]> andersk Git - openssh.git/blame - ChangeLog
- stevesk@cvs.openbsd.org 2002/09/12 19:50:36
[openssh.git] / ChangeLog
CommitLineData
792e7d2d 120020919
2 - (djm) OpenBSD CVS Sync
3 - stevesk@cvs.openbsd.org 2002/09/12 19:11:52
4 [ssh-agent.c]
5 %u for uid print; ok markus@
da0561eb 6 - stevesk@cvs.openbsd.org 2002/09/12 19:50:36
7 [session.c ssh.1]
8 add SSH_CONNECTION and deprecate SSH_CLIENT; bug #384. ok markus@
792e7d2d 9
4f3834e8 1020020912
eee2215e 11 - (djm) Made GNOME askpass programs return non-zero if cancel button is
12 pressed.
10a560d4 13 - (djm) Added getpeereid() replacement. Properly implemented for systems
14 with SO_PEERCRED support. Faked for systems which lack it.
9fd2a215 15 - (djm) Sync sys/tree.h with OpenBSD -current. Rename tree.h and
16 fake-queue.h to sys-tree.h and sys-queue.h
4f3834e8 17 - (djm) OpenBSD CVS Sync
18 - markus@cvs.openbsd.org 2002/09/08 20:24:08
19 [hostfile.h]
20 no comma at end of enumerator list
696f6bef 21 - itojun@cvs.openbsd.org 2002/09/09 06:48:06
22 [auth1.c auth.h auth-krb5.c monitor.c monitor.h]
23 [monitor_wrap.c monitor_wrap.h]
24 kerberos support for privsep. confirmed to work by lha@stacken.kth.se
25 patch from markus
661e45a0 26 - markus@cvs.openbsd.org 2002/09/09 14:54:15
27 [channels.c kex.h key.c monitor.c monitor_wrap.c radix.c uuencode.c]
28 signed vs unsigned from -pedantic; ok henning@
87f4111f 29 - markus@cvs.openbsd.org 2002/09/10 20:24:47
30 [ssh-agent.c]
31 check the euid of the connecting process with getpeereid(2);
32 ok provos deraadt stevesk
07d688d5 33 - stevesk@cvs.openbsd.org 2002/09/11 17:55:03
34 [ssh.1]
35 add agent and X11 forwarding warning text from ssh_config.5; ok markus@
8b10e20e 36 - stevesk@cvs.openbsd.org 2002/09/11 18:27:26
37 [authfd.c authfd.h ssh.c]
38 don't connect to agent to test for presence if we've previously
39 connected; ok markus@
00b3ad3e 40 - djm@cvs.openbsd.org 2002/09/11 22:41:50
41 [sftp.1 sftp-client.c sftp-client.h sftp-common.c sftp-common.h]
42 [sftp-glob.c sftp-glob.h sftp-int.c sftp-server.c]
43 support for short/long listings and globbing in "ls"; ok markus@
be0cd512 44 - djm@cvs.openbsd.org 2002/09/12 00:13:06
45 [sftp-int.c]
46 zap unused var introduced in last commit
4f3834e8 47
ac8802eb 4820020911
49 - (djm) Sync openbsd-compat with OpenBSD -current
50
e2e36358 5120020910
52 - (djm) Bug #365: Read /.ssh/environment properly under CygWin.
53 Patch from Mark Bradshaw <bradshaw@staff.crosswalk.com>
35c4faf5 54 - (djm) Bug #138: Make protocol 1 blowfish work with old OpenSSL.
55 Patch from Robert Halubek <rob@adso.com.pl>
e2e36358 56
3445ca02 5720020905
58 - (djm) OpenBSD CVS Sync
59 - stevesk@cvs.openbsd.org 2002/09/04 18:52:42
60 [servconf.c sshd.8 sshd_config.5]
61 default LoginGraceTime to 2m; 1m may be too short for slow systems.
62 ok markus@
cbecf1ed 63 - (djm) Merge openssh-TODO.patch from Redhat (null) beta
c4ee4c60 64 - (djm) Add gnome-ssh-askpass2.c (gtk2) by merge with patch from
65 Nalin Dahyabhai <nalin@redhat.com>
3c1dff28 66 - (djm) Add support for building gtk2 password requestor from Redhat beta
3445ca02 67
954640a4 6820020903
33e2e066 69 - (djm) Patch from itojun@ for Darwin OS: test getaddrinfo, reorder libcrypt
e18b7d35 70 - (djm) Fix Redhat RPM build dependancy test
954640a4 71 - (djm) OpenBSD CVS Sync
72 - markus@cvs.openbsd.org 2002/08/12 10:46:35
73 [ssh-agent.c]
74 make ssh-agent setgid, disallow ptrace.
755c4339 75 - espie@cvs.openbsd.org 2002/08/21 11:20:59
76 [sshd.8]
77 `RSA' updated to refer to `public key', where it matters.
78 okay markus@
6e0fbda1 79 - stevesk@cvs.openbsd.org 2002/08/21 19:38:06
80 [servconf.c sshd.8 sshd_config sshd_config.5]
81 change LoginGraceTime default to 1 minute; ok mouring@ markus@
00e41835 82 - stevesk@cvs.openbsd.org 2002/08/21 20:10:28
83 [ssh-agent.c]
84 raise listen backlog; ok markus@
c1a4eef1 85 - stevesk@cvs.openbsd.org 2002/08/22 19:27:53
86 [ssh-agent.c]
87 use common close function; ok markus@
1d77f8cb 88 - stevesk@cvs.openbsd.org 2002/08/22 19:38:42
89 [clientloop.c]
90 format with current EscapeChar; bugzilla #388 from wknox@mitre.org.
91 ok markus@
f34ec885 92 - stevesk@cvs.openbsd.org 2002/08/22 20:57:19
93 [ssh-agent.c]
94 shutdown(SHUT_RDWR) not needed before close here; ok markus@
848bf884 95 - markus@cvs.openbsd.org 2002/08/22 21:33:58
96 [auth1.c auth2.c]
97 auth_root_allowed() is handled by the monitor in the privsep case,
98 so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325
6c723e7c 99 - markus@cvs.openbsd.org 2002/08/22 21:45:41
100 [session.c]
101 send signal name (not signal number) in "exit-signal" message; noticed
102 by galb@vandyke.com
b41baf4d 103 - stevesk@cvs.openbsd.org 2002/08/27 17:13:56
104 [ssh-rsa.c]
105 RSA_public_decrypt() returns -1 on error so len must be signed;
106 ok markus@
dbcdea68 107 - stevesk@cvs.openbsd.org 2002/08/27 17:18:40
108 [ssh_config.5]
109 some warning text for ForwardAgent and ForwardX11; ok markus@
ba1566dd 110 - stevesk@cvs.openbsd.org 2002/08/29 15:57:25
111 [monitor.c session.c sshlogin.c sshlogin.h]
112 pass addrlen with sockaddr *; from Hajimu UMEMOTO <ume@FreeBSD.org>
113 NOTE: there are also p-specific parts to this patch. ok markus@
e59404d1 114 - stevesk@cvs.openbsd.org 2002/08/29 16:02:54
115 [ssh.1 ssh.c]
116 deprecate -P as UsePrivilegedPort defaults to no now; ok markus@
878b8992 117 - stevesk@cvs.openbsd.org 2002/08/29 16:09:02
118 [ssh_config.5]
119 more on UsePrivilegedPort and setuid root; ok markus@
9f324470 120 - stevesk@cvs.openbsd.org 2002/08/29 19:49:42
121 [ssh.c]
122 shrink initial privilege bracket for setuid case; ok markus@
57ff5eeb 123 - stevesk@cvs.openbsd.org 2002/08/29 22:54:10
124 [ssh_config.5 sshd_config.5]
125 state XAuthLocation is a full pathname
954640a4 126
b85698ab 12720020820
128 - OpenBSD CVS Sync
129 - millert@cvs.openbsd.org 2002/08/02 14:43:15
130 [monitor.c monitor_mm.c]
131 Change mm_zalloc() sanity checks to be more in line with what
132 we do in calloc() and add a check to monitor_mm.c.
133 OK provos@ and markus@
6a342527 134 - marc@cvs.openbsd.org 2002/08/02 16:00:07
135 [ssh.1 sshd.8]
136 note that .ssh/environment is only read when
137 allowed (PermitUserEnvironment in sshd_config).
138 OK markus@
4004c2ac 139 - markus@cvs.openbsd.org 2002/08/02 21:23:41
140 [ssh-rsa.c]
141 diff is u_int (2x); ok deraadt/provos
0caf874a 142 - markus@cvs.openbsd.org 2002/08/02 22:20:30
143 [ssh-rsa.c]
144 replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser
145 for authentication; ok deraadt/djm
75cf7563 146 - aaron@cvs.openbsd.org 2002/08/08 13:50:23
147 [sshconnect1.c]
148 Use & to test if bits are set, not &&; markus@ ok.
d6097023 149 - stevesk@cvs.openbsd.org 2002/08/08 23:54:52
150 [auth.c]
151 typo in comment
36535ee6 152 - stevesk@cvs.openbsd.org 2002/08/09 17:21:42
153 [sshd_config.5]
154 use Op for mdoc conformance; from esr@golux.thyrsus.com
155 ok aaron@
b3641662 156 - stevesk@cvs.openbsd.org 2002/08/09 17:41:12
157 [sshd_config.5]
158 proxy vs. fake display
35453849 159 - stevesk@cvs.openbsd.org 2002/08/12 17:30:35
160 [ssh.1 sshd.8 sshd_config.5]
161 more PermitUserEnvironment; ok markus@
24794905 162 - stevesk@cvs.openbsd.org 2002/08/17 23:07:14
163 [ssh.1]
164 ForwardAgent has defaulted to no for over 2 years; be more clear here.
4dcbbeea 165 - stevesk@cvs.openbsd.org 2002/08/17 23:55:01
166 [ssh_config.5]
167 ordered list here
7d3b91a6 168 - (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assign
169 it to ULONG_MAX.
b85698ab 170
cd018561 17120020813
172 - (tim) [configure.ac] Display OpenSSL header/library version.
173 Patch by dtucker@zip.com.au
174
8a48a7ef 17520020731
176 - (bal) OpenBSD CVS Sync
177 - markus@cvs.openbsd.org 2002/07/24 16:11:18
178 [hostfile.c hostfile.h sshconnect.c]
179 print out all known keys for a host if we get a unknown host key,
180 see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4
181
182 the ssharp mitm tool attacks users in a similar way, so i'd like to
183 pointed out again:
184 A MITM attack is always possible if the ssh client prints:
185 The authenticity of host 'bla' can't be established.
186 (protocol version 2 with pubkey authentication allows you to detect
187 MITM attacks)
5cb5518b 188 - mouring@cvs.openbsd.org 2002/07/25 01:16:59
189 [sftp.c]
190 FallBackToRsh does not exist anywhere else. Remove it from here.
191 OK deraadt.
567a05bf 192 - markus@cvs.openbsd.org 2002/07/29 18:57:30
193 [sshconnect.c]
194 print file:line
f00bab84 195 - markus@cvs.openbsd.org 2002/07/30 17:03:55
196 [auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5]
197 add PermitUserEnvironment (off by default!); from dot@dotat.at;
198 ok provos, deraadt
8a48a7ef 199
13979d47 20020020730
201 - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de
202
d228d9dd 20320020728
204 - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar
16c4a972 205 - (stevesk) [CREDITS] solar
75131bbd 206 - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned
207 char arg.
d228d9dd 208
d40af5fa 20920020725
210 - (djm) Remove some cruft from INSTALL
d91b4743 211 - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/
d40af5fa 212
56b54901 21320020723
214 - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger.
918ffb0b 215 - (bal) sync ID w/ ssh-agent.c
516f0d7d 216 - (bal) OpenBSD Sync
217 - markus@cvs.openbsd.org 2002/07/19 15:43:33
218 [log.c log.h session.c sshd.c]
219 remove fatal cleanups after fork; based on discussions with and code
220 from solar.
5d185586 221 - stevesk@cvs.openbsd.org 2002/07/19 17:42:40
222 [ssh.c]
223 display a warning from ssh when XAuthLocation does not exist or xauth
224 returned no authentication data. ok markus@
30998af1 225 - stevesk@cvs.openbsd.org 2002/07/21 18:32:20
226 [auth-options.c]
227 unneeded includes
dbc728ff 228 - stevesk@cvs.openbsd.org 2002/07/21 18:34:43
229 [auth-options.h]
230 remove invalid comment
97686bf9 231 - markus@cvs.openbsd.org 2002/07/22 11:03:06
232 [session.c]
233 fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors;
d341742a 234 - stevesk@cvs.openbsd.org 2002/07/22 17:32:56
235 [monitor.c]
236 u_int here; ok provos@
67f04db1 237 - stevesk@cvs.openbsd.org 2002/07/23 16:03:10
238 [sshd.c]
239 utmp_len is unsigned; display error consistent with other options.
240 ok markus@
0df3a240 241 - stevesk@cvs.openbsd.org 2002/07/15 17:15:31
242 [uidswap.c]
243 little more debugging; ok markus@
d341742a 244
21c2c5cd 24520020722
246 - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk
a93bd14c 247 - (stevesk) [xmmap.c] missing prototype for fatal()
ccbb983c 248 - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync
249 with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com.
d262b7f2 250 - (bal) [configure.ac] Missing ;; from cray patch.
30eab01d 251 - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines
252 into it's own header.
ee48c949 253 - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be
254 freed by the caller; add free_pam_environment() and use it.
1d3f4ae7 255 - (stevesk) [auth-pam.c] typo in comment
21c2c5cd 256
b992432e 25720020721
258 - (stevesk) [auth-pam.c] merge cosmetic changes from solar's
259 openssh-3.4p1-owl-password-changing.diff
277f55cf 260 - (stevesk) [auth-pam.c] merge rest of solar's PAM patch;
261 PAM_NEW_AUTHTOK_REQD remains in #if 0 for now.
f7808a93 262 - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch
263 warning on pam_conv struct conversation function.
337dde6b 264 - (stevesk) [auth-pam.h] license
8565f28e 265 - (stevesk) [auth-pam.h] unneeded include
e9b2c23d 266 - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h
b992432e 267
ce88d9df 26820020720
269 - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng().
270
4379c0e5 27120020719
272 - (tim) [contrib/solaris/buildpkg.sh] create privsep user/group if needed.
273 Patch by dtucker@zip.com.au
f75ca46d 274 - (tim) [configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au
4379c0e5 275
45491100 27620020718
277 - (tim) [defines.h] Bug 313 patch by dirk.meyer@dinoex.sub.org
278 - (tim) [monitor_mm.c] add missing declaration for xmmap(). Reported
279 by ayamura@ayamura.org
1cbbe6c8 280 - (tim) [configure.ac] Bug 267 rework int64_t test.
5749e709 281 - (tim) [includes.h] Bug 267 add stdint.h
45491100 282
dd3943d0 28320020717
284 - (bal) aixbff package updated by dtucker@zip.com.au
2bf42e4a 285 - (tim) [configure.ac] change how we do paths in AC_PATH_PROGS tests
286 for autoconf 2.53. Based on a patch by jrj@purdue.edu
dd3943d0 287
8fc47887 28820020716
289 - (tim) [contrib/solaris/opensshd.in] Only kill sshd if .pid file found
290
c750d869 29120020715
292 - (bal) OpenBSD CVS Sync
293 - itojun@cvs.openbsd.org 2002/07/12 13:29:09
294 [sshconnect.c]
295 print connect failure during debugging mode.
a2f883ce 296 - markus@cvs.openbsd.org 2002/07/12 15:50:17
297 [cipher.c]
298 EVP_CIPH_CUSTOM_IV for our own rijndael
2d199535 299 - (bal) Remove unused tty defined in do_setusercontext() pointed out by
300 dtucker@zip.com.au plus a a more KNF since I am near it.
846be3f4 301 - (bal) Privsep user creation support in Solaris buildpkg.sh by
302 dtucker@zip.com.au
c750d869 303
798c5808 30420020714
305 - (tim) [Makefile.in] replace "id sshd" with "sshd -t"
4165b82e 306 - (bal/tim) [acconfig.h configure.ac monitor_mm.c servconf.c
307 openbsd-compat/Makefile.in] support compression on platforms that
308 have no/broken MAP_ANON. Moved code to openbsd-compat/xmmap.c
309 Based on patch from nalin@redhat.com of code extracted from Owl's package
5fd8087a 310 - (tim) [ssh_prng_cmds.in] Bug 323 arp -n flag doesn't exist under Solaris.
311 report by chris@by-design.net
fdebdd4f 312 - (tim) [loginrec.c] Bug 347: Fix typo (WTMPX_FILE) report by rodney@bond.net
d80063fe 313 - (tim) [loginrec.c] Bug 348: add missing found = 1; to wtmpx_islogin()
314 report by rodney@bond.net
798c5808 315
6b2a3595 31620020712
317 - (tim) [Makefile.in] quiet down install-files: and check-user:
3085601b 318 - (tim) [configure.ac] remove unused filepriv line
6b2a3595 319
249f9903 32020020710
321 - (tim) [contrib/cygwin/ssh-host-config] explicitely sets the permissions
322 on /var/empty to 755 Patch by vinschen@redhat.com
6f901f8e 323 - (bal) OpenBSD CVS Sync
324 - itojun@cvs.openbsd.org 2002/07/09 11:56:50
325 [sshconnect.c]
326 silently try next address on connect(2). markus ok
59c825e1 327 - itojun@cvs.openbsd.org 2002/07/09 11:56:27
328 [canohost.c]
329 suppress log on reverse lookup failiure, as there's no real value in
330 doing so.
331 markus ok
aab5431b 332 - itojun@cvs.openbsd.org 2002/07/09 12:04:02
333 [sshconnect.c]
334 ed static function (less warnings)
94ad46d1 335 - stevesk@cvs.openbsd.org 2002/07/09 17:46:25
336 [sshd_config.5]
337 clarify no preference ordering in protocol list; ok markus@
9bd68577 338 - itojun@cvs.openbsd.org 2002/07/10 10:28:15
339 [sshconnect.c]
340 bark if all connection attempt fails.
09683edf 341 - deraadt@cvs.openbsd.org 2002/07/10 17:53:54
342 [rijndael.c]
343 use right sizeof in memcpy; markus ok
249f9903 344
e6f15ed1 34520020709
346 - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platforms
347 lacking that concept can share it. Patch by vinschen@redhat.com
348
4f9d6706 34920020708
350 - (tim) [openssh/contrib/solaris/buildpkg.sh] add PKG_INSTALL_ROOT to
351 work in a jumpstart environment. patch by kbrint@rufus.net
b451e27b 352 - (tim) [Makefile.in] workaround for broken pakadd on some systems.
cda1ebcb 353 - (tim) [configure.ac] fix libc89 utimes test. Mention default path for
354 --with-privsep-path=
4f9d6706 355
ac74561e 35620020707
357 - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH)
94d8258b 358 - (tim) [acconfig.h configure.ac sshd.c]
359 s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/
d41f8eed 360 - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes
361 patch from vinschen@redhat.com
0b832146 362 - (bal) [realpath.c] Updated with OpenBSD tree.
da2499f5 363 - (bal) OpenBSD CVS Sync
364 - deraadt@cvs.openbsd.org 2002/07/04 04:15:33
365 [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c]
366 patch memory leaks; grendel@zeitbombe.org
e1feb9bf 367 - deraadt@cvs.openbsd.org 2002/07/04 08:12:15
368 [channels.c packet.c]
369 blah blah minor nothing as i read and re-read and re-read...
eb9f2fab 370 - markus@cvs.openbsd.org 2002/07/04 10:41:47
371 [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c]
372 don't allocate, copy, and discard if there is not interested in the data;
373 ok deraadt@
4394a17f 374 - deraadt@cvs.openbsd.org 2002/07/06 01:00:49
375 [log.c]
376 KNF
50d2fbbc 377 - deraadt@cvs.openbsd.org 2002/07/06 01:01:26
378 [ssh-keyscan.c]
379 KNF, realloc fix, and clean usage
12a3f2c3 380 - stevesk@cvs.openbsd.org 2002/07/06 17:47:58
381 [ssh-keyscan.c]
382 unused variable
41545cb6 383 - (bal) Minor KNF on ssh-keyscan.c
ac74561e 384
0764e748 38520020705
386 - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs.
387 Reported by Darren Tucker <dtucker@zip.com.au>
e12659f4 388 - (tim) [contrib/cygwin/ssh-host-config] double slash corrction
389 from vinschen@redhat.com
0764e748 390
64c0ce80 39120020704
392 - (bal) Limit data to TTY for AIX only (Newer versions can't handle the
393 faster data rate) Bug #124
375c1dee 394 - (bal) glob.c defines TILDE and AIX also defines it. #undef it first.
395 bug #265
ff2de800 396 - (bal) One too many nulls in ports-aix.c
64c0ce80 397
d2f95449 39820020703
399 - (bal) Updated contrib/cygwin/ patch by vinschen@redhat.com
619a6aff 400 - (bal) minor correction to utimes() replacement. Patch by
401 onoe@sm.sony.co.jp
f11fe301 402 - OpenBSD CVS Sync
403 - markus@cvs.openbsd.org 2002/06/27 08:49:44
404 [dh.c ssh-keyscan.c sshconnect.c]
405 more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@
181d6635 406 - deraadt@cvs.openbsd.org 2002/06/27 09:08:00
407 [monitor.c]
408 improve mm_zalloc check; markus ok
30e37ee6 409 - deraadt@cvs.openbsd.org 2002/06/27 10:35:47
410 [auth2-none.c monitor.c sftp-client.c]
411 use xfree()
c8f94200 412 - stevesk@cvs.openbsd.org 2002/06/27 19:49:08
413 [ssh-keyscan.c]
414 use convtime(); ok markus@
a64d3560 415 - millert@cvs.openbsd.org 2002/06/28 01:49:31
416 [monitor_mm.c]
417 tree(3) wants an int return value for its compare functions and
418 the difference between two pointers is not an int. Just do the
419 safest thing and store the result in a long and then return 0,
420 -1, or 1 based on that result.
405a0d43 421 - deraadt@cvs.openbsd.org 2002/06/28 01:50:37
422 [monitor_wrap.c]
423 use ssize_t
4efd85b2 424 - deraadt@cvs.openbsd.org 2002/06/28 10:08:25
425 [sshd.c]
426 range check -u option at invocation
6ded293b 427 - deraadt@cvs.openbsd.org 2002/06/28 23:05:06
428 [sshd.c]
429 gidset[2] -> gidset[1]; markus ok
7fdc56c5 430 - deraadt@cvs.openbsd.org 2002/06/30 21:54:16
431 [auth2.c session.c sshd.c]
432 lint asks that we use names that do not overlap
343288b8 433 - deraadt@cvs.openbsd.org 2002/06/30 21:59:45
434 [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c
435 monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c
436 sshconnect2.c sshd.c]
437 minor KNF
7d60d74c 438 - deraadt@cvs.openbsd.org 2002/07/01 16:15:25
439 [msg.c]
440 %u
713f6cd9 441 - markus@cvs.openbsd.org 2002/07/01 19:48:46
442 [sshconnect2.c]
443 for compression=yes, we fallback to no-compression if the server does
444 not support compression, vice versa for compression=no. ok mouring@
261189cc 445 - markus@cvs.openbsd.org 2002/07/03 09:55:38
446 [ssh-keysign.c]
447 use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld)
448 in order to avoid a possible Kocher timing attack pointed out by Charles
449 Hannum; ok provos@
60cd0a97 450 - markus@cvs.openbsd.org 2002/07/03 14:21:05
451 [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config]
452 re-enable ssh-keysign's sbit, but make ssh-keysign read
453 /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled
454 globally. based on discussions with deraadt, itojun and sommerfeld;
455 ok itojun@
56fd97d7 456 - (bal) Failed password attempts don't increment counter on AIX. Bug #145
e8aa0a5c 457 - (bal) Missed Makefile.in change. keysign needs readconf.o
0ba40daa 458 - (bal) Clean up aix_usrinfo(). Ignore TTY= period I guess.
56fd97d7 459
b2f295dc 46020020702
461 - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc &
462 friends consistently. Spotted by Solar Designer <solar@openwall.com>
463
3c3e878a 46420020629
465 - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style
466 clean up while I'm near it.
467
811ee370 46820020628
469 - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented
470 options should contain default value. from solar.
b9b82dab 471 - (bal) Cygwin uid0 fix by vinschen@redhat.com
17962c40 472 - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c. Otherwise wise
473 have issues of our fixes not propogating right (ie bcopy instead of
474 memmove). OK tim
4fa4fb00 475 - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported.
476 Bug #303
811ee370 477
ce88d9df 47820020627
d1ff09ba 479 - OpenBSD CVS Sync
480 - deraadt@cvs.openbsd.org 2002/06/26 14:49:36
481 [monitor.c]
482 correct %u
63b5f1a1 483 - deraadt@cvs.openbsd.org 2002/06/26 14:50:04
484 [monitor_fdpass.c]
485 use ssize_t for recvmsg() and sendmsg() return
1431a900 486 - markus@cvs.openbsd.org 2002/06/26 14:51:33
487 [ssh-add.c]
488 fix exit code for -X/-x
bb0640b2 489 - deraadt@cvs.openbsd.org 2002/06/26 15:00:32
490 [monitor_wrap.c]
491 more %u
20e79e98 492 - markus@cvs.openbsd.org 2002/06/26 22:27:32
493 [ssh-keysign.c]
494 bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu
d1ff09ba 495
4bfa8bb6 49620020626
497 - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM
a594fa74 498 - (bal) OpenBSD CVS Sync
499 - markus@cvs.openbsd.org 2002/06/23 21:34:07
500 [channels.c]
501 tcode is u_int
38501509 502 - markus@cvs.openbsd.org 2002/06/24 13:12:23
503 [ssh-agent.1]
504 the socket name contains ssh-agent's ppid; via mpech@ from form@
f91d9a89 505 - markus@cvs.openbsd.org 2002/06/24 14:33:27
506 [channels.c channels.h clientloop.c serverloop.c]
507 move channel counter to u_int
1169c3df 508 - markus@cvs.openbsd.org 2002/06/24 14:55:38
509 [authfile.c kex.c ssh-agent.c]
510 cat to (void) when output from buffer_get_X is ignored
09915dc1 511 - itojun@cvs.openbsd.org 2002/06/24 15:49:22
512 [msg.c]
513 printf type pedant
d0a1c5d1 514 - deraadt@cvs.openbsd.org 2002/06/24 17:57:20
515 [sftp-server.c sshpty.c]
516 explicit (u_int) for uid and gid
6c69a6a9 517 - markus@cvs.openbsd.org 2002/06/25 16:22:42
518 [authfd.c]
519 unnecessary cast
87809a1f 520 - markus@cvs.openbsd.org 2002/06/25 18:51:04
521 [sshd.c]
522 lightweight do_setusercontext after chroot()
924681ee 523 - (bal) Updated AIX package build. Patch by dtucker@zip.com.au
46c8ebb3 524 - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8
78beb77d 525 - (bal) added back in error check for mmap(). I screwed up, Pointed
526 out by stevesk@
f2d9a1f8 527 - (tim) [README.privsep] UnixWare tip no longer needed.
88cb875c 528 - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP,
529 but it all damned lies.
0d0270e6 530 - (stevesk) [README.privsep] more for sshd pseudo-account.
8029e7fc 531 - (tim) [contrib/caldera/openssh.spec] add support for privsep
8695f9f7 532 - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@
b29fe4ea 533 - (djm) OpenBSD CVS Sync
534 - markus@cvs.openbsd.org 2002/06/26 08:53:12
535 [bufaux.c]
536 limit size of BNs to 8KB; ok provos/deraadt
22d62d31 537 - markus@cvs.openbsd.org 2002/06/26 08:54:18
538 [buffer.c]
539 limit append to 1MB and buffers to 10MB
5df8c731 540 - markus@cvs.openbsd.org 2002/06/26 08:55:02
541 [channels.c]
542 limit # of channels to 10000
87f18810 543 - markus@cvs.openbsd.org 2002/06/26 08:58:26
544 [session.c]
545 limit # of env vars to 1000; ok deraadt/djm
2f095a0e 546 - deraadt@cvs.openbsd.org 2002/06/26 13:20:57
547 [monitor.c]
548 be careful in mm_zalloc
66087567 549 - deraadt@cvs.openbsd.org 2002/06/26 13:49:26
550 [session.c]
551 disclose less information from environment files; based on input
552 from djm, and dschultz@uclink.Berkeley.EDU
477edc5d 553 - markus@cvs.openbsd.org 2002/06/26 13:55:37
554 [auth2-chall.c]
555 make sure # of response matches # of queries, fixes int overflow;
556 from ISS
03b14b6f 557 - markus@cvs.openbsd.org 2002/06/26 13:56:27
558 [version.h]
559 3.4
9c696d0d 560 - (djm) Require krb5 devel for RPM build w/ KrbV
c4186be7 561 - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai
562 <nalin@redhat.com>
1e7bc74c 563 - (djm) Update spec files for release
49b53b03 564 - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS
03b14b6f 565 - (djm) Release 3.4p1
6519cfd6 566 - (tim) [contrib/caldera/openssh.spec] remove 2 configure options I put in
567 by mistake
4bfa8bb6 568
ef1ac12b 56920020625
570 - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh
1a44c6f7 571 - (stevesk) [README.privsep] minor updates
fd3cbf67 572 - (djm) Create privsep directory and warn if privsep user is missing
573 during make install
702b2855 574 - (bal) Started list of PrivSep issues in TODO
1c6249af 575 - (bal) if mmap() is substandard, don't allow compression on server side.
576 Post 'event' we will add more options.
cbaa3d44 577 - (tim) [contrib/caldera/openssh.spec] Sync with Caldera
e2bc41f9 578 - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by
579 dtucker@zip.com.au
d170feb1 580 - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus
581 for Cygwin, Cray, & SCO
ef1ac12b 582
d5803314 58320020624
584 - OpenBSD CVS Sync
585 - deraadt@cvs.openbsd.org 2002/06/23 03:25:50
586 [tildexpand.c]
587 KNF
3ddc795d 588 - deraadt@cvs.openbsd.org 2002/06/23 03:26:19
589 [cipher.c key.c]
590 KNF
d6133f43 591 - deraadt@cvs.openbsd.org 2002/06/23 03:30:58
592 [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c
593 sshpty.c]
594 various KNF and %d for unsigned
9906a836 595 - deraadt@cvs.openbsd.org 2002/06/23 09:30:14
596 [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c
597 sftp.c]
598 bunch of u_int vs int stuff
512df038 599 - deraadt@cvs.openbsd.org 2002/06/23 09:39:55
600 [ssh-keygen.c]
601 u_int stuff
7528d467 602 - deraadt@cvs.openbsd.org 2002/06/23 09:46:51
603 [bufaux.c servconf.c]
604 minor KNF. things the fingers do while you read
e424e241 605 - deraadt@cvs.openbsd.org 2002/06/23 10:29:52
606 [ssh-agent.c sshd.c]
607 some minor KNF and %u
7138ebd9 608 - deraadt@cvs.openbsd.org 2002/06/23 20:39:45
609 [session.c]
610 compression_level is u_int
f09ce20a 611 - deraadt@cvs.openbsd.org 2002/06/23 21:06:13
612 [sshpty.c]
613 KNF
57f228e8 614 - deraadt@cvs.openbsd.org 2002/06/23 21:06:41
615 [channels.c channels.h session.c session.h]
616 display, screen, row, col, xpixel, ypixel are u_int; markus ok
0bc50167 617 - deraadt@cvs.openbsd.org 2002/06/23 21:10:02
618 [packet.c]
619 packet_get_int() returns unsigned for reason & seqnr
57f228e8 620 - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col,
621 xpixel are u_int.
622
d5803314 623
58177c0a 62420020623
625 - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX.
dc43acd2 626 - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset.
ef3912be 627 - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au
a8bbdc75 628 - OpenBSD CVS Sync
629 - stevesk@cvs.openbsd.org 2002/06/22 02:00:29
630 [ssh.h]
631 correct comment
1ae02182 632 - stevesk@cvs.openbsd.org 2002/06/22 02:40:23
633 [ssh.1]
634 section 5 not 4 for ssh_config
b2843ec6 635 - naddy@cvs.openbsd.org 2002/06/22 11:51:39
636 [ssh.1]
637 typo
75653d3e 638 - stevesk@cvs.openbsd.org 2002/06/22 16:32:54
639 [sshd.8]
640 add /var/empty in FILES section
a56313d7 641 - stevesk@cvs.openbsd.org 2002/06/22 16:40:19
642 [sshd.c]
643 check /var/empty owner mode; ok provos@
e4e83d70 644 - stevesk@cvs.openbsd.org 2002/06/22 16:41:57
645 [scp.1]
646 typo
baa08b92 647 - stevesk@cvs.openbsd.org 2002/06/22 16:45:29
648 [ssh-agent.1 sshd.8 sshd_config.5]
649 use process ID vs. pid/PID/process identifier
c28876e9 650 - stevesk@cvs.openbsd.org 2002/06/22 20:05:27
651 [sshd.c]
652 don't call setsid() if debugging or run from inetd; no "Operation not
653 permitted" errors now; ok millert@ markus@
d17ef027 654 - stevesk@cvs.openbsd.org 2002/06/22 23:09:51
655 [monitor.c]
656 save auth method before monitor_reset_key_state(); bugzilla bug #284;
657 ok provos@
58177c0a 658
0b202697 659$Id$
This page took 0.487302 seconds and 5 git commands to generate.