2 - (dtucker) OpenBSD CVS Sync
3 - djm@cvs.openbsd.org 2003/06/28 07:48:10
5 report pidfile creation errors, based on patch from Roumen Petrov;
7 - deraadt@cvs.openbsd.org 2003/06/28 16:23:06
8 [atomicio.c atomicio.h authfd.c clientloop.c monitor_wrap.c msg.c
9 progressmeter.c scp.c sftp-client.c ssh-keyscan.c ssh.h sshconnect.c
11 deal with typing of write vs read in atomicio
12 - markus@cvs.openbsd.org 2003/06/29 12:44:38
14 memset 0, not \0; andrushock@korovino.net
15 - markus@cvs.openbsd.org 2003/07/02 12:56:34
17 deny dynamic forwarding with -R for v1, too; ok djm@
18 - markus@cvs.openbsd.org 2003/07/02 14:51:16
19 [channels.c ssh.1 ssh_config.5]
20 (re)add socks5 suppport to -D; ok djm@
21 now ssh(1) can act both as a socks 4 and socks 5 server and
22 dynamically forward ports.
23 - markus@cvs.openbsd.org 2003/07/02 20:37:48
25 convert hostkeyalias to lowercase, otherwise uppercase aliases will
26 not match at all; ok henning@
27 - markus@cvs.openbsd.org 2003/07/03 08:21:46
28 [regress/dynamic-forward.sh]
29 add socks5; speedup; reformat; based on patch from dtucker@zip.com.au
30 - markus@cvs.openbsd.org 2003/07/03 08:24:13
32 enable tests for dynamic fwd via socks (-D), uses nc(1)
35 - (djm) Search for support functions necessary to build our
36 getrrsetbyname() replacement. Patch from Roumen Petrov
39 - (dtucker) [includes.h] Bug #602: move #include of netdb.h to after in.h
40 (fixes compiler warnings on Solaris 2.5.1).
41 - (dtucker) [configure.ac] Add sanity test after system-dependant compiler
45 - (djm) Bug #591: use PKCS#15 private key label as a comment in case
46 of OpenSC. Report and patch from larsch@trustcenter.de
47 - (djm) Bug #593: Sanity check OpenSC card reader number; patch from
49 - (dtucker) OpenBSD CVS Sync
50 - markus@cvs.openbsd.org 2003/06/23 09:02:44
52 document EnableSSHKeysign; bugzilla #599; ok deraadt@, jmc@
53 - markus@cvs.openbsd.org 2003/06/24 08:23:46
54 [auth2-hostbased.c auth2-pubkey.c auth2.c channels.c key.c key.h
55 monitor.c packet.c packet.h serverloop.c sshconnect2.c sshd.c]
56 int -> u_int; ok djm@, deraadt@, mouring@
57 - miod@cvs.openbsd.org 2003/06/25 22:39:36
59 Typo police: attribute is better written with an 'r'.
60 - markus@cvs.openbsd.org 2003/06/26 20:08:33
62 do not dump core for 'ssh -o proxycommand host'; ok deraadt@
63 - (dtucker) [regress/dynamic-forward.sh] Import new regression test.
64 - (dtucker) [configure.ac] Bug #570: Have ./configure --enable-FEATURE
65 actually enable the feature, for those normally disabled. Patch by
66 openssh (at) roumenpetrov.info.
69 - (dtucker) Have configure refer the user to config.log and
70 contrib/findssl.sh for OpenSSL header/library mismatches.
73 - (dtucker) OpenBSD CVS Sync
74 - markus@cvs.openbsd.org 2003/06/21 09:14:05
75 [regress/reconfigure.sh]
76 missing $SUDO; from dtucker@zip.com.au
77 - markus@cvs.openbsd.org 2003/06/18 11:28:11
79 backout last change, since it violates pkcs#1
80 switch to share/misc/license.template
81 - djm@cvs.openbsd.org 2003/06/20 05:47:58
83 sync description of protocol 2 cipher proposal; ok markus
84 - djm@cvs.openbsd.org 2003/06/20 05:48:21
86 sync some implemented options; ok markus@
87 - (dtucker) [regress/authorized_keys_root] Remove temp data file from CVS.
88 - (dtucker) [openbsd-compat/setproctitle.c] Ensure SPT_TYPE is defined before
92 - (djm) OpenBSD CVS Sync
93 - markus@cvs.openbsd.org 2003/06/12 07:57:38
94 [monitor.c sshlogin.c sshpty.c]
95 typos; dtucker at zip.com.au
96 - djm@cvs.openbsd.org 2003/06/12 12:22:47
98 mention more copyright holders; ok markus@
99 - nino@cvs.openbsd.org 2003/06/12 15:34:09
102 - markus@cvs.openbsd.org 2003/06/12 19:12:03
103 [scard.c scard.h ssh-agent.c ssh.c]
104 add sc_get_key_label; larsch at trustcenter.de; bugzilla#591
105 - markus@cvs.openbsd.org 2003/06/16 08:22:35
107 make sure the signature has at least the expected length (don't
108 insist on len == hlen + oidlen, since this breaks some smartcards)
109 bugzilla #592; ok djm@
110 - markus@cvs.openbsd.org 2003/06/16 10:22:45
112 print out key comment on each prompt; make ssh-askpass more useable; ok djm@
113 - markus@cvs.openbsd.org 2003/06/17 18:14:23
115 use license from /usr/share/misc/license.template for new code
116 - (dtucker) [reconfigure.sh rekey.sh sftp-badcmds.sh]
117 Import new regression tests from OpenBSD
118 - (dtucker) [regress/copy.1 regress/copy.2] Remove temp data files from CVS.
119 - (dtucker) OpenBSD CVS Sync (regress/)
120 - markus@cvs.openbsd.org 2003/04/02 12:21:13
123 - djm@cvs.openbsd.org 2003/04/04 09:34:22
124 [Makefile sftp-cmds.sh]
125 More regression tests, including recent directory rename bug; ok markus@
126 - markus@cvs.openbsd.org 2003/05/14 22:08:27
127 [ssh-com-client.sh ssh-com-keygen.sh ssh-com-sftp.sh ssh-com.sh]
128 test against some new commerical versions
129 - mouring@cvs.openbsd.org 2003/05/15 04:07:12
131 Advanced put/get testing for sftp. OK @djm
132 - markus@cvs.openbsd.org 2003/06/12 15:40:01
135 - markus@cvs.openbsd.org 2003/06/12 15:43:32
137 test -HUP; dtucker at zip.com.au
140 - (djm) Update license on fake-rfc2553.[ch]; ok itojun@
143 - (djm) Mention portable copyright holders in LICENSE
144 - (djm) Put licenses on substantial header files
145 - (djm) Sync LICENSE against OpenBSD
146 - (djm) OpenBSD CVS Sync
147 - jmc@cvs.openbsd.org 2003/06/10 09:12:11
148 [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5]
149 [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
151 - COMPATIBILITY merge
153 - kill whitespace at EOL
154 - new sentence, new line
156 - deraadt@cvs.openbsd.org 2003/06/10 22:20:52
157 [packet.c progressmeter.c]
158 mostly ansi cleanup; pval ok
159 - jakob@cvs.openbsd.org 2003/06/11 10:16:16
161 clean up check_host_key() and improve SSHFP feedback. ok markus@
162 - jakob@cvs.openbsd.org 2003/06/11 10:18:47
164 sync with check_host_key() change
165 - djm@cvs.openbsd.org 2003/06/11 11:18:38
166 [authfd.c authfd.h ssh-add.c ssh-agent.c]
167 make agent constraints (lifetime, confirm) work with smartcard keys;
172 - (djm) Sync README.smartcard with OpenBSD -current
173 - (djm) Re-merge OpenSC info into README.smartcard
176 - (dtucker) [uidswap.c] Fix setreuid and add missing args to fatal(). ok djm@
179 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
181 - (djm) Implement paranoid priv dropping checks, based on:
182 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
183 Proceedings of USENIX Security Symposium 2002
184 - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
185 - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
186 - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
187 Patch from larsch@trustcenter.de
188 - (djm) Bug #589 - scard-opensc: load only keys with a private keys
189 Patch from larsch@trustcenter.de
190 - (dtucker) Add includes.h to fake-rfc2553.c so it will build.
191 - (dtucker) Define EAI_NONAME in fake-rfc2553.h (used by fake-rfc2553.c).
194 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
195 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
196 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
197 Patch from larsch@trustcenter.de; ok markus@
198 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
199 larsch@trustcenter.de; ok markus@
200 - (djm) OpenBSD CVS Sync
201 - djm@cvs.openbsd.org 2003/06/04 08:25:18
203 disable challenge/response and keyboard-interactive auth methods
204 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
206 - djm@cvs.openbsd.org 2003/06/04 10:23:48
208 remove duplicated group-dropping code; ok markus@
209 - djm@cvs.openbsd.org 2003/06/04 12:03:59
211 remove bitrotten commet; ok markus@
212 - djm@cvs.openbsd.org 2003/06/04 12:18:49
215 - djm@cvs.openbsd.org 2003/06/04 12:40:39
217 kill ssh process upon receipt of signal, bz #241.
218 based on patch from esb AT hawaii.edu; ok markus@
219 - djm@cvs.openbsd.org 2003/06/04 12:41:22
221 kill ssh process on receipt of signal; ok markus@
222 - (djm) Update to fix of bug #584: lock card before return.
223 From larsch@trustcenter.de
224 - (djm) Always use mysignal() for SIGALRM
227 - (djm) Replace setproctitle replacement with code derived from
229 - (djm) OpenBSD CVS Sync
230 - markus@cvs.openbsd.org 2003/06/02 09:17:34
231 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
232 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
234 deprecate VerifyReverseMapping since it's dangerous if combined
235 with IP based access control as noted by Mike Harding; replace with
236 a UseDNS option, UseDNS is on by default and includes the
237 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
239 - millert@cvs.openbsd.org 2003/06/03 02:56:16
241 Remove the advertising clause in the UCB license which Berkeley
242 rescinded 22 July 1999. Proofed by myself and Theo.
243 - (djm) Fix portable-specific uses of verify_reverse_mapping too
244 - (djm) Sync openbsd-compat with OpenBSD CVS.
245 - No more 4-term BSD licenses in linked code
246 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
249 - (djm) Fix segv from bad reordering in auth-pam.c
250 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
252 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
254 - (djm) Remove "noip6" option from RedHat spec file. This may now be
255 set at runtime using AddressFamily option.
256 - (djm) Fix use of macro before #define in cipher-aes.c
257 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
258 - (djm) OpenBSD CVS Sync
259 - djm@cvs.openbsd.org 2003/05/26 12:54:40
261 fix format strings; ok markus@
262 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
264 seteuid and setegid; markus ok
265 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
267 VerifyHostKeyDNS is v2 only. ok markus@
270 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
272 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
275 - (djm) Avoid auth2-chall.c warning when compiling without
276 PAM, BSD_AUTH and SKEY
279 - (djm) OpenBSD CVS Sync
280 - djm@cvs.openbsd.org 2003/05/24 09:02:22
282 pass logged data through strnvis; ok markus
283 - djm@cvs.openbsd.org 2003/05/24 09:30:40
284 [authfile.c monitor.c sftp-common.c sshpty.c]
285 cast some types for printing; ok markus@
288 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
291 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
292 encoding (which encodes many more characters)
294 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
296 - new sentence, new line
300 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
301 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
302 new sentence, new line
303 - djm@cvs.openbsd.org 2003/05/23 08:29:30
308 - (djm) OpenBSD CVS Sync
309 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
311 use syslog_r() in a signal handler called place; markus ok
312 - (djm) Configure logic to detect syslog_r and friends
315 - (djm) Sync auth-pam.h with what we actually implement
318 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
320 - (djm) OpenBSD CVS Sync
321 - djm@cvs.openbsd.org 2003/05/16 03:27:12
322 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
323 add AddressFamily option to ssh_config (like -4, -6 on commandline).
324 Portable bug #534; ok markus@
325 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
327 just in case, put numbers to sscanf %s arg.
328 - markus@cvs.openbsd.org 2003/05/17 04:27:52
329 [cipher.c cipher-ctr.c myproposal.h]
330 experimental support for aes-ctr modes from
331 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
333 - (djm) Remove IPv4 by default hack now that we can specify AF in config
334 - (djm) Tidy and trim TODO
335 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
336 - (djm) Big KNF on openbsd-compat/
337 - (djm) KNF on md5crypt.[ch]
338 - (djm) KNF on auth-sia.[ch]
341 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
344 - (djm) OpenBSD CVS Sync
345 - djm@cvs.openbsd.org 2003/05/15 13:52:10
347 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
348 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
349 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
350 [readconf.c servconf.c]
351 warn for unsupported config option. ok markus@
352 - markus@cvs.openbsd.org 2003/05/15 14:09:21
354 fix 64bit issue; report itojun@
355 - djm@cvs.openbsd.org 2003/05/15 14:55:25
356 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
357 add a ConnectTimeout option to ssh, based on patch from
358 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
359 - (djm) Add warning for UsePAM when built without PAM support
360 - (djm) A few type mismatch fixes from Bug #565
361 - (djm) Guard free_pam_environment against NULL argument. Works around
362 HP/UX PAM problems debugged by dtucker
365 - (djm) OpenBSD CVS Sync
366 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
370 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
371 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
372 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
373 add experimental support for verifying hos keys using DNS as described
374 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
375 ok markus@ and henning@
376 - markus@cvs.openbsd.org 2003/05/14 22:24:42
377 [clientloop.c session.c ssh.1]
378 allow to send a BREAK to the remote system; ok various
379 - markus@cvs.openbsd.org 2003/05/15 00:28:28
381 cleanup unregister of per-method packet handlers; ok djm@
382 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
383 [readconf.c readconf.h servconf.c servconf.h]
384 always parse kerberos options. ok djm@ markus@
385 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
387 add missing freerrset
388 - markus@cvs.openbsd.org 2003/05/15 03:08:29
389 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
390 split out custom EVP ciphers
391 - djm@cvs.openbsd.org 2003/05/15 03:10:52
393 avoid warning; ok jakob@
394 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
396 Make put/get (globed and nonglobed) code more consistant. OK djm@
397 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
399 Teach ls how to display multiple column display and allow users
400 to return to single column format via 'ls -1'. OK @djm
401 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
402 [readconf.c servconf.c]
403 disable kerberos when not supported. ok markus@
404 - markus@cvs.openbsd.org 2003/05/15 04:08:41
407 - (djm) Always parse UsePAM
408 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
409 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
410 - (djm) Tidy Makefile clean targets
411 - (djm) Adapt README.dns for portable
412 - (djm) Avoid uuencode.c warnings
413 - (djm) Enable UsePAM when built --with-pam
414 - (djm) Only build getrrsetbyname replacement when using --with-dns
415 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
417 - (djm) Bug #444: Wrong paths after reconfigure
418 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
421 - (djm) Bug #117: Don't lie to PAM about username
422 - (djm) RCSID sync w/ OpenBSD
423 - (djm) OpenBSD CVS Sync
424 - djm@cvs.openbsd.org 2003/04/09 12:00:37
426 strip trailing whitespace from config lines before parsing.
427 Fixes bz 528; ok markus@
428 - markus@cvs.openbsd.org 2003/04/12 10:13:57
430 hide cipher details; ok djm@
431 - markus@cvs.openbsd.org 2003/04/12 10:15:36
434 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
436 document -V switch, fix wording; ok markus@
437 - markus@cvs.openbsd.org 2003/04/14 14:17:50
438 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
439 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
440 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
442 Missing globfree(&g) in process_put() spotted by Vince Brimhall
443 <VBrimhall@novell.com>. ok@ Theo
444 - markus@cvs.openbsd.org 2003/04/16 14:35:27
446 document struct Authctxt; with solar
447 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
449 -t in usage(); rogier@quaak.org
450 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
451 [sshd.8 sshd_config.5]
452 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
453 Bug #550 and * escaping suggested by jmc@.
454 - david@cvs.openbsd.org 2003/04/30 20:41:07
456 fix invalid .Pf macro usage introduced in previous commit
458 - markus@cvs.openbsd.org 2003/05/11 16:56:48
459 [authfile.c ssh-keygen.c]
460 change key_load_public to try to read a public from:
461 rsa1 private or rsa1 public and ssh2 keys.
462 this makes ssh-keygen -e fail for ssh1 keys more gracefully
463 for example; report from itojun (netbsd pr 20550).
464 - markus@cvs.openbsd.org 2003/05/11 20:30:25
465 [channels.c clientloop.c serverloop.c session.c ssh.c]
466 make channel_new() strdup the 'remote_name' (not the caller); ok theo
467 - markus@cvs.openbsd.org 2003/05/12 16:55:37
469 for pubkey authentication try the user keys in the following order:
470 1. agent keys that are found in the config file
472 3. keys that are only listed in the config file
473 this helps when an agent has many keys, where the server might
474 close the connection before the correct key is used. report & ok pb@
475 - markus@cvs.openbsd.org 2003/05/12 18:35:18
477 typo: DSA keys are of type ssh-dss; Brian Poole
478 - markus@cvs.openbsd.org 2003/05/14 00:52:59
480 ranges for per auth method messages
481 - djm@cvs.openbsd.org 2003/05/14 01:00:44
483 emphasise the batchmode functionality and make reference to pubkey auth,
484 both of which are FAQs; ok markus@
485 - markus@cvs.openbsd.org 2003/05/14 02:15:47
486 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
487 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
488 server interops with commercial client; ok jakob@ djm@
489 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
491 - better formatting in SYNOPSIS
494 - markus@cvs.openbsd.org 2003/05/14 08:57:49
496 http://bugzilla.mindrot.org/show_bug.cgi?id=560
497 Privsep child continues to run after monitor killed.
498 Pass monitor signals through to child; Darren Tucker
499 - (djm) Make portable build with MIT krb5 (some issues remain)
500 - (djm) Add new UsePAM configuration directive to allow runtime control
501 over usage of PAM. This allows non-root use of sshd when built with
503 - (djm) Die screaming if start_pam() is called when UsePAM=no
504 - (djm) Avoid KrbV leak for MIT Kerberos
505 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
506 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
509 - (djm) Redhat spec: Don't install profile.d scripts when not
510 building with GNOME/GTK askpass (patch from bet@rahul.net)
513 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
514 "make install". Patch by roth@feep.net.
515 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
516 problem on Linux (fixes "could not set controlling tty" errors).
517 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
518 proper challenge-response module
519 - (djm) 2-clause license on loginrec.c, with permission from
523 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
524 Patch from vinschen@redhat.com.
527 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
531 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
532 privsep should now work.
533 - (dtucker) Move handling of bad password authentications into a platform
534 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
537 - (djm) Add back radix.o (used by AFS support), after it went missing from
538 Makefile many moons ago
539 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
540 - (djm) Fix blibpath specification for AIX/gcc
541 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
544 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
548 - (bal) Bug #541: return; was dropped by mistake. Reported by
550 - (bal) Since we don't support platforms lacking u_int_64. We may
551 as well clean out some of those evil #ifdefs
552 - (bal) auth1.c minor resync while looking at the code.
553 - (bal) auth2.c same changed as above.
556 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
557 from matth@eecs.berkeley.edu
558 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
559 - (djm) OpenBSD CVS Sync
560 - markus@cvs.openbsd.org 2003/04/02 09:48:07
561 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
562 [readconf.h serverloop.c sshconnect2.c]
563 reapply rekeying chage, tested by henning@, ok djm@
564 - markus@cvs.openbsd.org 2003/04/02 14:36:26
566 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
567 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
570 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
572 remove $OpenBSD$, as other *.c does not have it.
573 - markus@cvs.openbsd.org 2003/04/07 08:29:57
575 typo: get correct counters; introduced during rekeying change.
576 - millert@cvs.openbsd.org 2003/04/07 21:58:05
578 The UCB copyright here is incorrect. This code did not originate
579 at UCB, it was written by Luke Mewburn. Updated the copyright at
580 the author's request. markus@ OK
581 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
583 rename log() into logit() to avoid name conflict. markus ok, from
585 - (djm) XXX - Performed locally using:
586 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
587 - hin@cvs.openbsd.org 2003/04/09 08:23:52
589 Don't include <krb.h> when compiling with Kerberos 5 support
590 - (djm) Fix up missing include for packet.c
591 - (djm) Fix missed log => logit occurance (reference by function pointer)
594 - (bal) if IP_TOS is not found or broken don't try to compile in
595 packet_set_tos() function call. bug #527
598 - (djm) OpenBSD CVS Sync
599 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
600 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
601 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
603 - new sentence new line
606 - markus@cvs.openbsd.org 2003/04/01 10:10:23
607 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
608 [readconf.h serverloop.c sshconnect2.c]
609 rekeying bugfixes and automatic rekeying:
610 * both client and server rekey _automatically_
611 (a) after 2^31 packets, because after 2^32 packets
612 the sequence number for packets wraps
613 (b) after 2^(blocksize_in_bits/4) blocks
614 (see: draft-ietf-secsh-newmodes-00.txt)
615 (a) and (b) are _enabled_ by default, and only disabled for known
616 openssh versions, that don't support rekeying properly.
617 * client option 'RekeyLimit'
618 * do not reply to requests during rekeying
619 - markus@cvs.openbsd.org 2003/04/01 10:22:21
620 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
621 [readconf.h serverloop.c sshconnect2.c]
622 backout rekeying changes (for 3.6.1)
623 - markus@cvs.openbsd.org 2003/04/01 10:31:26
624 [compat.c compat.h kex.c]
625 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
626 tested by ho@ and myself
627 - markus@cvs.openbsd.org 2003/04/01 10:56:46
630 - (djm) Crank spec file versions
631 - (djm) Release 3.6.1p1
634 - (djm) OpenBSD CVS Sync
635 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
637 one last fix to the tree: race fix broke stuff; pr 3169;
638 srp@srparish.net, help from djm
641 - (djm) Fix getpeerid support for 64 bit BE systems. From
642 Arnd Bergmann <arndb@de.ibm.com>
645 - (djm) OpenBSD CVS Sync
646 - markus@cvs.openbsd.org 2003/03/23 19:02:00
648 unbreak rekeying for privsep; ok millert@
650 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
651 Report from murple@murple.net, diagnosis from dtucker@zip.com.au