]>
Commit | Line | Data |
---|---|---|
954640a4 | 1 | 20020903 |
2 | - (djm) OpenBSD CVS Sync | |
3 | - markus@cvs.openbsd.org 2002/08/12 10:46:35 | |
4 | [ssh-agent.c] | |
5 | make ssh-agent setgid, disallow ptrace. | |
755c4339 | 6 | - espie@cvs.openbsd.org 2002/08/21 11:20:59 |
7 | [sshd.8] | |
8 | `RSA' updated to refer to `public key', where it matters. | |
9 | okay markus@ | |
6e0fbda1 | 10 | - stevesk@cvs.openbsd.org 2002/08/21 19:38:06 |
11 | [servconf.c sshd.8 sshd_config sshd_config.5] | |
12 | change LoginGraceTime default to 1 minute; ok mouring@ markus@ | |
00e41835 | 13 | - stevesk@cvs.openbsd.org 2002/08/21 20:10:28 |
14 | [ssh-agent.c] | |
15 | raise listen backlog; ok markus@ | |
c1a4eef1 | 16 | - stevesk@cvs.openbsd.org 2002/08/22 19:27:53 |
17 | [ssh-agent.c] | |
18 | use common close function; ok markus@ | |
1d77f8cb | 19 | - stevesk@cvs.openbsd.org 2002/08/22 19:38:42 |
20 | [clientloop.c] | |
21 | format with current EscapeChar; bugzilla #388 from wknox@mitre.org. | |
22 | ok markus@ | |
f34ec885 | 23 | - stevesk@cvs.openbsd.org 2002/08/22 20:57:19 |
24 | [ssh-agent.c] | |
25 | shutdown(SHUT_RDWR) not needed before close here; ok markus@ | |
848bf884 | 26 | - markus@cvs.openbsd.org 2002/08/22 21:33:58 |
27 | [auth1.c auth2.c] | |
28 | auth_root_allowed() is handled by the monitor in the privsep case, | |
29 | so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325 | |
6c723e7c | 30 | - markus@cvs.openbsd.org 2002/08/22 21:45:41 |
31 | [session.c] | |
32 | send signal name (not signal number) in "exit-signal" message; noticed | |
33 | by galb@vandyke.com | |
b41baf4d | 34 | - stevesk@cvs.openbsd.org 2002/08/27 17:13:56 |
35 | [ssh-rsa.c] | |
36 | RSA_public_decrypt() returns -1 on error so len must be signed; | |
37 | ok markus@ | |
dbcdea68 | 38 | - stevesk@cvs.openbsd.org 2002/08/27 17:18:40 |
39 | [ssh_config.5] | |
40 | some warning text for ForwardAgent and ForwardX11; ok markus@ | |
ba1566dd | 41 | - stevesk@cvs.openbsd.org 2002/08/29 15:57:25 |
42 | [monitor.c session.c sshlogin.c sshlogin.h] | |
43 | pass addrlen with sockaddr *; from Hajimu UMEMOTO <ume@FreeBSD.org> | |
44 | NOTE: there are also p-specific parts to this patch. ok markus@ | |
e59404d1 | 45 | - stevesk@cvs.openbsd.org 2002/08/29 16:02:54 |
46 | [ssh.1 ssh.c] | |
47 | deprecate -P as UsePrivilegedPort defaults to no now; ok markus@ | |
954640a4 | 48 | |
b85698ab | 49 | 20020820 |
50 | - OpenBSD CVS Sync | |
51 | - millert@cvs.openbsd.org 2002/08/02 14:43:15 | |
52 | [monitor.c monitor_mm.c] | |
53 | Change mm_zalloc() sanity checks to be more in line with what | |
54 | we do in calloc() and add a check to monitor_mm.c. | |
55 | OK provos@ and markus@ | |
6a342527 | 56 | - marc@cvs.openbsd.org 2002/08/02 16:00:07 |
57 | [ssh.1 sshd.8] | |
58 | note that .ssh/environment is only read when | |
59 | allowed (PermitUserEnvironment in sshd_config). | |
60 | OK markus@ | |
4004c2ac | 61 | - markus@cvs.openbsd.org 2002/08/02 21:23:41 |
62 | [ssh-rsa.c] | |
63 | diff is u_int (2x); ok deraadt/provos | |
0caf874a | 64 | - markus@cvs.openbsd.org 2002/08/02 22:20:30 |
65 | [ssh-rsa.c] | |
66 | replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser | |
67 | for authentication; ok deraadt/djm | |
75cf7563 | 68 | - aaron@cvs.openbsd.org 2002/08/08 13:50:23 |
69 | [sshconnect1.c] | |
70 | Use & to test if bits are set, not &&; markus@ ok. | |
d6097023 | 71 | - stevesk@cvs.openbsd.org 2002/08/08 23:54:52 |
72 | [auth.c] | |
73 | typo in comment | |
36535ee6 | 74 | - stevesk@cvs.openbsd.org 2002/08/09 17:21:42 |
75 | [sshd_config.5] | |
76 | use Op for mdoc conformance; from esr@golux.thyrsus.com | |
77 | ok aaron@ | |
b3641662 | 78 | - stevesk@cvs.openbsd.org 2002/08/09 17:41:12 |
79 | [sshd_config.5] | |
80 | proxy vs. fake display | |
35453849 | 81 | - stevesk@cvs.openbsd.org 2002/08/12 17:30:35 |
82 | [ssh.1 sshd.8 sshd_config.5] | |
83 | more PermitUserEnvironment; ok markus@ | |
24794905 | 84 | - stevesk@cvs.openbsd.org 2002/08/17 23:07:14 |
85 | [ssh.1] | |
86 | ForwardAgent has defaulted to no for over 2 years; be more clear here. | |
4dcbbeea | 87 | - stevesk@cvs.openbsd.org 2002/08/17 23:55:01 |
88 | [ssh_config.5] | |
89 | ordered list here | |
7d3b91a6 | 90 | - (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assign |
91 | it to ULONG_MAX. | |
b85698ab | 92 | |
cd018561 | 93 | 20020813 |
94 | - (tim) [configure.ac] Display OpenSSL header/library version. | |
95 | Patch by dtucker@zip.com.au | |
96 | ||
8a48a7ef | 97 | 20020731 |
98 | - (bal) OpenBSD CVS Sync | |
99 | - markus@cvs.openbsd.org 2002/07/24 16:11:18 | |
100 | [hostfile.c hostfile.h sshconnect.c] | |
101 | print out all known keys for a host if we get a unknown host key, | |
102 | see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4 | |
103 | ||
104 | the ssharp mitm tool attacks users in a similar way, so i'd like to | |
105 | pointed out again: | |
106 | A MITM attack is always possible if the ssh client prints: | |
107 | The authenticity of host 'bla' can't be established. | |
108 | (protocol version 2 with pubkey authentication allows you to detect | |
109 | MITM attacks) | |
5cb5518b | 110 | - mouring@cvs.openbsd.org 2002/07/25 01:16:59 |
111 | [sftp.c] | |
112 | FallBackToRsh does not exist anywhere else. Remove it from here. | |
113 | OK deraadt. | |
567a05bf | 114 | - markus@cvs.openbsd.org 2002/07/29 18:57:30 |
115 | [sshconnect.c] | |
116 | print file:line | |
f00bab84 | 117 | - markus@cvs.openbsd.org 2002/07/30 17:03:55 |
118 | [auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5] | |
119 | add PermitUserEnvironment (off by default!); from dot@dotat.at; | |
120 | ok provos, deraadt | |
8a48a7ef | 121 | |
13979d47 | 122 | 20020730 |
123 | - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de | |
124 | ||
d228d9dd | 125 | 20020728 |
126 | - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar | |
16c4a972 | 127 | - (stevesk) [CREDITS] solar |
75131bbd | 128 | - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned |
129 | char arg. | |
d228d9dd | 130 | |
d40af5fa | 131 | 20020725 |
132 | - (djm) Remove some cruft from INSTALL | |
d91b4743 | 133 | - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/ |
d40af5fa | 134 | |
56b54901 | 135 | 20020723 |
136 | - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger. | |
918ffb0b | 137 | - (bal) sync ID w/ ssh-agent.c |
516f0d7d | 138 | - (bal) OpenBSD Sync |
139 | - markus@cvs.openbsd.org 2002/07/19 15:43:33 | |
140 | [log.c log.h session.c sshd.c] | |
141 | remove fatal cleanups after fork; based on discussions with and code | |
142 | from solar. | |
5d185586 | 143 | - stevesk@cvs.openbsd.org 2002/07/19 17:42:40 |
144 | [ssh.c] | |
145 | display a warning from ssh when XAuthLocation does not exist or xauth | |
146 | returned no authentication data. ok markus@ | |
30998af1 | 147 | - stevesk@cvs.openbsd.org 2002/07/21 18:32:20 |
148 | [auth-options.c] | |
149 | unneeded includes | |
dbc728ff | 150 | - stevesk@cvs.openbsd.org 2002/07/21 18:34:43 |
151 | [auth-options.h] | |
152 | remove invalid comment | |
97686bf9 | 153 | - markus@cvs.openbsd.org 2002/07/22 11:03:06 |
154 | [session.c] | |
155 | fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors; | |
d341742a | 156 | - stevesk@cvs.openbsd.org 2002/07/22 17:32:56 |
157 | [monitor.c] | |
158 | u_int here; ok provos@ | |
67f04db1 | 159 | - stevesk@cvs.openbsd.org 2002/07/23 16:03:10 |
160 | [sshd.c] | |
161 | utmp_len is unsigned; display error consistent with other options. | |
162 | ok markus@ | |
0df3a240 | 163 | - stevesk@cvs.openbsd.org 2002/07/15 17:15:31 |
164 | [uidswap.c] | |
165 | little more debugging; ok markus@ | |
d341742a | 166 | |
21c2c5cd | 167 | 20020722 |
168 | - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk | |
a93bd14c | 169 | - (stevesk) [xmmap.c] missing prototype for fatal() |
ccbb983c | 170 | - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync |
171 | with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com. | |
d262b7f2 | 172 | - (bal) [configure.ac] Missing ;; from cray patch. |
30eab01d | 173 | - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines |
174 | into it's own header. | |
ee48c949 | 175 | - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be |
176 | freed by the caller; add free_pam_environment() and use it. | |
1d3f4ae7 | 177 | - (stevesk) [auth-pam.c] typo in comment |
21c2c5cd | 178 | |
b992432e | 179 | 20020721 |
180 | - (stevesk) [auth-pam.c] merge cosmetic changes from solar's | |
181 | openssh-3.4p1-owl-password-changing.diff | |
277f55cf | 182 | - (stevesk) [auth-pam.c] merge rest of solar's PAM patch; |
183 | PAM_NEW_AUTHTOK_REQD remains in #if 0 for now. | |
f7808a93 | 184 | - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch |
185 | warning on pam_conv struct conversation function. | |
337dde6b | 186 | - (stevesk) [auth-pam.h] license |
8565f28e | 187 | - (stevesk) [auth-pam.h] unneeded include |
e9b2c23d | 188 | - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h |
b992432e | 189 | |
ce88d9df | 190 | 20020720 |
191 | - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng(). | |
192 | ||
4379c0e5 | 193 | 20020719 |
194 | - (tim) [contrib/solaris/buildpkg.sh] create privsep user/group if needed. | |
195 | Patch by dtucker@zip.com.au | |
f75ca46d | 196 | - (tim) [configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au |
4379c0e5 | 197 | |
45491100 | 198 | 20020718 |
199 | - (tim) [defines.h] Bug 313 patch by dirk.meyer@dinoex.sub.org | |
200 | - (tim) [monitor_mm.c] add missing declaration for xmmap(). Reported | |
201 | by ayamura@ayamura.org | |
1cbbe6c8 | 202 | - (tim) [configure.ac] Bug 267 rework int64_t test. |
5749e709 | 203 | - (tim) [includes.h] Bug 267 add stdint.h |
45491100 | 204 | |
dd3943d0 | 205 | 20020717 |
206 | - (bal) aixbff package updated by dtucker@zip.com.au | |
2bf42e4a | 207 | - (tim) [configure.ac] change how we do paths in AC_PATH_PROGS tests |
208 | for autoconf 2.53. Based on a patch by jrj@purdue.edu | |
dd3943d0 | 209 | |
8fc47887 | 210 | 20020716 |
211 | - (tim) [contrib/solaris/opensshd.in] Only kill sshd if .pid file found | |
212 | ||
c750d869 | 213 | 20020715 |
214 | - (bal) OpenBSD CVS Sync | |
215 | - itojun@cvs.openbsd.org 2002/07/12 13:29:09 | |
216 | [sshconnect.c] | |
217 | print connect failure during debugging mode. | |
a2f883ce | 218 | - markus@cvs.openbsd.org 2002/07/12 15:50:17 |
219 | [cipher.c] | |
220 | EVP_CIPH_CUSTOM_IV for our own rijndael | |
2d199535 | 221 | - (bal) Remove unused tty defined in do_setusercontext() pointed out by |
222 | dtucker@zip.com.au plus a a more KNF since I am near it. | |
846be3f4 | 223 | - (bal) Privsep user creation support in Solaris buildpkg.sh by |
224 | dtucker@zip.com.au | |
c750d869 | 225 | |
798c5808 | 226 | 20020714 |
227 | - (tim) [Makefile.in] replace "id sshd" with "sshd -t" | |
4165b82e | 228 | - (bal/tim) [acconfig.h configure.ac monitor_mm.c servconf.c |
229 | openbsd-compat/Makefile.in] support compression on platforms that | |
230 | have no/broken MAP_ANON. Moved code to openbsd-compat/xmmap.c | |
231 | Based on patch from nalin@redhat.com of code extracted from Owl's package | |
5fd8087a | 232 | - (tim) [ssh_prng_cmds.in] Bug 323 arp -n flag doesn't exist under Solaris. |
233 | report by chris@by-design.net | |
fdebdd4f | 234 | - (tim) [loginrec.c] Bug 347: Fix typo (WTMPX_FILE) report by rodney@bond.net |
d80063fe | 235 | - (tim) [loginrec.c] Bug 348: add missing found = 1; to wtmpx_islogin() |
236 | report by rodney@bond.net | |
798c5808 | 237 | |
6b2a3595 | 238 | 20020712 |
239 | - (tim) [Makefile.in] quiet down install-files: and check-user: | |
3085601b | 240 | - (tim) [configure.ac] remove unused filepriv line |
6b2a3595 | 241 | |
249f9903 | 242 | 20020710 |
243 | - (tim) [contrib/cygwin/ssh-host-config] explicitely sets the permissions | |
244 | on /var/empty to 755 Patch by vinschen@redhat.com | |
6f901f8e | 245 | - (bal) OpenBSD CVS Sync |
246 | - itojun@cvs.openbsd.org 2002/07/09 11:56:50 | |
247 | [sshconnect.c] | |
248 | silently try next address on connect(2). markus ok | |
59c825e1 | 249 | - itojun@cvs.openbsd.org 2002/07/09 11:56:27 |
250 | [canohost.c] | |
251 | suppress log on reverse lookup failiure, as there's no real value in | |
252 | doing so. | |
253 | markus ok | |
aab5431b | 254 | - itojun@cvs.openbsd.org 2002/07/09 12:04:02 |
255 | [sshconnect.c] | |
256 | ed static function (less warnings) | |
94ad46d1 | 257 | - stevesk@cvs.openbsd.org 2002/07/09 17:46:25 |
258 | [sshd_config.5] | |
259 | clarify no preference ordering in protocol list; ok markus@ | |
9bd68577 | 260 | - itojun@cvs.openbsd.org 2002/07/10 10:28:15 |
261 | [sshconnect.c] | |
262 | bark if all connection attempt fails. | |
09683edf | 263 | - deraadt@cvs.openbsd.org 2002/07/10 17:53:54 |
264 | [rijndael.c] | |
265 | use right sizeof in memcpy; markus ok | |
249f9903 | 266 | |
e6f15ed1 | 267 | 20020709 |
268 | - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platforms | |
269 | lacking that concept can share it. Patch by vinschen@redhat.com | |
270 | ||
4f9d6706 | 271 | 20020708 |
272 | - (tim) [openssh/contrib/solaris/buildpkg.sh] add PKG_INSTALL_ROOT to | |
273 | work in a jumpstart environment. patch by kbrint@rufus.net | |
b451e27b | 274 | - (tim) [Makefile.in] workaround for broken pakadd on some systems. |
cda1ebcb | 275 | - (tim) [configure.ac] fix libc89 utimes test. Mention default path for |
276 | --with-privsep-path= | |
4f9d6706 | 277 | |
ac74561e | 278 | 20020707 |
279 | - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH) | |
94d8258b | 280 | - (tim) [acconfig.h configure.ac sshd.c] |
281 | s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/ | |
d41f8eed | 282 | - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes |
283 | patch from vinschen@redhat.com | |
0b832146 | 284 | - (bal) [realpath.c] Updated with OpenBSD tree. |
da2499f5 | 285 | - (bal) OpenBSD CVS Sync |
286 | - deraadt@cvs.openbsd.org 2002/07/04 04:15:33 | |
287 | [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c] | |
288 | patch memory leaks; grendel@zeitbombe.org | |
e1feb9bf | 289 | - deraadt@cvs.openbsd.org 2002/07/04 08:12:15 |
290 | [channels.c packet.c] | |
291 | blah blah minor nothing as i read and re-read and re-read... | |
eb9f2fab | 292 | - markus@cvs.openbsd.org 2002/07/04 10:41:47 |
293 | [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c] | |
294 | don't allocate, copy, and discard if there is not interested in the data; | |
295 | ok deraadt@ | |
4394a17f | 296 | - deraadt@cvs.openbsd.org 2002/07/06 01:00:49 |
297 | [log.c] | |
298 | KNF | |
50d2fbbc | 299 | - deraadt@cvs.openbsd.org 2002/07/06 01:01:26 |
300 | [ssh-keyscan.c] | |
301 | KNF, realloc fix, and clean usage | |
12a3f2c3 | 302 | - stevesk@cvs.openbsd.org 2002/07/06 17:47:58 |
303 | [ssh-keyscan.c] | |
304 | unused variable | |
41545cb6 | 305 | - (bal) Minor KNF on ssh-keyscan.c |
ac74561e | 306 | |
0764e748 | 307 | 20020705 |
308 | - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs. | |
309 | Reported by Darren Tucker <dtucker@zip.com.au> | |
e12659f4 | 310 | - (tim) [contrib/cygwin/ssh-host-config] double slash corrction |
311 | from vinschen@redhat.com | |
0764e748 | 312 | |
64c0ce80 | 313 | 20020704 |
314 | - (bal) Limit data to TTY for AIX only (Newer versions can't handle the | |
315 | faster data rate) Bug #124 | |
375c1dee | 316 | - (bal) glob.c defines TILDE and AIX also defines it. #undef it first. |
317 | bug #265 | |
ff2de800 | 318 | - (bal) One too many nulls in ports-aix.c |
64c0ce80 | 319 | |
d2f95449 | 320 | 20020703 |
321 | - (bal) Updated contrib/cygwin/ patch by vinschen@redhat.com | |
619a6aff | 322 | - (bal) minor correction to utimes() replacement. Patch by |
323 | onoe@sm.sony.co.jp | |
f11fe301 | 324 | - OpenBSD CVS Sync |
325 | - markus@cvs.openbsd.org 2002/06/27 08:49:44 | |
326 | [dh.c ssh-keyscan.c sshconnect.c] | |
327 | more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@ | |
181d6635 | 328 | - deraadt@cvs.openbsd.org 2002/06/27 09:08:00 |
329 | [monitor.c] | |
330 | improve mm_zalloc check; markus ok | |
30e37ee6 | 331 | - deraadt@cvs.openbsd.org 2002/06/27 10:35:47 |
332 | [auth2-none.c monitor.c sftp-client.c] | |
333 | use xfree() | |
c8f94200 | 334 | - stevesk@cvs.openbsd.org 2002/06/27 19:49:08 |
335 | [ssh-keyscan.c] | |
336 | use convtime(); ok markus@ | |
a64d3560 | 337 | - millert@cvs.openbsd.org 2002/06/28 01:49:31 |
338 | [monitor_mm.c] | |
339 | tree(3) wants an int return value for its compare functions and | |
340 | the difference between two pointers is not an int. Just do the | |
341 | safest thing and store the result in a long and then return 0, | |
342 | -1, or 1 based on that result. | |
405a0d43 | 343 | - deraadt@cvs.openbsd.org 2002/06/28 01:50:37 |
344 | [monitor_wrap.c] | |
345 | use ssize_t | |
4efd85b2 | 346 | - deraadt@cvs.openbsd.org 2002/06/28 10:08:25 |
347 | [sshd.c] | |
348 | range check -u option at invocation | |
6ded293b | 349 | - deraadt@cvs.openbsd.org 2002/06/28 23:05:06 |
350 | [sshd.c] | |
351 | gidset[2] -> gidset[1]; markus ok | |
7fdc56c5 | 352 | - deraadt@cvs.openbsd.org 2002/06/30 21:54:16 |
353 | [auth2.c session.c sshd.c] | |
354 | lint asks that we use names that do not overlap | |
343288b8 | 355 | - deraadt@cvs.openbsd.org 2002/06/30 21:59:45 |
356 | [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c | |
357 | monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c | |
358 | sshconnect2.c sshd.c] | |
359 | minor KNF | |
7d60d74c | 360 | - deraadt@cvs.openbsd.org 2002/07/01 16:15:25 |
361 | [msg.c] | |
362 | %u | |
713f6cd9 | 363 | - markus@cvs.openbsd.org 2002/07/01 19:48:46 |
364 | [sshconnect2.c] | |
365 | for compression=yes, we fallback to no-compression if the server does | |
366 | not support compression, vice versa for compression=no. ok mouring@ | |
261189cc | 367 | - markus@cvs.openbsd.org 2002/07/03 09:55:38 |
368 | [ssh-keysign.c] | |
369 | use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld) | |
370 | in order to avoid a possible Kocher timing attack pointed out by Charles | |
371 | Hannum; ok provos@ | |
60cd0a97 | 372 | - markus@cvs.openbsd.org 2002/07/03 14:21:05 |
373 | [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config] | |
374 | re-enable ssh-keysign's sbit, but make ssh-keysign read | |
375 | /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled | |
376 | globally. based on discussions with deraadt, itojun and sommerfeld; | |
377 | ok itojun@ | |
56fd97d7 | 378 | - (bal) Failed password attempts don't increment counter on AIX. Bug #145 |
e8aa0a5c | 379 | - (bal) Missed Makefile.in change. keysign needs readconf.o |
0ba40daa | 380 | - (bal) Clean up aix_usrinfo(). Ignore TTY= period I guess. |
56fd97d7 | 381 | |
b2f295dc | 382 | 20020702 |
383 | - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc & | |
384 | friends consistently. Spotted by Solar Designer <solar@openwall.com> | |
385 | ||
3c3e878a | 386 | 20020629 |
387 | - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style | |
388 | clean up while I'm near it. | |
389 | ||
811ee370 | 390 | 20020628 |
391 | - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented | |
392 | options should contain default value. from solar. | |
b9b82dab | 393 | - (bal) Cygwin uid0 fix by vinschen@redhat.com |
17962c40 | 394 | - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c. Otherwise wise |
395 | have issues of our fixes not propogating right (ie bcopy instead of | |
396 | memmove). OK tim | |
4fa4fb00 | 397 | - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported. |
398 | Bug #303 | |
811ee370 | 399 | |
ce88d9df | 400 | 20020627 |
d1ff09ba | 401 | - OpenBSD CVS Sync |
402 | - deraadt@cvs.openbsd.org 2002/06/26 14:49:36 | |
403 | [monitor.c] | |
404 | correct %u | |
63b5f1a1 | 405 | - deraadt@cvs.openbsd.org 2002/06/26 14:50:04 |
406 | [monitor_fdpass.c] | |
407 | use ssize_t for recvmsg() and sendmsg() return | |
1431a900 | 408 | - markus@cvs.openbsd.org 2002/06/26 14:51:33 |
409 | [ssh-add.c] | |
410 | fix exit code for -X/-x | |
bb0640b2 | 411 | - deraadt@cvs.openbsd.org 2002/06/26 15:00:32 |
412 | [monitor_wrap.c] | |
413 | more %u | |
20e79e98 | 414 | - markus@cvs.openbsd.org 2002/06/26 22:27:32 |
415 | [ssh-keysign.c] | |
416 | bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu | |
d1ff09ba | 417 | |
4bfa8bb6 | 418 | 20020626 |
419 | - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM | |
a594fa74 | 420 | - (bal) OpenBSD CVS Sync |
421 | - markus@cvs.openbsd.org 2002/06/23 21:34:07 | |
422 | [channels.c] | |
423 | tcode is u_int | |
38501509 | 424 | - markus@cvs.openbsd.org 2002/06/24 13:12:23 |
425 | [ssh-agent.1] | |
426 | the socket name contains ssh-agent's ppid; via mpech@ from form@ | |
f91d9a89 | 427 | - markus@cvs.openbsd.org 2002/06/24 14:33:27 |
428 | [channels.c channels.h clientloop.c serverloop.c] | |
429 | move channel counter to u_int | |
1169c3df | 430 | - markus@cvs.openbsd.org 2002/06/24 14:55:38 |
431 | [authfile.c kex.c ssh-agent.c] | |
432 | cat to (void) when output from buffer_get_X is ignored | |
09915dc1 | 433 | - itojun@cvs.openbsd.org 2002/06/24 15:49:22 |
434 | [msg.c] | |
435 | printf type pedant | |
d0a1c5d1 | 436 | - deraadt@cvs.openbsd.org 2002/06/24 17:57:20 |
437 | [sftp-server.c sshpty.c] | |
438 | explicit (u_int) for uid and gid | |
6c69a6a9 | 439 | - markus@cvs.openbsd.org 2002/06/25 16:22:42 |
440 | [authfd.c] | |
441 | unnecessary cast | |
87809a1f | 442 | - markus@cvs.openbsd.org 2002/06/25 18:51:04 |
443 | [sshd.c] | |
444 | lightweight do_setusercontext after chroot() | |
924681ee | 445 | - (bal) Updated AIX package build. Patch by dtucker@zip.com.au |
46c8ebb3 | 446 | - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8 |
78beb77d | 447 | - (bal) added back in error check for mmap(). I screwed up, Pointed |
448 | out by stevesk@ | |
f2d9a1f8 | 449 | - (tim) [README.privsep] UnixWare tip no longer needed. |
88cb875c | 450 | - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP, |
451 | but it all damned lies. | |
0d0270e6 | 452 | - (stevesk) [README.privsep] more for sshd pseudo-account. |
8029e7fc | 453 | - (tim) [contrib/caldera/openssh.spec] add support for privsep |
8695f9f7 | 454 | - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@ |
b29fe4ea | 455 | - (djm) OpenBSD CVS Sync |
456 | - markus@cvs.openbsd.org 2002/06/26 08:53:12 | |
457 | [bufaux.c] | |
458 | limit size of BNs to 8KB; ok provos/deraadt | |
22d62d31 | 459 | - markus@cvs.openbsd.org 2002/06/26 08:54:18 |
460 | [buffer.c] | |
461 | limit append to 1MB and buffers to 10MB | |
5df8c731 | 462 | - markus@cvs.openbsd.org 2002/06/26 08:55:02 |
463 | [channels.c] | |
464 | limit # of channels to 10000 | |
87f18810 | 465 | - markus@cvs.openbsd.org 2002/06/26 08:58:26 |
466 | [session.c] | |
467 | limit # of env vars to 1000; ok deraadt/djm | |
2f095a0e | 468 | - deraadt@cvs.openbsd.org 2002/06/26 13:20:57 |
469 | [monitor.c] | |
470 | be careful in mm_zalloc | |
66087567 | 471 | - deraadt@cvs.openbsd.org 2002/06/26 13:49:26 |
472 | [session.c] | |
473 | disclose less information from environment files; based on input | |
474 | from djm, and dschultz@uclink.Berkeley.EDU | |
477edc5d | 475 | - markus@cvs.openbsd.org 2002/06/26 13:55:37 |
476 | [auth2-chall.c] | |
477 | make sure # of response matches # of queries, fixes int overflow; | |
478 | from ISS | |
03b14b6f | 479 | - markus@cvs.openbsd.org 2002/06/26 13:56:27 |
480 | [version.h] | |
481 | 3.4 | |
9c696d0d | 482 | - (djm) Require krb5 devel for RPM build w/ KrbV |
c4186be7 | 483 | - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai |
484 | <nalin@redhat.com> | |
1e7bc74c | 485 | - (djm) Update spec files for release |
49b53b03 | 486 | - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS |
03b14b6f | 487 | - (djm) Release 3.4p1 |
6519cfd6 | 488 | - (tim) [contrib/caldera/openssh.spec] remove 2 configure options I put in |
489 | by mistake | |
4bfa8bb6 | 490 | |
ef1ac12b | 491 | 20020625 |
492 | - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh | |
1a44c6f7 | 493 | - (stevesk) [README.privsep] minor updates |
fd3cbf67 | 494 | - (djm) Create privsep directory and warn if privsep user is missing |
495 | during make install | |
702b2855 | 496 | - (bal) Started list of PrivSep issues in TODO |
1c6249af | 497 | - (bal) if mmap() is substandard, don't allow compression on server side. |
498 | Post 'event' we will add more options. | |
cbaa3d44 | 499 | - (tim) [contrib/caldera/openssh.spec] Sync with Caldera |
e2bc41f9 | 500 | - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by |
501 | dtucker@zip.com.au | |
d170feb1 | 502 | - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus |
503 | for Cygwin, Cray, & SCO | |
ef1ac12b | 504 | |
d5803314 | 505 | 20020624 |
506 | - OpenBSD CVS Sync | |
507 | - deraadt@cvs.openbsd.org 2002/06/23 03:25:50 | |
508 | [tildexpand.c] | |
509 | KNF | |
3ddc795d | 510 | - deraadt@cvs.openbsd.org 2002/06/23 03:26:19 |
511 | [cipher.c key.c] | |
512 | KNF | |
d6133f43 | 513 | - deraadt@cvs.openbsd.org 2002/06/23 03:30:58 |
514 | [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c | |
515 | sshpty.c] | |
516 | various KNF and %d for unsigned | |
9906a836 | 517 | - deraadt@cvs.openbsd.org 2002/06/23 09:30:14 |
518 | [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c | |
519 | sftp.c] | |
520 | bunch of u_int vs int stuff | |
512df038 | 521 | - deraadt@cvs.openbsd.org 2002/06/23 09:39:55 |
522 | [ssh-keygen.c] | |
523 | u_int stuff | |
7528d467 | 524 | - deraadt@cvs.openbsd.org 2002/06/23 09:46:51 |
525 | [bufaux.c servconf.c] | |
526 | minor KNF. things the fingers do while you read | |
e424e241 | 527 | - deraadt@cvs.openbsd.org 2002/06/23 10:29:52 |
528 | [ssh-agent.c sshd.c] | |
529 | some minor KNF and %u | |
7138ebd9 | 530 | - deraadt@cvs.openbsd.org 2002/06/23 20:39:45 |
531 | [session.c] | |
532 | compression_level is u_int | |
f09ce20a | 533 | - deraadt@cvs.openbsd.org 2002/06/23 21:06:13 |
534 | [sshpty.c] | |
535 | KNF | |
57f228e8 | 536 | - deraadt@cvs.openbsd.org 2002/06/23 21:06:41 |
537 | [channels.c channels.h session.c session.h] | |
538 | display, screen, row, col, xpixel, ypixel are u_int; markus ok | |
0bc50167 | 539 | - deraadt@cvs.openbsd.org 2002/06/23 21:10:02 |
540 | [packet.c] | |
541 | packet_get_int() returns unsigned for reason & seqnr | |
57f228e8 | 542 | - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col, |
543 | xpixel are u_int. | |
544 | ||
d5803314 | 545 | |
58177c0a | 546 | 20020623 |
547 | - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX. | |
dc43acd2 | 548 | - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset. |
ef3912be | 549 | - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au |
a8bbdc75 | 550 | - OpenBSD CVS Sync |
551 | - stevesk@cvs.openbsd.org 2002/06/22 02:00:29 | |
552 | [ssh.h] | |
553 | correct comment | |
1ae02182 | 554 | - stevesk@cvs.openbsd.org 2002/06/22 02:40:23 |
555 | [ssh.1] | |
556 | section 5 not 4 for ssh_config | |
b2843ec6 | 557 | - naddy@cvs.openbsd.org 2002/06/22 11:51:39 |
558 | [ssh.1] | |
559 | typo | |
75653d3e | 560 | - stevesk@cvs.openbsd.org 2002/06/22 16:32:54 |
561 | [sshd.8] | |
562 | add /var/empty in FILES section | |
a56313d7 | 563 | - stevesk@cvs.openbsd.org 2002/06/22 16:40:19 |
564 | [sshd.c] | |
565 | check /var/empty owner mode; ok provos@ | |
e4e83d70 | 566 | - stevesk@cvs.openbsd.org 2002/06/22 16:41:57 |
567 | [scp.1] | |
568 | typo | |
baa08b92 | 569 | - stevesk@cvs.openbsd.org 2002/06/22 16:45:29 |
570 | [ssh-agent.1 sshd.8 sshd_config.5] | |
571 | use process ID vs. pid/PID/process identifier | |
c28876e9 | 572 | - stevesk@cvs.openbsd.org 2002/06/22 20:05:27 |
573 | [sshd.c] | |
574 | don't call setsid() if debugging or run from inetd; no "Operation not | |
575 | permitted" errors now; ok millert@ markus@ | |
d17ef027 | 576 | - stevesk@cvs.openbsd.org 2002/06/22 23:09:51 |
577 | [monitor.c] | |
578 | save auth method before monitor_reset_key_state(); bugzilla bug #284; | |
579 | ok provos@ | |
58177c0a | 580 | |
ca449fd9 | 581 | 20020622 |
582 | - (djm) Update README.privsep; spotted by fries@ | |
d5041f45 | 583 | - (djm) Release 3.3p1 |
d76aa6fb | 584 | - (bal) getopt now can be staticly compiled on those platforms missing |
585 | optreset. Patch by binder@arago.de | |
ca449fd9 | 586 | |
0496cf34 | 587 | 20020621 |
588 | - (djm) Sync: | |
589 | - djm@cvs.openbsd.org 2002/06/21 05:50:51 | |
590 | [monitor.c] | |
591 | Don't initialise compression buffers when compression=no in sshd_config; | |
592 | ok Niels@ | |
897ef106 | 593 | - ID sync for auth-passwd.c |
e299a298 | 594 | - (djm) Warn and disable compression on platforms which can't handle both |
595 | useprivilegeseparation=yes and compression=yes | |
9f182968 | 596 | - (djm) contrib/redhat/openssh.spec hacking: |
597 | - Merge in spec changes from seba@iq.pl (Sebastian Pachuta) | |
598 | - Add new {ssh,sshd}_config.5 manpages | |
599 | - Add new ssh-keysign program and remove setuid from ssh client | |
0496cf34 | 600 | |
b264bd39 | 601 | 20020620 |
8bbfc882 | 602 | - (bal) Fixed AIX environment handling, use setpcred() instead of existing |
603 | code. (Bugzilla Bug 261) | |
b264bd39 | 604 | - (bal) OpenBSD CVS Sync |
605 | - todd@cvs.openbsd.org 2002/06/14 21:35:00 | |
606 | [monitor_wrap.c] | |
607 | spelling; from Brian Poole <raj@cerias.purdue.edu> | |
37500e74 | 608 | - markus@cvs.openbsd.org 2002/06/15 00:01:36 |
609 | [authfd.c authfd.h ssh-add.c ssh-agent.c] | |
610 | break agent key lifetime protocol and allow other contraints for key | |
611 | usage. | |
405e0c5e | 612 | - markus@cvs.openbsd.org 2002/06/15 00:07:38 |
613 | [authfd.c authfd.h ssh-add.c ssh-agent.c] | |
614 | fix stupid typo | |
3015d321 | 615 | - markus@cvs.openbsd.org 2002/06/15 01:27:48 |
ee900f87 | 616 | [authfd.c authfd.h ssh-add.c ssh-agent.c] |
617 | remove the CONSTRAIN_IDENTITY messages and introduce a new | |
618 | ADD_ID message with contraints instead. contraints can be | |
619 | only added together with the private key. | |
48ba8dc8 | 620 | - itojun@cvs.openbsd.org 2002/06/16 21:30:58 |
621 | [ssh-keyscan.c] | |
622 | use TAILQ_xx macro. from lukem@netbsd. markus ok | |
3015d321 | 623 | - deraadt@cvs.openbsd.org 2002/06/17 06:05:56 |
624 | [scp.c] | |
625 | make usage like man page | |
7203d6bb | 626 | - deraadt@cvs.openbsd.org 2002/06/19 00:27:55 |
627 | [auth-bsdauth.c auth-skey.c auth1.c auth2-chall.c auth2-none.c authfd.c | |
628 | authfd.h monitor_wrap.c msg.c nchan.c radix.c readconf.c scp.c sftp.1 | |
629 | ssh-add.1 ssh-add.c ssh-agent.1 ssh-agent.c ssh-keygen.1 ssh-keygen.c | |
630 | ssh-keysign.c ssh.1 sshconnect.c sshconnect.h sshconnect2.c ttymodes.c | |
631 | xmalloc.h] | |
632 | KNF done automatically while reading.... | |
9459414c | 633 | - markus@cvs.openbsd.org 2002/06/19 18:01:00 |
634 | [cipher.c monitor.c monitor_wrap.c packet.c packet.h] | |
635 | make the monitor sync the transfer ssh1 session key; | |
636 | transfer keycontext only for RC4 (this is still depends on EVP | |
637 | implementation details and is broken). | |
588df31a | 638 | - stevesk@cvs.openbsd.org 2002/06/20 19:56:07 |
639 | [ssh.1 sshd.8] | |
640 | move configuration file options from ssh.1/sshd.8 to | |
641 | ssh_config.5/sshd_config.5; ok deraadt@ millert@ | |
add52dd0 | 642 | - stevesk@cvs.openbsd.org 2002/06/20 20:00:05 |
643 | [scp.1 sftp.1] | |
644 | ssh_config(5) | |
54e5539d | 645 | - stevesk@cvs.openbsd.org 2002/06/20 20:03:34 |
646 | [ssh_config sshd_config] | |
647 | refer to config file man page | |
636f76ca | 648 | - markus@cvs.openbsd.org 2002/06/20 23:05:56 |
649 | [servconf.c servconf.h session.c sshd.c] | |
650 | allow Compression=yes/no in sshd_config | |
6f26d43d | 651 | - markus@cvs.openbsd.org 2002/06/20 23:37:12 |
652 | [sshd_config] | |
653 | add Compression | |
2fee5e28 | 654 | - stevesk@cvs.openbsd.org 2002/05/25 20:40:08 |
655 | [LICENCE] | |
656 | missed Per Allansson (auth2-chall.c) | |
fa7a0d52 | 657 | - (bal) Cygwin special handling of empty passwords wrong. Patch by |
658 | vinschen@redhat.com | |
668e6050 | 659 | - (bal) Missed integrating ssh_config.5 and sshd_config.5 |
73bc9b18 | 660 | - (bal) Still more Makefile.in updates for ssh{d}_config.5 |
b264bd39 | 661 | |
f2d02e44 | 662 | 20020613 |
663 | - (bal) typo of setgroup for cygwin. Patch by vinschen@redhat.com | |
664 | ||
b34bec32 | 665 | 20020612 |
666 | - (bal) OpenBSD CVS Sync | |
667 | - markus@cvs.openbsd.org 2002/06/11 23:03:54 | |
668 | [ssh.c] | |
669 | remove unused cruft. | |
de60473e | 670 | - markus@cvs.openbsd.org 2002/06/12 01:09:52 |
671 | [ssh.c] | |
672 | ssh_connect returns 0 on success | |
246446cd | 673 | - (bal) Build noop setgroups() for cygwin to clean up code (For other |
674 | platforms without the setgroups() requirement, you MUST define | |
675 | SETGROUPS_NOOP in the configure.ac) Based on patch by vinschen@redhat.com | |
75136d8b | 676 | - (bal) Some platforms don't have ONLCR (Notable Mint) |
b34bec32 | 677 | |
74a6c7bd | 678 | 20020611 |
679 | - (bal) ssh-agent.c RCSD fix (|unexpand already done) | |
d83cbdc3 | 680 | - (bal) OpenBSD CVS Sync |
681 | - stevesk@cvs.openbsd.org 2002/06/09 22:15:15 | |
682 | [ssh.1] | |
683 | update for no setuid root and ssh-keysign; ok deraadt@ | |
01ca0dfe | 684 | - itojun@cvs.openbsd.org 2002/06/09 22:17:21 |
685 | [sshconnect.c] | |
686 | pass salen to sockaddr_ntop so that we are happy on linux/solaris | |
b7ced7d1 | 687 | - stevesk@cvs.openbsd.org 2002/06/10 16:53:06 |
688 | [auth-rsa.c ssh-rsa.c] | |
689 | display minimum RSA modulus in error(); ok markus@ | |
9cf07a6e | 690 | - stevesk@cvs.openbsd.org 2002/06/10 16:56:30 |
691 | [ssh-keysign.8] | |
692 | merge in stuff from my man page; ok markus@ | |
c3baacd1 | 693 | - stevesk@cvs.openbsd.org 2002/06/10 17:36:23 |
694 | [ssh-add.1 ssh-add.c] | |
695 | use convtime() to parse and validate key lifetime. can now | |
696 | use '-t 2h' etc. ok markus@ provos@ | |
4b3d23b4 | 697 | - stevesk@cvs.openbsd.org 2002/06/10 17:45:20 |
698 | [readconf.c ssh.1] | |
699 | change RhostsRSAAuthentication and RhostsAuthentication default to no | |
700 | since ssh is no longer setuid root by default; ok markus@ | |
ad2e1857 | 701 | - stevesk@cvs.openbsd.org 2002/06/10 21:21:10 |
702 | [ssh_config] | |
703 | update defaults for RhostsRSAAuthentication and RhostsAuthentication | |
704 | here too (all options commented out with default value). | |
149cdb60 | 705 | - markus@cvs.openbsd.org 2002/06/10 22:28:41 |
706 | [channels.c channels.h session.c] | |
707 | move creation of agent socket to session.c; no need for uidswapping | |
708 | in channel.c. | |
3fb156df | 709 | - markus@cvs.openbsd.org 2002/06/11 04:14:26 |
710 | [ssh.c sshconnect.c sshconnect.h] | |
711 | no longer use uidswap.[ch] from the ssh client | |
712 | run less code with euid==0 if ssh is installed setuid root | |
713 | just switch the euid, don't switch the complete set of groups | |
714 | (this is only needed by sshd). ok provos@ | |
c457707e | 715 | - mpech@cvs.openbsd.org 2002/06/11 05:46:20 |
716 | [auth-krb4.c monitor.h serverloop.c session.c ssh-agent.c sshd.c] | |
717 | pid_t cleanup. Markus need this now to keep hacking. | |
718 | markus@, millert@ ok | |
aa686c54 | 719 | - itojun@cvs.openbsd.org 2002/06/11 08:11:45 |
720 | [canohost.c] | |
721 | use "ntop" only after initialized | |
d514c907 | 722 | - (bal) Cygwin fix up from swap uid clean up in ssh.c patch by |
723 | vinschen@redhat.com | |
74a6c7bd | 724 | |
0073b70f | 725 | 20020609 |
726 | - (bal) OpenBSD CVS Sync | |
727 | - markus@cvs.openbsd.org 2002/06/08 05:07:56 | |
728 | [ssh.c] | |
729 | nuke ptrace comment | |
1f143cf2 | 730 | - markus@cvs.openbsd.org 2002/06/08 05:07:09 |
731 | [ssh-keysign.c] | |
732 | only accept 20 byte session ids | |
80fcb74e | 733 | - markus@cvs.openbsd.org 2002/06/08 05:17:01 |
734 | [readconf.c readconf.h ssh.1 ssh.c] | |
735 | deprecate FallBackToRsh and UseRsh; patch from djm@ | |
6c792785 | 736 | - markus@cvs.openbsd.org 2002/06/08 05:40:01 |
737 | [readconf.c] | |
738 | just warn about Deprecated options for now | |
c8e0103c | 739 | - markus@cvs.openbsd.org 2002/06/08 05:41:18 |
740 | [ssh_config] | |
741 | remove FallBackToRsh/UseRsh | |
61eb812e | 742 | - markus@cvs.openbsd.org 2002/06/08 12:36:53 |
743 | [scp.c] | |
744 | remove FallBackToRsh | |
4feae93d | 745 | - markus@cvs.openbsd.org 2002/06/08 12:46:14 |
746 | [readconf.c] | |
747 | silently ignore deprecated options, since FallBackToRsh might be passed | |
748 | by remote scp commands. | |
35ad6a0a | 749 | - itojun@cvs.openbsd.org 2002/06/08 21:15:27 |
750 | [sshconnect.c] | |
751 | always use getnameinfo. (diag message only) | |
b0ff7493 | 752 | - markus@cvs.openbsd.org 2002/06/09 04:33:27 |
753 | [sshconnect.c] | |
754 | abort() - > fatal() | |
e434ac29 | 755 | - (bal) RCSID tag updates on channels.c, clientloop.c, nchan.c, |
756 | sftp-client.c, ssh-agenet.c, ssh-keygen.c and connect.h (we did unexpand | |
757 | independant of them) | |
0073b70f | 758 | |
95d5ebf7 | 759 | 20020607 |
11a3dcde | 760 | - (bal) Removed --{enable/disable}-suid-ssh |
95d5ebf7 | 761 | - (bal) Missed __progname in ssh-keysign.c patch by dtucker@zip.com.au |
85cc9118 | 762 | - (bal) use 'LOGIN_PROGRAM' not '/usr/bin/login' in session.c patch by |
763 | Bertrand.Velle@apogee-com.fr | |
95d5ebf7 | 764 | |
2ee1b704 | 765 | 20020606 |
766 | - (bal) OpenBSD CVS Sync | |
767 | - markus@cvs.openbsd.org 2002/05/15 21:56:38 | |
768 | [servconf.c sshd.8 sshd_config] | |
769 | re-enable privsep and disable setuid for post-3.2.2 | |
7b5edc2b | 770 | - markus@cvs.openbsd.org 2002/05/16 22:02:50 |
771 | [cipher.c kex.h mac.c] | |
772 | fix warnings (openssl 0.9.7 requires const) | |
375e20e7 | 773 | - stevesk@cvs.openbsd.org 2002/05/16 22:09:59 |
774 | [session.c ssh.c] | |
775 | don't limit xauth pathlen on client side and longer print length on | |
776 | server when debug; ok markus@ | |
a4ae736b | 777 | - deraadt@cvs.openbsd.org 2002/05/19 20:54:52 |
778 | [log.h] | |
779 | extra commas in enum not 100% portable | |
c242fc96 | 780 | - deraadt@cvs.openbsd.org 2002/05/22 23:18:25 |
781 | [ssh.c sshd.c] | |
782 | spelling; abishoff@arc.nasa.gov | |
39c00dc2 | 783 | - markus@cvs.openbsd.org 2002/05/23 19:24:30 |
784 | [authfile.c authfile.h pathnames.h ssh.c sshconnect.c sshconnect.h | |
785 | sshconnect1.c sshconnect2.c ssh-keysign.8 ssh-keysign.c Makefile.in] | |
786 | add /usr/libexec/ssh-keysign: a setuid helper program for hostbased | |
787 | authentication in protocol v2 (needs to access the hostkeys). | |
78660ed4 | 788 | - markus@cvs.openbsd.org 2002/05/23 19:39:34 |
789 | [ssh.c] | |
790 | add comment about ssh-keysign | |
7091a26b | 791 | - markus@cvs.openbsd.org 2002/05/24 08:45:14 |
792 | [sshconnect2.c] | |
793 | stat ssh-keysign first, print error if stat fails; | |
794 | some debug->error; fix comment | |
a3f69458 | 795 | - markus@cvs.openbsd.org 2002/05/25 08:50:39 |
796 | [sshconnect2.c] | |
797 | execlp->execl; from stevesk | |
013eab17 | 798 | - markus@cvs.openbsd.org 2002/05/25 18:51:07 |
799 | [auth.h auth2.c auth2-hostbased.c auth2-kbdint.c auth2-none.c | |
800 | auth2-passwd.c auth2-pubkey.c Makefile.in] | |
801 | split auth2.c into one file per method; ok provos@/deraadt@ | |
bd4d0f49 | 802 | - stevesk@cvs.openbsd.org 2002/05/26 20:35:10 |
803 | [ssh.1] | |
804 | sort ChallengeResponseAuthentication; ok markus@ | |
c22d8cc0 | 805 | - stevesk@cvs.openbsd.org 2002/05/28 16:45:27 |
806 | [monitor_mm.c] | |
807 | print strerror(errno) on mmap/munmap error; ok markus@ | |
caa49784 | 808 | - stevesk@cvs.openbsd.org 2002/05/28 17:28:02 |
809 | [uidswap.c] | |
810 | format spec change/casts and some KNF; ok markus@ | |
fd7bc9fc | 811 | - stevesk@cvs.openbsd.org 2002/05/28 21:24:00 |
812 | [uidswap.c] | |
813 | use correct function name in fatal() | |
cb19b38a | 814 | - stevesk@cvs.openbsd.org 2002/05/29 03:06:30 |
815 | [ssh.1 sshd.8] | |
816 | spelling | |
3cc54fbb | 817 | - markus@cvs.openbsd.org 2002/05/29 11:21:57 |
818 | [sshd.c] | |
819 | don't start if privsep is enabled and SSH_PRIVSEP_USER or | |
820 | _PATH_PRIVSEP_CHROOT_DIR are missing; ok deraadt@ | |
135247df | 821 | - markus@cvs.openbsd.org 2002/05/30 08:07:31 |
822 | [cipher.c] | |
823 | use rijndael/aes from libcrypto (openssl >= 0.9.7) instead of | |
824 | our own implementation. allow use of AES hardware via libcrypto, | |
825 | ok deraadt@ | |
d4826734 | 826 | - markus@cvs.openbsd.org 2002/05/31 10:30:33 |
827 | [sshconnect2.c] | |
828 | extent ssh-keysign protocol: | |
829 | pass # of socket-fd to ssh-keysign, keysign verfies locally used | |
830 | ip-address using this socket-fd, restricts fake local hostnames | |
831 | to actual local hostnames; ok stevesk@ | |
01c24737 | 832 | - markus@cvs.openbsd.org 2002/05/31 11:35:15 |
833 | [auth.h auth2.c] | |
834 | move Authmethod definitons to per-method file. | |
3ed81c99 | 835 | - markus@cvs.openbsd.org 2002/05/31 13:16:48 |
836 | [key.c] | |
837 | add comment: | |
838 | key_verify returns 1 for a correct signature, 0 for an incorrect signature | |
839 | and -1 on error. | |
88f24e9d | 840 | - markus@cvs.openbsd.org 2002/05/31 13:20:50 |
841 | [ssh-rsa.c] | |
842 | pad received signature with leading zeros, because RSA_verify expects | |
843 | a signature of RSA_size. the drafts says the signature is transmitted | |
844 | unpadded (e.g. putty does not pad), reported by anakin@pobox.com | |
7f056bc5 | 845 | - deraadt@cvs.openbsd.org 2002/06/03 12:04:07 |
846 | [ssh.h] | |
847 | compatiblity -> compatibility | |
848 | decriptor -> descriptor | |
849 | authentciated -> authenticated | |
850 | transmition -> transmission | |
aa586f8e | 851 | - markus@cvs.openbsd.org 2002/06/04 19:42:35 |
852 | [monitor.c] | |
853 | only allow enabled authentication methods; ok provos@ | |
521d606b | 854 | - markus@cvs.openbsd.org 2002/06/04 19:53:40 |
855 | [monitor.c] | |
856 | save the session id (hash) for ssh2 (it will be passed with the | |
857 | initial sign request) and verify that this value is used during | |
858 | authentication; ok provos@ | |
91647fe6 | 859 | - markus@cvs.openbsd.org 2002/06/04 23:02:06 |
860 | [packet.c] | |
861 | remove __FUNCTION__ | |
1588c277 | 862 | - markus@cvs.openbsd.org 2002/06/04 23:05:49 |
863 | [cipher.c monitor.c monitor_fdpass.c monitor_mm.c monitor_wrap.c] | |
864 | __FUNCTION__ -> __func__ | |
3e7efb37 | 865 | - markus@cvs.openbsd.org 2002/06/05 16:08:07 |
866 | [ssh-agent.1 ssh-agent.c] | |
867 | '-a bind_address' binds the agent to user-specified unix-domain | |
868 | socket instead of /tmp/ssh-XXXXXXXX/agent.<pid>; ok djm@ (some time ago). | |
9aa28a7f | 869 | - markus@cvs.openbsd.org 2002/06/05 16:08:07 |
870 | [ssh-agent.1 ssh-agent.c] | |
871 | '-a bind_address' binds the agent to user-specified unix-domain | |
872 | socket instead of /tmp/ssh-XXXXXXXX/agent.<pid>; ok djm@ (some time ago). | |
b9dd5ca1 | 873 | - markus@cvs.openbsd.org 2002/06/05 16:48:54 |
874 | [ssh-agent.c] | |
875 | copy current request into an extra buffer and just flush this | |
876 | request on errors, ok provos@ | |
3db7f994 | 877 | - markus@cvs.openbsd.org 2002/06/05 19:57:12 |
878 | [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c] | |
879 | ssh-add -x for lock and -X for unlocking the agent. | |
880 | todo: encrypt private keys with locked... | |
73861c4e | 881 | - markus@cvs.openbsd.org 2002/06/05 20:56:39 |
882 | [ssh-add.c] | |
883 | add -x/-X to usage | |
264572cc | 884 | - markus@cvs.openbsd.org 2002/06/05 21:55:44 |
885 | [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c] | |
886 | ssh-add -t life, Set lifetime (in seconds) when adding identities; | |
887 | ok provos@ | |
c6f1f67c | 888 | - stevesk@cvs.openbsd.org 2002/06/06 01:09:41 |
889 | [monitor.h] | |
890 | no trailing comma in enum; china@thewrittenword.com | |
9b4ac641 | 891 | - markus@cvs.openbsd.org 2002/06/06 17:12:44 |
892 | [sftp-server.c] | |
893 | discard remaining bytes of current request; ok provos@ | |
802d93bb | 894 | - markus@cvs.openbsd.org 2002/06/06 17:30:11 |
895 | [sftp-server.c] | |
896 | use get_int() macro (hide iqueue) | |
8afe456d | 897 | - (bal) Missed msg.[ch] in merge. Required for ssh-keysign. |
5a30b173 | 898 | - (bal) Forgot to add msg.c Makefile.in. |
441b3f63 | 899 | - (bal) monitor_mm.c typos. |
e5c59e31 | 900 | - (bal) Refixed auth2.c. It was never fully commited while spliting out |
d4d77d64 | 901 | authentication to different files. |
04eb391d | 902 | - (bal) ssh-keysign should build and install correctly now. Phase two |
903 | would be to clean out any dead wood and disable ssh setuid on install. | |
d4d77d64 | 904 | - (bal) Reverse logic, use __func__ first since it's C99 |
95f20fe8 | 905 | |
688aaeda | 906 | 20020604 |
907 | - (stevesk) [channels.c] bug #164 patch from YOSHIFUJI Hideaki (changed | |
908 | setsockopt from debug to error for now). | |
909 | ||
637f9177 | 910 | 20020527 |
911 | - (tim) [configure.ac.orig monitor_fdpass.c] Enahnce msghdr tests to address | |
912 | build problem on Irix reported by Dave Love <d.love@dl.ac.uk>. Back out | |
913 | last monitor_fdpass.c changes that are no longer needed with new tests. | |
914 | Patch tested on Irix by Jan-Frode Myklebust <janfrode@parallab.uib.no> | |
915 | ||
a23a769d | 916 | 20020522 |
917 | - (djm) Fix spelling mistakes, spotted by Solar Designer i | |
918 | <solar@openwall.com> | |
2880ad5e | 919 | - Sync scard/ (not sure when it drifted) |
68604c75 | 920 | - (djm) OpenBSD CVS Sync: |
921 | [auth.c] | |
922 | Fix typo/thinko. Pass in as to auth_approval(), not NULL. | |
923 | Closes PR 2659. | |
924 | - Crank version | |
3ed9ebdb | 925 | - Crank RPM spec versions |
a23a769d | 926 | |
30321a9b | 927 | 20020521 |
928 | - (stevesk) [sshd.c] bug 245; disable setsid() for now | |
20ded834 | 929 | - (stevesk) [sshd.c] #ifndef HAVE_CYGWIN for setgroups() |
30321a9b | 930 | |
9a499a03 | 931 | 20020517 |
932 | - (tim) [configure.ac] remove extra MD5_MSG="no" line. | |
933 | ||
68a9cd3e | 934 | 20020515 |
935 | - (bal) CVS ID fix up on auth-passwd.c | |
e0740430 | 936 | - (bal) OpenBSD CVS Sync |
937 | - deraadt@cvs.openbsd.org 2002/05/07 19:54:36 | |
938 | [ssh.h] | |
939 | use ssh uid | |
897fecd3 | 940 | - deraadt@cvs.openbsd.org 2002/05/08 21:06:34 |
941 | [ssh.h] | |
942 | move to sshd.sshd instead | |
5de727d6 | 943 | - stevesk@cvs.openbsd.org 2002/05/11 20:24:48 |
944 | [ssh.h] | |
945 | typo in comment | |
69538b0c | 946 | - itojun@cvs.openbsd.org 2002/05/13 02:37:39 |
947 | [auth-skey.c auth2.c] | |
948 | less warnings. skey_{respond,query} are public (in auth.h) | |
01dafcb5 | 949 | - markus@cvs.openbsd.org 2002/05/13 20:44:58 |
950 | [auth-options.c auth.c auth.h] | |
951 | move the packet_send_debug handling from auth-options.c to auth.c; | |
952 | ok provos@ | |
4ac8556b | 953 | - millert@cvs.openbsd.org 2002/05/13 15:53:19 |
954 | [sshd.c] | |
955 | Call setsid() in the child after sshd accepts the connection and forks. | |
956 | This is needed for privsep which calls setlogin() when it changes uids. | |
957 | Without this, there is a race where the login name of an existing | |
958 | connection, as returned by getlogin(), may be changed to the privsep | |
959 | user (sshd). markus@ OK | |
b3ad3d88 | 960 | - markus@cvs.openbsd.org 2002/05/13 21:26:49 |
961 | [auth-rhosts.c] | |
962 | handle debug messages during rhosts-rsa and hostbased authentication; | |
963 | ok provos@ | |
b5a28cbc | 964 | - mouring@cvs.openbsd.org 2002/05/15 15:47:49 |
965 | [kex.c monitor.c monitor_wrap.c sshd.c] | |
966 | 'monitor' variable clashes with at least one lame platform (NeXT). i | |
967 | Renamed to 'pmonitor'. provos@ | |
1642b888 | 968 | - deraadt@cvs.openbsd.org 2002/05/04 02:39:35 |
969 | [servconf.c sshd.8 sshd_config] | |
970 | enable privsep by default; provos ok | |
7e276482 | 971 | - millert@cvs.openbsd.org 2002/05/06 23:34:33 |
972 | [ssh.1 sshd.8] | |
973 | Kill/adjust r(login|exec)d? references now that those are no longer in | |
974 | the tree. | |
6c172f95 | 975 | - markus@cvs.openbsd.org 2002/05/15 21:02:53 |
976 | [servconf.c sshd.8 sshd_config] | |
977 | disable privsep and enable setuid for the 3.2.2 release | |
b5a28cbc | 978 | - (bal) Fixed up PAM case. I think. |
0c83d9ea | 979 | - (bal) Clarified openbsd-compat/*-cray.* Licence provided by Wendy |
3a034dc5 | 980 | - (bal) OpenBSD CVS Sync |
981 | - markus@cvs.openbsd.org 2002/05/15 21:05:29 | |
982 | [version.h] | |
983 | enter OpenSSH_3.2.2 | |
984 | - (bal) Caldara, Suse, and Redhat openssh.specs updated. | |
68a9cd3e | 985 | |
545ba36e | 986 | 20020514 |
987 | - (stevesk) [README.privsep] PAM+privsep works with Solaris 8. | |
f65fbec1 | 988 | - (tim) [sshpty.c] set tty modes when allocating old style bsd ptys to |
989 | match what newer style ptys have when allocated. Based on a patch by | |
990 | Roger Cornelius <rac@tenzing.org> | |
47cdfcbe | 991 | - (tim) [README.privsep] UnixWare 7 and OpenUNIX 8 work. |
992 | - (tim) [README.privsep] remove reference to UnixWare 7 and OpenUNIX 8 | |
993 | from PAM-enabled pragraph. UnixWare has no PAM. | |
3c1a6277 | 994 | - (tim) [contrib/caldera/openssh.spec] update version. |
545ba36e | 995 | |
06617857 | 996 | 20020513 |
3d1beaf2 | 997 | - (stevesk) add initial README.privsep |
5222e7ef | 998 | - (stevesk) [configure.ac] nicer message: --with-privsep-user=user |
fdff2c55 | 999 | - (djm) Add --with-superuser-path=xxx configure option to specify |
1000 | what $PATH the superuser receives. | |
94a73cdc | 1001 | - (djm) Bug #231: UsePrivilegeSeparation turns off Banner. |
ecac8ee5 | 1002 | - (djm) Add --with-privsep-path configure option |
80e92e5d | 1003 | - (djm) Update RPM spec file: different superuser path, use |
1004 | /var/empty/sshd for privsep | |
75817f90 | 1005 | - (djm) Bug #234: missing readpassphrase declaration and defines |
fdff2c55 | 1006 | - (djm) Add INSTALL warning about SSH protocol 1 blowfish w/ |
1007 | OpenSSL < 0.9.6 | |
06617857 | 1008 | |
5b991353 | 1009 | 20020511 |
1010 | - (tim) [configure.ac] applied a rework of djm's OpenSSL search cleanup patch. | |
1011 | Now only searches system and /usr/local/ssl (OpenSSL's default install path) | |
1012 | Others must use --with-ssl-dir=.... | |
d73cbfe3 | 1013 | - (tim) [monitor_fdpass.c] fix for systems that have both |
fdff2c55 | 1014 | HAVE_ACCRIGHTS_IN_MSGHDR and HAVE_CONTROL_IN_MSGHDR. Ie. sys/socket.h |
1015 | has #define msg_accrights msg_control | |
5b991353 | 1016 | |
3ef3d901 | 1017 | 20020510 |
5b29f152 | 1018 | - (stevesk) [auth.c] Shadow account and expiration cleanup. Now |
1019 | check for root forced expire. Still don't check for inactive. | |
3ef3d901 | 1020 | - (djm) Rework RedHat RPM files. Based on spec from Nalin |
1021 | Dahyabhai <nalin@redhat.com> and patches from | |
1022 | Pekka Savola <pekkas@netcore.fi> | |
018a5ea3 | 1023 | - (djm) Try to drop supplemental groups at daemon startup. Patch from |
1024 | RedHat | |
f656b61e | 1025 | - (bal) Back all the way out of auth-passwd.c changes. Breaks too many |
1026 | things that don't set pw->pw_passwd. | |
3ef3d901 | 1027 | |
075682c1 | 1028 | 20020509 |
1029 | - (tim) [Makefile.in] Unbreak make -f Makefile.in distprep | |
fea8a8e8 | 1030 | |
075682c1 | 1031 | 20020508 |
af5ee4e4 | 1032 | - (tim) [openbsd-compat/bsd-arc4random.c] fix logic on when seed_rng() is |
1033 | called. Report by Chris Maxwell <maxwell@cs.dal.ca> | |
6193497b | 1034 | - (tim) [Makefile.in configure.ac] set SHELL variable in Makefile |
075682c1 | 1035 | - (djm) Disable PAM kbd-int auth if privsep is turned on (it doesn't work) |
af5ee4e4 | 1036 | |
f25cd32c | 1037 | 20020507 |
1038 | - (tim) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h] | |
1039 | Add truncate() emulation to address Bug 208 | |
1040 | ||
69406cab | 1041 | 20020506 |
1042 | - (djm) Unbreak auth-passwd.c for PAM and SIA | |
efe44db6 | 1043 | - (djm) Unbreak PAM auth for protocol 1. Report from Pekka Savola |
1044 | <pekkas@netcore.fi> | |
39ce53de | 1045 | - (djm) Don't reinitialise PAM credentials before we have started PAM. |
1046 | Report from Pekka Savola <pekkas@netcore.fi> | |
1047 | ||
d9891c59 | 1048 | 20020506 |
1049 | - (bal) Fixed auth-passwd.c to resolve PermitEmptyPassword issue | |
1050 | ||
836d58d7 | 1051 | 20020501 |
1052 | - (djm) Import OpenBSD regression tests. Requires BSD make to run | |
50903cc7 | 1053 | - (djm) Fix readpassphase compilation for systems which have it |
836d58d7 | 1054 | |
f0c180c3 | 1055 | 20020429 |
1056 | - (tim) [contrib/caldera/openssh.spec] update fixUP to reflect changes in | |
1057 | sshd_config. | |
1058 | - (tim) [contrib/cygwin/README] remove reference to regex. | |
1059 | patch from Corinna Vinschen <vinschen@redhat.com> | |
1060 | ||
db8dbb6a | 1061 | 20020426 |
1062 | - (djm) Bug #137, #209: fix make problems for scard/Ssh.bin, do uudecode | |
1063 | during distprep only | |
fdff2c55 | 1064 | - (djm) Disable PAM password expiry until a complete fix for bug #188 |
1065 | exists | |
782e2103 | 1066 | - (djm) Bug #180: Set ToS bits on IPv4-in-IPv6 mapped addresses. Based on |
1067 | patch from openssh@misc.tecq.org | |
db8dbb6a | 1068 | |
369e787a | 1069 | 20020425 |
1070 | - (stevesk) [defines.h] remove USE_TIMEVAL; unused | |
6e879cb4 | 1071 | - (stevesk) [acconfig.h auth-passwd.c configure.ac sshd.c] HP-UX 10.26 |
1072 | support. bug #184. most from dcole@keysoftsys.com. | |
369e787a | 1073 | |
8c1f70d8 | 1074 | 20020424 |
1075 | - (djm) OpenBSD CVS Sync | |
1076 | - markus@cvs.openbsd.org 2002/04/23 12:54:10 | |
1077 | [version.h] | |
1078 | 3.2.1 | |
cdc4fc39 | 1079 | - djm@cvs.openbsd.org 2002/04/23 22:16:29 |
1080 | [sshd.c] | |
1081 | Improve error message; ok markus@ stevesk@ | |
8c1f70d8 | 1082 | |
520b41b2 | 1083 | 20020423 |
a2572aa7 | 1084 | - (stevesk) [acconfig.h configure.ac session.c] LOGIN_NO_ENDOPT for HP-UX |
7615ed55 | 1085 | - (stevesk) [acconfig.h] NEED_IN_SYSTM_H unused |
744d788b | 1086 | - (markus) OpenBSD CVS Sync |
1087 | - markus@cvs.openbsd.org 2002/04/23 12:58:26 | |
1088 | [radix.c] | |
1089 | send complete ticket; semerad@ss1000.ms.mff.cuni.cz | |
3b307f85 | 1090 | - (djm) Trim ChangeLog to include only post-3.1 changes |
48862e93 | 1091 | - (djm) Update RPM spec file versions |
03dd62aa | 1092 | - (djm) Redhat spec enables KrbV by default |
1352689f | 1093 | - (djm) Applied OpenSC smartcard updates from Markus & |
1094 | Antti Tapaninen <aet@cc.hut.fi> | |
1095 | - (djm) Define BROKEN_REALPATH for AIX, patch from | |
1096 | Antti Tapaninen <aet@cc.hut.fi> | |
0e8f4eba | 1097 | - (djm) Bug #214: Fix utmp for Irix (don't strip "tty"). Patch from |
1098 | Kevin Taylor <no@nowhere.org> (??) via Philipp Grau | |
1099 | <phgrau@zedat.fu-berlin.de> | |
2805b943 | 1100 | - (djm) Bug #213: Simplify CMSG_ALIGN macros to avoid symbol clashes. |
1101 | Reported by Doug Manton <dmanton@emea.att.com> | |
520b41b2 | 1102 | - (djm) Bug #222: Fix tests for getaddrinfo on OSF/1. Spotted by |
1103 | Robert Urban <urban@spielwiese.de> | |
52f1ccb2 | 1104 | - (djm) Bug #206 - blibpath isn't always needed for AIX ld, avoid |
1105 | sizeof(long long int) == 4 breakage. Patch from Matthew Clarke | |
1106 | <Matthew_Clarke@mindlink.bc.ca> | |
ad200abb | 1107 | - (djm) Make privsep work with PAM (still experimental) |
9b26c596 | 1108 | - (djm) OpenBSD CVS Sync |
1109 | - deraadt@cvs.openbsd.org 2002/04/20 09:02:03 | |
1110 | [servconf.c] | |
1111 | No, afs requires explicit enabling | |
1112 | - markus@cvs.openbsd.org 2002/04/20 09:14:58 | |
1113 | [bufaux.c bufaux.h] | |
1114 | add buffer_{get,put}_short | |
3b358a0e | 1115 | - markus@cvs.openbsd.org 2002/04/20 09:17:19 |
1116 | [radix.c] | |
1117 | rewrite using the buffer_* API, fixes overflow; ok deraadt@ | |
22d0faff | 1118 | - stevesk@cvs.openbsd.org 2002/04/21 16:19:27 |
1119 | [sshd.8 sshd_config] | |
1120 | document default AFSTokenPassing no; ok deraadt@ | |
134c552b | 1121 | - stevesk@cvs.openbsd.org 2002/04/21 16:25:06 |
1122 | [sshconnect1.c] | |
1123 | spelling in error message; ok markus@ | |
afb8fdb4 | 1124 | - markus@cvs.openbsd.org 2002/04/22 06:15:47 |
1125 | [radix.c] | |
1126 | fix check for overflow | |
eadc806d | 1127 | - markus@cvs.openbsd.org 2002/04/22 16:16:53 |
1128 | [servconf.c sshd.8 sshd_config] | |
1129 | do not auto-enable KerberosAuthentication; ok djm@, provos@, deraadt@ | |
e0ae8728 | 1130 | - markus@cvs.openbsd.org 2002/04/22 21:04:52 |
1131 | [channels.c clientloop.c clientloop.h ssh.c] | |
1132 | request reply (success/failure) for -R style fwd in protocol v2, | |
1133 | depends on ordered replies. | |
1134 | fixes http://bugzilla.mindrot.org/show_bug.cgi?id=215; ok provos@ | |
520b41b2 | 1135 | |
ac033f8c | 1136 | 20020421 |
1137 | - (tim) [entropy.c.] Portability fix for SCO Unix 3.2v4.x (SCO OSR 3.0). | |
fdff2c55 | 1138 | entropy.c needs seteuid(getuid()) for the setuid(original_uid) to |
1139 | succeed. Patch by gert@greenie.muc.de. This fixes one part of Bug 208 | |
ac033f8c | 1140 | |
6dc63b4f | 1141 | 20020418 |
1142 | - (djm) Avoid SIGCHLD breakage when run from rsync. Fix from | |
1143 | Sturle Sunde <sturle.sunde@usit.uio.no> | |
1144 | ||
230c7a8f | 1145 | 20020417 |
fdff2c55 | 1146 | - (djm) Tell users to configure /dev/random support into OpenSSL in |
1147 | INSTALL | |
1a7220c2 | 1148 | - (djm) Fix .Nm in mdoc2man.pl from pspencer@fields.utoronto.ca |
8d184c09 | 1149 | - (tim) [configure.ac] Issue warning on --with-default-path=/some_path |
1150 | if LOGIN_CAP is enabled. Report & testing by Tuc <tuc@ttsg.com> | |
230c7a8f | 1151 | |
9ae68cce | 1152 | 20020415 |
fdff2c55 | 1153 | - (djm) Unbreak "make install". Fix from Darren Tucker |
1154 | <dtucker@zip.com.au> | |
4e51cc76 | 1155 | - (stevesk) bsd-cygwin_util.[ch] BSD license from Corinna Vinschen |
1b06e75e | 1156 | - (tim) [configure.ac] add tests for recvmsg and sendmsg. |
1157 | [monitor_fdpass.c] add checks for HAVE_SENDMSG and HAVE_RECVMSG for | |
1158 | systems that HAVE_ACCRIGHTS_IN_MSGHDR but no recvmsg or sendmsg. | |
9ae68cce | 1159 | |
f6e6303d | 1160 | 20020414 |
1161 | - (djm) ssh-rand-helper improvements | |
1162 | - Add commandline debugging options | |
1163 | - Don't write binary data if stdout is a tty (use hex instead) | |
1164 | - Give it a manpage | |
cbe5b851 | 1165 | - (djm) Random number collection doc fixes from Ben |
f6e6303d | 1166 | |
12928e80 | 1167 | 20020413 |
1168 | - (djm) Add KrbV support patch from Simon Wilkinson <simon@sxw.org.uk> | |
1169 | ||
40b74b3f | 1170 | 20020412 |
1171 | - (stevesk) [auth-sia.[ch]] add BSD license from Chris Adams | |
f95c8ce8 | 1172 | - (tim) [configure.ac] add <sys/types.h> to msghdr tests. Change -L |
1173 | to -h on testing for /bin being symbolic link | |
e2c9b9e3 | 1174 | - (bal) Mistaken in Cygwin scripts for ssh starting. Patch by |
1175 | Corinna Vinschen <vinschen@redhat.com> | |
e75b61db | 1176 | - (bal) disable privsep if no MAP_ANON. We can re-enable it |
1177 | after the release when we can do more testing. | |
40b74b3f | 1178 | |
65b91c76 | 1179 | 20020411 |
1180 | - (stevesk) [auth-sia.c] cleanup | |
7b0737a4 | 1181 | - (tim) [acconfig.h defines.h includes.h] put includes in includes.h and |
1182 | defines in defines.h [rijndael.c openbsd-compat/fake-socket.h | |
1183 | openbsd-compat/inet_aton.c] include "includes.h" instead of "config.h" | |
1184 | ok stevesk@ | |
65b91c76 | 1185 | |
ca8aba40 | 1186 | 20020410 |
f1af2dbf | 1187 | - (stevesk) [configure.ac monitor.c] HAVE_SOCKETPAIR |
ca8aba40 | 1188 | - (stevesk) [auth-sia.c] compile fix Chris Adams <cmadams@hiwaay.net> |
d8ff54e6 | 1189 | - (bal) OpenBSD CVS Sync |
1190 | - markus@cvs.openbsd.org 2002/04/10 08:21:47 | |
1191 | [auth1.c compat.c compat.h] | |
fdff2c55 | 1192 | strip '@' from username only for KerbV and known broken clients, |
1193 | bug #204 | |
f14a5033 | 1194 | - markus@cvs.openbsd.org 2002/04/10 08:56:01 |
1195 | [version.h] | |
1196 | OpenSSH_3.2 | |
1197 | - Added p1 to idenify Portable release version. | |
ca8aba40 | 1198 | |
46c8e0f6 | 1199 | 20020408 |
1200 | - (bal) Minor OpenSC updates. Fix up header locations and update | |
1201 | README.smartcard provided by Juha Yrjölä <jyrjola@cc.hut.fi> | |
1202 | ||
7176df4f | 1203 | 20020407 |
1204 | - (stevesk) HAVE_CONTROL_IN_MSGHDR; not used right now. | |
1205 | Future: we may want to test if fd passing works correctly. | |
84071420 | 1206 | - (stevesk) [monitor_fdpass.c] fatal() for UsePrivilegeSeparation=yes |
1207 | and no fd passing support. | |
1e8f8c5b | 1208 | - (stevesk) HAVE_MMAP and HAVE_SYS_MMAN_H and use them in |
1209 | monitor_mm.c | |
a90419b8 | 1210 | - (stevesk) remove configure support for poll.h; it was removed |
1211 | from sshd.c a long time ago. | |
9a0fbcb3 | 1212 | - (stevesk) --with-privsep-user; default sshd |
1bf74eac | 1213 | - (stevesk) wrap munmap() with HAVE_MMAP also. |
7176df4f | 1214 | |
b17d6a47 | 1215 | 20020406 |
1216 | - (djm) Typo in Suse SPEC file. Fix from Carsten Grohmann | |
1217 | <carsten.grohmann@dr-baldeweg.de> | |
23aa1237 | 1218 | - (bal) Added MAP_FAILED to allow AIX and Trusted HP to compile. |
af2b3cd9 | 1219 | - (bal) OpenBSD CVS Sync |
1220 | - djm@cvs.openbsd.org 2002/04/06 00:30:08 | |
1221 | [sftp-client.c] | |
1d6d408a | 1222 | Fix occasional corruption on upload due to bad reuse of request |
1223 | id, spotted by chombier@mac.com; ok markus@ | |
39f9599a | 1224 | - mouring@cvs.openbsd.org 2002/04/06 18:24:09 |
1225 | [scp.c] | |
1226 | Fixes potental double // within path. | |
1227 | http://bugzilla.mindrot.org/show_bug.cgi?id=76 | |
5866adb0 | 1228 | - (bal) Slight update to OpenSC support. Better version checking. patch |
1229 | by Juha Yrjölä <jyrjola@cc.hut.fi> | |
b5171f93 | 1230 | - (bal) Revered out of runtime IRIX detection of joblimits. Code is |
1231 | incomplete. | |
419e4769 | 1232 | - (bal) Quiet down configure.ac if /bin/test does not exist. |
14f35963 | 1233 | - (bal) We no longer use atexit()/xatexit()/on_exit() |
b17d6a47 | 1234 | |
295c8801 | 1235 | 20020405 |
1236 | - (bal) Patch for OpenSC SmartCard library; ok markus@; patch by | |
1237 | Juha Yrjölä <jyrjola@cc.hut.fi> | |
1238 | - (bal) Minor documentation update to reflect smartcard library | |
1239 | support changes. | |
ab33e02a | 1240 | - (bal) Too many <sys/queue.h> issues. Remove all workarounds and |
1241 | using internal version only. | |
d4c6ddff | 1242 | - (bal) OpenBSD CVS Sync |
1243 | - stevesk@cvs.openbsd.org 2002/04/05 20:56:21 | |
1244 | [sshd.8] | |
1245 | clarify sshrc some and handle X11UseLocalhost=yes; ok markus@ | |
295c8801 | 1246 | |
fde58bd4 | 1247 | 20020404 |
1248 | - (stevesk) [auth-pam.c auth-pam.h auth-passwd.c auth-sia.c auth-sia.h | |
1249 | auth1.c auth2.c] PAM, OSF_SIA password auth cleanup; from djm. | |
bf03f2da | 1250 | - (bal) OpenBSD CVS Sync |
1251 | - markus@cvs.openbsd.org 2002/04/03 09:26:11 | |
1252 | [cipher.c myproposal.h] | |
1253 | re-add rijndael-cbc@lysator.liu.se for MacSSH; ash@lab.poc.net | |
fde58bd4 | 1254 | |
ca7e8e1e | 1255 | 20020402 |
1256 | - (bal) Hand Sync of scp.c (reverted to upstream code) | |
1257 | - deraadt@cvs.openbsd.org 2002/03/30 17:45:46 | |
1258 | [scp.c] | |
1259 | stretch banners | |
c572a874 | 1260 | - (bal) CVS ID sync of uidswap.c |
783dbbdc | 1261 | - (bal) OpenBSD CVS Sync (now for the real sync) |
1262 | - markus@cvs.openbsd.org 2002/03/27 22:21:45 | |
1263 | [ssh-keygen.c] | |
fdff2c55 | 1264 | try to import keys with extra trailing === (seen with ssh.com < |
1265 | 2.0.12) | |
49a34e84 | 1266 | - markus@cvs.openbsd.org 2002/03/28 15:34:51 |
1267 | [session.c] | |
1268 | do not call record_login twice (for use_privsep) | |
ffbf7323 | 1269 | - markus@cvs.openbsd.org 2002/03/29 18:59:32 |
1270 | [session.c session.h] | |
fdff2c55 | 1271 | retrieve last login time before the pty is allocated, store per |
1272 | session | |
3bc822df | 1273 | - stevesk@cvs.openbsd.org 2002/03/29 19:16:22 |
1274 | [sshd.8] | |
1275 | RSA key modulus size minimum 768; ok markus@ | |
82b00264 | 1276 | - stevesk@cvs.openbsd.org 2002/03/29 19:18:33 |
1277 | [auth-rsa.c ssh-rsa.c ssh.h] | |
1278 | make RSA modulus minimum #define; ok markus@ | |
8c38e88b | 1279 | - markus@cvs.openbsd.org 2002/03/30 18:51:15 |
1280 | [monitor.c serverloop.c sftp-int.c sftp.c sshd.c] | |
1281 | check waitpid for EINTR; based on patch from peter@ifm.liu.se | |
92053302 | 1282 | - markus@cvs.openbsd.org 2002/04/01 22:02:16 |
1283 | [sftp-client.c] | |
1284 | 20480 is an upper limit for older server | |
9c74a24d | 1285 | - markus@cvs.openbsd.org 2002/04/01 22:07:17 |
1286 | [sftp-client.c] | |
1287 | fallback to stat if server does not support lstat | |
b745a2f2 | 1288 | - markus@cvs.openbsd.org 2002/04/02 11:49:39 |
1289 | [ssh-agent.c] | |
1290 | check $SHELL for -k and -d, too; | |
1291 | http://bugzilla.mindrot.org/show_bug.cgi?id=199 | |
b69145c2 | 1292 | - markus@cvs.openbsd.org 2002/04/02 17:37:48 |
1293 | [sftp.c] | |
1294 | always call log_init() | |
c9336aed | 1295 | - markus@cvs.openbsd.org 2002/04/02 20:11:38 |
1296 | [ssh-rsa.c] | |
1297 | ignore SSH_BUG_SIGBLOB for ssh-rsa; #187 | |
c895376b | 1298 | - (bal) mispelling in uidswap.c (portable only) |
ca7e8e1e | 1299 | |
8b314ec9 | 1300 | 20020401 |
1301 | - (stevesk) [monitor.c] PAM should work again; will *not* work with | |
1302 | UsePrivilegeSeparation=yes. | |
3906af0f | 1303 | - (stevesk) [auth1.c] fix password auth for protocol 1 when |
1304 | !USE_PAM && !HAVE_OSF_SIA; merge issue. | |
8b314ec9 | 1305 | |
267e920e | 1306 | 20020331 |
1307 | - (tim) [configure.ac] use /bin/test -L to work around broken builtin on | |
1308 | Solaris 8 | |
ef077e37 | 1309 | - (tim) [sshconnect2.c] change uint32_t to u_int32_t |
267e920e | 1310 | |
0461c355 | 1311 | 20020330 |
1312 | - (stevesk) [configure.ac] remove header check for sys/ttcompat.h | |
1313 | bug 167 | |
1314 | ||
dd466ff8 | 1315 | 20020327 |
1316 | - (bal) 'pw' should be 'authctxt->pw' in auth1.c spotted by | |
1317 | kent@lysator.liu.se | |
17f5e68a | 1318 | - (bal) OpenBSD CVS Sync |
1319 | - markus@cvs.openbsd.org 2002/03/26 11:34:49 | |
1320 | [ssh.1 sshd.8] | |
1321 | update to recent drafts | |
5fb274c1 | 1322 | - markus@cvs.openbsd.org 2002/03/26 11:37:05 |
1323 | [ssh.c] | |
1324 | update Copyright | |
19f40184 | 1325 | - markus@cvs.openbsd.org 2002/03/26 15:23:40 |
1326 | [bufaux.c] | |
1327 | do not talk about packets in bufaux | |
7341fad9 | 1328 | - rees@cvs.openbsd.org 2002/03/26 18:46:59 |
1329 | [scard.c] | |
fdff2c55 | 1330 | try_AUT0 in read_pubkey too, for those paranoid few who want to |
1331 | acl 'sh' | |
6c112aca | 1332 | - markus@cvs.openbsd.org 2002/03/26 22:50:39 |
1333 | [channels.h] | |
1334 | CHANNEL_EFD_OUTPUT_ACTIVE is false for CHAN_CLOSE_RCVD, too | |
52103b10 | 1335 | - markus@cvs.openbsd.org 2002/03/26 23:13:03 |
1336 | [auth-rsa.c] | |
1337 | disallow RSA keys < 768 for protocol 1, too (rhosts-rsa and rsa auth) | |
76bf34f1 | 1338 | - markus@cvs.openbsd.org 2002/03/26 23:14:51 |
1339 | [kex.c] | |
1340 | generate a new cookie for each SSH2_MSG_KEXINIT message we send out | |
300e01c4 | 1341 | - mouring@cvs.openbsd.org 2002/03/27 11:45:42 |
1342 | [monitor.c] | |
1343 | monitor_allowed_key() returns int instead of pointer. ok markus@ | |
1344 | ||
eb4652f4 | 1345 | 20020325 |
1346 | - (stevesk) import OpenBSD <sys/tree.h> as "openbsd-compat/tree.h" | |
47c36e5b | 1347 | - (bal) OpenBSD CVS Sync |
1348 | - stevesk@cvs.openbsd.org 2002/03/23 20:57:26 | |
1349 | [sshd.c] | |
1350 | setproctitle() after preauth child; ok markus@ | |
d452ec1a | 1351 | - markus@cvs.openbsd.org 2002/03/24 16:00:27 |
1352 | [serverloop.c] | |
1353 | remove unused debug | |
a49dfdec | 1354 | - markus@cvs.openbsd.org 2002/03/24 16:01:13 |
1355 | [packet.c] | |
1356 | debug->debug3 for extra padding | |
5b0d7dc1 | 1357 | - stevesk@cvs.openbsd.org 2002/03/24 17:27:03 |
1358 | [kexgex.c] | |
1359 | typo; ok markus@ | |
d4355079 | 1360 | - stevesk@cvs.openbsd.org 2002/03/24 17:53:16 |
1361 | [monitor_fdpass.c] | |
1362 | minor cleanup and more error checking; ok markus@ | |
9fc0407d | 1363 | - markus@cvs.openbsd.org 2002/03/24 18:05:29 |
1364 | [scard.c] | |
1365 | we need to figure out AUT0 for sc_private_encrypt, too | |
38c1c52a | 1366 | - stevesk@cvs.openbsd.org 2002/03/24 23:20:00 |
1367 | [monitor.c] | |
1368 | remove "\n" from fatal() | |
159897f3 | 1369 | - markus@cvs.openbsd.org 2002/03/25 09:21:13 |
1370 | [auth-rsa.c] | |
1371 | return 0 (not NULL); tomh@po.crl.go.jp | |
6f33c8cd | 1372 | - markus@cvs.openbsd.org 2002/03/25 09:25:06 |
1373 | [auth-rh-rsa.c] | |
1374 | rm bogus comment | |
0659cace | 1375 | - markus@cvs.openbsd.org 2002/03/25 17:34:27 |
1376 | [scard.c scard.h ssh-agent.c ssh-keygen.c ssh.c] | |
1377 | change sc_get_key to sc_get_keys and hide smartcard details in scard.c | |
3074b20c | 1378 | - stevesk@cvs.openbsd.org 2002/03/25 20:12:10 |
1379 | [monitor_mm.c monitor_wrap.c] | |
1380 | ssize_t args use "%ld" and cast to (long) | |
1381 | size_t args use "%lu" and cast to (u_long) | |
1382 | ok markus@ and thanks millert@ | |
1c2deed1 | 1383 | - markus@cvs.openbsd.org 2002/03/25 21:04:02 |
1384 | [ssh.c] | |
1385 | simplify num_identity_files handling | |
d2296ed7 | 1386 | - markus@cvs.openbsd.org 2002/03/25 21:13:51 |
1387 | [channels.c channels.h compat.c compat.h nchan.c] | |
fdff2c55 | 1388 | don't send stderr data after EOF, accept this from older known |
1389 | (broken) sshd servers only, fixes | |
1390 | http://bugzilla.mindrot.org/show_bug.cgi?id=179 | |
8e4fd4a1 | 1391 | - stevesk@cvs.openbsd.org 2002/03/26 03:24:01 |
1392 | [monitor.h monitor_fdpass.h monitor_mm.h monitor_wrap.h] | |
1393 | $OpenBSD$ | |
eb4652f4 | 1394 | |
1178e8db | 1395 | 20020324 |
1396 | - (stevesk) [session.c] disable LOGIN_NEEDS_TERM until we are sure | |
1397 | it can be removed. only used on solaris. will no longer compile with | |
1398 | privsep shuffling. | |
1399 | ||
6f34652e | 1400 | 20020322 |
1401 | - (stevesk) HAVE_ACCRIGHTS_IN_MSGHDR configure support | |
7b18c353 | 1402 | - (stevesk) [monitor.c monitor_wrap.c] #ifdef HAVE_PW_CLASS_IN_PASSWD |
c921ee00 | 1403 | - (stevesk) configure and cpp __FUNCTION__ gymnastics to handle nielsisms |
dc90b259 | 1404 | - (stevesk) [monitor_fdpass.c] support for access rights style file |
1405 | descriptor passing | |
f7ed12f1 | 1406 | - (stevesk) [auth2.c] merge cleanup/sync |
cfadc43b | 1407 | - (stevesk) [defines.h] hp-ux 11 has ancillary data style fd passing, but |
1408 | is missing CMSG_LEN() and CMSG_SPACE() macros. | |
cc58061e | 1409 | - (stevesk) [defines.h] #define MAP_ANON MAP_ANONYMOUS for HP-UX; other |
1410 | platforms may need this--I'm not sure. mmap() issues will need to be | |
1411 | addressed further. | |
05976246 | 1412 | - (tim) [cipher.c] fix problem with OpenBSD sync |
9242fa1b | 1413 | - (stevesk) [LICENCE] OpenBSD sync |
6f34652e | 1414 | |
8627f3e0 | 1415 | 20020321 |
1416 | - (bal) OpenBSD CVS Sync | |
1417 | - itojun@cvs.openbsd.org 2002/03/08 06:10:16 | |
1418 | [sftp-client.c] | |
1419 | printf type mismatch | |
bfa7f960 | 1420 | - itojun@cvs.openbsd.org 2002/03/11 03:18:49 |
1421 | [sftp-client.c] | |
1422 | correct type mismatches (u_int64_t != unsigned long long) | |
5fc7dbc9 | 1423 | - itojun@cvs.openbsd.org 2002/03/11 03:19:53 |
1424 | [sftp-client.c] | |
1425 | indent | |
150a5466 | 1426 | - markus@cvs.openbsd.org 2002/03/14 15:24:27 |
1427 | [sshconnect1.c] | |
fdff2c55 | 1428 | don't trust size sent by (rogue) server; noted by |
1429 | s.esser@e-matters.de | |
4f08e98d | 1430 | - markus@cvs.openbsd.org 2002/03/14 16:38:26 |
1431 | [sshd.c] | |
1432 | split out ssh1 session key decryption; ok provos@ | |
46f1eece | 1433 | - markus@cvs.openbsd.org 2002/03/14 16:56:33 |
1434 | [auth-rh-rsa.c auth-rsa.c auth.h] | |
1435 | split auth_rsa() for better readability and privsep; ok provos@ | |
c390a3c8 | 1436 | - itojun@cvs.openbsd.org 2002/03/15 11:00:38 |
1437 | [auth.c] | |
1438 | fix file type checking (use S_ISREG). ok by markus | |
bcb68a8f | 1439 | - markus@cvs.openbsd.org 2002/03/16 11:24:53 |
1440 | [compress.c] | |
1441 | skip inflateEnd if inflate fails; ok provos@ | |
3e65880e | 1442 | - markus@cvs.openbsd.org 2002/03/16 17:22:09 |
1443 | [auth-rh-rsa.c auth.h] | |
1444 | split auth_rhosts_rsa(), ok provos@ | |
bb15f28b | 1445 | - stevesk@cvs.openbsd.org 2002/03/16 17:41:25 |
1446 | [auth-krb5.c] | |
1447 | BSD license. from Daniel Kouril via Dug Song. ok markus@ | |
443fa1cd | 1448 | - provos@cvs.openbsd.org 2002/03/17 20:25:56 |
1449 | [auth.c auth.h auth1.c auth2.c] | |
fdff2c55 | 1450 | getpwnamallow returns struct passwd * only if user valid; |
1451 | okay markus@ | |
1b34c1b3 | 1452 | - provos@cvs.openbsd.org 2002/03/18 01:12:14 |
1453 | [auth.h auth1.c auth2.c sshd.c] | |
1454 | have the authentication functions return the authentication context | |
1455 | and then do_authenticated; okay millert@ | |
9d0844e3 | 1456 | - dugsong@cvs.openbsd.org 2002/03/18 01:30:10 |
1457 | [auth-krb4.c] | |
1458 | set client to NULL after xfree(), from Rolf Braun | |
1459 | <rbraun+ssh@andrew.cmu.edu> | |
1836f69f | 1460 | - provos@cvs.openbsd.org 2002/03/18 03:41:08 |
1461 | [auth.c session.c] | |
1462 | move auth_approval into getpwnamallow with help from millert@ | |
bf8269a9 | 1463 | - markus@cvs.openbsd.org 2002/03/18 17:13:15 |
1464 | [cipher.c cipher.h] | |
1465 | export/import cipher states; needed by ssh-privsep | |
e050d348 | 1466 | - markus@cvs.openbsd.org 2002/03/18 17:16:38 |
1467 | [packet.c packet.h] | |
1468 | export/import cipher state, iv and ssh2 seqnr; needed by ssh-privsep | |
d0074658 | 1469 | - markus@cvs.openbsd.org 2002/03/18 17:23:31 |
1470 | [key.c key.h] | |
1471 | add key_demote() for ssh-privsep | |
b625ad75 | 1472 | - provos@cvs.openbsd.org 2002/03/18 17:25:29 |
1473 | [bufaux.c bufaux.h] | |
1474 | buffer_skip_string and extra sanity checking; needed by ssh-privsep | |
3d6fc2f8 | 1475 | - provos@cvs.openbsd.org 2002/03/18 17:31:54 |
1476 | [compress.c] | |
1477 | export compression streams for ssh-privsep | |
1853d1ef | 1478 | - provos@cvs.openbsd.org 2002/03/18 17:50:31 |
9759df31 | 1479 | [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c] |
1480 | [auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c] | |
1481 | [kexgex.c servconf.c] | |
1482 | [session.h servconf.h serverloop.c session.c sshd.c] | |
1483 | integrate privilege separated openssh; its turned off by default | |
1484 | for now. work done by me and markus@ | |
ce19ff48 | 1485 | - provos@cvs.openbsd.org 2002/03/18 17:53:08 |
1486 | [sshd.8] | |
1487 | credits for privsep | |
70aa9ff4 | 1488 | - provos@cvs.openbsd.org 2002/03/18 17:59:09 |
1489 | [sshd.8] | |
1490 | document UsePrivilegeSeparation | |
73fbf637 | 1491 | - stevesk@cvs.openbsd.org 2002/03/18 23:52:51 |
1492 | [servconf.c] | |
1493 | UnprivUser/UnprivGroup usable now--specify numeric user/group; ok | |
1494 | provos@ | |
1c352e97 | 1495 | - stevesk@cvs.openbsd.org 2002/03/19 03:03:43 |
1496 | [pathnames.h servconf.c servconf.h sshd.c] | |
1497 | _PATH_PRIVSEP_CHROOT_DIR; ok provos@ | |
fffbaee2 | 1498 | - stevesk@cvs.openbsd.org 2002/03/19 05:23:08 |
1499 | [sshd.8] | |
1500 | Banner has no default. | |
702b7dd8 | 1501 | - mpech@cvs.openbsd.org 2002/03/19 06:32:56 |
1502 | [sftp-int.c] | |
1503 | use xfree() after xstrdup(). | |
1504 | ||
1505 | markus@ ok | |
51aeb639 | 1506 | - markus@cvs.openbsd.org 2002/03/19 10:35:39 |
1507 | [auth-options.c auth.h session.c session.h sshd.c] | |
1508 | clean up prototypes | |
762715ce | 1509 | - markus@cvs.openbsd.org 2002/03/19 10:49:35 |
9759df31 | 1510 | [auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h] |
1511 | [packet.c session.c sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c] | |
1512 | [sshconnect2.c sshd.c ttymodes.c] | |
762715ce | 1513 | KNF whitespace |
5f1f36b5 | 1514 | - markus@cvs.openbsd.org 2002/03/19 14:27:39 |
1515 | [auth.c auth1.c auth2.c] | |
1516 | make getpwnamallow() allways call pwcopy() | |
06bea668 | 1517 | - markus@cvs.openbsd.org 2002/03/19 15:31:47 |
1518 | [auth.c] | |
1519 | check for NULL; from provos@ | |
2ea6de2b | 1520 | - stevesk@cvs.openbsd.org 2002/03/20 19:12:25 |
1521 | [servconf.c servconf.h ssh.h sshd.c] | |
1522 | for unprivileged user, group do: | |
1523 | pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@ | |
256debd0 | 1524 | - stevesk@cvs.openbsd.org 2002/03/20 21:08:08 |
1525 | [sshd.c] | |
1526 | strerror() on chdir() fail; ok provos@ | |
edfb66cb | 1527 | - markus@cvs.openbsd.org 2002/03/21 10:21:20 |
1528 | [ssh-add.c] | |
1529 | ignore errors for nonexisting default keys in ssh-add, | |
1530 | fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158 | |
c53c54c2 | 1531 | - jakob@cvs.openbsd.org 2002/03/21 15:17:26 |
1532 | [clientloop.c ssh.1] | |
1533 | add built-in command line for adding new port forwardings on the fly. | |
1534 | based on a patch from brian wellington. ok markus@. | |
7649bbfe | 1535 | - markus@cvs.openbsd.org 2002/03/21 16:38:06 |
1536 | [scard.c] | |
1537 | make compile w/ openssl 0.9.7 | |
b9f62352 | 1538 | - markus@cvs.openbsd.org 2002/03/21 16:54:53 |
1539 | [scard.c scard.h ssh-keygen.c] | |
1540 | move key upload to scard.[ch] | |
1541 | - markus@cvs.openbsd.org 2002/03/21 16:57:15 | |
1542 | [scard.c] | |
1543 | remove const | |
39ac8430 | 1544 | - markus@cvs.openbsd.org 2002/03/21 16:58:13 |
1545 | [clientloop.c] | |
1546 | remove unused | |
514b94dc | 1547 | - rees@cvs.openbsd.org 2002/03/21 18:08:15 |
1548 | [scard.c] | |
1549 | In sc_put_key(), sc_reader_id should be id. | |
ce1ba33a | 1550 | - markus@cvs.openbsd.org 2002/03/21 20:51:12 |
1551 | [sshd_config] | |
1552 | add privsep (off) | |
324bf712 | 1553 | - markus@cvs.openbsd.org 2002/03/21 21:23:34 |
1554 | [sshd.c] | |
1555 | add privsep_preauth() and remove 1 goto; ok provos@ | |
86c4f63d | 1556 | - rees@cvs.openbsd.org 2002/03/21 21:54:34 |
1557 | [scard.c scard.h ssh-keygen.c] | |
1558 | Add PIN-protection for secret key. | |
76139bd8 | 1559 | - rees@cvs.openbsd.org 2002/03/21 22:44:05 |
1560 | [authfd.c authfd.h ssh-add.c ssh-agent.c ssh.c] | |
1561 | Add PIN-protection for secret key. | |
ec9b7086 | 1562 | - markus@cvs.openbsd.org 2002/03/21 23:07:37 |
1563 | [clientloop.c] | |
1564 | remove unused, sync w/ cmdline patch in my tree. | |
ce1ba33a | 1565 | |
81dadca3 | 1566 | 20020317 |
fdff2c55 | 1567 | - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is |
1568 | wanted, warn if directory does not exist. Put system directories in | |
1569 | front of PATH for finding entorpy commands. | |
43e41c2c | 1570 | - (tim) [contrib/aix/buildbff.sh contrib/aix/inventory.sh] AIX package |
1571 | build fixes. Patch by Darren Tucker <dtucker@zip.com.au> | |
1572 | [contrib/solaris/buildpkg.sh] add missing dirs to SYSTEM_DIR. Have | |
1573 | postinstall check for $piddir and add if necessary. | |
81dadca3 | 1574 | |
e4abf75b | 1575 | 20020311 |
1576 | - (tim) [contrib/solaris/buildpkg.sh, contrib/solaris/README] Updated to | |
1577 | build on all platforms that support SVR4 style package tools. Now runs | |
1578 | from build dir. Parts are based on patches from Antonio Navarro, and | |
1579 | Darren Tucker. | |
1580 | ||
fb8f3dc9 | 1581 | 20020308 |
a068d86f | 1582 | - (djm) Revert bits of Markus' OpenSSL compat patch which was |
1583 | accidentally committed. | |
1584 | - (djm) Add Markus' patch for compat wih OpenSSL < 0.9.6. | |
1585 | Known issue: Blowfish for SSH1 does not work | |
dc254471 | 1586 | - (stevesk) entropy.c: typo in debug message |
633151a3 | 1587 | - (djm) ssh-keygen -i needs seeded RNG; report from markus@ |
fb8f3dc9 | 1588 | |
0b202697 | 1589 | $Id$ |