2 - (djm) OpenBSD CVS Sync
3 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
7 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
8 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
9 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
10 add experimental support for verifying hos keys using DNS as described
11 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
12 ok markus@ and henning@
13 - markus@cvs.openbsd.org 2003/05/14 22:24:42
14 [clientloop.c session.c ssh.1]
15 allow to send a BREAK to the remote system; ok various
16 - markus@cvs.openbsd.org 2003/05/15 00:28:28
18 cleanup unregister of per-method packet handlers; ok djm@
19 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
22 - (djm) Bug #117: Don't lie to PAM about username
23 - (djm) RCSID sync w/ OpenBSD
24 - (djm) OpenBSD CVS Sync
25 - djm@cvs.openbsd.org 2003/04/09 12:00:37
27 strip trailing whitespace from config lines before parsing.
28 Fixes bz 528; ok markus@
29 - markus@cvs.openbsd.org 2003/04/12 10:13:57
31 hide cipher details; ok djm@
32 - markus@cvs.openbsd.org 2003/04/12 10:15:36
35 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
37 document -V switch, fix wording; ok markus@
38 - markus@cvs.openbsd.org 2003/04/14 14:17:50
39 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
40 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
41 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
43 Missing globfree(&g) in process_put() spotted by Vince Brimhall
44 <VBrimhall@novell.com>. ok@ Theo
45 - markus@cvs.openbsd.org 2003/04/16 14:35:27
47 document struct Authctxt; with solar
48 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
50 -t in usage(); rogier@quaak.org
51 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
52 [sshd.8 sshd_config.5]
53 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
54 Bug #550 and * escaping suggested by jmc@.
55 - david@cvs.openbsd.org 2003/04/30 20:41:07
57 fix invalid .Pf macro usage introduced in previous commit
59 - markus@cvs.openbsd.org 2003/05/11 16:56:48
60 [authfile.c ssh-keygen.c]
61 change key_load_public to try to read a public from:
62 rsa1 private or rsa1 public and ssh2 keys.
63 this makes ssh-keygen -e fail for ssh1 keys more gracefully
64 for example; report from itojun (netbsd pr 20550).
65 - markus@cvs.openbsd.org 2003/05/11 20:30:25
66 [channels.c clientloop.c serverloop.c session.c ssh.c]
67 make channel_new() strdup the 'remote_name' (not the caller); ok theo
68 - markus@cvs.openbsd.org 2003/05/12 16:55:37
70 for pubkey authentication try the user keys in the following order:
71 1. agent keys that are found in the config file
73 3. keys that are only listed in the config file
74 this helps when an agent has many keys, where the server might
75 close the connection before the correct key is used. report & ok pb@
76 - markus@cvs.openbsd.org 2003/05/12 18:35:18
78 typo: DSA keys are of type ssh-dss; Brian Poole
79 - markus@cvs.openbsd.org 2003/05/14 00:52:59
81 ranges for per auth method messages
82 - djm@cvs.openbsd.org 2003/05/14 01:00:44
84 emphasise the batchmode functionality and make reference to pubkey auth,
85 both of which are FAQs; ok markus@
86 - markus@cvs.openbsd.org 2003/05/14 02:15:47
87 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
88 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
89 server interops with commercial client; ok jakob@ djm@
90 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
92 - better formatting in SYNOPSIS
95 - markus@cvs.openbsd.org 2003/05/14 08:57:49
97 http://bugzilla.mindrot.org/show_bug.cgi?id=560
98 Privsep child continues to run after monitor killed.
99 Pass monitor signals through to child; Darren Tucker
100 - (djm) Make portable build with MIT krb5 (some issues remain)
101 - (djm) Add new UsePAM configuration directive to allow runtime control
102 over usage of PAM. This allows non-root use of sshd when built with
104 - (djm) Die screaming if start_pam() is called when UsePAM=no
105 - (djm) Avoid KrbV leak for MIT Kerberos
106 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
107 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
110 - (djm) Redhat spec: Don't install profile.d scripts when not
111 building with GNOME/GTK askpass (patch from bet@rahul.net)
114 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
115 "make install". Patch by roth@feep.net.
116 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
117 problem on Linux (fixes "could not set controlling tty" errors).
118 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
119 proper challenge-response module
120 - (djm) 2-clause license on loginrec.c, with permission from
124 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
125 Patch from vinschen@redhat.com.
128 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
132 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
133 privsep should now work.
134 - (dtucker) Move handling of bad password authentications into a platform
135 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
138 - (djm) Add back radix.o (used by AFS support), after it went missing from
139 Makefile many moons ago
140 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
141 - (djm) Fix blibpath specification for AIX/gcc
142 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
145 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
149 - (bal) Bug #541: return; was dropped by mistake. Reported by
151 - (bal) Since we don't support platforms lacking u_int_64. We may
152 as well clean out some of those evil #ifdefs
153 - (bal) auth1.c minor resync while looking at the code.
154 - (bal) auth2.c same changed as above.
157 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
158 from matth@eecs.berkeley.edu
159 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
160 - (djm) OpenBSD CVS Sync
161 - markus@cvs.openbsd.org 2003/04/02 09:48:07
162 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
163 [readconf.h serverloop.c sshconnect2.c]
164 reapply rekeying chage, tested by henning@, ok djm@
165 - markus@cvs.openbsd.org 2003/04/02 14:36:26
167 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
168 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
171 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
173 remove $OpenBSD$, as other *.c does not have it.
174 - markus@cvs.openbsd.org 2003/04/07 08:29:57
176 typo: get correct counters; introduced during rekeying change.
177 - millert@cvs.openbsd.org 2003/04/07 21:58:05
179 The UCB copyright here is incorrect. This code did not originate
180 at UCB, it was written by Luke Mewburn. Updated the copyright at
181 the author's request. markus@ OK
182 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
184 rename log() into logit() to avoid name conflict. markus ok, from
186 - (djm) XXX - Performed locally using:
187 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
188 - hin@cvs.openbsd.org 2003/04/09 08:23:52
190 Don't include <krb.h> when compiling with Kerberos 5 support
191 - (djm) Fix up missing include for packet.c
192 - (djm) Fix missed log => logit occurance (reference by function pointer)
195 - (bal) if IP_TOS is not found or broken don't try to compile in
196 packet_set_tos() function call. bug #527
199 - (djm) OpenBSD CVS Sync
200 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
201 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
202 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
204 - new sentence new line
207 - markus@cvs.openbsd.org 2003/04/01 10:10:23
208 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
209 [readconf.h serverloop.c sshconnect2.c]
210 rekeying bugfixes and automatic rekeying:
211 * both client and server rekey _automatically_
212 (a) after 2^31 packets, because after 2^32 packets
213 the sequence number for packets wraps
214 (b) after 2^(blocksize_in_bits/4) blocks
215 (see: draft-ietf-secsh-newmodes-00.txt)
216 (a) and (b) are _enabled_ by default, and only disabled for known
217 openssh versions, that don't support rekeying properly.
218 * client option 'RekeyLimit'
219 * do not reply to requests during rekeying
220 - markus@cvs.openbsd.org 2003/04/01 10:22:21
221 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
222 [readconf.h serverloop.c sshconnect2.c]
223 backout rekeying changes (for 3.6.1)
224 - markus@cvs.openbsd.org 2003/04/01 10:31:26
225 [compat.c compat.h kex.c]
226 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
227 tested by ho@ and myself
228 - markus@cvs.openbsd.org 2003/04/01 10:56:46
231 - (djm) Crank spec file versions
232 - (djm) Release 3.6.1p1
235 - (djm) OpenBSD CVS Sync
236 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
238 one last fix to the tree: race fix broke stuff; pr 3169;
239 srp@srparish.net, help from djm
242 - (djm) Fix getpeerid support for 64 bit BE systems. From
243 Arnd Bergmann <arndb@de.ibm.com>
246 - (djm) OpenBSD CVS Sync
247 - markus@cvs.openbsd.org 2003/03/23 19:02:00
249 unbreak rekeying for privsep; ok millert@
251 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
252 Report from murple@murple.net, diagnosis from dtucker@zip.com.au
255 - (djm) OpenBSD CVS Sync
256 - markus@cvs.openbsd.org 2003/03/17 10:38:38
258 don't print \n if backgrounded; from ho@
259 - markus@cvs.openbsd.org 2003/03/17 11:43:47
262 - (bal) The days of lack of int64_t support are over. Sorry kids.
263 - (bal) scp.c 'limit' conflicts with Cray. Rename to 'limitbw'
264 - (bal) Collection of Cray patches (bsd-cray.h fix for CRAYT3E and improved
266 - (bal) Disable Privsep for Tru64 after pre-authentication due to issues
267 with SIA. Also, clean up of tru64 support patch by Chris Adams
269 - (tim) [contrib/caldera/openssh.spec] workaround RPM quirk. Fix %files
272 - (tim) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
273 add nanosleep(). testing/corrections by Darren Tucker <dtucker@zip.com.au>
276 - (djm) Fix return value checks for RAND_bytes. Report from
277 Steve G <linux_4ever@yahoo.com>
280 - (djm) OpenBSD CVS Sync
281 - markus@cvs.openbsd.org 2003/03/13 11:42:19
282 [authfile.c ssh-keysign.c]
283 move RSA_blinding_on to generic key load method
284 - markus@cvs.openbsd.org 2003/03/13 11:44:50
286 ssh-agent is similar to ssh-keysign (allows other processes to use
287 private rsa keys). however, it gets key over socket and not from
288 a file, so we have to do blinding here as well.
291 - (djm) OpenBSD CVS Sync
292 - markus@cvs.openbsd.org 2003/03/05 22:33:43
293 [channels.c monitor.c scp.c session.c sftp-client.c sftp-int.c]
294 [sftp-server.c ssh-add.c sshconnect2.c]
295 fix memory leaks; from dlheine@suif.Stanford.EDU/CLOUSEAU; ok djm@
296 - (djm) One more portable-specific one from dlheine@suif.Stanford.EDU/
298 - (djm) Bug #245: TTY problems on Solaris. Fix by stevesk@ and
300 - (djm) AIX package builder update from dtucker@zip.com.au
303 - (djm) Fix some compile errors spotted by dtucker and his fabulous
307 - (djm) Tweak gnome-ssh-askpass2:
308 - Retry kb and mouse grab a couple of times, so passphrase dialog doesn't
309 immediately fail if you are doing something else when it appears (e.g.
311 - Perform server grab after we have the keyboard and/or pointer to avoid
313 - (djm) OpenBSD CVS Sync
314 - markus@cvs.openbsd.org 2003/01/27 17:06:31
316 more specific error message when /var/empty has wrong permissions;
317 bug #46, map@appgate.com; ok henning@, provos@, stevesk@
318 - markus@cvs.openbsd.org 2003/01/28 16:11:52
320 document -l; pekkas@netcore.fi
321 - stevesk@cvs.openbsd.org 2003/01/28 17:24:51
323 remove example not pertinent with -1 addition; ok markus@
324 - jmc@cvs.openbsd.org 2003/01/31 21:54:40
326 typos; sshd(8): help and ok markus@
328 - markus@cvs.openbsd.org 2003/02/02 10:51:13
330 call okname() only when using system(3) for remote-remote copy;
331 fixes bugs #483, #472; ok deraadt@, mouring@
332 - markus@cvs.openbsd.org 2003/02/02 10:56:08
334 add support for key exchange guesses; based on work by
335 avraham.fraenkel@commatch.com; fixes bug #148; ok deraadt@
336 - markus@cvs.openbsd.org 2003/02/03 08:56:16
338 don't call error() for readonly /dev; from soekris list; ok mcbride,
340 - markus@cvs.openbsd.org 2003/02/04 09:32:08
342 better debug3 message
343 - markus@cvs.openbsd.org 2003/02/04 09:33:22
344 [monitor.c monitor_wrap.c]
345 skey/bsdauth: use 0 to indicate failure instead of -1, because
346 the buffer API only supports unsigned ints.
347 - markus@cvs.openbsd.org 2003/02/05 09:02:28
349 simplify ProxyCommand parsing, remove strcat/xrealloc; ok henning@, djm@
350 - markus@cvs.openbsd.org 2003/02/06 09:26:23
352 missing call to setproctitle() after authentication; ok provos@
353 - markus@cvs.openbsd.org 2003/02/06 09:27:29
355 support 'ProxyCommand none'; bugzilla #433; binder@arago.de; ok djm@
356 - markus@cvs.openbsd.org 2003/02/06 09:29:18
358 fix races in rename/symlink; from Tony Finch; ok djm@
359 - markus@cvs.openbsd.org 2003/02/06 21:22:43
361 undo broken fix for #387, fixes #486
362 - markus@cvs.openbsd.org 2003/02/10 11:51:47
364 xref sshd_config.5 (not sshd.8); mark@summersault.com; bug #490
365 - markus@cvs.openbsd.org 2003/02/12 09:33:04
366 [key.c key.h ssh-dss.c ssh-rsa.c]
367 merge ssh-dss.h ssh-rsa.h into key.h; ok deraadt@
368 - markus@cvs.openbsd.org 2003/02/12 21:39:50
370 replace crc32.c with a BSD licensed version; noted by David Turner
371 - markus@cvs.openbsd.org 2003/02/16 17:09:57
372 [kex.c kexdh.c kexgex.c kex.h sshconnect2.c sshd.c ssh-keyscan.c]
373 split kex into client and server code, no need to link
374 server code into the client; ok provos@
375 - markus@cvs.openbsd.org 2003/02/16 17:30:33
376 [monitor.c monitor_wrap.c]
377 fix permitrootlogin forced-commands-only for privsep; bux #387;
379 - markus@cvs.openbsd.org 2003/02/21 09:05:53
381 print sshd_config filename in debug2 mode.
382 - mpech@cvs.openbsd.org 2003/02/21 10:34:48
384 ...sizeof(&adat.session) is not good here.
385 henning@, deraadt@, millert@
386 - (djm) Add new object files to Makefile and reorder
387 - (djm) Bug #501: gai_strerror should return char*;
388 fix from dtucker@zip.com.au
389 - (djm) Most of Bug #499: Cygwin compile fixes for new progressmeter;
390 From vinschen@redhat.com
391 - (djm) Rest of Bug #499: Import a basename() function from OpenBSD libc
392 - (djm) Bug #494: Allow multiple accounts on Windows 9x/Me;
393 From vinschen@redhat.com
394 - (djm) Bug #456: Support for NEC SX6 with Unicos; from wendyp@cray.com
397 - (djm) Cygwin needs libcrypt too. Patch from vinschen@redhat.com
400 - (djm) Teach fake-getaddrinfo to use getservbyname() when provided a
401 string service name. Suggested by markus@, review by itojun@
404 - (bal) AIX 4.2.1 lacks nanosleep(). Patch to use nsleep() provided by
408 - (djm) Unbreak root password auth. Spotted by dtucker@zip.com.au
411 - (djm) Search libposix4 and librt for nanosleep. From dtucker@zip.com.au
412 and openssh-unix-dev@thewrittenword.com
415 - (bal) Bugzilla 477 patch by wendyp@cray.com. Define TIOCGPGRP for
416 cray. Also removed test for tcgetpgrp in configure.ac since it
420 - (djm) OpenBSD CVS Sync
421 - jmc@cvs.openbsd.org 2003/01/23 08:58:47
424 - markus@cvs.openbsd.org 2003/01/23 13:50:27
425 [authfd.c authfd.h readpass.c ssh-add.1 ssh-add.c ssh-agent.c]
426 ssh-add -c, prompt user for confirmation (using ssh-askpass) when
427 private agent key is used; with djm@; test by dugsong@, djm@;
429 - markus@cvs.openbsd.org 2003/01/23 14:01:53
431 bandwidth limitation patch (scp -l) from niels@; ok todd@, deraadt@
432 - markus@cvs.openbsd.org 2003/01/23 14:06:15
434 scp -12; Sam Smith and others; ok provos@, deraadt@
435 - (djm) Add TIMEVAL_TO_TIMESPEC macros
438 - (djm) OpenBSD CVS Sync
439 - djm@cvs.openbsd.org 2003/01/23 00:03:00
441 Don't log TIS auth response; "get rid of it" - markus@
444 - (djm) OpenBSD CVS Sync
445 - marc@cvs.openbsd.org 2003/01/21 18:14:36
446 [ssh-agent.1 ssh-agent.c]
447 Add a -t life option to ssh-agent that set the default lifetime.
448 The default can still be overriden by using -t in ssh-add.
450 - (djm) Reorganise PAM & SIA password handling to eliminate some common code
451 - (djm) Sync regress with OpenBSD -current
454 - (djm) Fix compilation for NetBSD from dtucker@zip.com.au
455 - (tim) [progressmeter.c] make compilers without long long happy.
456 - (tim) [configure.ac] Add -belf to build ELF binaries on OpenServer 5 when
457 using cc. (gcc already did)
460 - (djm) Revert fix for Bug #442 for now.
463 - (djm) Bug #470: Detect strnvis, not strvis in configure.
464 From d_wllms@lanl.gov
467 - (djm) OpenBSD CVS Sync
468 - djm@cvs.openbsd.org 2003/01/16 03:41:55
470 explicitly use first glob result
473 - (djm) OpenBSD CVS Sync
474 - fgsch@cvs.openbsd.org 2003/01/10 23:23:24
476 typo; from Nils Nordman <nino at nforced dot com>.
477 - markus@cvs.openbsd.org 2003/01/11 18:29:43
479 set fatal_cleanups to NULL in fatal_remove_all_cleanups();
481 - markus@cvs.openbsd.org 2003/01/12 16:57:02
483 allow WARNINGS=yes; ok djm@
484 - djm@cvs.openbsd.org 2003/01/13 11:04:04
486 make cmds[] array static to avoid conflict with BSDI libc.
487 mindrot bug #466. Fix from mdev@idg.nl; ok markus@
488 - djm@cvs.openbsd.org 2003/01/14 10:58:00
489 [sftp-client.c sftp-int.c]
490 Don't try to upload or download non-regular files. Report from
491 apoloval@pantuflo.escet.urjc.es; ok markus@
494 - (djm) Rework openbsd-compat/setproctitle.c a bit: move emulation type
495 detection to configure.ac. Prompted by stevesk@
496 - (djm) Bug #467: Add a --disable-strip option to turn off stripping of
497 installed binaries. From mdev@idg.nl
500 - (djm) Enable new setproctitle emulation for Linux, AIX and HP/UX. More
501 systems may be added later.
502 - (djm) OpenBSD CVS Sync
503 - djm@cvs.openbsd.org 2003/01/08 23:53:26
504 [sftp.1 sftp.c sftp-int.c sftp-int.h]
505 Cleanup error handling for batchmode
506 Allow blank lines and comments in input
507 Ability to suppress abort on error in batchmode ("-put blah")
508 Fixes mindrot bug #452; markus@ ok
509 - fgsch@cvs.openbsd.org 2003/01/10 08:19:07
510 [scp.c sftp.1 sftp.c sftp-client.c sftp-int.c progressmeter.c]
512 sftp progress meter support.
513 original diffs by Nils Nordman <nino at nforced dot com> via
514 markus@, merged to -current by me, djm@ ok.
515 - djm@cvs.openbsd.org 2003/01/10 08:48:15
517 Simplify and avoid redundancy in packet send and receive
519 - djm@cvs.openbsd.org 2003/01/10 10:29:35
521 Don't ftruncate after write error, creating sparse files of
523 mindrot bug #403, reported by rusr@cup.hp.com; ok markus@
524 - djm@cvs.openbsd.org 2003/01/10 10:32:54
526 hush socket() errors, except last. Fixes mindrot bug #408; ok markus@
529 - (djm) Sync openbsd-compat/ with OpenBSD -current
530 - (djm) Avoid redundant xstrdup/xfree in auth2-pam.c. From Solar via markus@
531 - (djm) OpenBSD CVS Sync
532 - markus@cvs.openbsd.org 2003/01/01 18:08:52
534 move big output buffer messages to debug2
535 - djm@cvs.openbsd.org 2003/01/06 23:51:22
537 Fix "get -p" download to not add user-write perm. mindrot bug #426
538 reported by gfernandez@livevault.com; ok markus@
539 - fgsch@cvs.openbsd.org 2003/01/07 23:42:54
541 add version; from Nils Nordman <nino at nforced dot com> via markus@.
543 - (djm) Update README to reflect AIX's status as a well supported platform.
544 From dtucker@zip.com.au
545 - (tim) [Makefile.in configure.ac] replace fixpath with sed script. Patch
547 - (tim) [auth.c] declare today at top of allowed_user() to keep
548 older compilers happy.
549 - (tim) [scp.c] make compilers without long long happy.
552 - (djm) Bug #401: Work around Linux breakage with IPv6 mapped addresses.
553 Based on fix from yoshfuji@linux-ipv6.org
554 - (djm) Bug #442: Check for and deny access to accounts with locked
555 passwords. Patch from dtucker@zip.com.au
556 - (djm) Bug #44: Use local mkstemp() rather than glibc's silly one. Fixes
557 Can't pass KRB4 TGT passing. Fix from: jan.iven@cern.ch
558 - (djm) Fix Bug #442 for PAM case
559 - (djm) Bug #110: bogus error messages in lastlog_get_entry(). Fix based
560 on one by peak@argo.troja.mff.cuni.cz
561 - (djm) Bug #111: Run syslog and stderr logging through strnvis to eliminate
562 nasties. Report from peak@argo.troja.mff.cuni.cz
563 - (djm) Bug #178: On AIX /etc/nologin wasnt't shown to users. Fix from
564 Ralf.Wenk@fh-karlsruhe.de and dtucker@zip.com.au
565 - (djm) Fix my fix of the fix for the Bug #442 for PAM case. Spotted by
566 dtucker@zip.com.au. Reorder for clarity too.
569 - (djm) Bug #461: ssh-copy-id fails with no arguments. Patch from
571 - (djm) Bug #460: Filling utmp[x]->ut_addr_v6 if present. Patch from
573 - (djm) Bug #446: Set LOGIN env var to pw_name on AIX. Patch from
577 - (stevesk) [session.c sshlogin.c sshlogin.h] complete portable
578 parts of pass addrlen with sockaddr * fix.
579 from Hajimu UMEMOTO <ume@FreeBSD.org>
582 - (bal) OpenBSD CVS Sync
583 - fgsch@cvs.openbsd.org 2002/11/15 10:03:09
585 lseek(2) may return -1 when getting the public/private key lenght.
586 Simplify the code and check for errors using fstat(2).
588 Problem reported by Mauricio Sanchez, markus@ ok.
589 - markus@cvs.openbsd.org 2002/11/18 16:43:44
591 don't overwrite SIG{INT,QUIT,TERM} handler if set to SIG_IGN;
592 e.g. if ssh is used for backup; report Joerg Schilling; ok millert@
593 - markus@cvs.openbsd.org 2002/11/21 22:22:50
596 - markus@cvs.openbsd.org 2002/11/21 22:45:31
597 [cipher.c kex.c packet.c sshconnect.c sshconnect2.c]
598 debug->debug2, unify debug messages
599 - deraadt@cvs.openbsd.org 2002/11/21 23:03:51
600 [auth-krb5.c auth1.c hostfile.h monitor_wrap.c sftp-client.c sftp-int.c ssh-add.c ssh-rsa.c
603 - markus@cvs.openbsd.org 2002/11/21 23:04:33
606 - stevesk@cvs.openbsd.org 2002/11/24 21:46:24
609 - wcobb@cvs.openbsd.org 2002/11/26 00:45:03
611 Remove unnecessary fflush(stderr) calls, stderr is unbuffered by default.
613 - stevesk@cvs.openbsd.org 2002/11/26 02:35:30
615 remove outdated statement; ok markus@ deraadt@
616 - stevesk@cvs.openbsd.org 2002/11/26 02:38:54
618 KNF, comment and error message repair; ok markus@
619 - markus@cvs.openbsd.org 2002/11/27 17:53:35
621 allow usernames with embedded '@', e.g. scp user@vhost@realhost:file /tmp;
622 http://bugzilla.mindrot.org/show_bug.cgi?id=447; ok mouring@, millert@
623 - stevesk@cvs.openbsd.org 2002/12/04 04:36:47
625 remove xauth entries before add; PR 2994 from janjaap@stack.nl.
627 - markus@cvs.openbsd.org 2002/12/05 11:08:35
629 use roundup() similar to rcp/util.c and avoid problems with strange
630 filesystem block sizes, noted by tjr@freebsd.org; ok djm@
631 - djm@cvs.openbsd.org 2002/12/06 05:20:02
633 Fix cut'n'paste error, spotted by matthias.riese@b-novative.de; ok deraadt@
634 - millert@cvs.openbsd.org 2002/12/09 16:50:30
636 Avoid setting optind to 0 as GNU getopt treats that like we do optreset.
638 - markus@cvs.openbsd.org 2002/12/10 08:56:00
640 Make sure $SHELL points to the shell from the password file, even if shell
641 is overridden from login.conf; bug#453; semen at online.sinor.ru; ok millert@
642 - markus@cvs.openbsd.org 2002/12/10 19:26:50
644 move tos handling to packet_set_tos; ok provos/henning/deraadt
645 - markus@cvs.openbsd.org 2002/12/10 19:47:14
648 - markus@cvs.openbsd.org 2002/12/13 10:03:15
649 [channels.c misc.c sshconnect2.c]
650 cleanup debug messages, more useful information for the client user.
651 - markus@cvs.openbsd.org 2002/12/13 15:20:52
653 1) include stalling time in total time
654 2) truncate filenames to 45 instead of 20 characters
655 3) print rate instead of progress bar, no more stars
656 4) scale output to tty width
657 based on a patch from Niels; ok fries@ lebel@ fgs@ millert@
658 - (bal) [msg.c msg.h scp.c ssh-keysign.c sshconnect2.c] Resync CVS IDs since
659 we already did s/msg_send/ssh_msg_send/
662 - (djm) PERL-free fixpaths from stuge-openssh-unix-dev@cdy.org
665 - (tim) [configure.ac] fix STDPATH test for IRIX. First reported by
666 advax@triumf.ca. This type of solution tested by <herb@sgi.com>
669 - (tim) [configure.ac] remove unused variables no_libsocket and no_libnsl
672 - (tim) [contrib/solaris/opensshd.in] add umask 022 so sshd.pid is
676 - (bal) OpenBSD CVS Sync
677 - itojun@cvs.openbsd.org 2002/10/16 14:31:48
679 64bit pedant. %llu is "unsigned long long". markus ok
680 - markus@cvs.openbsd.org 2002/10/23 10:32:13
683 - markus@cvs.openbsd.org 2002/10/23 10:40:16
686 - markus@cvs.openbsd.org 2002/11/04 10:07:53
688 don't compare against pw_home if realpath fails for pw_home (seen
690 - markus@cvs.openbsd.org 2002/11/04 10:09:51
692 log before send disconnect; ok djm@
693 - markus@cvs.openbsd.org 2002/11/05 19:45:20
695 handle overflows for size_t larger than u_int; siw@goneko.de, bug #425
696 - markus@cvs.openbsd.org 2002/11/05 20:10:37
698 typo; GaryF@livevault.com
699 - markus@cvs.openbsd.org 2002/11/07 16:28:47
701 log to stderr if -ie is given, bug #414, prj@po.cwru.edu
702 - markus@cvs.openbsd.org 2002/11/07 22:08:07
703 [readconf.c readconf.h ssh-keysign.8 ssh-keysign.c]
704 we cannot use HostbasedAuthentication for enabling ssh-keysign(8),
705 because HostbasedAuthentication might be enabled based on the
706 target host and ssh-keysign(8) does not know the remote hostname
707 and not trust ssh(1) about the hostname, so we add a new option
708 EnableSSHKeysign; ok djm@, report from zierke@informatik.uni-hamburg.de
709 - markus@cvs.openbsd.org 2002/11/07 22:35:38
711 check exit status from ssh, and exit(1) if ssh fails; bug#369;
713 - (bal) Update ssh-host-config and minor rewrite of bsd-cygwin_util.c
714 ntsec now default if cygwin version beginning w/ version 56. Patch
715 by Corinna Vinschen <vinschen@redhat.com>
716 - (bal) AIX does not log login attempts for unknown users (bug #432).
717 patch by dtucker@zip.com.au
720 - (djm) Bug #400: Kill ssh-rand-helper children on timeout, patch from
722 - (djm) Bug #317: FreeBSD needs libutil.h for openpty() Report from
723 dirk.meyer@dinoex.sub.org
726 - (bal) Fix bug id 383 and only call loginrestrict for AIX if not root.
727 - (bal) More advanced strsep test by Darren Tucker <dtucker@zip.com.au>
730 - (tim) [contrib/caldera/openssh.spec] make ssh-agent setgid nobody
733 - (bal) Disable post-authentication Privsep for OSF/1. It conflicts with
737 - (djm) OpenBSD CVS Sync
738 - markus@cvs.openbsd.org 2002/10/01 20:34:12
740 allow root to access the agent, since there is no protection from root.
741 - markus@cvs.openbsd.org 2002/10/01 13:24:50
744 - (djm) Bump RPM spec version numbers
745 - (djm) Bug #406: s/msg_send/ssh_msg_send/ for Mac OS X 1.2
748 - (djm) Tidy contrib/, add Makefile for GNOME passphrase dialogs,
750 - (djm) OpenBSD CVS Sync
751 - mickey@cvs.openbsd.org 2002/09/27 10:42:09
752 [compat.c compat.h sshd.c]
753 add a generic match for a prober, such as sie big brother;
754 idea from stevesk@; markus@ ok
755 - stevesk@cvs.openbsd.org 2002/09/27 15:46:21
757 clarify compression level protocol 1 only; ok markus@ deraadt@
760 - (djm) OpenBSD CVS Sync
761 - markus@cvs.openbsd.org 2002/09/25 11:17:16
763 sync LoginGraceTime with default
764 - markus@cvs.openbsd.org 2002/09/25 15:19:02
766 typo; pilot@monkey.org
767 - markus@cvs.openbsd.org 2002/09/26 11:38:43
768 [auth1.c auth.h auth-krb4.c monitor.c monitor.h monitor_wrap.c]
770 krb4 + privsep; ok dugsong@, deraadt@
773 - (bal) Fix issue where successfull login does not clear failure counts
774 in AIX. Patch by dtucker@zip.com.au ok by djm
775 - (tim) Cray fixes (bug 367) based on patch from Wendy Palm @ cray.
776 This does not include the deattack.c fixes.
779 - (djm) OpenBSD CVS Sync
780 - stevesk@cvs.openbsd.org 2002/09/23 20:46:27
782 change get_peer_ipaddr() and get_local_ipaddr() to not return NULL for
783 non-sockets; fixes a problem passing NULL to snprintf(). ok markus@
784 - markus@cvs.openbsd.org 2002/09/23 22:11:05
786 only call auth_krb5 if kerberos is enabled; ok deraadt@
787 - markus@cvs.openbsd.org 2002/09/24 08:46:04
789 only call kerberos code for authctxt->valid
790 - todd@cvs.openbsd.org 2002/09/24 20:59:44
792 tweak the example $HOME/.ssh/rc script to not show on any cmdline the
793 sensitive data it handles. This fixes bug # 402 as reported by
794 kolya@mit.edu (Nickolai Zeldovich).
795 ok markus@ and stevesk@
798 - (tim) [configure.ac] s/return/exit/ patch by dtucker@zip.com.au
801 - (djm) OpenBSD CVS Sync
802 - stevesk@cvs.openbsd.org 2002/09/19 14:53:14
804 - markus@cvs.openbsd.org 2002/09/19 15:51:23
806 typo; cd@kalkatraz.de
807 - stevesk@cvs.openbsd.org 2002/09/19 16:03:15
809 log IP address also; ok markus@
810 - stevesk@cvs.openbsd.org 2002/09/20 18:41:29
812 log illegal user here for missing privsep case (ssh2).
813 this is executed in the monitor. ok markus@
816 - (djm) OpenBSD CVS Sync
817 - stevesk@cvs.openbsd.org 2002/09/12 19:11:52
819 %u for uid print; ok markus@
820 - stevesk@cvs.openbsd.org 2002/09/12 19:50:36
822 add SSH_CONNECTION and deprecate SSH_CLIENT; bug #384. ok markus@
823 - stevesk@cvs.openbsd.org 2002/09/13 19:23:09
824 [channels.c sshconnect.c sshd.c]
825 remove use of SO_LINGER, it should not be needed. error check
826 SO_REUSEADDR. fixup comments. ok markus@
827 - stevesk@cvs.openbsd.org 2002/09/16 19:55:33
829 log when _PATH_NOLOGIN exists; ok markus@
830 - stevesk@cvs.openbsd.org 2002/09/16 20:12:11
832 more details on X11Forwarding security issues and threats; ok markus@
833 - stevesk@cvs.openbsd.org 2002/09/16 22:03:13
835 reference moduli(5) in FILES /etc/moduli.
836 - itojun@cvs.openbsd.org 2002/09/17 07:47:02
838 don't quit while creating X11 listening socket.
839 http://mail-index.netbsd.org/current-users/2002/09/16/0005.html
840 got from portable. markus ok
841 - djm@cvs.openbsd.org 2002/09/19 01:58:18
843 bugzilla.mindrot.org #223 - ProxyCommands don't exit.
844 Patch from dtucker@zip.com.au; ok markus@
847 - (djm) Made GNOME askpass programs return non-zero if cancel button is
849 - (djm) Added getpeereid() replacement. Properly implemented for systems
850 with SO_PEERCRED support. Faked for systems which lack it.
851 - (djm) Sync sys/tree.h with OpenBSD -current. Rename tree.h and
852 fake-queue.h to sys-tree.h and sys-queue.h
853 - (djm) OpenBSD CVS Sync
854 - markus@cvs.openbsd.org 2002/09/08 20:24:08
856 no comma at end of enumerator list
857 - itojun@cvs.openbsd.org 2002/09/09 06:48:06
858 [auth1.c auth.h auth-krb5.c monitor.c monitor.h]
859 [monitor_wrap.c monitor_wrap.h]
860 kerberos support for privsep. confirmed to work by lha@stacken.kth.se
862 - markus@cvs.openbsd.org 2002/09/09 14:54:15
863 [channels.c kex.h key.c monitor.c monitor_wrap.c radix.c uuencode.c]
864 signed vs unsigned from -pedantic; ok henning@
865 - markus@cvs.openbsd.org 2002/09/10 20:24:47
867 check the euid of the connecting process with getpeereid(2);
868 ok provos deraadt stevesk
869 - stevesk@cvs.openbsd.org 2002/09/11 17:55:03
871 add agent and X11 forwarding warning text from ssh_config.5; ok markus@
872 - stevesk@cvs.openbsd.org 2002/09/11 18:27:26
873 [authfd.c authfd.h ssh.c]
874 don't connect to agent to test for presence if we've previously
875 connected; ok markus@
876 - djm@cvs.openbsd.org 2002/09/11 22:41:50
877 [sftp.1 sftp-client.c sftp-client.h sftp-common.c sftp-common.h]
878 [sftp-glob.c sftp-glob.h sftp-int.c sftp-server.c]
879 support for short/long listings and globbing in "ls"; ok markus@
880 - djm@cvs.openbsd.org 2002/09/12 00:13:06
882 zap unused var introduced in last commit
885 - (djm) Sync openbsd-compat with OpenBSD -current
888 - (djm) Bug #365: Read /.ssh/environment properly under CygWin.
889 Patch from Mark Bradshaw <bradshaw@staff.crosswalk.com>
890 - (djm) Bug #138: Make protocol 1 blowfish work with old OpenSSL.
891 Patch from Robert Halubek <rob@adso.com.pl>
894 - (djm) OpenBSD CVS Sync
895 - stevesk@cvs.openbsd.org 2002/09/04 18:52:42
896 [servconf.c sshd.8 sshd_config.5]
897 default LoginGraceTime to 2m; 1m may be too short for slow systems.
899 - (djm) Merge openssh-TODO.patch from Redhat (null) beta
900 - (djm) Add gnome-ssh-askpass2.c (gtk2) by merge with patch from
901 Nalin Dahyabhai <nalin@redhat.com>
902 - (djm) Add support for building gtk2 password requestor from Redhat beta
905 - (djm) Patch from itojun@ for Darwin OS: test getaddrinfo, reorder libcrypt
906 - (djm) Fix Redhat RPM build dependancy test
907 - (djm) OpenBSD CVS Sync
908 - markus@cvs.openbsd.org 2002/08/12 10:46:35
910 make ssh-agent setgid, disallow ptrace.
911 - espie@cvs.openbsd.org 2002/08/21 11:20:59
913 `RSA' updated to refer to `public key', where it matters.
915 - stevesk@cvs.openbsd.org 2002/08/21 19:38:06
916 [servconf.c sshd.8 sshd_config sshd_config.5]
917 change LoginGraceTime default to 1 minute; ok mouring@ markus@
918 - stevesk@cvs.openbsd.org 2002/08/21 20:10:28
920 raise listen backlog; ok markus@
921 - stevesk@cvs.openbsd.org 2002/08/22 19:27:53
923 use common close function; ok markus@
924 - stevesk@cvs.openbsd.org 2002/08/22 19:38:42
926 format with current EscapeChar; bugzilla #388 from wknox@mitre.org.
928 - stevesk@cvs.openbsd.org 2002/08/22 20:57:19
930 shutdown(SHUT_RDWR) not needed before close here; ok markus@
931 - markus@cvs.openbsd.org 2002/08/22 21:33:58
933 auth_root_allowed() is handled by the monitor in the privsep case,
934 so skip this for use_privsep, ok stevesk@, fixes bugzilla #387/325
935 - markus@cvs.openbsd.org 2002/08/22 21:45:41
937 send signal name (not signal number) in "exit-signal" message; noticed
939 - stevesk@cvs.openbsd.org 2002/08/27 17:13:56
941 RSA_public_decrypt() returns -1 on error so len must be signed;
943 - stevesk@cvs.openbsd.org 2002/08/27 17:18:40
945 some warning text for ForwardAgent and ForwardX11; ok markus@
946 - stevesk@cvs.openbsd.org 2002/08/29 15:57:25
947 [monitor.c session.c sshlogin.c sshlogin.h]
948 pass addrlen with sockaddr *; from Hajimu UMEMOTO <ume@FreeBSD.org>
949 NOTE: there are also p-specific parts to this patch. ok markus@
950 - stevesk@cvs.openbsd.org 2002/08/29 16:02:54
952 deprecate -P as UsePrivilegedPort defaults to no now; ok markus@
953 - stevesk@cvs.openbsd.org 2002/08/29 16:09:02
955 more on UsePrivilegedPort and setuid root; ok markus@
956 - stevesk@cvs.openbsd.org 2002/08/29 19:49:42
958 shrink initial privilege bracket for setuid case; ok markus@
959 - stevesk@cvs.openbsd.org 2002/08/29 22:54:10
960 [ssh_config.5 sshd_config.5]
961 state XAuthLocation is a full pathname
965 - millert@cvs.openbsd.org 2002/08/02 14:43:15
966 [monitor.c monitor_mm.c]
967 Change mm_zalloc() sanity checks to be more in line with what
968 we do in calloc() and add a check to monitor_mm.c.
969 OK provos@ and markus@
970 - marc@cvs.openbsd.org 2002/08/02 16:00:07
972 note that .ssh/environment is only read when
973 allowed (PermitUserEnvironment in sshd_config).
975 - markus@cvs.openbsd.org 2002/08/02 21:23:41
977 diff is u_int (2x); ok deraadt/provos
978 - markus@cvs.openbsd.org 2002/08/02 22:20:30
980 replace RSA_verify with our own version and avoid the OpenSSL ASN.1 parser
981 for authentication; ok deraadt/djm
982 - aaron@cvs.openbsd.org 2002/08/08 13:50:23
984 Use & to test if bits are set, not &&; markus@ ok.
985 - stevesk@cvs.openbsd.org 2002/08/08 23:54:52
988 - stevesk@cvs.openbsd.org 2002/08/09 17:21:42
990 use Op for mdoc conformance; from esr@golux.thyrsus.com
992 - stevesk@cvs.openbsd.org 2002/08/09 17:41:12
994 proxy vs. fake display
995 - stevesk@cvs.openbsd.org 2002/08/12 17:30:35
996 [ssh.1 sshd.8 sshd_config.5]
997 more PermitUserEnvironment; ok markus@
998 - stevesk@cvs.openbsd.org 2002/08/17 23:07:14
1000 ForwardAgent has defaulted to no for over 2 years; be more clear here.
1001 - stevesk@cvs.openbsd.org 2002/08/17 23:55:01
1004 - (bal) [defines.h] Some platforms don't have SIZE_T_MAX. So assign
1008 - (tim) [configure.ac] Display OpenSSL header/library version.
1009 Patch by dtucker@zip.com.au
1012 - (bal) OpenBSD CVS Sync
1013 - markus@cvs.openbsd.org 2002/07/24 16:11:18
1014 [hostfile.c hostfile.h sshconnect.c]
1015 print out all known keys for a host if we get a unknown host key,
1016 see discussion at http://marc.theaimsgroup.com/?t=101069210100016&r=1&w=4
1018 the ssharp mitm tool attacks users in a similar way, so i'd like to
1020 A MITM attack is always possible if the ssh client prints:
1021 The authenticity of host 'bla' can't be established.
1022 (protocol version 2 with pubkey authentication allows you to detect
1024 - mouring@cvs.openbsd.org 2002/07/25 01:16:59
1026 FallBackToRsh does not exist anywhere else. Remove it from here.
1028 - markus@cvs.openbsd.org 2002/07/29 18:57:30
1031 - markus@cvs.openbsd.org 2002/07/30 17:03:55
1032 [auth-options.c servconf.c servconf.h session.c sshd_config sshd_config.5]
1033 add PermitUserEnvironment (off by default!); from dot@dotat.at;
1037 - (bal) [uidswap.c] SCO compile correction by gert@greenie.muc.de
1040 - (stevesk) [auth-pam.c] should use PAM_MSG_MEMBER(); from solar
1041 - (stevesk) [CREDITS] solar
1042 - (stevesk) [ssh-rand-helper.c] RAND_bytes() and SHA1_Final() unsigned
1046 - (djm) Remove some cruft from INSTALL
1047 - (djm) Latest config.guess and config.sub from ftp://ftp.gnu.org/gnu/config/
1050 - (bal) [bsd-cray.c bsd-cray.h] Part 2 of Cray merger.
1051 - (bal) sync ID w/ ssh-agent.c
1052 - (bal) OpenBSD Sync
1053 - markus@cvs.openbsd.org 2002/07/19 15:43:33
1054 [log.c log.h session.c sshd.c]
1055 remove fatal cleanups after fork; based on discussions with and code
1057 - stevesk@cvs.openbsd.org 2002/07/19 17:42:40
1059 display a warning from ssh when XAuthLocation does not exist or xauth
1060 returned no authentication data. ok markus@
1061 - stevesk@cvs.openbsd.org 2002/07/21 18:32:20
1064 - stevesk@cvs.openbsd.org 2002/07/21 18:34:43
1066 remove invalid comment
1067 - markus@cvs.openbsd.org 2002/07/22 11:03:06
1069 fallback to _PATH_STDPATH on setusercontext+LOGIN_SETPATH errors;
1070 - stevesk@cvs.openbsd.org 2002/07/22 17:32:56
1072 u_int here; ok provos@
1073 - stevesk@cvs.openbsd.org 2002/07/23 16:03:10
1075 utmp_len is unsigned; display error consistent with other options.
1077 - stevesk@cvs.openbsd.org 2002/07/15 17:15:31
1079 little more debugging; ok markus@
1082 - (bal) AIX tty data limiting patch fix by leigh@solinno.co.uk
1083 - (stevesk) [xmmap.c] missing prototype for fatal()
1084 - (bal) [configure.ac defines.h loginrec.c sshd.c sshpty.c] Partial sync
1085 with Cray (mostly #ifdef renaming). Patch by wendyp@cray.com.
1086 - (bal) [configure.ac] Missing ;; from cray patch.
1087 - (bal) [monitor_mm.c openbsd-compat/xmmap.h] Move xmmap() defines
1088 into it's own header.
1089 - (stevesk) [auth-pam.[ch] session.c] pam_getenvlist() must be
1090 freed by the caller; add free_pam_environment() and use it.
1091 - (stevesk) [auth-pam.c] typo in comment
1094 - (stevesk) [auth-pam.c] merge cosmetic changes from solar's
1095 openssh-3.4p1-owl-password-changing.diff
1096 - (stevesk) [auth-pam.c] merge rest of solar's PAM patch;
1097 PAM_NEW_AUTHTOK_REQD remains in #if 0 for now.
1098 - (stevesk) [auth-pam.c] cast to avoid initialization type mismatch
1099 warning on pam_conv struct conversation function.
1100 - (stevesk) [auth-pam.h] license
1101 - (stevesk) [auth-pam.h] unneeded include
1102 - (stevesk) [auth-pam.[ch] ssh.h] move SSHD_PAM_SERVICE to auth-pam.h
1105 - (stevesk) [ssh-keygen.c] bug #231: always init/seed_rng().
1108 - (tim) [contrib/solaris/buildpkg.sh] create privsep user/group if needed.
1109 Patch by dtucker@zip.com.au
1110 - (tim) [configure.ac] test for libxnet on HP. Patch by dtucker@zip.com.au
1113 - (tim) [defines.h] Bug 313 patch by dirk.meyer@dinoex.sub.org
1114 - (tim) [monitor_mm.c] add missing declaration for xmmap(). Reported
1115 by ayamura@ayamura.org
1116 - (tim) [configure.ac] Bug 267 rework int64_t test.
1117 - (tim) [includes.h] Bug 267 add stdint.h
1120 - (bal) aixbff package updated by dtucker@zip.com.au
1121 - (tim) [configure.ac] change how we do paths in AC_PATH_PROGS tests
1122 for autoconf 2.53. Based on a patch by jrj@purdue.edu
1125 - (tim) [contrib/solaris/opensshd.in] Only kill sshd if .pid file found
1128 - (bal) OpenBSD CVS Sync
1129 - itojun@cvs.openbsd.org 2002/07/12 13:29:09
1131 print connect failure during debugging mode.
1132 - markus@cvs.openbsd.org 2002/07/12 15:50:17
1134 EVP_CIPH_CUSTOM_IV for our own rijndael
1135 - (bal) Remove unused tty defined in do_setusercontext() pointed out by
1136 dtucker@zip.com.au plus a a more KNF since I am near it.
1137 - (bal) Privsep user creation support in Solaris buildpkg.sh by
1141 - (tim) [Makefile.in] replace "id sshd" with "sshd -t"
1142 - (bal/tim) [acconfig.h configure.ac monitor_mm.c servconf.c
1143 openbsd-compat/Makefile.in] support compression on platforms that
1144 have no/broken MAP_ANON. Moved code to openbsd-compat/xmmap.c
1145 Based on patch from nalin@redhat.com of code extracted from Owl's package
1146 - (tim) [ssh_prng_cmds.in] Bug 323 arp -n flag doesn't exist under Solaris.
1147 report by chris@by-design.net
1148 - (tim) [loginrec.c] Bug 347: Fix typo (WTMPX_FILE) report by rodney@bond.net
1149 - (tim) [loginrec.c] Bug 348: add missing found = 1; to wtmpx_islogin()
1150 report by rodney@bond.net
1153 - (tim) [Makefile.in] quiet down install-files: and check-user:
1154 - (tim) [configure.ac] remove unused filepriv line
1157 - (tim) [contrib/cygwin/ssh-host-config] explicitely sets the permissions
1158 on /var/empty to 755 Patch by vinschen@redhat.com
1159 - (bal) OpenBSD CVS Sync
1160 - itojun@cvs.openbsd.org 2002/07/09 11:56:50
1162 silently try next address on connect(2). markus ok
1163 - itojun@cvs.openbsd.org 2002/07/09 11:56:27
1165 suppress log on reverse lookup failiure, as there's no real value in
1168 - itojun@cvs.openbsd.org 2002/07/09 12:04:02
1170 ed static function (less warnings)
1171 - stevesk@cvs.openbsd.org 2002/07/09 17:46:25
1173 clarify no preference ordering in protocol list; ok markus@
1174 - itojun@cvs.openbsd.org 2002/07/10 10:28:15
1176 bark if all connection attempt fails.
1177 - deraadt@cvs.openbsd.org 2002/07/10 17:53:54
1179 use right sizeof in memcpy; markus ok
1182 - (bal) NO_IPPORT_RESERVED_CONCEPT used instead of CYGWIN so other platforms
1183 lacking that concept can share it. Patch by vinschen@redhat.com
1186 - (tim) [openssh/contrib/solaris/buildpkg.sh] add PKG_INSTALL_ROOT to
1187 work in a jumpstart environment. patch by kbrint@rufus.net
1188 - (tim) [Makefile.in] workaround for broken pakadd on some systems.
1189 - (tim) [configure.ac] fix libc89 utimes test. Mention default path for
1190 --with-privsep-path=
1193 - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH)
1194 - (tim) [acconfig.h configure.ac sshd.c]
1195 s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/
1196 - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes
1197 patch from vinschen@redhat.com
1198 - (bal) [realpath.c] Updated with OpenBSD tree.
1199 - (bal) OpenBSD CVS Sync
1200 - deraadt@cvs.openbsd.org 2002/07/04 04:15:33
1201 [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c]
1202 patch memory leaks; grendel@zeitbombe.org
1203 - deraadt@cvs.openbsd.org 2002/07/04 08:12:15
1204 [channels.c packet.c]
1205 blah blah minor nothing as i read and re-read and re-read...
1206 - markus@cvs.openbsd.org 2002/07/04 10:41:47
1207 [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c]
1208 don't allocate, copy, and discard if there is not interested in the data;
1210 - deraadt@cvs.openbsd.org 2002/07/06 01:00:49
1213 - deraadt@cvs.openbsd.org 2002/07/06 01:01:26
1215 KNF, realloc fix, and clean usage
1216 - stevesk@cvs.openbsd.org 2002/07/06 17:47:58
1219 - (bal) Minor KNF on ssh-keyscan.c
1222 - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs.
1223 Reported by Darren Tucker <dtucker@zip.com.au>
1224 - (tim) [contrib/cygwin/ssh-host-config] double slash corrction
1225 from vinschen@redhat.com
1228 - (bal) Limit data to TTY for AIX only (Newer versions can't handle the
1229 faster data rate) Bug #124
1230 - (bal) glob.c defines TILDE and AIX also defines it. #undef it first.
1232 - (bal) One too many nulls in ports-aix.c
1235 - (bal) Updated contrib/cygwin/ patch by vinschen@redhat.com
1236 - (bal) minor correction to utimes() replacement. Patch by
1239 - markus@cvs.openbsd.org 2002/06/27 08:49:44
1240 [dh.c ssh-keyscan.c sshconnect.c]
1241 more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@
1242 - deraadt@cvs.openbsd.org 2002/06/27 09:08:00
1244 improve mm_zalloc check; markus ok
1245 - deraadt@cvs.openbsd.org 2002/06/27 10:35:47
1246 [auth2-none.c monitor.c sftp-client.c]
1248 - stevesk@cvs.openbsd.org 2002/06/27 19:49:08
1250 use convtime(); ok markus@
1251 - millert@cvs.openbsd.org 2002/06/28 01:49:31
1253 tree(3) wants an int return value for its compare functions and
1254 the difference between two pointers is not an int. Just do the
1255 safest thing and store the result in a long and then return 0,
1256 -1, or 1 based on that result.
1257 - deraadt@cvs.openbsd.org 2002/06/28 01:50:37
1260 - deraadt@cvs.openbsd.org 2002/06/28 10:08:25
1262 range check -u option at invocation
1263 - deraadt@cvs.openbsd.org 2002/06/28 23:05:06
1265 gidset[2] -> gidset[1]; markus ok
1266 - deraadt@cvs.openbsd.org 2002/06/30 21:54:16
1267 [auth2.c session.c sshd.c]
1268 lint asks that we use names that do not overlap
1269 - deraadt@cvs.openbsd.org 2002/06/30 21:59:45
1270 [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c
1271 monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c
1272 sshconnect2.c sshd.c]
1274 - deraadt@cvs.openbsd.org 2002/07/01 16:15:25
1277 - markus@cvs.openbsd.org 2002/07/01 19:48:46
1279 for compression=yes, we fallback to no-compression if the server does
1280 not support compression, vice versa for compression=no. ok mouring@
1281 - markus@cvs.openbsd.org 2002/07/03 09:55:38
1283 use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld)
1284 in order to avoid a possible Kocher timing attack pointed out by Charles
1286 - markus@cvs.openbsd.org 2002/07/03 14:21:05
1287 [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config]
1288 re-enable ssh-keysign's sbit, but make ssh-keysign read
1289 /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled
1290 globally. based on discussions with deraadt, itojun and sommerfeld;
1292 - (bal) Failed password attempts don't increment counter on AIX. Bug #145
1293 - (bal) Missed Makefile.in change. keysign needs readconf.o
1294 - (bal) Clean up aix_usrinfo(). Ignore TTY= period I guess.
1297 - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc &
1298 friends consistently. Spotted by Solar Designer <solar@openwall.com>
1301 - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style
1302 clean up while I'm near it.
1305 - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented
1306 options should contain default value. from solar.
1307 - (bal) Cygwin uid0 fix by vinschen@redhat.com
1308 - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c. Otherwise wise
1309 have issues of our fixes not propogating right (ie bcopy instead of
1311 - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported.
1316 - deraadt@cvs.openbsd.org 2002/06/26 14:49:36
1319 - deraadt@cvs.openbsd.org 2002/06/26 14:50:04
1321 use ssize_t for recvmsg() and sendmsg() return
1322 - markus@cvs.openbsd.org 2002/06/26 14:51:33
1324 fix exit code for -X/-x
1325 - deraadt@cvs.openbsd.org 2002/06/26 15:00:32
1328 - markus@cvs.openbsd.org 2002/06/26 22:27:32
1330 bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu
1333 - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM
1334 - (bal) OpenBSD CVS Sync
1335 - markus@cvs.openbsd.org 2002/06/23 21:34:07
1338 - markus@cvs.openbsd.org 2002/06/24 13:12:23
1340 the socket name contains ssh-agent's ppid; via mpech@ from form@
1341 - markus@cvs.openbsd.org 2002/06/24 14:33:27
1342 [channels.c channels.h clientloop.c serverloop.c]
1343 move channel counter to u_int
1344 - markus@cvs.openbsd.org 2002/06/24 14:55:38
1345 [authfile.c kex.c ssh-agent.c]
1346 cat to (void) when output from buffer_get_X is ignored
1347 - itojun@cvs.openbsd.org 2002/06/24 15:49:22
1350 - deraadt@cvs.openbsd.org 2002/06/24 17:57:20
1351 [sftp-server.c sshpty.c]
1352 explicit (u_int) for uid and gid
1353 - markus@cvs.openbsd.org 2002/06/25 16:22:42
1356 - markus@cvs.openbsd.org 2002/06/25 18:51:04
1358 lightweight do_setusercontext after chroot()
1359 - (bal) Updated AIX package build. Patch by dtucker@zip.com.au
1360 - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8
1361 - (bal) added back in error check for mmap(). I screwed up, Pointed
1363 - (tim) [README.privsep] UnixWare tip no longer needed.
1364 - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP,
1365 but it all damned lies.
1366 - (stevesk) [README.privsep] more for sshd pseudo-account.
1367 - (tim) [contrib/caldera/openssh.spec] add support for privsep
1368 - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@
1369 - (djm) OpenBSD CVS Sync
1370 - markus@cvs.openbsd.org 2002/06/26 08:53:12
1372 limit size of BNs to 8KB; ok provos/deraadt
1373 - markus@cvs.openbsd.org 2002/06/26 08:54:18
1375 limit append to 1MB and buffers to 10MB
1376 - markus@cvs.openbsd.org 2002/06/26 08:55:02
1378 limit # of channels to 10000
1379 - markus@cvs.openbsd.org 2002/06/26 08:58:26
1381 limit # of env vars to 1000; ok deraadt/djm
1382 - deraadt@cvs.openbsd.org 2002/06/26 13:20:57
1384 be careful in mm_zalloc
1385 - deraadt@cvs.openbsd.org 2002/06/26 13:49:26
1387 disclose less information from environment files; based on input
1388 from djm, and dschultz@uclink.Berkeley.EDU
1389 - markus@cvs.openbsd.org 2002/06/26 13:55:37
1391 make sure # of response matches # of queries, fixes int overflow;
1393 - markus@cvs.openbsd.org 2002/06/26 13:56:27
1396 - (djm) Require krb5 devel for RPM build w/ KrbV
1397 - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai
1399 - (djm) Update spec files for release
1400 - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS
1401 - (djm) Release 3.4p1
1402 - (tim) [contrib/caldera/openssh.spec] remove 2 configure options I put in
1406 - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh
1407 - (stevesk) [README.privsep] minor updates
1408 - (djm) Create privsep directory and warn if privsep user is missing
1410 - (bal) Started list of PrivSep issues in TODO
1411 - (bal) if mmap() is substandard, don't allow compression on server side.
1412 Post 'event' we will add more options.
1413 - (tim) [contrib/caldera/openssh.spec] Sync with Caldera
1414 - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by
1416 - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus
1417 for Cygwin, Cray, & SCO
1421 - deraadt@cvs.openbsd.org 2002/06/23 03:25:50
1424 - deraadt@cvs.openbsd.org 2002/06/23 03:26:19
1427 - deraadt@cvs.openbsd.org 2002/06/23 03:30:58
1428 [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c
1430 various KNF and %d for unsigned
1431 - deraadt@cvs.openbsd.org 2002/06/23 09:30:14
1432 [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c
1434 bunch of u_int vs int stuff
1435 - deraadt@cvs.openbsd.org 2002/06/23 09:39:55
1438 - deraadt@cvs.openbsd.org 2002/06/23 09:46:51
1439 [bufaux.c servconf.c]
1440 minor KNF. things the fingers do while you read
1441 - deraadt@cvs.openbsd.org 2002/06/23 10:29:52
1442 [ssh-agent.c sshd.c]
1443 some minor KNF and %u
1444 - deraadt@cvs.openbsd.org 2002/06/23 20:39:45
1446 compression_level is u_int
1447 - deraadt@cvs.openbsd.org 2002/06/23 21:06:13
1450 - deraadt@cvs.openbsd.org 2002/06/23 21:06:41
1451 [channels.c channels.h session.c session.h]
1452 display, screen, row, col, xpixel, ypixel are u_int; markus ok
1453 - deraadt@cvs.openbsd.org 2002/06/23 21:10:02
1455 packet_get_int() returns unsigned for reason & seqnr
1456 - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col,
1461 - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX.
1462 - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset.
1463 - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au
1465 - stevesk@cvs.openbsd.org 2002/06/22 02:00:29
1468 - stevesk@cvs.openbsd.org 2002/06/22 02:40:23
1470 section 5 not 4 for ssh_config
1471 - naddy@cvs.openbsd.org 2002/06/22 11:51:39
1474 - stevesk@cvs.openbsd.org 2002/06/22 16:32:54
1476 add /var/empty in FILES section
1477 - stevesk@cvs.openbsd.org 2002/06/22 16:40:19
1479 check /var/empty owner mode; ok provos@
1480 - stevesk@cvs.openbsd.org 2002/06/22 16:41:57
1483 - stevesk@cvs.openbsd.org 2002/06/22 16:45:29
1484 [ssh-agent.1 sshd.8 sshd_config.5]
1485 use process ID vs. pid/PID/process identifier
1486 - stevesk@cvs.openbsd.org 2002/06/22 20:05:27
1488 don't call setsid() if debugging or run from inetd; no "Operation not
1489 permitted" errors now; ok millert@ markus@
1490 - stevesk@cvs.openbsd.org 2002/06/22 23:09:51
1492 save auth method before monitor_reset_key_state(); bugzilla bug #284;