints instead. contraints can be
48 only added together with the private key.
48ba8dc8 49 - itojun@cvs.openbsd.org 2002/06/16 21:30:58
50 [ssh-keyscan.c]
51 use TAILQ_xx macro. from lukem@netbsd. markus ok
3015d321 52 - deraadt@cvs.openbsd.org 2002/06/17 06:05:56
53 [scp.c]
54 make usage like man page
7203d6bb 55 - deraadt@cvs.openbsd.org 2002/06/19 00:27:55
56 [auth-bsdauth.c auth-skey.c auth1.c auth2-chall.c auth2-none.c authfd.c
57 authfd.h monitor_wrap.c msg.c nchan.c radix.c readconf.c scp.c sftp.1
58 ssh-add.1 ssh-add.c ssh-agent.1 ssh-agent.c ssh-keygen.1 ssh-keygen.c
59 ssh-keysign.c ssh.1 sshconnect.c sshconnect.h sshconnect2.c ttymodes.c
60 xmalloc.h]
61 KNF done automatically while reading....
9459414c 62 - markus@cvs.openbsd.org 2002/06/19 18:01:00
63 [cipher.c monitor.c monitor_wrap.c packet.c packet.h]
64 make the monitor sync the transfer ssh1 session key;
65 transfer keycontext only for RC4 (this is still depends on EVP
66 implementation details and is broken).
588df31a 67 - stevesk@cvs.openbsd.org 2002/06/20 19:56:07
68 [ssh.1 sshd.8]
69 move configuration file options from ssh.1/sshd.8 to
70 ssh_config.5/sshd_config.5; ok deraadt@ millert@
add52dd0 71 - stevesk@cvs.openbsd.org 2002/06/20 20:00:05
72 [scp.1 sftp.1]
73 ssh_config(5)
54e5539d 74 - stevesk@cvs.openbsd.org 2002/06/20 20:03:34
75 [ssh_config sshd_config]
76 refer to config file man page
636f76ca 77 - markus@cvs.openbsd.org 2002/06/20 23:05:56
78 [servconf.c servconf.h session.c sshd.c]
79 allow Compression=yes/no in sshd_config
6f26d43d 80 - markus@cvs.openbsd.org 2002/06/20 23:37:12
81 [sshd_config]
82 add Compression
2fee5e28 83 - stevesk@cvs.openbsd.org 2002/05/25 20:40:08
84 [LICENCE]
85 missed Per Allansson (auth2-chall.c)
fa7a0d52 86 - (bal) Cygwin special handling of empty passwords wrong. Patch by
87 vinschen@redhat.com
668e6050 88 - (bal) Missed integrating ssh_config.5 and sshd_config.5
73bc9b18 89 - (bal) Still more Makefile.in updates for ssh{d}_config.5
b264bd39 90
f2d02e44 9120020613
92 - (bal) typo of setgroup for cygwin. Patch by vinschen@redhat.com
93
b34bec32 9420020612
95 - (bal) OpenBSD CVS Sync
96 - markus@cvs.openbsd.org 2002/06/11 23:03:54
97 [ssh.c]
98 remove unused cruft.
de60473e 99 - markus@cvs.openbsd.org 2002/06/12 01:09:52
100 [ssh.c]
101 ssh_connect returns 0 on success
246446cd 102 - (bal) Build noop setgroups() for cygwin to clean up code (For other
103 platforms without the setgroups() requirement, you MUST define
104 SETGROUPS_NOOP in the configure.ac) Based on patch by vinschen@redhat.com
75136d8b 105 - (bal) Some platforms don't have ONLCR (Notable Mint)
b34bec32 106
74a6c7bd 10720020611
108 - (bal) ssh-agent.c RCSD fix (|unexpand already done)
d83cbdc3 109 - (bal) OpenBSD CVS Sync
110 - stevesk@cvs.openbsd.org 2002/06/09 22:15:15
111 [ssh.1]
112 update for no setuid root and ssh-keysign; ok deraadt@
01ca0dfe 113 - itojun@cvs.openbsd.org 2002/06/09 22:17:21
114 [sshconnect.c]
115 pass salen to sockaddr_ntop so that we are happy on linux/solaris
b7ced7d1 116 - stevesk@cvs.openbsd.org 2002/06/10 16:53:06
117 [auth-rsa.c ssh-rsa.c]
118 display minimum RSA modulus in error(); ok markus@
9cf07a6e 119 - stevesk@cvs.openbsd.org 2002/06/10 16:56:30
120 [ssh-keysign.8]
121 merge in stuff from my man page; ok markus@
c3baacd1 122 - stevesk@cvs.openbsd.org 2002/06/10 17:36:23
123 [ssh-add.1 ssh-add.c]
124 use convtime() to parse and validate key lifetime. can now
125 use '-t 2h' etc. ok markus@ provos@
4b3d23b4 126 - stevesk@cvs.openbsd.org 2002/06/10 17:45:20
127 [readconf.c ssh.1]
128 change RhostsRSAAuthentication and RhostsAuthentication default to no
129 since ssh is no longer setuid root by default; ok markus@
ad2e1857 130 - stevesk@cvs.openbsd.org 2002/06/10 21:21:10
131 [ssh_config]
132 update defaults for RhostsRSAAuthentication and RhostsAuthentication
133 here too (all options commented out with default value).
149cdb60 134 - markus@cvs.openbsd.org 2002/06/10 22:28:41
135 [channels.c channels.h session.c]
136 move creation of agent socket to session.c; no need for uidswapping
137 in channel.c.
3fb156df 138 - markus@cvs.openbsd.org 2002/06/11 04:14:26
139 [ssh.c sshconnect.c sshconnect.h]
140 no longer use uidswap.[ch] from the ssh client
141 run less code with euid==0 if ssh is installed setuid root
142 just switch the euid, don't switch the complete set of groups
143 (this is only needed by sshd). ok provos@
c457707e 144 - mpech@cvs.openbsd.org 2002/06/11 05:46:20
145 [auth-krb4.c monitor.h serverloop.c session.c ssh-agent.c sshd.c]
146 pid_t cleanup. Markus need this now to keep hacking.
147 markus@, millert@ ok
aa686c54 148 - itojun@cvs.openbsd.org 2002/06/11 08:11:45
149 [canohost.c]
150 use "ntop" only after initialized
d514c907 151 - (bal) Cygwin fix up from swap uid clean up in ssh.c patch by
152 vinschen@redhat.com
74a6c7bd 153
0073b70f 15420020609
155 - (bal) OpenBSD CVS Sync
156 - markus@cvs.openbsd.org 2002/06/08 05:07:56
157 [ssh.c]
158 nuke ptrace comment
1f143cf2 159 - markus@cvs.openbsd.org 2002/06/08 05:07:09
160 [ssh-keysign.c]
161 only accept 20 byte session ids
80fcb74e 162 - markus@cvs.openbsd.org 2002/06/08 05:17:01
163 [readconf.c readconf.h ssh.1 ssh.c]
164 deprecate FallBackToRsh and UseRsh; patch from djm@
6c792785 165 - markus@cvs.openbsd.org 2002/06/08 05:40:01
166 [readconf.c]
167 just warn about Deprecated options for now
c8e0103c 168 - markus@cvs.openbsd.org 2002/06/08 05:41:18
169 [ssh_config]
170 remove FallBackToRsh/UseRsh
61eb812e 171 - markus@cvs.openbsd.org 2002/06/08 12:36:53
172 [scp.c]
173 remove FallBackToRsh
4feae93d 174 - markus@cvs.openbsd.org 2002/06/08 12:46:14
175 [readconf.c]
176 silently ignore deprecated options, since FallBackToRsh might be passed
177 by remote scp commands.
35ad6a0a 178 - itojun@cvs.openbsd.org 2002/06/08 21:15:27
179 [sshconnect.c]
180 always use getnameinfo. (diag message only)
b0ff7493 181 - markus@cvs.openbsd.org 2002/06/09 04:33:27
182 [sshconnect.c]
183 abort() - > fatal()
e434ac29 184 - (bal) RCSID tag updates on channels.c, clientloop.c, nchan.c,
185 sftp-client.c, ssh-agenet.c, ssh-keygen.c and connect.h (we did unexpand
186 independant of them)
0073b70f 187
95d5ebf7 18820020607
11a3dcde 189 - (bal) Removed --{enable/disable}-suid-ssh
95d5ebf7 190 - (bal) Missed __progname in ssh-keysign.c patch by dtucker@zip.com.au
85cc9118 191 - (bal) use 'LOGIN_PROGRAM' not '/usr/bin/login' in session.c patch by
192 Bertrand.Velle@apogee-com.fr
95d5ebf7 193
2ee1b704 19420020606
195 - (bal) OpenBSD CVS Sync
196 - markus@cvs.openbsd.org 2002/05/15 21:56:38
197 [servconf.c sshd.8 sshd_config]
198 re-enable privsep and disable setuid for post-3.2.2
7b5edc2b 199 - markus@cvs.openbsd.org 2002/05/16 22:02:50
200 [cipher.c kex.h mac.c]
201 fix warnings (openssl 0.9.7 requires const)
375e20e7 202 - stevesk@cvs.openbsd.org 2002/05/16 22:09:59
203 [session.c ssh.c]
204 don't limit xauth pathlen on client side and longer print length on
205 server when debug; ok markus@
a4ae736b 206 - deraadt@cvs.openbsd.org 2002/05/19 20:54:52
207 [log.h]
208 extra commas in enum not 100% portable
c242fc96 209 - deraadt@cvs.openbsd.org 2002/05/22 23:18:25
210 [ssh.c sshd.c]
211 spelling; abishoff@arc.nasa.gov
39c00dc2 212 - markus@cvs.openbsd.org 2002/05/23 19:24:30
213 [authfile.c authfile.h pathnames.h ssh.c sshconnect.c sshconnect.h
214 sshconnect1.c sshconnect2.c ssh-keysign.8 ssh-keysign.c Makefile.in]
215 add /usr/libexec/ssh-keysign: a setuid helper program for hostbased
216 authentication in protocol v2 (needs to access the hostkeys).
78660ed4 217 - markus@cvs.openbsd.org 2002/05/23 19:39:34
218 [ssh.c]
219 add comment about ssh-keysign
7091a26b 220 - markus@cvs.openbsd.org 2002/05/24 08:45:14
221 [sshconnect2.c]
222 stat ssh-keysign first, print error if stat fails;
223 some debug->error; fix comment
a3f69458 224 - markus@cvs.openbsd.org 2002/05/25 08:50:39
225 [sshconnect2.c]
226 execlp->execl; from stevesk
013eab17 227 - markus@cvs.openbsd.org 2002/05/25 18:51:07
228 [auth.h auth2.c auth2-hostbased.c auth2-kbdint.c auth2-none.c
229 auth2-passwd.c auth2-pubkey.c Makefile.in]
230 split auth2.c into one file per method; ok provos@/deraadt@
bd4d0f49 231 - stevesk@cvs.openbsd.org 2002/05/26 20:35:10
232 [ssh.1]
233 sort ChallengeResponseAuthentication; ok markus@
c22d8cc0 234 - stevesk@cvs.openbsd.org 2002/05/28 16:45:27
235 [monitor_mm.c]
236 print strerror(errno) on mmap/munmap error; ok markus@
caa49784 237 - stevesk@cvs.openbsd.org 2002/05/28 17:28:02
238 [uidswap.c]
239 format spec change/casts and some KNF; ok markus@
fd7bc9fc 240 - stevesk@cvs.openbsd.org 2002/05/28 21:24:00
241 [uidswap.c]
242 use correct function name in fatal()
cb19b38a 243 - stevesk@cvs.openbsd.org 2002/05/29 03:06:30
244 [ssh.1 sshd.8]
245 spelling
3cc54fbb 246 - markus@cvs.openbsd.org 2002/05/29 11:21:57
247 [sshd.c]
248 don't start if privsep is enabled and SSH_PRIVSEP_USER or
249 _PATH_PRIVSEP_CHROOT_DIR are missing; ok deraadt@
135247df 250 - markus@cvs.openbsd.org 2002/05/30 08:07:31
251 [cipher.c]
252 use rijndael/aes from libcrypto (openssl >= 0.9.7) instead of
253 our own implementation. allow use of AES hardware via libcrypto,
254 ok deraadt@
d4826734 255 - markus@cvs.openbsd.org 2002/05/31 10:30:33
256 [sshconnect2.c]
257 extent ssh-keysign protocol:
258 pass # of socket-fd to ssh-keysign, keysign verfies locally used
259 ip-address using this socket-fd, restricts fake local hostnames
260 to actual local hostnames; ok stevesk@
01c24737 261 - markus@cvs.openbsd.org 2002/05/31 11:35:15
262 [auth.h auth2.c]
263 move Authmethod definitons to per-method file.
3ed81c99 264 - markus@cvs.openbsd.org 2002/05/31 13:16:48
265 [key.c]
266 add comment:
267 key_verify returns 1 for a correct signature, 0 for an incorrect signature
268 and -1 on error.
88f24e9d 269 - markus@cvs.openbsd.org 2002/05/31 13:20:50
270 [ssh-rsa.c]
271 pad received signature with leading zeros, because RSA_verify expects
272 a signature of RSA_size. the drafts says the signature is transmitted
273 unpadded (e.g. putty does not pad), reported by anakin@pobox.com
7f056bc5 274 - deraadt@cvs.openbsd.org 2002/06/03 12:04:07
275 [ssh.h]
276 compatiblity -> compatibility
277 decriptor -> descriptor
278 authentciated -> authenticated
279 transmition -> transmission
aa586f8e 280 - markus@cvs.openbsd.org 2002/06/04 19:42:35
281 [monitor.c]
282 only allow enabled authentication methods; ok provos@
521d606b 283 - markus@cvs.openbsd.org 2002/06/04 19:53:40
284 [monitor.c]
285 save the session id (hash) for ssh2 (it will be passed with the
286 initial sign request) and verify that this value is used during
287 authentication; ok provos@
91647fe6 288 - markus@cvs.openbsd.org 2002/06/04 23:02:06
289 [packet.c]
290 remove __FUNCTION__
1588c277 291 - markus@cvs.openbsd.org 2002/06/04 23:05:49
292 [cipher.c monitor.c monitor_fdpass.c monitor_mm.c monitor_wrap.c]
293 __FUNCTION__ -> __func__
3e7efb37 294 - markus@cvs.openbsd.org 2002/06/05 16:08:07
295 [ssh-agent.1 ssh-agent.c]
296 '-a bind_address' binds the agent to user-specified unix-domain
297 socket instead of /tmp/ssh-XXXXXXXX/agent.<pid>; ok djm@ (some time ago).
9aa28a7f 298 - markus@cvs.openbsd.org 2002/06/05 16:08:07
299 [ssh-agent.1 ssh-agent.c]
300 '-a bind_address' binds the agent to user-specified unix-domain
301 socket instead of /tmp/ssh-XXXXXXXX/agent.<pid>; ok djm@ (some time ago).
b9dd5ca1 302 - markus@cvs.openbsd.org 2002/06/05 16:48:54
303 [ssh-agent.c]
304 copy current request into an extra buffer and just flush this
305 request on errors, ok provos@
3db7f994 306 - markus@cvs.openbsd.org 2002/06/05 19:57:12
307 [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c]
308 ssh-add -x for lock and -X for unlocking the agent.
309 todo: encrypt private keys with locked...
73861c4e 310 - markus@cvs.openbsd.org 2002/06/05 20:56:39
311 [ssh-add.c]
312 add -x/-X to usage
264572cc 313 - markus@cvs.openbsd.org 2002/06/05 21:55:44
314 [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c]
315 ssh-add -t life, Set lifetime (in seconds) when adding identities;
316 ok provos@
c6f1f67c 317 - stevesk@cvs.openbsd.org 2002/06/06 01:09:41
318 [monitor.h]
319 no trailing comma in enum; china@thewrittenword.com
9b4ac641 320 - markus@cvs.openbsd.org 2002/06/06 17:12:44
321 [sftp-server.c]
322 discard remaining bytes of current request; ok provos@
802d93bb 323 - markus@cvs.openbsd.org 2002/06/06 17:30:11
324 [sftp-server.c]
325 use get_int() macro (hide iqueue)
8afe456d 326 - (bal) Missed msg.[ch] in merge. Required for ssh-keysign.
5a30b173 327 - (bal) Forgot to add msg.c Makefile.in.
441b3f63 328 - (bal) monitor_mm.c typos.
e5c59e31 329 - (bal) Refixed auth2.c. It was never fully commited while spliting out
d4d77d64 330 authentication to different files.
04eb391d 331 - (bal) ssh-keysign should build and install correctly now. Phase two
332 would be to clean out any dead wood and disable ssh setuid on install.
d4d77d64 333 - (bal) Reverse logic, use __func__ first since it's C99
95f20fe8 334
688aaeda 33520020604
336 - (stevesk) [channels.c] bug #164 patch from YOSHIFUJI Hideaki (changed
337 setsockopt from debug to error for now).
338
637f9177 33920020527
340 - (tim) [configure.ac.orig monitor_fdpass.c] Enahnce msghdr tests to address
341 build problem on Irix reported by Dave Love <d.love@dl.ac.uk>. Back out
342 last monitor_fdpass.c changes that are no longer needed with new tests.
343 Patch tested on Irix by Jan-Frode Myklebust <janfrode@parallab.uib.no>
344
a23a769d 34520020522
346 - (djm) Fix spelling mistakes, spotted by Solar Designer i
347 <solar@openwall.com>
2880ad5e 348 - Sync scard/ (not sure when it drifted)
68604c75 349 - (djm) OpenBSD CVS Sync:
350 [auth.c]
351 Fix typo/thinko. Pass in as to auth_approval(), not NULL.
352 Closes PR 2659.
353 - Crank version
3ed9ebdb 354 - Crank RPM spec versions
a23a769d 355
30321a9b 35620020521
357 - (stevesk) [sshd.c] bug 245; disable setsid() for now
20ded834 358 - (stevesk) [sshd.c] #ifndef HAVE_CYGWIN for setgroups()
30321a9b 359
9a499a03 36020020517
361 - (tim) [configure.ac] remove extra MD5_MSG="no" line.
362
68a9cd3e 36320020515
364 - (bal) CVS ID fix up on auth-passwd.c
e0740430 365 - (bal) OpenBSD CVS Sync
366 - deraadt@cvs.openbsd.org 2002/05/07 19:54:36
367 [ssh.h]
368 use ssh uid
897fecd3 369 - deraadt@cvs.openbsd.org 2002/05/08 21:06:34
370 [ssh.h]
371 move to sshd.sshd instead
5de727d6 372 - stevesk@cvs.openbsd.org 2002/05/11 20:24:48
373 [ssh.h]
374 typo in comment
69538b0c 375 - itojun@cvs.openbsd.org 2002/05/13 02:37:39
376 [auth-skey.c auth2.c]
377 less warnings. skey_{respond,query} are public (in auth.h)
01dafcb5 378 - markus@cvs.openbsd.org 2002/05/13 20:44:58
379 [auth-options.c auth.c auth.h]
380 move the packet_send_debug handling from auth-options.c to auth.c;
381 ok provos@
4ac8556b 382 - millert@cvs.openbsd.org 2002/05/13 15:53:19
383 [sshd.c]
384 Call setsid() in the child after sshd accepts the connection and forks.
385 This is needed for privsep which calls setlogin() when it changes uids.
386 Without this, there is a race where the login name of an existing
387 connection, as returned by getlogin(), may be changed to the privsep
388 user (sshd). markus@ OK
b3ad3d88 389 - markus@cvs.openbsd.org 2002/05/13 21:26:49
390 [auth-rhosts.c]
391 handle debug messages during rhosts-rsa and hostbased authentication;
392 ok provos@
b5a28cbc 393 - mouring@cvs.openbsd.org 2002/05/15 15:47:49
394 [kex.c monitor.c monitor_wrap.c sshd.c]
395 'monitor' variable clashes with at least one lame platform (NeXT). i
396 Renamed to 'pmonitor'. provos@
1642b888 397 - deraadt@cvs.openbsd.org 2002/05/04 02:39:35
398 [servconf.c sshd.8 sshd_config]
399 enable privsep by default; provos ok
7e276482 400 - millert@cvs.openbsd.org 2002/05/06 23:34:33
401 [ssh.1 sshd.8]
402 Kill/adjust r(login|exec)d? references now that those are no longer in
403 the tree.
6c172f95 404 - markus@cvs.openbsd.org 2002/05/15 21:02:53
405 [servconf.c sshd.8 sshd_config]
406 disable privsep and enable setuid for the 3.2.2 release
b5a28cbc 407 - (bal) Fixed up PAM case. I think.
0c83d9ea 408 - (bal) Clarified openbsd-compat/*-cray.* Licence provided by Wendy
3a034dc5 409 - (bal) OpenBSD CVS Sync
410 - markus@cvs.openbsd.org 2002/05/15 21:05:29
411 [version.h]
412 enter OpenSSH_3.2.2
413 - (bal) Caldara, Suse, and Redhat openssh.specs updated.
68a9cd3e 414
545ba36e 41520020514
416 - (stevesk) [README.privsep] PAM+privsep works with Solaris 8.
f65fbec1 417 - (tim) [sshpty.c] set tty modes when allocating old style bsd ptys to
418 match what newer style ptys have when allocated. Based on a patch by
419 Roger Cornelius <rac@tenzing.org>
47cdfcbe 420 - (tim) [README.privsep] UnixWare 7 and OpenUNIX 8 work.
421 - (tim) [README.privsep] remove reference to UnixWare 7 and OpenUNIX 8
422 from PAM-enabled pragraph. UnixWare has no PAM.
3c1a6277 423 - (tim) [contrib/caldera/openssh.spec] update version.
545ba36e 424
06617857 42520020513
3d1beaf2 426 - (stevesk) add initial README.privsep
5222e7ef 427 - (stevesk) [configure.ac] nicer message: --with-privsep-user=user
fdff2c55 428 - (djm) Add --with-superuser-path=xxx configure option to specify
429 what $PATH the superuser receives.
94a73cdc 430 - (djm) Bug #231: UsePrivilegeSeparation turns off Banner.
ecac8ee5 431 - (djm) Add --with-privsep-path configure option
80e92e5d 432 - (djm) Update RPM spec file: different superuser path, use
433 /var/empty/sshd for privsep
75817f90 434 - (djm) Bug #234: missing readpassphrase declaration and defines
fdff2c55 435 - (djm) Add INSTALL warning about SSH protocol 1 blowfish w/
436 OpenSSL < 0.9.6
06617857 437
5b991353 43820020511
439 - (tim) [configure.ac] applied a rework of djm's OpenSSL search cleanup patch.
440 Now only searches system and /usr/local/ssl (OpenSSL's default install path)
441 Others must use --with-ssl-dir=....
d73cbfe3 442 - (tim) [monitor_fdpass.c] fix for systems that have both
fdff2c55 443 HAVE_ACCRIGHTS_IN_MSGHDR and HAVE_CONTROL_IN_MSGHDR. Ie. sys/socket.h
444 has #define msg_accrights msg_control
5b991353 445
3ef3d901 44620020510
5b29f152 447 - (stevesk) [auth.c] Shadow account and expiration cleanup. Now
448 check for root forced expire. Still don't check for inactive.
3ef3d901 449 - (djm) Rework RedHat RPM files. Based on spec from Nalin
450 Dahyabhai <nalin@redhat.com> and patches from
451 Pekka Savola <pekkas@netcore.fi>
018a5ea3 452 - (djm) Try to drop supplemental groups at daemon startup. Patch from
453 RedHat
f656b61e 454 - (bal) Back all the way out of auth-passwd.c changes. Breaks too many
455 things that don't set pw->pw_passwd.
3ef3d901 456
075682c1 45720020509
458 - (tim) [Makefile.in] Unbreak make -f Makefile.in distprep
fea8a8e8 459
075682c1 46020020508
af5ee4e4 461 - (tim) [openbsd-compat/bsd-arc4random.c] fix logic on when seed_rng() is
462 called. Report by Chris Maxwell <maxwell@cs.dal.ca>
6193497b 463 - (tim) [Makefile.in configure.ac] set SHELL variable in Makefile
075682c1 464 - (djm) Disable PAM kbd-int auth if privsep is turned on (it doesn't work)
af5ee4e4 465
f25cd32c 46620020507
467 - (tim) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
468 Add truncate() emulation to address Bug 208
469
69406cab 47020020506
471 - (djm) Unbreak auth-passwd.c for PAM and SIA
efe44db6 472 - (djm) Unbreak PAM auth for protocol 1. Report from Pekka Savola
473 <pekkas@netcore.fi>
39ce53de 474 - (djm) Don't reinitialise PAM credentials before we have started PAM.
475 Report from Pekka Savola <pekkas@netcore.fi>
476
d9891c59 47720020506
478 - (bal) Fixed auth-passwd.c to resolve PermitEmptyPassword issue
479
836d58d7 48020020501
481 - (djm) Import OpenBSD regression tests. Requires BSD make to run
50903cc7 482 - (djm) Fix readpassphase compilation for systems which have it
836d58d7 483
f0c180c3 48420020429
485 - (tim) [contrib/caldera/openssh.spec] update fixUP to reflect changes in
486 sshd_config.
487 - (tim) [contrib/cygwin/README] remove reference to regex.
488 patch from Corinna Vinschen <vinschen@redhat.com>
489
db8dbb6a 49020020426
491 - (djm) Bug #137, #209: fix make problems for scard/Ssh.bin, do uudecode
492 during distprep only
fdff2c55 493 - (djm) Disable PAM password expiry until a complete fix for bug #188
494 exists
782e2103 495 - (djm) Bug #180: Set ToS bits on IPv4-in-IPv6 mapped addresses. Based on
496 patch from openssh@misc.tecq.org
db8dbb6a 497
369e787a 49820020425
499 - (stevesk) [defines.h] remove USE_TIMEVAL; unused
6e879cb4 500 - (stevesk) [acconfig.h auth-passwd.c configure.ac sshd.c] HP-UX 10.26
501 support. bug #184. most from dcole@keysoftsys.com.
369e787a 502
8c1f70d8 50320020424
504 - (djm) OpenBSD CVS Sync
505 - markus@cvs.openbsd.org 2002/04/23 12:54:10
506 [version.h]
507 3.2.1
cdc4fc39 508 - djm@cvs.openbsd.org 2002/04/23 22:16:29
509 [sshd.c]
510 Improve error message; ok markus@ stevesk@
8c1f70d8 511
520b41b2 51220020423
a2572aa7 513 - (stevesk) [acconfig.h configure.ac session.c] LOGIN_NO_ENDOPT for HP-UX
7615ed55 514 - (stevesk) [acconfig.h] NEED_IN_SYSTM_H unused
744d788b 515 - (markus) OpenBSD CVS Sync
516 - markus@cvs.openbsd.org 2002/04/23 12:58:26
517 [radix.c]
518 send complete ticket; semerad@ss1000.ms.mff.cuni.cz
3b307f85 519 - (djm) Trim ChangeLog to include only post-3.1 changes
48862e93 520 - (djm) Update RPM spec file versions
03dd62aa 521 - (djm) Redhat spec enables KrbV by default
1352689f 522 - (djm) Applied OpenSC smartcard updates from Markus &
523 Antti Tapaninen <aet@cc.hut.fi>
524 - (djm) Define BROKEN_REALPATH for AIX, patch from
525 Antti Tapaninen <aet@cc.hut.fi>
0e8f4eba 526 - (djm) Bug #214: Fix utmp for Irix (don't strip "tty"). Patch from
527 Kevin Taylor <no@nowhere.org> (??) via Philipp Grau
528 <phgrau@zedat.fu-berlin.de>
2805b943 529 - (djm) Bug #213: Simplify CMSG_ALIGN macros to avoid symbol clashes.
530 Reported by Doug Manton <dmanton@emea.att.com>
520b41b2 531 - (djm) Bug #222: Fix tests for getaddrinfo on OSF/1. Spotted by
532 Robert Urban <urban@spielwiese.de>
52f1ccb2 533 - (djm) Bug #206 - blibpath isn't always needed for AIX ld, avoid
534 sizeof(long long int) == 4 breakage. Patch from Matthew Clarke
535 <Matthew_Clarke@mindlink.bc.ca>
ad200abb 536 - (djm) Make privsep work with PAM (still experimental)
9b26c596 537 - (djm) OpenBSD CVS Sync
538 - deraadt@cvs.openbsd.org 2002/04/20 09:02:03
539 [servconf.c]
540 No, afs requires explicit enabling
541 - markus@cvs.openbsd.org 2002/04/20 09:14:58
542 [bufaux.c bufaux.h]
543 add buffer_{get,put}_short
3b358a0e 544 - markus@cvs.openbsd.org 2002/04/20 09:17:19
545 [radix.c]
546 rewrite using the buffer_* API, fixes overflow; ok deraadt@
22d0faff 547 - stevesk@cvs.openbsd.org 2002/04/21 16:19:27
548 [sshd.8 sshd_config]
549 document default AFSTokenPassing no; ok deraadt@
134c552b 550 - stevesk@cvs.openbsd.org 2002/04/21 16:25:06
551 [sshconnect1.c]
552 spelling in error message; ok markus@
afb8fdb4 553 - markus@cvs.openbsd.org 2002/04/22 06:15:47
554 [radix.c]
555 fix check for overflow
eadc806d 556 - markus@cvs.openbsd.org 2002/04/22 16:16:53
557 [servconf.c sshd.8 sshd_config]
558 do not auto-enable KerberosAuthentication; ok djm@, provos@, deraadt@
e0ae8728 559 - markus@cvs.openbsd.org 2002/04/22 21:04:52
560 [channels.c clientloop.c clientloop.h ssh.c]
561 request reply (success/failure) for -R style fwd in protocol v2,
562 depends on ordered replies.
563 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=215; ok provos@
520b41b2 564
ac033f8c 56520020421
566 - (tim) [entropy.c.] Portability fix for SCO Unix 3.2v4.x (SCO OSR 3.0).
fdff2c55 567 entropy.c needs seteuid(getuid()) for the setuid(original_uid) to
568 succeed. Patch by gert@greenie.muc.de. This fixes one part of Bug 208
ac033f8c 569
6dc63b4f 57020020418
571 - (djm) Avoid SIGCHLD breakage when run from rsync. Fix from
572 Sturle Sunde <sturle.sunde@usit.uio.no>
573
230c7a8f 57420020417
fdff2c55 575 - (djm) Tell users to configure /dev/random support into OpenSSL in
576 INSTALL
1a7220c2 577 - (djm) Fix .Nm in mdoc2man.pl from pspencer@fields.utoronto.ca
8d184c09 578 - (tim) [configure.ac] Issue warning on --with-default-path=/some_path
579 if LOGIN_CAP is enabled. Report & testing by Tuc <tuc@ttsg.com>
230c7a8f 580
9ae68cce 58120020415
fdff2c55 582 - (djm) Unbreak "make install". Fix from Darren Tucker
583 <dtucker@zip.com.au>
4e51cc76 584 - (stevesk) bsd-cygwin_util.[ch] BSD license from Corinna Vinschen
1b06e75e 585 - (tim) [configure.ac] add tests for recvmsg and sendmsg.
586 [monitor_fdpass.c] add checks for HAVE_SENDMSG and HAVE_RECVMSG for
587 systems that HAVE_ACCRIGHTS_IN_MSGHDR but no recvmsg or sendmsg.
9ae68cce 588
f6e6303d 58920020414
590 - (djm) ssh-rand-helper improvements
591 - Add commandline debugging options
592 - Don't write binary data if stdout is a tty (use hex instead)
593 - Give it a manpage
cbe5b851 594 - (djm) Random number collection doc fixes from Ben
f6e6303d 595
12928e80 59620020413
597 - (djm) Add KrbV support patch from Simon Wilkinson <simon@sxw.org.uk>
598
40b74b3f 59920020412
600 - (stevesk) [auth-sia.[ch]] add BSD license from Chris Adams
f95c8ce8 601 - (tim) [configure.ac] add <sys/types.h> to msghdr tests. Change -L
602 to -h on testing for /bin being symbolic link
e2c9b9e3 603 - (bal) Mistaken in Cygwin scripts for ssh starting. Patch by
604 Corinna Vinschen <vinschen@redhat.com>
e75b61db 605 - (bal) disable privsep if no MAP_ANON. We can re-enable it
606 after the release when we can do more testing.
40b74b3f 607
65b91c76 60820020411
609 - (stevesk) [auth-sia.c] cleanup
7b0737a4 610 - (tim) [acconfig.h defines.h includes.h] put includes in includes.h and
611 defines in defines.h [rijndael.c openbsd-compat/fake-socket.h
612 openbsd-compat/inet_aton.c] include "includes.h" instead of "config.h"
613 ok stevesk@
65b91c76 614
ca8aba40 61520020410
f1af2dbf 616 - (stevesk) [configure.ac monitor.c] HAVE_SOCKETPAIR
ca8aba40 617 - (stevesk) [auth-sia.c] compile fix Chris Adams <cmadams@hiwaay.net>
d8ff54e6 618 - (bal) OpenBSD CVS Sync
619 - markus@cvs.openbsd.org 2002/04/10 08:21:47
620 [auth1.c compat.c compat.h]
fdff2c55 621 strip '@' from username only for KerbV and known broken clients,
622 bug #204
f14a5033 623 - markus@cvs.openbsd.org 2002/04/10 08:56:01
624 [version.h]
625 OpenSSH_3.2
626 - Added p1 to idenify Portable release version.
ca8aba40 627
46c8e0f6 62820020408
629 - (bal) Minor OpenSC updates. Fix up header locations and update
630 README.smartcard provided by Juha Yrjölä <jyrjola@cc.hut.fi>
631
7176df4f 63220020407
633 - (stevesk) HAVE_CONTROL_IN_MSGHDR; not used right now.
634 Future: we may want to test if fd passing works correctly.
84071420 635 - (stevesk) [monitor_fdpass.c] fatal() for UsePrivilegeSeparation=yes
636 and no fd passing support.
1e8f8c5b 637 - (stevesk) HAVE_MMAP and HAVE_SYS_MMAN_H and use them in
638 monitor_mm.c
a90419b8 639 - (stevesk) remove configure support for poll.h; it was removed
640 from sshd.c a long time ago.
9a0fbcb3 641 - (stevesk) --with-privsep-user; default sshd
1bf74eac 642 - (stevesk) wrap munmap() with HAVE_MMAP also.
7176df4f 643
b17d6a47 64420020406
645 - (djm) Typo in Suse SPEC file. Fix from Carsten Grohmann
646 <carsten.grohmann@dr-baldeweg.de>
23aa1237 647 - (bal) Added MAP_FAILED to allow AIX and Trusted HP to compile.
af2b3cd9 648 - (bal) OpenBSD CVS Sync
649 - djm@cvs.openbsd.org 2002/04/06 00:30:08
650 [sftp-client.c]
1d6d408a 651 Fix occasional corruption on upload due to bad reuse of request
652 id, spotted by chombier@mac.com; ok markus@
39f9599a 653 - mouring@cvs.openbsd.org 2002/04/06 18:24:09
654 [scp.c]
655 Fixes potental double // within path.
656 http://bugzilla.mindrot.org/show_bug.cgi?id=76
5866adb0 657 - (bal) Slight update to OpenSC support. Better version checking. patch
658 by Juha Yrjölä <jyrjola@cc.hut.fi>
b5171f93 659 - (bal) Revered out of runtime IRIX detection of joblimits. Code is
660 incomplete.
419e4769 661 - (bal) Quiet down configure.ac if /bin/test does not exist.
14f35963 662 - (bal) We no longer use atexit()/xatexit()/on_exit()
b17d6a47 663
295c8801 66420020405
665 - (bal) Patch for OpenSC SmartCard library; ok markus@; patch by
666 Juha Yrjölä <jyrjola@cc.hut.fi>
667 - (bal) Minor documentation update to reflect smartcard library
668 support changes.
ab33e02a 669 - (bal) Too many <sys/queue.h> issues. Remove all workarounds and
670 using internal version only.
d4c6ddff 671 - (bal) OpenBSD CVS Sync
672 - stevesk@cvs.openbsd.org 2002/04/05 20:56:21
673 [sshd.8]
674 clarify sshrc some and handle X11UseLocalhost=yes; ok markus@
295c8801 675
fde58bd4 67620020404
677 - (stevesk) [auth-pam.c auth-pam.h auth-passwd.c auth-sia.c auth-sia.h
678 auth1.c auth2.c] PAM, OSF_SIA password auth cleanup; from djm.
bf03f2da 679 - (bal) OpenBSD CVS Sync
680 - markus@cvs.openbsd.org 2002/04/03 09:26:11
681 [cipher.c myproposal.h]
682 re-add rijndael-cbc@lysator.liu.se for MacSSH; ash@lab.poc.net
fde58bd4 683
ca7e8e1e 68420020402
685 - (bal) Hand Sync of scp.c (reverted to upstream code)
686 - deraadt@cvs.openbsd.org 2002/03/30 17:45:46
687 [scp.c]
688 stretch banners
c572a874 689 - (bal) CVS ID sync of uidswap.c
783dbbdc 690 - (bal) OpenBSD CVS Sync (now for the real sync)
691 - markus@cvs.openbsd.org 2002/03/27 22:21:45
692 [ssh-keygen.c]
fdff2c55 693 try to import keys with extra trailing === (seen with ssh.com <
694 2.0.12)
49a34e84 695 - markus@cvs.openbsd.org 2002/03/28 15:34:51
696 [session.c]
697 do not call record_login twice (for use_privsep)
ffbf7323 698 - markus@cvs.openbsd.org 2002/03/29 18:59:32
699 [session.c session.h]
fdff2c55 700 retrieve last login time before the pty is allocated, store per
701 session
3bc822df 702 - stevesk@cvs.openbsd.org 2002/03/29 19:16:22
703 [sshd.8]
704 RSA key modulus size minimum 768; ok markus@
82b00264 705 - stevesk@cvs.openbsd.org 2002/03/29 19:18:33
706 [auth-rsa.c ssh-rsa.c ssh.h]
707 make RSA modulus minimum #define; ok markus@
8c38e88b 708 - markus@cvs.openbsd.org 2002/03/30 18:51:15
709 [monitor.c serverloop.c sftp-int.c sftp.c sshd.c]
710 check waitpid for EINTR; based on patch from peter@ifm.liu.se
92053302 711 - markus@cvs.openbsd.org 2002/04/01 22:02:16
712 [sftp-client.c]
713 20480 is an upper limit for older server
9c74a24d 714 - markus@cvs.openbsd.org 2002/04/01 22:07:17
715 [sftp-client.c]
716 fallback to stat if server does not support lstat
b745a2f2 717 - markus@cvs.openbsd.org 2002/04/02 11:49:39
718 [ssh-agent.c]
719 check $SHELL for -k and -d, too;
720 http://bugzilla.mindrot.org/show_bug.cgi?id=199
b69145c2 721 - markus@cvs.openbsd.org 2002/04/02 17:37:48
722 [sftp.c]
723 always call log_init()
c9336aed 724 - markus@cvs.openbsd.org 2002/04/02 20:11:38
725 [ssh-rsa.c]
726 ignore SSH_BUG_SIGBLOB for ssh-rsa; #187
c895376b 727 - (bal) mispelling in uidswap.c (portable only)
ca7e8e1e 728
8b314ec9 72920020401
730 - (stevesk) [monitor.c] PAM should work again; will *not* work with
731 UsePrivilegeSeparation=yes.
3906af0f 732 - (stevesk) [auth1.c] fix password auth for protocol 1 when
733 !USE_PAM && !HAVE_OSF_SIA; merge issue.
8b314ec9 734
267e920e 73520020331
736 - (tim) [configure.ac] use /bin/test -L to work around broken builtin on
737 Solaris 8
ef077e37 738 - (tim) [sshconnect2.c] change uint32_t to u_int32_t
267e920e 739
0461c355 74020020330
741 - (stevesk) [configure.ac] remove header check for sys/ttcompat.h
742 bug 167
743
dd466ff8 74420020327
745 - (bal) 'pw' should be 'authctxt->pw' in auth1.c spotted by
746 kent@lysator.liu.se
17f5e68a 747 - (bal) OpenBSD CVS Sync
748 - markus@cvs.openbsd.org 2002/03/26 11:34:49
749 [ssh.1 sshd.8]
750 update to recent drafts
5fb274c1 751 - markus@cvs.openbsd.org 2002/03/26 11:37:05
752 [ssh.c]
753 update Copyright
19f40184 754 - markus@cvs.openbsd.org 2002/03/26 15:23:40
755 [bufaux.c]
756 do not talk about packets in bufaux
7341fad9 757 - rees@cvs.openbsd.org 2002/03/26 18:46:59
758 [scard.c]
fdff2c55 759 try_AUT0 in read_pubkey too, for those paranoid few who want to
760 acl 'sh'
6c112aca 761 - markus@cvs.openbsd.org 2002/03/26 22:50:39
762 [channels.h]
763 CHANNEL_EFD_OUTPUT_ACTIVE is false for CHAN_CLOSE_RCVD, too
52103b10 764 - markus@cvs.openbsd.org 2002/03/26 23:13:03
765 [auth-rsa.c]
766 disallow RSA keys < 768 for protocol 1, too (rhosts-rsa and rsa auth)
76bf34f1 767 - markus@cvs.openbsd.org 2002/03/26 23:14:51
768 [kex.c]
769 generate a new cookie for each SSH2_MSG_KEXINIT message we send out
300e01c4 770 - mouring@cvs.openbsd.org 2002/03/27 11:45:42
771 [monitor.c]
772 monitor_allowed_key() returns int instead of pointer. ok markus@
773
eb4652f4 77420020325
775 - (stevesk) import OpenBSD <sys/tree.h> as "openbsd-compat/tree.h"
47c36e5b 776 - (bal) OpenBSD CVS Sync
777 - stevesk@cvs.openbsd.org 2002/03/23 20:57:26
778 [sshd.c]
779 setproctitle() after preauth child; ok markus@
d452ec1a 780 - markus@cvs.openbsd.org 2002/03/24 16:00:27
781 [serverloop.c]
782 remove unused debug
a49dfdec 783 - markus@cvs.openbsd.org 2002/03/24 16:01:13
784 [packet.c]
785 debug->debug3 for extra padding
5b0d7dc1 786 - stevesk@cvs.openbsd.org 2002/03/24 17:27:03
787 [kexgex.c]
788 typo; ok markus@
d4355079 789 - stevesk@cvs.openbsd.org 2002/03/24 17:53:16
790 [monitor_fdpass.c]
791 minor cleanup and more error checking; ok markus@
9fc0407d 792 - markus@cvs.openbsd.org 2002/03/24 18:05:29
793 [scard.c]
794 we need to figure out AUT0 for sc_private_encrypt, too
38c1c52a 795 - stevesk@cvs.openbsd.org 2002/03/24 23:20:00
796 [monitor.c]
797 remove "\n" from fatal()
159897f3 798 - markus@cvs.openbsd.org 2002/03/25 09:21:13
799 [auth-rsa.c]
800 return 0 (not NULL); tomh@po.crl.go.jp
6f33c8cd 801 - markus@cvs.openbsd.org 2002/03/25 09:25:06
802 [auth-rh-rsa.c]
803 rm bogus comment
0659cace 804 - markus@cvs.openbsd.org 2002/03/25 17:34:27
805 [scard.c scard.h ssh-agent.c ssh-keygen.c ssh.c]
806 change sc_get_key to sc_get_keys and hide smartcard details in scard.c
3074b20c 807 - stevesk@cvs.openbsd.org 2002/03/25 20:12:10
808 [monitor_mm.c monitor_wrap.c]
809 ssize_t args use "%ld" and cast to (long)
810 size_t args use "%lu" and cast to (u_long)
811 ok markus@ and thanks millert@
1c2deed1 812 - markus@cvs.openbsd.org 2002/03/25 21:04:02
813 [ssh.c]
814 simplify num_identity_files handling
d2296ed7 815 - markus@cvs.openbsd.org 2002/03/25 21:13:51
816 [channels.c channels.h compat.c compat.h nchan.c]
fdff2c55 817 don't send stderr data after EOF, accept this from older known
818 (broken) sshd servers only, fixes
819 http://bugzilla.mindrot.org/show_bug.cgi?id=179
8e4fd4a1 820 - stevesk@cvs.openbsd.org 2002/03/26 03:24:01
821 [monitor.h monitor_fdpass.h monitor_mm.h monitor_wrap.h]
822 $OpenBSD$
eb4652f4 823
1178e8db 82420020324
825 - (stevesk) [session.c] disable LOGIN_NEEDS_TERM until we are sure
826 it can be removed. only used on solaris. will no longer compile with
827 privsep shuffling.
828
6f34652e 82920020322
830 - (stevesk) HAVE_ACCRIGHTS_IN_MSGHDR configure support
7b18c353 831 - (stevesk) [monitor.c monitor_wrap.c] #ifdef HAVE_PW_CLASS_IN_PASSWD
c921ee00 832 - (stevesk) configure and cpp __FUNCTION__ gymnastics to handle nielsisms
dc90b259 833 - (stevesk) [monitor_fdpass.c] support for access rights style file
834 descriptor passing
f7ed12f1 835 - (stevesk) [auth2.c] merge cleanup/sync
cfadc43b 836 - (stevesk) [defines.h] hp-ux 11 has ancillary data style fd passing, but
837 is missing CMSG_LEN() and CMSG_SPACE() macros.
cc58061e 838 - (stevesk) [defines.h] #define MAP_ANON MAP_ANONYMOUS for HP-UX; other
839 platforms may need this--I'm not sure. mmap() issues will need to be
840 addressed further.
05976246 841 - (tim) [cipher.c] fix problem with OpenBSD sync
9242fa1b 842 - (stevesk) [LICENCE] OpenBSD sync
6f34652e 843
8627f3e0 84420020321
845 - (bal) OpenBSD CVS Sync
846 - itojun@cvs.openbsd.org 2002/03/08 06:10:16
847 [sftp-client.c]
848 printf type mismatch
bfa7f960 849 - itojun@cvs.openbsd.org 2002/03/11 03:18:49
850 [sftp-client.c]
851 correct type mismatches (u_int64_t != unsigned long long)
5fc7dbc9 852 - itojun@cvs.openbsd.org 2002/03/11 03:19:53
853 [sftp-client.c]
854 indent
150a5466 855 - markus@cvs.openbsd.org 2002/03/14 15:24:27
856 [sshconnect1.c]
fdff2c55 857 don't trust size sent by (rogue) server; noted by
858 s.esser@e-matters.de
4f08e98d 859 - markus@cvs.openbsd.org 2002/03/14 16:38:26
860 [sshd.c]
861 split out ssh1 session key decryption; ok provos@
46f1eece 862 - markus@cvs.openbsd.org 2002/03/14 16:56:33
863 [auth-rh-rsa.c auth-rsa.c auth.h]
864 split auth_rsa() for better readability and privsep; ok provos@
c390a3c8 865 - itojun@cvs.openbsd.org 2002/03/15 11:00:38
866 [auth.c]
867 fix file type checking (use S_ISREG). ok by markus
bcb68a8f 868 - markus@cvs.openbsd.org 2002/03/16 11:24:53
869 [compress.c]
870 skip inflateEnd if inflate fails; ok provos@
3e65880e 871 - markus@cvs.openbsd.org 2002/03/16 17:22:09
872 [auth-rh-rsa.c auth.h]
873 split auth_rhosts_rsa(), ok provos@
bb15f28b 874 - stevesk@cvs.openbsd.org 2002/03/16 17:41:25
875 [auth-krb5.c]
876 BSD license. from Daniel Kouril via Dug Song. ok markus@
443fa1cd 877 - provos@cvs.openbsd.org 2002/03/17 20:25:56
878 [auth.c auth.h auth1.c auth2.c]
fdff2c55 879 getpwnamallow returns struct passwd * only if user valid;
880 okay markus@
1b34c1b3 881 - provos@cvs.openbsd.org 2002/03/18 01:12:14
882 [auth.h auth1.c auth2.c sshd.c]
883 have the authentication functions return the authentication context
884 and then do_authenticated; okay millert@
9d0844e3 885 - dugsong@cvs.openbsd.org 2002/03/18 01:30:10
886 [auth-krb4.c]
887 set client to NULL after xfree(), from Rolf Braun
888 <rbraun+ssh@andrew.cmu.edu>
1836f69f 889 - provos@cvs.openbsd.org 2002/03/18 03:41:08
890 [auth.c session.c]
891 move auth_approval into getpwnamallow with help from millert@
bf8269a9 892 - markus@cvs.openbsd.org 2002/03/18 17:13:15
893 [cipher.c cipher.h]
894 export/import cipher states; needed by ssh-privsep
e050d348 895 - markus@cvs.openbsd.org 2002/03/18 17:16:38
896 [packet.c packet.h]
897 export/import cipher state, iv and ssh2 seqnr; needed by ssh-privsep
d0074658 898 - markus@cvs.openbsd.org 2002/03/18 17:23:31
899 [key.c key.h]
900 add key_demote() for ssh-privsep
b625ad75 901 - provos@cvs.openbsd.org 2002/03/18 17:25:29
902 [bufaux.c bufaux.h]
903 buffer_skip_string and extra sanity checking; needed by ssh-privsep
3d6fc2f8 904 - provos@cvs.openbsd.org 2002/03/18 17:31:54
905 [compress.c]
906 export compression streams for ssh-privsep
1853d1ef 907 - provos@cvs.openbsd.org 2002/03/18 17:50:31
9759df31 908 [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c]
909 [auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c]
910 [kexgex.c servconf.c]
911 [session.h servconf.h serverloop.c session.c sshd.c]
912 integrate privilege separated openssh; its turned off by default
913 for now. work done by me and markus@
ce19ff48 914 - provos@cvs.openbsd.org 2002/03/18 17:53:08
915 [sshd.8]
916 credits for privsep
70aa9ff4 917 - provos@cvs.openbsd.org 2002/03/18 17:59:09
918 [sshd.8]
919 document UsePrivilegeSeparation
73fbf637 920 - stevesk@cvs.openbsd.org 2002/03/18 23:52:51
921 [servconf.c]
922 UnprivUser/UnprivGroup usable now--specify numeric user/group; ok
923 provos@
1c352e97 924 - stevesk@cvs.openbsd.org 2002/03/19 03:03:43
925 [pathnames.h servconf.c servconf.h sshd.c]
926 _PATH_PRIVSEP_CHROOT_DIR; ok provos@
fffbaee2 927 - stevesk@cvs.openbsd.org 2002/03/19 05:23:08
928 [sshd.8]
929 Banner has no default.
702b7dd8 930 - mpech@cvs.openbsd.org 2002/03/19 06:32:56
931 [sftp-int.c]
932 use xfree() after xstrdup().
933
934 markus@ ok
51aeb639 935 - markus@cvs.openbsd.org 2002/03/19 10:35:39
936 [auth-options.c auth.h session.c session.h sshd.c]
937 clean up prototypes
762715ce 938 - markus@cvs.openbsd.org 2002/03/19 10:49:35
9759df31 939 [auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h]
940 [packet.c session.c sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c]
941 [sshconnect2.c sshd.c ttymodes.c]
762715ce 942 KNF whitespace
5f1f36b5 943 - markus@cvs.openbsd.org 2002/03/19 14:27:39
944 [auth.c auth1.c auth2.c]
945 make getpwnamallow() allways call pwcopy()
06bea668 946 - markus@cvs.openbsd.org 2002/03/19 15:31:47
947 [auth.c]
948 check for NULL; from provos@
2ea6de2b 949 - stevesk@cvs.openbsd.org 2002/03/20 19:12:25
950 [servconf.c servconf.h ssh.h sshd.c]
951 for unprivileged user, group do:
952 pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@
256debd0 953 - stevesk@cvs.openbsd.org 2002/03/20 21:08:08
954 [sshd.c]
955 strerror() on chdir() fail; ok provos@
edfb66cb 956 - markus@cvs.openbsd.org 2002/03/21 10:21:20
957 [ssh-add.c]
958 ignore errors for nonexisting default keys in ssh-add,
959 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158
c53c54c2 960 - jakob@cvs.openbsd.org 2002/03/21 15:17:26
961 [clientloop.c ssh.1]
962 add built-in command line for adding new port forwardings on the fly.
963 based on a patch from brian wellington. ok markus@.
7649bbfe 964 - markus@cvs.openbsd.org 2002/03/21 16:38:06
965 [scard.c]
966 make compile w/ openssl 0.9.7
b9f62352 967 - markus@cvs.openbsd.org 2002/03/21 16:54:53
968 [scard.c scard.h ssh-keygen.c]
969 move key upload to scard.[ch]
970 - markus@cvs.openbsd.org 2002/03/21 16:57:15
971 [scard.c]
972 remove const
39ac8430 973 - markus@cvs.openbsd.org 2002/03/21 16:58:13
974 [clientloop.c]
975 remove unused
514b94dc 976 - rees@cvs.openbsd.org 2002/03/21 18:08:15
977 [scard.c]
978 In sc_put_key(), sc_reader_id should be id.
ce1ba33a 979 - markus@cvs.openbsd.org 2002/03/21 20:51:12
980 [sshd_config]
981 add privsep (off)
324bf712 982 - markus@cvs.openbsd.org 2002/03/21 21:23:34
983 [sshd.c]
984 add privsep_preauth() and remove 1 goto; ok provos@
86c4f63d 985 - rees@cvs.openbsd.org 2002/03/21 21:54:34
986 [scard.c scard.h ssh-keygen.c]
987 Add PIN-protection for secret key.
76139bd8 988 - rees@cvs.openbsd.org 2002/03/21 22:44:05
989 [authfd.c authfd.h ssh-add.c ssh-agent.c ssh.c]
990 Add PIN-protection for secret key.
ec9b7086 991 - markus@cvs.openbsd.org 2002/03/21 23:07:37
992 [clientloop.c]
993 remove unused, sync w/ cmdline patch in my tree.
ce1ba33a 994
81dadca3 99520020317
fdff2c55 996 - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is
997 wanted, warn if directory does not exist. Put system directories in
998 front of PATH for finding entorpy commands.
43e41c2c 999 - (tim) [contrib/aix/buildbff.sh contrib/aix/inventory.sh] AIX package
1000 build fixes. Patch by Darren Tucker <dtucker@zip.com.au>
1001 [contrib/solaris/buildpkg.sh] add missing dirs to SYSTEM_DIR. Have
1002 postinstall check for $piddir and add if necessary.
81dadca3 1003
e4abf75b 100420020311
1005 - (tim) [contrib/solaris/buildpkg.sh, contrib/solaris/README] Updated to
1006 build on all platforms that support SVR4 style package tools. Now runs
1007 from build dir. Parts are based on patches from Antonio Navarro, and
1008 Darren Tucker.
1009
fb8f3dc9 101020020308
a068d86f 1011 - (djm) Revert bits of Markus' OpenSSL compat patch which was
1012 accidentally committed.
1013 - (djm) Add Markus' patch for compat wih OpenSSL < 0.9.6.
1014 Known issue: Blowfish for SSH1 does not work
dc254471 1015 - (stevesk) entropy.c: typo in debug message
633151a3 1016 - (djm) ssh-keygen -i needs seeded RNG; report from markus@
fb8f3dc9 1017
0b202697 1018$Id$
This page took 0.431612 seconds and 5 git commands to generate.