2 - (bal) OpenBSD CVS Sync
3 - markus@cvs.openbsd.org 2002/05/15 21:56:38
4 [servconf.c sshd.8 sshd_config]
5 re-enable privsep and disable setuid for post-3.2.2
8 - (stevesk) [channels.c] bug #164 patch from YOSHIFUJI Hideaki (changed
9 setsockopt from debug to error for now).
12 - (tim) [configure.ac.orig monitor_fdpass.c] Enahnce msghdr tests to address
13 build problem on Irix reported by Dave Love <d.love@dl.ac.uk>. Back out
14 last monitor_fdpass.c changes that are no longer needed with new tests.
15 Patch tested on Irix by Jan-Frode Myklebust <janfrode@parallab.uib.no>
18 - (djm) Fix spelling mistakes, spotted by Solar Designer i
20 - Sync scard/ (not sure when it drifted)
21 - (djm) OpenBSD CVS Sync:
23 Fix typo/thinko. Pass in as to auth_approval(), not NULL.
26 - Crank RPM spec versions
29 - (stevesk) [sshd.c] bug 245; disable setsid() for now
30 - (stevesk) [sshd.c] #ifndef HAVE_CYGWIN for setgroups()
33 - (tim) [configure.ac] remove extra MD5_MSG="no" line.
36 - (bal) CVS ID fix up on auth-passwd.c
37 - (bal) OpenBSD CVS Sync
38 - deraadt@cvs.openbsd.org 2002/05/07 19:54:36
41 - deraadt@cvs.openbsd.org 2002/05/08 21:06:34
43 move to sshd.sshd instead
44 - stevesk@cvs.openbsd.org 2002/05/11 20:24:48
47 - itojun@cvs.openbsd.org 2002/05/13 02:37:39
49 less warnings. skey_{respond,query} are public (in auth.h)
50 - markus@cvs.openbsd.org 2002/05/13 20:44:58
51 [auth-options.c auth.c auth.h]
52 move the packet_send_debug handling from auth-options.c to auth.c;
54 - millert@cvs.openbsd.org 2002/05/13 15:53:19
56 Call setsid() in the child after sshd accepts the connection and forks.
57 This is needed for privsep which calls setlogin() when it changes uids.
58 Without this, there is a race where the login name of an existing
59 connection, as returned by getlogin(), may be changed to the privsep
60 user (sshd). markus@ OK
61 - markus@cvs.openbsd.org 2002/05/13 21:26:49
63 handle debug messages during rhosts-rsa and hostbased authentication;
65 - mouring@cvs.openbsd.org 2002/05/15 15:47:49
66 [kex.c monitor.c monitor_wrap.c sshd.c]
67 'monitor' variable clashes with at least one lame platform (NeXT). i
68 Renamed to 'pmonitor'. provos@
69 - deraadt@cvs.openbsd.org 2002/05/04 02:39:35
70 [servconf.c sshd.8 sshd_config]
71 enable privsep by default; provos ok
72 - millert@cvs.openbsd.org 2002/05/06 23:34:33
74 Kill/adjust r(login|exec)d? references now that those are no longer in
76 - markus@cvs.openbsd.org 2002/05/15 21:02:53
77 [servconf.c sshd.8 sshd_config]
78 disable privsep and enable setuid for the 3.2.2 release
79 - (bal) Fixed up PAM case. I think.
80 - (bal) Clarified openbsd-compat/*-cray.* Licence provided by Wendy
81 - (bal) OpenBSD CVS Sync
82 - markus@cvs.openbsd.org 2002/05/15 21:05:29
85 - (bal) Caldara, Suse, and Redhat openssh.specs updated.
88 - (stevesk) [README.privsep] PAM+privsep works with Solaris 8.
89 - (tim) [sshpty.c] set tty modes when allocating old style bsd ptys to
90 match what newer style ptys have when allocated. Based on a patch by
91 Roger Cornelius <rac@tenzing.org>
92 - (tim) [README.privsep] UnixWare 7 and OpenUNIX 8 work.
93 - (tim) [README.privsep] remove reference to UnixWare 7 and OpenUNIX 8
94 from PAM-enabled pragraph. UnixWare has no PAM.
95 - (tim) [contrib/caldera/openssh.spec] update version.
98 - (stevesk) add initial README.privsep
99 - (stevesk) [configure.ac] nicer message: --with-privsep-user=user
100 - (djm) Add --with-superuser-path=xxx configure option to specify
101 what $PATH the superuser receives.
102 - (djm) Bug #231: UsePrivilegeSeparation turns off Banner.
103 - (djm) Add --with-privsep-path configure option
104 - (djm) Update RPM spec file: different superuser path, use
105 /var/empty/sshd for privsep
106 - (djm) Bug #234: missing readpassphrase declaration and defines
107 - (djm) Add INSTALL warning about SSH protocol 1 blowfish w/
111 - (tim) [configure.ac] applied a rework of djm's OpenSSL search cleanup patch.
112 Now only searches system and /usr/local/ssl (OpenSSL's default install path)
113 Others must use --with-ssl-dir=....
114 - (tim) [monitor_fdpass.c] fix for systems that have both
115 HAVE_ACCRIGHTS_IN_MSGHDR and HAVE_CONTROL_IN_MSGHDR. Ie. sys/socket.h
116 has #define msg_accrights msg_control
119 - (stevesk) [auth.c] Shadow account and expiration cleanup. Now
120 check for root forced expire. Still don't check for inactive.
121 - (djm) Rework RedHat RPM files. Based on spec from Nalin
122 Dahyabhai <nalin@redhat.com> and patches from
123 Pekka Savola <pekkas@netcore.fi>
124 - (djm) Try to drop supplemental groups at daemon startup. Patch from
126 - (bal) Back all the way out of auth-passwd.c changes. Breaks too many
127 things that don't set pw->pw_passwd.
130 - (tim) [Makefile.in] Unbreak make -f Makefile.in distprep
133 - (tim) [openbsd-compat/bsd-arc4random.c] fix logic on when seed_rng() is
134 called. Report by Chris Maxwell <maxwell@cs.dal.ca>
135 - (tim) [Makefile.in configure.ac] set SHELL variable in Makefile
136 - (djm) Disable PAM kbd-int auth if privsep is turned on (it doesn't work)
139 - (tim) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
140 Add truncate() emulation to address Bug 208
143 - (djm) Unbreak auth-passwd.c for PAM and SIA
144 - (djm) Unbreak PAM auth for protocol 1. Report from Pekka Savola
146 - (djm) Don't reinitialise PAM credentials before we have started PAM.
147 Report from Pekka Savola <pekkas@netcore.fi>
150 - (bal) Fixed auth-passwd.c to resolve PermitEmptyPassword issue
153 - (djm) Import OpenBSD regression tests. Requires BSD make to run
154 - (djm) Fix readpassphase compilation for systems which have it
157 - (tim) [contrib/caldera/openssh.spec] update fixUP to reflect changes in
159 - (tim) [contrib/cygwin/README] remove reference to regex.
160 patch from Corinna Vinschen <vinschen@redhat.com>
163 - (djm) Bug #137, #209: fix make problems for scard/Ssh.bin, do uudecode
165 - (djm) Disable PAM password expiry until a complete fix for bug #188
167 - (djm) Bug #180: Set ToS bits on IPv4-in-IPv6 mapped addresses. Based on
168 patch from openssh@misc.tecq.org
171 - (stevesk) [defines.h] remove USE_TIMEVAL; unused
172 - (stevesk) [acconfig.h auth-passwd.c configure.ac sshd.c] HP-UX 10.26
173 support. bug #184. most from dcole@keysoftsys.com.
176 - (djm) OpenBSD CVS Sync
177 - markus@cvs.openbsd.org 2002/04/23 12:54:10
180 - djm@cvs.openbsd.org 2002/04/23 22:16:29
182 Improve error message; ok markus@ stevesk@
185 - (stevesk) [acconfig.h configure.ac session.c] LOGIN_NO_ENDOPT for HP-UX
186 - (stevesk) [acconfig.h] NEED_IN_SYSTM_H unused
187 - (markus) OpenBSD CVS Sync
188 - markus@cvs.openbsd.org 2002/04/23 12:58:26
190 send complete ticket; semerad@ss1000.ms.mff.cuni.cz
191 - (djm) Trim ChangeLog to include only post-3.1 changes
192 - (djm) Update RPM spec file versions
193 - (djm) Redhat spec enables KrbV by default
194 - (djm) Applied OpenSC smartcard updates from Markus &
195 Antti Tapaninen <aet@cc.hut.fi>
196 - (djm) Define BROKEN_REALPATH for AIX, patch from
197 Antti Tapaninen <aet@cc.hut.fi>
198 - (djm) Bug #214: Fix utmp for Irix (don't strip "tty"). Patch from
199 Kevin Taylor <no@nowhere.org> (??) via Philipp Grau
200 <phgrau@zedat.fu-berlin.de>
201 - (djm) Bug #213: Simplify CMSG_ALIGN macros to avoid symbol clashes.
202 Reported by Doug Manton <dmanton@emea.att.com>
203 - (djm) Bug #222: Fix tests for getaddrinfo on OSF/1. Spotted by
204 Robert Urban <urban@spielwiese.de>
205 - (djm) Bug #206 - blibpath isn't always needed for AIX ld, avoid
206 sizeof(long long int) == 4 breakage. Patch from Matthew Clarke
207 <Matthew_Clarke@mindlink.bc.ca>
208 - (djm) Make privsep work with PAM (still experimental)
209 - (djm) OpenBSD CVS Sync
210 - deraadt@cvs.openbsd.org 2002/04/20 09:02:03
212 No, afs requires explicit enabling
213 - markus@cvs.openbsd.org 2002/04/20 09:14:58
215 add buffer_{get,put}_short
216 - markus@cvs.openbsd.org 2002/04/20 09:17:19
218 rewrite using the buffer_* API, fixes overflow; ok deraadt@
219 - stevesk@cvs.openbsd.org 2002/04/21 16:19:27
221 document default AFSTokenPassing no; ok deraadt@
222 - stevesk@cvs.openbsd.org 2002/04/21 16:25:06
224 spelling in error message; ok markus@
225 - markus@cvs.openbsd.org 2002/04/22 06:15:47
227 fix check for overflow
228 - markus@cvs.openbsd.org 2002/04/22 16:16:53
229 [servconf.c sshd.8 sshd_config]
230 do not auto-enable KerberosAuthentication; ok djm@, provos@, deraadt@
231 - markus@cvs.openbsd.org 2002/04/22 21:04:52
232 [channels.c clientloop.c clientloop.h ssh.c]
233 request reply (success/failure) for -R style fwd in protocol v2,
234 depends on ordered replies.
235 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=215; ok provos@
238 - (tim) [entropy.c.] Portability fix for SCO Unix 3.2v4.x (SCO OSR 3.0).
239 entropy.c needs seteuid(getuid()) for the setuid(original_uid) to
240 succeed. Patch by gert@greenie.muc.de. This fixes one part of Bug 208
243 - (djm) Avoid SIGCHLD breakage when run from rsync. Fix from
244 Sturle Sunde <sturle.sunde@usit.uio.no>
247 - (djm) Tell users to configure /dev/random support into OpenSSL in
249 - (djm) Fix .Nm in mdoc2man.pl from pspencer@fields.utoronto.ca
250 - (tim) [configure.ac] Issue warning on --with-default-path=/some_path
251 if LOGIN_CAP is enabled. Report & testing by Tuc <tuc@ttsg.com>
254 - (djm) Unbreak "make install". Fix from Darren Tucker
256 - (stevesk) bsd-cygwin_util.[ch] BSD license from Corinna Vinschen
257 - (tim) [configure.ac] add tests for recvmsg and sendmsg.
258 [monitor_fdpass.c] add checks for HAVE_SENDMSG and HAVE_RECVMSG for
259 systems that HAVE_ACCRIGHTS_IN_MSGHDR but no recvmsg or sendmsg.
262 - (djm) ssh-rand-helper improvements
263 - Add commandline debugging options
264 - Don't write binary data if stdout is a tty (use hex instead)
266 - (djm) Random number collection doc fixes from Ben
269 - (djm) Add KrbV support patch from Simon Wilkinson <simon@sxw.org.uk>
272 - (stevesk) [auth-sia.[ch]] add BSD license from Chris Adams
273 - (tim) [configure.ac] add <sys/types.h> to msghdr tests. Change -L
274 to -h on testing for /bin being symbolic link
275 - (bal) Mistaken in Cygwin scripts for ssh starting. Patch by
276 Corinna Vinschen <vinschen@redhat.com>
277 - (bal) disable privsep if no MAP_ANON. We can re-enable it
278 after the release when we can do more testing.
281 - (stevesk) [auth-sia.c] cleanup
282 - (tim) [acconfig.h defines.h includes.h] put includes in includes.h and
283 defines in defines.h [rijndael.c openbsd-compat/fake-socket.h
284 openbsd-compat/inet_aton.c] include "includes.h" instead of "config.h"
288 - (stevesk) [configure.ac monitor.c] HAVE_SOCKETPAIR
289 - (stevesk) [auth-sia.c] compile fix Chris Adams <cmadams@hiwaay.net>
290 - (bal) OpenBSD CVS Sync
291 - markus@cvs.openbsd.org 2002/04/10 08:21:47
292 [auth1.c compat.c compat.h]
293 strip '@' from username only for KerbV and known broken clients,
295 - markus@cvs.openbsd.org 2002/04/10 08:56:01
298 - Added p1 to idenify Portable release version.
301 - (bal) Minor OpenSC updates. Fix up header locations and update
302 README.smartcard provided by Juha Yrjölä <jyrjola@cc.hut.fi>
305 - (stevesk) HAVE_CONTROL_IN_MSGHDR; not used right now.
306 Future: we may want to test if fd passing works correctly.
307 - (stevesk) [monitor_fdpass.c] fatal() for UsePrivilegeSeparation=yes
308 and no fd passing support.
309 - (stevesk) HAVE_MMAP and HAVE_SYS_MMAN_H and use them in
311 - (stevesk) remove configure support for poll.h; it was removed
312 from sshd.c a long time ago.
313 - (stevesk) --with-privsep-user; default sshd
314 - (stevesk) wrap munmap() with HAVE_MMAP also.
317 - (djm) Typo in Suse SPEC file. Fix from Carsten Grohmann
318 <carsten.grohmann@dr-baldeweg.de>
319 - (bal) Added MAP_FAILED to allow AIX and Trusted HP to compile.
320 - (bal) OpenBSD CVS Sync
321 - djm@cvs.openbsd.org 2002/04/06 00:30:08
323 Fix occasional corruption on upload due to bad reuse of request
324 id, spotted by chombier@mac.com; ok markus@
325 - mouring@cvs.openbsd.org 2002/04/06 18:24:09
327 Fixes potental double // within path.
328 http://bugzilla.mindrot.org/show_bug.cgi?id=76
329 - (bal) Slight update to OpenSC support. Better version checking. patch
330 by Juha Yrjölä <jyrjola@cc.hut.fi>
331 - (bal) Revered out of runtime IRIX detection of joblimits. Code is
333 - (bal) Quiet down configure.ac if /bin/test does not exist.
334 - (bal) We no longer use atexit()/xatexit()/on_exit()
337 - (bal) Patch for OpenSC SmartCard library; ok markus@; patch by
338 Juha Yrjölä <jyrjola@cc.hut.fi>
339 - (bal) Minor documentation update to reflect smartcard library
341 - (bal) Too many <sys/queue.h> issues. Remove all workarounds and
342 using internal version only.
343 - (bal) OpenBSD CVS Sync
344 - stevesk@cvs.openbsd.org 2002/04/05 20:56:21
346 clarify sshrc some and handle X11UseLocalhost=yes; ok markus@
349 - (stevesk) [auth-pam.c auth-pam.h auth-passwd.c auth-sia.c auth-sia.h
350 auth1.c auth2.c] PAM, OSF_SIA password auth cleanup; from djm.
351 - (bal) OpenBSD CVS Sync
352 - markus@cvs.openbsd.org 2002/04/03 09:26:11
353 [cipher.c myproposal.h]
354 re-add rijndael-cbc@lysator.liu.se for MacSSH; ash@lab.poc.net
357 - (bal) Hand Sync of scp.c (reverted to upstream code)
358 - deraadt@cvs.openbsd.org 2002/03/30 17:45:46
361 - (bal) CVS ID sync of uidswap.c
362 - (bal) OpenBSD CVS Sync (now for the real sync)
363 - markus@cvs.openbsd.org 2002/03/27 22:21:45
365 try to import keys with extra trailing === (seen with ssh.com <
367 - markus@cvs.openbsd.org 2002/03/28 15:34:51
369 do not call record_login twice (for use_privsep)
370 - markus@cvs.openbsd.org 2002/03/29 18:59:32
371 [session.c session.h]
372 retrieve last login time before the pty is allocated, store per
374 - stevesk@cvs.openbsd.org 2002/03/29 19:16:22
376 RSA key modulus size minimum 768; ok markus@
377 - stevesk@cvs.openbsd.org 2002/03/29 19:18:33
378 [auth-rsa.c ssh-rsa.c ssh.h]
379 make RSA modulus minimum #define; ok markus@
380 - markus@cvs.openbsd.org 2002/03/30 18:51:15
381 [monitor.c serverloop.c sftp-int.c sftp.c sshd.c]
382 check waitpid for EINTR; based on patch from peter@ifm.liu.se
383 - markus@cvs.openbsd.org 2002/04/01 22:02:16
385 20480 is an upper limit for older server
386 - markus@cvs.openbsd.org 2002/04/01 22:07:17
388 fallback to stat if server does not support lstat
389 - markus@cvs.openbsd.org 2002/04/02 11:49:39
391 check $SHELL for -k and -d, too;
392 http://bugzilla.mindrot.org/show_bug.cgi?id=199
393 - markus@cvs.openbsd.org 2002/04/02 17:37:48
395 always call log_init()
396 - markus@cvs.openbsd.org 2002/04/02 20:11:38
398 ignore SSH_BUG_SIGBLOB for ssh-rsa; #187
399 - (bal) mispelling in uidswap.c (portable only)
402 - (stevesk) [monitor.c] PAM should work again; will *not* work with
403 UsePrivilegeSeparation=yes.
404 - (stevesk) [auth1.c] fix password auth for protocol 1 when
405 !USE_PAM && !HAVE_OSF_SIA; merge issue.
408 - (tim) [configure.ac] use /bin/test -L to work around broken builtin on
410 - (tim) [sshconnect2.c] change uint32_t to u_int32_t
413 - (stevesk) [configure.ac] remove header check for sys/ttcompat.h
417 - (bal) 'pw' should be 'authctxt->pw' in auth1.c spotted by
419 - (bal) OpenBSD CVS Sync
420 - markus@cvs.openbsd.org 2002/03/26 11:34:49
422 update to recent drafts
423 - markus@cvs.openbsd.org 2002/03/26 11:37:05
426 - markus@cvs.openbsd.org 2002/03/26 15:23:40
428 do not talk about packets in bufaux
429 - rees@cvs.openbsd.org 2002/03/26 18:46:59
431 try_AUT0 in read_pubkey too, for those paranoid few who want to
433 - markus@cvs.openbsd.org 2002/03/26 22:50:39
435 CHANNEL_EFD_OUTPUT_ACTIVE is false for CHAN_CLOSE_RCVD, too
436 - markus@cvs.openbsd.org 2002/03/26 23:13:03
438 disallow RSA keys < 768 for protocol 1, too (rhosts-rsa and rsa auth)
439 - markus@cvs.openbsd.org 2002/03/26 23:14:51
441 generate a new cookie for each SSH2_MSG_KEXINIT message we send out
442 - mouring@cvs.openbsd.org 2002/03/27 11:45:42
444 monitor_allowed_key() returns int instead of pointer. ok markus@
447 - (stevesk) import OpenBSD <sys/tree.h> as "openbsd-compat/tree.h"
448 - (bal) OpenBSD CVS Sync
449 - stevesk@cvs.openbsd.org 2002/03/23 20:57:26
451 setproctitle() after preauth child; ok markus@
452 - markus@cvs.openbsd.org 2002/03/24 16:00:27
455 - markus@cvs.openbsd.org 2002/03/24 16:01:13
457 debug->debug3 for extra padding
458 - stevesk@cvs.openbsd.org 2002/03/24 17:27:03
461 - stevesk@cvs.openbsd.org 2002/03/24 17:53:16
463 minor cleanup and more error checking; ok markus@
464 - markus@cvs.openbsd.org 2002/03/24 18:05:29
466 we need to figure out AUT0 for sc_private_encrypt, too
467 - stevesk@cvs.openbsd.org 2002/03/24 23:20:00
469 remove "\n" from fatal()
470 - markus@cvs.openbsd.org 2002/03/25 09:21:13
472 return 0 (not NULL); tomh@po.crl.go.jp
473 - markus@cvs.openbsd.org 2002/03/25 09:25:06
476 - markus@cvs.openbsd.org 2002/03/25 17:34:27
477 [scard.c scard.h ssh-agent.c ssh-keygen.c ssh.c]
478 change sc_get_key to sc_get_keys and hide smartcard details in scard.c
479 - stevesk@cvs.openbsd.org 2002/03/25 20:12:10
480 [monitor_mm.c monitor_wrap.c]
481 ssize_t args use "%ld" and cast to (long)
482 size_t args use "%lu" and cast to (u_long)
483 ok markus@ and thanks millert@
484 - markus@cvs.openbsd.org 2002/03/25 21:04:02
486 simplify num_identity_files handling
487 - markus@cvs.openbsd.org 2002/03/25 21:13:51
488 [channels.c channels.h compat.c compat.h nchan.c]
489 don't send stderr data after EOF, accept this from older known
490 (broken) sshd servers only, fixes
491 http://bugzilla.mindrot.org/show_bug.cgi?id=179
492 - stevesk@cvs.openbsd.org 2002/03/26 03:24:01
493 [monitor.h monitor_fdpass.h monitor_mm.h monitor_wrap.h]
497 - (stevesk) [session.c] disable LOGIN_NEEDS_TERM until we are sure
498 it can be removed. only used on solaris. will no longer compile with
502 - (stevesk) HAVE_ACCRIGHTS_IN_MSGHDR configure support
503 - (stevesk) [monitor.c monitor_wrap.c] #ifdef HAVE_PW_CLASS_IN_PASSWD
504 - (stevesk) configure and cpp __FUNCTION__ gymnastics to handle nielsisms
505 - (stevesk) [monitor_fdpass.c] support for access rights style file
507 - (stevesk) [auth2.c] merge cleanup/sync
508 - (stevesk) [defines.h] hp-ux 11 has ancillary data style fd passing, but
509 is missing CMSG_LEN() and CMSG_SPACE() macros.
510 - (stevesk) [defines.h] #define MAP_ANON MAP_ANONYMOUS for HP-UX; other
511 platforms may need this--I'm not sure. mmap() issues will need to be
513 - (tim) [cipher.c] fix problem with OpenBSD sync
514 - (stevesk) [LICENCE] OpenBSD sync
517 - (bal) OpenBSD CVS Sync
518 - itojun@cvs.openbsd.org 2002/03/08 06:10:16
521 - itojun@cvs.openbsd.org 2002/03/11 03:18:49
523 correct type mismatches (u_int64_t != unsigned long long)
524 - itojun@cvs.openbsd.org 2002/03/11 03:19:53
527 - markus@cvs.openbsd.org 2002/03/14 15:24:27
529 don't trust size sent by (rogue) server; noted by
531 - markus@cvs.openbsd.org 2002/03/14 16:38:26
533 split out ssh1 session key decryption; ok provos@
534 - markus@cvs.openbsd.org 2002/03/14 16:56:33
535 [auth-rh-rsa.c auth-rsa.c auth.h]
536 split auth_rsa() for better readability and privsep; ok provos@
537 - itojun@cvs.openbsd.org 2002/03/15 11:00:38
539 fix file type checking (use S_ISREG). ok by markus
540 - markus@cvs.openbsd.org 2002/03/16 11:24:53
542 skip inflateEnd if inflate fails; ok provos@
543 - markus@cvs.openbsd.org 2002/03/16 17:22:09
544 [auth-rh-rsa.c auth.h]
545 split auth_rhosts_rsa(), ok provos@
546 - stevesk@cvs.openbsd.org 2002/03/16 17:41:25
548 BSD license. from Daniel Kouril via Dug Song. ok markus@
549 - provos@cvs.openbsd.org 2002/03/17 20:25:56
550 [auth.c auth.h auth1.c auth2.c]
551 getpwnamallow returns struct passwd * only if user valid;
553 - provos@cvs.openbsd.org 2002/03/18 01:12:14
554 [auth.h auth1.c auth2.c sshd.c]
555 have the authentication functions return the authentication context
556 and then do_authenticated; okay millert@
557 - dugsong@cvs.openbsd.org 2002/03/18 01:30:10
559 set client to NULL after xfree(), from Rolf Braun
560 <rbraun+ssh@andrew.cmu.edu>
561 - provos@cvs.openbsd.org 2002/03/18 03:41:08
563 move auth_approval into getpwnamallow with help from millert@
564 - markus@cvs.openbsd.org 2002/03/18 17:13:15
566 export/import cipher states; needed by ssh-privsep
567 - markus@cvs.openbsd.org 2002/03/18 17:16:38
569 export/import cipher state, iv and ssh2 seqnr; needed by ssh-privsep
570 - markus@cvs.openbsd.org 2002/03/18 17:23:31
572 add key_demote() for ssh-privsep
573 - provos@cvs.openbsd.org 2002/03/18 17:25:29
575 buffer_skip_string and extra sanity checking; needed by ssh-privsep
576 - provos@cvs.openbsd.org 2002/03/18 17:31:54
578 export compression streams for ssh-privsep
579 - provos@cvs.openbsd.org 2002/03/18 17:50:31
580 [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c]
581 [auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c]
582 [kexgex.c servconf.c]
583 [session.h servconf.h serverloop.c session.c sshd.c]
584 integrate privilege separated openssh; its turned off by default
585 for now. work done by me and markus@
586 - provos@cvs.openbsd.org 2002/03/18 17:53:08
589 - provos@cvs.openbsd.org 2002/03/18 17:59:09
591 document UsePrivilegeSeparation
592 - stevesk@cvs.openbsd.org 2002/03/18 23:52:51
594 UnprivUser/UnprivGroup usable now--specify numeric user/group; ok
596 - stevesk@cvs.openbsd.org 2002/03/19 03:03:43
597 [pathnames.h servconf.c servconf.h sshd.c]
598 _PATH_PRIVSEP_CHROOT_DIR; ok provos@
599 - stevesk@cvs.openbsd.org 2002/03/19 05:23:08
601 Banner has no default.
602 - mpech@cvs.openbsd.org 2002/03/19 06:32:56
604 use xfree() after xstrdup().
607 - markus@cvs.openbsd.org 2002/03/19 10:35:39
608 [auth-options.c auth.h session.c session.h sshd.c]
610 - markus@cvs.openbsd.org 2002/03/19 10:49:35
611 [auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h]
612 [packet.c session.c sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c]
613 [sshconnect2.c sshd.c ttymodes.c]
615 - markus@cvs.openbsd.org 2002/03/19 14:27:39
616 [auth.c auth1.c auth2.c]
617 make getpwnamallow() allways call pwcopy()
618 - markus@cvs.openbsd.org 2002/03/19 15:31:47
620 check for NULL; from provos@
621 - stevesk@cvs.openbsd.org 2002/03/20 19:12:25
622 [servconf.c servconf.h ssh.h sshd.c]
623 for unprivileged user, group do:
624 pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@
625 - stevesk@cvs.openbsd.org 2002/03/20 21:08:08
627 strerror() on chdir() fail; ok provos@
628 - markus@cvs.openbsd.org 2002/03/21 10:21:20
630 ignore errors for nonexisting default keys in ssh-add,
631 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158
632 - jakob@cvs.openbsd.org 2002/03/21 15:17:26
634 add built-in command line for adding new port forwardings on the fly.
635 based on a patch from brian wellington. ok markus@.
636 - markus@cvs.openbsd.org 2002/03/21 16:38:06
638 make compile w/ openssl 0.9.7
639 - markus@cvs.openbsd.org 2002/03/21 16:54:53
640 [scard.c scard.h ssh-keygen.c]
641 move key upload to scard.[ch]
642 - markus@cvs.openbsd.org 2002/03/21 16:57:15
645 - markus@cvs.openbsd.org 2002/03/21 16:58:13
648 - rees@cvs.openbsd.org 2002/03/21 18:08:15
650 In sc_put_key(), sc_reader_id should be id.
651 - markus@cvs.openbsd.org 2002/03/21 20:51:12
654 - markus@cvs.openbsd.org 2002/03/21 21:23:34
656 add privsep_preauth() and remove 1 goto; ok provos@
657 - rees@cvs.openbsd.org 2002/03/21 21:54:34
658 [scard.c scard.h ssh-keygen.c]
659 Add PIN-protection for secret key.
660 - rees@cvs.openbsd.org 2002/03/21 22:44:05
661 [authfd.c authfd.h ssh-add.c ssh-agent.c ssh.c]
662 Add PIN-protection for secret key.
663 - markus@cvs.openbsd.org 2002/03/21 23:07:37
665 remove unused, sync w/ cmdline patch in my tree.
668 - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is
669 wanted, warn if directory does not exist. Put system directories in
670 front of PATH for finding entorpy commands.
671 - (tim) [contrib/aix/buildbff.sh contrib/aix/inventory.sh] AIX package
672 build fixes. Patch by Darren Tucker <dtucker@zip.com.au>
673 [contrib/solaris/buildpkg.sh] add missing dirs to SYSTEM_DIR. Have
674 postinstall check for $piddir and add if necessary.
677 - (tim) [contrib/solaris/buildpkg.sh, contrib/solaris/README] Updated to
678 build on all platforms that support SVR4 style package tools. Now runs
679 from build dir. Parts are based on patches from Antonio Navarro, and
683 - (djm) Revert bits of Markus' OpenSSL compat patch which was
684 accidentally committed.
685 - (djm) Add Markus' patch for compat wih OpenSSL < 0.9.6.
686 Known issue: Blowfish for SSH1 does not work
687 - (stevesk) entropy.c: typo in debug message
688 - (djm) ssh-keygen -i needs seeded RNG; report from markus@