]> andersk Git - openssh.git/blame - ChangeLog
- fgsch@cvs.openbsd.org 2003/01/10 08:19:07
[openssh.git] / ChangeLog
CommitLineData
d0104542 120030110
2 - (djm) Enable new setproctitle emulation for Linux, AIX and HP/UX. More
3 systems may be added later.
9a36208d 4 - (djm) OpenBSD CVS Sync
5 - djm@cvs.openbsd.org 2003/01/08 23:53:26
6 [sftp.1 sftp.c sftp-int.c sftp-int.h]
7 Cleanup error handling for batchmode
8 Allow blank lines and comments in input
9 Ability to suppress abort on error in batchmode ("-put blah")
10 Fixes mindrot bug #452; markus@ ok
b65c3807 11 - fgsch@cvs.openbsd.org 2003/01/10 08:19:07
12 [scp.c sftp.1 sftp.c sftp-client.c sftp-int.c]
13 sftp progress meter support.
14 original diffs by Nils Nordman <nino at nforced dot com> via
15 markus@, merged to -current by me, djm@ ok.
d0104542 16
7bb526ce 1720030108
18 - (djm) Sync openbsd-compat/ with OpenBSD -current
93c63b8d 19 - (djm) Avoid redundant xstrdup/xfree in auth2-pam.c. From Solar via markus@
faa483fa 20 - (djm) OpenBSD CVS Sync
21 - markus@cvs.openbsd.org 2003/01/01 18:08:52
22 [channels.c]
23 move big output buffer messages to debug2
bfd934b9 24 - djm@cvs.openbsd.org 2003/01/06 23:51:22
25 [sftp-client.c]
26 Fix "get -p" download to not add user-write perm. mindrot bug #426
27 reported by gfernandez@livevault.com; ok markus@
048ff12c 28 - fgsch@cvs.openbsd.org 2003/01/07 23:42:54
29 [sftp.1]
30 add version; from Nils Nordman <nino at nforced dot com> via markus@.
31 markus@ ok
c9c462e4 32 - (djm) Update README to reflect AIX's status as a well supported platform.
33 From dtucker@zip.com.au
c3690df3 34 - (tim) [Makefile.in configure.ac] replace fixpath with sed script. Patch
a2144d93 35 by Mo DeJong.
ad0279ff 36 - (tim) [auth.c] declare today at top of allowed_user() to keep
37 older compilers happy.
a2144d93 38 - (tim) [scp.c] make compilers without long long happy.
7bb526ce 39
e7ccd20d 4020030107
41 - (djm) Bug #401: Work around Linux breakage with IPv6 mapped addresses.
42 Based on fix from yoshfuji@linux-ipv6.org
e2ef2342 43 - (djm) Bug #442: Check for and deny access to accounts with locked
44 passwords. Patch from dtucker@zip.com.au
70e7d0b0 45 - (djm) Bug #26: Use local mkstemp() rather than glibc's silly one. Fixes
46 Can't pass KRB4 TGT passing. Fix from: jan.iven@cern.ch
93a9a35a 47 - (djm) Fix Bug #442 for PAM case
ed05a983 48 - (djm) Bug #110: bogus error messages in lastlog_get_entry(). Fix based
49 on one by peak@argo.troja.mff.cuni.cz
63cada0a 50 - (djm) Bug #111: Run syslog and stderr logging through strnvis to eliminate
51 nasties. Report from peak@argo.troja.mff.cuni.cz
99f4fb69 52 - (djm) Bug #178: On AIX /etc/nologin wasnt't shown to users. Fix from
53 Ralf.Wenk@fh-karlsruhe.de and dtucker@zip.com.au
b57c8e20 54 - (djm) Fix my fix of the fix for the Bug #442 for PAM case. Spotted by
55 dtucker@zip.com.au. Reorder for clarity too.
e7ccd20d 56
9300be60 5720030103
58 - (djm) Bug #461: ssh-copy-id fails with no arguments. Patch from
59 cjwatson@debian.org
9746ee4b 60 - (djm) Bug #460: Filling utmp[x]->ut_addr_v6 if present. Patch from
61 cjwatson@debian.org
17ed08c5 62 - (djm) Bug #446: Set LOGIN env var to pw_name on AIX. Patch from
63 mii@ornl.gov
64
d4ac26ed 6520030101
66 - (stevesk) [session.c sshlogin.c sshlogin.h] complete portable
67 parts of pass addrlen with sockaddr * fix.
68 from Hajimu UMEMOTO <ume@FreeBSD.org>
69
378d9956 7020021222
71 - (bal) OpenBSD CVS Sync
72 - fgsch@cvs.openbsd.org 2002/11/15 10:03:09
73 [authfile.c]
74 lseek(2) may return -1 when getting the public/private key lenght.
75 Simplify the code and check for errors using fstat(2).
76
77 Problem reported by Mauricio Sanchez, markus@ ok.
3c93c917 78 - markus@cvs.openbsd.org 2002/11/18 16:43:44
79 [clientloop.c]
80 don't overwrite SIG{INT,QUIT,TERM} handler if set to SIG_IGN;
81 e.g. if ssh is used for backup; report Joerg Schilling; ok millert@
35efb24c 82 - markus@cvs.openbsd.org 2002/11/21 22:22:50
83 [dh.c]
84 debug->debug2
a77673cc 85 - markus@cvs.openbsd.org 2002/11/21 22:45:31
86 [cipher.c kex.c packet.c sshconnect.c sshconnect2.c]
87 debug->debug2, unify debug messages
b77a87e5 88 - deraadt@cvs.openbsd.org 2002/11/21 23:03:51
89 [auth-krb5.c auth1.c hostfile.h monitor_wrap.c sftp-client.c sftp-int.c ssh-add.c ssh-rsa.c
90 sshconnect.c]
91 KNF
556f1c05 92 - markus@cvs.openbsd.org 2002/11/21 23:04:33
83bbc162 93 [ssh.c]
94 debug->debug2
556f1c05 95 - stevesk@cvs.openbsd.org 2002/11/24 21:46:24
eef52fa7 96 [ssh-keysign.8]
97 typo: "the the"
6d58d81e 98 - wcobb@cvs.openbsd.org 2002/11/26 00:45:03
99 [scp.c ssh-keygen.c]
100 Remove unnecessary fflush(stderr) calls, stderr is unbuffered by default.
101 ok markus@
556f1c05 102 - stevesk@cvs.openbsd.org 2002/11/26 02:35:30
63baa058 103 [ssh-keygen.1]
104 remove outdated statement; ok markus@ deraadt@
649bb60b 105 - stevesk@cvs.openbsd.org 2002/11/26 02:38:54
106 [canohost.c]
107 KNF, comment and error message repair; ok markus@
15748b4d 108 - markus@cvs.openbsd.org 2002/11/27 17:53:35
109 [scp.c sftp.c ssh.c]
110 allow usernames with embedded '@', e.g. scp user@vhost@realhost:file /tmp;
111 http://bugzilla.mindrot.org/show_bug.cgi?id=447; ok mouring@, millert@
fe661d8f 112 - stevesk@cvs.openbsd.org 2002/12/04 04:36:47
113 [session.c]
114 remove xauth entries before add; PR 2994 from janjaap@stack.nl.
115 ok markus@
a0a14bcd 116 - markus@cvs.openbsd.org 2002/12/05 11:08:35
117 [scp.c]
118 use roundup() similar to rcp/util.c and avoid problems with strange
119 filesystem block sizes, noted by tjr@freebsd.org; ok djm@
556f1c05 120 - djm@cvs.openbsd.org 2002/12/06 05:20:02
2ea16b0b 121 [sftp.1]
122 Fix cut'n'paste error, spotted by matthias.riese@b-novative.de; ok deraadt@
978ebf99 123 - millert@cvs.openbsd.org 2002/12/09 16:50:30
124 [ssh.c]
125 Avoid setting optind to 0 as GNU getopt treats that like we do optreset.
126 markus@ OK
32214c88 127 - markus@cvs.openbsd.org 2002/12/10 08:56:00
128 [session.c]
129 Make sure $SHELL points to the shell from the password file, even if shell
130 is overridden from login.conf; bug#453; semen at online.sinor.ru; ok millert@
48f636b2 131 - markus@cvs.openbsd.org 2002/12/10 19:26:50
132 [packet.c]
133 move tos handling to packet_set_tos; ok provos/henning/deraadt
9e637910 134 - markus@cvs.openbsd.org 2002/12/10 19:47:14
135 [packet.c]
136 static
6226a8f8 137 - markus@cvs.openbsd.org 2002/12/13 10:03:15
138 [channels.c misc.c sshconnect2.c]
139 cleanup debug messages, more useful information for the client user.
556f1c05 140 - markus@cvs.openbsd.org 2002/12/13 15:20:52
141 [scp.c]
142 1) include stalling time in total time
143 2) truncate filenames to 45 instead of 20 characters
144 3) print rate instead of progress bar, no more stars
145 4) scale output to tty width
146 based on a patch from Niels; ok fries@ lebel@ fgs@ millert@
3075ac59 147 - (bal) [msg.c msg.h scp.c ssh-keysign.c sshconnect2.c] Resync CVS IDs since
148 we already did s/msg_send/ssh_msg_send/
378d9956 149
a76550cf 15020021205
151 - (djm) PERL-free fixpaths from stuge-openssh-unix-dev@cdy.org
152
d9a4e55b 15320021122
154 - (tim) [configure.ac] fix STDPATH test for IRIX. First reported by
155 advax@triumf.ca. This type of solution tested by <herb@sgi.com>
156
f825dbf4 15720021113
158 - (tim) [configure.ac] remove unused variables no_libsocket and no_libnsl
159
17d429bb 16020021111
161 - (tim) [contrib/solaris/opensshd.in] add umask 022 so sshd.pid is
162 not world writable.
163
c9826b28 16420021109
165 - (bal) OpenBSD CVS Sync
166 - itojun@cvs.openbsd.org 2002/10/16 14:31:48
167 [sftp-common.c]
168 64bit pedant. %llu is "unsigned long long". markus ok
2fe3c2db 169 - markus@cvs.openbsd.org 2002/10/23 10:32:13
170 [packet.c]
171 use %u for u_int
358b576b 172 - markus@cvs.openbsd.org 2002/10/23 10:40:16
173 [bufaux.c]
174 %u for u_int
f6f02456 175 - markus@cvs.openbsd.org 2002/11/04 10:07:53
176 [auth.c]
177 don't compare against pw_home if realpath fails for pw_home (seen
178 on AFS); ok djm@
2ccb7bde 179 - markus@cvs.openbsd.org 2002/11/04 10:09:51
180 [packet.c]
181 log before send disconnect; ok djm@
39e71188 182 - markus@cvs.openbsd.org 2002/11/05 19:45:20
183 [monitor.c]
184 handle overflows for size_t larger than u_int; siw@goneko.de, bug #425
9db1a8e9 185 - markus@cvs.openbsd.org 2002/11/05 20:10:37
186 [sftp-client.c]
187 typo; GaryF@livevault.com
51efad8c 188 - markus@cvs.openbsd.org 2002/11/07 16:28:47
189 [sshd.c]
190 log to stderr if -ie is given, bug #414, prj@po.cwru.edu
cc46e2ee 191 - markus@cvs.openbsd.org 2002/11/07 22:08:07
192 [readconf.c readconf.h ssh-keysign.8 ssh-keysign.c]
193 we cannot use HostbasedAuthentication for enabling ssh-keysign(8),
194 because HostbasedAuthentication might be enabled based on the
195 target host and ssh-keysign(8) does not know the remote hostname
196 and not trust ssh(1) about the hostname, so we add a new option
197 EnableSSHKeysign; ok djm@, report from zierke@informatik.uni-hamburg.de
252d1a24 198 - markus@cvs.openbsd.org 2002/11/07 22:35:38
199 [scp.c]
200 check exit status from ssh, and exit(1) if ssh fails; bug#369;
201 binder@arago.de
f00addc9 202 - (bal) Update ssh-host-config and minor rewrite of bsd-cygwin_util.c
203 ntsec now default if cygwin version beginning w/ version 56. Patch
204 by Corinna Vinschen <vinschen@redhat.com>
819d3f09 205 - (bal) AIX does not log login attempts for unknown users (bug #432).
206 patch by dtucker@zip.com.au
c9826b28 207
4e6f1c4f 20820021021
f0e27f3d 209 - (djm) Bug #400: Kill ssh-rand-helper children on timeout, patch from
210 dtucker@zip.com.au
cacd2e7a 211 - (djm) Bug #317: FreeBSD needs libutil.h for openpty() Report from
212 dirk.meyer@dinoex.sub.org
4e6f1c4f 213
f3e87063 21420021015
215 - (bal) Fix bug id 383 and only call loginrestrict for AIX if not root.
08412d26 216 - (bal) More advanced strsep test by Darren Tucker <dtucker@zip.com.au>
f3e87063 217
57872969 21820021015
219 - (tim) [contrib/caldera/openssh.spec] make ssh-agent setgid nobody
220
6af8f131 22120021004
222 - (bal) Disable post-authentication Privsep for OSF/1. It conflicts with
223 SIA.
224
e139021d 22520021003
226 - (djm) OpenBSD CVS Sync
227 - markus@cvs.openbsd.org 2002/10/01 20:34:12
228 [ssh-agent.c]
229 allow root to access the agent, since there is no protection from root.
886cd2bb 230 - markus@cvs.openbsd.org 2002/10/01 13:24:50
231 [version.h]
232 OpenSSH 3.5
0855868a 233 - (djm) Bump RPM spec version numbers
e987fdbe 234 - (djm) Bug #406: s/msg_send/ssh_msg_send/ for Mac OS X 1.2
e139021d 235
1d677676 23620020930
9a87e2ac 237 - (djm) Tidy contrib/, add Makefile for GNOME passphrase dialogs,
238 tweak README
239 - (djm) OpenBSD CVS Sync
240 - mickey@cvs.openbsd.org 2002/09/27 10:42:09
241 [compat.c compat.h sshd.c]
242 add a generic match for a prober, such as sie big brother;
243 idea from stevesk@; markus@ ok
05960cf0 244 - stevesk@cvs.openbsd.org 2002/09/27 15:46:21
245 [ssh.1]
246 clarify compression level protocol 1 only; ok markus@ deraadt@
1d677676 247
0d3d0e82 24820020927
249 - (djm) OpenBSD CVS Sync
250 - markus@cvs.openbsd.org 2002/09/25 11:17:16
251 [sshd_config]
252 sync LoginGraceTime with default
26b9a3d2 253 - markus@cvs.openbsd.org 2002/09/25 15:19:02
254 [sshd.c]
255 typo; pilot@monkey.org
2db9d8aa 256 - markus@cvs.openbsd.org 2002/09/26 11:38:43
257 [auth1.c auth.h auth-krb4.c monitor.c monitor.h monitor_wrap.c]
258 [monitor_wrap.h]
259 krb4 + privsep; ok dugsong@, deraadt@
0d3d0e82 260
b7c4a4cc 26120020925
262 - (bal) Fix issue where successfull login does not clear failure counts
263 in AIX. Patch by dtucker@zip.com.au ok by djm
ef51930f 264 - (tim) Cray fixes (bug 367) based on patch from Wendy Palm @ cray.
265 This does not include the deattack.c fixes.
b7c4a4cc 266
99443922 26720020923
268 - (djm) OpenBSD CVS Sync
269 - stevesk@cvs.openbsd.org 2002/09/23 20:46:27
270 [canohost.c]
271 change get_peer_ipaddr() and get_local_ipaddr() to not return NULL for
272 non-sockets; fixes a problem passing NULL to snprintf(). ok markus@
0082ad34 273 - markus@cvs.openbsd.org 2002/09/23 22:11:05
274 [monitor.c]
275 only call auth_krb5 if kerberos is enabled; ok deraadt@
4741e3a6 276 - markus@cvs.openbsd.org 2002/09/24 08:46:04
277 [monitor.c]
278 only call kerberos code for authctxt->valid
cb11b555 279 - todd@cvs.openbsd.org 2002/09/24 20:59:44
280 [sshd.8]
281 tweak the example $HOME/.ssh/rc script to not show on any cmdline the
282 sensitive data it handles. This fixes bug # 402 as reported by
283 kolya@mit.edu (Nickolai Zeldovich).
284 ok markus@ and stevesk@
99443922 285
aec4cb4f 28620020923
287 - (tim) [configure.ac] s/return/exit/ patch by dtucker@zip.com.au
288
f86b0eef 28920020922
290 - (djm) OpenBSD CVS Sync
291 - stevesk@cvs.openbsd.org 2002/09/19 14:53:14
292 [compat.c]
c7724abb 293 - markus@cvs.openbsd.org 2002/09/19 15:51:23
294 [ssh-add.c]
295 typo; cd@kalkatraz.de
00e842d8 296 - stevesk@cvs.openbsd.org 2002/09/19 16:03:15
297 [serverloop.c]
298 log IP address also; ok markus@
c2802d92 299 - stevesk@cvs.openbsd.org 2002/09/20 18:41:29
300 [auth.c]
301 log illegal user here for missing privsep case (ssh2).
302 this is executed in the monitor. ok markus@
f86b0eef 303
792e7d2d 30420020919
305 - (djm) OpenBSD CVS Sync
306 - stevesk@cvs.openbsd.org 2002/09/12 19:11:52
307 [ssh-agent.c]
308 %u for uid print; ok markus@
da0561eb 309 - stevesk@cvs.openbsd.org 2002/09/12 19:50:36
310 [session.c ssh.1]
311 add SSH_CONNECTION and deprecate SSH_CLIENT; bug #384. ok markus@
facfd613 312 - stevesk@cvs.openbsd.org 2002/09/13 19:23:09
313 [channels.c sshconnect.c sshd.c]
314 remove use of SO_LINGER, it should not be needed. error check
315 SO_REUSEADDR. fixup comments. ok markus@
8bd4e2ae 316 - stevesk@cvs.openbsd.org 2002/09/16 19:55:33
317 [session.c]
318 log when _PATH_NOLOGIN exists; ok markus@
e6fe1bab 319 - stevesk@cvs.openbsd.org 2002/09/16 20:12:11
320 [sshd_config.5]
321 more details on X11Forwarding security issues and threats; ok markus@
f1dcc34e 322 - stevesk@cvs.openbsd.org 2002/09/16 22:03:13
323 [sshd.8]
324 reference moduli(5) in FILES /etc/moduli.
5c0d0e90 325 - itojun@cvs.openbsd.org 2002/09/17 07:47:02
326 [channels.c]
327 don't quit while creating X11 listening socket.
328 http://mail-index.netbsd.org/current-users/2002/09/16/0005.html
329 got from portable. markus ok
6939bbd4 330 - djm@cvs.openbsd.org 2002/09/19 01:58:18
331 [ssh.c sshconnect.c]
332 bugzilla.mindrot.org #223 - ProxyCommands don't exit.
333 Patch from dtucker@zip.com.au; ok markus@
792e7d2d 334
4f3834e8 33520020912
eee2215e 336 - (djm) Made GNOME askpass programs return non-zero if cancel button is
337 pressed.
10a560d4 338 - (djm) Added getpeereid() replacement. Properly implemented for systems
339 with SO_PEERCRED support. Faked for systems which lack it.
9fd2a215 340 - (djm) Sync sys/tree.h with OpenBSD -current. Rename tree.h and
341 fake-queue.h to sys-tree.h and sys-queue.h
4f3834e8 342 - (djm) OpenBSD CVS Sync
343 - markus@cvs.openbsd.org 2002/09/08 20:24:08
344 [hostfile.h]
345 no comma at end of enumerator list
696f6bef 346 - itojun@cvs.openbsd.org 2002/09/09 06:48:06
347 [auth1.c auth.h auth-krb5.c monitor.c monitor.h]
348 [monitor_wrap.c monitor_wrap.h]
349 kerberos support for privsep. confirmed to work by lha@stacken.kth.se
350 patch from markus
661e45a0 351 - markus@cvs.openbsd.org 2002/09/09 14:54:15
352 [channels.c kex.h key.c monitor.c monitor_wrap.c radix.c uuencode.c]
353 signed vs unsigned from -pedantic; ok henning@
87f4111f 354 - markus@cvs.openbsd.org 2002/09/10 20:24:47
355 [ssh-agent.c]
356 check the euid of the connecting process with getpeereid(2);
357 ok provos deraadt stevesk
07d688d5 358 - stevesk@cvs.openbsd.org 2002/09/11 17:55:03
359 [ssh.1]
360 add agent and X11 forwarding warning text from ssh_config.5; ok markus@
8b10e20e 361 - stevesk@cvs.openbsd.org 2002/09/11 18:27:26
362 [authfd.c authfd.h ssh.c]
363 don't connect to agent to test for presence if we've previously
364 connected; ok markus@
00b3ad3e 365 - djm@cvs.openbsd.org 2002/09/11 22:41:50
366 [sftp.1 sftp-client.c sftp-client.h sftp-common.c sftp-common.h]
367 [sftp-glob.c sftp-glob.h sftp-int.c sftp-server.c]
368 support for short/long listings and globbing in "ls"; ok markus@
be0cd512 369 - djm@cvs.openbsd.org 2002/09/12 00:13:06
370 [sftp-int.c]
371 zap unused var introduced in last commit
4f3834e8 372
ac8802eb 37320020911
374 - (djm) Sync openbsd-compat with OpenBSD -current
375
e2e36358 37620020910
377 - (djm) Bug #365: Read /.ssh/environment properly under CygWin.
378 Patch from Mark Bradshaw <bradshaw@staff.crosswalk.com>
35c4faf5 379 - (djm) Bug #138: Make protocol 1 blowfish work with old OpenSSL.
380 Patch from Robert Halubek <rob@adso.com.pl>
e2e36358 381
3445ca02 38220020905
383 - (djm) OpenBSD CVS Sync
384 - stevesk@cvs.openbsd.org 2002/09/04 18:52:42
385 [servconf.c sshd.8 sshd_config.5]
386 default LoginGraceTime to 2m; 1m may be too short for slow systems.
387 ok markus@
cbecf1ed 388 - (djm) Merge openssh-TODO.patch from Redhat (null) beta
c4ee4c60 389 - (djm) Add gnome-ssh-askpass2.c (gtk2) by merge with patch from
390 Nalin Dahyabhai <nalin@redhat.com>
3c1dff28 391 - (djm) Add support for building gtk2 password requestor from Redhat beta
3445ca02 392
954640a4 39320020903
33e2e066 394 - (djm) Patch from itojun@ for Darwin OS: test getaddrinfo, reorder libcrypt
e18b7d35 395 - (djm) Fix Redhat RPM build dependancy test
954640a4 396 - (djm) OpenBSD CVS Sync
397 - markus@cvs.openbsd.org 2002/08/12 10:46:35
398 [ssh-agent.c]
399 make ssh-agent setgid, disallow ptrace.
755c4339 400 - espie@cvs.openbsd.org 2002/08/21 11:20:59
401 [sshd.8]
402 `RSA' updated to refer to `public key', where it matters.
403 okay markus@
6e0fbda1 404 - stevesk@cvs.openbsd.org 2002/08/21 19:38:06
405 [servconf.c sshd.8 sshd_config sshd_config.5]
406 change LoginGraceTime default to 1 minute; ok mouring@ markus@
00e41835 407 - stevesk@cvs.openbsd.org 2002/08/21 20:10:28
408 [ssh-agent.c]
409 raise listen backlog; ok markus@
c1a4eef1 410 - stevesk@cvs.openbsd.org 2002/08/22 19:27:53
411 [ssh-agent.c]
412 use common close function; ok markus@
1d77f8cb 413 - stevesk@cvs.openbsd.org 2002/08/22 19:38:42
414 [clientloop.c]
415 format with current EscapeChar; bugzilla #388 from wknox@mitre.org.
416 ok markus@
f34ec885 417 - stevesk@cvs.openbsd.org 2002/08/22 20:57:19
418 [ssh-agent.c]
419 shutdown(SHUT_RDWR) not needed before close here; ok markus@
848bf884 420 - markus@cvs.openbsd.org 2002/08/22 21:33:58
421 [auth1.c auth2.c]
422 auth_root_allowed() is handled by the monitor in the privsep case,
423 so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325
6c723e7c 424 - markus@cvs.openbsd.org 2002/08/22 21:45:41
425 [session.c]
426 send signal name (not signal number) in "exit-signal" message; noticed
427 by galb@vandyke.com
b41baf4d 428 - stevesk@cvs.openbsd.org 2002/08/27 17:13:56
429 [ssh-rsa.c]
430 RSA_public_decrypt() returns -1 on error so len must be signed;
431 ok markus@
dbcdea68 432 - stevesk@cvs.openbsd.org 2002/08/27 17:18:40
433 [ssh_config.5]
434 some warning text for ForwardAgent and ForwardX11; ok markus@
ba1566dd 435 - stevesk@cvs.openbsd.org 2002/08/29 15:57:25
436 [monitor.c session.c sshlogin.c sshlogin.h]
437 pass addrlen with sockaddr *; from Hajimu UMEMOTO <ume@FreeBSD.org>
438 NOTE: there are also p-specific parts to this patch. ok markus@
e59404d1 439 - stevesk@cvs.openbsd.org 2002/08/29 16:02:54
440 [ssh.1 ssh.c]
441 deprecate -P as UsePrivilegedPort defaults to no now; ok markus@
878b8992 442 - stevesk@cvs.openbsd.org 2002/08/29 16:09:02
443 [ssh_config.5]
444 more on UsePrivilegedPort and setuid root; ok markus@
9f324470 445 - stevesk@cvs.openbsd.org 2002/08/29 19:49:42
446 [ssh.c]
447 shrink initial privilege bracket for setuid case; ok markus@
57ff5eeb 448 - stevesk@cvs.openbsd.org 2002/08/29 22:54:10
449 [ssh_config.5 sshd_config.5]
450 state XAuthLocation is a full pathname
954640a4 451
b85698ab 45220020820
453 - OpenBSD CVS Sync
454 - millert@cvs.openbsd.org 2002/08/02 14:43:15
455 [monitor.c monitor_mm.c]
456 Change mm_zalloc() sanity checks to be more in line with what
457 we do in calloc() and add a check to monitor_mm.c.
458 OK provos@ and markus@
6a342527 459 - marc@cvs.openbsd.org 2002/08/02 16:00:07
460 [ssh.1 sshd.8]
461 note that .ssh/environment is only read when
462 allowed (PermitUserEnvironment in sshd_config).
463 OK markus@
4004c2ac 464 - markus@cvs.openbsd.org 2002/08/02 21:23:41
465 [ssh-rsa.c]
466 diff is u_int (2x); ok deraadt/provos
0caf874a 467 - markus@cvs.openbsd.org 2002/08/02 22:20:30
468 [ssh-rsa.c]
469 replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser
470 for authentication; ok deraadt/djm
75cf7563 471 - aaron@cvs.openbsd.org 2002/08/08 13:50:23
472 [sshconnect1.c]
473 Use & to test if bits are set, not &&; markus@ ok.
d6097023 474 - stevesk@cvs.openbsd.org 2002/08/08 23:54:52
475 [auth.c]
476 typo in comment
36535ee6 477 - stevesk@cvs.openbsd.org 2002/08/09 17:21:42
478 [sshd_config.5]
479 use Op for mdoc conformance; from esr@golux.thyrsus.com
480 ok aaron@
b3641662 481 - stevesk@cvs.openbsd.org 2002/08/09 17:41:12
482 [sshd_config.5]
483 proxy vs. fake display
35453849 484 - stevesk@cvs.openbsd.org 2002/08/12 17:30:35
485 [ssh.1 sshd.8 sshd_config.5]
486 more PermitUserEnvironment; ok markus@
24794905 487 - stevesk@cvs.openbsd.org 2002/08/17 23:07:14
488 [ssh.1]
489 ForwardAgent has defaulted to no for over 2 years; be more clear here.
4dcbbeea 490 - stevesk@cvs.openbsd.org 2002/08/17 23:55:01
491 [ssh_config.5]
492 ordered list here
7d3b91a6 493 - (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assign
494 it to ULONG_MAX.
b85698ab 495
cd018561 49620020813
497 - (tim) [configure.ac] Display OpenSSL header/library version.
498 Patch by dtucker@zip.com.au
499
8a48a7ef 50020020731
501 - (bal) OpenBSD CVS Sync
502 - markus@cvs.openbsd.org 2002/07/24 16:11:18
503 [hostfile.c hostfile.h sshconnect.c]
504 print out all known keys for a host if we get a unknown host key,
505 see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4
506
507 the ssharp mitm tool attacks users in a similar way, so i'd like to
508 pointed out again:
509 A MITM attack is always possible if the ssh client prints:
510 The authenticity of host 'bla' can't be established.
511 (protocol version 2 with pubkey authentication allows you to detect
512 MITM attacks)
5cb5518b 513 - mouring@cvs.openbsd.org 2002/07/25 01:16:59
514 [sftp.c]
515 FallBackToRsh does not exist anywhere else. Remove it from here.
516 OK deraadt.
567a05bf 517 - markus@cvs.openbsd.org 2002/07/29 18:57:30
518 [sshconnect.c]
519 print file:line
f00bab84 520 - markus@cvs.openbsd.org 2002/07/30 17:03:55
521 [auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5]
522 add PermitUserEnvironment (off by default!); from dot@dotat.at;
523 ok provos, deraadt
8a48a7ef 524
13979d47 52520020730
526 - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de
527
d228d9dd 52820020728
529 - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar
16c4a972 530 - (stevesk) [CREDITS] solar
75131bbd 531 - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned
532 char arg.
d228d9dd 533
d40af5fa 53420020725
535 - (djm) Remove some cruft from INSTALL
d91b4743 536 - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/
d40af5fa 537
56b54901 53820020723
539 - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger.
918ffb0b 540 - (bal) sync ID w/ ssh-agent.c
516f0d7d 541 - (bal) OpenBSD Sync
542 - markus@cvs.openbsd.org 2002/07/19 15:43:33
543 [log.c log.h session.c sshd.c]
544 remove fatal cleanups after fork; based on discussions with and code
545 from solar.
5d185586 546 - stevesk@cvs.openbsd.org 2002/07/19 17:42:40
547 [ssh.c]
548 display a warning from ssh when XAuthLocation does not exist or xauth
549 returned no authentication data. ok markus@
30998af1 550 - stevesk@cvs.openbsd.org 2002/07/21 18:32:20
551 [auth-options.c]
552 unneeded includes
dbc728ff 553 - stevesk@cvs.openbsd.org 2002/07/21 18:34:43
554 [auth-options.h]
555 remove invalid comment
97686bf9 556 - markus@cvs.openbsd.org 2002/07/22 11:03:06
557 [session.c]
558 fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors;
d341742a 559 - stevesk@cvs.openbsd.org 2002/07/22 17:32:56
560 [monitor.c]
561 u_int here; ok provos@
67f04db1 562 - stevesk@cvs.openbsd.org 2002/07/23 16:03:10
563 [sshd.c]
564 utmp_len is unsigned; display error consistent with other options.
565 ok markus@
0df3a240 566 - stevesk@cvs.openbsd.org 2002/07/15 17:15:31
567 [uidswap.c]
568 little more debugging; ok markus@
d341742a 569
21c2c5cd 57020020722
571 - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk
a93bd14c 572 - (stevesk) [xmmap.c] missing prototype for fatal()
ccbb983c 573 - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync
574 with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com.
d262b7f2 575 - (bal) [configure.ac] Missing ;; from cray patch.
30eab01d 576 - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines
577 into it's own header.
ee48c949 578 - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be
579 freed by the caller; add free_pam_environment() and use it.
1d3f4ae7 580 - (stevesk) [auth-pam.c] typo in comment
21c2c5cd 581
b992432e 58220020721
583 - (stevesk) [auth-pam.c] merge cosmetic changes from solar's
584 openssh-3.4p1-owl-password-changing.diff
277f55cf 585 - (stevesk) [auth-pam.c] merge rest of solar's PAM patch;
586 PAM_NEW_AUTHTOK_REQD remains in #if 0 for now.
f7808a93 587 - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch
588 warning on pam_conv struct conversation function.
337dde6b 589 - (stevesk) [auth-pam.h] license
8565f28e 590 - (stevesk) [auth-pam.h] unneeded include
e9b2c23d 591 - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h
b992432e 592
ce88d9df 59320020720
594 - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng().
595
4379c0e5 59620020719
597 - (tim) [contrib/solaris/buildpkg.sh] create privsep user/group if needed.
598 Patch by dtucker@zip.com.au
f75ca46d 599 - (tim) [configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au
4379c0e5 600
45491100 60120020718
602 - (tim) [defines.h] Bug 313 patch by dirk.meyer@dinoex.sub.org
603 - (tim) [monitor_mm.c] add missing declaration for xmmap(). Reported
604 by ayamura@ayamura.org
1cbbe6c8 605 - (tim) [configure.ac] Bug 267 rework int64_t test.
5749e709 606 - (tim) [includes.h] Bug 267 add stdint.h
45491100 607
dd3943d0 60820020717
609 - (bal) aixbff package updated by dtucker@zip.com.au
2bf42e4a 610 - (tim) [configure.ac] change how we do paths in AC_PATH_PROGS tests
611 for autoconf 2.53. Based on a patch by jrj@purdue.edu
dd3943d0 612
8fc47887 61320020716
614 - (tim) [contrib/solaris/opensshd.in] Only kill sshd if .pid file found
615
c750d869 61620020715
617 - (bal) OpenBSD CVS Sync
618 - itojun@cvs.openbsd.org 2002/07/12 13:29:09
619 [sshconnect.c]
620 print connect failure during debugging mode.
a2f883ce 621 - markus@cvs.openbsd.org 2002/07/12 15:50:17
622 [cipher.c]
623 EVP_CIPH_CUSTOM_IV for our own rijndael
2d199535 624 - (bal) Remove unused tty defined in do_setusercontext() pointed out by
625 dtucker@zip.com.au plus a a more KNF since I am near it.
846be3f4 626 - (bal) Privsep user creation support in Solaris buildpkg.sh by
627 dtucker@zip.com.au
c750d869 628
798c5808 62920020714
630 - (tim) [Makefile.in] replace "id sshd" with "sshd -t"
4165b82e 631 - (bal/tim) [acconfig.h configure.ac monitor_mm.c servconf.c
632 openbsd-compat/Makefile.in] support compression on platforms that
633 have no/broken MAP_ANON. Moved code to openbsd-compat/xmmap.c
634 Based on patch from nalin@redhat.com of code extracted from Owl's package
5fd8087a 635 - (tim) [ssh_prng_cmds.in] Bug 323 arp -n flag doesn't exist under Solaris.
636 report by chris@by-design.net
fdebdd4f 637 - (tim) [loginrec.c] Bug 347: Fix typo (WTMPX_FILE) report by rodney@bond.net
d80063fe 638 - (tim) [loginrec.c] Bug 348: add missing found = 1; to wtmpx_islogin()
639 report by rodney@bond.net
798c5808 640
6b2a3595 64120020712
642 - (tim) [Makefile.in] quiet down install-files: and check-user:
3085601b 643 - (tim) [configure.ac] remove unused filepriv line
6b2a3595 644
249f9903 64520020710
646 - (tim) [contrib/cygwin/ssh-host-config] explicitely sets the permissions
647 on /var/empty to 755 Patch by vinschen@redhat.com
6f901f8e 648 - (bal) OpenBSD CVS Sync
649 - itojun@cvs.openbsd.org 2002/07/09 11:56:50
650 [sshconnect.c]
651 silently try next address on connect(2). markus ok
59c825e1 652 - itojun@cvs.openbsd.org 2002/07/09 11:56:27
653 [canohost.c]
654 suppress log on reverse lookup failiure, as there's no real value in
655 doing so.
656 markus ok
aab5431b 657 - itojun@cvs.openbsd.org 2002/07/09 12:04:02
658 [sshconnect.c]
659 ed static function (less warnings)
94ad46d1 660 - stevesk@cvs.openbsd.org 2002/07/09 17:46:25
661 [sshd_config.5]
662 clarify no preference ordering in protocol list; ok markus@
9bd68577 663 - itojun@cvs.openbsd.org 2002/07/10 10:28:15
664 [sshconnect.c]
665 bark if all connection attempt fails.
09683edf 666 - deraadt@cvs.openbsd.org 2002/07/10 17:53:54
667 [rijndael.c]
668 use right sizeof in memcpy; markus ok
249f9903 669
e6f15ed1 67020020709
671 - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platforms
672 lacking that concept can share it. Patch by vinschen@redhat.com
673
4f9d6706 67420020708
675 - (tim) [openssh/contrib/solaris/buildpkg.sh] add PKG_INSTALL_ROOT to
676 work in a jumpstart environment. patch by kbrint@rufus.net
b451e27b 677 - (tim) [Makefile.in] workaround for broken pakadd on some systems.
cda1ebcb 678 - (tim) [configure.ac] fix libc89 utimes test. Mention default path for
679 --with-privsep-path=
4f9d6706 680
ac74561e 68120020707
682 - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH)
94d8258b 683 - (tim) [acconfig.h configure.ac sshd.c]
684 s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/
d41f8eed 685 - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes
686 patch from vinschen@redhat.com
0b832146 687 - (bal) [realpath.c] Updated with OpenBSD tree.
da2499f5 688 - (bal) OpenBSD CVS Sync
689 - deraadt@cvs.openbsd.org 2002/07/04 04:15:33
690 [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c]
691 patch memory leaks; grendel@zeitbombe.org
e1feb9bf 692 - deraadt@cvs.openbsd.org 2002/07/04 08:12:15
693 [channels.c packet.c]
694 blah blah minor nothing as i read and re-read and re-read...
eb9f2fab 695 - markus@cvs.openbsd.org 2002/07/04 10:41:47
696 [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c]
697 don't allocate, copy, and discard if there is not interested in the data;
698 ok deraadt@
4394a17f 699 - deraadt@cvs.openbsd.org 2002/07/06 01:00:49
700 [log.c]
701 KNF
50d2fbbc 702 - deraadt@cvs.openbsd.org 2002/07/06 01:01:26
703 [ssh-keyscan.c]
704 KNF, realloc fix, and clean usage
12a3f2c3 705 - stevesk@cvs.openbsd.org 2002/07/06 17:47:58
706 [ssh-keyscan.c]
707 unused variable
41545cb6 708 - (bal) Minor KNF on ssh-keyscan.c
ac74561e 709
0764e748 71020020705
711 - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs.
712 Reported by Darren Tucker <dtucker@zip.com.au>
e12659f4 713 - (tim) [contrib/cygwin/ssh-host-config] double slash corrction
714 from vinschen@redhat.com
0764e748 715
64c0ce80 71620020704
717 - (bal) Limit data to TTY for AIX only (Newer versions can't handle the
718 faster data rate) Bug #124
375c1dee 719 - (bal) glob.c defines TILDE and AIX also defines it. #undef it first.
720 bug #265
ff2de800 721 - (bal) One too many nulls in ports-aix.c
64c0ce80 722
d2f95449 72320020703
724 - (bal) Updated contrib/cygwin/ patch by vinschen@redhat.com
619a6aff 725 - (bal) minor correction to utimes() replacement. Patch by
726 onoe@sm.sony.co.jp
f11fe301 727 - OpenBSD CVS Sync
728 - markus@cvs.openbsd.org 2002/06/27 08:49:44
729 [dh.c ssh-keyscan.c sshconnect.c]
730 more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@
181d6635 731 - deraadt@cvs.openbsd.org 2002/06/27 09:08:00
732 [monitor.c]
733 improve mm_zalloc check; markus ok
30e37ee6 734 - deraadt@cvs.openbsd.org 2002/06/27 10:35:47
735 [auth2-none.c monitor.c sftp-client.c]
736 use xfree()
c8f94200 737 - stevesk@cvs.openbsd.org 2002/06/27 19:49:08
738 [ssh-keyscan.c]
739 use convtime(); ok markus@
a64d3560 740 - millert@cvs.openbsd.org 2002/06/28 01:49:31
741 [monitor_mm.c]
742 tree(3) wants an int return value for its compare functions and
743 the difference between two pointers is not an int. Just do the
744 safest thing and store the result in a long and then return 0,
745 -1, or 1 based on that result.
405a0d43 746 - deraadt@cvs.openbsd.org 2002/06/28 01:50:37
747 [monitor_wrap.c]
748 use ssize_t
4efd85b2 749 - deraadt@cvs.openbsd.org 2002/06/28 10:08:25
750 [sshd.c]
751 range check -u option at invocation
6ded293b 752 - deraadt@cvs.openbsd.org 2002/06/28 23:05:06
753 [sshd.c]
754 gidset[2] -> gidset[1]; markus ok
7fdc56c5 755 - deraadt@cvs.openbsd.org 2002/06/30 21:54:16
756 [auth2.c session.c sshd.c]
757 lint asks that we use names that do not overlap
343288b8 758 - deraadt@cvs.openbsd.org 2002/06/30 21:59:45
759 [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c
760 monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c
761 sshconnect2.c sshd.c]
762 minor KNF
7d60d74c 763 - deraadt@cvs.openbsd.org 2002/07/01 16:15:25
764 [msg.c]
765 %u
713f6cd9 766 - markus@cvs.openbsd.org 2002/07/01 19:48:46
767 [sshconnect2.c]
768 for compression=yes, we fallback to no-compression if the server does
769 not support compression, vice versa for compression=no. ok mouring@
261189cc 770 - markus@cvs.openbsd.org 2002/07/03 09:55:38
771 [ssh-keysign.c]
772 use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld)
773 in order to avoid a possible Kocher timing attack pointed out by Charles
774 Hannum; ok provos@
60cd0a97 775 - markus@cvs.openbsd.org 2002/07/03 14:21:05
776 [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config]
777 re-enable ssh-keysign's sbit, but make ssh-keysign read
778 /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled
779 globally. based on discussions with deraadt, itojun and sommerfeld;
780 ok itojun@
56fd97d7 781 - (bal) Failed password attempts don't increment counter on AIX. Bug #145
e8aa0a5c 782 - (bal) Missed Makefile.in change. keysign needs readconf.o
0ba40daa 783 - (bal) Clean up aix_usrinfo(). Ignore TTY= period I guess.
56fd97d7 784
b2f295dc 78520020702
786 - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc &
787 friends consistently. Spotted by Solar Designer <solar@openwall.com>
788
3c3e878a 78920020629
790 - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style
791 clean up while I'm near it.
792
811ee370 79320020628
794 - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented
795 options should contain default value. from solar.
b9b82dab 796 - (bal) Cygwin uid0 fix by vinschen@redhat.com
17962c40 797 - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c. Otherwise wise
798 have issues of our fixes not propogating right (ie bcopy instead of
799 memmove). OK tim
4fa4fb00 800 - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported.
801 Bug #303
811ee370 802
ce88d9df 80320020627
d1ff09ba 804 - OpenBSD CVS Sync
805 - deraadt@cvs.openbsd.org 2002/06/26 14:49:36
806 [monitor.c]
807 correct %u
63b5f1a1 808 - deraadt@cvs.openbsd.org 2002/06/26 14:50:04
809 [monitor_fdpass.c]
810 use ssize_t for recvmsg() and sendmsg() return
1431a900 811 - markus@cvs.openbsd.org 2002/06/26 14:51:33
812 [ssh-add.c]
813 fix exit code for -X/-x
bb0640b2 814 - deraadt@cvs.openbsd.org 2002/06/26 15:00:32
815 [monitor_wrap.c]
816 more %u
20e79e98 817 - markus@cvs.openbsd.org 2002/06/26 22:27:32
818 [ssh-keysign.c]
819 bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu
d1ff09ba 820
4bfa8bb6 82120020626
822 - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM
a594fa74 823 - (bal) OpenBSD CVS Sync
824 - markus@cvs.openbsd.org 2002/06/23 21:34:07
825 [channels.c]
826 tcode is u_int
38501509 827 - markus@cvs.openbsd.org 2002/06/24 13:12:23
828 [ssh-agent.1]
829 the socket name contains ssh-agent's ppid; via mpech@ from form@
f91d9a89 830 - markus@cvs.openbsd.org 2002/06/24 14:33:27
831 [channels.c channels.h clientloop.c serverloop.c]
832 move channel counter to u_int
1169c3df 833 - markus@cvs.openbsd.org 2002/06/24 14:55:38
834 [authfile.c kex.c ssh-agent.c]
835 cat to (void) when output from buffer_get_X is ignored
09915dc1 836 - itojun@cvs.openbsd.org 2002/06/24 15:49:22
837 [msg.c]
838 printf type pedant
d0a1c5d1 839 - deraadt@cvs.openbsd.org 2002/06/24 17:57:20
840 [sftp-server.c sshpty.c]
841 explicit (u_int) for uid and gid
6c69a6a9 842 - markus@cvs.openbsd.org 2002/06/25 16:22:42
843 [authfd.c]
844 unnecessary cast
87809a1f 845 - markus@cvs.openbsd.org 2002/06/25 18:51:04
846 [sshd.c]
847 lightweight do_setusercontext after chroot()
924681ee 848 - (bal) Updated AIX package build. Patch by dtucker@zip.com.au
46c8ebb3 849 - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8
78beb77d 850 - (bal) added back in error check for mmap(). I screwed up, Pointed
851 out by stevesk@
f2d9a1f8 852 - (tim) [README.privsep] UnixWare tip no longer needed.
88cb875c 853 - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP,
854 but it all damned lies.
0d0270e6 855 - (stevesk) [README.privsep] more for sshd pseudo-account.
8029e7fc 856 - (tim) [contrib/caldera/openssh.spec] add support for privsep
8695f9f7 857 - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@
b29fe4ea 858 - (djm) OpenBSD CVS Sync
859 - markus@cvs.openbsd.org 2002/06/26 08:53:12
860 [bufaux.c]
861 limit size of BNs to 8KB; ok provos/deraadt
22d62d31 862 - markus@cvs.openbsd.org 2002/06/26 08:54:18
863 [buffer.c]
864 limit append to 1MB and buffers to 10MB
5df8c731 865 - markus@cvs.openbsd.org 2002/06/26 08:55:02
866 [channels.c]
867 limit # of channels to 10000
87f18810 868 - markus@cvs.openbsd.org 2002/06/26 08:58:26
869 [session.c]
870 limit # of env vars to 1000; ok deraadt/djm
2f095a0e 871 - deraadt@cvs.openbsd.org 2002/06/26 13:20:57
872 [monitor.c]
873 be careful in mm_zalloc
66087567 874 - deraadt@cvs.openbsd.org 2002/06/26 13:49:26
875 [session.c]
876 disclose less information from environment files; based on input
877 from djm, and dschultz@uclink.Berkeley.EDU
477edc5d 878 - markus@cvs.openbsd.org 2002/06/26 13:55:37
879 [auth2-chall.c]
880 make sure # of response matches # of queries, fixes int overflow;
881 from ISS
03b14b6f 882 - markus@cvs.openbsd.org 2002/06/26 13:56:27
883 [version.h]
884 3.4
9c696d0d 885 - (djm) Require krb5 devel for RPM build w/ KrbV
c4186be7 886 - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai
887 <nalin@redhat.com>
1e7bc74c 888 - (djm) Update spec files for release
49b53b03 889 - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS
03b14b6f 890 - (djm) Release 3.4p1
6519cfd6 891 - (tim) [contrib/caldera/openssh.spec] remove 2 configure options I put in
892 by mistake
4bfa8bb6 893
ef1ac12b 89420020625
895 - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh
1a44c6f7 896 - (stevesk) [README.privsep] minor updates
fd3cbf67 897 - (djm) Create privsep directory and warn if privsep user is missing
898 during make install
702b2855 899 - (bal) Started list of PrivSep issues in TODO
1c6249af 900 - (bal) if mmap() is substandard, don't allow compression on server side.
901 Post 'event' we will add more options.
cbaa3d44 902 - (tim) [contrib/caldera/openssh.spec] Sync with Caldera
e2bc41f9 903 - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by
904 dtucker@zip.com.au
d170feb1 905 - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus
906 for Cygwin, Cray, & SCO
ef1ac12b 907
d5803314 90820020624
909 - OpenBSD CVS Sync
910 - deraadt@cvs.openbsd.org 2002/06/23 03:25:50
911 [tildexpand.c]
912 KNF
3ddc795d 913 - deraadt@cvs.openbsd.org 2002/06/23 03:26:19
914 [cipher.c key.c]
915 KNF
d6133f43 916 - deraadt@cvs.openbsd.org 2002/06/23 03:30:58
917 [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c
918 sshpty.c]
919 various KNF and %d for unsigned
9906a836 920 - deraadt@cvs.openbsd.org 2002/06/23 09:30:14
921 [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c
922 sftp.c]
923 bunch of u_int vs int stuff
512df038 924 - deraadt@cvs.openbsd.org 2002/06/23 09:39:55
925 [ssh-keygen.c]
926 u_int stuff
7528d467 927 - deraadt@cvs.openbsd.org 2002/06/23 09:46:51
928 [bufaux.c servconf.c]
929 minor KNF. things the fingers do while you read
e424e241 930 - deraadt@cvs.openbsd.org 2002/06/23 10:29:52
931 [ssh-agent.c sshd.c]
932 some minor KNF and %u
7138ebd9 933 - deraadt@cvs.openbsd.org 2002/06/23 20:39:45
934 [session.c]
935 compression_level is u_int
f09ce20a 936 - deraadt@cvs.openbsd.org 2002/06/23 21:06:13
937 [sshpty.c]
938 KNF
57f228e8 939 - deraadt@cvs.openbsd.org 2002/06/23 21:06:41
940 [channels.c channels.h session.c session.h]
941 display, screen, row, col, xpixel, ypixel are u_int; markus ok
0bc50167 942 - deraadt@cvs.openbsd.org 2002/06/23 21:10:02
943 [packet.c]
944 packet_get_int() returns unsigned for reason & seqnr
57f228e8 945 - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col,
946 xpixel are u_int.
947
d5803314 948
58177c0a 94920020623
950 - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX.
dc43acd2 951 - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset.
ef3912be 952 - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au
a8bbdc75 953 - OpenBSD CVS Sync
954 - stevesk@cvs.openbsd.org 2002/06/22 02:00:29
955 [ssh.h]
956 correct comment
1ae02182 957 - stevesk@cvs.openbsd.org 2002/06/22 02:40:23
958 [ssh.1]
959 section 5 not 4 for ssh_config
b2843ec6 960 - naddy@cvs.openbsd.org 2002/06/22 11:51:39
961 [ssh.1]
962 typo
75653d3e 963 - stevesk@cvs.openbsd.org 2002/06/22 16:32:54
964 [sshd.8]
965 add /var/empty in FILES section
a56313d7 966 - stevesk@cvs.openbsd.org 2002/06/22 16:40:19
967 [sshd.c]
968 check /var/empty owner mode; ok provos@
e4e83d70 969 - stevesk@cvs.openbsd.org 2002/06/22 16:41:57
970 [scp.1]
971 typo
baa08b92 972 - stevesk@cvs.openbsd.org 2002/06/22 16:45:29
973 [ssh-agent.1 sshd.8 sshd_config.5]
974 use process ID vs. pid/PID/process identifier
c28876e9 975 - stevesk@cvs.openbsd.org 2002/06/22 20:05:27
976 [sshd.c]
977 don't call setsid() if debugging or run from inetd; no "Operation not
978 permitted" errors now; ok millert@ markus@
d17ef027 979 - stevesk@cvs.openbsd.org 2002/06/22 23:09:51
980 [monitor.c]
981 save auth method before monitor_reset_key_state(); bugzilla bug #284;
982 ok provos@
58177c0a 983
0b202697 984$Id$
This page took 0.420392 seconds and 5 git commands to generate.