]>
Commit | Line | Data |
---|---|---|
7bb526ce | 1 | 20030108 |
2 | - (djm) Sync openbsd-compat/ with OpenBSD -current | |
93c63b8d | 3 | - (djm) Avoid redundant xstrdup/xfree in auth2-pam.c. From Solar via markus@ |
faa483fa | 4 | - (djm) OpenBSD CVS Sync |
5 | - markus@cvs.openbsd.org 2003/01/01 18:08:52 | |
6 | [channels.c] | |
7 | move big output buffer messages to debug2 | |
bfd934b9 | 8 | - djm@cvs.openbsd.org 2003/01/06 23:51:22 |
9 | [sftp-client.c] | |
10 | Fix "get -p" download to not add user-write perm. mindrot bug #426 | |
11 | reported by gfernandez@livevault.com; ok markus@ | |
7bb526ce | 12 | |
e7ccd20d | 13 | 20030107 |
14 | - (djm) Bug #401: Work around Linux breakage with IPv6 mapped addresses. | |
15 | Based on fix from yoshfuji@linux-ipv6.org | |
e2ef2342 | 16 | - (djm) Bug #442: Check for and deny access to accounts with locked |
17 | passwords. Patch from dtucker@zip.com.au | |
70e7d0b0 | 18 | - (djm) Bug #26: Use local mkstemp() rather than glibc's silly one. Fixes |
19 | Can't pass KRB4 TGT passing. Fix from: jan.iven@cern.ch | |
93a9a35a | 20 | - (djm) Fix Bug #442 for PAM case |
ed05a983 | 21 | - (djm) Bug #110: bogus error messages in lastlog_get_entry(). Fix based |
22 | on one by peak@argo.troja.mff.cuni.cz | |
63cada0a | 23 | - (djm) Bug #111: Run syslog and stderr logging through strnvis to eliminate |
24 | nasties. Report from peak@argo.troja.mff.cuni.cz | |
99f4fb69 | 25 | - (djm) Bug #178: On AIX /etc/nologin wasnt't shown to users. Fix from |
26 | Ralf.Wenk@fh-karlsruhe.de and dtucker@zip.com.au | |
b57c8e20 | 27 | - (djm) Fix my fix of the fix for the Bug #442 for PAM case. Spotted by |
28 | dtucker@zip.com.au. Reorder for clarity too. | |
e7ccd20d | 29 | |
9300be60 | 30 | 20030103 |
31 | - (djm) Bug #461: ssh-copy-id fails with no arguments. Patch from | |
32 | cjwatson@debian.org | |
9746ee4b | 33 | - (djm) Bug #460: Filling utmp[x]->ut_addr_v6 if present. Patch from |
34 | cjwatson@debian.org | |
17ed08c5 | 35 | - (djm) Bug #446: Set LOGIN env var to pw_name on AIX. Patch from |
36 | mii@ornl.gov | |
37 | ||
d4ac26ed | 38 | 20030101 |
39 | - (stevesk) [session.c sshlogin.c sshlogin.h] complete portable | |
40 | parts of pass addrlen with sockaddr * fix. | |
41 | from Hajimu UMEMOTO <ume@FreeBSD.org> | |
42 | ||
378d9956 | 43 | 20021222 |
44 | - (bal) OpenBSD CVS Sync | |
45 | - fgsch@cvs.openbsd.org 2002/11/15 10:03:09 | |
46 | [authfile.c] | |
47 | lseek(2) may return -1 when getting the public/private key lenght. | |
48 | Simplify the code and check for errors using fstat(2). | |
49 | ||
50 | Problem reported by Mauricio Sanchez, markus@ ok. | |
3c93c917 | 51 | - markus@cvs.openbsd.org 2002/11/18 16:43:44 |
52 | [clientloop.c] | |
53 | don't overwrite SIG{INT,QUIT,TERM} handler if set to SIG_IGN; | |
54 | e.g. if ssh is used for backup; report Joerg Schilling; ok millert@ | |
35efb24c | 55 | - markus@cvs.openbsd.org 2002/11/21 22:22:50 |
56 | [dh.c] | |
57 | debug->debug2 | |
a77673cc | 58 | - markus@cvs.openbsd.org 2002/11/21 22:45:31 |
59 | [cipher.c kex.c packet.c sshconnect.c sshconnect2.c] | |
60 | debug->debug2, unify debug messages | |
b77a87e5 | 61 | - deraadt@cvs.openbsd.org 2002/11/21 23:03:51 |
62 | [auth-krb5.c auth1.c hostfile.h monitor_wrap.c sftp-client.c sftp-int.c ssh-add.c ssh-rsa.c | |
63 | sshconnect.c] | |
64 | KNF | |
556f1c05 | 65 | - markus@cvs.openbsd.org 2002/11/21 23:04:33 |
83bbc162 | 66 | [ssh.c] |
67 | debug->debug2 | |
556f1c05 | 68 | - stevesk@cvs.openbsd.org 2002/11/24 21:46:24 |
eef52fa7 | 69 | [ssh-keysign.8] |
70 | typo: "the the" | |
6d58d81e | 71 | - wcobb@cvs.openbsd.org 2002/11/26 00:45:03 |
72 | [scp.c ssh-keygen.c] | |
73 | Remove unnecessary fflush(stderr) calls, stderr is unbuffered by default. | |
74 | ok markus@ | |
556f1c05 | 75 | - stevesk@cvs.openbsd.org 2002/11/26 02:35:30 |
63baa058 | 76 | [ssh-keygen.1] |
77 | remove outdated statement; ok markus@ deraadt@ | |
649bb60b | 78 | - stevesk@cvs.openbsd.org 2002/11/26 02:38:54 |
79 | [canohost.c] | |
80 | KNF, comment and error message repair; ok markus@ | |
15748b4d | 81 | - markus@cvs.openbsd.org 2002/11/27 17:53:35 |
82 | [scp.c sftp.c ssh.c] | |
83 | allow usernames with embedded '@', e.g. scp user@vhost@realhost:file /tmp; | |
84 | http://bugzilla.mindrot.org/show_bug.cgi?id=447; ok mouring@, millert@ | |
fe661d8f | 85 | - stevesk@cvs.openbsd.org 2002/12/04 04:36:47 |
86 | [session.c] | |
87 | remove xauth entries before add; PR 2994 from janjaap@stack.nl. | |
88 | ok markus@ | |
a0a14bcd | 89 | - markus@cvs.openbsd.org 2002/12/05 11:08:35 |
90 | [scp.c] | |
91 | use roundup() similar to rcp/util.c and avoid problems with strange | |
92 | filesystem block sizes, noted by tjr@freebsd.org; ok djm@ | |
556f1c05 | 93 | - djm@cvs.openbsd.org 2002/12/06 05:20:02 |
2ea16b0b | 94 | [sftp.1] |
95 | Fix cut'n'paste error, spotted by matthias.riese@b-novative.de; ok deraadt@ | |
978ebf99 | 96 | - millert@cvs.openbsd.org 2002/12/09 16:50:30 |
97 | [ssh.c] | |
98 | Avoid setting optind to 0 as GNU getopt treats that like we do optreset. | |
99 | markus@ OK | |
32214c88 | 100 | - markus@cvs.openbsd.org 2002/12/10 08:56:00 |
101 | [session.c] | |
102 | Make sure $SHELL points to the shell from the password file, even if shell | |
103 | is overridden from login.conf; bug#453; semen at online.sinor.ru; ok millert@ | |
48f636b2 | 104 | - markus@cvs.openbsd.org 2002/12/10 19:26:50 |
105 | [packet.c] | |
106 | move tos handling to packet_set_tos; ok provos/henning/deraadt | |
9e637910 | 107 | - markus@cvs.openbsd.org 2002/12/10 19:47:14 |
108 | [packet.c] | |
109 | static | |
6226a8f8 | 110 | - markus@cvs.openbsd.org 2002/12/13 10:03:15 |
111 | [channels.c misc.c sshconnect2.c] | |
112 | cleanup debug messages, more useful information for the client user. | |
556f1c05 | 113 | - markus@cvs.openbsd.org 2002/12/13 15:20:52 |
114 | [scp.c] | |
115 | 1) include stalling time in total time | |
116 | 2) truncate filenames to 45 instead of 20 characters | |
117 | 3) print rate instead of progress bar, no more stars | |
118 | 4) scale output to tty width | |
119 | based on a patch from Niels; ok fries@ lebel@ fgs@ millert@ | |
3075ac59 | 120 | - (bal) [msg.c msg.h scp.c ssh-keysign.c sshconnect2.c] Resync CVS IDs since |
121 | we already did s/msg_send/ssh_msg_send/ | |
378d9956 | 122 | |
a76550cf | 123 | 20021205 |
124 | - (djm) PERL-free fixpaths from stuge-openssh-unix-dev@cdy.org | |
125 | ||
d9a4e55b | 126 | 20021122 |
127 | - (tim) [configure.ac] fix STDPATH test for IRIX. First reported by | |
128 | advax@triumf.ca. This type of solution tested by <herb@sgi.com> | |
129 | ||
f825dbf4 | 130 | 20021113 |
131 | - (tim) [configure.ac] remove unused variables no_libsocket and no_libnsl | |
132 | ||
17d429bb | 133 | 20021111 |
134 | - (tim) [contrib/solaris/opensshd.in] add umask 022 so sshd.pid is | |
135 | not world writable. | |
136 | ||
c9826b28 | 137 | 20021109 |
138 | - (bal) OpenBSD CVS Sync | |
139 | - itojun@cvs.openbsd.org 2002/10/16 14:31:48 | |
140 | [sftp-common.c] | |
141 | 64bit pedant. %llu is "unsigned long long". markus ok | |
2fe3c2db | 142 | - markus@cvs.openbsd.org 2002/10/23 10:32:13 |
143 | [packet.c] | |
144 | use %u for u_int | |
358b576b | 145 | - markus@cvs.openbsd.org 2002/10/23 10:40:16 |
146 | [bufaux.c] | |
147 | %u for u_int | |
f6f02456 | 148 | - markus@cvs.openbsd.org 2002/11/04 10:07:53 |
149 | [auth.c] | |
150 | don't compare against pw_home if realpath fails for pw_home (seen | |
151 | on AFS); ok djm@ | |
2ccb7bde | 152 | - markus@cvs.openbsd.org 2002/11/04 10:09:51 |
153 | [packet.c] | |
154 | log before send disconnect; ok djm@ | |
39e71188 | 155 | - markus@cvs.openbsd.org 2002/11/05 19:45:20 |
156 | [monitor.c] | |
157 | handle overflows for size_t larger than u_int; siw@goneko.de, bug #425 | |
9db1a8e9 | 158 | - markus@cvs.openbsd.org 2002/11/05 20:10:37 |
159 | [sftp-client.c] | |
160 | typo; GaryF@livevault.com | |
51efad8c | 161 | - markus@cvs.openbsd.org 2002/11/07 16:28:47 |
162 | [sshd.c] | |
163 | log to stderr if -ie is given, bug #414, prj@po.cwru.edu | |
cc46e2ee | 164 | - markus@cvs.openbsd.org 2002/11/07 22:08:07 |
165 | [readconf.c readconf.h ssh-keysign.8 ssh-keysign.c] | |
166 | we cannot use HostbasedAuthentication for enabling ssh-keysign(8), | |
167 | because HostbasedAuthentication might be enabled based on the | |
168 | target host and ssh-keysign(8) does not know the remote hostname | |
169 | and not trust ssh(1) about the hostname, so we add a new option | |
170 | EnableSSHKeysign; ok djm@, report from zierke@informatik.uni-hamburg.de | |
252d1a24 | 171 | - markus@cvs.openbsd.org 2002/11/07 22:35:38 |
172 | [scp.c] | |
173 | check exit status from ssh, and exit(1) if ssh fails; bug#369; | |
174 | binder@arago.de | |
f00addc9 | 175 | - (bal) Update ssh-host-config and minor rewrite of bsd-cygwin_util.c |
176 | ntsec now default if cygwin version beginning w/ version 56. Patch | |
177 | by Corinna Vinschen <vinschen@redhat.com> | |
819d3f09 | 178 | - (bal) AIX does not log login attempts for unknown users (bug #432). |
179 | patch by dtucker@zip.com.au | |
c9826b28 | 180 | |
4e6f1c4f | 181 | 20021021 |
f0e27f3d | 182 | - (djm) Bug #400: Kill ssh-rand-helper children on timeout, patch from |
183 | dtucker@zip.com.au | |
cacd2e7a | 184 | - (djm) Bug #317: FreeBSD needs libutil.h for openpty() Report from |
185 | dirk.meyer@dinoex.sub.org | |
4e6f1c4f | 186 | |
f3e87063 | 187 | 20021015 |
188 | - (bal) Fix bug id 383 and only call loginrestrict for AIX if not root. | |
08412d26 | 189 | - (bal) More advanced strsep test by Darren Tucker <dtucker@zip.com.au> |
f3e87063 | 190 | |
57872969 | 191 | 20021015 |
192 | - (tim) [contrib/caldera/openssh.spec] make ssh-agent setgid nobody | |
193 | ||
6af8f131 | 194 | 20021004 |
195 | - (bal) Disable post-authentication Privsep for OSF/1. It conflicts with | |
196 | SIA. | |
197 | ||
e139021d | 198 | 20021003 |
199 | - (djm) OpenBSD CVS Sync | |
200 | - markus@cvs.openbsd.org 2002/10/01 20:34:12 | |
201 | [ssh-agent.c] | |
202 | allow root to access the agent, since there is no protection from root. | |
886cd2bb | 203 | - markus@cvs.openbsd.org 2002/10/01 13:24:50 |
204 | [version.h] | |
205 | OpenSSH 3.5 | |
0855868a | 206 | - (djm) Bump RPM spec version numbers |
e987fdbe | 207 | - (djm) Bug #406: s/msg_send/ssh_msg_send/ for Mac OS X 1.2 |
e139021d | 208 | |
1d677676 | 209 | 20020930 |
9a87e2ac | 210 | - (djm) Tidy contrib/, add Makefile for GNOME passphrase dialogs, |
211 | tweak README | |
212 | - (djm) OpenBSD CVS Sync | |
213 | - mickey@cvs.openbsd.org 2002/09/27 10:42:09 | |
214 | [compat.c compat.h sshd.c] | |
215 | add a generic match for a prober, such as sie big brother; | |
216 | idea from stevesk@; markus@ ok | |
05960cf0 | 217 | - stevesk@cvs.openbsd.org 2002/09/27 15:46:21 |
218 | [ssh.1] | |
219 | clarify compression level protocol 1 only; ok markus@ deraadt@ | |
1d677676 | 220 | |
0d3d0e82 | 221 | 20020927 |
222 | - (djm) OpenBSD CVS Sync | |
223 | - markus@cvs.openbsd.org 2002/09/25 11:17:16 | |
224 | [sshd_config] | |
225 | sync LoginGraceTime with default | |
26b9a3d2 | 226 | - markus@cvs.openbsd.org 2002/09/25 15:19:02 |
227 | [sshd.c] | |
228 | typo; pilot@monkey.org | |
2db9d8aa | 229 | - markus@cvs.openbsd.org 2002/09/26 11:38:43 |
230 | [auth1.c auth.h auth-krb4.c monitor.c monitor.h monitor_wrap.c] | |
231 | [monitor_wrap.h] | |
232 | krb4 + privsep; ok dugsong@, deraadt@ | |
0d3d0e82 | 233 | |
b7c4a4cc | 234 | 20020925 |
235 | - (bal) Fix issue where successfull login does not clear failure counts | |
236 | in AIX. Patch by dtucker@zip.com.au ok by djm | |
ef51930f | 237 | - (tim) Cray fixes (bug 367) based on patch from Wendy Palm @ cray. |
238 | This does not include the deattack.c fixes. | |
b7c4a4cc | 239 | |
99443922 | 240 | 20020923 |
241 | - (djm) OpenBSD CVS Sync | |
242 | - stevesk@cvs.openbsd.org 2002/09/23 20:46:27 | |
243 | [canohost.c] | |
244 | change get_peer_ipaddr() and get_local_ipaddr() to not return NULL for | |
245 | non-sockets; fixes a problem passing NULL to snprintf(). ok markus@ | |
0082ad34 | 246 | - markus@cvs.openbsd.org 2002/09/23 22:11:05 |
247 | [monitor.c] | |
248 | only call auth_krb5 if kerberos is enabled; ok deraadt@ | |
4741e3a6 | 249 | - markus@cvs.openbsd.org 2002/09/24 08:46:04 |
250 | [monitor.c] | |
251 | only call kerberos code for authctxt->valid | |
cb11b555 | 252 | - todd@cvs.openbsd.org 2002/09/24 20:59:44 |
253 | [sshd.8] | |
254 | tweak the example $HOME/.ssh/rc script to not show on any cmdline the | |
255 | sensitive data it handles. This fixes bug # 402 as reported by | |
256 | kolya@mit.edu (Nickolai Zeldovich). | |
257 | ok markus@ and stevesk@ | |
99443922 | 258 | |
aec4cb4f | 259 | 20020923 |
260 | - (tim) [configure.ac] s/return/exit/ patch by dtucker@zip.com.au | |
261 | ||
f86b0eef | 262 | 20020922 |
263 | - (djm) OpenBSD CVS Sync | |
264 | - stevesk@cvs.openbsd.org 2002/09/19 14:53:14 | |
265 | [compat.c] | |
c7724abb | 266 | - markus@cvs.openbsd.org 2002/09/19 15:51:23 |
267 | [ssh-add.c] | |
268 | typo; cd@kalkatraz.de | |
00e842d8 | 269 | - stevesk@cvs.openbsd.org 2002/09/19 16:03:15 |
270 | [serverloop.c] | |
271 | log IP address also; ok markus@ | |
c2802d92 | 272 | - stevesk@cvs.openbsd.org 2002/09/20 18:41:29 |
273 | [auth.c] | |
274 | log illegal user here for missing privsep case (ssh2). | |
275 | this is executed in the monitor. ok markus@ | |
f86b0eef | 276 | |
792e7d2d | 277 | 20020919 |
278 | - (djm) OpenBSD CVS Sync | |
279 | - stevesk@cvs.openbsd.org 2002/09/12 19:11:52 | |
280 | [ssh-agent.c] | |
281 | %u for uid print; ok markus@ | |
da0561eb | 282 | - stevesk@cvs.openbsd.org 2002/09/12 19:50:36 |
283 | [session.c ssh.1] | |
284 | add SSH_CONNECTION and deprecate SSH_CLIENT; bug #384. ok markus@ | |
facfd613 | 285 | - stevesk@cvs.openbsd.org 2002/09/13 19:23:09 |
286 | [channels.c sshconnect.c sshd.c] | |
287 | remove use of SO_LINGER, it should not be needed. error check | |
288 | SO_REUSEADDR. fixup comments. ok markus@ | |
8bd4e2ae | 289 | - stevesk@cvs.openbsd.org 2002/09/16 19:55:33 |
290 | [session.c] | |
291 | log when _PATH_NOLOGIN exists; ok markus@ | |
e6fe1bab | 292 | - stevesk@cvs.openbsd.org 2002/09/16 20:12:11 |
293 | [sshd_config.5] | |
294 | more details on X11Forwarding security issues and threats; ok markus@ | |
f1dcc34e | 295 | - stevesk@cvs.openbsd.org 2002/09/16 22:03:13 |
296 | [sshd.8] | |
297 | reference moduli(5) in FILES /etc/moduli. | |
5c0d0e90 | 298 | - itojun@cvs.openbsd.org 2002/09/17 07:47:02 |
299 | [channels.c] | |
300 | don't quit while creating X11 listening socket. | |
301 | http://mail-index.netbsd.org/current-users/2002/09/16/0005.html | |
302 | got from portable. markus ok | |
6939bbd4 | 303 | - djm@cvs.openbsd.org 2002/09/19 01:58:18 |
304 | [ssh.c sshconnect.c] | |
305 | bugzilla.mindrot.org #223 - ProxyCommands don't exit. | |
306 | Patch from dtucker@zip.com.au; ok markus@ | |
792e7d2d | 307 | |
4f3834e8 | 308 | 20020912 |
eee2215e | 309 | - (djm) Made GNOME askpass programs return non-zero if cancel button is |
310 | pressed. | |
10a560d4 | 311 | - (djm) Added getpeereid() replacement. Properly implemented for systems |
312 | with SO_PEERCRED support. Faked for systems which lack it. | |
9fd2a215 | 313 | - (djm) Sync sys/tree.h with OpenBSD -current. Rename tree.h and |
314 | fake-queue.h to sys-tree.h and sys-queue.h | |
4f3834e8 | 315 | - (djm) OpenBSD CVS Sync |
316 | - markus@cvs.openbsd.org 2002/09/08 20:24:08 | |
317 | [hostfile.h] | |
318 | no comma at end of enumerator list | |
696f6bef | 319 | - itojun@cvs.openbsd.org 2002/09/09 06:48:06 |
320 | [auth1.c auth.h auth-krb5.c monitor.c monitor.h] | |
321 | [monitor_wrap.c monitor_wrap.h] | |
322 | kerberos support for privsep. confirmed to work by lha@stacken.kth.se | |
323 | patch from markus | |
661e45a0 | 324 | - markus@cvs.openbsd.org 2002/09/09 14:54:15 |
325 | [channels.c kex.h key.c monitor.c monitor_wrap.c radix.c uuencode.c] | |
326 | signed vs unsigned from -pedantic; ok henning@ | |
87f4111f | 327 | - markus@cvs.openbsd.org 2002/09/10 20:24:47 |
328 | [ssh-agent.c] | |
329 | check the euid of the connecting process with getpeereid(2); | |
330 | ok provos deraadt stevesk | |
07d688d5 | 331 | - stevesk@cvs.openbsd.org 2002/09/11 17:55:03 |
332 | [ssh.1] | |
333 | add agent and X11 forwarding warning text from ssh_config.5; ok markus@ | |
8b10e20e | 334 | - stevesk@cvs.openbsd.org 2002/09/11 18:27:26 |
335 | [authfd.c authfd.h ssh.c] | |
336 | don't connect to agent to test for presence if we've previously | |
337 | connected; ok markus@ | |
00b3ad3e | 338 | - djm@cvs.openbsd.org 2002/09/11 22:41:50 |
339 | [sftp.1 sftp-client.c sftp-client.h sftp-common.c sftp-common.h] | |
340 | [sftp-glob.c sftp-glob.h sftp-int.c sftp-server.c] | |
341 | support for short/long listings and globbing in "ls"; ok markus@ | |
be0cd512 | 342 | - djm@cvs.openbsd.org 2002/09/12 00:13:06 |
343 | [sftp-int.c] | |
344 | zap unused var introduced in last commit | |
4f3834e8 | 345 | |
ac8802eb | 346 | 20020911 |
347 | - (djm) Sync openbsd-compat with OpenBSD -current | |
348 | ||
e2e36358 | 349 | 20020910 |
350 | - (djm) Bug #365: Read /.ssh/environment properly under CygWin. | |
351 | Patch from Mark Bradshaw <bradshaw@staff.crosswalk.com> | |
35c4faf5 | 352 | - (djm) Bug #138: Make protocol 1 blowfish work with old OpenSSL. |
353 | Patch from Robert Halubek <rob@adso.com.pl> | |
e2e36358 | 354 | |
3445ca02 | 355 | 20020905 |
356 | - (djm) OpenBSD CVS Sync | |
357 | - stevesk@cvs.openbsd.org 2002/09/04 18:52:42 | |
358 | [servconf.c sshd.8 sshd_config.5] | |
359 | default LoginGraceTime to 2m; 1m may be too short for slow systems. | |
360 | ok markus@ | |
cbecf1ed | 361 | - (djm) Merge openssh-TODO.patch from Redhat (null) beta |
c4ee4c60 | 362 | - (djm) Add gnome-ssh-askpass2.c (gtk2) by merge with patch from |
363 | Nalin Dahyabhai <nalin@redhat.com> | |
3c1dff28 | 364 | - (djm) Add support for building gtk2 password requestor from Redhat beta |
3445ca02 | 365 | |
954640a4 | 366 | 20020903 |
33e2e066 | 367 | - (djm) Patch from itojun@ for Darwin OS: test getaddrinfo, reorder libcrypt |
e18b7d35 | 368 | - (djm) Fix Redhat RPM build dependancy test |
954640a4 | 369 | - (djm) OpenBSD CVS Sync |
370 | - markus@cvs.openbsd.org 2002/08/12 10:46:35 | |
371 | [ssh-agent.c] | |
372 | make ssh-agent setgid, disallow ptrace. | |
755c4339 | 373 | - espie@cvs.openbsd.org 2002/08/21 11:20:59 |
374 | [sshd.8] | |
375 | `RSA' updated to refer to `public key', where it matters. | |
376 | okay markus@ | |
6e0fbda1 | 377 | - stevesk@cvs.openbsd.org 2002/08/21 19:38:06 |
378 | [servconf.c sshd.8 sshd_config sshd_config.5] | |
379 | change LoginGraceTime default to 1 minute; ok mouring@ markus@ | |
00e41835 | 380 | - stevesk@cvs.openbsd.org 2002/08/21 20:10:28 |
381 | [ssh-agent.c] | |
382 | raise listen backlog; ok markus@ | |
c1a4eef1 | 383 | - stevesk@cvs.openbsd.org 2002/08/22 19:27:53 |
384 | [ssh-agent.c] | |
385 | use common close function; ok markus@ | |
1d77f8cb | 386 | - stevesk@cvs.openbsd.org 2002/08/22 19:38:42 |
387 | [clientloop.c] | |
388 | format with current EscapeChar; bugzilla #388 from wknox@mitre.org. | |
389 | ok markus@ | |
f34ec885 | 390 | - stevesk@cvs.openbsd.org 2002/08/22 20:57:19 |
391 | [ssh-agent.c] | |
392 | shutdown(SHUT_RDWR) not needed before close here; ok markus@ | |
848bf884 | 393 | - markus@cvs.openbsd.org 2002/08/22 21:33:58 |
394 | [auth1.c auth2.c] | |
395 | auth_root_allowed() is handled by the monitor in the privsep case, | |
396 | so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325 | |
6c723e7c | 397 | - markus@cvs.openbsd.org 2002/08/22 21:45:41 |
398 | [session.c] | |
399 | send signal name (not signal number) in "exit-signal" message; noticed | |
400 | by galb@vandyke.com | |
b41baf4d | 401 | - stevesk@cvs.openbsd.org 2002/08/27 17:13:56 |
402 | [ssh-rsa.c] | |
403 | RSA_public_decrypt() returns -1 on error so len must be signed; | |
404 | ok markus@ | |
dbcdea68 | 405 | - stevesk@cvs.openbsd.org 2002/08/27 17:18:40 |
406 | [ssh_config.5] | |
407 | some warning text for ForwardAgent and ForwardX11; ok markus@ | |
ba1566dd | 408 | - stevesk@cvs.openbsd.org 2002/08/29 15:57:25 |
409 | [monitor.c session.c sshlogin.c sshlogin.h] | |
410 | pass addrlen with sockaddr *; from Hajimu UMEMOTO <ume@FreeBSD.org> | |
411 | NOTE: there are also p-specific parts to this patch. ok markus@ | |
e59404d1 | 412 | - stevesk@cvs.openbsd.org 2002/08/29 16:02:54 |
413 | [ssh.1 ssh.c] | |
414 | deprecate -P as UsePrivilegedPort defaults to no now; ok markus@ | |
878b8992 | 415 | - stevesk@cvs.openbsd.org 2002/08/29 16:09:02 |
416 | [ssh_config.5] | |
417 | more on UsePrivilegedPort and setuid root; ok markus@ | |
9f324470 | 418 | - stevesk@cvs.openbsd.org 2002/08/29 19:49:42 |
419 | [ssh.c] | |
420 | shrink initial privilege bracket for setuid case; ok markus@ | |
57ff5eeb | 421 | - stevesk@cvs.openbsd.org 2002/08/29 22:54:10 |
422 | [ssh_config.5 sshd_config.5] | |
423 | state XAuthLocation is a full pathname | |
954640a4 | 424 | |
b85698ab | 425 | 20020820 |
426 | - OpenBSD CVS Sync | |
427 | - millert@cvs.openbsd.org 2002/08/02 14:43:15 | |
428 | [monitor.c monitor_mm.c] | |
429 | Change mm_zalloc() sanity checks to be more in line with what | |
430 | we do in calloc() and add a check to monitor_mm.c. | |
431 | OK provos@ and markus@ | |
6a342527 | 432 | - marc@cvs.openbsd.org 2002/08/02 16:00:07 |
433 | [ssh.1 sshd.8] | |
434 | note that .ssh/environment is only read when | |
435 | allowed (PermitUserEnvironment in sshd_config). | |
436 | OK markus@ | |
4004c2ac | 437 | - markus@cvs.openbsd.org 2002/08/02 21:23:41 |
438 | [ssh-rsa.c] | |
439 | diff is u_int (2x); ok deraadt/provos | |
0caf874a | 440 | - markus@cvs.openbsd.org 2002/08/02 22:20:30 |
441 | [ssh-rsa.c] | |
442 | replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser | |
443 | for authentication; ok deraadt/djm | |
75cf7563 | 444 | - aaron@cvs.openbsd.org 2002/08/08 13:50:23 |
445 | [sshconnect1.c] | |
446 | Use & to test if bits are set, not &&; markus@ ok. | |
d6097023 | 447 | - stevesk@cvs.openbsd.org 2002/08/08 23:54:52 |
448 | [auth.c] | |
449 | typo in comment | |
36535ee6 | 450 | - stevesk@cvs.openbsd.org 2002/08/09 17:21:42 |
451 | [sshd_config.5] | |
452 | use Op for mdoc conformance; from esr@golux.thyrsus.com | |
453 | ok aaron@ | |
b3641662 | 454 | - stevesk@cvs.openbsd.org 2002/08/09 17:41:12 |
455 | [sshd_config.5] | |
456 | proxy vs. fake display | |
35453849 | 457 | - stevesk@cvs.openbsd.org 2002/08/12 17:30:35 |
458 | [ssh.1 sshd.8 sshd_config.5] | |
459 | more PermitUserEnvironment; ok markus@ | |
24794905 | 460 | - stevesk@cvs.openbsd.org 2002/08/17 23:07:14 |
461 | [ssh.1] | |
462 | ForwardAgent has defaulted to no for over 2 years; be more clear here. | |
4dcbbeea | 463 | - stevesk@cvs.openbsd.org 2002/08/17 23:55:01 |
464 | [ssh_config.5] | |
465 | ordered list here | |
7d3b91a6 | 466 | - (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assign |
467 | it to ULONG_MAX. | |
b85698ab | 468 | |
cd018561 | 469 | 20020813 |
470 | - (tim) [configure.ac] Display OpenSSL header/library version. | |
471 | Patch by dtucker@zip.com.au | |
472 | ||
8a48a7ef | 473 | 20020731 |
474 | - (bal) OpenBSD CVS Sync | |
475 | - markus@cvs.openbsd.org 2002/07/24 16:11:18 | |
476 | [hostfile.c hostfile.h sshconnect.c] | |
477 | print out all known keys for a host if we get a unknown host key, | |
478 | see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4 | |
479 | ||
480 | the ssharp mitm tool attacks users in a similar way, so i'd like to | |
481 | pointed out again: | |
482 | A MITM attack is always possible if the ssh client prints: | |
483 | The authenticity of host 'bla' can't be established. | |
484 | (protocol version 2 with pubkey authentication allows you to detect | |
485 | MITM attacks) | |
5cb5518b | 486 | - mouring@cvs.openbsd.org 2002/07/25 01:16:59 |
487 | [sftp.c] | |
488 | FallBackToRsh does not exist anywhere else. Remove it from here. | |
489 | OK deraadt. | |
567a05bf | 490 | - markus@cvs.openbsd.org 2002/07/29 18:57:30 |
491 | [sshconnect.c] | |
492 | print file:line | |
f00bab84 | 493 | - markus@cvs.openbsd.org 2002/07/30 17:03:55 |
494 | [auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5] | |
495 | add PermitUserEnvironment (off by default!); from dot@dotat.at; | |
496 | ok provos, deraadt | |
8a48a7ef | 497 | |
13979d47 | 498 | 20020730 |
499 | - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de | |
500 | ||
d228d9dd | 501 | 20020728 |
502 | - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar | |
16c4a972 | 503 | - (stevesk) [CREDITS] solar |
75131bbd | 504 | - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned |
505 | char arg. | |
d228d9dd | 506 | |
d40af5fa | 507 | 20020725 |
508 | - (djm) Remove some cruft from INSTALL | |
d91b4743 | 509 | - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/ |
d40af5fa | 510 | |
56b54901 | 511 | 20020723 |
512 | - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger. | |
918ffb0b | 513 | - (bal) sync ID w/ ssh-agent.c |
516f0d7d | 514 | - (bal) OpenBSD Sync |
515 | - markus@cvs.openbsd.org 2002/07/19 15:43:33 | |
516 | [log.c log.h session.c sshd.c] | |
517 | remove fatal cleanups after fork; based on discussions with and code | |
518 | from solar. | |
5d185586 | 519 | - stevesk@cvs.openbsd.org 2002/07/19 17:42:40 |
520 | [ssh.c] | |
521 | display a warning from ssh when XAuthLocation does not exist or xauth | |
522 | returned no authentication data. ok markus@ | |
30998af1 | 523 | - stevesk@cvs.openbsd.org 2002/07/21 18:32:20 |
524 | [auth-options.c] | |
525 | unneeded includes | |
dbc728ff | 526 | - stevesk@cvs.openbsd.org 2002/07/21 18:34:43 |
527 | [auth-options.h] | |
528 | remove invalid comment | |
97686bf9 | 529 | - markus@cvs.openbsd.org 2002/07/22 11:03:06 |
530 | [session.c] | |
531 | fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors; | |
d341742a | 532 | - stevesk@cvs.openbsd.org 2002/07/22 17:32:56 |
533 | [monitor.c] | |
534 | u_int here; ok provos@ | |
67f04db1 | 535 | - stevesk@cvs.openbsd.org 2002/07/23 16:03:10 |
536 | [sshd.c] | |
537 | utmp_len is unsigned; display error consistent with other options. | |
538 | ok markus@ | |
0df3a240 | 539 | - stevesk@cvs.openbsd.org 2002/07/15 17:15:31 |
540 | [uidswap.c] | |
541 | little more debugging; ok markus@ | |
d341742a | 542 | |
21c2c5cd | 543 | 20020722 |
544 | - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk | |
a93bd14c | 545 | - (stevesk) [xmmap.c] missing prototype for fatal() |
ccbb983c | 546 | - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync |
547 | with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com. | |
d262b7f2 | 548 | - (bal) [configure.ac] Missing ;; from cray patch. |
30eab01d | 549 | - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines |
550 | into it's own header. | |
ee48c949 | 551 | - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be |
552 | freed by the caller; add free_pam_environment() and use it. | |
1d3f4ae7 | 553 | - (stevesk) [auth-pam.c] typo in comment |
21c2c5cd | 554 | |
b992432e | 555 | 20020721 |
556 | - (stevesk) [auth-pam.c] merge cosmetic changes from solar's | |
557 | openssh-3.4p1-owl-password-changing.diff | |
277f55cf | 558 | - (stevesk) [auth-pam.c] merge rest of solar's PAM patch; |
559 | PAM_NEW_AUTHTOK_REQD remains in #if 0 for now. | |
f7808a93 | 560 | - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch |
561 | warning on pam_conv struct conversation function. | |
337dde6b | 562 | - (stevesk) [auth-pam.h] license |
8565f28e | 563 | - (stevesk) [auth-pam.h] unneeded include |
e9b2c23d | 564 | - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h |
b992432e | 565 | |
ce88d9df | 566 | 20020720 |
567 | - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng(). | |
568 | ||
4379c0e5 | 569 | 20020719 |
570 | - (tim) [contrib/solaris/buildpkg.sh] create privsep user/group if needed. | |
571 | Patch by dtucker@zip.com.au | |
f75ca46d | 572 | - (tim) [configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au |
4379c0e5 | 573 | |
45491100 | 574 | 20020718 |
575 | - (tim) [defines.h] Bug 313 patch by dirk.meyer@dinoex.sub.org | |
576 | - (tim) [monitor_mm.c] add missing declaration for xmmap(). Reported | |
577 | by ayamura@ayamura.org | |
1cbbe6c8 | 578 | - (tim) [configure.ac] Bug 267 rework int64_t test. |
5749e709 | 579 | - (tim) [includes.h] Bug 267 add stdint.h |
45491100 | 580 | |
dd3943d0 | 581 | 20020717 |
582 | - (bal) aixbff package updated by dtucker@zip.com.au | |
2bf42e4a | 583 | - (tim) [configure.ac] change how we do paths in AC_PATH_PROGS tests |
584 | for autoconf 2.53. Based on a patch by jrj@purdue.edu | |
dd3943d0 | 585 | |
8fc47887 | 586 | 20020716 |
587 | - (tim) [contrib/solaris/opensshd.in] Only kill sshd if .pid file found | |
588 | ||
c750d869 | 589 | 20020715 |
590 | - (bal) OpenBSD CVS Sync | |
591 | - itojun@cvs.openbsd.org 2002/07/12 13:29:09 | |
592 | [sshconnect.c] | |
593 | print connect failure during debugging mode. | |
a2f883ce | 594 | - markus@cvs.openbsd.org 2002/07/12 15:50:17 |
595 | [cipher.c] | |
596 | EVP_CIPH_CUSTOM_IV for our own rijndael | |
2d199535 | 597 | - (bal) Remove unused tty defined in do_setusercontext() pointed out by |
598 | dtucker@zip.com.au plus a a more KNF since I am near it. | |
846be3f4 | 599 | - (bal) Privsep user creation support in Solaris buildpkg.sh by |
600 | dtucker@zip.com.au | |
c750d869 | 601 | |
798c5808 | 602 | 20020714 |
603 | - (tim) [Makefile.in] replace "id sshd" with "sshd -t" | |
4165b82e | 604 | - (bal/tim) [acconfig.h configure.ac monitor_mm.c servconf.c |
605 | openbsd-compat/Makefile.in] support compression on platforms that | |
606 | have no/broken MAP_ANON. Moved code to openbsd-compat/xmmap.c | |
607 | Based on patch from nalin@redhat.com of code extracted from Owl's package | |
5fd8087a | 608 | - (tim) [ssh_prng_cmds.in] Bug 323 arp -n flag doesn't exist under Solaris. |
609 | report by chris@by-design.net | |
fdebdd4f | 610 | - (tim) [loginrec.c] Bug 347: Fix typo (WTMPX_FILE) report by rodney@bond.net |
d80063fe | 611 | - (tim) [loginrec.c] Bug 348: add missing found = 1; to wtmpx_islogin() |
612 | report by rodney@bond.net | |
798c5808 | 613 | |
6b2a3595 | 614 | 20020712 |
615 | - (tim) [Makefile.in] quiet down install-files: and check-user: | |
3085601b | 616 | - (tim) [configure.ac] remove unused filepriv line |
6b2a3595 | 617 | |
249f9903 | 618 | 20020710 |
619 | - (tim) [contrib/cygwin/ssh-host-config] explicitely sets the permissions | |
620 | on /var/empty to 755 Patch by vinschen@redhat.com | |
6f901f8e | 621 | - (bal) OpenBSD CVS Sync |
622 | - itojun@cvs.openbsd.org 2002/07/09 11:56:50 | |
623 | [sshconnect.c] | |
624 | silently try next address on connect(2). markus ok | |
59c825e1 | 625 | - itojun@cvs.openbsd.org 2002/07/09 11:56:27 |
626 | [canohost.c] | |
627 | suppress log on reverse lookup failiure, as there's no real value in | |
628 | doing so. | |
629 | markus ok | |
aab5431b | 630 | - itojun@cvs.openbsd.org 2002/07/09 12:04:02 |
631 | [sshconnect.c] | |
632 | ed static function (less warnings) | |
94ad46d1 | 633 | - stevesk@cvs.openbsd.org 2002/07/09 17:46:25 |
634 | [sshd_config.5] | |
635 | clarify no preference ordering in protocol list; ok markus@ | |
9bd68577 | 636 | - itojun@cvs.openbsd.org 2002/07/10 10:28:15 |
637 | [sshconnect.c] | |
638 | bark if all connection attempt fails. | |
09683edf | 639 | - deraadt@cvs.openbsd.org 2002/07/10 17:53:54 |
640 | [rijndael.c] | |
641 | use right sizeof in memcpy; markus ok | |
249f9903 | 642 | |
e6f15ed1 | 643 | 20020709 |
644 | - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platforms | |
645 | lacking that concept can share it. Patch by vinschen@redhat.com | |
646 | ||
4f9d6706 | 647 | 20020708 |
648 | - (tim) [openssh/contrib/solaris/buildpkg.sh] add PKG_INSTALL_ROOT to | |
649 | work in a jumpstart environment. patch by kbrint@rufus.net | |
b451e27b | 650 | - (tim) [Makefile.in] workaround for broken pakadd on some systems. |
cda1ebcb | 651 | - (tim) [configure.ac] fix libc89 utimes test. Mention default path for |
652 | --with-privsep-path= | |
4f9d6706 | 653 | |
ac74561e | 654 | 20020707 |
655 | - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH) | |
94d8258b | 656 | - (tim) [acconfig.h configure.ac sshd.c] |
657 | s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/ | |
d41f8eed | 658 | - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes |
659 | patch from vinschen@redhat.com | |
0b832146 | 660 | - (bal) [realpath.c] Updated with OpenBSD tree. |
da2499f5 | 661 | - (bal) OpenBSD CVS Sync |
662 | - deraadt@cvs.openbsd.org 2002/07/04 04:15:33 | |
663 | [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c] | |
664 | patch memory leaks; grendel@zeitbombe.org | |
e1feb9bf | 665 | - deraadt@cvs.openbsd.org 2002/07/04 08:12:15 |
666 | [channels.c packet.c] | |
667 | blah blah minor nothing as i read and re-read and re-read... | |
eb9f2fab | 668 | - markus@cvs.openbsd.org 2002/07/04 10:41:47 |
669 | [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c] | |
670 | don't allocate, copy, and discard if there is not interested in the data; | |
671 | ok deraadt@ | |
4394a17f | 672 | - deraadt@cvs.openbsd.org 2002/07/06 01:00:49 |
673 | [log.c] | |
674 | KNF | |
50d2fbbc | 675 | - deraadt@cvs.openbsd.org 2002/07/06 01:01:26 |
676 | [ssh-keyscan.c] | |
677 | KNF, realloc fix, and clean usage | |
12a3f2c3 | 678 | - stevesk@cvs.openbsd.org 2002/07/06 17:47:58 |
679 | [ssh-keyscan.c] | |
680 | unused variable | |
41545cb6 | 681 | - (bal) Minor KNF on ssh-keyscan.c |
ac74561e | 682 | |
0764e748 | 683 | 20020705 |
684 | - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs. | |
685 | Reported by Darren Tucker <dtucker@zip.com.au> | |
e12659f4 | 686 | - (tim) [contrib/cygwin/ssh-host-config] double slash corrction |
687 | from vinschen@redhat.com | |
0764e748 | 688 | |
64c0ce80 | 689 | 20020704 |
690 | - (bal) Limit data to TTY for AIX only (Newer versions can't handle the | |
691 | faster data rate) Bug #124 | |
375c1dee | 692 | - (bal) glob.c defines TILDE and AIX also defines it. #undef it first. |
693 | bug #265 | |
ff2de800 | 694 | - (bal) One too many nulls in ports-aix.c |
64c0ce80 | 695 | |
d2f95449 | 696 | 20020703 |
697 | - (bal) Updated contrib/cygwin/ patch by vinschen@redhat.com | |
619a6aff | 698 | - (bal) minor correction to utimes() replacement. Patch by |
699 | onoe@sm.sony.co.jp | |
f11fe301 | 700 | - OpenBSD CVS Sync |
701 | - markus@cvs.openbsd.org 2002/06/27 08:49:44 | |
702 | [dh.c ssh-keyscan.c sshconnect.c] | |
703 | more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@ | |
181d6635 | 704 | - deraadt@cvs.openbsd.org 2002/06/27 09:08:00 |
705 | [monitor.c] | |
706 | improve mm_zalloc check; markus ok | |
30e37ee6 | 707 | - deraadt@cvs.openbsd.org 2002/06/27 10:35:47 |
708 | [auth2-none.c monitor.c sftp-client.c] | |
709 | use xfree() | |
c8f94200 | 710 | - stevesk@cvs.openbsd.org 2002/06/27 19:49:08 |
711 | [ssh-keyscan.c] | |
712 | use convtime(); ok markus@ | |
a64d3560 | 713 | - millert@cvs.openbsd.org 2002/06/28 01:49:31 |
714 | [monitor_mm.c] | |
715 | tree(3) wants an int return value for its compare functions and | |
716 | the difference between two pointers is not an int. Just do the | |
717 | safest thing and store the result in a long and then return 0, | |
718 | -1, or 1 based on that result. | |
405a0d43 | 719 | - deraadt@cvs.openbsd.org 2002/06/28 01:50:37 |
720 | [monitor_wrap.c] | |
721 | use ssize_t | |
4efd85b2 | 722 | - deraadt@cvs.openbsd.org 2002/06/28 10:08:25 |
723 | [sshd.c] | |
724 | range check -u option at invocation | |
6ded293b | 725 | - deraadt@cvs.openbsd.org 2002/06/28 23:05:06 |
726 | [sshd.c] | |
727 | gidset[2] -> gidset[1]; markus ok | |
7fdc56c5 | 728 | - deraadt@cvs.openbsd.org 2002/06/30 21:54:16 |
729 | [auth2.c session.c sshd.c] | |
730 | lint asks that we use names that do not overlap | |
343288b8 | 731 | - deraadt@cvs.openbsd.org 2002/06/30 21:59:45 |
732 | [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c | |
733 | monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c | |
734 | sshconnect2.c sshd.c] | |
735 | minor KNF | |
7d60d74c | 736 | - deraadt@cvs.openbsd.org 2002/07/01 16:15:25 |
737 | [msg.c] | |
738 | %u | |
713f6cd9 | 739 | - markus@cvs.openbsd.org 2002/07/01 19:48:46 |
740 | [sshconnect2.c] | |
741 | for compression=yes, we fallback to no-compression if the server does | |
742 | not support compression, vice versa for compression=no. ok mouring@ | |
261189cc | 743 | - markus@cvs.openbsd.org 2002/07/03 09:55:38 |
744 | [ssh-keysign.c] | |
745 | use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld) | |
746 | in order to avoid a possible Kocher timing attack pointed out by Charles | |
747 | Hannum; ok provos@ | |
60cd0a97 | 748 | - markus@cvs.openbsd.org 2002/07/03 14:21:05 |
749 | [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config] | |
750 | re-enable ssh-keysign's sbit, but make ssh-keysign read | |
751 | /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled | |
752 | globally. based on discussions with deraadt, itojun and sommerfeld; | |
753 | ok itojun@ | |
56fd97d7 | 754 | - (bal) Failed password attempts don't increment counter on AIX. Bug #145 |
e8aa0a5c | 755 | - (bal) Missed Makefile.in change. keysign needs readconf.o |
0ba40daa | 756 | - (bal) Clean up aix_usrinfo(). Ignore TTY= period I guess. |
56fd97d7 | 757 | |
b2f295dc | 758 | 20020702 |
759 | - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc & | |
760 | friends consistently. Spotted by Solar Designer <solar@openwall.com> | |
761 | ||
3c3e878a | 762 | 20020629 |
763 | - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style | |
764 | clean up while I'm near it. | |
765 | ||
811ee370 | 766 | 20020628 |
767 | - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented | |
768 | options should contain default value. from solar. | |
b9b82dab | 769 | - (bal) Cygwin uid0 fix by vinschen@redhat.com |
17962c40 | 770 | - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c. Otherwise wise |
771 | have issues of our fixes not propogating right (ie bcopy instead of | |
772 | memmove). OK tim | |
4fa4fb00 | 773 | - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported. |
774 | Bug #303 | |
811ee370 | 775 | |
ce88d9df | 776 | 20020627 |
d1ff09ba | 777 | - OpenBSD CVS Sync |
778 | - deraadt@cvs.openbsd.org 2002/06/26 14:49:36 | |
779 | [monitor.c] | |
780 | correct %u | |
63b5f1a1 | 781 | - deraadt@cvs.openbsd.org 2002/06/26 14:50:04 |
782 | [monitor_fdpass.c] | |
783 | use ssize_t for recvmsg() and sendmsg() return | |
1431a900 | 784 | - markus@cvs.openbsd.org 2002/06/26 14:51:33 |
785 | [ssh-add.c] | |
786 | fix exit code for -X/-x | |
bb0640b2 | 787 | - deraadt@cvs.openbsd.org 2002/06/26 15:00:32 |
788 | [monitor_wrap.c] | |
789 | more %u | |
20e79e98 | 790 | - markus@cvs.openbsd.org 2002/06/26 22:27:32 |
791 | [ssh-keysign.c] | |
792 | bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu | |
d1ff09ba | 793 | |
4bfa8bb6 | 794 | 20020626 |
795 | - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM | |
a594fa74 | 796 | - (bal) OpenBSD CVS Sync |
797 | - markus@cvs.openbsd.org 2002/06/23 21:34:07 | |
798 | [channels.c] | |
799 | tcode is u_int | |
38501509 | 800 | - markus@cvs.openbsd.org 2002/06/24 13:12:23 |
801 | [ssh-agent.1] | |
802 | the socket name contains ssh-agent's ppid; via mpech@ from form@ | |
f91d9a89 | 803 | - markus@cvs.openbsd.org 2002/06/24 14:33:27 |
804 | [channels.c channels.h clientloop.c serverloop.c] | |
805 | move channel counter to u_int | |
1169c3df | 806 | - markus@cvs.openbsd.org 2002/06/24 14:55:38 |
807 | [authfile.c kex.c ssh-agent.c] | |
808 | cat to (void) when output from buffer_get_X is ignored | |
09915dc1 | 809 | - itojun@cvs.openbsd.org 2002/06/24 15:49:22 |
810 | [msg.c] | |
811 | printf type pedant | |
d0a1c5d1 | 812 | - deraadt@cvs.openbsd.org 2002/06/24 17:57:20 |
813 | [sftp-server.c sshpty.c] | |
814 | explicit (u_int) for uid and gid | |
6c69a6a9 | 815 | - markus@cvs.openbsd.org 2002/06/25 16:22:42 |
816 | [authfd.c] | |
817 | unnecessary cast | |
87809a1f | 818 | - markus@cvs.openbsd.org 2002/06/25 18:51:04 |
819 | [sshd.c] | |
820 | lightweight do_setusercontext after chroot() | |
924681ee | 821 | - (bal) Updated AIX package build. Patch by dtucker@zip.com.au |
46c8ebb3 | 822 | - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8 |
78beb77d | 823 | - (bal) added back in error check for mmap(). I screwed up, Pointed |
824 | out by stevesk@ | |
f2d9a1f8 | 825 | - (tim) [README.privsep] UnixWare tip no longer needed. |
88cb875c | 826 | - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP, |
827 | but it all damned lies. | |
0d0270e6 | 828 | - (stevesk) [README.privsep] more for sshd pseudo-account. |
8029e7fc | 829 | - (tim) [contrib/caldera/openssh.spec] add support for privsep |
8695f9f7 | 830 | - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@ |
b29fe4ea | 831 | - (djm) OpenBSD CVS Sync |
832 | - markus@cvs.openbsd.org 2002/06/26 08:53:12 | |
833 | [bufaux.c] | |
834 | limit size of BNs to 8KB; ok provos/deraadt | |
22d62d31 | 835 | - markus@cvs.openbsd.org 2002/06/26 08:54:18 |
836 | [buffer.c] | |
837 | limit append to 1MB and buffers to 10MB | |
5df8c731 | 838 | - markus@cvs.openbsd.org 2002/06/26 08:55:02 |
839 | [channels.c] | |
840 | limit # of channels to 10000 | |
87f18810 | 841 | - markus@cvs.openbsd.org 2002/06/26 08:58:26 |
842 | [session.c] | |
843 | limit # of env vars to 1000; ok deraadt/djm | |
2f095a0e | 844 | - deraadt@cvs.openbsd.org 2002/06/26 13:20:57 |
845 | [monitor.c] | |
846 | be careful in mm_zalloc | |
66087567 | 847 | - deraadt@cvs.openbsd.org 2002/06/26 13:49:26 |
848 | [session.c] | |
849 | disclose less information from environment files; based on input | |
850 | from djm, and dschultz@uclink.Berkeley.EDU | |
477edc5d | 851 | - markus@cvs.openbsd.org 2002/06/26 13:55:37 |
852 | [auth2-chall.c] | |
853 | make sure # of response matches # of queries, fixes int overflow; | |
854 | from ISS | |
03b14b6f | 855 | - markus@cvs.openbsd.org 2002/06/26 13:56:27 |
856 | [version.h] | |
857 | 3.4 | |
9c696d0d | 858 | - (djm) Require krb5 devel for RPM build w/ KrbV |
c4186be7 | 859 | - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai |
860 | <nalin@redhat.com> | |
1e7bc74c | 861 | - (djm) Update spec files for release |
49b53b03 | 862 | - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS |
03b14b6f | 863 | - (djm) Release 3.4p1 |
6519cfd6 | 864 | - (tim) [contrib/caldera/openssh.spec] remove 2 configure options I put in |
865 | by mistake | |
4bfa8bb6 | 866 | |
ef1ac12b | 867 | 20020625 |
868 | - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh | |
1a44c6f7 | 869 | - (stevesk) [README.privsep] minor updates |
fd3cbf67 | 870 | - (djm) Create privsep directory and warn if privsep user is missing |
871 | during make install | |
702b2855 | 872 | - (bal) Started list of PrivSep issues in TODO |
1c6249af | 873 | - (bal) if mmap() is substandard, don't allow compression on server side. |
874 | Post 'event' we will add more options. | |
cbaa3d44 | 875 | - (tim) [contrib/caldera/openssh.spec] Sync with Caldera |
e2bc41f9 | 876 | - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by |
877 | dtucker@zip.com.au | |
d170feb1 | 878 | - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus |
879 | for Cygwin, Cray, & SCO | |
ef1ac12b | 880 | |
d5803314 | 881 | 20020624 |
882 | - OpenBSD CVS Sync | |
883 | - deraadt@cvs.openbsd.org 2002/06/23 03:25:50 | |
884 | [tildexpand.c] | |
885 | KNF | |
3ddc795d | 886 | - deraadt@cvs.openbsd.org 2002/06/23 03:26:19 |
887 | [cipher.c key.c] | |
888 | KNF | |
d6133f43 | 889 | - deraadt@cvs.openbsd.org 2002/06/23 03:30:58 |
890 | [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c | |
891 | sshpty.c] | |
892 | various KNF and %d for unsigned | |
9906a836 | 893 | - deraadt@cvs.openbsd.org 2002/06/23 09:30:14 |
894 | [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c | |
895 | sftp.c] | |
896 | bunch of u_int vs int stuff | |
512df038 | 897 | - deraadt@cvs.openbsd.org 2002/06/23 09:39:55 |
898 | [ssh-keygen.c] | |
899 | u_int stuff | |
7528d467 | 900 | - deraadt@cvs.openbsd.org 2002/06/23 09:46:51 |
901 | [bufaux.c servconf.c] | |
902 | minor KNF. things the fingers do while you read | |
e424e241 | 903 | - deraadt@cvs.openbsd.org 2002/06/23 10:29:52 |
904 | [ssh-agent.c sshd.c] | |
905 | some minor KNF and %u | |
7138ebd9 | 906 | - deraadt@cvs.openbsd.org 2002/06/23 20:39:45 |
907 | [session.c] | |
908 | compression_level is u_int | |
f09ce20a | 909 | - deraadt@cvs.openbsd.org 2002/06/23 21:06:13 |
910 | [sshpty.c] | |
911 | KNF | |
57f228e8 | 912 | - deraadt@cvs.openbsd.org 2002/06/23 21:06:41 |
913 | [channels.c channels.h session.c session.h] | |
914 | display, screen, row, col, xpixel, ypixel are u_int; markus ok | |
0bc50167 | 915 | - deraadt@cvs.openbsd.org 2002/06/23 21:10:02 |
916 | [packet.c] | |
917 | packet_get_int() returns unsigned for reason & seqnr | |
57f228e8 | 918 | - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col, |
919 | xpixel are u_int. | |
920 | ||
d5803314 | 921 | |
58177c0a | 922 | 20020623 |
923 | - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX. | |
dc43acd2 | 924 | - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset. |
ef3912be | 925 | - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au |
a8bbdc75 | 926 | - OpenBSD CVS Sync |
927 | - stevesk@cvs.openbsd.org 2002/06/22 02:00:29 | |
928 | [ssh.h] | |
929 | correct comment | |
1ae02182 | 930 | - stevesk@cvs.openbsd.org 2002/06/22 02:40:23 |
931 | [ssh.1] | |
932 | section 5 not 4 for ssh_config | |
b2843ec6 | 933 | - naddy@cvs.openbsd.org 2002/06/22 11:51:39 |
934 | [ssh.1] | |
935 | typo | |
75653d3e | 936 | - stevesk@cvs.openbsd.org 2002/06/22 16:32:54 |
937 | [sshd.8] | |
938 | add /var/empty in FILES section | |
a56313d7 | 939 | - stevesk@cvs.openbsd.org 2002/06/22 16:40:19 |
940 | [sshd.c] | |
941 | check /var/empty owner mode; ok provos@ | |
e4e83d70 | 942 | - stevesk@cvs.openbsd.org 2002/06/22 16:41:57 |
943 | [scp.1] | |
944 | typo | |
baa08b92 | 945 | - stevesk@cvs.openbsd.org 2002/06/22 16:45:29 |
946 | [ssh-agent.1 sshd.8 sshd_config.5] | |
947 | use process ID vs. pid/PID/process identifier | |
c28876e9 | 948 | - stevesk@cvs.openbsd.org 2002/06/22 20:05:27 |
949 | [sshd.c] | |
950 | don't call setsid() if debugging or run from inetd; no "Operation not | |
951 | permitted" errors now; ok millert@ markus@ | |
d17ef027 | 952 | - stevesk@cvs.openbsd.org 2002/06/22 23:09:51 |
953 | [monitor.c] | |
954 | save auth method before monitor_reset_key_state(); bugzilla bug #284; | |
955 | ok provos@ | |
58177c0a | 956 | |
0b202697 | 957 | $Id$ |