]> andersk Git - openssh.git/blame - ChangeLog
- (djm) [auth-pam.c] Don't use crappy APIs like sprintf. Thanks bal
[openssh.git] / ChangeLog
CommitLineData
cbdeccf3 120030730
2 - (djm) [auth-pam.c] Don't use crappy APIs like sprintf. Thanks bal
3
a9705c94 420030726
5 - (dtucker) [openbsd-compat/xcrypt.c] Fix typo: DISABLED_SHADOW ->
6 DISABLE_SHADOW. Fixes HP-UX compile error.
7
7c6eb32f 820030724
9 - (bal) [auth-passwd.c openbsd-compat/Makefile.in openbsd-compat/xcrypt.c
10 openbsd-compat/xcrypt.h] Split off encryption into xcrypt() interface,
11 and isolate shadow password functions. Tested in Solaris, but should
12 not break other platforms too badly (except maybe HP =). Also brings
13 auth-passwd.c into full sync with OpenBSD tree.
14
82e5907c 1520030723
16 - (dtucker) [configure.ac] Back out change for bug #620.
17
defb525d 1820030719
19 - (dtucker) [configure.ac] Bug #620: Define BROKEN_GETADDRINFO for
20 Solaris/x86. Patch from jrhett at isite.net.
7b390973 21 - (dtucker) OpenBSD CVS Sync
22 - markus@cvs.openbsd.org 2003/07/14 12:36:37
23 [sshd.c]
24 remove undocumented -V option. would be only useful if openssh is used
25 as ssh v1 server for ssh.com's ssh v2.
e053cd2c 26 - markus@cvs.openbsd.org 2003/07/16 10:34:53
27 [ssh.c sshd.c]
28 don't exit on multiple -v or -d; ok deraadt@
145d23ca 29 - markus@cvs.openbsd.org 2003/07/16 10:36:28
30 [sshtty.c]
31 clear IUCLC in enter_raw_mode; from rob@pitman.co.za; ok deraadt@, fgs@
261bd618 32 - deraadt@cvs.openbsd.org 2003/07/18 01:54:25
33 [scp.c]
34 userid is unsigned, but well, force it anyways; andrushock@korovino.net
b3d04e37 35 - djm@cvs.openbsd.org 2003/07/19 00:45:53
36 [sftp-int.c]
37 fix sftp filename parsing for arguments with escaped quotes. bz #517;
38 ok markus
86d0260c 39 - djm@cvs.openbsd.org 2003/07/19 00:46:31
40 [regress/sftp-cmds.sh]
41 regress test for sftp arguments with escaped quotes; ok markus
defb525d 42
e351e493 4320030714
44 - (dtucker) [acconfig.h configure.ac port-aix.c] Older AIXes don't declare
45 loginfailed at all, so assume 3-arg loginfailed if not declared.
1cd5765d 46 - (dtucker) [port-aix.h] Work around name collision on AIX for r_type by
47 undef'ing it.
2aa3a16c 48 - (dtucker) Bug #543: [configure.ac port-aix.c port-aix.h]
49 Call setauthdb() before loginfailed(), which may load password registry-
defb525d 50 specific functions. Based on patch by cawlfiel at us.ibm.com.
b4777c18 51 - (dtucker) [port-aix.h] Fix prototypes.
956b0f56 52 - (dtucker) OpenBSD CVS Sync
53 - avsm@cvs.openbsd.org 2003/07/09 13:58:19
54 [key.c]
55 minor tweak: when generating the hex fingerprint, give strlcat the full
56 bound to the buffer, and add a comment below explaining why the
57 zero-termination is one less than the bound. markus@ ok
40729edd 58 - markus@cvs.openbsd.org 2003/07/10 14:42:28
59 [packet.c]
60 the 2^(blocksize*2) rekeying limit is too expensive for 3DES,
61 blowfish, etc, so enforce a 1GB limit for small blocksizes.
659912db 62 - markus@cvs.openbsd.org 2003/07/10 20:05:55
63 [sftp.c]
64 sync usage with manpage, add missing -R
e351e493 65
f58c0e01 6620030708
67 - (dtucker) [acconfig.h auth-passwd.c configure.ac session.c port-aix.[ch]]
68 Include AIX headers for authentication functions and make calls match
e351e493 69 prototypes. Test for and handle 3-arg and 4-arg variants of loginfailed.
bc7dfc06 70 - (dtucker) [session.c] Check return value of setpcred().
71 - (dtucker) [auth-passwd.c auth.c session.c sshd.c port-aix.c port-aix.h]
72 Convert aixloginmsg into platform-independant Buffer loginmsg.
f58c0e01 73
309709db 7420030707
75 - (dtucker) [configure.ac] Bug #600: Check that getrusage is declared before
76 searching libraries for it. Fixes build errors on NCR MP-RAS.
77
d72f7b79 7820030706
79 - (dtucker) [ssh-rand-helper.c loginrec.c]
80 Apply atomicio typing change to these too.
81
71b9ced0 8220030703
83 - (dtucker) OpenBSD CVS Sync
84 - djm@cvs.openbsd.org 2003/06/28 07:48:10
85 [sshd.c]
86 report pidfile creation errors, based on patch from Roumen Petrov;
87 ok markus@
dc54438a 88 - deraadt@cvs.openbsd.org 2003/06/28 16:23:06
89 [atomicio.c atomicio.h authfd.c clientloop.c monitor_wrap.c msg.c
90 progressmeter.c scp.c sftp-client.c ssh-keyscan.c ssh.h sshconnect.c
91 sshd.c]
92 deal with typing of write vs read in atomicio
7caca6d4 93 - markus@cvs.openbsd.org 2003/06/29 12:44:38
94 [sshconnect.c]
95 memset 0, not \0; andrushock@korovino.net
8e7c9afc 96 - markus@cvs.openbsd.org 2003/07/02 12:56:34
97 [channels.c]
98 deny dynamic forwarding with -R for v1, too; ok djm@
f49658f5 99 - markus@cvs.openbsd.org 2003/07/02 14:51:16
100 [channels.c ssh.1 ssh_config.5]
101 (re)add socks5 suppport to -D; ok djm@
102 now ssh(1) can act both as a socks 4 and socks 5 server and
103 dynamically forward ports.
03c82656 104 - markus@cvs.openbsd.org 2003/07/02 20:37:48
105 [ssh.c]
106 convert hostkeyalias to lowercase, otherwise uppercase aliases will
107 not match at all; ok henning@
1768a611 108 - markus@cvs.openbsd.org 2003/07/03 08:21:46
109 [regress/dynamic-forward.sh]
110 add socks5; speedup; reformat; based on patch from dtucker@zip.com.au
7664edb6 111 - markus@cvs.openbsd.org 2003/07/03 08:24:13
112 [regress/Makefile]
113 enable tests for dynamic fwd via socks (-D), uses nc(1)
1572b90f 114 - djm@cvs.openbsd.org 2003/07/03 08:09:06
115 [readconf.c readconf.h ssh-keysign.c ssh.c]
116 fix AddressFamily option in config file, from brent@graveland.net;
117 ok markus@
71b9ced0 118
4e00038c 11920030630
120 - (djm) Search for support functions necessary to build our
121 getrrsetbyname() replacement. Patch from Roumen Petrov
122
9f59c5a3 12320030629
c5829391 124 - (dtucker) [includes.h] Bug #602: move #include of netdb.h to after in.h
125 (fixes compiler warnings on Solaris 2.5.1).
126 - (dtucker) [configure.ac] Add sanity test after system-dependant compiler
127 flag modifications.
9f59c5a3 128
9ea150a7 12920030628
130 - (djm) Bug #591: use PKCS#15 private key label as a comment in case
131 of OpenSC. Report and patch from larsch@trustcenter.de
d2168412 132 - (djm) Bug #593: Sanity check OpenSC card reader number; patch from
133 aj@dungeon.inka.de
f0677b69 134 - (dtucker) OpenBSD CVS Sync
135 - markus@cvs.openbsd.org 2003/06/23 09:02:44
136 [ssh_config.5]
137 document EnableSSHKeysign; bugzilla #599; ok deraadt@, jmc@
a27002e5 138 - markus@cvs.openbsd.org 2003/06/24 08:23:46
139 [auth2-hostbased.c auth2-pubkey.c auth2.c channels.c key.c key.h
140 monitor.c packet.c packet.h serverloop.c sshconnect2.c sshd.c]
141 int -> u_int; ok djm@, deraadt@, mouring@
d7ded285 142 - miod@cvs.openbsd.org 2003/06/25 22:39:36
143 [sftp-server.c]
144 Typo police: attribute is better written with an 'r'.
2d9c1828 145 - markus@cvs.openbsd.org 2003/06/26 20:08:33
146 [readconf.c]
147 do not dump core for 'ssh -o proxycommand host'; ok deraadt@
78b2dd04 148 - (dtucker) [regress/dynamic-forward.sh] Import new regression test.
ddb154b3 149 - (dtucker) [configure.ac] Bug #570: Have ./configure --enable-FEATURE
150 actually enable the feature, for those normally disabled. Patch by
151 openssh (at) roumenpetrov.info.
f0677b69 152
e15ba28b 15320030624
154 - (dtucker) Have configure refer the user to config.log and
155 contrib/findssl.sh for OpenSSL header/library mismatches.
156
63a556df 15720030622
c1ffd4bd 158 - (dtucker) OpenBSD CVS Sync
63a556df 159 - markus@cvs.openbsd.org 2003/06/21 09:14:05
c1ffd4bd 160 [regress/reconfigure.sh]
63a556df 161 missing $SUDO; from dtucker@zip.com.au
93527718 162 - markus@cvs.openbsd.org 2003/06/18 11:28:11
c1ffd4bd 163 [ssh-rsa.c]
164 backout last change, since it violates pkcs#1
165 switch to share/misc/license.template
1891396b 166 - djm@cvs.openbsd.org 2003/06/20 05:47:58
167 [sshd_config.5]
168 sync description of protocol 2 cipher proposal; ok markus
4db4d313 169 - djm@cvs.openbsd.org 2003/06/20 05:48:21
170 [sshd_config]
171 sync some implemented options; ok markus@
63a556df 172 - (dtucker) [regress/authorized_keys_root] Remove temp data file from CVS.
39ef3618 173 - (dtucker) [openbsd-compat/setproctitle.c] Ensure SPT_TYPE is defined before
174 testing its value.
63a556df 175
b8e04133 17620030618
177 - (djm) OpenBSD CVS Sync
178 - markus@cvs.openbsd.org 2003/06/12 07:57:38
179 [monitor.c sshlogin.c sshpty.c]
180 typos; dtucker at zip.com.au
b9ad9d13 181 - djm@cvs.openbsd.org 2003/06/12 12:22:47
182 [LICENCE]
183 mention more copyright holders; ok markus@
1fb23629 184 - nino@cvs.openbsd.org 2003/06/12 15:34:09
185 [scp.c]
186 Typo. Ok markus@.
244e796f 187 - markus@cvs.openbsd.org 2003/06/12 19:12:03
188 [scard.c scard.h ssh-agent.c ssh.c]
189 add sc_get_key_label; larsch at trustcenter.de; bugzilla#591
9250058a 190 - markus@cvs.openbsd.org 2003/06/16 08:22:35
191 [ssh-rsa.c]
192 make sure the signature has at least the expected length (don't
193 insist on len == hlen + oidlen, since this breaks some smartcards)
194 bugzilla #592; ok djm@
360a4aae 195 - markus@cvs.openbsd.org 2003/06/16 10:22:45
196 [ssh-add.c]
197 print out key comment on each prompt; make ssh-askpass more useable; ok djm@
0a59bd6b 198 - markus@cvs.openbsd.org 2003/06/17 18:14:23
199 [cipher-ctr.c]
200 use license from /usr/share/misc/license.template for new code
1d6c0b69 201 - (dtucker) [reconfigure.sh rekey.sh sftp-badcmds.sh]
202 Import new regression tests from OpenBSD
d4d84f5f 203 - (dtucker) [regress/copy.1 regress/copy.2] Remove temp data files from CVS.
ed49cc81 204 - (dtucker) OpenBSD CVS Sync (regress/)
205 - markus@cvs.openbsd.org 2003/04/02 12:21:13
206 [Makefile]
207 enable rekey test
2c670155 208 - djm@cvs.openbsd.org 2003/04/04 09:34:22
209 [Makefile sftp-cmds.sh]
210 More regression tests, including recent directory rename bug; ok markus@
737447ad 211 - markus@cvs.openbsd.org 2003/05/14 22:08:27
212 [ssh-com-client.sh ssh-com-keygen.sh ssh-com-sftp.sh ssh-com.sh]
213 test against some new commerical versions
68df2aa0 214 - mouring@cvs.openbsd.org 2003/05/15 04:07:12
215 [sftp-cmds.sh]
216 Advanced put/get testing for sftp. OK @djm
eb9bf761 217 - markus@cvs.openbsd.org 2003/06/12 15:40:01
218 [try-ciphers.sh]
219 add ctr
39c0191e 220 - markus@cvs.openbsd.org 2003/06/12 15:43:32
221 [Makefile]
222 test -HUP; dtucker at zip.com.au
b8e04133 223
f5827134 22420030614
225 - (djm) Update license on fake-rfc2553.[ch]; ok itojun@
226
be193d89 22720030611
c12c6ef8 228 - (djm) Mention portable copyright holders in LICENSE
e52ca1e5 229 - (djm) Put licenses on substantial header files
8cb3fa9d 230 - (djm) Sync LICENSE against OpenBSD
be193d89 231 - (djm) OpenBSD CVS Sync
232 - jmc@cvs.openbsd.org 2003/06/10 09:12:11
233 [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5]
234 [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
235 - section reorder
236 - COMPATIBILITY merge
237 - macro cleanup
238 - kill whitespace at EOL
239 - new sentence, new line
240 ssh pages ok markus@
0daa6547 241 - deraadt@cvs.openbsd.org 2003/06/10 22:20:52
242 [packet.c progressmeter.c]
243 mostly ansi cleanup; pval ok
1432b5c4 244 - jakob@cvs.openbsd.org 2003/06/11 10:16:16
245 [sshconnect.c]
246 clean up check_host_key() and improve SSHFP feedback. ok markus@
cc263107 247 - jakob@cvs.openbsd.org 2003/06/11 10:18:47
248 [dns.c]
249 sync with check_host_key() change
ca719034 250 - djm@cvs.openbsd.org 2003/06/11 11:18:38
251 [authfd.c authfd.h ssh-add.c ssh-agent.c]
252 make agent constraints (lifetime, confirm) work with smartcard keys;
253 ok markus@
be193d89 254
255
8a547250 25620030609
257 - (djm) Sync README.smartcard with OpenBSD -current
a1864983 258 - (djm) Re-merge OpenSC info into README.smartcard
8a547250 259
f5db6a03 26020030606
261 - (dtucker) [uidswap.c] Fix setreuid and add missing args to fatal(). ok djm@
262
02e2a074 26320030605
264 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
265 canohost.c changes.
688eed4a 266 - (djm) Implement paranoid priv dropping checks, based on:
267 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
268 Proceedings of USENIX Security Symposium 2002
d6bd2b5a 269 - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
52d58495 270 - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
57c917f8 271 - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
272 Patch from larsch@trustcenter.de
7b7f164b 273 - (djm) Bug #589 - scard-opensc: load only keys with a private keys
274 Patch from larsch@trustcenter.de
4ed465ec 275 - (dtucker) Add includes.h to fake-rfc2553.c so it will build.
e932f447 276 - (dtucker) Define EAI_NONAME in fake-rfc2553.h (used by fake-rfc2553.c).
02e2a074 277
b08a39ff 27820030604
d60e487c 279 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
280 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
8acdec60 281 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
11f1e60e 282 Patch from larsch@trustcenter.de; ok markus@
283 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
284 larsch@trustcenter.de; ok markus@
d453a600 285 - (djm) OpenBSD CVS Sync
286 - djm@cvs.openbsd.org 2003/06/04 08:25:18
287 [sshconnect.c]
288 disable challenge/response and keyboard-interactive auth methods
289 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
290 bz #580; ok markus@
ee50371d 291 - djm@cvs.openbsd.org 2003/06/04 10:23:48
292 [sshd.c]
293 remove duplicated group-dropping code; ok markus@
b08a39ff 294 - djm@cvs.openbsd.org 2003/06/04 12:03:59
295 [serverloop.c]
296 remove bitrotten commet; ok markus@
cf3248b8 297 - djm@cvs.openbsd.org 2003/06/04 12:18:49
298 [scp.c]
299 ansify; ok markus@
0f764b2f 300 - djm@cvs.openbsd.org 2003/06/04 12:40:39
301 [scp.c]
302 kill ssh process upon receipt of signal, bz #241.
303 based on patch from esb AT hawaii.edu; ok markus@
1b558925 304 - djm@cvs.openbsd.org 2003/06/04 12:41:22
305 [sftp.c]
306 kill ssh process on receipt of signal; ok markus@
fba33e81 307 - (djm) Update to fix of bug #584: lock card before return.
308 From larsch@trustcenter.de
8d9bb5dd 309 - (djm) Always use mysignal() for SIGALRM
d60e487c 310
3a2b2b44 31120030603
312 - (djm) Replace setproctitle replacement with code derived from
313 UCB sendmail
c5a7d788 314 - (djm) OpenBSD CVS Sync
315 - markus@cvs.openbsd.org 2003/06/02 09:17:34
316 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
317 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
318 [sshd_config.5]
319 deprecate VerifyReverseMapping since it's dangerous if combined
320 with IP based access control as noted by Mike Harding; replace with
321 a UseDNS option, UseDNS is on by default and includes the
322 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
323 ok deraadt@, djm@
d981089c 324 - millert@cvs.openbsd.org 2003/06/03 02:56:16
325 [scp.c]
326 Remove the advertising clause in the UCB license which Berkeley
327 rescinded 22 July 1999. Proofed by myself and Theo.
c5a7d788 328 - (djm) Fix portable-specific uses of verify_reverse_mapping too
3e67f7df 329 - (djm) Sync openbsd-compat with OpenBSD CVS.
484d59c7 330 - No more 4-term BSD licenses in linked code
5d8ca8c7 331 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
3a2b2b44 332
aff561f9 33320030602
334 - (djm) Fix segv from bad reordering in auth-pam.c
416c732d 335 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
336 clobber
1b7342ab 337 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
338 CVS ID.
8862e142 339 - (djm) Remove "noip6" option from RedHat spec file. This may now be
340 set at runtime using AddressFamily option.
58ba3cb7 341 - (djm) Fix use of macro before #define in cipher-aes.c
382fe2fa 342 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
b0545fe6 343 - (djm) OpenBSD CVS Sync
344 - djm@cvs.openbsd.org 2003/05/26 12:54:40
345 [sshconnect.c]
346 fix format strings; ok markus@
fa5120a0 347 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
348 [sshd.c uidswap.c]
349 seteuid and setegid; markus ok
0f92946c 350 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
351 [ssh_config.5]
352 VerifyHostKeyDNS is v2 only. ok markus@
aff561f9 353
4f178be8 35420030530
355 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
356 roumenpetrov.info
eabb99c6 357 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
4f178be8 358
4881aebb 35920030526
360 - (djm) Avoid auth2-chall.c warning when compiling without
361 PAM, BSD_AUTH and SKEY
362
5b0fe364 36320030525
364- (djm) OpenBSD CVS Sync
365 - djm@cvs.openbsd.org 2003/05/24 09:02:22
366 [log.c]
367 pass logged data through strnvis; ok markus
b9ed513a 368 - djm@cvs.openbsd.org 2003/05/24 09:30:40
369 [authfile.c monitor.c sftp-common.c sshpty.c]
370 cast some types for printing; ok markus@
5b0fe364 371
44c78996 37220030524
373 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
374
d83ebe4a 37520030523
376 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
377 encoding (which encodes many more characters)
bd47824b 378 - OpenBSD CVS Sync
379 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
380 [sftp.1]
381 - new sentence, new line
382 - added .Xr's
383 - typos
384 ok djm@
3cbc677d 385 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
386 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
387 new sentence, new line
da54f5be 388 - djm@cvs.openbsd.org 2003/05/23 08:29:30
389 [sshconnect.c]
390 fix leak; ok markus@
d83ebe4a 391
c453493f 39220030520
393 - (djm) OpenBSD CVS Sync
394 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
395 [log.c]
396 use syslog_r() in a signal handler called place; markus ok
79d4fc55 397 - (djm) Configure logic to detect syslog_r and friends
c453493f 398
acb50584 39920030519
400 - (djm) Sync auth-pam.h with what we actually implement
401
40220030518
5ff453c0 403 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
404 recent merge
f811e52a 405 - (djm) OpenBSD CVS Sync
406 - djm@cvs.openbsd.org 2003/05/16 03:27:12
407 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
408 add AddressFamily option to ssh_config (like -4, -6 on commandline).
409 Portable bug #534; ok markus@
013b1214 410 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
411 [auth-rhosts.c]
412 just in case, put numbers to sscanf %s arg.
25b66522 413 - markus@cvs.openbsd.org 2003/05/17 04:27:52
414 [cipher.c cipher-ctr.c myproposal.h]
415 experimental support for aes-ctr modes from
416 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
417 ok djm@
25351757 418 - (djm) Remove IPv4 by default hack now that we can specify AF in config
3bf784bc 419 - (djm) Tidy and trim TODO
bffa6723 420 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
9901cb37 421 - (djm) Big KNF on openbsd-compat/
f1da2b8b 422 - (djm) KNF on md5crypt.[ch]
423 - (djm) KNF on auth-sia.[ch]
5ff453c0 424
f123055b 42520030517
426 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
427
c936c243 42820030516
429 - (djm) OpenBSD CVS Sync
430 - djm@cvs.openbsd.org 2003/05/15 13:52:10
431 [ssh.c]
432 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
433 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
a2144546 434 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
435 [readconf.c servconf.c]
436 warn for unsupported config option. ok markus@
5bdfde81 437 - markus@cvs.openbsd.org 2003/05/15 14:09:21
438 [auth2-krb5.c]
439 fix 64bit issue; report itojun@
09ab3296 440 - djm@cvs.openbsd.org 2003/05/15 14:55:25
441 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
442 add a ConnectTimeout option to ssh, based on patch from
443 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
b06b11ad 444 - (djm) Add warning for UsePAM when built without PAM support
7be625e1 445 - (djm) A few type mismatch fixes from Bug #565
0eb6370a 446 - (djm) Guard free_pam_environment against NULL argument. Works around
447 HP/UX PAM problems debugged by dtucker
c936c243 448
7efc7f57 44920030515
450 - (djm) OpenBSD CVS Sync
451 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
452 [ssh-agent.1]
453 setup -> set up;
454 from wiz@netbsd
21289cd0 455 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
456 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
457 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
458 add experimental support for verifying hos keys using DNS as described
459 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
460 ok markus@ and henning@
16a79097 461 - markus@cvs.openbsd.org 2003/05/14 22:24:42
462 [clientloop.c session.c ssh.1]
463 allow to send a BREAK to the remote system; ok various
b8c2031b 464 - markus@cvs.openbsd.org 2003/05/15 00:28:28
465 [sshconnect2.c]
466 cleanup unregister of per-method packet handlers; ok djm@
d0ec7f42 467 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
468 [readconf.c readconf.h servconf.c servconf.h]
469 always parse kerberos options. ok djm@ markus@
b414a17b 470 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
471 [dns.c]
472 add missing freerrset
3b6e3da9 473 - markus@cvs.openbsd.org 2003/05/15 03:08:29
474 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
475 split out custom EVP ciphers
02159d9b 476 - djm@cvs.openbsd.org 2003/05/15 03:10:52
477 [ssh-keygen.c]
478 avoid warning; ok jakob@
4a26f5c5 479 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
480 [sftp-int.c]
481 Make put/get (globed and nonglobed) code more consistant. OK djm@
c44f10c6 482 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
dc69f53c 483 [sftp-int.c sftp.c]
c44f10c6 484 Teach ls how to display multiple column display and allow users
485 to return to single column format via 'ls -1'. OK @djm
1457e7ff 486 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
487 [readconf.c servconf.c]
488 disable kerberos when not supported. ok markus@
861f0365 489 - markus@cvs.openbsd.org 2003/05/15 04:08:41
490 [ssh.1]
491 ~B is ssh2 only
d0ec7f42 492 - (djm) Always parse UsePAM
3e05e934 493 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
4460d509 494 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
86ee6794 495 - (djm) Tidy Makefile clean targets
2636769c 496 - (djm) Adapt README.dns for portable
2d2e4a34 497 - (djm) Avoid uuencode.c warnings
1457e7ff 498 - (djm) Enable UsePAM when built --with-pam
67467c30 499 - (djm) Only build getrrsetbyname replacement when using --with-dns
f420d2ba 500 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
501 correctly)
3c49ef10 502 - (djm) Bug #444: Wrong paths after reconfigure
321735c7 503 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
f420d2ba 504
dd3ebb5a 50520030514
506 - (djm) Bug #117: Don't lie to PAM about username
0608f8a7 507 - (djm) RCSID sync w/ OpenBSD
204fde99 508 - (djm) OpenBSD CVS Sync
509 - djm@cvs.openbsd.org 2003/04/09 12:00:37
510 [readconf.c]
511 strip trailing whitespace from config lines before parsing.
512 Fixes bz 528; ok markus@
18ae3c67 513 - markus@cvs.openbsd.org 2003/04/12 10:13:57
514 [cipher.c]
515 hide cipher details; ok djm@
45c42d58 516 - markus@cvs.openbsd.org 2003/04/12 10:15:36
517 [misc.c]
518 debug->debug2
c825cd79 519 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
520 [ssh.1]
521 document -V switch, fix wording; ok markus@
3e131a6d 522 - markus@cvs.openbsd.org 2003/04/14 14:17:50
523 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
524 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
927e9f8b 525 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
526 [sftp-int.c]
527 Missing globfree(&g) in process_put() spotted by Vince Brimhall
528 <VBrimhall@novell.com>. ok@ Theo
529 - markus@cvs.openbsd.org 2003/04/16 14:35:27
530 [auth.h]
531 document struct Authctxt; with solar
b9e5aff6 532 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
533 [ssh-keyscan.c]
534 -t in usage(); rogier@quaak.org
9a26a6e2 535 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
536 [sshd.8 sshd_config.5]
537 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
538 Bug #550 and * escaping suggested by jmc@.
09dc8896 539 - david@cvs.openbsd.org 2003/04/30 20:41:07
540 [sshd.8]
541 fix invalid .Pf macro usage introduced in previous commit
542 ok jmc@ mouring@
3566c73c 543 - markus@cvs.openbsd.org 2003/05/11 16:56:48
544 [authfile.c ssh-keygen.c]
545 change key_load_public to try to read a public from:
546 rsa1 private or rsa1 public and ssh2 keys.
547 this makes ssh-keygen -e fail for ssh1 keys more gracefully
548 for example; report from itojun (netbsd pr 20550).
0d942eff 549 - markus@cvs.openbsd.org 2003/05/11 20:30:25
550 [channels.c clientloop.c serverloop.c session.c ssh.c]
551 make channel_new() strdup the 'remote_name' (not the caller); ok theo
43348518 552 - markus@cvs.openbsd.org 2003/05/12 16:55:37
553 [sshconnect2.c]
554 for pubkey authentication try the user keys in the following order:
555 1. agent keys that are found in the config file
556 2. other agent keys
557 3. keys that are only listed in the config file
558 this helps when an agent has many keys, where the server might
559 close the connection before the correct key is used. report & ok pb@
dc109cfe 560 - markus@cvs.openbsd.org 2003/05/12 18:35:18
561 [ssh-keyscan.1]
562 typo: DSA keys are of type ssh-dss; Brian Poole
81466908 563 - markus@cvs.openbsd.org 2003/05/14 00:52:59
564 [ssh2.h]
565 ranges for per auth method messages
566 - djm@cvs.openbsd.org 2003/05/14 01:00:44
567 [sftp.1]
568 emphasise the batchmode functionality and make reference to pubkey auth,
569 both of which are FAQs; ok markus@
802e01b8 570 - markus@cvs.openbsd.org 2003/05/14 02:15:47
571 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
572 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
573 server interops with commercial client; ok jakob@ djm@
72c5fe79 574 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
575 [sftp.1]
576 - better formatting in SYNOPSIS
577 - whitespace at EOL
578 ok djm@
3a39206f 579 - markus@cvs.openbsd.org 2003/05/14 08:57:49
580 [monitor.c]
581 http://bugzilla.mindrot.org/show_bug.cgi?id=560
582 Privsep child continues to run after monitor killed.
583 Pass monitor signals through to child; Darren Tucker
751092f9 584 - (djm) Make portable build with MIT krb5 (some issues remain)
7fceb20d 585 - (djm) Add new UsePAM configuration directive to allow runtime control
586 over usage of PAM. This allows non-root use of sshd when built with
587 --with-pam
817e6d38 588 - (djm) Die screaming if start_pam() is called when UsePAM=no
83ccf11a 589 - (djm) Avoid KrbV leak for MIT Kerberos
b1848832 590 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
fa065de2 591 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
dd3ebb5a 592
91f3aa9b 59320030512
594 - (djm) Redhat spec: Don't install profile.d scripts when not
595 building with GNOME/GTK askpass (patch from bet@rahul.net)
596
5def520a 59720030510
598 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
599 "make install". Patch by roth@feep.net.
ad84c479 600 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
601 problem on Linux (fixes "could not set controlling tty" errors).
05114c74 602 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
603 proper challenge-response module
23ab1f36 604 - (djm) 2-clause license on loginrec.c, with permission from
605 andre@ae-35.com
5def520a 606
43ce025d 60720030504
dd594f99 608 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
609 Patch from vinschen@redhat.com.
43ce025d 610
2cd5dbba 61120030503
612 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
613 by wendyp@cray.com.
614
bf7c1e6c 61520030502
616 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
617 privsep should now work.
73d9dad3 618 - (dtucker) Move handling of bad password authentications into a platform
990278ef 619 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
bf7c1e6c 620
68ece370 62120030429
622 - (djm) Add back radix.o (used by AFS support), after it went missing from
623 Makefile many moons ago
624 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
625 - (djm) Fix blibpath specification for AIX/gcc
626 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
627
ded9dd18 62820030428
629 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
630 hacked code.
631
aceb0423 63220030427
633 - (bal) Bug #541: return; was dropped by mistake. Reported by
634 furrier@iglou.com
c8a50a34 635 - (bal) Since we don't support platforms lacking u_int_64. We may
636 as well clean out some of those evil #ifdefs
9a6fee8b 637 - (bal) auth1.c minor resync while looking at the code.
d7cf277b 638 - (bal) auth2.c same changed as above.
aceb0423 639
0a626302 64020030409
641 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
642 from matth@eecs.berkeley.edu
d35929b5 643 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
ffd7b36b 644 - (djm) OpenBSD CVS Sync
645 - markus@cvs.openbsd.org 2003/04/02 09:48:07
646 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
647 [readconf.h serverloop.c sshconnect2.c]
648 reapply rekeying chage, tested by henning@, ok djm@
16f1b5ca 649 - markus@cvs.openbsd.org 2003/04/02 14:36:26
650 [ssh-keysign.c]
651 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
6c1bc5c5 652 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
653 [progressmeter.c]
654 $OpenBSD$
655 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
656 [progressmeter.c]
657 remove $OpenBSD$, as other *.c does not have it.
806e4c11 658 - markus@cvs.openbsd.org 2003/04/07 08:29:57
659 [monitor_wrap.c]
660 typo: get correct counters; introduced during rekeying change.
2f5b2528 661 - millert@cvs.openbsd.org 2003/04/07 21:58:05
662 [progressmeter.c]
663 The UCB copyright here is incorrect. This code did not originate
664 at UCB, it was written by Luke Mewburn. Updated the copyright at
665 the author's request. markus@ OK
666 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
667 [*.c *.h]
668 rename log() into logit() to avoid name conflict. markus ok, from
669 netbsd
670 - (djm) XXX - Performed locally using:
671 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
70e1f62f 672 - hin@cvs.openbsd.org 2003/04/09 08:23:52
673 [servconf.c]
674 Don't include <krb.h> when compiling with Kerberos 5 support
2f5b2528 675 - (djm) Fix up missing include for packet.c
a3568201 676 - (djm) Fix missed log => logit occurance (reference by function pointer)
0a626302 677
4d0cb2e5 67820030402
679 - (bal) if IP_TOS is not found or broken don't try to compile in
680 packet_set_tos() function call. bug #527
681
a4e5acef 68220030401
683 - (djm) OpenBSD CVS Sync
684 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
685 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
686 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
687 - killed whitespace
688 - new sentence new line
689 - .Bk for arguments
690 ok markus@
177f584b 691 - markus@cvs.openbsd.org 2003/04/01 10:10:23
692 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
693 [readconf.h serverloop.c sshconnect2.c]
694 rekeying bugfixes and automatic rekeying:
695 * both client and server rekey _automatically_
696 (a) after 2^31 packets, because after 2^32 packets
697 the sequence number for packets wraps
698 (b) after 2^(blocksize_in_bits/4) blocks
699 (see: draft-ietf-secsh-newmodes-00.txt)
700 (a) and (b) are _enabled_ by default, and only disabled for known
701 openssh versions, that don't support rekeying properly.
702 * client option 'RekeyLimit'
703 * do not reply to requests during rekeying
704 - markus@cvs.openbsd.org 2003/04/01 10:22:21
705 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
706 [readconf.h serverloop.c sshconnect2.c]
707 backout rekeying changes (for 3.6.1)
519bdfe8 708 - markus@cvs.openbsd.org 2003/04/01 10:31:26
709 [compat.c compat.h kex.c]
710 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
711 tested by ho@ and myself
9dd240a3 712 - markus@cvs.openbsd.org 2003/04/01 10:56:46
713 [version.h]
714 3.6.1
ac01b518 715 - (djm) Crank spec file versions
b32453fe 716 - (djm) Release 3.6.1p1
a4e5acef 717
fd77a40f 71820030326
719 - (djm) OpenBSD CVS Sync
720 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
721 [sftp-server.c]
722 one last fix to the tree: race fix broke stuff; pr 3169;
723 srp@srparish.net, help from djm
724
8021857c 72520030325
726 - (djm) Fix getpeerid support for 64 bit BE systems. From
727 Arnd Bergmann <arndb@de.ibm.com>
728
cdb64c4d 72920030324
730 - (djm) OpenBSD CVS Sync
731 - markus@cvs.openbsd.org 2003/03/23 19:02:00
732 [monitor.c]
733 unbreak rekeying for privsep; ok millert@
734 - Release 3.6p1
62086365 735 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
736 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
cdb64c4d 737
0b202697 738$Id$
This page took 0.405899 seconds and 5 git commands to generate.