]> andersk Git - openssh.git/blame - ChangeLog
- markus@cvs.openbsd.org 2003/01/23 14:06:15
[openssh.git] / ChangeLog
CommitLineData
1be697b6 120030124
2 - (djm) OpenBSD CVS Sync
3 - jmc@cvs.openbsd.org 2003/01/23 08:58:47
4 [sshd_config.5]
5 typos; ok millert@
c4087616 6 - markus@cvs.openbsd.org 2003/01/23 13:50:27
7 [authfd.c authfd.h readpass.c ssh-add.1 ssh-add.c ssh-agent.c]
8 ssh-add -c, prompt user for confirmation (using ssh-askpass) when
9 private agent key is used; with djm@; test by dugsong@, djm@;
10 ok deraadt@
6ea3c52a 11 - markus@cvs.openbsd.org 2003/01/23 14:01:53
12 [scp.c]
13 bandwidth limitation patch (scp -l) from niels@; ok todd@, deraadt@
e6b15f23 14 - markus@cvs.openbsd.org 2003/01/23 14:06:15
15 [scp.1 scp.c]
16 scp -12; Sam Smith and others; ok provos@, deraadt@
1be697b6 17
0df3cb2b 1820030123
19 - (djm) OpenBSD CVS Sync
20 - djm@cvs.openbsd.org 2003/01/23 00:03:00
21 [auth1.c]
22 Don't log TIS auth response; "get rid of it" - markus@
23
494b267f 2420030122
25 - (djm) OpenBSD CVS Sync
26 - marc@cvs.openbsd.org 2003/01/21 18:14:36
27 [ssh-agent.1 ssh-agent.c]
28 Add a -t life option to ssh-agent that set the default lifetime.
29 The default can still be overriden by using -t in ssh-add.
30 OK markus@
882a3870 31 - (djm) Reorganise PAM & SIA password handling to eliminate some common code
8582624b 32 - (djm) Sync regress with OpenBSD -current
494b267f 33
877c5ea2 3420030120
35 - (djm) Fix compilation for NetBSD from dtucker@zip.com.au
115dc20f 36 - (tim) [progressmeter.c] make compilers without long long happy.
21710e39 37 - (tim) [configure.ac] Add -belf to build ELF binaries on OpenServer 5 when
38 using cc. (gcc already did)
877c5ea2 39
5ed5468f 4020030118
41 - (djm) Revert fix for Bug #442 for now.
42
9e2b44f5 4320030117
44 - (djm) Bug #470: Detect strnvis, not strvis in configure.
45 From d_wllms@lanl.gov
46
280806cf 4720030116
48 - (djm) OpenBSD CVS Sync
49 - djm@cvs.openbsd.org 2003/01/16 03:41:55
50 [sftp-int.c]
51 explicitly use first glob result
52
33364f27 5320030114
54 - (djm) OpenBSD CVS Sync
55 - fgsch@cvs.openbsd.org 2003/01/10 23:23:24
56 [sftp-int.c]
57 typo; from Nils Nordman <nino at nforced dot com>.
083d2e97 58 - markus@cvs.openbsd.org 2003/01/11 18:29:43
59 [log.c]
60 set fatal_cleanups to NULL in fatal_remove_all_cleanups();
61 dtucker@zip.com.au
b7fd001f 62 - markus@cvs.openbsd.org 2003/01/12 16:57:02
63 [progressmeter.c]
64 allow WARNINGS=yes; ok djm@
c1e07c81 65 - djm@cvs.openbsd.org 2003/01/13 11:04:04
66 [sftp-int.c]
67 make cmds[] array static to avoid conflict with BSDI libc.
209d3126 68 mindrot bug #466. Fix from mdev@idg.nl; ok markus@
538840a2 69 - djm@cvs.openbsd.org 2003/01/14 10:58:00
70 [sftp-client.c sftp-int.c]
71 Don't try to upload or download non-regular files. Report from
72 apoloval@pantuflo.escet.urjc.es; ok markus@
33364f27 73
7420030113
e80fb2a0 75 - (djm) Rework openbsd-compat/setproctitle.c a bit: move emulation type
76 detection to configure.ac. Prompted by stevesk@
65a4b4af 77 - (djm) Bug #467: Add a --disable-strip option to turn off stripping of
78 installed binaries. From mdev@idg.nl
e80fb2a0 79
d0104542 8020030110
81 - (djm) Enable new setproctitle emulation for Linux, AIX and HP/UX. More
82 systems may be added later.
9a36208d 83 - (djm) OpenBSD CVS Sync
84 - djm@cvs.openbsd.org 2003/01/08 23:53:26
85 [sftp.1 sftp.c sftp-int.c sftp-int.h]
86 Cleanup error handling for batchmode
87 Allow blank lines and comments in input
88 Ability to suppress abort on error in batchmode ("-put blah")
89 Fixes mindrot bug #452; markus@ ok
b65c3807 90 - fgsch@cvs.openbsd.org 2003/01/10 08:19:07
c9c38b73 91 [scp.c sftp.1 sftp.c sftp-client.c sftp-int.c progressmeter.c]
92 [progressmeter.h]
b65c3807 93 sftp progress meter support.
94 original diffs by Nils Nordman <nino at nforced dot com> via
95 markus@, merged to -current by me, djm@ ok.
bf0bf24b 96 - djm@cvs.openbsd.org 2003/01/10 08:48:15
97 [sftp-client.c]
98 Simplify and avoid redundancy in packet send and receive
99 functions; ok fgs@
25a6efd8 100 - djm@cvs.openbsd.org 2003/01/10 10:29:35
101 [scp.c]
102 Don't ftruncate after write error, creating sparse files of
103 incorrect length
104 mindrot bug #403, reported by rusr@cup.hp.com; ok markus@
4940c411 105 - djm@cvs.openbsd.org 2003/01/10 10:32:54
106 [channels.c]
107 hush socket() errors, except last. Fixes mindrot bug #408; ok markus@
d0104542 108
7bb526ce 10920030108
110 - (djm) Sync openbsd-compat/ with OpenBSD -current
93c63b8d 111 - (djm) Avoid redundant xstrdup/xfree in auth2-pam.c. From Solar via markus@
faa483fa 112 - (djm) OpenBSD CVS Sync
113 - markus@cvs.openbsd.org 2003/01/01 18:08:52
114 [channels.c]
115 move big output buffer messages to debug2
bfd934b9 116 - djm@cvs.openbsd.org 2003/01/06 23:51:22
117 [sftp-client.c]
118 Fix "get -p" download to not add user-write perm. mindrot bug #426
119 reported by gfernandez@livevault.com; ok markus@
048ff12c 120 - fgsch@cvs.openbsd.org 2003/01/07 23:42:54
121 [sftp.1]
122 add version; from Nils Nordman <nino at nforced dot com> via markus@.
123 markus@ ok
c9c462e4 124 - (djm) Update README to reflect AIX's status as a well supported platform.
125 From dtucker@zip.com.au
c3690df3 126 - (tim) [Makefile.in configure.ac] replace fixpath with sed script. Patch
a2144d93 127 by Mo DeJong.
ad0279ff 128 - (tim) [auth.c] declare today at top of allowed_user() to keep
129 older compilers happy.
a2144d93 130 - (tim) [scp.c] make compilers without long long happy.
7bb526ce 131
e7ccd20d 13220030107
133 - (djm) Bug #401: Work around Linux breakage with IPv6 mapped addresses.
134 Based on fix from yoshfuji@linux-ipv6.org
e2ef2342 135 - (djm) Bug #442: Check for and deny access to accounts with locked
136 passwords. Patch from dtucker@zip.com.au
70e7d0b0 137 - (djm) Bug #26: Use local mkstemp() rather than glibc's silly one. Fixes
138 Can't pass KRB4 TGT passing. Fix from: jan.iven@cern.ch
93a9a35a 139 - (djm) Fix Bug #442 for PAM case
ed05a983 140 - (djm) Bug #110: bogus error messages in lastlog_get_entry(). Fix based
141 on one by peak@argo.troja.mff.cuni.cz
63cada0a 142 - (djm) Bug #111: Run syslog and stderr logging through strnvis to eliminate
143 nasties. Report from peak@argo.troja.mff.cuni.cz
99f4fb69 144 - (djm) Bug #178: On AIX /etc/nologin wasnt't shown to users. Fix from
145 Ralf.Wenk@fh-karlsruhe.de and dtucker@zip.com.au
b57c8e20 146 - (djm) Fix my fix of the fix for the Bug #442 for PAM case. Spotted by
147 dtucker@zip.com.au. Reorder for clarity too.
e7ccd20d 148
9300be60 14920030103
150 - (djm) Bug #461: ssh-copy-id fails with no arguments. Patch from
151 cjwatson@debian.org
9746ee4b 152 - (djm) Bug #460: Filling utmp[x]->ut_addr_v6 if present. Patch from
153 cjwatson@debian.org
17ed08c5 154 - (djm) Bug #446: Set LOGIN env var to pw_name on AIX. Patch from
155 mii@ornl.gov
156
d4ac26ed 15720030101
158 - (stevesk) [session.c sshlogin.c sshlogin.h] complete portable
159 parts of pass addrlen with sockaddr * fix.
160 from Hajimu UMEMOTO <ume@FreeBSD.org>
161
378d9956 16220021222
163 - (bal) OpenBSD CVS Sync
164 - fgsch@cvs.openbsd.org 2002/11/15 10:03:09
165 [authfile.c]
166 lseek(2) may return -1 when getting the public/private key lenght.
167 Simplify the code and check for errors using fstat(2).
168
169 Problem reported by Mauricio Sanchez, markus@ ok.
3c93c917 170 - markus@cvs.openbsd.org 2002/11/18 16:43:44
171 [clientloop.c]
172 don't overwrite SIG{INT,QUIT,TERM} handler if set to SIG_IGN;
173 e.g. if ssh is used for backup; report Joerg Schilling; ok millert@
35efb24c 174 - markus@cvs.openbsd.org 2002/11/21 22:22:50
175 [dh.c]
176 debug->debug2
a77673cc 177 - markus@cvs.openbsd.org 2002/11/21 22:45:31
178 [cipher.c kex.c packet.c sshconnect.c sshconnect2.c]
179 debug->debug2, unify debug messages
b77a87e5 180 - deraadt@cvs.openbsd.org 2002/11/21 23:03:51
181 [auth-krb5.c auth1.c hostfile.h monitor_wrap.c sftp-client.c sftp-int.c ssh-add.c ssh-rsa.c
182 sshconnect.c]
183 KNF
556f1c05 184 - markus@cvs.openbsd.org 2002/11/21 23:04:33
83bbc162 185 [ssh.c]
186 debug->debug2
556f1c05 187 - stevesk@cvs.openbsd.org 2002/11/24 21:46:24
eef52fa7 188 [ssh-keysign.8]
189 typo: "the the"
6d58d81e 190 - wcobb@cvs.openbsd.org 2002/11/26 00:45:03
191 [scp.c ssh-keygen.c]
192 Remove unnecessary fflush(stderr) calls, stderr is unbuffered by default.
193 ok markus@
556f1c05 194 - stevesk@cvs.openbsd.org 2002/11/26 02:35:30
63baa058 195 [ssh-keygen.1]
196 remove outdated statement; ok markus@ deraadt@
649bb60b 197 - stevesk@cvs.openbsd.org 2002/11/26 02:38:54
198 [canohost.c]
199 KNF, comment and error message repair; ok markus@
15748b4d 200 - markus@cvs.openbsd.org 2002/11/27 17:53:35
201 [scp.c sftp.c ssh.c]
202 allow usernames with embedded '@', e.g. scp user@vhost@realhost:file /tmp;
203 http://bugzilla.mindrot.org/show_bug.cgi?id=447; ok mouring@, millert@
fe661d8f 204 - stevesk@cvs.openbsd.org 2002/12/04 04:36:47
205 [session.c]
206 remove xauth entries before add; PR 2994 from janjaap@stack.nl.
207 ok markus@
a0a14bcd 208 - markus@cvs.openbsd.org 2002/12/05 11:08:35
209 [scp.c]
210 use roundup() similar to rcp/util.c and avoid problems with strange
211 filesystem block sizes, noted by tjr@freebsd.org; ok djm@
556f1c05 212 - djm@cvs.openbsd.org 2002/12/06 05:20:02
2ea16b0b 213 [sftp.1]
214 Fix cut'n'paste error, spotted by matthias.riese@b-novative.de; ok deraadt@
978ebf99 215 - millert@cvs.openbsd.org 2002/12/09 16:50:30
216 [ssh.c]
217 Avoid setting optind to 0 as GNU getopt treats that like we do optreset.
218 markus@ OK
32214c88 219 - markus@cvs.openbsd.org 2002/12/10 08:56:00
220 [session.c]
221 Make sure $SHELL points to the shell from the password file, even if shell
222 is overridden from login.conf; bug#453; semen at online.sinor.ru; ok millert@
48f636b2 223 - markus@cvs.openbsd.org 2002/12/10 19:26:50
224 [packet.c]
225 move tos handling to packet_set_tos; ok provos/henning/deraadt
9e637910 226 - markus@cvs.openbsd.org 2002/12/10 19:47:14
227 [packet.c]
228 static
6226a8f8 229 - markus@cvs.openbsd.org 2002/12/13 10:03:15
230 [channels.c misc.c sshconnect2.c]
231 cleanup debug messages, more useful information for the client user.
556f1c05 232 - markus@cvs.openbsd.org 2002/12/13 15:20:52
233 [scp.c]
234 1) include stalling time in total time
235 2) truncate filenames to 45 instead of 20 characters
236 3) print rate instead of progress bar, no more stars
237 4) scale output to tty width
238 based on a patch from Niels; ok fries@ lebel@ fgs@ millert@
3075ac59 239 - (bal) [msg.c msg.h scp.c ssh-keysign.c sshconnect2.c] Resync CVS IDs since
240 we already did s/msg_send/ssh_msg_send/
378d9956 241
a76550cf 24220021205
243 - (djm) PERL-free fixpaths from stuge-openssh-unix-dev@cdy.org
244
d9a4e55b 24520021122
246 - (tim) [configure.ac] fix STDPATH test for IRIX. First reported by
247 advax@triumf.ca. This type of solution tested by <herb@sgi.com>
248
f825dbf4 24920021113
250 - (tim) [configure.ac] remove unused variables no_libsocket and no_libnsl
251
17d429bb 25220021111
253 - (tim) [contrib/solaris/opensshd.in] add umask 022 so sshd.pid is
254 not world writable.
255
c9826b28 25620021109
257 - (bal) OpenBSD CVS Sync
258 - itojun@cvs.openbsd.org 2002/10/16 14:31:48
259 [sftp-common.c]
260 64bit pedant. %llu is "unsigned long long". markus ok
2fe3c2db 261 - markus@cvs.openbsd.org 2002/10/23 10:32:13
262 [packet.c]
263 use %u for u_int
358b576b 264 - markus@cvs.openbsd.org 2002/10/23 10:40:16
265 [bufaux.c]
266 %u for u_int
f6f02456 267 - markus@cvs.openbsd.org 2002/11/04 10:07:53
268 [auth.c]
269 don't compare against pw_home if realpath fails for pw_home (seen
270 on AFS); ok djm@
2ccb7bde 271 - markus@cvs.openbsd.org 2002/11/04 10:09:51
272 [packet.c]
273 log before send disconnect; ok djm@
39e71188 274 - markus@cvs.openbsd.org 2002/11/05 19:45:20
275 [monitor.c]
276 handle overflows for size_t larger than u_int; siw@goneko.de, bug #425
9db1a8e9 277 - markus@cvs.openbsd.org 2002/11/05 20:10:37
278 [sftp-client.c]
279 typo; GaryF@livevault.com
51efad8c 280 - markus@cvs.openbsd.org 2002/11/07 16:28:47
281 [sshd.c]
282 log to stderr if -ie is given, bug #414, prj@po.cwru.edu
cc46e2ee 283 - markus@cvs.openbsd.org 2002/11/07 22:08:07
284 [readconf.c readconf.h ssh-keysign.8 ssh-keysign.c]
285 we cannot use HostbasedAuthentication for enabling ssh-keysign(8),
286 because HostbasedAuthentication might be enabled based on the
287 target host and ssh-keysign(8) does not know the remote hostname
288 and not trust ssh(1) about the hostname, so we add a new option
289 EnableSSHKeysign; ok djm@, report from zierke@informatik.uni-hamburg.de
252d1a24 290 - markus@cvs.openbsd.org 2002/11/07 22:35:38
291 [scp.c]
292 check exit status from ssh, and exit(1) if ssh fails; bug#369;
293 binder@arago.de
f00addc9 294 - (bal) Update ssh-host-config and minor rewrite of bsd-cygwin_util.c
295 ntsec now default if cygwin version beginning w/ version 56. Patch
296 by Corinna Vinschen <vinschen@redhat.com>
819d3f09 297 - (bal) AIX does not log login attempts for unknown users (bug #432).
298 patch by dtucker@zip.com.au
c9826b28 299
4e6f1c4f 30020021021
f0e27f3d 301 - (djm) Bug #400: Kill ssh-rand-helper children on timeout, patch from
302 dtucker@zip.com.au
cacd2e7a 303 - (djm) Bug #317: FreeBSD needs libutil.h for openpty() Report from
304 dirk.meyer@dinoex.sub.org
4e6f1c4f 305
f3e87063 30620021015
307 - (bal) Fix bug id 383 and only call loginrestrict for AIX if not root.
08412d26 308 - (bal) More advanced strsep test by Darren Tucker <dtucker@zip.com.au>
f3e87063 309
57872969 31020021015
311 - (tim) [contrib/caldera/openssh.spec] make ssh-agent setgid nobody
312
6af8f131 31320021004
314 - (bal) Disable post-authentication Privsep for OSF/1. It conflicts with
315 SIA.
316
e139021d 31720021003
318 - (djm) OpenBSD CVS Sync
319 - markus@cvs.openbsd.org 2002/10/01 20:34:12
320 [ssh-agent.c]
321 allow root to access the agent, since there is no protection from root.
886cd2bb 322 - markus@cvs.openbsd.org 2002/10/01 13:24:50
323 [version.h]
324 OpenSSH 3.5
0855868a 325 - (djm) Bump RPM spec version numbers
e987fdbe 326 - (djm) Bug #406: s/msg_send/ssh_msg_send/ for Mac OS X 1.2
e139021d 327
1d677676 32820020930
9a87e2ac 329 - (djm) Tidy contrib/, add Makefile for GNOME passphrase dialogs,
330 tweak README
331 - (djm) OpenBSD CVS Sync
332 - mickey@cvs.openbsd.org 2002/09/27 10:42:09
333 [compat.c compat.h sshd.c]
334 add a generic match for a prober, such as sie big brother;
335 idea from stevesk@; markus@ ok
05960cf0 336 - stevesk@cvs.openbsd.org 2002/09/27 15:46:21
337 [ssh.1]
338 clarify compression level protocol 1 only; ok markus@ deraadt@
1d677676 339
0d3d0e82 34020020927
341 - (djm) OpenBSD CVS Sync
342 - markus@cvs.openbsd.org 2002/09/25 11:17:16
343 [sshd_config]
344 sync LoginGraceTime with default
26b9a3d2 345 - markus@cvs.openbsd.org 2002/09/25 15:19:02
346 [sshd.c]
347 typo; pilot@monkey.org
2db9d8aa 348 - markus@cvs.openbsd.org 2002/09/26 11:38:43
349 [auth1.c auth.h auth-krb4.c monitor.c monitor.h monitor_wrap.c]
350 [monitor_wrap.h]
351 krb4 + privsep; ok dugsong@, deraadt@
0d3d0e82 352
b7c4a4cc 35320020925
354 - (bal) Fix issue where successfull login does not clear failure counts
355 in AIX. Patch by dtucker@zip.com.au ok by djm
ef51930f 356 - (tim) Cray fixes (bug 367) based on patch from Wendy Palm @ cray.
357 This does not include the deattack.c fixes.
b7c4a4cc 358
99443922 35920020923
360 - (djm) OpenBSD CVS Sync
361 - stevesk@cvs.openbsd.org 2002/09/23 20:46:27
362 [canohost.c]
363 change get_peer_ipaddr() and get_local_ipaddr() to not return NULL for
364 non-sockets; fixes a problem passing NULL to snprintf(). ok markus@
0082ad34 365 - markus@cvs.openbsd.org 2002/09/23 22:11:05
366 [monitor.c]
367 only call auth_krb5 if kerberos is enabled; ok deraadt@
4741e3a6 368 - markus@cvs.openbsd.org 2002/09/24 08:46:04
369 [monitor.c]
370 only call kerberos code for authctxt->valid
cb11b555 371 - todd@cvs.openbsd.org 2002/09/24 20:59:44
372 [sshd.8]
373 tweak the example $HOME/.ssh/rc script to not show on any cmdline the
374 sensitive data it handles. This fixes bug # 402 as reported by
375 kolya@mit.edu (Nickolai Zeldovich).
376 ok markus@ and stevesk@
99443922 377
aec4cb4f 37820020923
379 - (tim) [configure.ac] s/return/exit/ patch by dtucker@zip.com.au
380
f86b0eef 38120020922
382 - (djm) OpenBSD CVS Sync
383 - stevesk@cvs.openbsd.org 2002/09/19 14:53:14
384 [compat.c]
c7724abb 385 - markus@cvs.openbsd.org 2002/09/19 15:51:23
386 [ssh-add.c]
387 typo; cd@kalkatraz.de
00e842d8 388 - stevesk@cvs.openbsd.org 2002/09/19 16:03:15
389 [serverloop.c]
390 log IP address also; ok markus@
c2802d92 391 - stevesk@cvs.openbsd.org 2002/09/20 18:41:29
392 [auth.c]
393 log illegal user here for missing privsep case (ssh2).
394 this is executed in the monitor. ok markus@
f86b0eef 395
792e7d2d 39620020919
397 - (djm) OpenBSD CVS Sync
398 - stevesk@cvs.openbsd.org 2002/09/12 19:11:52
399 [ssh-agent.c]
400 %u for uid print; ok markus@
da0561eb 401 - stevesk@cvs.openbsd.org 2002/09/12 19:50:36
402 [session.c ssh.1]
403 add SSH_CONNECTION and deprecate SSH_CLIENT; bug #384. ok markus@
facfd613 404 - stevesk@cvs.openbsd.org 2002/09/13 19:23:09
405 [channels.c sshconnect.c sshd.c]
406 remove use of SO_LINGER, it should not be needed. error check
407 SO_REUSEADDR. fixup comments. ok markus@
8bd4e2ae 408 - stevesk@cvs.openbsd.org 2002/09/16 19:55:33
409 [session.c]
410 log when _PATH_NOLOGIN exists; ok markus@
e6fe1bab 411 - stevesk@cvs.openbsd.org 2002/09/16 20:12:11
412 [sshd_config.5]
413 more details on X11Forwarding security issues and threats; ok markus@
f1dcc34e 414 - stevesk@cvs.openbsd.org 2002/09/16 22:03:13
415 [sshd.8]
416 reference moduli(5) in FILES /etc/moduli.
5c0d0e90 417 - itojun@cvs.openbsd.org 2002/09/17 07:47:02
418 [channels.c]
419 don't quit while creating X11 listening socket.
420 http://mail-index.netbsd.org/current-users/2002/09/16/0005.html
421 got from portable. markus ok
6939bbd4 422 - djm@cvs.openbsd.org 2002/09/19 01:58:18
423 [ssh.c sshconnect.c]
424 bugzilla.mindrot.org #223 - ProxyCommands don't exit.
425 Patch from dtucker@zip.com.au; ok markus@
792e7d2d 426
4f3834e8 42720020912
eee2215e 428 - (djm) Made GNOME askpass programs return non-zero if cancel button is
429 pressed.
10a560d4 430 - (djm) Added getpeereid() replacement. Properly implemented for systems
431 with SO_PEERCRED support. Faked for systems which lack it.
9fd2a215 432 - (djm) Sync sys/tree.h with OpenBSD -current. Rename tree.h and
433 fake-queue.h to sys-tree.h and sys-queue.h
4f3834e8 434 - (djm) OpenBSD CVS Sync
435 - markus@cvs.openbsd.org 2002/09/08 20:24:08
436 [hostfile.h]
437 no comma at end of enumerator list
696f6bef 438 - itojun@cvs.openbsd.org 2002/09/09 06:48:06
439 [auth1.c auth.h auth-krb5.c monitor.c monitor.h]
440 [monitor_wrap.c monitor_wrap.h]
441 kerberos support for privsep. confirmed to work by lha@stacken.kth.se
442 patch from markus
661e45a0 443 - markus@cvs.openbsd.org 2002/09/09 14:54:15
444 [channels.c kex.h key.c monitor.c monitor_wrap.c radix.c uuencode.c]
445 signed vs unsigned from -pedantic; ok henning@
87f4111f 446 - markus@cvs.openbsd.org 2002/09/10 20:24:47
447 [ssh-agent.c]
448 check the euid of the connecting process with getpeereid(2);
449 ok provos deraadt stevesk
07d688d5 450 - stevesk@cvs.openbsd.org 2002/09/11 17:55:03
451 [ssh.1]
452 add agent and X11 forwarding warning text from ssh_config.5; ok markus@
8b10e20e 453 - stevesk@cvs.openbsd.org 2002/09/11 18:27:26
454 [authfd.c authfd.h ssh.c]
455 don't connect to agent to test for presence if we've previously
456 connected; ok markus@
00b3ad3e 457 - djm@cvs.openbsd.org 2002/09/11 22:41:50
458 [sftp.1 sftp-client.c sftp-client.h sftp-common.c sftp-common.h]
459 [sftp-glob.c sftp-glob.h sftp-int.c sftp-server.c]
460 support for short/long listings and globbing in "ls"; ok markus@
be0cd512 461 - djm@cvs.openbsd.org 2002/09/12 00:13:06
462 [sftp-int.c]
463 zap unused var introduced in last commit
4f3834e8 464
ac8802eb 46520020911
466 - (djm) Sync openbsd-compat with OpenBSD -current
467
e2e36358 46820020910
469 - (djm) Bug #365: Read /.ssh/environment properly under CygWin.
470 Patch from Mark Bradshaw <bradshaw@staff.crosswalk.com>
35c4faf5 471 - (djm) Bug #138: Make protocol 1 blowfish work with old OpenSSL.
472 Patch from Robert Halubek <rob@adso.com.pl>
e2e36358 473
3445ca02 47420020905
475 - (djm) OpenBSD CVS Sync
476 - stevesk@cvs.openbsd.org 2002/09/04 18:52:42
477 [servconf.c sshd.8 sshd_config.5]
478 default LoginGraceTime to 2m; 1m may be too short for slow systems.
479 ok markus@
cbecf1ed 480 - (djm) Merge openssh-TODO.patch from Redhat (null) beta
c4ee4c60 481 - (djm) Add gnome-ssh-askpass2.c (gtk2) by merge with patch from
482 Nalin Dahyabhai <nalin@redhat.com>
3c1dff28 483 - (djm) Add support for building gtk2 password requestor from Redhat beta
3445ca02 484
954640a4 48520020903
33e2e066 486 - (djm) Patch from itojun@ for Darwin OS: test getaddrinfo, reorder libcrypt
e18b7d35 487 - (djm) Fix Redhat RPM build dependancy test
954640a4 488 - (djm) OpenBSD CVS Sync
489 - markus@cvs.openbsd.org 2002/08/12 10:46:35
490 [ssh-agent.c]
491 make ssh-agent setgid, disallow ptrace.
755c4339 492 - espie@cvs.openbsd.org 2002/08/21 11:20:59
493 [sshd.8]
494 `RSA' updated to refer to `public key', where it matters.
495 okay markus@
6e0fbda1 496 - stevesk@cvs.openbsd.org 2002/08/21 19:38:06
497 [servconf.c sshd.8 sshd_config sshd_config.5]
498 change LoginGraceTime default to 1 minute; ok mouring@ markus@
00e41835 499 - stevesk@cvs.openbsd.org 2002/08/21 20:10:28
500 [ssh-agent.c]
501 raise listen backlog; ok markus@
c1a4eef1 502 - stevesk@cvs.openbsd.org 2002/08/22 19:27:53
503 [ssh-agent.c]
504 use common close function; ok markus@
1d77f8cb 505 - stevesk@cvs.openbsd.org 2002/08/22 19:38:42
506 [clientloop.c]
507 format with current EscapeChar; bugzilla #388 from wknox@mitre.org.
508 ok markus@
f34ec885 509 - stevesk@cvs.openbsd.org 2002/08/22 20:57:19
510 [ssh-agent.c]
511 shutdown(SHUT_RDWR) not needed before close here; ok markus@
848bf884 512 - markus@cvs.openbsd.org 2002/08/22 21:33:58
513 [auth1.c auth2.c]
514 auth_root_allowed() is handled by the monitor in the privsep case,
515 so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325
6c723e7c 516 - markus@cvs.openbsd.org 2002/08/22 21:45:41
517 [session.c]
518 send signal name (not signal number) in "exit-signal" message; noticed
519 by galb@vandyke.com
b41baf4d 520 - stevesk@cvs.openbsd.org 2002/08/27 17:13:56
521 [ssh-rsa.c]
522 RSA_public_decrypt() returns -1 on error so len must be signed;
523 ok markus@
dbcdea68 524 - stevesk@cvs.openbsd.org 2002/08/27 17:18:40
525 [ssh_config.5]
526 some warning text for ForwardAgent and ForwardX11; ok markus@
ba1566dd 527 - stevesk@cvs.openbsd.org 2002/08/29 15:57:25
528 [monitor.c session.c sshlogin.c sshlogin.h]
529 pass addrlen with sockaddr *; from Hajimu UMEMOTO <ume@FreeBSD.org>
530 NOTE: there are also p-specific parts to this patch. ok markus@
e59404d1 531 - stevesk@cvs.openbsd.org 2002/08/29 16:02:54
532 [ssh.1 ssh.c]
533 deprecate -P as UsePrivilegedPort defaults to no now; ok markus@
878b8992 534 - stevesk@cvs.openbsd.org 2002/08/29 16:09:02
535 [ssh_config.5]
536 more on UsePrivilegedPort and setuid root; ok markus@
9f324470 537 - stevesk@cvs.openbsd.org 2002/08/29 19:49:42
538 [ssh.c]
539 shrink initial privilege bracket for setuid case; ok markus@
57ff5eeb 540 - stevesk@cvs.openbsd.org 2002/08/29 22:54:10
541 [ssh_config.5 sshd_config.5]
542 state XAuthLocation is a full pathname
954640a4 543
b85698ab 54420020820
545 - OpenBSD CVS Sync
546 - millert@cvs.openbsd.org 2002/08/02 14:43:15
547 [monitor.c monitor_mm.c]
548 Change mm_zalloc() sanity checks to be more in line with what
549 we do in calloc() and add a check to monitor_mm.c.
550 OK provos@ and markus@
6a342527 551 - marc@cvs.openbsd.org 2002/08/02 16:00:07
552 [ssh.1 sshd.8]
553 note that .ssh/environment is only read when
554 allowed (PermitUserEnvironment in sshd_config).
555 OK markus@
4004c2ac 556 - markus@cvs.openbsd.org 2002/08/02 21:23:41
557 [ssh-rsa.c]
558 diff is u_int (2x); ok deraadt/provos
0caf874a 559 - markus@cvs.openbsd.org 2002/08/02 22:20:30
560 [ssh-rsa.c]
561 replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser
562 for authentication; ok deraadt/djm
75cf7563 563 - aaron@cvs.openbsd.org 2002/08/08 13:50:23
564 [sshconnect1.c]
565 Use & to test if bits are set, not &&; markus@ ok.
d6097023 566 - stevesk@cvs.openbsd.org 2002/08/08 23:54:52
567 [auth.c]
568 typo in comment
36535ee6 569 - stevesk@cvs.openbsd.org 2002/08/09 17:21:42
570 [sshd_config.5]
571 use Op for mdoc conformance; from esr@golux.thyrsus.com
572 ok aaron@
b3641662 573 - stevesk@cvs.openbsd.org 2002/08/09 17:41:12
574 [sshd_config.5]
575 proxy vs. fake display
35453849 576 - stevesk@cvs.openbsd.org 2002/08/12 17:30:35
577 [ssh.1 sshd.8 sshd_config.5]
578 more PermitUserEnvironment; ok markus@
24794905 579 - stevesk@cvs.openbsd.org 2002/08/17 23:07:14
580 [ssh.1]
581 ForwardAgent has defaulted to no for over 2 years; be more clear here.
4dcbbeea 582 - stevesk@cvs.openbsd.org 2002/08/17 23:55:01
583 [ssh_config.5]
584 ordered list here
7d3b91a6 585 - (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assign
586 it to ULONG_MAX.
b85698ab 587
cd018561 58820020813
589 - (tim) [configure.ac] Display OpenSSL header/library version.
590 Patch by dtucker@zip.com.au
591
8a48a7ef 59220020731
593 - (bal) OpenBSD CVS Sync
594 - markus@cvs.openbsd.org 2002/07/24 16:11:18
595 [hostfile.c hostfile.h sshconnect.c]
596 print out all known keys for a host if we get a unknown host key,
597 see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4
598
599 the ssharp mitm tool attacks users in a similar way, so i'd like to
600 pointed out again:
601 A MITM attack is always possible if the ssh client prints:
602 The authenticity of host 'bla' can't be established.
603 (protocol version 2 with pubkey authentication allows you to detect
604 MITM attacks)
5cb5518b 605 - mouring@cvs.openbsd.org 2002/07/25 01:16:59
606 [sftp.c]
607 FallBackToRsh does not exist anywhere else. Remove it from here.
608 OK deraadt.
567a05bf 609 - markus@cvs.openbsd.org 2002/07/29 18:57:30
610 [sshconnect.c]
611 print file:line
f00bab84 612 - markus@cvs.openbsd.org 2002/07/30 17:03:55
613 [auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5]
614 add PermitUserEnvironment (off by default!); from dot@dotat.at;
615 ok provos, deraadt
8a48a7ef 616
13979d47 61720020730
618 - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de
619
d228d9dd 62020020728
621 - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar
16c4a972 622 - (stevesk) [CREDITS] solar
75131bbd 623 - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned
624 char arg.
d228d9dd 625
d40af5fa 62620020725
627 - (djm) Remove some cruft from INSTALL
d91b4743 628 - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/
d40af5fa 629
56b54901 63020020723
631 - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger.
918ffb0b 632 - (bal) sync ID w/ ssh-agent.c
516f0d7d 633 - (bal) OpenBSD Sync
634 - markus@cvs.openbsd.org 2002/07/19 15:43:33
635 [log.c log.h session.c sshd.c]
636 remove fatal cleanups after fork; based on discussions with and code
637 from solar.
5d185586 638 - stevesk@cvs.openbsd.org 2002/07/19 17:42:40
639 [ssh.c]
640 display a warning from ssh when XAuthLocation does not exist or xauth
641 returned no authentication data. ok markus@
30998af1 642 - stevesk@cvs.openbsd.org 2002/07/21 18:32:20
643 [auth-options.c]
644 unneeded includes
dbc728ff 645 - stevesk@cvs.openbsd.org 2002/07/21 18:34:43
646 [auth-options.h]
647 remove invalid comment
97686bf9 648 - markus@cvs.openbsd.org 2002/07/22 11:03:06
649 [session.c]
650 fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors;
d341742a 651 - stevesk@cvs.openbsd.org 2002/07/22 17:32:56
652 [monitor.c]
653 u_int here; ok provos@
67f04db1 654 - stevesk@cvs.openbsd.org 2002/07/23 16:03:10
655 [sshd.c]
656 utmp_len is unsigned; display error consistent with other options.
657 ok markus@
0df3a240 658 - stevesk@cvs.openbsd.org 2002/07/15 17:15:31
659 [uidswap.c]
660 little more debugging; ok markus@
d341742a 661
21c2c5cd 66220020722
663 - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk
a93bd14c 664 - (stevesk) [xmmap.c] missing prototype for fatal()
ccbb983c 665 - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync
666 with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com.
d262b7f2 667 - (bal) [configure.ac] Missing ;; from cray patch.
30eab01d 668 - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines
669 into it's own header.
ee48c949 670 - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be
671 freed by the caller; add free_pam_environment() and use it.
1d3f4ae7 672 - (stevesk) [auth-pam.c] typo in comment
21c2c5cd 673
b992432e 67420020721
675 - (stevesk) [auth-pam.c] merge cosmetic changes from solar's
676 openssh-3.4p1-owl-password-changing.diff
277f55cf 677 - (stevesk) [auth-pam.c] merge rest of solar's PAM patch;
678 PAM_NEW_AUTHTOK_REQD remains in #if 0 for now.
f7808a93 679 - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch
680 warning on pam_conv struct conversation function.
337dde6b 681 - (stevesk) [auth-pam.h] license
8565f28e 682 - (stevesk) [auth-pam.h] unneeded include
e9b2c23d 683 - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h
b992432e 684
ce88d9df 68520020720
686 - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng().
687
4379c0e5 68820020719
689 - (tim) [contrib/solaris/buildpkg.sh] create privsep user/group if needed.
690 Patch by dtucker@zip.com.au
f75ca46d 691 - (tim) [configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au
4379c0e5 692
45491100 69320020718
694 - (tim) [defines.h] Bug 313 patch by dirk.meyer@dinoex.sub.org
695 - (tim) [monitor_mm.c] add missing declaration for xmmap(). Reported
696 by ayamura@ayamura.org
1cbbe6c8 697 - (tim) [configure.ac] Bug 267 rework int64_t test.
5749e709 698 - (tim) [includes.h] Bug 267 add stdint.h
45491100 699
dd3943d0 70020020717
701 - (bal) aixbff package updated by dtucker@zip.com.au
2bf42e4a 702 - (tim) [configure.ac] change how we do paths in AC_PATH_PROGS tests
703 for autoconf 2.53. Based on a patch by jrj@purdue.edu
dd3943d0 704
8fc47887 70520020716
706 - (tim) [contrib/solaris/opensshd.in] Only kill sshd if .pid file found
707
c750d869 70820020715
709 - (bal) OpenBSD CVS Sync
710 - itojun@cvs.openbsd.org 2002/07/12 13:29:09
711 [sshconnect.c]
712 print connect failure during debugging mode.
a2f883ce 713 - markus@cvs.openbsd.org 2002/07/12 15:50:17
714 [cipher.c]
715 EVP_CIPH_CUSTOM_IV for our own rijndael
2d199535 716 - (bal) Remove unused tty defined in do_setusercontext() pointed out by
717 dtucker@zip.com.au plus a a more KNF since I am near it.
846be3f4 718 - (bal) Privsep user creation support in Solaris buildpkg.sh by
719 dtucker@zip.com.au
c750d869 720
798c5808 72120020714
722 - (tim) [Makefile.in] replace "id sshd" with "sshd -t"
4165b82e 723 - (bal/tim) [acconfig.h configure.ac monitor_mm.c servconf.c
724 openbsd-compat/Makefile.in] support compression on platforms that
725 have no/broken MAP_ANON. Moved code to openbsd-compat/xmmap.c
726 Based on patch from nalin@redhat.com of code extracted from Owl's package
5fd8087a 727 - (tim) [ssh_prng_cmds.in] Bug 323 arp -n flag doesn't exist under Solaris.
728 report by chris@by-design.net
fdebdd4f 729 - (tim) [loginrec.c] Bug 347: Fix typo (WTMPX_FILE) report by rodney@bond.net
d80063fe 730 - (tim) [loginrec.c] Bug 348: add missing found = 1; to wtmpx_islogin()
731 report by rodney@bond.net
798c5808 732
6b2a3595 73320020712
734 - (tim) [Makefile.in] quiet down install-files: and check-user:
3085601b 735 - (tim) [configure.ac] remove unused filepriv line
6b2a3595 736
249f9903 73720020710
738 - (tim) [contrib/cygwin/ssh-host-config] explicitely sets the permissions
739 on /var/empty to 755 Patch by vinschen@redhat.com
6f901f8e 740 - (bal) OpenBSD CVS Sync
741 - itojun@cvs.openbsd.org 2002/07/09 11:56:50
742 [sshconnect.c]
743 silently try next address on connect(2). markus ok
59c825e1 744 - itojun@cvs.openbsd.org 2002/07/09 11:56:27
745 [canohost.c]
746 suppress log on reverse lookup failiure, as there's no real value in
747 doing so.
748 markus ok
aab5431b 749 - itojun@cvs.openbsd.org 2002/07/09 12:04:02
750 [sshconnect.c]
751 ed static function (less warnings)
94ad46d1 752 - stevesk@cvs.openbsd.org 2002/07/09 17:46:25
753 [sshd_config.5]
754 clarify no preference ordering in protocol list; ok markus@
9bd68577 755 - itojun@cvs.openbsd.org 2002/07/10 10:28:15
756 [sshconnect.c]
757 bark if all connection attempt fails.
09683edf 758 - deraadt@cvs.openbsd.org 2002/07/10 17:53:54
759 [rijndael.c]
760 use right sizeof in memcpy; markus ok
249f9903 761
e6f15ed1 76220020709
763 - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platforms
764 lacking that concept can share it. Patch by vinschen@redhat.com
765
4f9d6706 76620020708
767 - (tim) [openssh/contrib/solaris/buildpkg.sh] add PKG_INSTALL_ROOT to
768 work in a jumpstart environment. patch by kbrint@rufus.net
b451e27b 769 - (tim) [Makefile.in] workaround for broken pakadd on some systems.
cda1ebcb 770 - (tim) [configure.ac] fix libc89 utimes test. Mention default path for
771 --with-privsep-path=
4f9d6706 772
ac74561e 77320020707
774 - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH)
94d8258b 775 - (tim) [acconfig.h configure.ac sshd.c]
776 s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/
d41f8eed 777 - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes
778 patch from vinschen@redhat.com
0b832146 779 - (bal) [realpath.c] Updated with OpenBSD tree.
da2499f5 780 - (bal) OpenBSD CVS Sync
781 - deraadt@cvs.openbsd.org 2002/07/04 04:15:33
782 [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c]
783 patch memory leaks; grendel@zeitbombe.org
e1feb9bf 784 - deraadt@cvs.openbsd.org 2002/07/04 08:12:15
785 [channels.c packet.c]
786 blah blah minor nothing as i read and re-read and re-read...
eb9f2fab 787 - markus@cvs.openbsd.org 2002/07/04 10:41:47
788 [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c]
789 don't allocate, copy, and discard if there is not interested in the data;
790 ok deraadt@
4394a17f 791 - deraadt@cvs.openbsd.org 2002/07/06 01:00:49
792 [log.c]
793 KNF
50d2fbbc 794 - deraadt@cvs.openbsd.org 2002/07/06 01:01:26
795 [ssh-keyscan.c]
796 KNF, realloc fix, and clean usage
12a3f2c3 797 - stevesk@cvs.openbsd.org 2002/07/06 17:47:58
798 [ssh-keyscan.c]
799 unused variable
41545cb6 800 - (bal) Minor KNF on ssh-keyscan.c
ac74561e 801
0764e748 80220020705
803 - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs.
804 Reported by Darren Tucker <dtucker@zip.com.au>
e12659f4 805 - (tim) [contrib/cygwin/ssh-host-config] double slash corrction
806 from vinschen@redhat.com
0764e748 807
64c0ce80 80820020704
809 - (bal) Limit data to TTY for AIX only (Newer versions can't handle the
810 faster data rate) Bug #124
375c1dee 811 - (bal) glob.c defines TILDE and AIX also defines it. #undef it first.
812 bug #265
ff2de800 813 - (bal) One too many nulls in ports-aix.c
64c0ce80 814
d2f95449 81520020703
816 - (bal) Updated contrib/cygwin/ patch by vinschen@redhat.com
619a6aff 817 - (bal) minor correction to utimes() replacement. Patch by
818 onoe@sm.sony.co.jp
f11fe301 819 - OpenBSD CVS Sync
820 - markus@cvs.openbsd.org 2002/06/27 08:49:44
821 [dh.c ssh-keyscan.c sshconnect.c]
822 more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@
181d6635 823 - deraadt@cvs.openbsd.org 2002/06/27 09:08:00
824 [monitor.c]
825 improve mm_zalloc check; markus ok
30e37ee6 826 - deraadt@cvs.openbsd.org 2002/06/27 10:35:47
827 [auth2-none.c monitor.c sftp-client.c]
828 use xfree()
c8f94200 829 - stevesk@cvs.openbsd.org 2002/06/27 19:49:08
830 [ssh-keyscan.c]
831 use convtime(); ok markus@
a64d3560 832 - millert@cvs.openbsd.org 2002/06/28 01:49:31
833 [monitor_mm.c]
834 tree(3) wants an int return value for its compare functions and
835 the difference between two pointers is not an int. Just do the
836 safest thing and store the result in a long and then return 0,
837 -1, or 1 based on that result.
405a0d43 838 - deraadt@cvs.openbsd.org 2002/06/28 01:50:37
839 [monitor_wrap.c]
840 use ssize_t
4efd85b2 841 - deraadt@cvs.openbsd.org 2002/06/28 10:08:25
842 [sshd.c]
843 range check -u option at invocation
6ded293b 844 - deraadt@cvs.openbsd.org 2002/06/28 23:05:06
845 [sshd.c]
846 gidset[2] -> gidset[1]; markus ok
7fdc56c5 847 - deraadt@cvs.openbsd.org 2002/06/30 21:54:16
848 [auth2.c session.c sshd.c]
849 lint asks that we use names that do not overlap
343288b8 850 - deraadt@cvs.openbsd.org 2002/06/30 21:59:45
851 [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c
852 monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c
853 sshconnect2.c sshd.c]
854 minor KNF
7d60d74c 855 - deraadt@cvs.openbsd.org 2002/07/01 16:15:25
856 [msg.c]
857 %u
713f6cd9 858 - markus@cvs.openbsd.org 2002/07/01 19:48:46
859 [sshconnect2.c]
860 for compression=yes, we fallback to no-compression if the server does
861 not support compression, vice versa for compression=no. ok mouring@
261189cc 862 - markus@cvs.openbsd.org 2002/07/03 09:55:38
863 [ssh-keysign.c]
864 use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld)
865 in order to avoid a possible Kocher timing attack pointed out by Charles
866 Hannum; ok provos@
60cd0a97 867 - markus@cvs.openbsd.org 2002/07/03 14:21:05
868 [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config]
869 re-enable ssh-keysign's sbit, but make ssh-keysign read
870 /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled
871 globally. based on discussions with deraadt, itojun and sommerfeld;
872 ok itojun@
56fd97d7 873 - (bal) Failed password attempts don't increment counter on AIX. Bug #145
e8aa0a5c 874 - (bal) Missed Makefile.in change. keysign needs readconf.o
0ba40daa 875 - (bal) Clean up aix_usrinfo(). Ignore TTY= period I guess.
56fd97d7 876
b2f295dc 87720020702
878 - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc &
879 friends consistently. Spotted by Solar Designer <solar@openwall.com>
880
3c3e878a 88120020629
882 - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style
883 clean up while I'm near it.
884
811ee370 88520020628
886 - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented
887 options should contain default value. from solar.
b9b82dab 888 - (bal) Cygwin uid0 fix by vinschen@redhat.com
17962c40 889 - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c. Otherwise wise
890 have issues of our fixes not propogating right (ie bcopy instead of
891 memmove). OK tim
4fa4fb00 892 - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported.
893 Bug #303
811ee370 894
ce88d9df 89520020627
d1ff09ba 896 - OpenBSD CVS Sync
897 - deraadt@cvs.openbsd.org 2002/06/26 14:49:36
898 [monitor.c]
899 correct %u
63b5f1a1 900 - deraadt@cvs.openbsd.org 2002/06/26 14:50:04
901 [monitor_fdpass.c]
902 use ssize_t for recvmsg() and sendmsg() return
1431a900 903 - markus@cvs.openbsd.org 2002/06/26 14:51:33
904 [ssh-add.c]
905 fix exit code for -X/-x
bb0640b2 906 - deraadt@cvs.openbsd.org 2002/06/26 15:00:32
907 [monitor_wrap.c]
908 more %u
20e79e98 909 - markus@cvs.openbsd.org 2002/06/26 22:27:32
910 [ssh-keysign.c]
911 bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu
d1ff09ba 912
4bfa8bb6 91320020626
914 - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM
a594fa74 915 - (bal) OpenBSD CVS Sync
916 - markus@cvs.openbsd.org 2002/06/23 21:34:07
917 [channels.c]
918 tcode is u_int
38501509 919 - markus@cvs.openbsd.org 2002/06/24 13:12:23
920 [ssh-agent.1]
921 the socket name contains ssh-agent's ppid; via mpech@ from form@
f91d9a89 922 - markus@cvs.openbsd.org 2002/06/24 14:33:27
923 [channels.c channels.h clientloop.c serverloop.c]
924 move channel counter to u_int
1169c3df 925 - markus@cvs.openbsd.org 2002/06/24 14:55:38
926 [authfile.c kex.c ssh-agent.c]
927 cat to (void) when output from buffer_get_X is ignored
09915dc1 928 - itojun@cvs.openbsd.org 2002/06/24 15:49:22
929 [msg.c]
930 printf type pedant
d0a1c5d1 931 - deraadt@cvs.openbsd.org 2002/06/24 17:57:20
932 [sftp-server.c sshpty.c]
933 explicit (u_int) for uid and gid
6c69a6a9 934 - markus@cvs.openbsd.org 2002/06/25 16:22:42
935 [authfd.c]
936 unnecessary cast
87809a1f 937 - markus@cvs.openbsd.org 2002/06/25 18:51:04
938 [sshd.c]
939 lightweight do_setusercontext after chroot()
924681ee 940 - (bal) Updated AIX package build. Patch by dtucker@zip.com.au
46c8ebb3 941 - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8
78beb77d 942 - (bal) added back in error check for mmap(). I screwed up, Pointed
943 out by stevesk@
f2d9a1f8 944 - (tim) [README.privsep] UnixWare tip no longer needed.
88cb875c 945 - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP,
946 but it all damned lies.
0d0270e6 947 - (stevesk) [README.privsep] more for sshd pseudo-account.
8029e7fc 948 - (tim) [contrib/caldera/openssh.spec] add support for privsep
8695f9f7 949 - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@
b29fe4ea 950 - (djm) OpenBSD CVS Sync
951 - markus@cvs.openbsd.org 2002/06/26 08:53:12
952 [bufaux.c]
953 limit size of BNs to 8KB; ok provos/deraadt
22d62d31 954 - markus@cvs.openbsd.org 2002/06/26 08:54:18
955 [buffer.c]
956 limit append to 1MB and buffers to 10MB
5df8c731 957 - markus@cvs.openbsd.org 2002/06/26 08:55:02
958 [channels.c]
959 limit # of channels to 10000
87f18810 960 - markus@cvs.openbsd.org 2002/06/26 08:58:26
961 [session.c]
962 limit # of env vars to 1000; ok deraadt/djm
2f095a0e 963 - deraadt@cvs.openbsd.org 2002/06/26 13:20:57
964 [monitor.c]
965 be careful in mm_zalloc
66087567 966 - deraadt@cvs.openbsd.org 2002/06/26 13:49:26
967 [session.c]
968 disclose less information from environment files; based on input
969 from djm, and dschultz@uclink.Berkeley.EDU
477edc5d 970 - markus@cvs.openbsd.org 2002/06/26 13:55:37
971 [auth2-chall.c]
972 make sure # of response matches # of queries, fixes int overflow;
973 from ISS
03b14b6f 974 - markus@cvs.openbsd.org 2002/06/26 13:56:27
975 [version.h]
976 3.4
9c696d0d 977 - (djm) Require krb5 devel for RPM build w/ KrbV
c4186be7 978 - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai
979 <nalin@redhat.com>
1e7bc74c 980 - (djm) Update spec files for release
49b53b03 981 - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS
03b14b6f 982 - (djm) Release 3.4p1
6519cfd6 983 - (tim) [contrib/caldera/openssh.spec] remove 2 configure options I put in
984 by mistake
4bfa8bb6 985
ef1ac12b 98620020625
987 - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh
1a44c6f7 988 - (stevesk) [README.privsep] minor updates
fd3cbf67 989 - (djm) Create privsep directory and warn if privsep user is missing
990 during make install
702b2855 991 - (bal) Started list of PrivSep issues in TODO
1c6249af 992 - (bal) if mmap() is substandard, don't allow compression on server side.
993 Post 'event' we will add more options.
cbaa3d44 994 - (tim) [contrib/caldera/openssh.spec] Sync with Caldera
e2bc41f9 995 - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by
996 dtucker@zip.com.au
d170feb1 997 - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus
998 for Cygwin, Cray, & SCO
ef1ac12b 999
d5803314 100020020624
1001 - OpenBSD CVS Sync
1002 - deraadt@cvs.openbsd.org 2002/06/23 03:25:50
1003 [tildexpand.c]
1004 KNF
3ddc795d 1005 - deraadt@cvs.openbsd.org 2002/06/23 03:26:19
1006 [cipher.c key.c]
1007 KNF
d6133f43 1008 - deraadt@cvs.openbsd.org 2002/06/23 03:30:58
1009 [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c
1010 sshpty.c]
1011 various KNF and %d for unsigned
9906a836 1012 - deraadt@cvs.openbsd.org 2002/06/23 09:30:14
1013 [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c
1014 sftp.c]
1015 bunch of u_int vs int stuff
512df038 1016 - deraadt@cvs.openbsd.org 2002/06/23 09:39:55
1017 [ssh-keygen.c]
1018 u_int stuff
7528d467 1019 - deraadt@cvs.openbsd.org 2002/06/23 09:46:51
1020 [bufaux.c servconf.c]
1021 minor KNF. things the fingers do while you read
e424e241 1022 - deraadt@cvs.openbsd.org 2002/06/23 10:29:52
1023 [ssh-agent.c sshd.c]
1024 some minor KNF and %u
7138ebd9 1025 - deraadt@cvs.openbsd.org 2002/06/23 20:39:45
1026 [session.c]
1027 compression_level is u_int
f09ce20a 1028 - deraadt@cvs.openbsd.org 2002/06/23 21:06:13
1029 [sshpty.c]
1030 KNF
57f228e8 1031 - deraadt@cvs.openbsd.org 2002/06/23 21:06:41
1032 [channels.c channels.h session.c session.h]
1033 display, screen, row, col, xpixel, ypixel are u_int; markus ok
0bc50167 1034 - deraadt@cvs.openbsd.org 2002/06/23 21:10:02
1035 [packet.c]
1036 packet_get_int() returns unsigned for reason & seqnr
57f228e8 1037 - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col,
1038 xpixel are u_int.
1039
d5803314 1040
58177c0a 104120020623
1042 - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX.
dc43acd2 1043 - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset.
ef3912be 1044 - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au
a8bbdc75 1045 - OpenBSD CVS Sync
1046 - stevesk@cvs.openbsd.org 2002/06/22 02:00:29
1047 [ssh.h]
1048 correct comment
1ae02182 1049 - stevesk@cvs.openbsd.org 2002/06/22 02:40:23
1050 [ssh.1]
1051 section 5 not 4 for ssh_config
b2843ec6 1052 - naddy@cvs.openbsd.org 2002/06/22 11:51:39
1053 [ssh.1]
1054 typo
75653d3e 1055 - stevesk@cvs.openbsd.org 2002/06/22 16:32:54
1056 [sshd.8]
1057 add /var/empty in FILES section
a56313d7 1058 - stevesk@cvs.openbsd.org 2002/06/22 16:40:19
1059 [sshd.c]
1060 check /var/empty owner mode; ok provos@
e4e83d70 1061 - stevesk@cvs.openbsd.org 2002/06/22 16:41:57
1062 [scp.1]
1063 typo
baa08b92 1064 - stevesk@cvs.openbsd.org 2002/06/22 16:45:29
1065 [ssh-agent.1 sshd.8 sshd_config.5]
1066 use process ID vs. pid/PID/process identifier
c28876e9 1067 - stevesk@cvs.openbsd.org 2002/06/22 20:05:27
1068 [sshd.c]
1069 don't call setsid() if debugging or run from inetd; no "Operation not
1070 permitted" errors now; ok millert@ markus@
d17ef027 1071 - stevesk@cvs.openbsd.org 2002/06/22 23:09:51
1072 [monitor.c]
1073 save auth method before monitor_reset_key_state(); bugzilla bug #284;
1074 ok provos@
58177c0a 1075
0b202697 1076$Id$
This page took 0.464324 seconds and 5 git commands to generate.