]> andersk Git - openssh.git/blame - ChangeLog
- markus@cvs.openbsd.org 2003/06/23 09:02:44
[openssh.git] / ChangeLog
CommitLineData
f0677b69 120030628
2 - (dtucker) OpenBSD CVS Sync
3 - markus@cvs.openbsd.org 2003/06/23 09:02:44
4 [ssh_config.5]
5 document EnableSSHKeysign; bugzilla #599; ok deraadt@, jmc@
6
e15ba28b 720030624
8 - (dtucker) Have configure refer the user to config.log and
9 contrib/findssl.sh for OpenSSL header/library mismatches.
10
63a556df 1120030622
c1ffd4bd 12 - (dtucker) OpenBSD CVS Sync
63a556df 13 - markus@cvs.openbsd.org 2003/06/21 09:14:05
c1ffd4bd 14 [regress/reconfigure.sh]
63a556df 15 missing $SUDO; from dtucker@zip.com.au
93527718 16 - markus@cvs.openbsd.org 2003/06/18 11:28:11
c1ffd4bd 17 [ssh-rsa.c]
18 backout last change, since it violates pkcs#1
19 switch to share/misc/license.template
1891396b 20 - djm@cvs.openbsd.org 2003/06/20 05:47:58
21 [sshd_config.5]
22 sync description of protocol 2 cipher proposal; ok markus
4db4d313 23 - djm@cvs.openbsd.org 2003/06/20 05:48:21
24 [sshd_config]
25 sync some implemented options; ok markus@
63a556df 26 - (dtucker) [regress/authorized_keys_root] Remove temp data file from CVS.
39ef3618 27 - (dtucker) [openbsd-compat/setproctitle.c] Ensure SPT_TYPE is defined before
28 testing its value.
63a556df 29
b8e04133 3020030618
31 - (djm) OpenBSD CVS Sync
32 - markus@cvs.openbsd.org 2003/06/12 07:57:38
33 [monitor.c sshlogin.c sshpty.c]
34 typos; dtucker at zip.com.au
b9ad9d13 35 - djm@cvs.openbsd.org 2003/06/12 12:22:47
36 [LICENCE]
37 mention more copyright holders; ok markus@
1fb23629 38 - nino@cvs.openbsd.org 2003/06/12 15:34:09
39 [scp.c]
40 Typo. Ok markus@.
244e796f 41 - markus@cvs.openbsd.org 2003/06/12 19:12:03
42 [scard.c scard.h ssh-agent.c ssh.c]
43 add sc_get_key_label; larsch at trustcenter.de; bugzilla#591
9250058a 44 - markus@cvs.openbsd.org 2003/06/16 08:22:35
45 [ssh-rsa.c]
46 make sure the signature has at least the expected length (don't
47 insist on len == hlen + oidlen, since this breaks some smartcards)
48 bugzilla #592; ok djm@
360a4aae 49 - markus@cvs.openbsd.org 2003/06/16 10:22:45
50 [ssh-add.c]
51 print out key comment on each prompt; make ssh-askpass more useable; ok djm@
0a59bd6b 52 - markus@cvs.openbsd.org 2003/06/17 18:14:23
53 [cipher-ctr.c]
54 use license from /usr/share/misc/license.template for new code
1d6c0b69 55 - (dtucker) [reconfigure.sh rekey.sh sftp-badcmds.sh]
56 Import new regression tests from OpenBSD
d4d84f5f 57 - (dtucker) [regress/copy.1 regress/copy.2] Remove temp data files from CVS.
ed49cc81 58 - (dtucker) OpenBSD CVS Sync (regress/)
59 - markus@cvs.openbsd.org 2003/04/02 12:21:13
60 [Makefile]
61 enable rekey test
2c670155 62 - djm@cvs.openbsd.org 2003/04/04 09:34:22
63 [Makefile sftp-cmds.sh]
64 More regression tests, including recent directory rename bug; ok markus@
737447ad 65 - markus@cvs.openbsd.org 2003/05/14 22:08:27
66 [ssh-com-client.sh ssh-com-keygen.sh ssh-com-sftp.sh ssh-com.sh]
67 test against some new commerical versions
68df2aa0 68 - mouring@cvs.openbsd.org 2003/05/15 04:07:12
69 [sftp-cmds.sh]
70 Advanced put/get testing for sftp. OK @djm
eb9bf761 71 - markus@cvs.openbsd.org 2003/06/12 15:40:01
72 [try-ciphers.sh]
73 add ctr
39c0191e 74 - markus@cvs.openbsd.org 2003/06/12 15:43:32
75 [Makefile]
76 test -HUP; dtucker at zip.com.au
b8e04133 77
f5827134 7820030614
79 - (djm) Update license on fake-rfc2553.[ch]; ok itojun@
80
be193d89 8120030611
c12c6ef8 82 - (djm) Mention portable copyright holders in LICENSE
e52ca1e5 83 - (djm) Put licenses on substantial header files
8cb3fa9d 84 - (djm) Sync LICENSE against OpenBSD
be193d89 85 - (djm) OpenBSD CVS Sync
86 - jmc@cvs.openbsd.org 2003/06/10 09:12:11
87 [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5]
88 [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
89 - section reorder
90 - COMPATIBILITY merge
91 - macro cleanup
92 - kill whitespace at EOL
93 - new sentence, new line
94 ssh pages ok markus@
0daa6547 95 - deraadt@cvs.openbsd.org 2003/06/10 22:20:52
96 [packet.c progressmeter.c]
97 mostly ansi cleanup; pval ok
1432b5c4 98 - jakob@cvs.openbsd.org 2003/06/11 10:16:16
99 [sshconnect.c]
100 clean up check_host_key() and improve SSHFP feedback. ok markus@
cc263107 101 - jakob@cvs.openbsd.org 2003/06/11 10:18:47
102 [dns.c]
103 sync with check_host_key() change
ca719034 104 - djm@cvs.openbsd.org 2003/06/11 11:18:38
105 [authfd.c authfd.h ssh-add.c ssh-agent.c]
106 make agent constraints (lifetime, confirm) work with smartcard keys;
107 ok markus@
be193d89 108
109
8a547250 11020030609
111 - (djm) Sync README.smartcard with OpenBSD -current
a1864983 112 - (djm) Re-merge OpenSC info into README.smartcard
8a547250 113
f5db6a03 11420030606
115 - (dtucker) [uidswap.c] Fix setreuid and add missing args to fatal(). ok djm@
116
02e2a074 11720030605
118 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
119 canohost.c changes.
688eed4a 120 - (djm) Implement paranoid priv dropping checks, based on:
121 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
122 Proceedings of USENIX Security Symposium 2002
d6bd2b5a 123 - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
52d58495 124 - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
57c917f8 125 - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
126 Patch from larsch@trustcenter.de
7b7f164b 127 - (djm) Bug #589 - scard-opensc: load only keys with a private keys
128 Patch from larsch@trustcenter.de
4ed465ec 129 - (dtucker) Add includes.h to fake-rfc2553.c so it will build.
e932f447 130 - (dtucker) Define EAI_NONAME in fake-rfc2553.h (used by fake-rfc2553.c).
02e2a074 131
b08a39ff 13220030604
d60e487c 133 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
134 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
8acdec60 135 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
11f1e60e 136 Patch from larsch@trustcenter.de; ok markus@
137 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
138 larsch@trustcenter.de; ok markus@
d453a600 139 - (djm) OpenBSD CVS Sync
140 - djm@cvs.openbsd.org 2003/06/04 08:25:18
141 [sshconnect.c]
142 disable challenge/response and keyboard-interactive auth methods
143 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
144 bz #580; ok markus@
ee50371d 145 - djm@cvs.openbsd.org 2003/06/04 10:23:48
146 [sshd.c]
147 remove duplicated group-dropping code; ok markus@
b08a39ff 148 - djm@cvs.openbsd.org 2003/06/04 12:03:59
149 [serverloop.c]
150 remove bitrotten commet; ok markus@
cf3248b8 151 - djm@cvs.openbsd.org 2003/06/04 12:18:49
152 [scp.c]
153 ansify; ok markus@
0f764b2f 154 - djm@cvs.openbsd.org 2003/06/04 12:40:39
155 [scp.c]
156 kill ssh process upon receipt of signal, bz #241.
157 based on patch from esb AT hawaii.edu; ok markus@
1b558925 158 - djm@cvs.openbsd.org 2003/06/04 12:41:22
159 [sftp.c]
160 kill ssh process on receipt of signal; ok markus@
fba33e81 161 - (djm) Update to fix of bug #584: lock card before return.
162 From larsch@trustcenter.de
8d9bb5dd 163 - (djm) Always use mysignal() for SIGALRM
d60e487c 164
3a2b2b44 16520030603
166 - (djm) Replace setproctitle replacement with code derived from
167 UCB sendmail
c5a7d788 168 - (djm) OpenBSD CVS Sync
169 - markus@cvs.openbsd.org 2003/06/02 09:17:34
170 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
171 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
172 [sshd_config.5]
173 deprecate VerifyReverseMapping since it's dangerous if combined
174 with IP based access control as noted by Mike Harding; replace with
175 a UseDNS option, UseDNS is on by default and includes the
176 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
177 ok deraadt@, djm@
d981089c 178 - millert@cvs.openbsd.org 2003/06/03 02:56:16
179 [scp.c]
180 Remove the advertising clause in the UCB license which Berkeley
181 rescinded 22 July 1999. Proofed by myself and Theo.
c5a7d788 182 - (djm) Fix portable-specific uses of verify_reverse_mapping too
3e67f7df 183 - (djm) Sync openbsd-compat with OpenBSD CVS.
484d59c7 184 - No more 4-term BSD licenses in linked code
5d8ca8c7 185 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
3a2b2b44 186
aff561f9 18720030602
188 - (djm) Fix segv from bad reordering in auth-pam.c
416c732d 189 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
190 clobber
1b7342ab 191 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
192 CVS ID.
8862e142 193 - (djm) Remove "noip6" option from RedHat spec file. This may now be
194 set at runtime using AddressFamily option.
58ba3cb7 195 - (djm) Fix use of macro before #define in cipher-aes.c
382fe2fa 196 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
b0545fe6 197 - (djm) OpenBSD CVS Sync
198 - djm@cvs.openbsd.org 2003/05/26 12:54:40
199 [sshconnect.c]
200 fix format strings; ok markus@
fa5120a0 201 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
202 [sshd.c uidswap.c]
203 seteuid and setegid; markus ok
0f92946c 204 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
205 [ssh_config.5]
206 VerifyHostKeyDNS is v2 only. ok markus@
aff561f9 207
4f178be8 20820030530
209 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
210 roumenpetrov.info
eabb99c6 211 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
4f178be8 212
4881aebb 21320030526
214 - (djm) Avoid auth2-chall.c warning when compiling without
215 PAM, BSD_AUTH and SKEY
216
5b0fe364 21720030525
218- (djm) OpenBSD CVS Sync
219 - djm@cvs.openbsd.org 2003/05/24 09:02:22
220 [log.c]
221 pass logged data through strnvis; ok markus
b9ed513a 222 - djm@cvs.openbsd.org 2003/05/24 09:30:40
223 [authfile.c monitor.c sftp-common.c sshpty.c]
224 cast some types for printing; ok markus@
5b0fe364 225
44c78996 22620030524
227 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
228
d83ebe4a 22920030523
230 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
231 encoding (which encodes many more characters)
bd47824b 232 - OpenBSD CVS Sync
233 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
234 [sftp.1]
235 - new sentence, new line
236 - added .Xr's
237 - typos
238 ok djm@
3cbc677d 239 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
240 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
241 new sentence, new line
da54f5be 242 - djm@cvs.openbsd.org 2003/05/23 08:29:30
243 [sshconnect.c]
244 fix leak; ok markus@
d83ebe4a 245
c453493f 24620030520
247 - (djm) OpenBSD CVS Sync
248 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
249 [log.c]
250 use syslog_r() in a signal handler called place; markus ok
79d4fc55 251 - (djm) Configure logic to detect syslog_r and friends
c453493f 252
acb50584 25320030519
254 - (djm) Sync auth-pam.h with what we actually implement
255
25620030518
5ff453c0 257 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
258 recent merge
f811e52a 259 - (djm) OpenBSD CVS Sync
260 - djm@cvs.openbsd.org 2003/05/16 03:27:12
261 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
262 add AddressFamily option to ssh_config (like -4, -6 on commandline).
263 Portable bug #534; ok markus@
013b1214 264 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
265 [auth-rhosts.c]
266 just in case, put numbers to sscanf %s arg.
25b66522 267 - markus@cvs.openbsd.org 2003/05/17 04:27:52
268 [cipher.c cipher-ctr.c myproposal.h]
269 experimental support for aes-ctr modes from
270 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
271 ok djm@
25351757 272 - (djm) Remove IPv4 by default hack now that we can specify AF in config
3bf784bc 273 - (djm) Tidy and trim TODO
bffa6723 274 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
9901cb37 275 - (djm) Big KNF on openbsd-compat/
f1da2b8b 276 - (djm) KNF on md5crypt.[ch]
277 - (djm) KNF on auth-sia.[ch]
5ff453c0 278
f123055b 27920030517
280 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
281
c936c243 28220030516
283 - (djm) OpenBSD CVS Sync
284 - djm@cvs.openbsd.org 2003/05/15 13:52:10
285 [ssh.c]
286 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
287 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
a2144546 288 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
289 [readconf.c servconf.c]
290 warn for unsupported config option. ok markus@
5bdfde81 291 - markus@cvs.openbsd.org 2003/05/15 14:09:21
292 [auth2-krb5.c]
293 fix 64bit issue; report itojun@
09ab3296 294 - djm@cvs.openbsd.org 2003/05/15 14:55:25
295 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
296 add a ConnectTimeout option to ssh, based on patch from
297 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
b06b11ad 298 - (djm) Add warning for UsePAM when built without PAM support
7be625e1 299 - (djm) A few type mismatch fixes from Bug #565
0eb6370a 300 - (djm) Guard free_pam_environment against NULL argument. Works around
301 HP/UX PAM problems debugged by dtucker
c936c243 302
7efc7f57 30320030515
304 - (djm) OpenBSD CVS Sync
305 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
306 [ssh-agent.1]
307 setup -> set up;
308 from wiz@netbsd
21289cd0 309 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
310 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
311 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
312 add experimental support for verifying hos keys using DNS as described
313 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
314 ok markus@ and henning@
16a79097 315 - markus@cvs.openbsd.org 2003/05/14 22:24:42
316 [clientloop.c session.c ssh.1]
317 allow to send a BREAK to the remote system; ok various
b8c2031b 318 - markus@cvs.openbsd.org 2003/05/15 00:28:28
319 [sshconnect2.c]
320 cleanup unregister of per-method packet handlers; ok djm@
d0ec7f42 321 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
322 [readconf.c readconf.h servconf.c servconf.h]
323 always parse kerberos options. ok djm@ markus@
b414a17b 324 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
325 [dns.c]
326 add missing freerrset
3b6e3da9 327 - markus@cvs.openbsd.org 2003/05/15 03:08:29
328 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
329 split out custom EVP ciphers
02159d9b 330 - djm@cvs.openbsd.org 2003/05/15 03:10:52
331 [ssh-keygen.c]
332 avoid warning; ok jakob@
4a26f5c5 333 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
334 [sftp-int.c]
335 Make put/get (globed and nonglobed) code more consistant. OK djm@
c44f10c6 336 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
dc69f53c 337 [sftp-int.c sftp.c]
c44f10c6 338 Teach ls how to display multiple column display and allow users
339 to return to single column format via 'ls -1'. OK @djm
1457e7ff 340 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
341 [readconf.c servconf.c]
342 disable kerberos when not supported. ok markus@
861f0365 343 - markus@cvs.openbsd.org 2003/05/15 04:08:41
344 [ssh.1]
345 ~B is ssh2 only
d0ec7f42 346 - (djm) Always parse UsePAM
3e05e934 347 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
4460d509 348 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
86ee6794 349 - (djm) Tidy Makefile clean targets
2636769c 350 - (djm) Adapt README.dns for portable
2d2e4a34 351 - (djm) Avoid uuencode.c warnings
1457e7ff 352 - (djm) Enable UsePAM when built --with-pam
67467c30 353 - (djm) Only build getrrsetbyname replacement when using --with-dns
f420d2ba 354 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
355 correctly)
3c49ef10 356 - (djm) Bug #444: Wrong paths after reconfigure
321735c7 357 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
f420d2ba 358
dd3ebb5a 35920030514
360 - (djm) Bug #117: Don't lie to PAM about username
0608f8a7 361 - (djm) RCSID sync w/ OpenBSD
204fde99 362 - (djm) OpenBSD CVS Sync
363 - djm@cvs.openbsd.org 2003/04/09 12:00:37
364 [readconf.c]
365 strip trailing whitespace from config lines before parsing.
366 Fixes bz 528; ok markus@
18ae3c67 367 - markus@cvs.openbsd.org 2003/04/12 10:13:57
368 [cipher.c]
369 hide cipher details; ok djm@
45c42d58 370 - markus@cvs.openbsd.org 2003/04/12 10:15:36
371 [misc.c]
372 debug->debug2
c825cd79 373 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
374 [ssh.1]
375 document -V switch, fix wording; ok markus@
3e131a6d 376 - markus@cvs.openbsd.org 2003/04/14 14:17:50
377 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
378 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
927e9f8b 379 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
380 [sftp-int.c]
381 Missing globfree(&g) in process_put() spotted by Vince Brimhall
382 <VBrimhall@novell.com>. ok@ Theo
383 - markus@cvs.openbsd.org 2003/04/16 14:35:27
384 [auth.h]
385 document struct Authctxt; with solar
b9e5aff6 386 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
387 [ssh-keyscan.c]
388 -t in usage(); rogier@quaak.org
9a26a6e2 389 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
390 [sshd.8 sshd_config.5]
391 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
392 Bug #550 and * escaping suggested by jmc@.
09dc8896 393 - david@cvs.openbsd.org 2003/04/30 20:41:07
394 [sshd.8]
395 fix invalid .Pf macro usage introduced in previous commit
396 ok jmc@ mouring@
3566c73c 397 - markus@cvs.openbsd.org 2003/05/11 16:56:48
398 [authfile.c ssh-keygen.c]
399 change key_load_public to try to read a public from:
400 rsa1 private or rsa1 public and ssh2 keys.
401 this makes ssh-keygen -e fail for ssh1 keys more gracefully
402 for example; report from itojun (netbsd pr 20550).
0d942eff 403 - markus@cvs.openbsd.org 2003/05/11 20:30:25
404 [channels.c clientloop.c serverloop.c session.c ssh.c]
405 make channel_new() strdup the 'remote_name' (not the caller); ok theo
43348518 406 - markus@cvs.openbsd.org 2003/05/12 16:55:37
407 [sshconnect2.c]
408 for pubkey authentication try the user keys in the following order:
409 1. agent keys that are found in the config file
410 2. other agent keys
411 3. keys that are only listed in the config file
412 this helps when an agent has many keys, where the server might
413 close the connection before the correct key is used. report & ok pb@
dc109cfe 414 - markus@cvs.openbsd.org 2003/05/12 18:35:18
415 [ssh-keyscan.1]
416 typo: DSA keys are of type ssh-dss; Brian Poole
81466908 417 - markus@cvs.openbsd.org 2003/05/14 00:52:59
418 [ssh2.h]
419 ranges for per auth method messages
420 - djm@cvs.openbsd.org 2003/05/14 01:00:44
421 [sftp.1]
422 emphasise the batchmode functionality and make reference to pubkey auth,
423 both of which are FAQs; ok markus@
802e01b8 424 - markus@cvs.openbsd.org 2003/05/14 02:15:47
425 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
426 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
427 server interops with commercial client; ok jakob@ djm@
72c5fe79 428 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
429 [sftp.1]
430 - better formatting in SYNOPSIS
431 - whitespace at EOL
432 ok djm@
3a39206f 433 - markus@cvs.openbsd.org 2003/05/14 08:57:49
434 [monitor.c]
435 http://bugzilla.mindrot.org/show_bug.cgi?id=560
436 Privsep child continues to run after monitor killed.
437 Pass monitor signals through to child; Darren Tucker
751092f9 438 - (djm) Make portable build with MIT krb5 (some issues remain)
7fceb20d 439 - (djm) Add new UsePAM configuration directive to allow runtime control
440 over usage of PAM. This allows non-root use of sshd when built with
441 --with-pam
817e6d38 442 - (djm) Die screaming if start_pam() is called when UsePAM=no
83ccf11a 443 - (djm) Avoid KrbV leak for MIT Kerberos
b1848832 444 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
fa065de2 445 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
dd3ebb5a 446
91f3aa9b 44720030512
448 - (djm) Redhat spec: Don't install profile.d scripts when not
449 building with GNOME/GTK askpass (patch from bet@rahul.net)
450
5def520a 45120030510
452 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
453 "make install". Patch by roth@feep.net.
ad84c479 454 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
455 problem on Linux (fixes "could not set controlling tty" errors).
05114c74 456 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
457 proper challenge-response module
23ab1f36 458 - (djm) 2-clause license on loginrec.c, with permission from
459 andre@ae-35.com
5def520a 460
43ce025d 46120030504
dd594f99 462 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
463 Patch from vinschen@redhat.com.
43ce025d 464
2cd5dbba 46520030503
466 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
467 by wendyp@cray.com.
468
bf7c1e6c 46920030502
470 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
471 privsep should now work.
73d9dad3 472 - (dtucker) Move handling of bad password authentications into a platform
990278ef 473 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
bf7c1e6c 474
68ece370 47520030429
476 - (djm) Add back radix.o (used by AFS support), after it went missing from
477 Makefile many moons ago
478 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
479 - (djm) Fix blibpath specification for AIX/gcc
480 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
481
ded9dd18 48220030428
483 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
484 hacked code.
485
aceb0423 48620030427
487 - (bal) Bug #541: return; was dropped by mistake. Reported by
488 furrier@iglou.com
c8a50a34 489 - (bal) Since we don't support platforms lacking u_int_64. We may
490 as well clean out some of those evil #ifdefs
9a6fee8b 491 - (bal) auth1.c minor resync while looking at the code.
d7cf277b 492 - (bal) auth2.c same changed as above.
aceb0423 493
0a626302 49420030409
495 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
496 from matth@eecs.berkeley.edu
d35929b5 497 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
ffd7b36b 498 - (djm) OpenBSD CVS Sync
499 - markus@cvs.openbsd.org 2003/04/02 09:48:07
500 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
501 [readconf.h serverloop.c sshconnect2.c]
502 reapply rekeying chage, tested by henning@, ok djm@
16f1b5ca 503 - markus@cvs.openbsd.org 2003/04/02 14:36:26
504 [ssh-keysign.c]
505 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
6c1bc5c5 506 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
507 [progressmeter.c]
508 $OpenBSD$
509 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
510 [progressmeter.c]
511 remove $OpenBSD$, as other *.c does not have it.
806e4c11 512 - markus@cvs.openbsd.org 2003/04/07 08:29:57
513 [monitor_wrap.c]
514 typo: get correct counters; introduced during rekeying change.
2f5b2528 515 - millert@cvs.openbsd.org 2003/04/07 21:58:05
516 [progressmeter.c]
517 The UCB copyright here is incorrect. This code did not originate
518 at UCB, it was written by Luke Mewburn. Updated the copyright at
519 the author's request. markus@ OK
520 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
521 [*.c *.h]
522 rename log() into logit() to avoid name conflict. markus ok, from
523 netbsd
524 - (djm) XXX - Performed locally using:
525 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
70e1f62f 526 - hin@cvs.openbsd.org 2003/04/09 08:23:52
527 [servconf.c]
528 Don't include <krb.h> when compiling with Kerberos 5 support
2f5b2528 529 - (djm) Fix up missing include for packet.c
a3568201 530 - (djm) Fix missed log => logit occurance (reference by function pointer)
0a626302 531
4d0cb2e5 53220030402
533 - (bal) if IP_TOS is not found or broken don't try to compile in
534 packet_set_tos() function call. bug #527
535
a4e5acef 53620030401
537 - (djm) OpenBSD CVS Sync
538 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
539 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
540 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
541 - killed whitespace
542 - new sentence new line
543 - .Bk for arguments
544 ok markus@
177f584b 545 - markus@cvs.openbsd.org 2003/04/01 10:10:23
546 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
547 [readconf.h serverloop.c sshconnect2.c]
548 rekeying bugfixes and automatic rekeying:
549 * both client and server rekey _automatically_
550 (a) after 2^31 packets, because after 2^32 packets
551 the sequence number for packets wraps
552 (b) after 2^(blocksize_in_bits/4) blocks
553 (see: draft-ietf-secsh-newmodes-00.txt)
554 (a) and (b) are _enabled_ by default, and only disabled for known
555 openssh versions, that don't support rekeying properly.
556 * client option 'RekeyLimit'
557 * do not reply to requests during rekeying
558 - markus@cvs.openbsd.org 2003/04/01 10:22:21
559 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
560 [readconf.h serverloop.c sshconnect2.c]
561 backout rekeying changes (for 3.6.1)
519bdfe8 562 - markus@cvs.openbsd.org 2003/04/01 10:31:26
563 [compat.c compat.h kex.c]
564 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
565 tested by ho@ and myself
9dd240a3 566 - markus@cvs.openbsd.org 2003/04/01 10:56:46
567 [version.h]
568 3.6.1
ac01b518 569 - (djm) Crank spec file versions
b32453fe 570 - (djm) Release 3.6.1p1
a4e5acef 571
fd77a40f 57220030326
573 - (djm) OpenBSD CVS Sync
574 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
575 [sftp-server.c]
576 one last fix to the tree: race fix broke stuff; pr 3169;
577 srp@srparish.net, help from djm
578
8021857c 57920030325
580 - (djm) Fix getpeerid support for 64 bit BE systems. From
581 Arnd Bergmann <arndb@de.ibm.com>
582
cdb64c4d 58320030324
584 - (djm) OpenBSD CVS Sync
585 - markus@cvs.openbsd.org 2003/03/23 19:02:00
586 [monitor.c]
587 unbreak rekeying for privsep; ok millert@
588 - Release 3.6p1
62086365 589 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
590 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
cdb64c4d 591
0b202697 592$Id$
This page took 0.382496 seconds and 5 git commands to generate.