]> andersk Git - openssh.git/blame - ChangeLog
- jmc@cvs.openbsd.org 2003/06/10 09:12:11
[openssh.git] / ChangeLog
CommitLineData
be193d89 120030611
2 - (djm) OpenBSD CVS Sync
3 - jmc@cvs.openbsd.org 2003/06/10 09:12:11
4 [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5]
5 [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
6 - section reorder
7 - COMPATIBILITY merge
8 - macro cleanup
9 - kill whitespace at EOL
10 - new sentence, new line
11 ssh pages ok markus@
12
13
8a547250 1420030609
15 - (djm) Sync README.smartcard with OpenBSD -current
a1864983 16 - (djm) Re-merge OpenSC info into README.smartcard
8a547250 17
f5db6a03 1820030606
19 - (dtucker) [uidswap.c] Fix setreuid and add missing args to fatal(). ok djm@
20
02e2a074 2120030605
22 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
23 canohost.c changes.
688eed4a 24 - (djm) Implement paranoid priv dropping checks, based on:
25 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
26 Proceedings of USENIX Security Symposium 2002
d6bd2b5a 27 - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
52d58495 28 - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
57c917f8 29 - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
30 Patch from larsch@trustcenter.de
7b7f164b 31 - (djm) Bug #589 - scard-opensc: load only keys with a private keys
32 Patch from larsch@trustcenter.de
4ed465ec 33 - (dtucker) Add includes.h to fake-rfc2553.c so it will build.
e932f447 34 - (dtucker) Define EAI_NONAME in fake-rfc2553.h (used by fake-rfc2553.c).
02e2a074 35
b08a39ff 3620030604
d60e487c 37 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
38 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
8acdec60 39 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
11f1e60e 40 Patch from larsch@trustcenter.de; ok markus@
41 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
42 larsch@trustcenter.de; ok markus@
d453a600 43 - (djm) OpenBSD CVS Sync
44 - djm@cvs.openbsd.org 2003/06/04 08:25:18
45 [sshconnect.c]
46 disable challenge/response and keyboard-interactive auth methods
47 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
48 bz #580; ok markus@
ee50371d 49 - djm@cvs.openbsd.org 2003/06/04 10:23:48
50 [sshd.c]
51 remove duplicated group-dropping code; ok markus@
b08a39ff 52 - djm@cvs.openbsd.org 2003/06/04 12:03:59
53 [serverloop.c]
54 remove bitrotten commet; ok markus@
cf3248b8 55 - djm@cvs.openbsd.org 2003/06/04 12:18:49
56 [scp.c]
57 ansify; ok markus@
0f764b2f 58 - djm@cvs.openbsd.org 2003/06/04 12:40:39
59 [scp.c]
60 kill ssh process upon receipt of signal, bz #241.
61 based on patch from esb AT hawaii.edu; ok markus@
1b558925 62 - djm@cvs.openbsd.org 2003/06/04 12:41:22
63 [sftp.c]
64 kill ssh process on receipt of signal; ok markus@
fba33e81 65 - (djm) Update to fix of bug #584: lock card before return.
66 From larsch@trustcenter.de
8d9bb5dd 67 - (djm) Always use mysignal() for SIGALRM
d60e487c 68
3a2b2b44 6920030603
70 - (djm) Replace setproctitle replacement with code derived from
71 UCB sendmail
c5a7d788 72 - (djm) OpenBSD CVS Sync
73 - markus@cvs.openbsd.org 2003/06/02 09:17:34
74 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
75 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
76 [sshd_config.5]
77 deprecate VerifyReverseMapping since it's dangerous if combined
78 with IP based access control as noted by Mike Harding; replace with
79 a UseDNS option, UseDNS is on by default and includes the
80 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
81 ok deraadt@, djm@
d981089c 82 - millert@cvs.openbsd.org 2003/06/03 02:56:16
83 [scp.c]
84 Remove the advertising clause in the UCB license which Berkeley
85 rescinded 22 July 1999. Proofed by myself and Theo.
c5a7d788 86 - (djm) Fix portable-specific uses of verify_reverse_mapping too
3e67f7df 87 - (djm) Sync openbsd-compat with OpenBSD CVS.
484d59c7 88 - No more 4-term BSD licenses in linked code
5d8ca8c7 89 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
3a2b2b44 90
aff561f9 9120030602
92 - (djm) Fix segv from bad reordering in auth-pam.c
416c732d 93 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
94 clobber
1b7342ab 95 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
96 CVS ID.
8862e142 97 - (djm) Remove "noip6" option from RedHat spec file. This may now be
98 set at runtime using AddressFamily option.
58ba3cb7 99 - (djm) Fix use of macro before #define in cipher-aes.c
382fe2fa 100 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
b0545fe6 101 - (djm) OpenBSD CVS Sync
102 - djm@cvs.openbsd.org 2003/05/26 12:54:40
103 [sshconnect.c]
104 fix format strings; ok markus@
fa5120a0 105 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
106 [sshd.c uidswap.c]
107 seteuid and setegid; markus ok
0f92946c 108 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
109 [ssh_config.5]
110 VerifyHostKeyDNS is v2 only. ok markus@
aff561f9 111
4f178be8 11220030530
113 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
114 roumenpetrov.info
eabb99c6 115 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
4f178be8 116
4881aebb 11720030526
118 - (djm) Avoid auth2-chall.c warning when compiling without
119 PAM, BSD_AUTH and SKEY
120
5b0fe364 12120030525
122- (djm) OpenBSD CVS Sync
123 - djm@cvs.openbsd.org 2003/05/24 09:02:22
124 [log.c]
125 pass logged data through strnvis; ok markus
b9ed513a 126 - djm@cvs.openbsd.org 2003/05/24 09:30:40
127 [authfile.c monitor.c sftp-common.c sshpty.c]
128 cast some types for printing; ok markus@
5b0fe364 129
44c78996 13020030524
131 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
132
d83ebe4a 13320030523
134 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
135 encoding (which encodes many more characters)
bd47824b 136 - OpenBSD CVS Sync
137 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
138 [sftp.1]
139 - new sentence, new line
140 - added .Xr's
141 - typos
142 ok djm@
3cbc677d 143 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
144 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
145 new sentence, new line
da54f5be 146 - djm@cvs.openbsd.org 2003/05/23 08:29:30
147 [sshconnect.c]
148 fix leak; ok markus@
d83ebe4a 149
c453493f 15020030520
151 - (djm) OpenBSD CVS Sync
152 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
153 [log.c]
154 use syslog_r() in a signal handler called place; markus ok
79d4fc55 155 - (djm) Configure logic to detect syslog_r and friends
c453493f 156
acb50584 15720030519
158 - (djm) Sync auth-pam.h with what we actually implement
159
16020030518
5ff453c0 161 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
162 recent merge
f811e52a 163 - (djm) OpenBSD CVS Sync
164 - djm@cvs.openbsd.org 2003/05/16 03:27:12
165 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
166 add AddressFamily option to ssh_config (like -4, -6 on commandline).
167 Portable bug #534; ok markus@
013b1214 168 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
169 [auth-rhosts.c]
170 just in case, put numbers to sscanf %s arg.
25b66522 171 - markus@cvs.openbsd.org 2003/05/17 04:27:52
172 [cipher.c cipher-ctr.c myproposal.h]
173 experimental support for aes-ctr modes from
174 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
175 ok djm@
25351757 176 - (djm) Remove IPv4 by default hack now that we can specify AF in config
3bf784bc 177 - (djm) Tidy and trim TODO
bffa6723 178 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
9901cb37 179 - (djm) Big KNF on openbsd-compat/
f1da2b8b 180 - (djm) KNF on md5crypt.[ch]
181 - (djm) KNF on auth-sia.[ch]
5ff453c0 182
f123055b 18320030517
184 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
185
c936c243 18620030516
187 - (djm) OpenBSD CVS Sync
188 - djm@cvs.openbsd.org 2003/05/15 13:52:10
189 [ssh.c]
190 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
191 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
a2144546 192 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
193 [readconf.c servconf.c]
194 warn for unsupported config option. ok markus@
5bdfde81 195 - markus@cvs.openbsd.org 2003/05/15 14:09:21
196 [auth2-krb5.c]
197 fix 64bit issue; report itojun@
09ab3296 198 - djm@cvs.openbsd.org 2003/05/15 14:55:25
199 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
200 add a ConnectTimeout option to ssh, based on patch from
201 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
b06b11ad 202 - (djm) Add warning for UsePAM when built without PAM support
7be625e1 203 - (djm) A few type mismatch fixes from Bug #565
0eb6370a 204 - (djm) Guard free_pam_environment against NULL argument. Works around
205 HP/UX PAM problems debugged by dtucker
c936c243 206
7efc7f57 20720030515
208 - (djm) OpenBSD CVS Sync
209 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
210 [ssh-agent.1]
211 setup -> set up;
212 from wiz@netbsd
21289cd0 213 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
214 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
215 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
216 add experimental support for verifying hos keys using DNS as described
217 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
218 ok markus@ and henning@
16a79097 219 - markus@cvs.openbsd.org 2003/05/14 22:24:42
220 [clientloop.c session.c ssh.1]
221 allow to send a BREAK to the remote system; ok various
b8c2031b 222 - markus@cvs.openbsd.org 2003/05/15 00:28:28
223 [sshconnect2.c]
224 cleanup unregister of per-method packet handlers; ok djm@
d0ec7f42 225 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
226 [readconf.c readconf.h servconf.c servconf.h]
227 always parse kerberos options. ok djm@ markus@
b414a17b 228 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
229 [dns.c]
230 add missing freerrset
3b6e3da9 231 - markus@cvs.openbsd.org 2003/05/15 03:08:29
232 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
233 split out custom EVP ciphers
02159d9b 234 - djm@cvs.openbsd.org 2003/05/15 03:10:52
235 [ssh-keygen.c]
236 avoid warning; ok jakob@
4a26f5c5 237 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
238 [sftp-int.c]
239 Make put/get (globed and nonglobed) code more consistant. OK djm@
c44f10c6 240 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
dc69f53c 241 [sftp-int.c sftp.c]
c44f10c6 242 Teach ls how to display multiple column display and allow users
243 to return to single column format via 'ls -1'. OK @djm
1457e7ff 244 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
245 [readconf.c servconf.c]
246 disable kerberos when not supported. ok markus@
861f0365 247 - markus@cvs.openbsd.org 2003/05/15 04:08:41
248 [ssh.1]
249 ~B is ssh2 only
d0ec7f42 250 - (djm) Always parse UsePAM
3e05e934 251 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
4460d509 252 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
86ee6794 253 - (djm) Tidy Makefile clean targets
2636769c 254 - (djm) Adapt README.dns for portable
2d2e4a34 255 - (djm) Avoid uuencode.c warnings
1457e7ff 256 - (djm) Enable UsePAM when built --with-pam
67467c30 257 - (djm) Only build getrrsetbyname replacement when using --with-dns
f420d2ba 258 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
259 correctly)
3c49ef10 260 - (djm) Bug #444: Wrong paths after reconfigure
321735c7 261 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
f420d2ba 262
dd3ebb5a 26320030514
264 - (djm) Bug #117: Don't lie to PAM about username
0608f8a7 265 - (djm) RCSID sync w/ OpenBSD
204fde99 266 - (djm) OpenBSD CVS Sync
267 - djm@cvs.openbsd.org 2003/04/09 12:00:37
268 [readconf.c]
269 strip trailing whitespace from config lines before parsing.
270 Fixes bz 528; ok markus@
18ae3c67 271 - markus@cvs.openbsd.org 2003/04/12 10:13:57
272 [cipher.c]
273 hide cipher details; ok djm@
45c42d58 274 - markus@cvs.openbsd.org 2003/04/12 10:15:36
275 [misc.c]
276 debug->debug2
c825cd79 277 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
278 [ssh.1]
279 document -V switch, fix wording; ok markus@
3e131a6d 280 - markus@cvs.openbsd.org 2003/04/14 14:17:50
281 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
282 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
927e9f8b 283 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
284 [sftp-int.c]
285 Missing globfree(&g) in process_put() spotted by Vince Brimhall
286 <VBrimhall@novell.com>. ok@ Theo
287 - markus@cvs.openbsd.org 2003/04/16 14:35:27
288 [auth.h]
289 document struct Authctxt; with solar
b9e5aff6 290 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
291 [ssh-keyscan.c]
292 -t in usage(); rogier@quaak.org
9a26a6e2 293 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
294 [sshd.8 sshd_config.5]
295 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
296 Bug #550 and * escaping suggested by jmc@.
09dc8896 297 - david@cvs.openbsd.org 2003/04/30 20:41:07
298 [sshd.8]
299 fix invalid .Pf macro usage introduced in previous commit
300 ok jmc@ mouring@
3566c73c 301 - markus@cvs.openbsd.org 2003/05/11 16:56:48
302 [authfile.c ssh-keygen.c]
303 change key_load_public to try to read a public from:
304 rsa1 private or rsa1 public and ssh2 keys.
305 this makes ssh-keygen -e fail for ssh1 keys more gracefully
306 for example; report from itojun (netbsd pr 20550).
0d942eff 307 - markus@cvs.openbsd.org 2003/05/11 20:30:25
308 [channels.c clientloop.c serverloop.c session.c ssh.c]
309 make channel_new() strdup the 'remote_name' (not the caller); ok theo
43348518 310 - markus@cvs.openbsd.org 2003/05/12 16:55:37
311 [sshconnect2.c]
312 for pubkey authentication try the user keys in the following order:
313 1. agent keys that are found in the config file
314 2. other agent keys
315 3. keys that are only listed in the config file
316 this helps when an agent has many keys, where the server might
317 close the connection before the correct key is used. report & ok pb@
dc109cfe 318 - markus@cvs.openbsd.org 2003/05/12 18:35:18
319 [ssh-keyscan.1]
320 typo: DSA keys are of type ssh-dss; Brian Poole
81466908 321 - markus@cvs.openbsd.org 2003/05/14 00:52:59
322 [ssh2.h]
323 ranges for per auth method messages
324 - djm@cvs.openbsd.org 2003/05/14 01:00:44
325 [sftp.1]
326 emphasise the batchmode functionality and make reference to pubkey auth,
327 both of which are FAQs; ok markus@
802e01b8 328 - markus@cvs.openbsd.org 2003/05/14 02:15:47
329 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
330 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
331 server interops with commercial client; ok jakob@ djm@
72c5fe79 332 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
333 [sftp.1]
334 - better formatting in SYNOPSIS
335 - whitespace at EOL
336 ok djm@
3a39206f 337 - markus@cvs.openbsd.org 2003/05/14 08:57:49
338 [monitor.c]
339 http://bugzilla.mindrot.org/show_bug.cgi?id=560
340 Privsep child continues to run after monitor killed.
341 Pass monitor signals through to child; Darren Tucker
751092f9 342 - (djm) Make portable build with MIT krb5 (some issues remain)
7fceb20d 343 - (djm) Add new UsePAM configuration directive to allow runtime control
344 over usage of PAM. This allows non-root use of sshd when built with
345 --with-pam
817e6d38 346 - (djm) Die screaming if start_pam() is called when UsePAM=no
83ccf11a 347 - (djm) Avoid KrbV leak for MIT Kerberos
b1848832 348 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
fa065de2 349 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
dd3ebb5a 350
91f3aa9b 35120030512
352 - (djm) Redhat spec: Don't install profile.d scripts when not
353 building with GNOME/GTK askpass (patch from bet@rahul.net)
354
5def520a 35520030510
356 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
357 "make install". Patch by roth@feep.net.
ad84c479 358 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
359 problem on Linux (fixes "could not set controlling tty" errors).
05114c74 360 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
361 proper challenge-response module
23ab1f36 362 - (djm) 2-clause license on loginrec.c, with permission from
363 andre@ae-35.com
5def520a 364
43ce025d 36520030504
dd594f99 366 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
367 Patch from vinschen@redhat.com.
43ce025d 368
2cd5dbba 36920030503
370 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
371 by wendyp@cray.com.
372
bf7c1e6c 37320030502
374 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
375 privsep should now work.
73d9dad3 376 - (dtucker) Move handling of bad password authentications into a platform
990278ef 377 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
bf7c1e6c 378
68ece370 37920030429
380 - (djm) Add back radix.o (used by AFS support), after it went missing from
381 Makefile many moons ago
382 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
383 - (djm) Fix blibpath specification for AIX/gcc
384 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
385
ded9dd18 38620030428
387 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
388 hacked code.
389
aceb0423 39020030427
391 - (bal) Bug #541: return; was dropped by mistake. Reported by
392 furrier@iglou.com
c8a50a34 393 - (bal) Since we don't support platforms lacking u_int_64. We may
394 as well clean out some of those evil #ifdefs
9a6fee8b 395 - (bal) auth1.c minor resync while looking at the code.
d7cf277b 396 - (bal) auth2.c same changed as above.
aceb0423 397
0a626302 39820030409
399 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
400 from matth@eecs.berkeley.edu
d35929b5 401 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
ffd7b36b 402 - (djm) OpenBSD CVS Sync
403 - markus@cvs.openbsd.org 2003/04/02 09:48:07
404 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
405 [readconf.h serverloop.c sshconnect2.c]
406 reapply rekeying chage, tested by henning@, ok djm@
16f1b5ca 407 - markus@cvs.openbsd.org 2003/04/02 14:36:26
408 [ssh-keysign.c]
409 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
6c1bc5c5 410 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
411 [progressmeter.c]
412 $OpenBSD$
413 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
414 [progressmeter.c]
415 remove $OpenBSD$, as other *.c does not have it.
806e4c11 416 - markus@cvs.openbsd.org 2003/04/07 08:29:57
417 [monitor_wrap.c]
418 typo: get correct counters; introduced during rekeying change.
2f5b2528 419 - millert@cvs.openbsd.org 2003/04/07 21:58:05
420 [progressmeter.c]
421 The UCB copyright here is incorrect. This code did not originate
422 at UCB, it was written by Luke Mewburn. Updated the copyright at
423 the author's request. markus@ OK
424 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
425 [*.c *.h]
426 rename log() into logit() to avoid name conflict. markus ok, from
427 netbsd
428 - (djm) XXX - Performed locally using:
429 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
70e1f62f 430 - hin@cvs.openbsd.org 2003/04/09 08:23:52
431 [servconf.c]
432 Don't include <krb.h> when compiling with Kerberos 5 support
2f5b2528 433 - (djm) Fix up missing include for packet.c
a3568201 434 - (djm) Fix missed log => logit occurance (reference by function pointer)
0a626302 435
4d0cb2e5 43620030402
437 - (bal) if IP_TOS is not found or broken don't try to compile in
438 packet_set_tos() function call. bug #527
439
a4e5acef 44020030401
441 - (djm) OpenBSD CVS Sync
442 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
443 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
444 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
445 - killed whitespace
446 - new sentence new line
447 - .Bk for arguments
448 ok markus@
177f584b 449 - markus@cvs.openbsd.org 2003/04/01 10:10:23
450 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
451 [readconf.h serverloop.c sshconnect2.c]
452 rekeying bugfixes and automatic rekeying:
453 * both client and server rekey _automatically_
454 (a) after 2^31 packets, because after 2^32 packets
455 the sequence number for packets wraps
456 (b) after 2^(blocksize_in_bits/4) blocks
457 (see: draft-ietf-secsh-newmodes-00.txt)
458 (a) and (b) are _enabled_ by default, and only disabled for known
459 openssh versions, that don't support rekeying properly.
460 * client option 'RekeyLimit'
461 * do not reply to requests during rekeying
462 - markus@cvs.openbsd.org 2003/04/01 10:22:21
463 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
464 [readconf.h serverloop.c sshconnect2.c]
465 backout rekeying changes (for 3.6.1)
519bdfe8 466 - markus@cvs.openbsd.org 2003/04/01 10:31:26
467 [compat.c compat.h kex.c]
468 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
469 tested by ho@ and myself
9dd240a3 470 - markus@cvs.openbsd.org 2003/04/01 10:56:46
471 [version.h]
472 3.6.1
ac01b518 473 - (djm) Crank spec file versions
b32453fe 474 - (djm) Release 3.6.1p1
a4e5acef 475
fd77a40f 47620030326
477 - (djm) OpenBSD CVS Sync
478 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
479 [sftp-server.c]
480 one last fix to the tree: race fix broke stuff; pr 3169;
481 srp@srparish.net, help from djm
482
8021857c 48320030325
484 - (djm) Fix getpeerid support for 64 bit BE systems. From
485 Arnd Bergmann <arndb@de.ibm.com>
486
cdb64c4d 48720030324
488 - (djm) OpenBSD CVS Sync
489 - markus@cvs.openbsd.org 2003/03/23 19:02:00
490 [monitor.c]
491 unbreak rekeying for privsep; ok millert@
492 - Release 3.6p1
62086365 493 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
494 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
cdb64c4d 495
0b202697 496$Id$
This page took 0.367755 seconds and 5 git commands to generate.