2 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
3 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
4 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
5 Patch from larsch@trustcenter.de; ok markus@
6 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
7 larsch@trustcenter.de; ok markus@
8 - (djm) OpenBSD CVS Sync
9 - djm@cvs.openbsd.org 2003/06/04 08:25:18
11 disable challenge/response and keyboard-interactive auth methods
12 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
14 - djm@cvs.openbsd.org 2003/06/04 10:23:48
16 remove duplicated group-dropping code; ok markus@
17 - djm@cvs.openbsd.org 2003/06/04 12:03:59
19 remove bitrotten commet; ok markus@
20 - (djm) Update to fix of bug #584: lock card before return.
21 From larsch@trustcenter.de
24 - (djm) Replace setproctitle replacement with code derived from
26 - (djm) OpenBSD CVS Sync
27 - markus@cvs.openbsd.org 2003/06/02 09:17:34
28 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
29 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
31 deprecate VerifyReverseMapping since it's dangerous if combined
32 with IP based access control as noted by Mike Harding; replace with
33 a UseDNS option, UseDNS is on by default and includes the
34 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
36 - millert@cvs.openbsd.org 2003/06/03 02:56:16
38 Remove the advertising clause in the UCB license which Berkeley
39 rescinded 22 July 1999. Proofed by myself and Theo.
40 - (djm) Fix portable-specific uses of verify_reverse_mapping too
41 - (djm) Sync openbsd-compat with OpenBSD CVS.
42 - No more 4-term BSD licenses in linked code
43 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
46 - (djm) Fix segv from bad reordering in auth-pam.c
47 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
49 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
51 - (djm) Remove "noip6" option from RedHat spec file. This may now be
52 set at runtime using AddressFamily option.
53 - (djm) Fix use of macro before #define in cipher-aes.c
54 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
55 - (djm) OpenBSD CVS Sync
56 - djm@cvs.openbsd.org 2003/05/26 12:54:40
58 fix format strings; ok markus@
59 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
61 seteuid and setegid; markus ok
62 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
64 VerifyHostKeyDNS is v2 only. ok markus@
67 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
69 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
72 - (djm) Avoid auth2-chall.c warning when compiling without
73 PAM, BSD_AUTH and SKEY
76 - (djm) OpenBSD CVS Sync
77 - djm@cvs.openbsd.org 2003/05/24 09:02:22
79 pass logged data through strnvis; ok markus
80 - djm@cvs.openbsd.org 2003/05/24 09:30:40
81 [authfile.c monitor.c sftp-common.c sshpty.c]
82 cast some types for printing; ok markus@
85 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
88 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
89 encoding (which encodes many more characters)
91 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
93 - new sentence, new line
97 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
98 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
99 new sentence, new line
100 - djm@cvs.openbsd.org 2003/05/23 08:29:30
105 - (djm) OpenBSD CVS Sync
106 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
108 use syslog_r() in a signal handler called place; markus ok
109 - (djm) Configure logic to detect syslog_r and friends
112 - (djm) Sync auth-pam.h with what we actually implement
115 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
117 - (djm) OpenBSD CVS Sync
118 - djm@cvs.openbsd.org 2003/05/16 03:27:12
119 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
120 add AddressFamily option to ssh_config (like -4, -6 on commandline).
121 Portable bug #534; ok markus@
122 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
124 just in case, put numbers to sscanf %s arg.
125 - markus@cvs.openbsd.org 2003/05/17 04:27:52
126 [cipher.c cipher-ctr.c myproposal.h]
127 experimental support for aes-ctr modes from
128 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
130 - (djm) Remove IPv4 by default hack now that we can specify AF in config
131 - (djm) Tidy and trim TODO
132 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
133 - (djm) Big KNF on openbsd-compat/
134 - (djm) KNF on md5crypt.[ch]
135 - (djm) KNF on auth-sia.[ch]
138 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
141 - (djm) OpenBSD CVS Sync
142 - djm@cvs.openbsd.org 2003/05/15 13:52:10
144 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
145 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
146 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
147 [readconf.c servconf.c]
148 warn for unsupported config option. ok markus@
149 - markus@cvs.openbsd.org 2003/05/15 14:09:21
151 fix 64bit issue; report itojun@
152 - djm@cvs.openbsd.org 2003/05/15 14:55:25
153 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
154 add a ConnectTimeout option to ssh, based on patch from
155 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
156 - (djm) Add warning for UsePAM when built without PAM support
157 - (djm) A few type mismatch fixes from Bug #565
158 - (djm) Guard free_pam_environment against NULL argument. Works around
159 HP/UX PAM problems debugged by dtucker
162 - (djm) OpenBSD CVS Sync
163 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
167 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
168 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
169 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
170 add experimental support for verifying hos keys using DNS as described
171 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
172 ok markus@ and henning@
173 - markus@cvs.openbsd.org 2003/05/14 22:24:42
174 [clientloop.c session.c ssh.1]
175 allow to send a BREAK to the remote system; ok various
176 - markus@cvs.openbsd.org 2003/05/15 00:28:28
178 cleanup unregister of per-method packet handlers; ok djm@
179 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
180 [readconf.c readconf.h servconf.c servconf.h]
181 always parse kerberos options. ok djm@ markus@
182 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
184 add missing freerrset
185 - markus@cvs.openbsd.org 2003/05/15 03:08:29
186 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
187 split out custom EVP ciphers
188 - djm@cvs.openbsd.org 2003/05/15 03:10:52
190 avoid warning; ok jakob@
191 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
193 Make put/get (globed and nonglobed) code more consistant. OK djm@
194 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
196 Teach ls how to display multiple column display and allow users
197 to return to single column format via 'ls -1'. OK @djm
198 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
199 [readconf.c servconf.c]
200 disable kerberos when not supported. ok markus@
201 - markus@cvs.openbsd.org 2003/05/15 04:08:41
204 - (djm) Always parse UsePAM
205 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
206 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
207 - (djm) Tidy Makefile clean targets
208 - (djm) Adapt README.dns for portable
209 - (djm) Avoid uuencode.c warnings
210 - (djm) Enable UsePAM when built --with-pam
211 - (djm) Only build getrrsetbyname replacement when using --with-dns
212 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
214 - (djm) Bug #444: Wrong paths after reconfigure
215 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
218 - (djm) Bug #117: Don't lie to PAM about username
219 - (djm) RCSID sync w/ OpenBSD
220 - (djm) OpenBSD CVS Sync
221 - djm@cvs.openbsd.org 2003/04/09 12:00:37
223 strip trailing whitespace from config lines before parsing.
224 Fixes bz 528; ok markus@
225 - markus@cvs.openbsd.org 2003/04/12 10:13:57
227 hide cipher details; ok djm@
228 - markus@cvs.openbsd.org 2003/04/12 10:15:36
231 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
233 document -V switch, fix wording; ok markus@
234 - markus@cvs.openbsd.org 2003/04/14 14:17:50
235 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
236 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
237 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
239 Missing globfree(&g) in process_put() spotted by Vince Brimhall
240 <VBrimhall@novell.com>. ok@ Theo
241 - markus@cvs.openbsd.org 2003/04/16 14:35:27
243 document struct Authctxt; with solar
244 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
246 -t in usage(); rogier@quaak.org
247 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
248 [sshd.8 sshd_config.5]
249 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
250 Bug #550 and * escaping suggested by jmc@.
251 - david@cvs.openbsd.org 2003/04/30 20:41:07
253 fix invalid .Pf macro usage introduced in previous commit
255 - markus@cvs.openbsd.org 2003/05/11 16:56:48
256 [authfile.c ssh-keygen.c]
257 change key_load_public to try to read a public from:
258 rsa1 private or rsa1 public and ssh2 keys.
259 this makes ssh-keygen -e fail for ssh1 keys more gracefully
260 for example; report from itojun (netbsd pr 20550).
261 - markus@cvs.openbsd.org 2003/05/11 20:30:25
262 [channels.c clientloop.c serverloop.c session.c ssh.c]
263 make channel_new() strdup the 'remote_name' (not the caller); ok theo
264 - markus@cvs.openbsd.org 2003/05/12 16:55:37
266 for pubkey authentication try the user keys in the following order:
267 1. agent keys that are found in the config file
269 3. keys that are only listed in the config file
270 this helps when an agent has many keys, where the server might
271 close the connection before the correct key is used. report & ok pb@
272 - markus@cvs.openbsd.org 2003/05/12 18:35:18
274 typo: DSA keys are of type ssh-dss; Brian Poole
275 - markus@cvs.openbsd.org 2003/05/14 00:52:59
277 ranges for per auth method messages
278 - djm@cvs.openbsd.org 2003/05/14 01:00:44
280 emphasise the batchmode functionality and make reference to pubkey auth,
281 both of which are FAQs; ok markus@
282 - markus@cvs.openbsd.org 2003/05/14 02:15:47
283 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
284 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
285 server interops with commercial client; ok jakob@ djm@
286 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
288 - better formatting in SYNOPSIS
291 - markus@cvs.openbsd.org 2003/05/14 08:57:49
293 http://bugzilla.mindrot.org/show_bug.cgi?id=560
294 Privsep child continues to run after monitor killed.
295 Pass monitor signals through to child; Darren Tucker
296 - (djm) Make portable build with MIT krb5 (some issues remain)
297 - (djm) Add new UsePAM configuration directive to allow runtime control
298 over usage of PAM. This allows non-root use of sshd when built with
300 - (djm) Die screaming if start_pam() is called when UsePAM=no
301 - (djm) Avoid KrbV leak for MIT Kerberos
302 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
303 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
306 - (djm) Redhat spec: Don't install profile.d scripts when not
307 building with GNOME/GTK askpass (patch from bet@rahul.net)
310 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
311 "make install". Patch by roth@feep.net.
312 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
313 problem on Linux (fixes "could not set controlling tty" errors).
314 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
315 proper challenge-response module
316 - (djm) 2-clause license on loginrec.c, with permission from
320 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
321 Patch from vinschen@redhat.com.
324 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
328 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
329 privsep should now work.
330 - (dtucker) Move handling of bad password authentications into a platform
331 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
334 - (djm) Add back radix.o (used by AFS support), after it went missing from
335 Makefile many moons ago
336 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
337 - (djm) Fix blibpath specification for AIX/gcc
338 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
341 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
345 - (bal) Bug #541: return; was dropped by mistake. Reported by
347 - (bal) Since we don't support platforms lacking u_int_64. We may
348 as well clean out some of those evil #ifdefs
349 - (bal) auth1.c minor resync while looking at the code.
350 - (bal) auth2.c same changed as above.
353 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
354 from matth@eecs.berkeley.edu
355 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
356 - (djm) OpenBSD CVS Sync
357 - markus@cvs.openbsd.org 2003/04/02 09:48:07
358 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
359 [readconf.h serverloop.c sshconnect2.c]
360 reapply rekeying chage, tested by henning@, ok djm@
361 - markus@cvs.openbsd.org 2003/04/02 14:36:26
363 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
364 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
367 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
369 remove $OpenBSD$, as other *.c does not have it.
370 - markus@cvs.openbsd.org 2003/04/07 08:29:57
372 typo: get correct counters; introduced during rekeying change.
373 - millert@cvs.openbsd.org 2003/04/07 21:58:05
375 The UCB copyright here is incorrect. This code did not originate
376 at UCB, it was written by Luke Mewburn. Updated the copyright at
377 the author's request. markus@ OK
378 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
380 rename log() into logit() to avoid name conflict. markus ok, from
382 - (djm) XXX - Performed locally using:
383 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
384 - hin@cvs.openbsd.org 2003/04/09 08:23:52
386 Don't include <krb.h> when compiling with Kerberos 5 support
387 - (djm) Fix up missing include for packet.c
388 - (djm) Fix missed log => logit occurance (reference by function pointer)
391 - (bal) if IP_TOS is not found or broken don't try to compile in
392 packet_set_tos() function call. bug #527
395 - (djm) OpenBSD CVS Sync
396 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
397 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
398 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
400 - new sentence new line
403 - markus@cvs.openbsd.org 2003/04/01 10:10:23
404 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
405 [readconf.h serverloop.c sshconnect2.c]
406 rekeying bugfixes and automatic rekeying:
407 * both client and server rekey _automatically_
408 (a) after 2^31 packets, because after 2^32 packets
409 the sequence number for packets wraps
410 (b) after 2^(blocksize_in_bits/4) blocks
411 (see: draft-ietf-secsh-newmodes-00.txt)
412 (a) and (b) are _enabled_ by default, and only disabled for known
413 openssh versions, that don't support rekeying properly.
414 * client option 'RekeyLimit'
415 * do not reply to requests during rekeying
416 - markus@cvs.openbsd.org 2003/04/01 10:22:21
417 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
418 [readconf.h serverloop.c sshconnect2.c]
419 backout rekeying changes (for 3.6.1)
420 - markus@cvs.openbsd.org 2003/04/01 10:31:26
421 [compat.c compat.h kex.c]
422 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
423 tested by ho@ and myself
424 - markus@cvs.openbsd.org 2003/04/01 10:56:46
427 - (djm) Crank spec file versions
428 - (djm) Release 3.6.1p1
431 - (djm) OpenBSD CVS Sync
432 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
434 one last fix to the tree: race fix broke stuff; pr 3169;
435 srp@srparish.net, help from djm
438 - (djm) Fix getpeerid support for 64 bit BE systems. From
439 Arnd Bergmann <arndb@de.ibm.com>
442 - (djm) OpenBSD CVS Sync
443 - markus@cvs.openbsd.org 2003/03/23 19:02:00
445 unbreak rekeying for privsep; ok millert@
447 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
448 Report from murple@murple.net, diagnosis from dtucker@zip.com.au