]> andersk Git - openssh.git/blame - ChangeLog
[acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus
[openssh.git] / ChangeLog
CommitLineData
ef1ac12b 120020625
2 - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh
1a44c6f7 3 - (stevesk) [README.privsep] minor updates
fd3cbf67 4 - (djm) Create privsep directory and warn if privsep user is missing
5 during make install
702b2855 6 - (bal) Started list of PrivSep issues in TODO
1c6249af 7 - (bal) if mmap() is substandard, don't allow compression on server side.
8 Post 'event' we will add more options.
cbaa3d44 9 - (tim) [contrib/caldera/openssh.spec] Sync with Caldera
e2bc41f9 10 - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by
11 dtucker@zip.com.au
d170feb1 12 - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus
13 for Cygwin, Cray, & SCO
ef1ac12b 14
d5803314 1520020624
16 - OpenBSD CVS Sync
17 - deraadt@cvs.openbsd.org 2002/06/23 03:25:50
18 [tildexpand.c]
19 KNF
3ddc795d 20 - deraadt@cvs.openbsd.org 2002/06/23 03:26:19
21 [cipher.c key.c]
22 KNF
d6133f43 23 - deraadt@cvs.openbsd.org 2002/06/23 03:30:58
24 [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c
25 sshpty.c]
26 various KNF and %d for unsigned
9906a836 27 - deraadt@cvs.openbsd.org 2002/06/23 09:30:14
28 [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c
29 sftp.c]
30 bunch of u_int vs int stuff
512df038 31 - deraadt@cvs.openbsd.org 2002/06/23 09:39:55
32 [ssh-keygen.c]
33 u_int stuff
7528d467 34 - deraadt@cvs.openbsd.org 2002/06/23 09:46:51
35 [bufaux.c servconf.c]
36 minor KNF. things the fingers do while you read
e424e241 37 - deraadt@cvs.openbsd.org 2002/06/23 10:29:52
38 [ssh-agent.c sshd.c]
39 some minor KNF and %u
7138ebd9 40 - deraadt@cvs.openbsd.org 2002/06/23 20:39:45
41 [session.c]
42 compression_level is u_int
f09ce20a 43 - deraadt@cvs.openbsd.org 2002/06/23 21:06:13
44 [sshpty.c]
45 KNF
57f228e8 46 - deraadt@cvs.openbsd.org 2002/06/23 21:06:41
47 [channels.c channels.h session.c session.h]
48 display, screen, row, col, xpixel, ypixel are u_int; markus ok
0bc50167 49 - deraadt@cvs.openbsd.org 2002/06/23 21:10:02
50 [packet.c]
51 packet_get_int() returns unsigned for reason & seqnr
57f228e8 52 - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col,
53 xpixel are u_int.
54
d5803314 55
58177c0a 5620020623
57 - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX.
dc43acd2 58 - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset.
ef3912be 59 - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au
a8bbdc75 60 - OpenBSD CVS Sync
61 - stevesk@cvs.openbsd.org 2002/06/22 02:00:29
62 [ssh.h]
63 correct comment
1ae02182 64 - stevesk@cvs.openbsd.org 2002/06/22 02:40:23
65 [ssh.1]
66 section 5 not 4 for ssh_config
b2843ec6 67 - naddy@cvs.openbsd.org 2002/06/22 11:51:39
68 [ssh.1]
69 typo
75653d3e 70 - stevesk@cvs.openbsd.org 2002/06/22 16:32:54
71 [sshd.8]
72 add /var/empty in FILES section
a56313d7 73 - stevesk@cvs.openbsd.org 2002/06/22 16:40:19
74 [sshd.c]
75 check /var/empty owner mode; ok provos@
e4e83d70 76 - stevesk@cvs.openbsd.org 2002/06/22 16:41:57
77 [scp.1]
78 typo
baa08b92 79 - stevesk@cvs.openbsd.org 2002/06/22 16:45:29
80 [ssh-agent.1 sshd.8 sshd_config.5]
81 use process ID vs. pid/PID/process identifier
c28876e9 82 - stevesk@cvs.openbsd.org 2002/06/22 20:05:27
83 [sshd.c]
84 don't call setsid() if debugging or run from inetd; no "Operation not
85 permitted" errors now; ok millert@ markus@
d17ef027 86 - stevesk@cvs.openbsd.org 2002/06/22 23:09:51
87 [monitor.c]
88 save auth method before monitor_reset_key_state(); bugzilla bug #284;
89 ok provos@
58177c0a 90
ca449fd9 9120020622
92 - (djm) Update README.privsep; spotted by fries@
d5041f45 93 - (djm) Release 3.3p1
d76aa6fb 94 - (bal) getopt now can be staticly compiled on those platforms missing
95 optreset. Patch by binder@arago.de
ca449fd9 96
0496cf34 9720020621
98 - (djm) Sync:
99 - djm@cvs.openbsd.org 2002/06/21 05:50:51
100 [monitor.c]
101 Don't initialise compression buffers when compression=no in sshd_config;
102 ok Niels@
897ef106 103 - ID sync for auth-passwd.c
e299a298 104 - (djm) Warn and disable compression on platforms which can't handle both
105 useprivilegeseparation=yes and compression=yes
9f182968 106 - (djm) contrib/redhat/openssh.spec hacking:
107 - Merge in spec changes from seba@iq.pl (Sebastian Pachuta)
108 - Add new {ssh,sshd}_config.5 manpages
109 - Add new ssh-keysign program and remove setuid from ssh client
0496cf34 110
b264bd39 11120020620
8bbfc882 112 - (bal) Fixed AIX environment handling, use setpcred() instead of existing
113 code. (Bugzilla Bug 261)
b264bd39 114 - (bal) OpenBSD CVS Sync
115 - todd@cvs.openbsd.org 2002/06/14 21:35:00
116 [monitor_wrap.c]
117 spelling; from Brian Poole <raj@cerias.purdue.edu>
37500e74 118 - markus@cvs.openbsd.org 2002/06/15 00:01:36
119 [authfd.c authfd.h ssh-add.c ssh-agent.c]
120 break agent key lifetime protocol and allow other contraints for key
121 usage.
405e0c5e 122 - markus@cvs.openbsd.org 2002/06/15 00:07:38
123 [authfd.c authfd.h ssh-add.c ssh-agent.c]
124 fix stupid typo
3015d321 125 - markus@cvs.openbsd.org 2002/06/15 01:27:48
ee900f87 126 [authfd.c authfd.h ssh-add.c ssh-agent.c]
127 remove the CONSTRAIN_IDENTITY messages and introduce a new
128 ADD_ID message with contraints instead. contraints can be
129 only added together with the private key.
48ba8dc8 130 - itojun@cvs.openbsd.org 2002/06/16 21:30:58
131 [ssh-keyscan.c]
132 use TAILQ_xx macro. from lukem@netbsd. markus ok
3015d321 133 - deraadt@cvs.openbsd.org 2002/06/17 06:05:56
134 [scp.c]
135 make usage like man page
7203d6bb 136 - deraadt@cvs.openbsd.org 2002/06/19 00:27:55
137 [auth-bsdauth.c auth-skey.c auth1.c auth2-chall.c auth2-none.c authfd.c
138 authfd.h monitor_wrap.c msg.c nchan.c radix.c readconf.c scp.c sftp.1
139 ssh-add.1 ssh-add.c ssh-agent.1 ssh-agent.c ssh-keygen.1 ssh-keygen.c
140 ssh-keysign.c ssh.1 sshconnect.c sshconnect.h sshconnect2.c ttymodes.c
141 xmalloc.h]
142 KNF done automatically while reading....
9459414c 143 - markus@cvs.openbsd.org 2002/06/19 18:01:00
144 [cipher.c monitor.c monitor_wrap.c packet.c packet.h]
145 make the monitor sync the transfer ssh1 session key;
146 transfer keycontext only for RC4 (this is still depends on EVP
147 implementation details and is broken).
588df31a 148 - stevesk@cvs.openbsd.org 2002/06/20 19:56:07
149 [ssh.1 sshd.8]
150 move configuration file options from ssh.1/sshd.8 to
151 ssh_config.5/sshd_config.5; ok deraadt@ millert@
add52dd0 152 - stevesk@cvs.openbsd.org 2002/06/20 20:00:05
153 [scp.1 sftp.1]
154 ssh_config(5)
54e5539d 155 - stevesk@cvs.openbsd.org 2002/06/20 20:03:34
156 [ssh_config sshd_config]
157 refer to config file man page
636f76ca 158 - markus@cvs.openbsd.org 2002/06/20 23:05:56
159 [servconf.c servconf.h session.c sshd.c]
160 allow Compression=yes/no in sshd_config
6f26d43d 161 - markus@cvs.openbsd.org 2002/06/20 23:37:12
162 [sshd_config]
163 add Compression
2fee5e28 164 - stevesk@cvs.openbsd.org 2002/05/25 20:40:08
165 [LICENCE]
166 missed Per Allansson (auth2-chall.c)
fa7a0d52 167 - (bal) Cygwin special handling of empty passwords wrong. Patch by
168 vinschen@redhat.com
668e6050 169 - (bal) Missed integrating ssh_config.5 and sshd_config.5
73bc9b18 170 - (bal) Still more Makefile.in updates for ssh{d}_config.5
b264bd39 171
f2d02e44 17220020613
173 - (bal) typo of setgroup for cygwin. Patch by vinschen@redhat.com
174
b34bec32 17520020612
176 - (bal) OpenBSD CVS Sync
177 - markus@cvs.openbsd.org 2002/06/11 23:03:54
178 [ssh.c]
179 remove unused cruft.
de60473e 180 - markus@cvs.openbsd.org 2002/06/12 01:09:52
181 [ssh.c]
182 ssh_connect returns 0 on success
246446cd 183 - (bal) Build noop setgroups() for cygwin to clean up code (For other
184 platforms without the setgroups() requirement, you MUST define
185 SETGROUPS_NOOP in the configure.ac) Based on patch by vinschen@redhat.com
75136d8b 186 - (bal) Some platforms don't have ONLCR (Notable Mint)
b34bec32 187
74a6c7bd 18820020611
189 - (bal) ssh-agent.c RCSD fix (|unexpand already done)
d83cbdc3 190 - (bal) OpenBSD CVS Sync
191 - stevesk@cvs.openbsd.org 2002/06/09 22:15:15
192 [ssh.1]
193 update for no setuid root and ssh-keysign; ok deraadt@
01ca0dfe 194 - itojun@cvs.openbsd.org 2002/06/09 22:17:21
195 [sshconnect.c]
196 pass salen to sockaddr_ntop so that we are happy on linux/solaris
b7ced7d1 197 - stevesk@cvs.openbsd.org 2002/06/10 16:53:06
198 [auth-rsa.c ssh-rsa.c]
199 display minimum RSA modulus in error(); ok markus@
9cf07a6e 200 - stevesk@cvs.openbsd.org 2002/06/10 16:56:30
201 [ssh-keysign.8]
202 merge in stuff from my man page; ok markus@
c3baacd1 203 - stevesk@cvs.openbsd.org 2002/06/10 17:36:23
204 [ssh-add.1 ssh-add.c]
205 use convtime() to parse and validate key lifetime. can now
206 use '-t 2h' etc. ok markus@ provos@
4b3d23b4 207 - stevesk@cvs.openbsd.org 2002/06/10 17:45:20
208 [readconf.c ssh.1]
209 change RhostsRSAAuthentication and RhostsAuthentication default to no
210 since ssh is no longer setuid root by default; ok markus@
ad2e1857 211 - stevesk@cvs.openbsd.org 2002/06/10 21:21:10
212 [ssh_config]
213 update defaults for RhostsRSAAuthentication and RhostsAuthentication
214 here too (all options commented out with default value).
149cdb60 215 - markus@cvs.openbsd.org 2002/06/10 22:28:41
216 [channels.c channels.h session.c]
217 move creation of agent socket to session.c; no need for uidswapping
218 in channel.c.
3fb156df 219 - markus@cvs.openbsd.org 2002/06/11 04:14:26
220 [ssh.c sshconnect.c sshconnect.h]
221 no longer use uidswap.[ch] from the ssh client
222 run less code with euid==0 if ssh is installed setuid root
223 just switch the euid, don't switch the complete set of groups
224 (this is only needed by sshd). ok provos@
c457707e 225 - mpech@cvs.openbsd.org 2002/06/11 05:46:20
226 [auth-krb4.c monitor.h serverloop.c session.c ssh-agent.c sshd.c]
227 pid_t cleanup. Markus need this now to keep hacking.
228 markus@, millert@ ok
aa686c54 229 - itojun@cvs.openbsd.org 2002/06/11 08:11:45
230 [canohost.c]
231 use "ntop" only after initialized
d514c907 232 - (bal) Cygwin fix up from swap uid clean up in ssh.c patch by
233 vinschen@redhat.com
74a6c7bd 234
0073b70f 23520020609
236 - (bal) OpenBSD CVS Sync
237 - markus@cvs.openbsd.org 2002/06/08 05:07:56
238 [ssh.c]
239 nuke ptrace comment
1f143cf2 240 - markus@cvs.openbsd.org 2002/06/08 05:07:09
241 [ssh-keysign.c]
242 only accept 20 byte session ids
80fcb74e 243 - markus@cvs.openbsd.org 2002/06/08 05:17:01
244 [readconf.c readconf.h ssh.1 ssh.c]
245 deprecate FallBackToRsh and UseRsh; patch from djm@
6c792785 246 - markus@cvs.openbsd.org 2002/06/08 05:40:01
247 [readconf.c]
248 just warn about Deprecated options for now
c8e0103c 249 - markus@cvs.openbsd.org 2002/06/08 05:41:18
250 [ssh_config]
251 remove FallBackToRsh/UseRsh
61eb812e 252 - markus@cvs.openbsd.org 2002/06/08 12:36:53
253 [scp.c]
254 remove FallBackToRsh
4feae93d 255 - markus@cvs.openbsd.org 2002/06/08 12:46:14
256 [readconf.c]
257 silently ignore deprecated options, since FallBackToRsh might be passed
258 by remote scp commands.
35ad6a0a 259 - itojun@cvs.openbsd.org 2002/06/08 21:15:27
260 [sshconnect.c]
261 always use getnameinfo. (diag message only)
b0ff7493 262 - markus@cvs.openbsd.org 2002/06/09 04:33:27
263 [sshconnect.c]
264 abort() - > fatal()
e434ac29 265 - (bal) RCSID tag updates on channels.c, clientloop.c, nchan.c,
266 sftp-client.c, ssh-agenet.c, ssh-keygen.c and connect.h (we did unexpand
267 independant of them)
0073b70f 268
95d5ebf7 26920020607
11a3dcde 270 - (bal) Removed --{enable/disable}-suid-ssh
95d5ebf7 271 - (bal) Missed __progname in ssh-keysign.c patch by dtucker@zip.com.au
85cc9118 272 - (bal) use 'LOGIN_PROGRAM' not '/usr/bin/login' in session.c patch by
273 Bertrand.Velle@apogee-com.fr
95d5ebf7 274
2ee1b704 27520020606
276 - (bal) OpenBSD CVS Sync
277 - markus@cvs.openbsd.org 2002/05/15 21:56:38
278 [servconf.c sshd.8 sshd_config]
279 re-enable privsep and disable setuid for post-3.2.2
7b5edc2b 280 - markus@cvs.openbsd.org 2002/05/16 22:02:50
281 [cipher.c kex.h mac.c]
282 fix warnings (openssl 0.9.7 requires const)
375e20e7 283 - stevesk@cvs.openbsd.org 2002/05/16 22:09:59
284 [session.c ssh.c]
285 don't limit xauth pathlen on client side and longer print length on
286 server when debug; ok markus@
a4ae736b 287 - deraadt@cvs.openbsd.org 2002/05/19 20:54:52
288 [log.h]
289 extra commas in enum not 100% portable
c242fc96 290 - deraadt@cvs.openbsd.org 2002/05/22 23:18:25
291 [ssh.c sshd.c]
292 spelling; abishoff@arc.nasa.gov
39c00dc2 293 - markus@cvs.openbsd.org 2002/05/23 19:24:30
294 [authfile.c authfile.h pathnames.h ssh.c sshconnect.c sshconnect.h
295 sshconnect1.c sshconnect2.c ssh-keysign.8 ssh-keysign.c Makefile.in]
296 add /usr/libexec/ssh-keysign: a setuid helper program for hostbased
297 authentication in protocol v2 (needs to access the hostkeys).
78660ed4 298 - markus@cvs.openbsd.org 2002/05/23 19:39:34
299 [ssh.c]
300 add comment about ssh-keysign
7091a26b 301 - markus@cvs.openbsd.org 2002/05/24 08:45:14
302 [sshconnect2.c]
303 stat ssh-keysign first, print error if stat fails;
304 some debug->error; fix comment
a3f69458 305 - markus@cvs.openbsd.org 2002/05/25 08:50:39
306 [sshconnect2.c]
307 execlp->execl; from stevesk
013eab17 308 - markus@cvs.openbsd.org 2002/05/25 18:51:07
309 [auth.h auth2.c auth2-hostbased.c auth2-kbdint.c auth2-none.c
310 auth2-passwd.c auth2-pubkey.c Makefile.in]
311 split auth2.c into one file per method; ok provos@/deraadt@
bd4d0f49 312 - stevesk@cvs.openbsd.org 2002/05/26 20:35:10
313 [ssh.1]
314 sort ChallengeResponseAuthentication; ok markus@
c22d8cc0 315 - stevesk@cvs.openbsd.org 2002/05/28 16:45:27
316 [monitor_mm.c]
317 print strerror(errno) on mmap/munmap error; ok markus@
caa49784 318 - stevesk@cvs.openbsd.org 2002/05/28 17:28:02
319 [uidswap.c]
320 format spec change/casts and some KNF; ok markus@
fd7bc9fc 321 - stevesk@cvs.openbsd.org 2002/05/28 21:24:00
322 [uidswap.c]
323 use correct function name in fatal()
cb19b38a 324 - stevesk@cvs.openbsd.org 2002/05/29 03:06:30
325 [ssh.1 sshd.8]
326 spelling
3cc54fbb 327 - markus@cvs.openbsd.org 2002/05/29 11:21:57
328 [sshd.c]
329 don't start if privsep is enabled and SSH_PRIVSEP_USER or
330 _PATH_PRIVSEP_CHROOT_DIR are missing; ok deraadt@
135247df 331 - markus@cvs.openbsd.org 2002/05/30 08:07:31
332 [cipher.c]
333 use rijndael/aes from libcrypto (openssl >= 0.9.7) instead of
334 our own implementation. allow use of AES hardware via libcrypto,
335 ok deraadt@
d4826734 336 - markus@cvs.openbsd.org 2002/05/31 10:30:33
337 [sshconnect2.c]
338 extent ssh-keysign protocol:
339 pass # of socket-fd to ssh-keysign, keysign verfies locally used
340 ip-address using this socket-fd, restricts fake local hostnames
341 to actual local hostnames; ok stevesk@
01c24737 342 - markus@cvs.openbsd.org 2002/05/31 11:35:15
343 [auth.h auth2.c]
344 move Authmethod definitons to per-method file.
3ed81c99 345 - markus@cvs.openbsd.org 2002/05/31 13:16:48
346 [key.c]
347 add comment:
348 key_verify returns 1 for a correct signature, 0 for an incorrect signature
349 and -1 on error.
88f24e9d 350 - markus@cvs.openbsd.org 2002/05/31 13:20:50
351 [ssh-rsa.c]
352 pad received signature with leading zeros, because RSA_verify expects
353 a signature of RSA_size. the drafts says the signature is transmitted
354 unpadded (e.g. putty does not pad), reported by anakin@pobox.com
7f056bc5 355 - deraadt@cvs.openbsd.org 2002/06/03 12:04:07
356 [ssh.h]
357 compatiblity -> compatibility
358 decriptor -> descriptor
359 authentciated -> authenticated
360 transmition -> transmission
aa586f8e 361 - markus@cvs.openbsd.org 2002/06/04 19:42:35
362 [monitor.c]
363 only allow enabled authentication methods; ok provos@
521d606b 364 - markus@cvs.openbsd.org 2002/06/04 19:53:40
365 [monitor.c]
366 save the session id (hash) for ssh2 (it will be passed with the
367 initial sign request) and verify that this value is used during
368 authentication; ok provos@
91647fe6 369 - markus@cvs.openbsd.org 2002/06/04 23:02:06
370 [packet.c]
371 remove __FUNCTION__
1588c277 372 - markus@cvs.openbsd.org 2002/06/04 23:05:49
373 [cipher.c monitor.c monitor_fdpass.c monitor_mm.c monitor_wrap.c]
374 __FUNCTION__ -> __func__
3e7efb37 375 - markus@cvs.openbsd.org 2002/06/05 16:08:07
376 [ssh-agent.1 ssh-agent.c]
377 '-a bind_address' binds the agent to user-specified unix-domain
378 socket instead of /tmp/ssh-XXXXXXXX/agent.<pid>; ok djm@ (some time ago).
9aa28a7f 379 - markus@cvs.openbsd.org 2002/06/05 16:08:07
380 [ssh-agent.1 ssh-agent.c]
381 '-a bind_address' binds the agent to user-specified unix-domain
382 socket instead of /tmp/ssh-XXXXXXXX/agent.<pid>; ok djm@ (some time ago).
b9dd5ca1 383 - markus@cvs.openbsd.org 2002/06/05 16:48:54
384 [ssh-agent.c]
385 copy current request into an extra buffer and just flush this
386 request on errors, ok provos@
3db7f994 387 - markus@cvs.openbsd.org 2002/06/05 19:57:12
388 [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c]
389 ssh-add -x for lock and -X for unlocking the agent.
390 todo: encrypt private keys with locked...
73861c4e 391 - markus@cvs.openbsd.org 2002/06/05 20:56:39
392 [ssh-add.c]
393 add -x/-X to usage
264572cc 394 - markus@cvs.openbsd.org 2002/06/05 21:55:44
395 [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c]
396 ssh-add -t life, Set lifetime (in seconds) when adding identities;
397 ok provos@
c6f1f67c 398 - stevesk@cvs.openbsd.org 2002/06/06 01:09:41
399 [monitor.h]
400 no trailing comma in enum; china@thewrittenword.com
9b4ac641 401 - markus@cvs.openbsd.org 2002/06/06 17:12:44
402 [sftp-server.c]
403 discard remaining bytes of current request; ok provos@
802d93bb 404 - markus@cvs.openbsd.org 2002/06/06 17:30:11
405 [sftp-server.c]
406 use get_int() macro (hide iqueue)
8afe456d 407 - (bal) Missed msg.[ch] in merge. Required for ssh-keysign.
5a30b173 408 - (bal) Forgot to add msg.c Makefile.in.
441b3f63 409 - (bal) monitor_mm.c typos.
e5c59e31 410 - (bal) Refixed auth2.c. It was never fully commited while spliting out
d4d77d64 411 authentication to different files.
04eb391d 412 - (bal) ssh-keysign should build and install correctly now. Phase two
413 would be to clean out any dead wood and disable ssh setuid on install.
d4d77d64 414 - (bal) Reverse logic, use __func__ first since it's C99
95f20fe8 415
688aaeda 41620020604
417 - (stevesk) [channels.c] bug #164 patch from YOSHIFUJI Hideaki (changed
418 setsockopt from debug to error for now).
419
637f9177 42020020527
421 - (tim) [configure.ac.orig monitor_fdpass.c] Enahnce msghdr tests to address
422 build problem on Irix reported by Dave Love <d.love@dl.ac.uk>. Back out
423 last monitor_fdpass.c changes that are no longer needed with new tests.
424 Patch tested on Irix by Jan-Frode Myklebust <janfrode@parallab.uib.no>
425
a23a769d 42620020522
427 - (djm) Fix spelling mistakes, spotted by Solar Designer i
428 <solar@openwall.com>
2880ad5e 429 - Sync scard/ (not sure when it drifted)
68604c75 430 - (djm) OpenBSD CVS Sync:
431 [auth.c]
432 Fix typo/thinko. Pass in as to auth_approval(), not NULL.
433 Closes PR 2659.
434 - Crank version
3ed9ebdb 435 - Crank RPM spec versions
a23a769d 436
30321a9b 43720020521
438 - (stevesk) [sshd.c] bug 245; disable setsid() for now
20ded834 439 - (stevesk) [sshd.c] #ifndef HAVE_CYGWIN for setgroups()
30321a9b 440
9a499a03 44120020517
442 - (tim) [configure.ac] remove extra MD5_MSG="no" line.
443
68a9cd3e 44420020515
445 - (bal) CVS ID fix up on auth-passwd.c
e0740430 446 - (bal) OpenBSD CVS Sync
447 - deraadt@cvs.openbsd.org 2002/05/07 19:54:36
448 [ssh.h]
449 use ssh uid
897fecd3 450 - deraadt@cvs.openbsd.org 2002/05/08 21:06:34
451 [ssh.h]
452 move to sshd.sshd instead
5de727d6 453 - stevesk@cvs.openbsd.org 2002/05/11 20:24:48
454 [ssh.h]
455 typo in comment
69538b0c 456 - itojun@cvs.openbsd.org 2002/05/13 02:37:39
457 [auth-skey.c auth2.c]
458 less warnings. skey_{respond,query} are public (in auth.h)
01dafcb5 459 - markus@cvs.openbsd.org 2002/05/13 20:44:58
460 [auth-options.c auth.c auth.h]
461 move the packet_send_debug handling from auth-options.c to auth.c;
462 ok provos@
4ac8556b 463 - millert@cvs.openbsd.org 2002/05/13 15:53:19
464 [sshd.c]
465 Call setsid() in the child after sshd accepts the connection and forks.
466 This is needed for privsep which calls setlogin() when it changes uids.
467 Without this, there is a race where the login name of an existing
468 connection, as returned by getlogin(), may be changed to the privsep
469 user (sshd). markus@ OK
b3ad3d88 470 - markus@cvs.openbsd.org 2002/05/13 21:26:49
471 [auth-rhosts.c]
472 handle debug messages during rhosts-rsa and hostbased authentication;
473 ok provos@
b5a28cbc 474 - mouring@cvs.openbsd.org 2002/05/15 15:47:49
475 [kex.c monitor.c monitor_wrap.c sshd.c]
476 'monitor' variable clashes with at least one lame platform (NeXT). i
477 Renamed to 'pmonitor'. provos@
1642b888 478 - deraadt@cvs.openbsd.org 2002/05/04 02:39:35
479 [servconf.c sshd.8 sshd_config]
480 enable privsep by default; provos ok
7e276482 481 - millert@cvs.openbsd.org 2002/05/06 23:34:33
482 [ssh.1 sshd.8]
483 Kill/adjust r(login|exec)d? references now that those are no longer in
484 the tree.
6c172f95 485 - markus@cvs.openbsd.org 2002/05/15 21:02:53
486 [servconf.c sshd.8 sshd_config]
487 disable privsep and enable setuid for the 3.2.2 release
b5a28cbc 488 - (bal) Fixed up PAM case. I think.
0c83d9ea 489 - (bal) Clarified openbsd-compat/*-cray.* Licence provided by Wendy
3a034dc5 490 - (bal) OpenBSD CVS Sync
491 - markus@cvs.openbsd.org 2002/05/15 21:05:29
492 [version.h]
493 enter OpenSSH_3.2.2
494 - (bal) Caldara, Suse, and Redhat openssh.specs updated.
68a9cd3e 495
545ba36e 49620020514
497 - (stevesk) [README.privsep] PAM+privsep works with Solaris 8.
f65fbec1 498 - (tim) [sshpty.c] set tty modes when allocating old style bsd ptys to
499 match what newer style ptys have when allocated. Based on a patch by
500 Roger Cornelius <rac@tenzing.org>
47cdfcbe 501 - (tim) [README.privsep] UnixWare 7 and OpenUNIX 8 work.
502 - (tim) [README.privsep] remove reference to UnixWare 7 and OpenUNIX 8
503 from PAM-enabled pragraph. UnixWare has no PAM.
3c1a6277 504 - (tim) [contrib/caldera/openssh.spec] update version.
545ba36e 505
06617857 50620020513
3d1beaf2 507 - (stevesk) add initial README.privsep
5222e7ef 508 - (stevesk) [configure.ac] nicer message: --with-privsep-user=user
fdff2c55 509 - (djm) Add --with-superuser-path=xxx configure option to specify
510 what $PATH the superuser receives.
94a73cdc 511 - (djm) Bug #231: UsePrivilegeSeparation turns off Banner.
ecac8ee5 512 - (djm) Add --with-privsep-path configure option
80e92e5d 513 - (djm) Update RPM spec file: different superuser path, use
514 /var/empty/sshd for privsep
75817f90 515 - (djm) Bug #234: missing readpassphrase declaration and defines
fdff2c55 516 - (djm) Add INSTALL warning about SSH protocol 1 blowfish w/
517 OpenSSL < 0.9.6
06617857 518
5b991353 51920020511
520 - (tim) [configure.ac] applied a rework of djm's OpenSSL search cleanup patch.
521 Now only searches system and /usr/local/ssl (OpenSSL's default install path)
522 Others must use --with-ssl-dir=....
d73cbfe3 523 - (tim) [monitor_fdpass.c] fix for systems that have both
fdff2c55 524 HAVE_ACCRIGHTS_IN_MSGHDR and HAVE_CONTROL_IN_MSGHDR. Ie. sys/socket.h
525 has #define msg_accrights msg_control
5b991353 526
3ef3d901 52720020510
5b29f152 528 - (stevesk) [auth.c] Shadow account and expiration cleanup. Now
529 check for root forced expire. Still don't check for inactive.
3ef3d901 530 - (djm) Rework RedHat RPM files. Based on spec from Nalin
531 Dahyabhai <nalin@redhat.com> and patches from
532 Pekka Savola <pekkas@netcore.fi>
018a5ea3 533 - (djm) Try to drop supplemental groups at daemon startup. Patch from
534 RedHat
f656b61e 535 - (bal) Back all the way out of auth-passwd.c changes. Breaks too many
536 things that don't set pw->pw_passwd.
3ef3d901 537
075682c1 53820020509
539 - (tim) [Makefile.in] Unbreak make -f Makefile.in distprep
fea8a8e8 540
075682c1 54120020508
af5ee4e4 542 - (tim) [openbsd-compat/bsd-arc4random.c] fix logic on when seed_rng() is
543 called. Report by Chris Maxwell <maxwell@cs.dal.ca>
6193497b 544 - (tim) [Makefile.in configure.ac] set SHELL variable in Makefile
075682c1 545 - (djm) Disable PAM kbd-int auth if privsep is turned on (it doesn't work)
af5ee4e4 546
f25cd32c 54720020507
548 - (tim) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
549 Add truncate() emulation to address Bug 208
550
69406cab 55120020506
552 - (djm) Unbreak auth-passwd.c for PAM and SIA
efe44db6 553 - (djm) Unbreak PAM auth for protocol 1. Report from Pekka Savola
554 <pekkas@netcore.fi>
39ce53de 555 - (djm) Don't reinitialise PAM credentials before we have started PAM.
556 Report from Pekka Savola <pekkas@netcore.fi>
557
d9891c59 55820020506
559 - (bal) Fixed auth-passwd.c to resolve PermitEmptyPassword issue
560
836d58d7 56120020501
562 - (djm) Import OpenBSD regression tests. Requires BSD make to run
50903cc7 563 - (djm) Fix readpassphase compilation for systems which have it
836d58d7 564
f0c180c3 56520020429
566 - (tim) [contrib/caldera/openssh.spec] update fixUP to reflect changes in
567 sshd_config.
568 - (tim) [contrib/cygwin/README] remove reference to regex.
569 patch from Corinna Vinschen <vinschen@redhat.com>
570
db8dbb6a 57120020426
572 - (djm) Bug #137, #209: fix make problems for scard/Ssh.bin, do uudecode
573 during distprep only
fdff2c55 574 - (djm) Disable PAM password expiry until a complete fix for bug #188
575 exists
782e2103 576 - (djm) Bug #180: Set ToS bits on IPv4-in-IPv6 mapped addresses. Based on
577 patch from openssh@misc.tecq.org
db8dbb6a 578
369e787a 57920020425
580 - (stevesk) [defines.h] remove USE_TIMEVAL; unused
6e879cb4 581 - (stevesk) [acconfig.h auth-passwd.c configure.ac sshd.c] HP-UX 10.26
582 support. bug #184. most from dcole@keysoftsys.com.
369e787a 583
8c1f70d8 58420020424
585 - (djm) OpenBSD CVS Sync
586 - markus@cvs.openbsd.org 2002/04/23 12:54:10
587 [version.h]
588 3.2.1
cdc4fc39 589 - djm@cvs.openbsd.org 2002/04/23 22:16:29
590 [sshd.c]
591 Improve error message; ok markus@ stevesk@
8c1f70d8 592
520b41b2 59320020423
a2572aa7 594 - (stevesk) [acconfig.h configure.ac session.c] LOGIN_NO_ENDOPT for HP-UX
7615ed55 595 - (stevesk) [acconfig.h] NEED_IN_SYSTM_H unused
744d788b 596 - (markus) OpenBSD CVS Sync
597 - markus@cvs.openbsd.org 2002/04/23 12:58:26
598 [radix.c]
599 send complete ticket; semerad@ss1000.ms.mff.cuni.cz
3b307f85 600 - (djm) Trim ChangeLog to include only post-3.1 changes
48862e93 601 - (djm) Update RPM spec file versions
03dd62aa 602 - (djm) Redhat spec enables KrbV by default
1352689f 603 - (djm) Applied OpenSC smartcard updates from Markus &
604 Antti Tapaninen <aet@cc.hut.fi>
605 - (djm) Define BROKEN_REALPATH for AIX, patch from
606 Antti Tapaninen <aet@cc.hut.fi>
0e8f4eba 607 - (djm) Bug #214: Fix utmp for Irix (don't strip "tty"). Patch from
608 Kevin Taylor <no@nowhere.org> (??) via Philipp Grau
609 <phgrau@zedat.fu-berlin.de>
2805b943 610 - (djm) Bug #213: Simplify CMSG_ALIGN macros to avoid symbol clashes.
611 Reported by Doug Manton <dmanton@emea.att.com>
520b41b2 612 - (djm) Bug #222: Fix tests for getaddrinfo on OSF/1. Spotted by
613 Robert Urban <urban@spielwiese.de>
52f1ccb2 614 - (djm) Bug #206 - blibpath isn't always needed for AIX ld, avoid
615 sizeof(long long int) == 4 breakage. Patch from Matthew Clarke
616 <Matthew_Clarke@mindlink.bc.ca>
ad200abb 617 - (djm) Make privsep work with PAM (still experimental)
9b26c596 618 - (djm) OpenBSD CVS Sync
619 - deraadt@cvs.openbsd.org 2002/04/20 09:02:03
620 [servconf.c]
621 No, afs requires explicit enabling
622 - markus@cvs.openbsd.org 2002/04/20 09:14:58
623 [bufaux.c bufaux.h]
624 add buffer_{get,put}_short
3b358a0e 625 - markus@cvs.openbsd.org 2002/04/20 09:17:19
626 [radix.c]
627 rewrite using the buffer_* API, fixes overflow; ok deraadt@
22d0faff 628 - stevesk@cvs.openbsd.org 2002/04/21 16:19:27
629 [sshd.8 sshd_config]
630 document default AFSTokenPassing no; ok deraadt@
134c552b 631 - stevesk@cvs.openbsd.org 2002/04/21 16:25:06
632 [sshconnect1.c]
633 spelling in error message; ok markus@
afb8fdb4 634 - markus@cvs.openbsd.org 2002/04/22 06:15:47
635 [radix.c]
636 fix check for overflow
eadc806d 637 - markus@cvs.openbsd.org 2002/04/22 16:16:53
638 [servconf.c sshd.8 sshd_config]
639 do not auto-enable KerberosAuthentication; ok djm@, provos@, deraadt@
e0ae8728 640 - markus@cvs.openbsd.org 2002/04/22 21:04:52
641 [channels.c clientloop.c clientloop.h ssh.c]
642 request reply (success/failure) for -R style fwd in protocol v2,
643 depends on ordered replies.
644 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=215; ok provos@
520b41b2 645
ac033f8c 64620020421
647 - (tim) [entropy.c.] Portability fix for SCO Unix 3.2v4.x (SCO OSR 3.0).
fdff2c55 648 entropy.c needs seteuid(getuid()) for the setuid(original_uid) to
649 succeed. Patch by gert@greenie.muc.de. This fixes one part of Bug 208
ac033f8c 650
6dc63b4f 65120020418
652 - (djm) Avoid SIGCHLD breakage when run from rsync. Fix from
653 Sturle Sunde <sturle.sunde@usit.uio.no>
654
230c7a8f 65520020417
fdff2c55 656 - (djm) Tell users to configure /dev/random support into OpenSSL in
657 INSTALL
1a7220c2 658 - (djm) Fix .Nm in mdoc2man.pl from pspencer@fields.utoronto.ca
8d184c09 659 - (tim) [configure.ac] Issue warning on --with-default-path=/some_path
660 if LOGIN_CAP is enabled. Report & testing by Tuc <tuc@ttsg.com>
230c7a8f 661
9ae68cce 66220020415
fdff2c55 663 - (djm) Unbreak "make install". Fix from Darren Tucker
664 <dtucker@zip.com.au>
4e51cc76 665 - (stevesk) bsd-cygwin_util.[ch] BSD license from Corinna Vinschen
1b06e75e 666 - (tim) [configure.ac] add tests for recvmsg and sendmsg.
667 [monitor_fdpass.c] add checks for HAVE_SENDMSG and HAVE_RECVMSG for
668 systems that HAVE_ACCRIGHTS_IN_MSGHDR but no recvmsg or sendmsg.
9ae68cce 669
f6e6303d 67020020414
671 - (djm) ssh-rand-helper improvements
672 - Add commandline debugging options
673 - Don't write binary data if stdout is a tty (use hex instead)
674 - Give it a manpage
cbe5b851 675 - (djm) Random number collection doc fixes from Ben
f6e6303d 676
12928e80 67720020413
678 - (djm) Add KrbV support patch from Simon Wilkinson <simon@sxw.org.uk>
679
40b74b3f 68020020412
681 - (stevesk) [auth-sia.[ch]] add BSD license from Chris Adams
f95c8ce8 682 - (tim) [configure.ac] add <sys/types.h> to msghdr tests. Change -L
683 to -h on testing for /bin being symbolic link
e2c9b9e3 684 - (bal) Mistaken in Cygwin scripts for ssh starting. Patch by
685 Corinna Vinschen <vinschen@redhat.com>
e75b61db 686 - (bal) disable privsep if no MAP_ANON. We can re-enable it
687 after the release when we can do more testing.
40b74b3f 688
65b91c76 68920020411
690 - (stevesk) [auth-sia.c] cleanup
7b0737a4 691 - (tim) [acconfig.h defines.h includes.h] put includes in includes.h and
692 defines in defines.h [rijndael.c openbsd-compat/fake-socket.h
693 openbsd-compat/inet_aton.c] include "includes.h" instead of "config.h"
694 ok stevesk@
65b91c76 695
ca8aba40 69620020410
f1af2dbf 697 - (stevesk) [configure.ac monitor.c] HAVE_SOCKETPAIR
ca8aba40 698 - (stevesk) [auth-sia.c] compile fix Chris Adams <cmadams@hiwaay.net>
d8ff54e6 699 - (bal) OpenBSD CVS Sync
700 - markus@cvs.openbsd.org 2002/04/10 08:21:47
701 [auth1.c compat.c compat.h]
fdff2c55 702 strip '@' from username only for KerbV and known broken clients,
703 bug #204
f14a5033 704 - markus@cvs.openbsd.org 2002/04/10 08:56:01
705 [version.h]
706 OpenSSH_3.2
707 - Added p1 to idenify Portable release version.
ca8aba40 708
46c8e0f6 70920020408
710 - (bal) Minor OpenSC updates. Fix up header locations and update
711 README.smartcard provided by Juha Yrjölä <jyrjola@cc.hut.fi>
712
7176df4f 71320020407
714 - (stevesk) HAVE_CONTROL_IN_MSGHDR; not used right now.
715 Future: we may want to test if fd passing works correctly.
84071420 716 - (stevesk) [monitor_fdpass.c] fatal() for UsePrivilegeSeparation=yes
717 and no fd passing support.
1e8f8c5b 718 - (stevesk) HAVE_MMAP and HAVE_SYS_MMAN_H and use them in
719 monitor_mm.c
a90419b8 720 - (stevesk) remove configure support for poll.h; it was removed
721 from sshd.c a long time ago.
9a0fbcb3 722 - (stevesk) --with-privsep-user; default sshd
1bf74eac 723 - (stevesk) wrap munmap() with HAVE_MMAP also.
7176df4f 724
b17d6a47 72520020406
726 - (djm) Typo in Suse SPEC file. Fix from Carsten Grohmann
727 <carsten.grohmann@dr-baldeweg.de>
23aa1237 728 - (bal) Added MAP_FAILED to allow AIX and Trusted HP to compile.
af2b3cd9 729 - (bal) OpenBSD CVS Sync
730 - djm@cvs.openbsd.org 2002/04/06 00:30:08
731 [sftp-client.c]
1d6d408a 732 Fix occasional corruption on upload due to bad reuse of request
733 id, spotted by chombier@mac.com; ok markus@
39f9599a 734 - mouring@cvs.openbsd.org 2002/04/06 18:24:09
735 [scp.c]
736 Fixes potental double // within path.
737 http://bugzilla.mindrot.org/show_bug.cgi?id=76
5866adb0 738 - (bal) Slight update to OpenSC support. Better version checking. patch
739 by Juha Yrjölä <jyrjola@cc.hut.fi>
b5171f93 740 - (bal) Revered out of runtime IRIX detection of joblimits. Code is
741 incomplete.
419e4769 742 - (bal) Quiet down configure.ac if /bin/test does not exist.
14f35963 743 - (bal) We no longer use atexit()/xatexit()/on_exit()
b17d6a47 744
295c8801 74520020405
746 - (bal) Patch for OpenSC SmartCard library; ok markus@; patch by
747 Juha Yrjölä <jyrjola@cc.hut.fi>
748 - (bal) Minor documentation update to reflect smartcard library
749 support changes.
ab33e02a 750 - (bal) Too many <sys/queue.h> issues. Remove all workarounds and
751 using internal version only.
d4c6ddff 752 - (bal) OpenBSD CVS Sync
753 - stevesk@cvs.openbsd.org 2002/04/05 20:56:21
754 [sshd.8]
755 clarify sshrc some and handle X11UseLocalhost=yes; ok markus@
295c8801 756
fde58bd4 75720020404
758 - (stevesk) [auth-pam.c auth-pam.h auth-passwd.c auth-sia.c auth-sia.h
759 auth1.c auth2.c] PAM, OSF_SIA password auth cleanup; from djm.
bf03f2da 760 - (bal) OpenBSD CVS Sync
761 - markus@cvs.openbsd.org 2002/04/03 09:26:11
762 [cipher.c myproposal.h]
763 re-add rijndael-cbc@lysator.liu.se for MacSSH; ash@lab.poc.net
fde58bd4 764
ca7e8e1e 76520020402
766 - (bal) Hand Sync of scp.c (reverted to upstream code)
767 - deraadt@cvs.openbsd.org 2002/03/30 17:45:46
768 [scp.c]
769 stretch banners
c572a874 770 - (bal) CVS ID sync of uidswap.c
783dbbdc 771 - (bal) OpenBSD CVS Sync (now for the real sync)
772 - markus@cvs.openbsd.org 2002/03/27 22:21:45
773 [ssh-keygen.c]
fdff2c55 774 try to import keys with extra trailing === (seen with ssh.com <
775 2.0.12)
49a34e84 776 - markus@cvs.openbsd.org 2002/03/28 15:34:51
777 [session.c]
778 do not call record_login twice (for use_privsep)
ffbf7323 779 - markus@cvs.openbsd.org 2002/03/29 18:59:32
780 [session.c session.h]
fdff2c55 781 retrieve last login time before the pty is allocated, store per
782 session
3bc822df 783 - stevesk@cvs.openbsd.org 2002/03/29 19:16:22
784 [sshd.8]
785 RSA key modulus size minimum 768; ok markus@
82b00264 786 - stevesk@cvs.openbsd.org 2002/03/29 19:18:33
787 [auth-rsa.c ssh-rsa.c ssh.h]
788 make RSA modulus minimum #define; ok markus@
8c38e88b 789 - markus@cvs.openbsd.org 2002/03/30 18:51:15
790 [monitor.c serverloop.c sftp-int.c sftp.c sshd.c]
791 check waitpid for EINTR; based on patch from peter@ifm.liu.se
92053302 792 - markus@cvs.openbsd.org 2002/04/01 22:02:16
793 [sftp-client.c]
794 20480 is an upper limit for older server
9c74a24d 795 - markus@cvs.openbsd.org 2002/04/01 22:07:17
796 [sftp-client.c]
797 fallback to stat if server does not support lstat
b745a2f2 798 - markus@cvs.openbsd.org 2002/04/02 11:49:39
799 [ssh-agent.c]
800 check $SHELL for -k and -d, too;
801 http://bugzilla.mindrot.org/show_bug.cgi?id=199
b69145c2 802 - markus@cvs.openbsd.org 2002/04/02 17:37:48
803 [sftp.c]
804 always call log_init()
c9336aed 805 - markus@cvs.openbsd.org 2002/04/02 20:11:38
806 [ssh-rsa.c]
807 ignore SSH_BUG_SIGBLOB for ssh-rsa; #187
c895376b 808 - (bal) mispelling in uidswap.c (portable only)
ca7e8e1e 809
8b314ec9 81020020401
811 - (stevesk) [monitor.c] PAM should work again; will *not* work with
812 UsePrivilegeSeparation=yes.
3906af0f 813 - (stevesk) [auth1.c] fix password auth for protocol 1 when
814 !USE_PAM && !HAVE_OSF_SIA; merge issue.
8b314ec9 815
267e920e 81620020331
817 - (tim) [configure.ac] use /bin/test -L to work around broken builtin on
818 Solaris 8
ef077e37 819 - (tim) [sshconnect2.c] change uint32_t to u_int32_t
267e920e 820
0461c355 82120020330
822 - (stevesk) [configure.ac] remove header check for sys/ttcompat.h
823 bug 167
824
dd466ff8 82520020327
826 - (bal) 'pw' should be 'authctxt->pw' in auth1.c spotted by
827 kent@lysator.liu.se
17f5e68a 828 - (bal) OpenBSD CVS Sync
829 - markus@cvs.openbsd.org 2002/03/26 11:34:49
830 [ssh.1 sshd.8]
831 update to recent drafts
5fb274c1 832 - markus@cvs.openbsd.org 2002/03/26 11:37:05
833 [ssh.c]
834 update Copyright
19f40184 835 - markus@cvs.openbsd.org 2002/03/26 15:23:40
836 [bufaux.c]
837 do not talk about packets in bufaux
7341fad9 838 - rees@cvs.openbsd.org 2002/03/26 18:46:59
839 [scard.c]
fdff2c55 840 try_AUT0 in read_pubkey too, for those paranoid few who want to
841 acl 'sh'
6c112aca 842 - markus@cvs.openbsd.org 2002/03/26 22:50:39
843 [channels.h]
844 CHANNEL_EFD_OUTPUT_ACTIVE is false for CHAN_CLOSE_RCVD, too
52103b10 845 - markus@cvs.openbsd.org 2002/03/26 23:13:03
846 [auth-rsa.c]
847 disallow RSA keys < 768 for protocol 1, too (rhosts-rsa and rsa auth)
76bf34f1 848 - markus@cvs.openbsd.org 2002/03/26 23:14:51
849 [kex.c]
850 generate a new cookie for each SSH2_MSG_KEXINIT message we send out
300e01c4 851 - mouring@cvs.openbsd.org 2002/03/27 11:45:42
852 [monitor.c]
853 monitor_allowed_key() returns int instead of pointer. ok markus@
854
eb4652f4 85520020325
856 - (stevesk) import OpenBSD <sys/tree.h> as "openbsd-compat/tree.h"
47c36e5b 857 - (bal) OpenBSD CVS Sync
858 - stevesk@cvs.openbsd.org 2002/03/23 20:57:26
859 [sshd.c]
860 setproctitle() after preauth child; ok markus@
d452ec1a 861 - markus@cvs.openbsd.org 2002/03/24 16:00:27
862 [serverloop.c]
863 remove unused debug
a49dfdec 864 - markus@cvs.openbsd.org 2002/03/24 16:01:13
865 [packet.c]
866 debug->debug3 for extra padding
5b0d7dc1 867 - stevesk@cvs.openbsd.org 2002/03/24 17:27:03
868 [kexgex.c]
869 typo; ok markus@
d4355079 870 - stevesk@cvs.openbsd.org 2002/03/24 17:53:16
871 [monitor_fdpass.c]
872 minor cleanup and more error checking; ok markus@
9fc0407d 873 - markus@cvs.openbsd.org 2002/03/24 18:05:29
874 [scard.c]
875 we need to figure out AUT0 for sc_private_encrypt, too
38c1c52a 876 - stevesk@cvs.openbsd.org 2002/03/24 23:20:00
877 [monitor.c]
878 remove "\n" from fatal()
159897f3 879 - markus@cvs.openbsd.org 2002/03/25 09:21:13
880 [auth-rsa.c]
881 return 0 (not NULL); tomh@po.crl.go.jp
6f33c8cd 882 - markus@cvs.openbsd.org 2002/03/25 09:25:06
883 [auth-rh-rsa.c]
884 rm bogus comment
0659cace 885 - markus@cvs.openbsd.org 2002/03/25 17:34:27
886 [scard.c scard.h ssh-agent.c ssh-keygen.c ssh.c]
887 change sc_get_key to sc_get_keys and hide smartcard details in scard.c
3074b20c 888 - stevesk@cvs.openbsd.org 2002/03/25 20:12:10
889 [monitor_mm.c monitor_wrap.c]
890 ssize_t args use "%ld" and cast to (long)
891 size_t args use "%lu" and cast to (u_long)
892 ok markus@ and thanks millert@
1c2deed1 893 - markus@cvs.openbsd.org 2002/03/25 21:04:02
894 [ssh.c]
895 simplify num_identity_files handling
d2296ed7 896 - markus@cvs.openbsd.org 2002/03/25 21:13:51
897 [channels.c channels.h compat.c compat.h nchan.c]
fdff2c55 898 don't send stderr data after EOF, accept this from older known
899 (broken) sshd servers only, fixes
900 http://bugzilla.mindrot.org/show_bug.cgi?id=179
8e4fd4a1 901 - stevesk@cvs.openbsd.org 2002/03/26 03:24:01
902 [monitor.h monitor_fdpass.h monitor_mm.h monitor_wrap.h]
903 $OpenBSD$
eb4652f4 904
1178e8db 90520020324
906 - (stevesk) [session.c] disable LOGIN_NEEDS_TERM until we are sure
907 it can be removed. only used on solaris. will no longer compile with
908 privsep shuffling.
909
6f34652e 91020020322
911 - (stevesk) HAVE_ACCRIGHTS_IN_MSGHDR configure support
7b18c353 912 - (stevesk) [monitor.c monitor_wrap.c] #ifdef HAVE_PW_CLASS_IN_PASSWD
c921ee00 913 - (stevesk) configure and cpp __FUNCTION__ gymnastics to handle nielsisms
dc90b259 914 - (stevesk) [monitor_fdpass.c] support for access rights style file
915 descriptor passing
f7ed12f1 916 - (stevesk) [auth2.c] merge cleanup/sync
cfadc43b 917 - (stevesk) [defines.h] hp-ux 11 has ancillary data style fd passing, but
918 is missing CMSG_LEN() and CMSG_SPACE() macros.
cc58061e 919 - (stevesk) [defines.h] #define MAP_ANON MAP_ANONYMOUS for HP-UX; other
920 platforms may need this--I'm not sure. mmap() issues will need to be
921 addressed further.
05976246 922 - (tim) [cipher.c] fix problem with OpenBSD sync
9242fa1b 923 - (stevesk) [LICENCE] OpenBSD sync
6f34652e 924
8627f3e0 92520020321
926 - (bal) OpenBSD CVS Sync
927 - itojun@cvs.openbsd.org 2002/03/08 06:10:16
928 [sftp-client.c]
929 printf type mismatch
bfa7f960 930 - itojun@cvs.openbsd.org 2002/03/11 03:18:49
931 [sftp-client.c]
932 correct type mismatches (u_int64_t != unsigned long long)
5fc7dbc9 933 - itojun@cvs.openbsd.org 2002/03/11 03:19:53
934 [sftp-client.c]
935 indent
150a5466 936 - markus@cvs.openbsd.org 2002/03/14 15:24:27
937 [sshconnect1.c]
fdff2c55 938 don't trust size sent by (rogue) server; noted by
939 s.esser@e-matters.de
4f08e98d 940 - markus@cvs.openbsd.org 2002/03/14 16:38:26
941 [sshd.c]
942 split out ssh1 session key decryption; ok provos@
46f1eece 943 - markus@cvs.openbsd.org 2002/03/14 16:56:33
944 [auth-rh-rsa.c auth-rsa.c auth.h]
945 split auth_rsa() for better readability and privsep; ok provos@
c390a3c8 946 - itojun@cvs.openbsd.org 2002/03/15 11:00:38
947 [auth.c]
948 fix file type checking (use S_ISREG). ok by markus
bcb68a8f 949 - markus@cvs.openbsd.org 2002/03/16 11:24:53
950 [compress.c]
951 skip inflateEnd if inflate fails; ok provos@
3e65880e 952 - markus@cvs.openbsd.org 2002/03/16 17:22:09
953 [auth-rh-rsa.c auth.h]
954 split auth_rhosts_rsa(), ok provos@
bb15f28b 955 - stevesk@cvs.openbsd.org 2002/03/16 17:41:25
956 [auth-krb5.c]
957 BSD license. from Daniel Kouril via Dug Song. ok markus@
443fa1cd 958 - provos@cvs.openbsd.org 2002/03/17 20:25:56
959 [auth.c auth.h auth1.c auth2.c]
fdff2c55 960 getpwnamallow returns struct passwd * only if user valid;
961 okay markus@
1b34c1b3 962 - provos@cvs.openbsd.org 2002/03/18 01:12:14
963 [auth.h auth1.c auth2.c sshd.c]
964 have the authentication functions return the authentication context
965 and then do_authenticated; okay millert@
9d0844e3 966 - dugsong@cvs.openbsd.org 2002/03/18 01:30:10
967 [auth-krb4.c]
968 set client to NULL after xfree(), from Rolf Braun
969 <rbraun+ssh@andrew.cmu.edu>
1836f69f 970 - provos@cvs.openbsd.org 2002/03/18 03:41:08
971 [auth.c session.c]
972 move auth_approval into getpwnamallow with help from millert@
bf8269a9 973 - markus@cvs.openbsd.org 2002/03/18 17:13:15
974 [cipher.c cipher.h]
975 export/import cipher states; needed by ssh-privsep
e050d348 976 - markus@cvs.openbsd.org 2002/03/18 17:16:38
977 [packet.c packet.h]
978 export/import cipher state, iv and ssh2 seqnr; needed by ssh-privsep
d0074658 979 - markus@cvs.openbsd.org 2002/03/18 17:23:31
980 [key.c key.h]
981 add key_demote() for ssh-privsep
b625ad75 982 - provos@cvs.openbsd.org 2002/03/18 17:25:29
983 [bufaux.c bufaux.h]
984 buffer_skip_string and extra sanity checking; needed by ssh-privsep
3d6fc2f8 985 - provos@cvs.openbsd.org 2002/03/18 17:31:54
986 [compress.c]
987 export compression streams for ssh-privsep
1853d1ef 988 - provos@cvs.openbsd.org 2002/03/18 17:50:31
9759df31 989 [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c]
990 [auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c]
991 [kexgex.c servconf.c]
992 [session.h servconf.h serverloop.c session.c sshd.c]
993 integrate privilege separated openssh; its turned off by default
994 for now. work done by me and markus@
ce19ff48 995 - provos@cvs.openbsd.org 2002/03/18 17:53:08
996 [sshd.8]
997 credits for privsep
70aa9ff4 998 - provos@cvs.openbsd.org 2002/03/18 17:59:09
999 [sshd.8]
1000 document UsePrivilegeSeparation
73fbf637 1001 - stevesk@cvs.openbsd.org 2002/03/18 23:52:51
1002 [servconf.c]
1003 UnprivUser/UnprivGroup usable now--specify numeric user/group; ok
1004 provos@
1c352e97 1005 - stevesk@cvs.openbsd.org 2002/03/19 03:03:43
1006 [pathnames.h servconf.c servconf.h sshd.c]
1007 _PATH_PRIVSEP_CHROOT_DIR; ok provos@
fffbaee2 1008 - stevesk@cvs.openbsd.org 2002/03/19 05:23:08
1009 [sshd.8]
1010 Banner has no default.
702b7dd8 1011 - mpech@cvs.openbsd.org 2002/03/19 06:32:56
1012 [sftp-int.c]
1013 use xfree() after xstrdup().
1014
1015 markus@ ok
51aeb639 1016 - markus@cvs.openbsd.org 2002/03/19 10:35:39
1017 [auth-options.c auth.h session.c session.h sshd.c]
1018 clean up prototypes
762715ce 1019 - markus@cvs.openbsd.org 2002/03/19 10:49:35
9759df31 1020 [auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h]
1021 [packet.c session.c sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c]
1022 [sshconnect2.c sshd.c ttymodes.c]
762715ce 1023 KNF whitespace
5f1f36b5 1024 - markus@cvs.openbsd.org 2002/03/19 14:27:39
1025 [auth.c auth1.c auth2.c]
1026 make getpwnamallow() allways call pwcopy()
06bea668 1027 - markus@cvs.openbsd.org 2002/03/19 15:31:47
1028 [auth.c]
1029 check for NULL; from provos@
2ea6de2b 1030 - stevesk@cvs.openbsd.org 2002/03/20 19:12:25
1031 [servconf.c servconf.h ssh.h sshd.c]
1032 for unprivileged user, group do:
1033 pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@
256debd0 1034 - stevesk@cvs.openbsd.org 2002/03/20 21:08:08
1035 [sshd.c]
1036 strerror() on chdir() fail; ok provos@
edfb66cb 1037 - markus@cvs.openbsd.org 2002/03/21 10:21:20
1038 [ssh-add.c]
1039 ignore errors for nonexisting default keys in ssh-add,
1040 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158
c53c54c2 1041 - jakob@cvs.openbsd.org 2002/03/21 15:17:26
1042 [clientloop.c ssh.1]
1043 add built-in command line for adding new port forwardings on the fly.
1044 based on a patch from brian wellington. ok markus@.
7649bbfe 1045 - markus@cvs.openbsd.org 2002/03/21 16:38:06
1046 [scard.c]
1047 make compile w/ openssl 0.9.7
b9f62352 1048 - markus@cvs.openbsd.org 2002/03/21 16:54:53
1049 [scard.c scard.h ssh-keygen.c]
1050 move key upload to scard.[ch]
1051 - markus@cvs.openbsd.org 2002/03/21 16:57:15
1052 [scard.c]
1053 remove const
39ac8430 1054 - markus@cvs.openbsd.org 2002/03/21 16:58:13
1055 [clientloop.c]
1056 remove unused
514b94dc 1057 - rees@cvs.openbsd.org 2002/03/21 18:08:15
1058 [scard.c]
1059 In sc_put_key(), sc_reader_id should be id.
ce1ba33a 1060 - markus@cvs.openbsd.org 2002/03/21 20:51:12
1061 [sshd_config]
1062 add privsep (off)
324bf712 1063 - markus@cvs.openbsd.org 2002/03/21 21:23:34
1064 [sshd.c]
1065 add privsep_preauth() and remove 1 goto; ok provos@
86c4f63d 1066 - rees@cvs.openbsd.org 2002/03/21 21:54:34
1067 [scard.c scard.h ssh-keygen.c]
1068 Add PIN-protection for secret key.
76139bd8 1069 - rees@cvs.openbsd.org 2002/03/21 22:44:05
1070 [authfd.c authfd.h ssh-add.c ssh-agent.c ssh.c]
1071 Add PIN-protection for secret key.
ec9b7086 1072 - markus@cvs.openbsd.org 2002/03/21 23:07:37
1073 [clientloop.c]
1074 remove unused, sync w/ cmdline patch in my tree.
ce1ba33a 1075
81dadca3 107620020317
fdff2c55 1077 - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is
1078 wanted, warn if directory does not exist. Put system directories in
1079 front of PATH for finding entorpy commands.
43e41c2c 1080 - (tim) [contrib/aix/buildbff.sh contrib/aix/inventory.sh] AIX package
1081 build fixes. Patch by Darren Tucker <dtucker@zip.com.au>
1082 [contrib/solaris/buildpkg.sh] add missing dirs to SYSTEM_DIR. Have
1083 postinstall check for $piddir and add if necessary.
81dadca3 1084
e4abf75b 108520020311
1086 - (tim) [contrib/solaris/buildpkg.sh, contrib/solaris/README] Updated to
1087 build on all platforms that support SVR4 style package tools. Now runs
1088 from build dir. Parts are based on patches from Antonio Navarro, and
1089 Darren Tucker.
1090
fb8f3dc9 109120020308
a068d86f 1092 - (djm) Revert bits of Markus' OpenSSL compat patch which was
1093 accidentally committed.
1094 - (djm) Add Markus' patch for compat wih OpenSSL < 0.9.6.
1095 Known issue: Blowfish for SSH1 does not work
dc254471 1096 - (stevesk) entropy.c: typo in debug message
633151a3 1097 - (djm) ssh-keygen -i needs seeded RNG; report from markus@
fb8f3dc9 1098
0b202697 1099$Id$
This page took 1.197496 seconds and 5 git commands to generate.