2 - (djm) OpenBSD CVS Sync
3 - jmc@cvs.openbsd.org 2003/06/10 09:12:11
4 [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5]
5 [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
9 - kill whitespace at EOL
10 - new sentence, new line
12 - deraadt@cvs.openbsd.org 2003/06/10 22:20:52
13 [packet.c progressmeter.c]
14 mostly ansi cleanup; pval ok
15 - jakob@cvs.openbsd.org 2003/06/11 10:16:16
17 clean up check_host_key() and improve SSHFP feedback. ok markus@
18 - jakob@cvs.openbsd.org 2003/06/11 10:18:47
20 sync with check_host_key() change
21 - djm@cvs.openbsd.org 2003/06/11 11:18:38
22 [authfd.c authfd.h ssh-add.c ssh-agent.c]
23 make agent constraints (lifetime, confirm) work with smartcard keys;
28 - (djm) Sync README.smartcard with OpenBSD -current
29 - (djm) Re-merge OpenSC info into README.smartcard
32 - (dtucker) [uidswap.c] Fix setreuid and add missing args to fatal(). ok djm@
35 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
37 - (djm) Implement paranoid priv dropping checks, based on:
38 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
39 Proceedings of USENIX Security Symposium 2002
40 - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
41 - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
42 - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
43 Patch from larsch@trustcenter.de
44 - (djm) Bug #589 - scard-opensc: load only keys with a private keys
45 Patch from larsch@trustcenter.de
46 - (dtucker) Add includes.h to fake-rfc2553.c so it will build.
47 - (dtucker) Define EAI_NONAME in fake-rfc2553.h (used by fake-rfc2553.c).
50 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
51 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
52 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
53 Patch from larsch@trustcenter.de; ok markus@
54 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
55 larsch@trustcenter.de; ok markus@
56 - (djm) OpenBSD CVS Sync
57 - djm@cvs.openbsd.org 2003/06/04 08:25:18
59 disable challenge/response and keyboard-interactive auth methods
60 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
62 - djm@cvs.openbsd.org 2003/06/04 10:23:48
64 remove duplicated group-dropping code; ok markus@
65 - djm@cvs.openbsd.org 2003/06/04 12:03:59
67 remove bitrotten commet; ok markus@
68 - djm@cvs.openbsd.org 2003/06/04 12:18:49
71 - djm@cvs.openbsd.org 2003/06/04 12:40:39
73 kill ssh process upon receipt of signal, bz #241.
74 based on patch from esb AT hawaii.edu; ok markus@
75 - djm@cvs.openbsd.org 2003/06/04 12:41:22
77 kill ssh process on receipt of signal; ok markus@
78 - (djm) Update to fix of bug #584: lock card before return.
79 From larsch@trustcenter.de
80 - (djm) Always use mysignal() for SIGALRM
83 - (djm) Replace setproctitle replacement with code derived from
85 - (djm) OpenBSD CVS Sync
86 - markus@cvs.openbsd.org 2003/06/02 09:17:34
87 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
88 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
90 deprecate VerifyReverseMapping since it's dangerous if combined
91 with IP based access control as noted by Mike Harding; replace with
92 a UseDNS option, UseDNS is on by default and includes the
93 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
95 - millert@cvs.openbsd.org 2003/06/03 02:56:16
97 Remove the advertising clause in the UCB license which Berkeley
98 rescinded 22 July 1999. Proofed by myself and Theo.
99 - (djm) Fix portable-specific uses of verify_reverse_mapping too
100 - (djm) Sync openbsd-compat with OpenBSD CVS.
101 - No more 4-term BSD licenses in linked code
102 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
105 - (djm) Fix segv from bad reordering in auth-pam.c
106 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
108 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
110 - (djm) Remove "noip6" option from RedHat spec file. This may now be
111 set at runtime using AddressFamily option.
112 - (djm) Fix use of macro before #define in cipher-aes.c
113 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
114 - (djm) OpenBSD CVS Sync
115 - djm@cvs.openbsd.org 2003/05/26 12:54:40
117 fix format strings; ok markus@
118 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
120 seteuid and setegid; markus ok
121 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
123 VerifyHostKeyDNS is v2 only. ok markus@
126 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
128 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
131 - (djm) Avoid auth2-chall.c warning when compiling without
132 PAM, BSD_AUTH and SKEY
135 - (djm) OpenBSD CVS Sync
136 - djm@cvs.openbsd.org 2003/05/24 09:02:22
138 pass logged data through strnvis; ok markus
139 - djm@cvs.openbsd.org 2003/05/24 09:30:40
140 [authfile.c monitor.c sftp-common.c sshpty.c]
141 cast some types for printing; ok markus@
144 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
147 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
148 encoding (which encodes many more characters)
150 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
152 - new sentence, new line
156 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
157 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
158 new sentence, new line
159 - djm@cvs.openbsd.org 2003/05/23 08:29:30
164 - (djm) OpenBSD CVS Sync
165 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
167 use syslog_r() in a signal handler called place; markus ok
168 - (djm) Configure logic to detect syslog_r and friends
171 - (djm) Sync auth-pam.h with what we actually implement
174 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
176 - (djm) OpenBSD CVS Sync
177 - djm@cvs.openbsd.org 2003/05/16 03:27:12
178 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
179 add AddressFamily option to ssh_config (like -4, -6 on commandline).
180 Portable bug #534; ok markus@
181 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
183 just in case, put numbers to sscanf %s arg.
184 - markus@cvs.openbsd.org 2003/05/17 04:27:52
185 [cipher.c cipher-ctr.c myproposal.h]
186 experimental support for aes-ctr modes from
187 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
189 - (djm) Remove IPv4 by default hack now that we can specify AF in config
190 - (djm) Tidy and trim TODO
191 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
192 - (djm) Big KNF on openbsd-compat/
193 - (djm) KNF on md5crypt.[ch]
194 - (djm) KNF on auth-sia.[ch]
197 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
200 - (djm) OpenBSD CVS Sync
201 - djm@cvs.openbsd.org 2003/05/15 13:52:10
203 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
204 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
205 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
206 [readconf.c servconf.c]
207 warn for unsupported config option. ok markus@
208 - markus@cvs.openbsd.org 2003/05/15 14:09:21
210 fix 64bit issue; report itojun@
211 - djm@cvs.openbsd.org 2003/05/15 14:55:25
212 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
213 add a ConnectTimeout option to ssh, based on patch from
214 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
215 - (djm) Add warning for UsePAM when built without PAM support
216 - (djm) A few type mismatch fixes from Bug #565
217 - (djm) Guard free_pam_environment against NULL argument. Works around
218 HP/UX PAM problems debugged by dtucker
221 - (djm) OpenBSD CVS Sync
222 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
226 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
227 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
228 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
229 add experimental support for verifying hos keys using DNS as described
230 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
231 ok markus@ and henning@
232 - markus@cvs.openbsd.org 2003/05/14 22:24:42
233 [clientloop.c session.c ssh.1]
234 allow to send a BREAK to the remote system; ok various
235 - markus@cvs.openbsd.org 2003/05/15 00:28:28
237 cleanup unregister of per-method packet handlers; ok djm@
238 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
239 [readconf.c readconf.h servconf.c servconf.h]
240 always parse kerberos options. ok djm@ markus@
241 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
243 add missing freerrset
244 - markus@cvs.openbsd.org 2003/05/15 03:08:29
245 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
246 split out custom EVP ciphers
247 - djm@cvs.openbsd.org 2003/05/15 03:10:52
249 avoid warning; ok jakob@
250 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
252 Make put/get (globed and nonglobed) code more consistant. OK djm@
253 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
255 Teach ls how to display multiple column display and allow users
256 to return to single column format via 'ls -1'. OK @djm
257 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
258 [readconf.c servconf.c]
259 disable kerberos when not supported. ok markus@
260 - markus@cvs.openbsd.org 2003/05/15 04:08:41
263 - (djm) Always parse UsePAM
264 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
265 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
266 - (djm) Tidy Makefile clean targets
267 - (djm) Adapt README.dns for portable
268 - (djm) Avoid uuencode.c warnings
269 - (djm) Enable UsePAM when built --with-pam
270 - (djm) Only build getrrsetbyname replacement when using --with-dns
271 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
273 - (djm) Bug #444: Wrong paths after reconfigure
274 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
277 - (djm) Bug #117: Don't lie to PAM about username
278 - (djm) RCSID sync w/ OpenBSD
279 - (djm) OpenBSD CVS Sync
280 - djm@cvs.openbsd.org 2003/04/09 12:00:37
282 strip trailing whitespace from config lines before parsing.
283 Fixes bz 528; ok markus@
284 - markus@cvs.openbsd.org 2003/04/12 10:13:57
286 hide cipher details; ok djm@
287 - markus@cvs.openbsd.org 2003/04/12 10:15:36
290 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
292 document -V switch, fix wording; ok markus@
293 - markus@cvs.openbsd.org 2003/04/14 14:17:50
294 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
295 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
296 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
298 Missing globfree(&g) in process_put() spotted by Vince Brimhall
299 <VBrimhall@novell.com>. ok@ Theo
300 - markus@cvs.openbsd.org 2003/04/16 14:35:27
302 document struct Authctxt; with solar
303 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
305 -t in usage(); rogier@quaak.org
306 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
307 [sshd.8 sshd_config.5]
308 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
309 Bug #550 and * escaping suggested by jmc@.
310 - david@cvs.openbsd.org 2003/04/30 20:41:07
312 fix invalid .Pf macro usage introduced in previous commit
314 - markus@cvs.openbsd.org 2003/05/11 16:56:48
315 [authfile.c ssh-keygen.c]
316 change key_load_public to try to read a public from:
317 rsa1 private or rsa1 public and ssh2 keys.
318 this makes ssh-keygen -e fail for ssh1 keys more gracefully
319 for example; report from itojun (netbsd pr 20550).
320 - markus@cvs.openbsd.org 2003/05/11 20:30:25
321 [channels.c clientloop.c serverloop.c session.c ssh.c]
322 make channel_new() strdup the 'remote_name' (not the caller); ok theo
323 - markus@cvs.openbsd.org 2003/05/12 16:55:37
325 for pubkey authentication try the user keys in the following order:
326 1. agent keys that are found in the config file
328 3. keys that are only listed in the config file
329 this helps when an agent has many keys, where the server might
330 close the connection before the correct key is used. report & ok pb@
331 - markus@cvs.openbsd.org 2003/05/12 18:35:18
333 typo: DSA keys are of type ssh-dss; Brian Poole
334 - markus@cvs.openbsd.org 2003/05/14 00:52:59
336 ranges for per auth method messages
337 - djm@cvs.openbsd.org 2003/05/14 01:00:44
339 emphasise the batchmode functionality and make reference to pubkey auth,
340 both of which are FAQs; ok markus@
341 - markus@cvs.openbsd.org 2003/05/14 02:15:47
342 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
343 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
344 server interops with commercial client; ok jakob@ djm@
345 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
347 - better formatting in SYNOPSIS
350 - markus@cvs.openbsd.org 2003/05/14 08:57:49
352 http://bugzilla.mindrot.org/show_bug.cgi?id=560
353 Privsep child continues to run after monitor killed.
354 Pass monitor signals through to child; Darren Tucker
355 - (djm) Make portable build with MIT krb5 (some issues remain)
356 - (djm) Add new UsePAM configuration directive to allow runtime control
357 over usage of PAM. This allows non-root use of sshd when built with
359 - (djm) Die screaming if start_pam() is called when UsePAM=no
360 - (djm) Avoid KrbV leak for MIT Kerberos
361 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
362 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
365 - (djm) Redhat spec: Don't install profile.d scripts when not
366 building with GNOME/GTK askpass (patch from bet@rahul.net)
369 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
370 "make install". Patch by roth@feep.net.
371 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
372 problem on Linux (fixes "could not set controlling tty" errors).
373 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
374 proper challenge-response module
375 - (djm) 2-clause license on loginrec.c, with permission from
379 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
380 Patch from vinschen@redhat.com.
383 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
387 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
388 privsep should now work.
389 - (dtucker) Move handling of bad password authentications into a platform
390 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
393 - (djm) Add back radix.o (used by AFS support), after it went missing from
394 Makefile many moons ago
395 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
396 - (djm) Fix blibpath specification for AIX/gcc
397 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
400 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
404 - (bal) Bug #541: return; was dropped by mistake. Reported by
406 - (bal) Since we don't support platforms lacking u_int_64. We may
407 as well clean out some of those evil #ifdefs
408 - (bal) auth1.c minor resync while looking at the code.
409 - (bal) auth2.c same changed as above.
412 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
413 from matth@eecs.berkeley.edu
414 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
415 - (djm) OpenBSD CVS Sync
416 - markus@cvs.openbsd.org 2003/04/02 09:48:07
417 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
418 [readconf.h serverloop.c sshconnect2.c]
419 reapply rekeying chage, tested by henning@, ok djm@
420 - markus@cvs.openbsd.org 2003/04/02 14:36:26
422 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
423 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
426 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
428 remove $OpenBSD$, as other *.c does not have it.
429 - markus@cvs.openbsd.org 2003/04/07 08:29:57
431 typo: get correct counters; introduced during rekeying change.
432 - millert@cvs.openbsd.org 2003/04/07 21:58:05
434 The UCB copyright here is incorrect. This code did not originate
435 at UCB, it was written by Luke Mewburn. Updated the copyright at
436 the author's request. markus@ OK
437 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
439 rename log() into logit() to avoid name conflict. markus ok, from
441 - (djm) XXX - Performed locally using:
442 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
443 - hin@cvs.openbsd.org 2003/04/09 08:23:52
445 Don't include <krb.h> when compiling with Kerberos 5 support
446 - (djm) Fix up missing include for packet.c
447 - (djm) Fix missed log => logit occurance (reference by function pointer)
450 - (bal) if IP_TOS is not found or broken don't try to compile in
451 packet_set_tos() function call. bug #527
454 - (djm) OpenBSD CVS Sync
455 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
456 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
457 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
459 - new sentence new line
462 - markus@cvs.openbsd.org 2003/04/01 10:10:23
463 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
464 [readconf.h serverloop.c sshconnect2.c]
465 rekeying bugfixes and automatic rekeying:
466 * both client and server rekey _automatically_
467 (a) after 2^31 packets, because after 2^32 packets
468 the sequence number for packets wraps
469 (b) after 2^(blocksize_in_bits/4) blocks
470 (see: draft-ietf-secsh-newmodes-00.txt)
471 (a) and (b) are _enabled_ by default, and only disabled for known
472 openssh versions, that don't support rekeying properly.
473 * client option 'RekeyLimit'
474 * do not reply to requests during rekeying
475 - markus@cvs.openbsd.org 2003/04/01 10:22:21
476 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
477 [readconf.h serverloop.c sshconnect2.c]
478 backout rekeying changes (for 3.6.1)
479 - markus@cvs.openbsd.org 2003/04/01 10:31:26
480 [compat.c compat.h kex.c]
481 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
482 tested by ho@ and myself
483 - markus@cvs.openbsd.org 2003/04/01 10:56:46
486 - (djm) Crank spec file versions
487 - (djm) Release 3.6.1p1
490 - (djm) OpenBSD CVS Sync
491 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
493 one last fix to the tree: race fix broke stuff; pr 3169;
494 srp@srparish.net, help from djm
497 - (djm) Fix getpeerid support for 64 bit BE systems. From
498 Arnd Bergmann <arndb@de.ibm.com>
501 - (djm) OpenBSD CVS Sync
502 - markus@cvs.openbsd.org 2003/03/23 19:02:00
504 unbreak rekeying for privsep; ok millert@
506 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
507 Report from murple@murple.net, diagnosis from dtucker@zip.com.au