]>
Commit | Line | Data |
---|---|---|
378d9956 | 1 | 20021222 |
2 | - (bal) OpenBSD CVS Sync | |
3 | - fgsch@cvs.openbsd.org 2002/11/15 10:03:09 | |
4 | [authfile.c] | |
5 | lseek(2) may return -1 when getting the public/private key lenght. | |
6 | Simplify the code and check for errors using fstat(2). | |
7 | ||
8 | Problem reported by Mauricio Sanchez, markus@ ok. | |
3c93c917 | 9 | - markus@cvs.openbsd.org 2002/11/18 16:43:44 |
10 | [clientloop.c] | |
11 | don't overwrite SIG{INT,QUIT,TERM} handler if set to SIG_IGN; | |
12 | e.g. if ssh is used for backup; report Joerg Schilling; ok millert@ | |
35efb24c | 13 | - markus@cvs.openbsd.org 2002/11/21 22:22:50 |
14 | [dh.c] | |
15 | debug->debug2 | |
a77673cc | 16 | - markus@cvs.openbsd.org 2002/11/21 22:45:31 |
17 | [cipher.c kex.c packet.c sshconnect.c sshconnect2.c] | |
18 | debug->debug2, unify debug messages | |
b77a87e5 | 19 | - deraadt@cvs.openbsd.org 2002/11/21 23:03:51 |
20 | [auth-krb5.c auth1.c hostfile.h monitor_wrap.c sftp-client.c sftp-int.c ssh-add.c ssh-rsa.c | |
21 | sshconnect.c] | |
22 | KNF | |
83bbc162 | 23 | - markus@cvs.openbsd.org 2002/11/21 23:04:33 |
24 | [ssh.c] | |
25 | debug->debug2 | |
eef52fa7 | 26 | - stevesk@cvs.openbsd.org 2002/11/24 21:46:24 |
27 | [ssh-keysign.8] | |
28 | typo: "the the" | |
6d58d81e | 29 | - wcobb@cvs.openbsd.org 2002/11/26 00:45:03 |
30 | [scp.c ssh-keygen.c] | |
31 | Remove unnecessary fflush(stderr) calls, stderr is unbuffered by default. | |
32 | ok markus@ | |
63baa058 | 33 | - stevesk@cvs.openbsd.org 2002/11/26 02:35:30 |
34 | [ssh-keygen.1] | |
35 | remove outdated statement; ok markus@ deraadt@ | |
649bb60b | 36 | - stevesk@cvs.openbsd.org 2002/11/26 02:38:54 |
37 | [canohost.c] | |
38 | KNF, comment and error message repair; ok markus@ | |
15748b4d | 39 | - markus@cvs.openbsd.org 2002/11/27 17:53:35 |
40 | [scp.c sftp.c ssh.c] | |
41 | allow usernames with embedded '@', e.g. scp user@vhost@realhost:file /tmp; | |
42 | http://bugzilla.mindrot.org/show_bug.cgi?id=447; ok mouring@, millert@ | |
fe661d8f | 43 | - stevesk@cvs.openbsd.org 2002/12/04 04:36:47 |
44 | [session.c] | |
45 | remove xauth entries before add; PR 2994 from janjaap@stack.nl. | |
46 | ok markus@ | |
378d9956 | 47 | |
a76550cf | 48 | 20021205 |
49 | - (djm) PERL-free fixpaths from stuge-openssh-unix-dev@cdy.org | |
50 | ||
d9a4e55b | 51 | 20021122 |
52 | - (tim) [configure.ac] fix STDPATH test for IRIX. First reported by | |
53 | advax@triumf.ca. This type of solution tested by <herb@sgi.com> | |
54 | ||
f825dbf4 | 55 | 20021113 |
56 | - (tim) [configure.ac] remove unused variables no_libsocket and no_libnsl | |
57 | ||
17d429bb | 58 | 20021111 |
59 | - (tim) [contrib/solaris/opensshd.in] add umask 022 so sshd.pid is | |
60 | not world writable. | |
61 | ||
c9826b28 | 62 | 20021109 |
63 | - (bal) OpenBSD CVS Sync | |
64 | - itojun@cvs.openbsd.org 2002/10/16 14:31:48 | |
65 | [sftp-common.c] | |
66 | 64bit pedant. %llu is "unsigned long long". markus ok | |
2fe3c2db | 67 | - markus@cvs.openbsd.org 2002/10/23 10:32:13 |
68 | [packet.c] | |
69 | use %u for u_int | |
358b576b | 70 | - markus@cvs.openbsd.org 2002/10/23 10:40:16 |
71 | [bufaux.c] | |
72 | %u for u_int | |
f6f02456 | 73 | - markus@cvs.openbsd.org 2002/11/04 10:07:53 |
74 | [auth.c] | |
75 | don't compare against pw_home if realpath fails for pw_home (seen | |
76 | on AFS); ok djm@ | |
2ccb7bde | 77 | - markus@cvs.openbsd.org 2002/11/04 10:09:51 |
78 | [packet.c] | |
79 | log before send disconnect; ok djm@ | |
39e71188 | 80 | - markus@cvs.openbsd.org 2002/11/05 19:45:20 |
81 | [monitor.c] | |
82 | handle overflows for size_t larger than u_int; siw@goneko.de, bug #425 | |
9db1a8e9 | 83 | - markus@cvs.openbsd.org 2002/11/05 20:10:37 |
84 | [sftp-client.c] | |
85 | typo; GaryF@livevault.com | |
51efad8c | 86 | - markus@cvs.openbsd.org 2002/11/07 16:28:47 |
87 | [sshd.c] | |
88 | log to stderr if -ie is given, bug #414, prj@po.cwru.edu | |
cc46e2ee | 89 | - markus@cvs.openbsd.org 2002/11/07 22:08:07 |
90 | [readconf.c readconf.h ssh-keysign.8 ssh-keysign.c] | |
91 | we cannot use HostbasedAuthentication for enabling ssh-keysign(8), | |
92 | because HostbasedAuthentication might be enabled based on the | |
93 | target host and ssh-keysign(8) does not know the remote hostname | |
94 | and not trust ssh(1) about the hostname, so we add a new option | |
95 | EnableSSHKeysign; ok djm@, report from zierke@informatik.uni-hamburg.de | |
252d1a24 | 96 | - markus@cvs.openbsd.org 2002/11/07 22:35:38 |
97 | [scp.c] | |
98 | check exit status from ssh, and exit(1) if ssh fails; bug#369; | |
99 | binder@arago.de | |
f00addc9 | 100 | - (bal) Update ssh-host-config and minor rewrite of bsd-cygwin_util.c |
101 | ntsec now default if cygwin version beginning w/ version 56. Patch | |
102 | by Corinna Vinschen <vinschen@redhat.com> | |
819d3f09 | 103 | - (bal) AIX does not log login attempts for unknown users (bug #432). |
104 | patch by dtucker@zip.com.au | |
c9826b28 | 105 | |
4e6f1c4f | 106 | 20021021 |
f0e27f3d | 107 | - (djm) Bug #400: Kill ssh-rand-helper children on timeout, patch from |
108 | dtucker@zip.com.au | |
cacd2e7a | 109 | - (djm) Bug #317: FreeBSD needs libutil.h for openpty() Report from |
110 | dirk.meyer@dinoex.sub.org | |
4e6f1c4f | 111 | |
f3e87063 | 112 | 20021015 |
113 | - (bal) Fix bug id 383 and only call loginrestrict for AIX if not root. | |
08412d26 | 114 | - (bal) More advanced strsep test by Darren Tucker <dtucker@zip.com.au> |
f3e87063 | 115 | |
57872969 | 116 | 20021015 |
117 | - (tim) [contrib/caldera/openssh.spec] make ssh-agent setgid nobody | |
118 | ||
6af8f131 | 119 | 20021004 |
120 | - (bal) Disable post-authentication Privsep for OSF/1. It conflicts with | |
121 | SIA. | |
122 | ||
e139021d | 123 | 20021003 |
124 | - (djm) OpenBSD CVS Sync | |
125 | - markus@cvs.openbsd.org 2002/10/01 20:34:12 | |
126 | [ssh-agent.c] | |
127 | allow root to access the agent, since there is no protection from root. | |
886cd2bb | 128 | - markus@cvs.openbsd.org 2002/10/01 13:24:50 |
129 | [version.h] | |
130 | OpenSSH 3.5 | |
0855868a | 131 | - (djm) Bump RPM spec version numbers |
e987fdbe | 132 | - (djm) Bug #406: s/msg_send/ssh_msg_send/ for Mac OS X 1.2 |
e139021d | 133 | |
1d677676 | 134 | 20020930 |
9a87e2ac | 135 | - (djm) Tidy contrib/, add Makefile for GNOME passphrase dialogs, |
136 | tweak README | |
137 | - (djm) OpenBSD CVS Sync | |
138 | - mickey@cvs.openbsd.org 2002/09/27 10:42:09 | |
139 | [compat.c compat.h sshd.c] | |
140 | add a generic match for a prober, such as sie big brother; | |
141 | idea from stevesk@; markus@ ok | |
05960cf0 | 142 | - stevesk@cvs.openbsd.org 2002/09/27 15:46:21 |
143 | [ssh.1] | |
144 | clarify compression level protocol 1 only; ok markus@ deraadt@ | |
1d677676 | 145 | |
0d3d0e82 | 146 | 20020927 |
147 | - (djm) OpenBSD CVS Sync | |
148 | - markus@cvs.openbsd.org 2002/09/25 11:17:16 | |
149 | [sshd_config] | |
150 | sync LoginGraceTime with default | |
26b9a3d2 | 151 | - markus@cvs.openbsd.org 2002/09/25 15:19:02 |
152 | [sshd.c] | |
153 | typo; pilot@monkey.org | |
2db9d8aa | 154 | - markus@cvs.openbsd.org 2002/09/26 11:38:43 |
155 | [auth1.c auth.h auth-krb4.c monitor.c monitor.h monitor_wrap.c] | |
156 | [monitor_wrap.h] | |
157 | krb4 + privsep; ok dugsong@, deraadt@ | |
0d3d0e82 | 158 | |
b7c4a4cc | 159 | 20020925 |
160 | - (bal) Fix issue where successfull login does not clear failure counts | |
161 | in AIX. Patch by dtucker@zip.com.au ok by djm | |
ef51930f | 162 | - (tim) Cray fixes (bug 367) based on patch from Wendy Palm @ cray. |
163 | This does not include the deattack.c fixes. | |
b7c4a4cc | 164 | |
99443922 | 165 | 20020923 |
166 | - (djm) OpenBSD CVS Sync | |
167 | - stevesk@cvs.openbsd.org 2002/09/23 20:46:27 | |
168 | [canohost.c] | |
169 | change get_peer_ipaddr() and get_local_ipaddr() to not return NULL for | |
170 | non-sockets; fixes a problem passing NULL to snprintf(). ok markus@ | |
0082ad34 | 171 | - markus@cvs.openbsd.org 2002/09/23 22:11:05 |
172 | [monitor.c] | |
173 | only call auth_krb5 if kerberos is enabled; ok deraadt@ | |
4741e3a6 | 174 | - markus@cvs.openbsd.org 2002/09/24 08:46:04 |
175 | [monitor.c] | |
176 | only call kerberos code for authctxt->valid | |
cb11b555 | 177 | - todd@cvs.openbsd.org 2002/09/24 20:59:44 |
178 | [sshd.8] | |
179 | tweak the example $HOME/.ssh/rc script to not show on any cmdline the | |
180 | sensitive data it handles. This fixes bug # 402 as reported by | |
181 | kolya@mit.edu (Nickolai Zeldovich). | |
182 | ok markus@ and stevesk@ | |
99443922 | 183 | |
aec4cb4f | 184 | 20020923 |
185 | - (tim) [configure.ac] s/return/exit/ patch by dtucker@zip.com.au | |
186 | ||
f86b0eef | 187 | 20020922 |
188 | - (djm) OpenBSD CVS Sync | |
189 | - stevesk@cvs.openbsd.org 2002/09/19 14:53:14 | |
190 | [compat.c] | |
c7724abb | 191 | - markus@cvs.openbsd.org 2002/09/19 15:51:23 |
192 | [ssh-add.c] | |
193 | typo; cd@kalkatraz.de | |
00e842d8 | 194 | - stevesk@cvs.openbsd.org 2002/09/19 16:03:15 |
195 | [serverloop.c] | |
196 | log IP address also; ok markus@ | |
c2802d92 | 197 | - stevesk@cvs.openbsd.org 2002/09/20 18:41:29 |
198 | [auth.c] | |
199 | log illegal user here for missing privsep case (ssh2). | |
200 | this is executed in the monitor. ok markus@ | |
f86b0eef | 201 | |
792e7d2d | 202 | 20020919 |
203 | - (djm) OpenBSD CVS Sync | |
204 | - stevesk@cvs.openbsd.org 2002/09/12 19:11:52 | |
205 | [ssh-agent.c] | |
206 | %u for uid print; ok markus@ | |
da0561eb | 207 | - stevesk@cvs.openbsd.org 2002/09/12 19:50:36 |
208 | [session.c ssh.1] | |
209 | add SSH_CONNECTION and deprecate SSH_CLIENT; bug #384. ok markus@ | |
facfd613 | 210 | - stevesk@cvs.openbsd.org 2002/09/13 19:23:09 |
211 | [channels.c sshconnect.c sshd.c] | |
212 | remove use of SO_LINGER, it should not be needed. error check | |
213 | SO_REUSEADDR. fixup comments. ok markus@ | |
8bd4e2ae | 214 | - stevesk@cvs.openbsd.org 2002/09/16 19:55:33 |
215 | [session.c] | |
216 | log when _PATH_NOLOGIN exists; ok markus@ | |
e6fe1bab | 217 | - stevesk@cvs.openbsd.org 2002/09/16 20:12:11 |
218 | [sshd_config.5] | |
219 | more details on X11Forwarding security issues and threats; ok markus@ | |
f1dcc34e | 220 | - stevesk@cvs.openbsd.org 2002/09/16 22:03:13 |
221 | [sshd.8] | |
222 | reference moduli(5) in FILES /etc/moduli. | |
5c0d0e90 | 223 | - itojun@cvs.openbsd.org 2002/09/17 07:47:02 |
224 | [channels.c] | |
225 | don't quit while creating X11 listening socket. | |
226 | http://mail-index.netbsd.org/current-users/2002/09/16/0005.html | |
227 | got from portable. markus ok | |
6939bbd4 | 228 | - djm@cvs.openbsd.org 2002/09/19 01:58:18 |
229 | [ssh.c sshconnect.c] | |
230 | bugzilla.mindrot.org #223 - ProxyCommands don't exit. | |
231 | Patch from dtucker@zip.com.au; ok markus@ | |
792e7d2d | 232 | |
4f3834e8 | 233 | 20020912 |
eee2215e | 234 | - (djm) Made GNOME askpass programs return non-zero if cancel button is |
235 | pressed. | |
10a560d4 | 236 | - (djm) Added getpeereid() replacement. Properly implemented for systems |
237 | with SO_PEERCRED support. Faked for systems which lack it. | |
9fd2a215 | 238 | - (djm) Sync sys/tree.h with OpenBSD -current. Rename tree.h and |
239 | fake-queue.h to sys-tree.h and sys-queue.h | |
4f3834e8 | 240 | - (djm) OpenBSD CVS Sync |
241 | - markus@cvs.openbsd.org 2002/09/08 20:24:08 | |
242 | [hostfile.h] | |
243 | no comma at end of enumerator list | |
696f6bef | 244 | - itojun@cvs.openbsd.org 2002/09/09 06:48:06 |
245 | [auth1.c auth.h auth-krb5.c monitor.c monitor.h] | |
246 | [monitor_wrap.c monitor_wrap.h] | |
247 | kerberos support for privsep. confirmed to work by lha@stacken.kth.se | |
248 | patch from markus | |
661e45a0 | 249 | - markus@cvs.openbsd.org 2002/09/09 14:54:15 |
250 | [channels.c kex.h key.c monitor.c monitor_wrap.c radix.c uuencode.c] | |
251 | signed vs unsigned from -pedantic; ok henning@ | |
87f4111f | 252 | - markus@cvs.openbsd.org 2002/09/10 20:24:47 |
253 | [ssh-agent.c] | |
254 | check the euid of the connecting process with getpeereid(2); | |
255 | ok provos deraadt stevesk | |
07d688d5 | 256 | - stevesk@cvs.openbsd.org 2002/09/11 17:55:03 |
257 | [ssh.1] | |
258 | add agent and X11 forwarding warning text from ssh_config.5; ok markus@ | |
8b10e20e | 259 | - stevesk@cvs.openbsd.org 2002/09/11 18:27:26 |
260 | [authfd.c authfd.h ssh.c] | |
261 | don't connect to agent to test for presence if we've previously | |
262 | connected; ok markus@ | |
00b3ad3e | 263 | - djm@cvs.openbsd.org 2002/09/11 22:41:50 |
264 | [sftp.1 sftp-client.c sftp-client.h sftp-common.c sftp-common.h] | |
265 | [sftp-glob.c sftp-glob.h sftp-int.c sftp-server.c] | |
266 | support for short/long listings and globbing in "ls"; ok markus@ | |
be0cd512 | 267 | - djm@cvs.openbsd.org 2002/09/12 00:13:06 |
268 | [sftp-int.c] | |
269 | zap unused var introduced in last commit | |
4f3834e8 | 270 | |
ac8802eb | 271 | 20020911 |
272 | - (djm) Sync openbsd-compat with OpenBSD -current | |
273 | ||
e2e36358 | 274 | 20020910 |
275 | - (djm) Bug #365: Read /.ssh/environment properly under CygWin. | |
276 | Patch from Mark Bradshaw <bradshaw@staff.crosswalk.com> | |
35c4faf5 | 277 | - (djm) Bug #138: Make protocol 1 blowfish work with old OpenSSL. |
278 | Patch from Robert Halubek <rob@adso.com.pl> | |
e2e36358 | 279 | |
3445ca02 | 280 | 20020905 |
281 | - (djm) OpenBSD CVS Sync | |
282 | - stevesk@cvs.openbsd.org 2002/09/04 18:52:42 | |
283 | [servconf.c sshd.8 sshd_config.5] | |
284 | default LoginGraceTime to 2m; 1m may be too short for slow systems. | |
285 | ok markus@ | |
cbecf1ed | 286 | - (djm) Merge openssh-TODO.patch from Redhat (null) beta |
c4ee4c60 | 287 | - (djm) Add gnome-ssh-askpass2.c (gtk2) by merge with patch from |
288 | Nalin Dahyabhai <nalin@redhat.com> | |
3c1dff28 | 289 | - (djm) Add support for building gtk2 password requestor from Redhat beta |
3445ca02 | 290 | |
954640a4 | 291 | 20020903 |
33e2e066 | 292 | - (djm) Patch from itojun@ for Darwin OS: test getaddrinfo, reorder libcrypt |
e18b7d35 | 293 | - (djm) Fix Redhat RPM build dependancy test |
954640a4 | 294 | - (djm) OpenBSD CVS Sync |
295 | - markus@cvs.openbsd.org 2002/08/12 10:46:35 | |
296 | [ssh-agent.c] | |
297 | make ssh-agent setgid, disallow ptrace. | |
755c4339 | 298 | - espie@cvs.openbsd.org 2002/08/21 11:20:59 |
299 | [sshd.8] | |
300 | `RSA' updated to refer to `public key', where it matters. | |
301 | okay markus@ | |
6e0fbda1 | 302 | - stevesk@cvs.openbsd.org 2002/08/21 19:38:06 |
303 | [servconf.c sshd.8 sshd_config sshd_config.5] | |
304 | change LoginGraceTime default to 1 minute; ok mouring@ markus@ | |
00e41835 | 305 | - stevesk@cvs.openbsd.org 2002/08/21 20:10:28 |
306 | [ssh-agent.c] | |
307 | raise listen backlog; ok markus@ | |
c1a4eef1 | 308 | - stevesk@cvs.openbsd.org 2002/08/22 19:27:53 |
309 | [ssh-agent.c] | |
310 | use common close function; ok markus@ | |
1d77f8cb | 311 | - stevesk@cvs.openbsd.org 2002/08/22 19:38:42 |
312 | [clientloop.c] | |
313 | format with current EscapeChar; bugzilla #388 from wknox@mitre.org. | |
314 | ok markus@ | |
f34ec885 | 315 | - stevesk@cvs.openbsd.org 2002/08/22 20:57:19 |
316 | [ssh-agent.c] | |
317 | shutdown(SHUT_RDWR) not needed before close here; ok markus@ | |
848bf884 | 318 | - markus@cvs.openbsd.org 2002/08/22 21:33:58 |
319 | [auth1.c auth2.c] | |
320 | auth_root_allowed() is handled by the monitor in the privsep case, | |
321 | so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325 | |
6c723e7c | 322 | - markus@cvs.openbsd.org 2002/08/22 21:45:41 |
323 | [session.c] | |
324 | send signal name (not signal number) in "exit-signal" message; noticed | |
325 | by galb@vandyke.com | |
b41baf4d | 326 | - stevesk@cvs.openbsd.org 2002/08/27 17:13:56 |
327 | [ssh-rsa.c] | |
328 | RSA_public_decrypt() returns -1 on error so len must be signed; | |
329 | ok markus@ | |
dbcdea68 | 330 | - stevesk@cvs.openbsd.org 2002/08/27 17:18:40 |
331 | [ssh_config.5] | |
332 | some warning text for ForwardAgent and ForwardX11; ok markus@ | |
ba1566dd | 333 | - stevesk@cvs.openbsd.org 2002/08/29 15:57:25 |
334 | [monitor.c session.c sshlogin.c sshlogin.h] | |
335 | pass addrlen with sockaddr *; from Hajimu UMEMOTO <ume@FreeBSD.org> | |
336 | NOTE: there are also p-specific parts to this patch. ok markus@ | |
e59404d1 | 337 | - stevesk@cvs.openbsd.org 2002/08/29 16:02:54 |
338 | [ssh.1 ssh.c] | |
339 | deprecate -P as UsePrivilegedPort defaults to no now; ok markus@ | |
878b8992 | 340 | - stevesk@cvs.openbsd.org 2002/08/29 16:09:02 |
341 | [ssh_config.5] | |
342 | more on UsePrivilegedPort and setuid root; ok markus@ | |
9f324470 | 343 | - stevesk@cvs.openbsd.org 2002/08/29 19:49:42 |
344 | [ssh.c] | |
345 | shrink initial privilege bracket for setuid case; ok markus@ | |
57ff5eeb | 346 | - stevesk@cvs.openbsd.org 2002/08/29 22:54:10 |
347 | [ssh_config.5 sshd_config.5] | |
348 | state XAuthLocation is a full pathname | |
954640a4 | 349 | |
b85698ab | 350 | 20020820 |
351 | - OpenBSD CVS Sync | |
352 | - millert@cvs.openbsd.org 2002/08/02 14:43:15 | |
353 | [monitor.c monitor_mm.c] | |
354 | Change mm_zalloc() sanity checks to be more in line with what | |
355 | we do in calloc() and add a check to monitor_mm.c. | |
356 | OK provos@ and markus@ | |
6a342527 | 357 | - marc@cvs.openbsd.org 2002/08/02 16:00:07 |
358 | [ssh.1 sshd.8] | |
359 | note that .ssh/environment is only read when | |
360 | allowed (PermitUserEnvironment in sshd_config). | |
361 | OK markus@ | |
4004c2ac | 362 | - markus@cvs.openbsd.org 2002/08/02 21:23:41 |
363 | [ssh-rsa.c] | |
364 | diff is u_int (2x); ok deraadt/provos | |
0caf874a | 365 | - markus@cvs.openbsd.org 2002/08/02 22:20:30 |
366 | [ssh-rsa.c] | |
367 | replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser | |
368 | for authentication; ok deraadt/djm | |
75cf7563 | 369 | - aaron@cvs.openbsd.org 2002/08/08 13:50:23 |
370 | [sshconnect1.c] | |
371 | Use & to test if bits are set, not &&; markus@ ok. | |
d6097023 | 372 | - stevesk@cvs.openbsd.org 2002/08/08 23:54:52 |
373 | [auth.c] | |
374 | typo in comment | |
36535ee6 | 375 | - stevesk@cvs.openbsd.org 2002/08/09 17:21:42 |
376 | [sshd_config.5] | |
377 | use Op for mdoc conformance; from esr@golux.thyrsus.com | |
378 | ok aaron@ | |
b3641662 | 379 | - stevesk@cvs.openbsd.org 2002/08/09 17:41:12 |
380 | [sshd_config.5] | |
381 | proxy vs. fake display | |
35453849 | 382 | - stevesk@cvs.openbsd.org 2002/08/12 17:30:35 |
383 | [ssh.1 sshd.8 sshd_config.5] | |
384 | more PermitUserEnvironment; ok markus@ | |
24794905 | 385 | - stevesk@cvs.openbsd.org 2002/08/17 23:07:14 |
386 | [ssh.1] | |
387 | ForwardAgent has defaulted to no for over 2 years; be more clear here. | |
4dcbbeea | 388 | - stevesk@cvs.openbsd.org 2002/08/17 23:55:01 |
389 | [ssh_config.5] | |
390 | ordered list here | |
7d3b91a6 | 391 | - (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assign |
392 | it to ULONG_MAX. | |
b85698ab | 393 | |
cd018561 | 394 | 20020813 |
395 | - (tim) [configure.ac] Display OpenSSL header/library version. | |
396 | Patch by dtucker@zip.com.au | |
397 | ||
8a48a7ef | 398 | 20020731 |
399 | - (bal) OpenBSD CVS Sync | |
400 | - markus@cvs.openbsd.org 2002/07/24 16:11:18 | |
401 | [hostfile.c hostfile.h sshconnect.c] | |
402 | print out all known keys for a host if we get a unknown host key, | |
403 | see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4 | |
404 | ||
405 | the ssharp mitm tool attacks users in a similar way, so i'd like to | |
406 | pointed out again: | |
407 | A MITM attack is always possible if the ssh client prints: | |
408 | The authenticity of host 'bla' can't be established. | |
409 | (protocol version 2 with pubkey authentication allows you to detect | |
410 | MITM attacks) | |
5cb5518b | 411 | - mouring@cvs.openbsd.org 2002/07/25 01:16:59 |
412 | [sftp.c] | |
413 | FallBackToRsh does not exist anywhere else. Remove it from here. | |
414 | OK deraadt. | |
567a05bf | 415 | - markus@cvs.openbsd.org 2002/07/29 18:57:30 |
416 | [sshconnect.c] | |
417 | print file:line | |
f00bab84 | 418 | - markus@cvs.openbsd.org 2002/07/30 17:03:55 |
419 | [auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5] | |
420 | add PermitUserEnvironment (off by default!); from dot@dotat.at; | |
421 | ok provos, deraadt | |
8a48a7ef | 422 | |
13979d47 | 423 | 20020730 |
424 | - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de | |
425 | ||
d228d9dd | 426 | 20020728 |
427 | - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar | |
16c4a972 | 428 | - (stevesk) [CREDITS] solar |
75131bbd | 429 | - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned |
430 | char arg. | |
d228d9dd | 431 | |
d40af5fa | 432 | 20020725 |
433 | - (djm) Remove some cruft from INSTALL | |
d91b4743 | 434 | - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/ |
d40af5fa | 435 | |
56b54901 | 436 | 20020723 |
437 | - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger. | |
918ffb0b | 438 | - (bal) sync ID w/ ssh-agent.c |
516f0d7d | 439 | - (bal) OpenBSD Sync |
440 | - markus@cvs.openbsd.org 2002/07/19 15:43:33 | |
441 | [log.c log.h session.c sshd.c] | |
442 | remove fatal cleanups after fork; based on discussions with and code | |
443 | from solar. | |
5d185586 | 444 | - stevesk@cvs.openbsd.org 2002/07/19 17:42:40 |
445 | [ssh.c] | |
446 | display a warning from ssh when XAuthLocation does not exist or xauth | |
447 | returned no authentication data. ok markus@ | |
30998af1 | 448 | - stevesk@cvs.openbsd.org 2002/07/21 18:32:20 |
449 | [auth-options.c] | |
450 | unneeded includes | |
dbc728ff | 451 | - stevesk@cvs.openbsd.org 2002/07/21 18:34:43 |
452 | [auth-options.h] | |
453 | remove invalid comment | |
97686bf9 | 454 | - markus@cvs.openbsd.org 2002/07/22 11:03:06 |
455 | [session.c] | |
456 | fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors; | |
d341742a | 457 | - stevesk@cvs.openbsd.org 2002/07/22 17:32:56 |
458 | [monitor.c] | |
459 | u_int here; ok provos@ | |
67f04db1 | 460 | - stevesk@cvs.openbsd.org 2002/07/23 16:03:10 |
461 | [sshd.c] | |
462 | utmp_len is unsigned; display error consistent with other options. | |
463 | ok markus@ | |
0df3a240 | 464 | - stevesk@cvs.openbsd.org 2002/07/15 17:15:31 |
465 | [uidswap.c] | |
466 | little more debugging; ok markus@ | |
d341742a | 467 | |
21c2c5cd | 468 | 20020722 |
469 | - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk | |
a93bd14c | 470 | - (stevesk) [xmmap.c] missing prototype for fatal() |
ccbb983c | 471 | - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync |
472 | with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com. | |
d262b7f2 | 473 | - (bal) [configure.ac] Missing ;; from cray patch. |
30eab01d | 474 | - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines |
475 | into it's own header. | |
ee48c949 | 476 | - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be |
477 | freed by the caller; add free_pam_environment() and use it. | |
1d3f4ae7 | 478 | - (stevesk) [auth-pam.c] typo in comment |
21c2c5cd | 479 | |
b992432e | 480 | 20020721 |
481 | - (stevesk) [auth-pam.c] merge cosmetic changes from solar's | |
482 | openssh-3.4p1-owl-password-changing.diff | |
277f55cf | 483 | - (stevesk) [auth-pam.c] merge rest of solar's PAM patch; |
484 | PAM_NEW_AUTHTOK_REQD remains in #if 0 for now. | |
f7808a93 | 485 | - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch |
486 | warning on pam_conv struct conversation function. | |
337dde6b | 487 | - (stevesk) [auth-pam.h] license |
8565f28e | 488 | - (stevesk) [auth-pam.h] unneeded include |
e9b2c23d | 489 | - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h |
b992432e | 490 | |
ce88d9df | 491 | 20020720 |
492 | - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng(). | |
493 | ||
4379c0e5 | 494 | 20020719 |
495 | - (tim) [contrib/solaris/buildpkg.sh] create privsep user/group if needed. | |
496 | Patch by dtucker@zip.com.au | |
f75ca46d | 497 | - (tim) [configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au |
4379c0e5 | 498 | |
45491100 | 499 | 20020718 |
500 | - (tim) [defines.h] Bug 313 patch by dirk.meyer@dinoex.sub.org | |
501 | - (tim) [monitor_mm.c] add missing declaration for xmmap(). Reported | |
502 | by ayamura@ayamura.org | |
1cbbe6c8 | 503 | - (tim) [configure.ac] Bug 267 rework int64_t test. |
5749e709 | 504 | - (tim) [includes.h] Bug 267 add stdint.h |
45491100 | 505 | |
dd3943d0 | 506 | 20020717 |
507 | - (bal) aixbff package updated by dtucker@zip.com.au | |
2bf42e4a | 508 | - (tim) [configure.ac] change how we do paths in AC_PATH_PROGS tests |
509 | for autoconf 2.53. Based on a patch by jrj@purdue.edu | |
dd3943d0 | 510 | |
8fc47887 | 511 | 20020716 |
512 | - (tim) [contrib/solaris/opensshd.in] Only kill sshd if .pid file found | |
513 | ||
c750d869 | 514 | 20020715 |
515 | - (bal) OpenBSD CVS Sync | |
516 | - itojun@cvs.openbsd.org 2002/07/12 13:29:09 | |
517 | [sshconnect.c] | |
518 | print connect failure during debugging mode. | |
a2f883ce | 519 | - markus@cvs.openbsd.org 2002/07/12 15:50:17 |
520 | [cipher.c] | |
521 | EVP_CIPH_CUSTOM_IV for our own rijndael | |
2d199535 | 522 | - (bal) Remove unused tty defined in do_setusercontext() pointed out by |
523 | dtucker@zip.com.au plus a a more KNF since I am near it. | |
846be3f4 | 524 | - (bal) Privsep user creation support in Solaris buildpkg.sh by |
525 | dtucker@zip.com.au | |
c750d869 | 526 | |
798c5808 | 527 | 20020714 |
528 | - (tim) [Makefile.in] replace "id sshd" with "sshd -t" | |
4165b82e | 529 | - (bal/tim) [acconfig.h configure.ac monitor_mm.c servconf.c |
530 | openbsd-compat/Makefile.in] support compression on platforms that | |
531 | have no/broken MAP_ANON. Moved code to openbsd-compat/xmmap.c | |
532 | Based on patch from nalin@redhat.com of code extracted from Owl's package | |
5fd8087a | 533 | - (tim) [ssh_prng_cmds.in] Bug 323 arp -n flag doesn't exist under Solaris. |
534 | report by chris@by-design.net | |
fdebdd4f | 535 | - (tim) [loginrec.c] Bug 347: Fix typo (WTMPX_FILE) report by rodney@bond.net |
d80063fe | 536 | - (tim) [loginrec.c] Bug 348: add missing found = 1; to wtmpx_islogin() |
537 | report by rodney@bond.net | |
798c5808 | 538 | |
6b2a3595 | 539 | 20020712 |
540 | - (tim) [Makefile.in] quiet down install-files: and check-user: | |
3085601b | 541 | - (tim) [configure.ac] remove unused filepriv line |
6b2a3595 | 542 | |
249f9903 | 543 | 20020710 |
544 | - (tim) [contrib/cygwin/ssh-host-config] explicitely sets the permissions | |
545 | on /var/empty to 755 Patch by vinschen@redhat.com | |
6f901f8e | 546 | - (bal) OpenBSD CVS Sync |
547 | - itojun@cvs.openbsd.org 2002/07/09 11:56:50 | |
548 | [sshconnect.c] | |
549 | silently try next address on connect(2). markus ok | |
59c825e1 | 550 | - itojun@cvs.openbsd.org 2002/07/09 11:56:27 |
551 | [canohost.c] | |
552 | suppress log on reverse lookup failiure, as there's no real value in | |
553 | doing so. | |
554 | markus ok | |
aab5431b | 555 | - itojun@cvs.openbsd.org 2002/07/09 12:04:02 |
556 | [sshconnect.c] | |
557 | ed static function (less warnings) | |
94ad46d1 | 558 | - stevesk@cvs.openbsd.org 2002/07/09 17:46:25 |
559 | [sshd_config.5] | |
560 | clarify no preference ordering in protocol list; ok markus@ | |
9bd68577 | 561 | - itojun@cvs.openbsd.org 2002/07/10 10:28:15 |
562 | [sshconnect.c] | |
563 | bark if all connection attempt fails. | |
09683edf | 564 | - deraadt@cvs.openbsd.org 2002/07/10 17:53:54 |
565 | [rijndael.c] | |
566 | use right sizeof in memcpy; markus ok | |
249f9903 | 567 | |
e6f15ed1 | 568 | 20020709 |
569 | - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platforms | |
570 | lacking that concept can share it. Patch by vinschen@redhat.com | |
571 | ||
4f9d6706 | 572 | 20020708 |
573 | - (tim) [openssh/contrib/solaris/buildpkg.sh] add PKG_INSTALL_ROOT to | |
574 | work in a jumpstart environment. patch by kbrint@rufus.net | |
b451e27b | 575 | - (tim) [Makefile.in] workaround for broken pakadd on some systems. |
cda1ebcb | 576 | - (tim) [configure.ac] fix libc89 utimes test. Mention default path for |
577 | --with-privsep-path= | |
4f9d6706 | 578 | |
ac74561e | 579 | 20020707 |
580 | - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH) | |
94d8258b | 581 | - (tim) [acconfig.h configure.ac sshd.c] |
582 | s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/ | |
d41f8eed | 583 | - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes |
584 | patch from vinschen@redhat.com | |
0b832146 | 585 | - (bal) [realpath.c] Updated with OpenBSD tree. |
da2499f5 | 586 | - (bal) OpenBSD CVS Sync |
587 | - deraadt@cvs.openbsd.org 2002/07/04 04:15:33 | |
588 | [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c] | |
589 | patch memory leaks; grendel@zeitbombe.org | |
e1feb9bf | 590 | - deraadt@cvs.openbsd.org 2002/07/04 08:12:15 |
591 | [channels.c packet.c] | |
592 | blah blah minor nothing as i read and re-read and re-read... | |
eb9f2fab | 593 | - markus@cvs.openbsd.org 2002/07/04 10:41:47 |
594 | [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c] | |
595 | don't allocate, copy, and discard if there is not interested in the data; | |
596 | ok deraadt@ | |
4394a17f | 597 | - deraadt@cvs.openbsd.org 2002/07/06 01:00:49 |
598 | [log.c] | |
599 | KNF | |
50d2fbbc | 600 | - deraadt@cvs.openbsd.org 2002/07/06 01:01:26 |
601 | [ssh-keyscan.c] | |
602 | KNF, realloc fix, and clean usage | |
12a3f2c3 | 603 | - stevesk@cvs.openbsd.org 2002/07/06 17:47:58 |
604 | [ssh-keyscan.c] | |
605 | unused variable | |
41545cb6 | 606 | - (bal) Minor KNF on ssh-keyscan.c |
ac74561e | 607 | |
0764e748 | 608 | 20020705 |
609 | - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs. | |
610 | Reported by Darren Tucker <dtucker@zip.com.au> | |
e12659f4 | 611 | - (tim) [contrib/cygwin/ssh-host-config] double slash corrction |
612 | from vinschen@redhat.com | |
0764e748 | 613 | |
64c0ce80 | 614 | 20020704 |
615 | - (bal) Limit data to TTY for AIX only (Newer versions can't handle the | |
616 | faster data rate) Bug #124 | |
375c1dee | 617 | - (bal) glob.c defines TILDE and AIX also defines it. #undef it first. |
618 | bug #265 | |
ff2de800 | 619 | - (bal) One too many nulls in ports-aix.c |
64c0ce80 | 620 | |
d2f95449 | 621 | 20020703 |
622 | - (bal) Updated contrib/cygwin/ patch by vinschen@redhat.com | |
619a6aff | 623 | - (bal) minor correction to utimes() replacement. Patch by |
624 | onoe@sm.sony.co.jp | |
f11fe301 | 625 | - OpenBSD CVS Sync |
626 | - markus@cvs.openbsd.org 2002/06/27 08:49:44 | |
627 | [dh.c ssh-keyscan.c sshconnect.c] | |
628 | more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@ | |
181d6635 | 629 | - deraadt@cvs.openbsd.org 2002/06/27 09:08:00 |
630 | [monitor.c] | |
631 | improve mm_zalloc check; markus ok | |
30e37ee6 | 632 | - deraadt@cvs.openbsd.org 2002/06/27 10:35:47 |
633 | [auth2-none.c monitor.c sftp-client.c] | |
634 | use xfree() | |
c8f94200 | 635 | - stevesk@cvs.openbsd.org 2002/06/27 19:49:08 |
636 | [ssh-keyscan.c] | |
637 | use convtime(); ok markus@ | |
a64d3560 | 638 | - millert@cvs.openbsd.org 2002/06/28 01:49:31 |
639 | [monitor_mm.c] | |
640 | tree(3) wants an int return value for its compare functions and | |
641 | the difference between two pointers is not an int. Just do the | |
642 | safest thing and store the result in a long and then return 0, | |
643 | -1, or 1 based on that result. | |
405a0d43 | 644 | - deraadt@cvs.openbsd.org 2002/06/28 01:50:37 |
645 | [monitor_wrap.c] | |
646 | use ssize_t | |
4efd85b2 | 647 | - deraadt@cvs.openbsd.org 2002/06/28 10:08:25 |
648 | [sshd.c] | |
649 | range check -u option at invocation | |
6ded293b | 650 | - deraadt@cvs.openbsd.org 2002/06/28 23:05:06 |
651 | [sshd.c] | |
652 | gidset[2] -> gidset[1]; markus ok | |
7fdc56c5 | 653 | - deraadt@cvs.openbsd.org 2002/06/30 21:54:16 |
654 | [auth2.c session.c sshd.c] | |
655 | lint asks that we use names that do not overlap | |
343288b8 | 656 | - deraadt@cvs.openbsd.org 2002/06/30 21:59:45 |
657 | [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c | |
658 | monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c | |
659 | sshconnect2.c sshd.c] | |
660 | minor KNF | |
7d60d74c | 661 | - deraadt@cvs.openbsd.org 2002/07/01 16:15:25 |
662 | [msg.c] | |
663 | %u | |
713f6cd9 | 664 | - markus@cvs.openbsd.org 2002/07/01 19:48:46 |
665 | [sshconnect2.c] | |
666 | for compression=yes, we fallback to no-compression if the server does | |
667 | not support compression, vice versa for compression=no. ok mouring@ | |
261189cc | 668 | - markus@cvs.openbsd.org 2002/07/03 09:55:38 |
669 | [ssh-keysign.c] | |
670 | use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld) | |
671 | in order to avoid a possible Kocher timing attack pointed out by Charles | |
672 | Hannum; ok provos@ | |
60cd0a97 | 673 | - markus@cvs.openbsd.org 2002/07/03 14:21:05 |
674 | [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config] | |
675 | re-enable ssh-keysign's sbit, but make ssh-keysign read | |
676 | /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled | |
677 | globally. based on discussions with deraadt, itojun and sommerfeld; | |
678 | ok itojun@ | |
56fd97d7 | 679 | - (bal) Failed password attempts don't increment counter on AIX. Bug #145 |
e8aa0a5c | 680 | - (bal) Missed Makefile.in change. keysign needs readconf.o |
0ba40daa | 681 | - (bal) Clean up aix_usrinfo(). Ignore TTY= period I guess. |
56fd97d7 | 682 | |
b2f295dc | 683 | 20020702 |
684 | - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc & | |
685 | friends consistently. Spotted by Solar Designer <solar@openwall.com> | |
686 | ||
3c3e878a | 687 | 20020629 |
688 | - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style | |
689 | clean up while I'm near it. | |
690 | ||
811ee370 | 691 | 20020628 |
692 | - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented | |
693 | options should contain default value. from solar. | |
b9b82dab | 694 | - (bal) Cygwin uid0 fix by vinschen@redhat.com |
17962c40 | 695 | - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c. Otherwise wise |
696 | have issues of our fixes not propogating right (ie bcopy instead of | |
697 | memmove). OK tim | |
4fa4fb00 | 698 | - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported. |
699 | Bug #303 | |
811ee370 | 700 | |
ce88d9df | 701 | 20020627 |
d1ff09ba | 702 | - OpenBSD CVS Sync |
703 | - deraadt@cvs.openbsd.org 2002/06/26 14:49:36 | |
704 | [monitor.c] | |
705 | correct %u | |
63b5f1a1 | 706 | - deraadt@cvs.openbsd.org 2002/06/26 14:50:04 |
707 | [monitor_fdpass.c] | |
708 | use ssize_t for recvmsg() and sendmsg() return | |
1431a900 | 709 | - markus@cvs.openbsd.org 2002/06/26 14:51:33 |
710 | [ssh-add.c] | |
711 | fix exit code for -X/-x | |
bb0640b2 | 712 | - deraadt@cvs.openbsd.org 2002/06/26 15:00:32 |
713 | [monitor_wrap.c] | |
714 | more %u | |
20e79e98 | 715 | - markus@cvs.openbsd.org 2002/06/26 22:27:32 |
716 | [ssh-keysign.c] | |
717 | bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu | |
d1ff09ba | 718 | |
4bfa8bb6 | 719 | 20020626 |
720 | - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM | |
a594fa74 | 721 | - (bal) OpenBSD CVS Sync |
722 | - markus@cvs.openbsd.org 2002/06/23 21:34:07 | |
723 | [channels.c] | |
724 | tcode is u_int | |
38501509 | 725 | - markus@cvs.openbsd.org 2002/06/24 13:12:23 |
726 | [ssh-agent.1] | |
727 | the socket name contains ssh-agent's ppid; via mpech@ from form@ | |
f91d9a89 | 728 | - markus@cvs.openbsd.org 2002/06/24 14:33:27 |
729 | [channels.c channels.h clientloop.c serverloop.c] | |
730 | move channel counter to u_int | |
1169c3df | 731 | - markus@cvs.openbsd.org 2002/06/24 14:55:38 |
732 | [authfile.c kex.c ssh-agent.c] | |
733 | cat to (void) when output from buffer_get_X is ignored | |
09915dc1 | 734 | - itojun@cvs.openbsd.org 2002/06/24 15:49:22 |
735 | [msg.c] | |
736 | printf type pedant | |
d0a1c5d1 | 737 | - deraadt@cvs.openbsd.org 2002/06/24 17:57:20 |
738 | [sftp-server.c sshpty.c] | |
739 | explicit (u_int) for uid and gid | |
6c69a6a9 | 740 | - markus@cvs.openbsd.org 2002/06/25 16:22:42 |
741 | [authfd.c] | |
742 | unnecessary cast | |
87809a1f | 743 | - markus@cvs.openbsd.org 2002/06/25 18:51:04 |
744 | [sshd.c] | |
745 | lightweight do_setusercontext after chroot() | |
924681ee | 746 | - (bal) Updated AIX package build. Patch by dtucker@zip.com.au |
46c8ebb3 | 747 | - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8 |
78beb77d | 748 | - (bal) added back in error check for mmap(). I screwed up, Pointed |
749 | out by stevesk@ | |
f2d9a1f8 | 750 | - (tim) [README.privsep] UnixWare tip no longer needed. |
88cb875c | 751 | - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP, |
752 | but it all damned lies. | |
0d0270e6 | 753 | - (stevesk) [README.privsep] more for sshd pseudo-account. |
8029e7fc | 754 | - (tim) [contrib/caldera/openssh.spec] add support for privsep |
8695f9f7 | 755 | - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@ |
b29fe4ea | 756 | - (djm) OpenBSD CVS Sync |
757 | - markus@cvs.openbsd.org 2002/06/26 08:53:12 | |
758 | [bufaux.c] | |
759 | limit size of BNs to 8KB; ok provos/deraadt | |
22d62d31 | 760 | - markus@cvs.openbsd.org 2002/06/26 08:54:18 |
761 | [buffer.c] | |
762 | limit append to 1MB and buffers to 10MB | |
5df8c731 | 763 | - markus@cvs.openbsd.org 2002/06/26 08:55:02 |
764 | [channels.c] | |
765 | limit # of channels to 10000 | |
87f18810 | 766 | - markus@cvs.openbsd.org 2002/06/26 08:58:26 |
767 | [session.c] | |
768 | limit # of env vars to 1000; ok deraadt/djm | |
2f095a0e | 769 | - deraadt@cvs.openbsd.org 2002/06/26 13:20:57 |
770 | [monitor.c] | |
771 | be careful in mm_zalloc | |
66087567 | 772 | - deraadt@cvs.openbsd.org 2002/06/26 13:49:26 |
773 | [session.c] | |
774 | disclose less information from environment files; based on input | |
775 | from djm, and dschultz@uclink.Berkeley.EDU | |
477edc5d | 776 | - markus@cvs.openbsd.org 2002/06/26 13:55:37 |
777 | [auth2-chall.c] | |
778 | make sure # of response matches # of queries, fixes int overflow; | |
779 | from ISS | |
03b14b6f | 780 | - markus@cvs.openbsd.org 2002/06/26 13:56:27 |
781 | [version.h] | |
782 | 3.4 | |
9c696d0d | 783 | - (djm) Require krb5 devel for RPM build w/ KrbV |
c4186be7 | 784 | - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai |
785 | <nalin@redhat.com> | |
1e7bc74c | 786 | - (djm) Update spec files for release |
49b53b03 | 787 | - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS |
03b14b6f | 788 | - (djm) Release 3.4p1 |
6519cfd6 | 789 | - (tim) [contrib/caldera/openssh.spec] remove 2 configure options I put in |
790 | by mistake | |
4bfa8bb6 | 791 | |
ef1ac12b | 792 | 20020625 |
793 | - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh | |
1a44c6f7 | 794 | - (stevesk) [README.privsep] minor updates |
fd3cbf67 | 795 | - (djm) Create privsep directory and warn if privsep user is missing |
796 | during make install | |
702b2855 | 797 | - (bal) Started list of PrivSep issues in TODO |
1c6249af | 798 | - (bal) if mmap() is substandard, don't allow compression on server side. |
799 | Post 'event' we will add more options. | |
cbaa3d44 | 800 | - (tim) [contrib/caldera/openssh.spec] Sync with Caldera |
e2bc41f9 | 801 | - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by |
802 | dtucker@zip.com.au | |
d170feb1 | 803 | - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus |
804 | for Cygwin, Cray, & SCO | |
ef1ac12b | 805 | |
d5803314 | 806 | 20020624 |
807 | - OpenBSD CVS Sync | |
808 | - deraadt@cvs.openbsd.org 2002/06/23 03:25:50 | |
809 | [tildexpand.c] | |
810 | KNF | |
3ddc795d | 811 | - deraadt@cvs.openbsd.org 2002/06/23 03:26:19 |
812 | [cipher.c key.c] | |
813 | KNF | |
d6133f43 | 814 | - deraadt@cvs.openbsd.org 2002/06/23 03:30:58 |
815 | [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c | |
816 | sshpty.c] | |
817 | various KNF and %d for unsigned | |
9906a836 | 818 | - deraadt@cvs.openbsd.org 2002/06/23 09:30:14 |
819 | [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c | |
820 | sftp.c] | |
821 | bunch of u_int vs int stuff | |
512df038 | 822 | - deraadt@cvs.openbsd.org 2002/06/23 09:39:55 |
823 | [ssh-keygen.c] | |
824 | u_int stuff | |
7528d467 | 825 | - deraadt@cvs.openbsd.org 2002/06/23 09:46:51 |
826 | [bufaux.c servconf.c] | |
827 | minor KNF. things the fingers do while you read | |
e424e241 | 828 | - deraadt@cvs.openbsd.org 2002/06/23 10:29:52 |
829 | [ssh-agent.c sshd.c] | |
830 | some minor KNF and %u | |
7138ebd9 | 831 | - deraadt@cvs.openbsd.org 2002/06/23 20:39:45 |
832 | [session.c] | |
833 | compression_level is u_int | |
f09ce20a | 834 | - deraadt@cvs.openbsd.org 2002/06/23 21:06:13 |
835 | [sshpty.c] | |
836 | KNF | |
57f228e8 | 837 | - deraadt@cvs.openbsd.org 2002/06/23 21:06:41 |
838 | [channels.c channels.h session.c session.h] | |
839 | display, screen, row, col, xpixel, ypixel are u_int; markus ok | |
0bc50167 | 840 | - deraadt@cvs.openbsd.org 2002/06/23 21:10:02 |
841 | [packet.c] | |
842 | packet_get_int() returns unsigned for reason & seqnr | |
57f228e8 | 843 | - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col, |
844 | xpixel are u_int. | |
845 | ||
d5803314 | 846 | |
58177c0a | 847 | 20020623 |
848 | - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX. | |
dc43acd2 | 849 | - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset. |
ef3912be | 850 | - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au |
a8bbdc75 | 851 | - OpenBSD CVS Sync |
852 | - stevesk@cvs.openbsd.org 2002/06/22 02:00:29 | |
853 | [ssh.h] | |
854 | correct comment | |
1ae02182 | 855 | - stevesk@cvs.openbsd.org 2002/06/22 02:40:23 |
856 | [ssh.1] | |
857 | section 5 not 4 for ssh_config | |
b2843ec6 | 858 | - naddy@cvs.openbsd.org 2002/06/22 11:51:39 |
859 | [ssh.1] | |
860 | typo | |
75653d3e | 861 | - stevesk@cvs.openbsd.org 2002/06/22 16:32:54 |
862 | [sshd.8] | |
863 | add /var/empty in FILES section | |
a56313d7 | 864 | - stevesk@cvs.openbsd.org 2002/06/22 16:40:19 |
865 | [sshd.c] | |
866 | check /var/empty owner mode; ok provos@ | |
e4e83d70 | 867 | - stevesk@cvs.openbsd.org 2002/06/22 16:41:57 |
868 | [scp.1] | |
869 | typo | |
baa08b92 | 870 | - stevesk@cvs.openbsd.org 2002/06/22 16:45:29 |
871 | [ssh-agent.1 sshd.8 sshd_config.5] | |
872 | use process ID vs. pid/PID/process identifier | |
c28876e9 | 873 | - stevesk@cvs.openbsd.org 2002/06/22 20:05:27 |
874 | [sshd.c] | |
875 | don't call setsid() if debugging or run from inetd; no "Operation not | |
876 | permitted" errors now; ok millert@ markus@ | |
d17ef027 | 877 | - stevesk@cvs.openbsd.org 2002/06/22 23:09:51 |
878 | [monitor.c] | |
879 | save auth method before monitor_reset_key_state(); bugzilla bug #284; | |
880 | ok provos@ | |
58177c0a | 881 | |
0b202697 | 882 | $Id$ |