]> andersk Git - openssh.git/blame - ChangeLog
- djm@cvs.openbsd.org 2003/01/06 23:51:22
[openssh.git] / ChangeLog
CommitLineData
7bb526ce 120030108
2 - (djm) Sync openbsd-compat/ with OpenBSD -current
93c63b8d 3 - (djm) Avoid redundant xstrdup/xfree in auth2-pam.c. From Solar via markus@
faa483fa 4 - (djm) OpenBSD CVS Sync
5 - markus@cvs.openbsd.org 2003/01/01 18:08:52
6 [channels.c]
7 move big output buffer messages to debug2
bfd934b9 8 - djm@cvs.openbsd.org 2003/01/06 23:51:22
9 [sftp-client.c]
10 Fix "get -p" download to not add user-write perm. mindrot bug #426
11 reported by gfernandez@livevault.com; ok markus@
7bb526ce 12
e7ccd20d 1320030107
14 - (djm) Bug #401: Work around Linux breakage with IPv6 mapped addresses.
15 Based on fix from yoshfuji@linux-ipv6.org
e2ef2342 16 - (djm) Bug #442: Check for and deny access to accounts with locked
17 passwords. Patch from dtucker@zip.com.au
70e7d0b0 18 - (djm) Bug #26: Use local mkstemp() rather than glibc's silly one. Fixes
19 Can't pass KRB4 TGT passing. Fix from: jan.iven@cern.ch
93a9a35a 20 - (djm) Fix Bug #442 for PAM case
ed05a983 21 - (djm) Bug #110: bogus error messages in lastlog_get_entry(). Fix based
22 on one by peak@argo.troja.mff.cuni.cz
63cada0a 23 - (djm) Bug #111: Run syslog and stderr logging through strnvis to eliminate
24 nasties. Report from peak@argo.troja.mff.cuni.cz
99f4fb69 25 - (djm) Bug #178: On AIX /etc/nologin wasnt't shown to users. Fix from
26 Ralf.Wenk@fh-karlsruhe.de and dtucker@zip.com.au
b57c8e20 27 - (djm) Fix my fix of the fix for the Bug #442 for PAM case. Spotted by
28 dtucker@zip.com.au. Reorder for clarity too.
e7ccd20d 29
9300be60 3020030103
31 - (djm) Bug #461: ssh-copy-id fails with no arguments. Patch from
32 cjwatson@debian.org
9746ee4b 33 - (djm) Bug #460: Filling utmp[x]->ut_addr_v6 if present. Patch from
34 cjwatson@debian.org
17ed08c5 35 - (djm) Bug #446: Set LOGIN env var to pw_name on AIX. Patch from
36 mii@ornl.gov
37
d4ac26ed 3820030101
39 - (stevesk) [session.c sshlogin.c sshlogin.h] complete portable
40 parts of pass addrlen with sockaddr * fix.
41 from Hajimu UMEMOTO <ume@FreeBSD.org>
42
378d9956 4320021222
44 - (bal) OpenBSD CVS Sync
45 - fgsch@cvs.openbsd.org 2002/11/15 10:03:09
46 [authfile.c]
47 lseek(2) may return -1 when getting the public/private key lenght.
48 Simplify the code and check for errors using fstat(2).
49
50 Problem reported by Mauricio Sanchez, markus@ ok.
3c93c917 51 - markus@cvs.openbsd.org 2002/11/18 16:43:44
52 [clientloop.c]
53 don't overwrite SIG{INT,QUIT,TERM} handler if set to SIG_IGN;
54 e.g. if ssh is used for backup; report Joerg Schilling; ok millert@
35efb24c 55 - markus@cvs.openbsd.org 2002/11/21 22:22:50
56 [dh.c]
57 debug->debug2
a77673cc 58 - markus@cvs.openbsd.org 2002/11/21 22:45:31
59 [cipher.c kex.c packet.c sshconnect.c sshconnect2.c]
60 debug->debug2, unify debug messages
b77a87e5 61 - deraadt@cvs.openbsd.org 2002/11/21 23:03:51
62 [auth-krb5.c auth1.c hostfile.h monitor_wrap.c sftp-client.c sftp-int.c ssh-add.c ssh-rsa.c
63 sshconnect.c]
64 KNF
556f1c05 65 - markus@cvs.openbsd.org 2002/11/21 23:04:33
83bbc162 66 [ssh.c]
67 debug->debug2
556f1c05 68 - stevesk@cvs.openbsd.org 2002/11/24 21:46:24
eef52fa7 69 [ssh-keysign.8]
70 typo: "the the"
6d58d81e 71 - wcobb@cvs.openbsd.org 2002/11/26 00:45:03
72 [scp.c ssh-keygen.c]
73 Remove unnecessary fflush(stderr) calls, stderr is unbuffered by default.
74 ok markus@
556f1c05 75 - stevesk@cvs.openbsd.org 2002/11/26 02:35:30
63baa058 76 [ssh-keygen.1]
77 remove outdated statement; ok markus@ deraadt@
649bb60b 78 - stevesk@cvs.openbsd.org 2002/11/26 02:38:54
79 [canohost.c]
80 KNF, comment and error message repair; ok markus@
15748b4d 81 - markus@cvs.openbsd.org 2002/11/27 17:53:35
82 [scp.c sftp.c ssh.c]
83 allow usernames with embedded '@', e.g. scp user@vhost@realhost:file /tmp;
84 http://bugzilla.mindrot.org/show_bug.cgi?id=447; ok mouring@, millert@
fe661d8f 85 - stevesk@cvs.openbsd.org 2002/12/04 04:36:47
86 [session.c]
87 remove xauth entries before add; PR 2994 from janjaap@stack.nl.
88 ok markus@
a0a14bcd 89 - markus@cvs.openbsd.org 2002/12/05 11:08:35
90 [scp.c]
91 use roundup() similar to rcp/util.c and avoid problems with strange
92 filesystem block sizes, noted by tjr@freebsd.org; ok djm@
556f1c05 93 - djm@cvs.openbsd.org 2002/12/06 05:20:02
2ea16b0b 94 [sftp.1]
95 Fix cut'n'paste error, spotted by matthias.riese@b-novative.de; ok deraadt@
978ebf99 96 - millert@cvs.openbsd.org 2002/12/09 16:50:30
97 [ssh.c]
98 Avoid setting optind to 0 as GNU getopt treats that like we do optreset.
99 markus@ OK
32214c88 100 - markus@cvs.openbsd.org 2002/12/10 08:56:00
101 [session.c]
102 Make sure $SHELL points to the shell from the password file, even if shell
103 is overridden from login.conf; bug#453; semen at online.sinor.ru; ok millert@
48f636b2 104 - markus@cvs.openbsd.org 2002/12/10 19:26:50
105 [packet.c]
106 move tos handling to packet_set_tos; ok provos/henning/deraadt
9e637910 107 - markus@cvs.openbsd.org 2002/12/10 19:47:14
108 [packet.c]
109 static
6226a8f8 110 - markus@cvs.openbsd.org 2002/12/13 10:03:15
111 [channels.c misc.c sshconnect2.c]
112 cleanup debug messages, more useful information for the client user.
556f1c05 113 - markus@cvs.openbsd.org 2002/12/13 15:20:52
114 [scp.c]
115 1) include stalling time in total time
116 2) truncate filenames to 45 instead of 20 characters
117 3) print rate instead of progress bar, no more stars
118 4) scale output to tty width
119 based on a patch from Niels; ok fries@ lebel@ fgs@ millert@
3075ac59 120 - (bal) [msg.c msg.h scp.c ssh-keysign.c sshconnect2.c] Resync CVS IDs since
121 we already did s/msg_send/ssh_msg_send/
378d9956 122
a76550cf 12320021205
124 - (djm) PERL-free fixpaths from stuge-openssh-unix-dev@cdy.org
125
d9a4e55b 12620021122
127 - (tim) [configure.ac] fix STDPATH test for IRIX. First reported by
128 advax@triumf.ca. This type of solution tested by <herb@sgi.com>
129
f825dbf4 13020021113
131 - (tim) [configure.ac] remove unused variables no_libsocket and no_libnsl
132
17d429bb 13320021111
134 - (tim) [contrib/solaris/opensshd.in] add umask 022 so sshd.pid is
135 not world writable.
136
c9826b28 13720021109
138 - (bal) OpenBSD CVS Sync
139 - itojun@cvs.openbsd.org 2002/10/16 14:31:48
140 [sftp-common.c]
141 64bit pedant. %llu is "unsigned long long". markus ok
2fe3c2db 142 - markus@cvs.openbsd.org 2002/10/23 10:32:13
143 [packet.c]
144 use %u for u_int
358b576b 145 - markus@cvs.openbsd.org 2002/10/23 10:40:16
146 [bufaux.c]
147 %u for u_int
f6f02456 148 - markus@cvs.openbsd.org 2002/11/04 10:07:53
149 [auth.c]
150 don't compare against pw_home if realpath fails for pw_home (seen
151 on AFS); ok djm@
2ccb7bde 152 - markus@cvs.openbsd.org 2002/11/04 10:09:51
153 [packet.c]
154 log before send disconnect; ok djm@
39e71188 155 - markus@cvs.openbsd.org 2002/11/05 19:45:20
156 [monitor.c]
157 handle overflows for size_t larger than u_int; siw@goneko.de, bug #425
9db1a8e9 158 - markus@cvs.openbsd.org 2002/11/05 20:10:37
159 [sftp-client.c]
160 typo; GaryF@livevault.com
51efad8c 161 - markus@cvs.openbsd.org 2002/11/07 16:28:47
162 [sshd.c]
163 log to stderr if -ie is given, bug #414, prj@po.cwru.edu
cc46e2ee 164 - markus@cvs.openbsd.org 2002/11/07 22:08:07
165 [readconf.c readconf.h ssh-keysign.8 ssh-keysign.c]
166 we cannot use HostbasedAuthentication for enabling ssh-keysign(8),
167 because HostbasedAuthentication might be enabled based on the
168 target host and ssh-keysign(8) does not know the remote hostname
169 and not trust ssh(1) about the hostname, so we add a new option
170 EnableSSHKeysign; ok djm@, report from zierke@informatik.uni-hamburg.de
252d1a24 171 - markus@cvs.openbsd.org 2002/11/07 22:35:38
172 [scp.c]
173 check exit status from ssh, and exit(1) if ssh fails; bug#369;
174 binder@arago.de
f00addc9 175 - (bal) Update ssh-host-config and minor rewrite of bsd-cygwin_util.c
176 ntsec now default if cygwin version beginning w/ version 56. Patch
177 by Corinna Vinschen <vinschen@redhat.com>
819d3f09 178 - (bal) AIX does not log login attempts for unknown users (bug #432).
179 patch by dtucker@zip.com.au
c9826b28 180
4e6f1c4f 18120021021
f0e27f3d 182 - (djm) Bug #400: Kill ssh-rand-helper children on timeout, patch from
183 dtucker@zip.com.au
cacd2e7a 184 - (djm) Bug #317: FreeBSD needs libutil.h for openpty() Report from
185 dirk.meyer@dinoex.sub.org
4e6f1c4f 186
f3e87063 18720021015
188 - (bal) Fix bug id 383 and only call loginrestrict for AIX if not root.
08412d26 189 - (bal) More advanced strsep test by Darren Tucker <dtucker@zip.com.au>
f3e87063 190
57872969 19120021015
192 - (tim) [contrib/caldera/openssh.spec] make ssh-agent setgid nobody
193
6af8f131 19420021004
195 - (bal) Disable post-authentication Privsep for OSF/1. It conflicts with
196 SIA.
197
e139021d 19820021003
199 - (djm) OpenBSD CVS Sync
200 - markus@cvs.openbsd.org 2002/10/01 20:34:12
201 [ssh-agent.c]
202 allow root to access the agent, since there is no protection from root.
886cd2bb 203 - markus@cvs.openbsd.org 2002/10/01 13:24:50
204 [version.h]
205 OpenSSH 3.5
0855868a 206 - (djm) Bump RPM spec version numbers
e987fdbe 207 - (djm) Bug #406: s/msg_send/ssh_msg_send/ for Mac OS X 1.2
e139021d 208
1d677676 20920020930
9a87e2ac 210 - (djm) Tidy contrib/, add Makefile for GNOME passphrase dialogs,
211 tweak README
212 - (djm) OpenBSD CVS Sync
213 - mickey@cvs.openbsd.org 2002/09/27 10:42:09
214 [compat.c compat.h sshd.c]
215 add a generic match for a prober, such as sie big brother;
216 idea from stevesk@; markus@ ok
05960cf0 217 - stevesk@cvs.openbsd.org 2002/09/27 15:46:21
218 [ssh.1]
219 clarify compression level protocol 1 only; ok markus@ deraadt@
1d677676 220
0d3d0e82 22120020927
222 - (djm) OpenBSD CVS Sync
223 - markus@cvs.openbsd.org 2002/09/25 11:17:16
224 [sshd_config]
225 sync LoginGraceTime with default
26b9a3d2 226 - markus@cvs.openbsd.org 2002/09/25 15:19:02
227 [sshd.c]
228 typo; pilot@monkey.org
2db9d8aa 229 - markus@cvs.openbsd.org 2002/09/26 11:38:43
230 [auth1.c auth.h auth-krb4.c monitor.c monitor.h monitor_wrap.c]
231 [monitor_wrap.h]
232 krb4 + privsep; ok dugsong@, deraadt@
0d3d0e82 233
b7c4a4cc 23420020925
235 - (bal) Fix issue where successfull login does not clear failure counts
236 in AIX. Patch by dtucker@zip.com.au ok by djm
ef51930f 237 - (tim) Cray fixes (bug 367) based on patch from Wendy Palm @ cray.
238 This does not include the deattack.c fixes.
b7c4a4cc 239
99443922 24020020923
241 - (djm) OpenBSD CVS Sync
242 - stevesk@cvs.openbsd.org 2002/09/23 20:46:27
243 [canohost.c]
244 change get_peer_ipaddr() and get_local_ipaddr() to not return NULL for
245 non-sockets; fixes a problem passing NULL to snprintf(). ok markus@
0082ad34 246 - markus@cvs.openbsd.org 2002/09/23 22:11:05
247 [monitor.c]
248 only call auth_krb5 if kerberos is enabled; ok deraadt@
4741e3a6 249 - markus@cvs.openbsd.org 2002/09/24 08:46:04
250 [monitor.c]
251 only call kerberos code for authctxt->valid
cb11b555 252 - todd@cvs.openbsd.org 2002/09/24 20:59:44
253 [sshd.8]
254 tweak the example $HOME/.ssh/rc script to not show on any cmdline the
255 sensitive data it handles. This fixes bug # 402 as reported by
256 kolya@mit.edu (Nickolai Zeldovich).
257 ok markus@ and stevesk@
99443922 258
aec4cb4f 25920020923
260 - (tim) [configure.ac] s/return/exit/ patch by dtucker@zip.com.au
261
f86b0eef 26220020922
263 - (djm) OpenBSD CVS Sync
264 - stevesk@cvs.openbsd.org 2002/09/19 14:53:14
265 [compat.c]
c7724abb 266 - markus@cvs.openbsd.org 2002/09/19 15:51:23
267 [ssh-add.c]
268 typo; cd@kalkatraz.de
00e842d8 269 - stevesk@cvs.openbsd.org 2002/09/19 16:03:15
270 [serverloop.c]
271 log IP address also; ok markus@
c2802d92 272 - stevesk@cvs.openbsd.org 2002/09/20 18:41:29
273 [auth.c]
274 log illegal user here for missing privsep case (ssh2).
275 this is executed in the monitor. ok markus@
f86b0eef 276
792e7d2d 27720020919
278 - (djm) OpenBSD CVS Sync
279 - stevesk@cvs.openbsd.org 2002/09/12 19:11:52
280 [ssh-agent.c]
281 %u for uid print; ok markus@
da0561eb 282 - stevesk@cvs.openbsd.org 2002/09/12 19:50:36
283 [session.c ssh.1]
284 add SSH_CONNECTION and deprecate SSH_CLIENT; bug #384. ok markus@
facfd613 285 - stevesk@cvs.openbsd.org 2002/09/13 19:23:09
286 [channels.c sshconnect.c sshd.c]
287 remove use of SO_LINGER, it should not be needed. error check
288 SO_REUSEADDR. fixup comments. ok markus@
8bd4e2ae 289 - stevesk@cvs.openbsd.org 2002/09/16 19:55:33
290 [session.c]
291 log when _PATH_NOLOGIN exists; ok markus@
e6fe1bab 292 - stevesk@cvs.openbsd.org 2002/09/16 20:12:11
293 [sshd_config.5]
294 more details on X11Forwarding security issues and threats; ok markus@
f1dcc34e 295 - stevesk@cvs.openbsd.org 2002/09/16 22:03:13
296 [sshd.8]
297 reference moduli(5) in FILES /etc/moduli.
5c0d0e90 298 - itojun@cvs.openbsd.org 2002/09/17 07:47:02
299 [channels.c]
300 don't quit while creating X11 listening socket.
301 http://mail-index.netbsd.org/current-users/2002/09/16/0005.html
302 got from portable. markus ok
6939bbd4 303 - djm@cvs.openbsd.org 2002/09/19 01:58:18
304 [ssh.c sshconnect.c]
305 bugzilla.mindrot.org #223 - ProxyCommands don't exit.
306 Patch from dtucker@zip.com.au; ok markus@
792e7d2d 307
4f3834e8 30820020912
eee2215e 309 - (djm) Made GNOME askpass programs return non-zero if cancel button is
310 pressed.
10a560d4 311 - (djm) Added getpeereid() replacement. Properly implemented for systems
312 with SO_PEERCRED support. Faked for systems which lack it.
9fd2a215 313 - (djm) Sync sys/tree.h with OpenBSD -current. Rename tree.h and
314 fake-queue.h to sys-tree.h and sys-queue.h
4f3834e8 315 - (djm) OpenBSD CVS Sync
316 - markus@cvs.openbsd.org 2002/09/08 20:24:08
317 [hostfile.h]
318 no comma at end of enumerator list
696f6bef 319 - itojun@cvs.openbsd.org 2002/09/09 06:48:06
320 [auth1.c auth.h auth-krb5.c monitor.c monitor.h]
321 [monitor_wrap.c monitor_wrap.h]
322 kerberos support for privsep. confirmed to work by lha@stacken.kth.se
323 patch from markus
661e45a0 324 - markus@cvs.openbsd.org 2002/09/09 14:54:15
325 [channels.c kex.h key.c monitor.c monitor_wrap.c radix.c uuencode.c]
326 signed vs unsigned from -pedantic; ok henning@
87f4111f 327 - markus@cvs.openbsd.org 2002/09/10 20:24:47
328 [ssh-agent.c]
329 check the euid of the connecting process with getpeereid(2);
330 ok provos deraadt stevesk
07d688d5 331 - stevesk@cvs.openbsd.org 2002/09/11 17:55:03
332 [ssh.1]
333 add agent and X11 forwarding warning text from ssh_config.5; ok markus@
8b10e20e 334 - stevesk@cvs.openbsd.org 2002/09/11 18:27:26
335 [authfd.c authfd.h ssh.c]
336 don't connect to agent to test for presence if we've previously
337 connected; ok markus@
00b3ad3e 338 - djm@cvs.openbsd.org 2002/09/11 22:41:50
339 [sftp.1 sftp-client.c sftp-client.h sftp-common.c sftp-common.h]
340 [sftp-glob.c sftp-glob.h sftp-int.c sftp-server.c]
341 support for short/long listings and globbing in "ls"; ok markus@
be0cd512 342 - djm@cvs.openbsd.org 2002/09/12 00:13:06
343 [sftp-int.c]
344 zap unused var introduced in last commit
4f3834e8 345
ac8802eb 34620020911
347 - (djm) Sync openbsd-compat with OpenBSD -current
348
e2e36358 34920020910
350 - (djm) Bug #365: Read /.ssh/environment properly under CygWin.
351 Patch from Mark Bradshaw <bradshaw@staff.crosswalk.com>
35c4faf5 352 - (djm) Bug #138: Make protocol 1 blowfish work with old OpenSSL.
353 Patch from Robert Halubek <rob@adso.com.pl>
e2e36358 354
3445ca02 35520020905
356 - (djm) OpenBSD CVS Sync
357 - stevesk@cvs.openbsd.org 2002/09/04 18:52:42
358 [servconf.c sshd.8 sshd_config.5]
359 default LoginGraceTime to 2m; 1m may be too short for slow systems.
360 ok markus@
cbecf1ed 361 - (djm) Merge openssh-TODO.patch from Redhat (null) beta
c4ee4c60 362 - (djm) Add gnome-ssh-askpass2.c (gtk2) by merge with patch from
363 Nalin Dahyabhai <nalin@redhat.com>
3c1dff28 364 - (djm) Add support for building gtk2 password requestor from Redhat beta
3445ca02 365
954640a4 36620020903
33e2e066 367 - (djm) Patch from itojun@ for Darwin OS: test getaddrinfo, reorder libcrypt
e18b7d35 368 - (djm) Fix Redhat RPM build dependancy test
954640a4 369 - (djm) OpenBSD CVS Sync
370 - markus@cvs.openbsd.org 2002/08/12 10:46:35
371 [ssh-agent.c]
372 make ssh-agent setgid, disallow ptrace.
755c4339 373 - espie@cvs.openbsd.org 2002/08/21 11:20:59
374 [sshd.8]
375 `RSA' updated to refer to `public key', where it matters.
376 okay markus@
6e0fbda1 377 - stevesk@cvs.openbsd.org 2002/08/21 19:38:06
378 [servconf.c sshd.8 sshd_config sshd_config.5]
379 change LoginGraceTime default to 1 minute; ok mouring@ markus@
00e41835 380 - stevesk@cvs.openbsd.org 2002/08/21 20:10:28
381 [ssh-agent.c]
382 raise listen backlog; ok markus@
c1a4eef1 383 - stevesk@cvs.openbsd.org 2002/08/22 19:27:53
384 [ssh-agent.c]
385 use common close function; ok markus@
1d77f8cb 386 - stevesk@cvs.openbsd.org 2002/08/22 19:38:42
387 [clientloop.c]
388 format with current EscapeChar; bugzilla #388 from wknox@mitre.org.
389 ok markus@
f34ec885 390 - stevesk@cvs.openbsd.org 2002/08/22 20:57:19
391 [ssh-agent.c]
392 shutdown(SHUT_RDWR) not needed before close here; ok markus@
848bf884 393 - markus@cvs.openbsd.org 2002/08/22 21:33:58
394 [auth1.c auth2.c]
395 auth_root_allowed() is handled by the monitor in the privsep case,
396 so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325
6c723e7c 397 - markus@cvs.openbsd.org 2002/08/22 21:45:41
398 [session.c]
399 send signal name (not signal number) in "exit-signal" message; noticed
400 by galb@vandyke.com
b41baf4d 401 - stevesk@cvs.openbsd.org 2002/08/27 17:13:56
402 [ssh-rsa.c]
403 RSA_public_decrypt() returns -1 on error so len must be signed;
404 ok markus@
dbcdea68 405 - stevesk@cvs.openbsd.org 2002/08/27 17:18:40
406 [ssh_config.5]
407 some warning text for ForwardAgent and ForwardX11; ok markus@
ba1566dd 408 - stevesk@cvs.openbsd.org 2002/08/29 15:57:25
409 [monitor.c session.c sshlogin.c sshlogin.h]
410 pass addrlen with sockaddr *; from Hajimu UMEMOTO <ume@FreeBSD.org>
411 NOTE: there are also p-specific parts to this patch. ok markus@
e59404d1 412 - stevesk@cvs.openbsd.org 2002/08/29 16:02:54
413 [ssh.1 ssh.c]
414 deprecate -P as UsePrivilegedPort defaults to no now; ok markus@
878b8992 415 - stevesk@cvs.openbsd.org 2002/08/29 16:09:02
416 [ssh_config.5]
417 more on UsePrivilegedPort and setuid root; ok markus@
9f324470 418 - stevesk@cvs.openbsd.org 2002/08/29 19:49:42
419 [ssh.c]
420 shrink initial privilege bracket for setuid case; ok markus@
57ff5eeb 421 - stevesk@cvs.openbsd.org 2002/08/29 22:54:10
422 [ssh_config.5 sshd_config.5]
423 state XAuthLocation is a full pathname
954640a4 424
b85698ab 42520020820
426 - OpenBSD CVS Sync
427 - millert@cvs.openbsd.org 2002/08/02 14:43:15
428 [monitor.c monitor_mm.c]
429 Change mm_zalloc() sanity checks to be more in line with what
430 we do in calloc() and add a check to monitor_mm.c.
431 OK provos@ and markus@
6a342527 432 - marc@cvs.openbsd.org 2002/08/02 16:00:07
433 [ssh.1 sshd.8]
434 note that .ssh/environment is only read when
435 allowed (PermitUserEnvironment in sshd_config).
436 OK markus@
4004c2ac 437 - markus@cvs.openbsd.org 2002/08/02 21:23:41
438 [ssh-rsa.c]
439 diff is u_int (2x); ok deraadt/provos
0caf874a 440 - markus@cvs.openbsd.org 2002/08/02 22:20:30
441 [ssh-rsa.c]
442 replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser
443 for authentication; ok deraadt/djm
75cf7563 444 - aaron@cvs.openbsd.org 2002/08/08 13:50:23
445 [sshconnect1.c]
446 Use & to test if bits are set, not &&; markus@ ok.
d6097023 447 - stevesk@cvs.openbsd.org 2002/08/08 23:54:52
448 [auth.c]
449 typo in comment
36535ee6 450 - stevesk@cvs.openbsd.org 2002/08/09 17:21:42
451 [sshd_config.5]
452 use Op for mdoc conformance; from esr@golux.thyrsus.com
453 ok aaron@
b3641662 454 - stevesk@cvs.openbsd.org 2002/08/09 17:41:12
455 [sshd_config.5]
456 proxy vs. fake display
35453849 457 - stevesk@cvs.openbsd.org 2002/08/12 17:30:35
458 [ssh.1 sshd.8 sshd_config.5]
459 more PermitUserEnvironment; ok markus@
24794905 460 - stevesk@cvs.openbsd.org 2002/08/17 23:07:14
461 [ssh.1]
462 ForwardAgent has defaulted to no for over 2 years; be more clear here.
4dcbbeea 463 - stevesk@cvs.openbsd.org 2002/08/17 23:55:01
464 [ssh_config.5]
465 ordered list here
7d3b91a6 466 - (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assign
467 it to ULONG_MAX.
b85698ab 468
cd018561 46920020813
470 - (tim) [configure.ac] Display OpenSSL header/library version.
471 Patch by dtucker@zip.com.au
472
8a48a7ef 47320020731
474 - (bal) OpenBSD CVS Sync
475 - markus@cvs.openbsd.org 2002/07/24 16:11:18
476 [hostfile.c hostfile.h sshconnect.c]
477 print out all known keys for a host if we get a unknown host key,
478 see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4
479
480 the ssharp mitm tool attacks users in a similar way, so i'd like to
481 pointed out again:
482 A MITM attack is always possible if the ssh client prints:
483 The authenticity of host 'bla' can't be established.
484 (protocol version 2 with pubkey authentication allows you to detect
485 MITM attacks)
5cb5518b 486 - mouring@cvs.openbsd.org 2002/07/25 01:16:59
487 [sftp.c]
488 FallBackToRsh does not exist anywhere else. Remove it from here.
489 OK deraadt.
567a05bf 490 - markus@cvs.openbsd.org 2002/07/29 18:57:30
491 [sshconnect.c]
492 print file:line
f00bab84 493 - markus@cvs.openbsd.org 2002/07/30 17:03:55
494 [auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5]
495 add PermitUserEnvironment (off by default!); from dot@dotat.at;
496 ok provos, deraadt
8a48a7ef 497
13979d47 49820020730
499 - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de
500
d228d9dd 50120020728
502 - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar
16c4a972 503 - (stevesk) [CREDITS] solar
75131bbd 504 - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned
505 char arg.
d228d9dd 506
d40af5fa 50720020725
508 - (djm) Remove some cruft from INSTALL
d91b4743 509 - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/
d40af5fa 510
56b54901 51120020723
512 - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger.
918ffb0b 513 - (bal) sync ID w/ ssh-agent.c
516f0d7d 514 - (bal) OpenBSD Sync
515 - markus@cvs.openbsd.org 2002/07/19 15:43:33
516 [log.c log.h session.c sshd.c]
517 remove fatal cleanups after fork; based on discussions with and code
518 from solar.
5d185586 519 - stevesk@cvs.openbsd.org 2002/07/19 17:42:40
520 [ssh.c]
521 display a warning from ssh when XAuthLocation does not exist or xauth
522 returned no authentication data. ok markus@
30998af1 523 - stevesk@cvs.openbsd.org 2002/07/21 18:32:20
524 [auth-options.c]
525 unneeded includes
dbc728ff 526 - stevesk@cvs.openbsd.org 2002/07/21 18:34:43
527 [auth-options.h]
528 remove invalid comment
97686bf9 529 - markus@cvs.openbsd.org 2002/07/22 11:03:06
530 [session.c]
531 fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors;
d341742a 532 - stevesk@cvs.openbsd.org 2002/07/22 17:32:56
533 [monitor.c]
534 u_int here; ok provos@
67f04db1 535 - stevesk@cvs.openbsd.org 2002/07/23 16:03:10
536 [sshd.c]
537 utmp_len is unsigned; display error consistent with other options.
538 ok markus@
0df3a240 539 - stevesk@cvs.openbsd.org 2002/07/15 17:15:31
540 [uidswap.c]
541 little more debugging; ok markus@
d341742a 542
21c2c5cd 54320020722
544 - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk
a93bd14c 545 - (stevesk) [xmmap.c] missing prototype for fatal()
ccbb983c 546 - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync
547 with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com.
d262b7f2 548 - (bal) [configure.ac] Missing ;; from cray patch.
30eab01d 549 - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines
550 into it's own header.
ee48c949 551 - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be
552 freed by the caller; add free_pam_environment() and use it.
1d3f4ae7 553 - (stevesk) [auth-pam.c] typo in comment
21c2c5cd 554
b992432e 55520020721
556 - (stevesk) [auth-pam.c] merge cosmetic changes from solar's
557 openssh-3.4p1-owl-password-changing.diff
277f55cf 558 - (stevesk) [auth-pam.c] merge rest of solar's PAM patch;
559 PAM_NEW_AUTHTOK_REQD remains in #if 0 for now.
f7808a93 560 - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch
561 warning on pam_conv struct conversation function.
337dde6b 562 - (stevesk) [auth-pam.h] license
8565f28e 563 - (stevesk) [auth-pam.h] unneeded include
e9b2c23d 564 - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h
b992432e 565
ce88d9df 56620020720
567 - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng().
568
4379c0e5 56920020719
570 - (tim) [contrib/solaris/buildpkg.sh] create privsep user/group if needed.
571 Patch by dtucker@zip.com.au
f75ca46d 572 - (tim) [configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au
4379c0e5 573
45491100 57420020718
575 - (tim) [defines.h] Bug 313 patch by dirk.meyer@dinoex.sub.org
576 - (tim) [monitor_mm.c] add missing declaration for xmmap(). Reported
577 by ayamura@ayamura.org
1cbbe6c8 578 - (tim) [configure.ac] Bug 267 rework int64_t test.
5749e709 579 - (tim) [includes.h] Bug 267 add stdint.h
45491100 580
dd3943d0 58120020717
582 - (bal) aixbff package updated by dtucker@zip.com.au
2bf42e4a 583 - (tim) [configure.ac] change how we do paths in AC_PATH_PROGS tests
584 for autoconf 2.53. Based on a patch by jrj@purdue.edu
dd3943d0 585
8fc47887 58620020716
587 - (tim) [contrib/solaris/opensshd.in] Only kill sshd if .pid file found
588
c750d869 58920020715
590 - (bal) OpenBSD CVS Sync
591 - itojun@cvs.openbsd.org 2002/07/12 13:29:09
592 [sshconnect.c]
593 print connect failure during debugging mode.
a2f883ce 594 - markus@cvs.openbsd.org 2002/07/12 15:50:17
595 [cipher.c]
596 EVP_CIPH_CUSTOM_IV for our own rijndael
2d199535 597 - (bal) Remove unused tty defined in do_setusercontext() pointed out by
598 dtucker@zip.com.au plus a a more KNF since I am near it.
846be3f4 599 - (bal) Privsep user creation support in Solaris buildpkg.sh by
600 dtucker@zip.com.au
c750d869 601
798c5808 60220020714
603 - (tim) [Makefile.in] replace "id sshd" with "sshd -t"
4165b82e 604 - (bal/tim) [acconfig.h configure.ac monitor_mm.c servconf.c
605 openbsd-compat/Makefile.in] support compression on platforms that
606 have no/broken MAP_ANON. Moved code to openbsd-compat/xmmap.c
607 Based on patch from nalin@redhat.com of code extracted from Owl's package
5fd8087a 608 - (tim) [ssh_prng_cmds.in] Bug 323 arp -n flag doesn't exist under Solaris.
609 report by chris@by-design.net
fdebdd4f 610 - (tim) [loginrec.c] Bug 347: Fix typo (WTMPX_FILE) report by rodney@bond.net
d80063fe 611 - (tim) [loginrec.c] Bug 348: add missing found = 1; to wtmpx_islogin()
612 report by rodney@bond.net
798c5808 613
6b2a3595 61420020712
615 - (tim) [Makefile.in] quiet down install-files: and check-user:
3085601b 616 - (tim) [configure.ac] remove unused filepriv line
6b2a3595 617
249f9903 61820020710
619 - (tim) [contrib/cygwin/ssh-host-config] explicitely sets the permissions
620 on /var/empty to 755 Patch by vinschen@redhat.com
6f901f8e 621 - (bal) OpenBSD CVS Sync
622 - itojun@cvs.openbsd.org 2002/07/09 11:56:50
623 [sshconnect.c]
624 silently try next address on connect(2). markus ok
59c825e1 625 - itojun@cvs.openbsd.org 2002/07/09 11:56:27
626 [canohost.c]
627 suppress log on reverse lookup failiure, as there's no real value in
628 doing so.
629 markus ok
aab5431b 630 - itojun@cvs.openbsd.org 2002/07/09 12:04:02
631 [sshconnect.c]
632 ed static function (less warnings)
94ad46d1 633 - stevesk@cvs.openbsd.org 2002/07/09 17:46:25
634 [sshd_config.5]
635 clarify no preference ordering in protocol list; ok markus@
9bd68577 636 - itojun@cvs.openbsd.org 2002/07/10 10:28:15
637 [sshconnect.c]
638 bark if all connection attempt fails.
09683edf 639 - deraadt@cvs.openbsd.org 2002/07/10 17:53:54
640 [rijndael.c]
641 use right sizeof in memcpy; markus ok
249f9903 642
e6f15ed1 64320020709
644 - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platforms
645 lacking that concept can share it. Patch by vinschen@redhat.com
646
4f9d6706 64720020708
648 - (tim) [openssh/contrib/solaris/buildpkg.sh] add PKG_INSTALL_ROOT to
649 work in a jumpstart environment. patch by kbrint@rufus.net
b451e27b 650 - (tim) [Makefile.in] workaround for broken pakadd on some systems.
cda1ebcb 651 - (tim) [configure.ac] fix libc89 utimes test. Mention default path for
652 --with-privsep-path=
4f9d6706 653
ac74561e 65420020707
655 - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH)
94d8258b 656 - (tim) [acconfig.h configure.ac sshd.c]
657 s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/
d41f8eed 658 - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes
659 patch from vinschen@redhat.com
0b832146 660 - (bal) [realpath.c] Updated with OpenBSD tree.
da2499f5 661 - (bal) OpenBSD CVS Sync
662 - deraadt@cvs.openbsd.org 2002/07/04 04:15:33
663 [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c]
664 patch memory leaks; grendel@zeitbombe.org
e1feb9bf 665 - deraadt@cvs.openbsd.org 2002/07/04 08:12:15
666 [channels.c packet.c]
667 blah blah minor nothing as i read and re-read and re-read...
eb9f2fab 668 - markus@cvs.openbsd.org 2002/07/04 10:41:47
669 [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c]
670 don't allocate, copy, and discard if there is not interested in the data;
671 ok deraadt@
4394a17f 672 - deraadt@cvs.openbsd.org 2002/07/06 01:00:49
673 [log.c]
674 KNF
50d2fbbc 675 - deraadt@cvs.openbsd.org 2002/07/06 01:01:26
676 [ssh-keyscan.c]
677 KNF, realloc fix, and clean usage
12a3f2c3 678 - stevesk@cvs.openbsd.org 2002/07/06 17:47:58
679 [ssh-keyscan.c]
680 unused variable
41545cb6 681 - (bal) Minor KNF on ssh-keyscan.c
ac74561e 682
0764e748 68320020705
684 - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs.
685 Reported by Darren Tucker <dtucker@zip.com.au>
e12659f4 686 - (tim) [contrib/cygwin/ssh-host-config] double slash corrction
687 from vinschen@redhat.com
0764e748 688
64c0ce80 68920020704
690 - (bal) Limit data to TTY for AIX only (Newer versions can't handle the
691 faster data rate) Bug #124
375c1dee 692 - (bal) glob.c defines TILDE and AIX also defines it. #undef it first.
693 bug #265
ff2de800 694 - (bal) One too many nulls in ports-aix.c
64c0ce80 695
d2f95449 69620020703
697 - (bal) Updated contrib/cygwin/ patch by vinschen@redhat.com
619a6aff 698 - (bal) minor correction to utimes() replacement. Patch by
699 onoe@sm.sony.co.jp
f11fe301 700 - OpenBSD CVS Sync
701 - markus@cvs.openbsd.org 2002/06/27 08:49:44
702 [dh.c ssh-keyscan.c sshconnect.c]
703 more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@
181d6635 704 - deraadt@cvs.openbsd.org 2002/06/27 09:08:00
705 [monitor.c]
706 improve mm_zalloc check; markus ok
30e37ee6 707 - deraadt@cvs.openbsd.org 2002/06/27 10:35:47
708 [auth2-none.c monitor.c sftp-client.c]
709 use xfree()
c8f94200 710 - stevesk@cvs.openbsd.org 2002/06/27 19:49:08
711 [ssh-keyscan.c]
712 use convtime(); ok markus@
a64d3560 713 - millert@cvs.openbsd.org 2002/06/28 01:49:31
714 [monitor_mm.c]
715 tree(3) wants an int return value for its compare functions and
716 the difference between two pointers is not an int. Just do the
717 safest thing and store the result in a long and then return 0,
718 -1, or 1 based on that result.
405a0d43 719 - deraadt@cvs.openbsd.org 2002/06/28 01:50:37
720 [monitor_wrap.c]
721 use ssize_t
4efd85b2 722 - deraadt@cvs.openbsd.org 2002/06/28 10:08:25
723 [sshd.c]
724 range check -u option at invocation
6ded293b 725 - deraadt@cvs.openbsd.org 2002/06/28 23:05:06
726 [sshd.c]
727 gidset[2] -> gidset[1]; markus ok
7fdc56c5 728 - deraadt@cvs.openbsd.org 2002/06/30 21:54:16
729 [auth2.c session.c sshd.c]
730 lint asks that we use names that do not overlap
343288b8 731 - deraadt@cvs.openbsd.org 2002/06/30 21:59:45
732 [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c
733 monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c
734 sshconnect2.c sshd.c]
735 minor KNF
7d60d74c 736 - deraadt@cvs.openbsd.org 2002/07/01 16:15:25
737 [msg.c]
738 %u
713f6cd9 739 - markus@cvs.openbsd.org 2002/07/01 19:48:46
740 [sshconnect2.c]
741 for compression=yes, we fallback to no-compression if the server does
742 not support compression, vice versa for compression=no. ok mouring@
261189cc 743 - markus@cvs.openbsd.org 2002/07/03 09:55:38
744 [ssh-keysign.c]
745 use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld)
746 in order to avoid a possible Kocher timing attack pointed out by Charles
747 Hannum; ok provos@
60cd0a97 748 - markus@cvs.openbsd.org 2002/07/03 14:21:05
749 [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config]
750 re-enable ssh-keysign's sbit, but make ssh-keysign read
751 /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled
752 globally. based on discussions with deraadt, itojun and sommerfeld;
753 ok itojun@
56fd97d7 754 - (bal) Failed password attempts don't increment counter on AIX. Bug #145
e8aa0a5c 755 - (bal) Missed Makefile.in change. keysign needs readconf.o
0ba40daa 756 - (bal) Clean up aix_usrinfo(). Ignore TTY= period I guess.
56fd97d7 757
b2f295dc 75820020702
759 - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc &
760 friends consistently. Spotted by Solar Designer <solar@openwall.com>
761
3c3e878a 76220020629
763 - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style
764 clean up while I'm near it.
765
811ee370 76620020628
767 - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented
768 options should contain default value. from solar.
b9b82dab 769 - (bal) Cygwin uid0 fix by vinschen@redhat.com
17962c40 770 - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c. Otherwise wise
771 have issues of our fixes not propogating right (ie bcopy instead of
772 memmove). OK tim
4fa4fb00 773 - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported.
774 Bug #303
811ee370 775
ce88d9df 77620020627
d1ff09ba 777 - OpenBSD CVS Sync
778 - deraadt@cvs.openbsd.org 2002/06/26 14:49:36
779 [monitor.c]
780 correct %u
63b5f1a1 781 - deraadt@cvs.openbsd.org 2002/06/26 14:50:04
782 [monitor_fdpass.c]
783 use ssize_t for recvmsg() and sendmsg() return
1431a900 784 - markus@cvs.openbsd.org 2002/06/26 14:51:33
785 [ssh-add.c]
786 fix exit code for -X/-x
bb0640b2 787 - deraadt@cvs.openbsd.org 2002/06/26 15:00:32
788 [monitor_wrap.c]
789 more %u
20e79e98 790 - markus@cvs.openbsd.org 2002/06/26 22:27:32
791 [ssh-keysign.c]
792 bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu
d1ff09ba 793
4bfa8bb6 79420020626
795 - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM
a594fa74 796 - (bal) OpenBSD CVS Sync
797 - markus@cvs.openbsd.org 2002/06/23 21:34:07
798 [channels.c]
799 tcode is u_int
38501509 800 - markus@cvs.openbsd.org 2002/06/24 13:12:23
801 [ssh-agent.1]
802 the socket name contains ssh-agent's ppid; via mpech@ from form@
f91d9a89 803 - markus@cvs.openbsd.org 2002/06/24 14:33:27
804 [channels.c channels.h clientloop.c serverloop.c]
805 move channel counter to u_int
1169c3df 806 - markus@cvs.openbsd.org 2002/06/24 14:55:38
807 [authfile.c kex.c ssh-agent.c]
808 cat to (void) when output from buffer_get_X is ignored
09915dc1 809 - itojun@cvs.openbsd.org 2002/06/24 15:49:22
810 [msg.c]
811 printf type pedant
d0a1c5d1 812 - deraadt@cvs.openbsd.org 2002/06/24 17:57:20
813 [sftp-server.c sshpty.c]
814 explicit (u_int) for uid and gid
6c69a6a9 815 - markus@cvs.openbsd.org 2002/06/25 16:22:42
816 [authfd.c]
817 unnecessary cast
87809a1f 818 - markus@cvs.openbsd.org 2002/06/25 18:51:04
819 [sshd.c]
820 lightweight do_setusercontext after chroot()
924681ee 821 - (bal) Updated AIX package build. Patch by dtucker@zip.com.au
46c8ebb3 822 - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8
78beb77d 823 - (bal) added back in error check for mmap(). I screwed up, Pointed
824 out by stevesk@
f2d9a1f8 825 - (tim) [README.privsep] UnixWare tip no longer needed.
88cb875c 826 - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP,
827 but it all damned lies.
0d0270e6 828 - (stevesk) [README.privsep] more for sshd pseudo-account.
8029e7fc 829 - (tim) [contrib/caldera/openssh.spec] add support for privsep
8695f9f7 830 - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@
b29fe4ea 831 - (djm) OpenBSD CVS Sync
832 - markus@cvs.openbsd.org 2002/06/26 08:53:12
833 [bufaux.c]
834 limit size of BNs to 8KB; ok provos/deraadt
22d62d31 835 - markus@cvs.openbsd.org 2002/06/26 08:54:18
836 [buffer.c]
837 limit append to 1MB and buffers to 10MB
5df8c731 838 - markus@cvs.openbsd.org 2002/06/26 08:55:02
839 [channels.c]
840 limit # of channels to 10000
87f18810 841 - markus@cvs.openbsd.org 2002/06/26 08:58:26
842 [session.c]
843 limit # of env vars to 1000; ok deraadt/djm
2f095a0e 844 - deraadt@cvs.openbsd.org 2002/06/26 13:20:57
845 [monitor.c]
846 be careful in mm_zalloc
66087567 847 - deraadt@cvs.openbsd.org 2002/06/26 13:49:26
848 [session.c]
849 disclose less information from environment files; based on input
850 from djm, and dschultz@uclink.Berkeley.EDU
477edc5d 851 - markus@cvs.openbsd.org 2002/06/26 13:55:37
852 [auth2-chall.c]
853 make sure # of response matches # of queries, fixes int overflow;
854 from ISS
03b14b6f 855 - markus@cvs.openbsd.org 2002/06/26 13:56:27
856 [version.h]
857 3.4
9c696d0d 858 - (djm) Require krb5 devel for RPM build w/ KrbV
c4186be7 859 - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai
860 <nalin@redhat.com>
1e7bc74c 861 - (djm) Update spec files for release
49b53b03 862 - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS
03b14b6f 863 - (djm) Release 3.4p1
6519cfd6 864 - (tim) [contrib/caldera/openssh.spec] remove 2 configure options I put in
865 by mistake
4bfa8bb6 866
ef1ac12b 86720020625
868 - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh
1a44c6f7 869 - (stevesk) [README.privsep] minor updates
fd3cbf67 870 - (djm) Create privsep directory and warn if privsep user is missing
871 during make install
702b2855 872 - (bal) Started list of PrivSep issues in TODO
1c6249af 873 - (bal) if mmap() is substandard, don't allow compression on server side.
874 Post 'event' we will add more options.
cbaa3d44 875 - (tim) [contrib/caldera/openssh.spec] Sync with Caldera
e2bc41f9 876 - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by
877 dtucker@zip.com.au
d170feb1 878 - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus
879 for Cygwin, Cray, & SCO
ef1ac12b 880
d5803314 88120020624
882 - OpenBSD CVS Sync
883 - deraadt@cvs.openbsd.org 2002/06/23 03:25:50
884 [tildexpand.c]
885 KNF
3ddc795d 886 - deraadt@cvs.openbsd.org 2002/06/23 03:26:19
887 [cipher.c key.c]
888 KNF
d6133f43 889 - deraadt@cvs.openbsd.org 2002/06/23 03:30:58
890 [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c
891 sshpty.c]
892 various KNF and %d for unsigned
9906a836 893 - deraadt@cvs.openbsd.org 2002/06/23 09:30:14
894 [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c
895 sftp.c]
896 bunch of u_int vs int stuff
512df038 897 - deraadt@cvs.openbsd.org 2002/06/23 09:39:55
898 [ssh-keygen.c]
899 u_int stuff
7528d467 900 - deraadt@cvs.openbsd.org 2002/06/23 09:46:51
901 [bufaux.c servconf.c]
902 minor KNF. things the fingers do while you read
e424e241 903 - deraadt@cvs.openbsd.org 2002/06/23 10:29:52
904 [ssh-agent.c sshd.c]
905 some minor KNF and %u
7138ebd9 906 - deraadt@cvs.openbsd.org 2002/06/23 20:39:45
907 [session.c]
908 compression_level is u_int
f09ce20a 909 - deraadt@cvs.openbsd.org 2002/06/23 21:06:13
910 [sshpty.c]
911 KNF
57f228e8 912 - deraadt@cvs.openbsd.org 2002/06/23 21:06:41
913 [channels.c channels.h session.c session.h]
914 display, screen, row, col, xpixel, ypixel are u_int; markus ok
0bc50167 915 - deraadt@cvs.openbsd.org 2002/06/23 21:10:02
916 [packet.c]
917 packet_get_int() returns unsigned for reason & seqnr
57f228e8 918 - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col,
919 xpixel are u_int.
920
d5803314 921
58177c0a 92220020623
923 - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX.
dc43acd2 924 - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset.
ef3912be 925 - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au
a8bbdc75 926 - OpenBSD CVS Sync
927 - stevesk@cvs.openbsd.org 2002/06/22 02:00:29
928 [ssh.h]
929 correct comment
1ae02182 930 - stevesk@cvs.openbsd.org 2002/06/22 02:40:23
931 [ssh.1]
932 section 5 not 4 for ssh_config
b2843ec6 933 - naddy@cvs.openbsd.org 2002/06/22 11:51:39
934 [ssh.1]
935 typo
75653d3e 936 - stevesk@cvs.openbsd.org 2002/06/22 16:32:54
937 [sshd.8]
938 add /var/empty in FILES section
a56313d7 939 - stevesk@cvs.openbsd.org 2002/06/22 16:40:19
940 [sshd.c]
941 check /var/empty owner mode; ok provos@
e4e83d70 942 - stevesk@cvs.openbsd.org 2002/06/22 16:41:57
943 [scp.1]
944 typo
baa08b92 945 - stevesk@cvs.openbsd.org 2002/06/22 16:45:29
946 [ssh-agent.1 sshd.8 sshd_config.5]
947 use process ID vs. pid/PID/process identifier
c28876e9 948 - stevesk@cvs.openbsd.org 2002/06/22 20:05:27
949 [sshd.c]
950 don't call setsid() if debugging or run from inetd; no "Operation not
951 permitted" errors now; ok millert@ markus@
d17ef027 952 - stevesk@cvs.openbsd.org 2002/06/22 23:09:51
953 [monitor.c]
954 save auth method before monitor_reset_key_state(); bugzilla bug #284;
955 ok provos@
58177c0a 956
0b202697 957$Id$
This page took 0.42242 seconds and 5 git commands to generate.