2 - (dtucker) OpenBSD CVS Sync
3 - markus@cvs.openbsd.org 2003/06/23 09:02:44
5 document EnableSSHKeysign; bugzilla #599; ok deraadt@, jmc@
6 - markus@cvs.openbsd.org 2003/06/24 08:23:46
7 [auth2-hostbased.c auth2-pubkey.c auth2.c channels.c key.c key.h
8 monitor.c packet.c packet.h serverloop.c sshconnect2.c sshd.c]
9 int -> u_int; ok djm@, deraadt@, mouring@
12 - (dtucker) Have configure refer the user to config.log and
13 contrib/findssl.sh for OpenSSL header/library mismatches.
16 - (dtucker) OpenBSD CVS Sync
17 - markus@cvs.openbsd.org 2003/06/21 09:14:05
18 [regress/reconfigure.sh]
19 missing $SUDO; from dtucker@zip.com.au
20 - markus@cvs.openbsd.org 2003/06/18 11:28:11
22 backout last change, since it violates pkcs#1
23 switch to share/misc/license.template
24 - djm@cvs.openbsd.org 2003/06/20 05:47:58
26 sync description of protocol 2 cipher proposal; ok markus
27 - djm@cvs.openbsd.org 2003/06/20 05:48:21
29 sync some implemented options; ok markus@
30 - (dtucker) [regress/authorized_keys_root] Remove temp data file from CVS.
31 - (dtucker) [openbsd-compat/setproctitle.c] Ensure SPT_TYPE is defined before
35 - (djm) OpenBSD CVS Sync
36 - markus@cvs.openbsd.org 2003/06/12 07:57:38
37 [monitor.c sshlogin.c sshpty.c]
38 typos; dtucker at zip.com.au
39 - djm@cvs.openbsd.org 2003/06/12 12:22:47
41 mention more copyright holders; ok markus@
42 - nino@cvs.openbsd.org 2003/06/12 15:34:09
45 - markus@cvs.openbsd.org 2003/06/12 19:12:03
46 [scard.c scard.h ssh-agent.c ssh.c]
47 add sc_get_key_label; larsch at trustcenter.de; bugzilla#591
48 - markus@cvs.openbsd.org 2003/06/16 08:22:35
50 make sure the signature has at least the expected length (don't
51 insist on len == hlen + oidlen, since this breaks some smartcards)
52 bugzilla #592; ok djm@
53 - markus@cvs.openbsd.org 2003/06/16 10:22:45
55 print out key comment on each prompt; make ssh-askpass more useable; ok djm@
56 - markus@cvs.openbsd.org 2003/06/17 18:14:23
58 use license from /usr/share/misc/license.template for new code
59 - (dtucker) [reconfigure.sh rekey.sh sftp-badcmds.sh]
60 Import new regression tests from OpenBSD
61 - (dtucker) [regress/copy.1 regress/copy.2] Remove temp data files from CVS.
62 - (dtucker) OpenBSD CVS Sync (regress/)
63 - markus@cvs.openbsd.org 2003/04/02 12:21:13
66 - djm@cvs.openbsd.org 2003/04/04 09:34:22
67 [Makefile sftp-cmds.sh]
68 More regression tests, including recent directory rename bug; ok markus@
69 - markus@cvs.openbsd.org 2003/05/14 22:08:27
70 [ssh-com-client.sh ssh-com-keygen.sh ssh-com-sftp.sh ssh-com.sh]
71 test against some new commerical versions
72 - mouring@cvs.openbsd.org 2003/05/15 04:07:12
74 Advanced put/get testing for sftp. OK @djm
75 - markus@cvs.openbsd.org 2003/06/12 15:40:01
78 - markus@cvs.openbsd.org 2003/06/12 15:43:32
80 test -HUP; dtucker at zip.com.au
83 - (djm) Update license on fake-rfc2553.[ch]; ok itojun@
86 - (djm) Mention portable copyright holders in LICENSE
87 - (djm) Put licenses on substantial header files
88 - (djm) Sync LICENSE against OpenBSD
89 - (djm) OpenBSD CVS Sync
90 - jmc@cvs.openbsd.org 2003/06/10 09:12:11
91 [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5]
92 [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
96 - kill whitespace at EOL
97 - new sentence, new line
99 - deraadt@cvs.openbsd.org 2003/06/10 22:20:52
100 [packet.c progressmeter.c]
101 mostly ansi cleanup; pval ok
102 - jakob@cvs.openbsd.org 2003/06/11 10:16:16
104 clean up check_host_key() and improve SSHFP feedback. ok markus@
105 - jakob@cvs.openbsd.org 2003/06/11 10:18:47
107 sync with check_host_key() change
108 - djm@cvs.openbsd.org 2003/06/11 11:18:38
109 [authfd.c authfd.h ssh-add.c ssh-agent.c]
110 make agent constraints (lifetime, confirm) work with smartcard keys;
115 - (djm) Sync README.smartcard with OpenBSD -current
116 - (djm) Re-merge OpenSC info into README.smartcard
119 - (dtucker) [uidswap.c] Fix setreuid and add missing args to fatal(). ok djm@
122 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
124 - (djm) Implement paranoid priv dropping checks, based on:
125 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
126 Proceedings of USENIX Security Symposium 2002
127 - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
128 - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
129 - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
130 Patch from larsch@trustcenter.de
131 - (djm) Bug #589 - scard-opensc: load only keys with a private keys
132 Patch from larsch@trustcenter.de
133 - (dtucker) Add includes.h to fake-rfc2553.c so it will build.
134 - (dtucker) Define EAI_NONAME in fake-rfc2553.h (used by fake-rfc2553.c).
137 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
138 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
139 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
140 Patch from larsch@trustcenter.de; ok markus@
141 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
142 larsch@trustcenter.de; ok markus@
143 - (djm) OpenBSD CVS Sync
144 - djm@cvs.openbsd.org 2003/06/04 08:25:18
146 disable challenge/response and keyboard-interactive auth methods
147 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
149 - djm@cvs.openbsd.org 2003/06/04 10:23:48
151 remove duplicated group-dropping code; ok markus@
152 - djm@cvs.openbsd.org 2003/06/04 12:03:59
154 remove bitrotten commet; ok markus@
155 - djm@cvs.openbsd.org 2003/06/04 12:18:49
158 - djm@cvs.openbsd.org 2003/06/04 12:40:39
160 kill ssh process upon receipt of signal, bz #241.
161 based on patch from esb AT hawaii.edu; ok markus@
162 - djm@cvs.openbsd.org 2003/06/04 12:41:22
164 kill ssh process on receipt of signal; ok markus@
165 - (djm) Update to fix of bug #584: lock card before return.
166 From larsch@trustcenter.de
167 - (djm) Always use mysignal() for SIGALRM
170 - (djm) Replace setproctitle replacement with code derived from
172 - (djm) OpenBSD CVS Sync
173 - markus@cvs.openbsd.org 2003/06/02 09:17:34
174 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
175 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
177 deprecate VerifyReverseMapping since it's dangerous if combined
178 with IP based access control as noted by Mike Harding; replace with
179 a UseDNS option, UseDNS is on by default and includes the
180 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
182 - millert@cvs.openbsd.org 2003/06/03 02:56:16
184 Remove the advertising clause in the UCB license which Berkeley
185 rescinded 22 July 1999. Proofed by myself and Theo.
186 - (djm) Fix portable-specific uses of verify_reverse_mapping too
187 - (djm) Sync openbsd-compat with OpenBSD CVS.
188 - No more 4-term BSD licenses in linked code
189 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
192 - (djm) Fix segv from bad reordering in auth-pam.c
193 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
195 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
197 - (djm) Remove "noip6" option from RedHat spec file. This may now be
198 set at runtime using AddressFamily option.
199 - (djm) Fix use of macro before #define in cipher-aes.c
200 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
201 - (djm) OpenBSD CVS Sync
202 - djm@cvs.openbsd.org 2003/05/26 12:54:40
204 fix format strings; ok markus@
205 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
207 seteuid and setegid; markus ok
208 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
210 VerifyHostKeyDNS is v2 only. ok markus@
213 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
215 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
218 - (djm) Avoid auth2-chall.c warning when compiling without
219 PAM, BSD_AUTH and SKEY
222 - (djm) OpenBSD CVS Sync
223 - djm@cvs.openbsd.org 2003/05/24 09:02:22
225 pass logged data through strnvis; ok markus
226 - djm@cvs.openbsd.org 2003/05/24 09:30:40
227 [authfile.c monitor.c sftp-common.c sshpty.c]
228 cast some types for printing; ok markus@
231 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
234 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
235 encoding (which encodes many more characters)
237 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
239 - new sentence, new line
243 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
244 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
245 new sentence, new line
246 - djm@cvs.openbsd.org 2003/05/23 08:29:30
251 - (djm) OpenBSD CVS Sync
252 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
254 use syslog_r() in a signal handler called place; markus ok
255 - (djm) Configure logic to detect syslog_r and friends
258 - (djm) Sync auth-pam.h with what we actually implement
261 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
263 - (djm) OpenBSD CVS Sync
264 - djm@cvs.openbsd.org 2003/05/16 03:27:12
265 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
266 add AddressFamily option to ssh_config (like -4, -6 on commandline).
267 Portable bug #534; ok markus@
268 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
270 just in case, put numbers to sscanf %s arg.
271 - markus@cvs.openbsd.org 2003/05/17 04:27:52
272 [cipher.c cipher-ctr.c myproposal.h]
273 experimental support for aes-ctr modes from
274 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
276 - (djm) Remove IPv4 by default hack now that we can specify AF in config
277 - (djm) Tidy and trim TODO
278 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
279 - (djm) Big KNF on openbsd-compat/
280 - (djm) KNF on md5crypt.[ch]
281 - (djm) KNF on auth-sia.[ch]
284 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
287 - (djm) OpenBSD CVS Sync
288 - djm@cvs.openbsd.org 2003/05/15 13:52:10
290 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
291 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
292 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
293 [readconf.c servconf.c]
294 warn for unsupported config option. ok markus@
295 - markus@cvs.openbsd.org 2003/05/15 14:09:21
297 fix 64bit issue; report itojun@
298 - djm@cvs.openbsd.org 2003/05/15 14:55:25
299 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
300 add a ConnectTimeout option to ssh, based on patch from
301 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
302 - (djm) Add warning for UsePAM when built without PAM support
303 - (djm) A few type mismatch fixes from Bug #565
304 - (djm) Guard free_pam_environment against NULL argument. Works around
305 HP/UX PAM problems debugged by dtucker
308 - (djm) OpenBSD CVS Sync
309 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
313 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
314 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
315 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
316 add experimental support for verifying hos keys using DNS as described
317 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
318 ok markus@ and henning@
319 - markus@cvs.openbsd.org 2003/05/14 22:24:42
320 [clientloop.c session.c ssh.1]
321 allow to send a BREAK to the remote system; ok various
322 - markus@cvs.openbsd.org 2003/05/15 00:28:28
324 cleanup unregister of per-method packet handlers; ok djm@
325 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
326 [readconf.c readconf.h servconf.c servconf.h]
327 always parse kerberos options. ok djm@ markus@
328 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
330 add missing freerrset
331 - markus@cvs.openbsd.org 2003/05/15 03:08:29
332 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
333 split out custom EVP ciphers
334 - djm@cvs.openbsd.org 2003/05/15 03:10:52
336 avoid warning; ok jakob@
337 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
339 Make put/get (globed and nonglobed) code more consistant. OK djm@
340 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
342 Teach ls how to display multiple column display and allow users
343 to return to single column format via 'ls -1'. OK @djm
344 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
345 [readconf.c servconf.c]
346 disable kerberos when not supported. ok markus@
347 - markus@cvs.openbsd.org 2003/05/15 04:08:41
350 - (djm) Always parse UsePAM
351 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
352 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
353 - (djm) Tidy Makefile clean targets
354 - (djm) Adapt README.dns for portable
355 - (djm) Avoid uuencode.c warnings
356 - (djm) Enable UsePAM when built --with-pam
357 - (djm) Only build getrrsetbyname replacement when using --with-dns
358 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
360 - (djm) Bug #444: Wrong paths after reconfigure
361 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
364 - (djm) Bug #117: Don't lie to PAM about username
365 - (djm) RCSID sync w/ OpenBSD
366 - (djm) OpenBSD CVS Sync
367 - djm@cvs.openbsd.org 2003/04/09 12:00:37
369 strip trailing whitespace from config lines before parsing.
370 Fixes bz 528; ok markus@
371 - markus@cvs.openbsd.org 2003/04/12 10:13:57
373 hide cipher details; ok djm@
374 - markus@cvs.openbsd.org 2003/04/12 10:15:36
377 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
379 document -V switch, fix wording; ok markus@
380 - markus@cvs.openbsd.org 2003/04/14 14:17:50
381 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
382 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
383 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
385 Missing globfree(&g) in process_put() spotted by Vince Brimhall
386 <VBrimhall@novell.com>. ok@ Theo
387 - markus@cvs.openbsd.org 2003/04/16 14:35:27
389 document struct Authctxt; with solar
390 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
392 -t in usage(); rogier@quaak.org
393 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
394 [sshd.8 sshd_config.5]
395 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
396 Bug #550 and * escaping suggested by jmc@.
397 - david@cvs.openbsd.org 2003/04/30 20:41:07
399 fix invalid .Pf macro usage introduced in previous commit
401 - markus@cvs.openbsd.org 2003/05/11 16:56:48
402 [authfile.c ssh-keygen.c]
403 change key_load_public to try to read a public from:
404 rsa1 private or rsa1 public and ssh2 keys.
405 this makes ssh-keygen -e fail for ssh1 keys more gracefully
406 for example; report from itojun (netbsd pr 20550).
407 - markus@cvs.openbsd.org 2003/05/11 20:30:25
408 [channels.c clientloop.c serverloop.c session.c ssh.c]
409 make channel_new() strdup the 'remote_name' (not the caller); ok theo
410 - markus@cvs.openbsd.org 2003/05/12 16:55:37
412 for pubkey authentication try the user keys in the following order:
413 1. agent keys that are found in the config file
415 3. keys that are only listed in the config file
416 this helps when an agent has many keys, where the server might
417 close the connection before the correct key is used. report & ok pb@
418 - markus@cvs.openbsd.org 2003/05/12 18:35:18
420 typo: DSA keys are of type ssh-dss; Brian Poole
421 - markus@cvs.openbsd.org 2003/05/14 00:52:59
423 ranges for per auth method messages
424 - djm@cvs.openbsd.org 2003/05/14 01:00:44
426 emphasise the batchmode functionality and make reference to pubkey auth,
427 both of which are FAQs; ok markus@
428 - markus@cvs.openbsd.org 2003/05/14 02:15:47
429 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
430 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
431 server interops with commercial client; ok jakob@ djm@
432 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
434 - better formatting in SYNOPSIS
437 - markus@cvs.openbsd.org 2003/05/14 08:57:49
439 http://bugzilla.mindrot.org/show_bug.cgi?id=560
440 Privsep child continues to run after monitor killed.
441 Pass monitor signals through to child; Darren Tucker
442 - (djm) Make portable build with MIT krb5 (some issues remain)
443 - (djm) Add new UsePAM configuration directive to allow runtime control
444 over usage of PAM. This allows non-root use of sshd when built with
446 - (djm) Die screaming if start_pam() is called when UsePAM=no
447 - (djm) Avoid KrbV leak for MIT Kerberos
448 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
449 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
452 - (djm) Redhat spec: Don't install profile.d scripts when not
453 building with GNOME/GTK askpass (patch from bet@rahul.net)
456 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
457 "make install". Patch by roth@feep.net.
458 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
459 problem on Linux (fixes "could not set controlling tty" errors).
460 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
461 proper challenge-response module
462 - (djm) 2-clause license on loginrec.c, with permission from
466 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
467 Patch from vinschen@redhat.com.
470 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
474 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
475 privsep should now work.
476 - (dtucker) Move handling of bad password authentications into a platform
477 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
480 - (djm) Add back radix.o (used by AFS support), after it went missing from
481 Makefile many moons ago
482 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
483 - (djm) Fix blibpath specification for AIX/gcc
484 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
487 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
491 - (bal) Bug #541: return; was dropped by mistake. Reported by
493 - (bal) Since we don't support platforms lacking u_int_64. We may
494 as well clean out some of those evil #ifdefs
495 - (bal) auth1.c minor resync while looking at the code.
496 - (bal) auth2.c same changed as above.
499 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
500 from matth@eecs.berkeley.edu
501 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
502 - (djm) OpenBSD CVS Sync
503 - markus@cvs.openbsd.org 2003/04/02 09:48:07
504 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
505 [readconf.h serverloop.c sshconnect2.c]
506 reapply rekeying chage, tested by henning@, ok djm@
507 - markus@cvs.openbsd.org 2003/04/02 14:36:26
509 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
510 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
513 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
515 remove $OpenBSD$, as other *.c does not have it.
516 - markus@cvs.openbsd.org 2003/04/07 08:29:57
518 typo: get correct counters; introduced during rekeying change.
519 - millert@cvs.openbsd.org 2003/04/07 21:58:05
521 The UCB copyright here is incorrect. This code did not originate
522 at UCB, it was written by Luke Mewburn. Updated the copyright at
523 the author's request. markus@ OK
524 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
526 rename log() into logit() to avoid name conflict. markus ok, from
528 - (djm) XXX - Performed locally using:
529 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
530 - hin@cvs.openbsd.org 2003/04/09 08:23:52
532 Don't include <krb.h> when compiling with Kerberos 5 support
533 - (djm) Fix up missing include for packet.c
534 - (djm) Fix missed log => logit occurance (reference by function pointer)
537 - (bal) if IP_TOS is not found or broken don't try to compile in
538 packet_set_tos() function call. bug #527
541 - (djm) OpenBSD CVS Sync
542 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
543 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
544 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
546 - new sentence new line
549 - markus@cvs.openbsd.org 2003/04/01 10:10:23
550 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
551 [readconf.h serverloop.c sshconnect2.c]
552 rekeying bugfixes and automatic rekeying:
553 * both client and server rekey _automatically_
554 (a) after 2^31 packets, because after 2^32 packets
555 the sequence number for packets wraps
556 (b) after 2^(blocksize_in_bits/4) blocks
557 (see: draft-ietf-secsh-newmodes-00.txt)
558 (a) and (b) are _enabled_ by default, and only disabled for known
559 openssh versions, that don't support rekeying properly.
560 * client option 'RekeyLimit'
561 * do not reply to requests during rekeying
562 - markus@cvs.openbsd.org 2003/04/01 10:22:21
563 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
564 [readconf.h serverloop.c sshconnect2.c]
565 backout rekeying changes (for 3.6.1)
566 - markus@cvs.openbsd.org 2003/04/01 10:31:26
567 [compat.c compat.h kex.c]
568 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
569 tested by ho@ and myself
570 - markus@cvs.openbsd.org 2003/04/01 10:56:46
573 - (djm) Crank spec file versions
574 - (djm) Release 3.6.1p1
577 - (djm) OpenBSD CVS Sync
578 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
580 one last fix to the tree: race fix broke stuff; pr 3169;
581 srp@srparish.net, help from djm
584 - (djm) Fix getpeerid support for 64 bit BE systems. From
585 Arnd Bergmann <arndb@de.ibm.com>
588 - (djm) OpenBSD CVS Sync
589 - markus@cvs.openbsd.org 2003/03/23 19:02:00
591 unbreak rekeying for privsep; ok millert@
593 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
594 Report from murple@murple.net, diagnosis from dtucker@zip.com.au