2 - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX.
3 - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset.
4 - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au
6 - stevesk@cvs.openbsd.org 2002/06/22 02:00:29
9 - stevesk@cvs.openbsd.org 2002/06/22 02:40:23
11 section 5 not 4 for ssh_config
12 - naddy@cvs.openbsd.org 2002/06/22 11:51:39
15 - stevesk@cvs.openbsd.org 2002/06/22 16:32:54
17 add /var/empty in FILES section
18 - stevesk@cvs.openbsd.org 2002/06/22 16:40:19
20 check /var/empty owner mode; ok provos@
21 - stevesk@cvs.openbsd.org 2002/06/22 16:41:57
24 - stevesk@cvs.openbsd.org 2002/06/22 16:45:29
25 [ssh-agent.1 sshd.8 sshd_config.5]
26 use process ID vs. pid/PID/process identifier
27 - stevesk@cvs.openbsd.org 2002/06/22 20:05:27
29 don't call setsid() if debugging or run from inetd; no "Operation not
30 permitted" errors now; ok millert@ markus@
31 - stevesk@cvs.openbsd.org 2002/06/22 23:09:51
33 save auth method before monitor_reset_key_state(); bugzilla bug #284;
37 - (djm) Update README.privsep; spotted by fries@
39 - (bal) getopt now can be staticly compiled on those platforms missing
40 optreset. Patch by binder@arago.de
44 - djm@cvs.openbsd.org 2002/06/21 05:50:51
46 Don't initialise compression buffers when compression=no in sshd_config;
48 - ID sync for auth-passwd.c
49 - (djm) Warn and disable compression on platforms which can't handle both
50 useprivilegeseparation=yes and compression=yes
51 - (djm) contrib/redhat/openssh.spec hacking:
52 - Merge in spec changes from seba@iq.pl (Sebastian Pachuta)
53 - Add new {ssh,sshd}_config.5 manpages
54 - Add new ssh-keysign program and remove setuid from ssh client
57 - (bal) Fixed AIX environment handling, use setpcred() instead of existing
58 code. (Bugzilla Bug 261)
59 - (bal) OpenBSD CVS Sync
60 - todd@cvs.openbsd.org 2002/06/14 21:35:00
62 spelling; from Brian Poole <raj@cerias.purdue.edu>
63 - markus@cvs.openbsd.org 2002/06/15 00:01:36
64 [authfd.c authfd.h ssh-add.c ssh-agent.c]
65 break agent key lifetime protocol and allow other contraints for key
67 - markus@cvs.openbsd.org 2002/06/15 00:07:38
68 [authfd.c authfd.h ssh-add.c ssh-agent.c]
70 - markus@cvs.openbsd.org 2002/06/15 01:27:48
71 [authfd.c authfd.h ssh-add.c ssh-agent.c]
72 remove the CONSTRAIN_IDENTITY messages and introduce a new
73 ADD_ID message with contraints instead. contraints can be
74 only added together with the private key.
75 - itojun@cvs.openbsd.org 2002/06/16 21:30:58
77 use TAILQ_xx macro. from lukem@netbsd. markus ok
78 - deraadt@cvs.openbsd.org 2002/06/17 06:05:56
80 make usage like man page
81 - deraadt@cvs.openbsd.org 2002/06/19 00:27:55
82 [auth-bsdauth.c auth-skey.c auth1.c auth2-chall.c auth2-none.c authfd.c
83 authfd.h monitor_wrap.c msg.c nchan.c radix.c readconf.c scp.c sftp.1
84 ssh-add.1 ssh-add.c ssh-agent.1 ssh-agent.c ssh-keygen.1 ssh-keygen.c
85 ssh-keysign.c ssh.1 sshconnect.c sshconnect.h sshconnect2.c ttymodes.c
87 KNF done automatically while reading....
88 - markus@cvs.openbsd.org 2002/06/19 18:01:00
89 [cipher.c monitor.c monitor_wrap.c packet.c packet.h]
90 make the monitor sync the transfer ssh1 session key;
91 transfer keycontext only for RC4 (this is still depends on EVP
92 implementation details and is broken).
93 - stevesk@cvs.openbsd.org 2002/06/20 19:56:07
95 move configuration file options from ssh.1/sshd.8 to
96 ssh_config.5/sshd_config.5; ok deraadt@ millert@
97 - stevesk@cvs.openbsd.org 2002/06/20 20:00:05
100 - stevesk@cvs.openbsd.org 2002/06/20 20:03:34
101 [ssh_config sshd_config]
102 refer to config file man page
103 - markus@cvs.openbsd.org 2002/06/20 23:05:56
104 [servconf.c servconf.h session.c sshd.c]
105 allow Compression=yes/no in sshd_config
106 - markus@cvs.openbsd.org 2002/06/20 23:37:12
109 - stevesk@cvs.openbsd.org 2002/05/25 20:40:08
111 missed Per Allansson (auth2-chall.c)
112 - (bal) Cygwin special handling of empty passwords wrong. Patch by
114 - (bal) Missed integrating ssh_config.5 and sshd_config.5
115 - (bal) Still more Makefile.in updates for ssh{d}_config.5
118 - (bal) typo of setgroup for cygwin. Patch by vinschen@redhat.com
121 - (bal) OpenBSD CVS Sync
122 - markus@cvs.openbsd.org 2002/06/11 23:03:54
125 - markus@cvs.openbsd.org 2002/06/12 01:09:52
127 ssh_connect returns 0 on success
128 - (bal) Build noop setgroups() for cygwin to clean up code (For other
129 platforms without the setgroups() requirement, you MUST define
130 SETGROUPS_NOOP in the configure.ac) Based on patch by vinschen@redhat.com
131 - (bal) Some platforms don't have ONLCR (Notable Mint)
134 - (bal) ssh-agent.c RCSD fix (|unexpand already done)
135 - (bal) OpenBSD CVS Sync
136 - stevesk@cvs.openbsd.org 2002/06/09 22:15:15
138 update for no setuid root and ssh-keysign; ok deraadt@
139 - itojun@cvs.openbsd.org 2002/06/09 22:17:21
141 pass salen to sockaddr_ntop so that we are happy on linux/solaris
142 - stevesk@cvs.openbsd.org 2002/06/10 16:53:06
143 [auth-rsa.c ssh-rsa.c]
144 display minimum RSA modulus in error(); ok markus@
145 - stevesk@cvs.openbsd.org 2002/06/10 16:56:30
147 merge in stuff from my man page; ok markus@
148 - stevesk@cvs.openbsd.org 2002/06/10 17:36:23
149 [ssh-add.1 ssh-add.c]
150 use convtime() to parse and validate key lifetime. can now
151 use '-t 2h' etc. ok markus@ provos@
152 - stevesk@cvs.openbsd.org 2002/06/10 17:45:20
154 change RhostsRSAAuthentication and RhostsAuthentication default to no
155 since ssh is no longer setuid root by default; ok markus@
156 - stevesk@cvs.openbsd.org 2002/06/10 21:21:10
158 update defaults for RhostsRSAAuthentication and RhostsAuthentication
159 here too (all options commented out with default value).
160 - markus@cvs.openbsd.org 2002/06/10 22:28:41
161 [channels.c channels.h session.c]
162 move creation of agent socket to session.c; no need for uidswapping
164 - markus@cvs.openbsd.org 2002/06/11 04:14:26
165 [ssh.c sshconnect.c sshconnect.h]
166 no longer use uidswap.[ch] from the ssh client
167 run less code with euid==0 if ssh is installed setuid root
168 just switch the euid, don't switch the complete set of groups
169 (this is only needed by sshd). ok provos@
170 - mpech@cvs.openbsd.org 2002/06/11 05:46:20
171 [auth-krb4.c monitor.h serverloop.c session.c ssh-agent.c sshd.c]
172 pid_t cleanup. Markus need this now to keep hacking.
174 - itojun@cvs.openbsd.org 2002/06/11 08:11:45
176 use "ntop" only after initialized
177 - (bal) Cygwin fix up from swap uid clean up in ssh.c patch by
181 - (bal) OpenBSD CVS Sync
182 - markus@cvs.openbsd.org 2002/06/08 05:07:56
185 - markus@cvs.openbsd.org 2002/06/08 05:07:09
187 only accept 20 byte session ids
188 - markus@cvs.openbsd.org 2002/06/08 05:17:01
189 [readconf.c readconf.h ssh.1 ssh.c]
190 deprecate FallBackToRsh and UseRsh; patch from djm@
191 - markus@cvs.openbsd.org 2002/06/08 05:40:01
193 just warn about Deprecated options for now
194 - markus@cvs.openbsd.org 2002/06/08 05:41:18
196 remove FallBackToRsh/UseRsh
197 - markus@cvs.openbsd.org 2002/06/08 12:36:53
200 - markus@cvs.openbsd.org 2002/06/08 12:46:14
202 silently ignore deprecated options, since FallBackToRsh might be passed
203 by remote scp commands.
204 - itojun@cvs.openbsd.org 2002/06/08 21:15:27
206 always use getnameinfo. (diag message only)
207 - markus@cvs.openbsd.org 2002/06/09 04:33:27
210 - (bal) RCSID tag updates on channels.c, clientloop.c, nchan.c,
211 sftp-client.c, ssh-agenet.c, ssh-keygen.c and connect.h (we did unexpand
215 - (bal) Removed --{enable/disable}-suid-ssh
216 - (bal) Missed __progname in ssh-keysign.c patch by dtucker@zip.com.au
217 - (bal) use 'LOGIN_PROGRAM' not '/usr/bin/login' in session.c patch by
218 Bertrand.Velle@apogee-com.fr
221 - (bal) OpenBSD CVS Sync
222 - markus@cvs.openbsd.org 2002/05/15 21:56:38
223 [servconf.c sshd.8 sshd_config]
224 re-enable privsep and disable setuid for post-3.2.2
225 - markus@cvs.openbsd.org 2002/05/16 22:02:50
226 [cipher.c kex.h mac.c]
227 fix warnings (openssl 0.9.7 requires const)
228 - stevesk@cvs.openbsd.org 2002/05/16 22:09:59
230 don't limit xauth pathlen on client side and longer print length on
231 server when debug; ok markus@
232 - deraadt@cvs.openbsd.org 2002/05/19 20:54:52
234 extra commas in enum not 100% portable
235 - deraadt@cvs.openbsd.org 2002/05/22 23:18:25
237 spelling; abishoff@arc.nasa.gov
238 - markus@cvs.openbsd.org 2002/05/23 19:24:30
239 [authfile.c authfile.h pathnames.h ssh.c sshconnect.c sshconnect.h
240 sshconnect1.c sshconnect2.c ssh-keysign.8 ssh-keysign.c Makefile.in]
241 add /usr/libexec/ssh-keysign: a setuid helper program for hostbased
242 authentication in protocol v2 (needs to access the hostkeys).
243 - markus@cvs.openbsd.org 2002/05/23 19:39:34
245 add comment about ssh-keysign
246 - markus@cvs.openbsd.org 2002/05/24 08:45:14
248 stat ssh-keysign first, print error if stat fails;
249 some debug->error; fix comment
250 - markus@cvs.openbsd.org 2002/05/25 08:50:39
252 execlp->execl; from stevesk
253 - markus@cvs.openbsd.org 2002/05/25 18:51:07
254 [auth.h auth2.c auth2-hostbased.c auth2-kbdint.c auth2-none.c
255 auth2-passwd.c auth2-pubkey.c Makefile.in]
256 split auth2.c into one file per method; ok provos@/deraadt@
257 - stevesk@cvs.openbsd.org 2002/05/26 20:35:10
259 sort ChallengeResponseAuthentication; ok markus@
260 - stevesk@cvs.openbsd.org 2002/05/28 16:45:27
262 print strerror(errno) on mmap/munmap error; ok markus@
263 - stevesk@cvs.openbsd.org 2002/05/28 17:28:02
265 format spec change/casts and some KNF; ok markus@
266 - stevesk@cvs.openbsd.org 2002/05/28 21:24:00
268 use correct function name in fatal()
269 - stevesk@cvs.openbsd.org 2002/05/29 03:06:30
272 - markus@cvs.openbsd.org 2002/05/29 11:21:57
274 don't start if privsep is enabled and SSH_PRIVSEP_USER or
275 _PATH_PRIVSEP_CHROOT_DIR are missing; ok deraadt@
276 - markus@cvs.openbsd.org 2002/05/30 08:07:31
278 use rijndael/aes from libcrypto (openssl >= 0.9.7) instead of
279 our own implementation. allow use of AES hardware via libcrypto,
281 - markus@cvs.openbsd.org 2002/05/31 10:30:33
283 extent ssh-keysign protocol:
284 pass # of socket-fd to ssh-keysign, keysign verfies locally used
285 ip-address using this socket-fd, restricts fake local hostnames
286 to actual local hostnames; ok stevesk@
287 - markus@cvs.openbsd.org 2002/05/31 11:35:15
289 move Authmethod definitons to per-method file.
290 - markus@cvs.openbsd.org 2002/05/31 13:16:48
293 key_verify returns 1 for a correct signature, 0 for an incorrect signature
295 - markus@cvs.openbsd.org 2002/05/31 13:20:50
297 pad received signature with leading zeros, because RSA_verify expects
298 a signature of RSA_size. the drafts says the signature is transmitted
299 unpadded (e.g. putty does not pad), reported by anakin@pobox.com
300 - deraadt@cvs.openbsd.org 2002/06/03 12:04:07
302 compatiblity -> compatibility
303 decriptor -> descriptor
304 authentciated -> authenticated
305 transmition -> transmission
306 - markus@cvs.openbsd.org 2002/06/04 19:42:35
308 only allow enabled authentication methods; ok provos@
309 - markus@cvs.openbsd.org 2002/06/04 19:53:40
311 save the session id (hash) for ssh2 (it will be passed with the
312 initial sign request) and verify that this value is used during
313 authentication; ok provos@
314 - markus@cvs.openbsd.org 2002/06/04 23:02:06
317 - markus@cvs.openbsd.org 2002/06/04 23:05:49
318 [cipher.c monitor.c monitor_fdpass.c monitor_mm.c monitor_wrap.c]
319 __FUNCTION__ -> __func__
320 - markus@cvs.openbsd.org 2002/06/05 16:08:07
321 [ssh-agent.1 ssh-agent.c]
322 '-a bind_address' binds the agent to user-specified unix-domain
323 socket instead of /tmp/ssh-XXXXXXXX/agent.<pid>; ok djm@ (some time ago).
324 - markus@cvs.openbsd.org 2002/06/05 16:08:07
325 [ssh-agent.1 ssh-agent.c]
326 '-a bind_address' binds the agent to user-specified unix-domain
327 socket instead of /tmp/ssh-XXXXXXXX/agent.<pid>; ok djm@ (some time ago).
328 - markus@cvs.openbsd.org 2002/06/05 16:48:54
330 copy current request into an extra buffer and just flush this
331 request on errors, ok provos@
332 - markus@cvs.openbsd.org 2002/06/05 19:57:12
333 [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c]
334 ssh-add -x for lock and -X for unlocking the agent.
335 todo: encrypt private keys with locked...
336 - markus@cvs.openbsd.org 2002/06/05 20:56:39
339 - markus@cvs.openbsd.org 2002/06/05 21:55:44
340 [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c]
341 ssh-add -t life, Set lifetime (in seconds) when adding identities;
343 - stevesk@cvs.openbsd.org 2002/06/06 01:09:41
345 no trailing comma in enum; china@thewrittenword.com
346 - markus@cvs.openbsd.org 2002/06/06 17:12:44
348 discard remaining bytes of current request; ok provos@
349 - markus@cvs.openbsd.org 2002/06/06 17:30:11
351 use get_int() macro (hide iqueue)
352 - (bal) Missed msg.[ch] in merge. Required for ssh-keysign.
353 - (bal) Forgot to add msg.c Makefile.in.
354 - (bal) monitor_mm.c typos.
355 - (bal) Refixed auth2.c. It was never fully commited while spliting out
356 authentication to different files.
357 - (bal) ssh-keysign should build and install correctly now. Phase two
358 would be to clean out any dead wood and disable ssh setuid on install.
359 - (bal) Reverse logic, use __func__ first since it's C99
362 - (stevesk) [channels.c] bug #164 patch from YOSHIFUJI Hideaki (changed
363 setsockopt from debug to error for now).
366 - (tim) [configure.ac.orig monitor_fdpass.c] Enahnce msghdr tests to address
367 build problem on Irix reported by Dave Love <d.love@dl.ac.uk>. Back out
368 last monitor_fdpass.c changes that are no longer needed with new tests.
369 Patch tested on Irix by Jan-Frode Myklebust <janfrode@parallab.uib.no>
372 - (djm) Fix spelling mistakes, spotted by Solar Designer i
374 - Sync scard/ (not sure when it drifted)
375 - (djm) OpenBSD CVS Sync:
377 Fix typo/thinko. Pass in as to auth_approval(), not NULL.
380 - Crank RPM spec versions
383 - (stevesk) [sshd.c] bug 245; disable setsid() for now
384 - (stevesk) [sshd.c] #ifndef HAVE_CYGWIN for setgroups()
387 - (tim) [configure.ac] remove extra MD5_MSG="no" line.
390 - (bal) CVS ID fix up on auth-passwd.c
391 - (bal) OpenBSD CVS Sync
392 - deraadt@cvs.openbsd.org 2002/05/07 19:54:36
395 - deraadt@cvs.openbsd.org 2002/05/08 21:06:34
397 move to sshd.sshd instead
398 - stevesk@cvs.openbsd.org 2002/05/11 20:24:48
401 - itojun@cvs.openbsd.org 2002/05/13 02:37:39
402 [auth-skey.c auth2.c]
403 less warnings. skey_{respond,query} are public (in auth.h)
404 - markus@cvs.openbsd.org 2002/05/13 20:44:58
405 [auth-options.c auth.c auth.h]
406 move the packet_send_debug handling from auth-options.c to auth.c;
408 - millert@cvs.openbsd.org 2002/05/13 15:53:19
410 Call setsid() in the child after sshd accepts the connection and forks.
411 This is needed for privsep which calls setlogin() when it changes uids.
412 Without this, there is a race where the login name of an existing
413 connection, as returned by getlogin(), may be changed to the privsep
414 user (sshd). markus@ OK
415 - markus@cvs.openbsd.org 2002/05/13 21:26:49
417 handle debug messages during rhosts-rsa and hostbased authentication;
419 - mouring@cvs.openbsd.org 2002/05/15 15:47:49
420 [kex.c monitor.c monitor_wrap.c sshd.c]
421 'monitor' variable clashes with at least one lame platform (NeXT). i
422 Renamed to 'pmonitor'. provos@
423 - deraadt@cvs.openbsd.org 2002/05/04 02:39:35
424 [servconf.c sshd.8 sshd_config]
425 enable privsep by default; provos ok
426 - millert@cvs.openbsd.org 2002/05/06 23:34:33
428 Kill/adjust r(login|exec)d? references now that those are no longer in
430 - markus@cvs.openbsd.org 2002/05/15 21:02:53
431 [servconf.c sshd.8 sshd_config]
432 disable privsep and enable setuid for the 3.2.2 release
433 - (bal) Fixed up PAM case. I think.
434 - (bal) Clarified openbsd-compat/*-cray.* Licence provided by Wendy
435 - (bal) OpenBSD CVS Sync
436 - markus@cvs.openbsd.org 2002/05/15 21:05:29
439 - (bal) Caldara, Suse, and Redhat openssh.specs updated.
442 - (stevesk) [README.privsep] PAM+privsep works with Solaris 8.
443 - (tim) [sshpty.c] set tty modes when allocating old style bsd ptys to
444 match what newer style ptys have when allocated. Based on a patch by
445 Roger Cornelius <rac@tenzing.org>
446 - (tim) [README.privsep] UnixWare 7 and OpenUNIX 8 work.
447 - (tim) [README.privsep] remove reference to UnixWare 7 and OpenUNIX 8
448 from PAM-enabled pragraph. UnixWare has no PAM.
449 - (tim) [contrib/caldera/openssh.spec] update version.
452 - (stevesk) add initial README.privsep
453 - (stevesk) [configure.ac] nicer message: --with-privsep-user=user
454 - (djm) Add --with-superuser-path=xxx configure option to specify
455 what $PATH the superuser receives.
456 - (djm) Bug #231: UsePrivilegeSeparation turns off Banner.
457 - (djm) Add --with-privsep-path configure option
458 - (djm) Update RPM spec file: different superuser path, use
459 /var/empty/sshd for privsep
460 - (djm) Bug #234: missing readpassphrase declaration and defines
461 - (djm) Add INSTALL warning about SSH protocol 1 blowfish w/
465 - (tim) [configure.ac] applied a rework of djm's OpenSSL search cleanup patch.
466 Now only searches system and /usr/local/ssl (OpenSSL's default install path)
467 Others must use --with-ssl-dir=....
468 - (tim) [monitor_fdpass.c] fix for systems that have both
469 HAVE_ACCRIGHTS_IN_MSGHDR and HAVE_CONTROL_IN_MSGHDR. Ie. sys/socket.h
470 has #define msg_accrights msg_control
473 - (stevesk) [auth.c] Shadow account and expiration cleanup. Now
474 check for root forced expire. Still don't check for inactive.
475 - (djm) Rework RedHat RPM files. Based on spec from Nalin
476 Dahyabhai <nalin@redhat.com> and patches from
477 Pekka Savola <pekkas@netcore.fi>
478 - (djm) Try to drop supplemental groups at daemon startup. Patch from
480 - (bal) Back all the way out of auth-passwd.c changes. Breaks too many
481 things that don't set pw->pw_passwd.
484 - (tim) [Makefile.in] Unbreak make -f Makefile.in distprep
487 - (tim) [openbsd-compat/bsd-arc4random.c] fix logic on when seed_rng() is
488 called. Report by Chris Maxwell <maxwell@cs.dal.ca>
489 - (tim) [Makefile.in configure.ac] set SHELL variable in Makefile
490 - (djm) Disable PAM kbd-int auth if privsep is turned on (it doesn't work)
493 - (tim) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
494 Add truncate() emulation to address Bug 208
497 - (djm) Unbreak auth-passwd.c for PAM and SIA
498 - (djm) Unbreak PAM auth for protocol 1. Report from Pekka Savola
500 - (djm) Don't reinitialise PAM credentials before we have started PAM.
501 Report from Pekka Savola <pekkas@netcore.fi>
504 - (bal) Fixed auth-passwd.c to resolve PermitEmptyPassword issue
507 - (djm) Import OpenBSD regression tests. Requires BSD make to run
508 - (djm) Fix readpassphase compilation for systems which have it
511 - (tim) [contrib/caldera/openssh.spec] update fixUP to reflect changes in
513 - (tim) [contrib/cygwin/README] remove reference to regex.
514 patch from Corinna Vinschen <vinschen@redhat.com>
517 - (djm) Bug #137, #209: fix make problems for scard/Ssh.bin, do uudecode
519 - (djm) Disable PAM password expiry until a complete fix for bug #188
521 - (djm) Bug #180: Set ToS bits on IPv4-in-IPv6 mapped addresses. Based on
522 patch from openssh@misc.tecq.org
525 - (stevesk) [defines.h] remove USE_TIMEVAL; unused
526 - (stevesk) [acconfig.h auth-passwd.c configure.ac sshd.c] HP-UX 10.26
527 support. bug #184. most from dcole@keysoftsys.com.
530 - (djm) OpenBSD CVS Sync
531 - markus@cvs.openbsd.org 2002/04/23 12:54:10
534 - djm@cvs.openbsd.org 2002/04/23 22:16:29
536 Improve error message; ok markus@ stevesk@
539 - (stevesk) [acconfig.h configure.ac session.c] LOGIN_NO_ENDOPT for HP-UX
540 - (stevesk) [acconfig.h] NEED_IN_SYSTM_H unused
541 - (markus) OpenBSD CVS Sync
542 - markus@cvs.openbsd.org 2002/04/23 12:58:26
544 send complete ticket; semerad@ss1000.ms.mff.cuni.cz
545 - (djm) Trim ChangeLog to include only post-3.1 changes
546 - (djm) Update RPM spec file versions
547 - (djm) Redhat spec enables KrbV by default
548 - (djm) Applied OpenSC smartcard updates from Markus &
549 Antti Tapaninen <aet@cc.hut.fi>
550 - (djm) Define BROKEN_REALPATH for AIX, patch from
551 Antti Tapaninen <aet@cc.hut.fi>
552 - (djm) Bug #214: Fix utmp for Irix (don't strip "tty"). Patch from
553 Kevin Taylor <no@nowhere.org> (??) via Philipp Grau
554 <phgrau@zedat.fu-berlin.de>
555 - (djm) Bug #213: Simplify CMSG_ALIGN macros to avoid symbol clashes.
556 Reported by Doug Manton <dmanton@emea.att.com>
557 - (djm) Bug #222: Fix tests for getaddrinfo on OSF/1. Spotted by
558 Robert Urban <urban@spielwiese.de>
559 - (djm) Bug #206 - blibpath isn't always needed for AIX ld, avoid
560 sizeof(long long int) == 4 breakage. Patch from Matthew Clarke
561 <Matthew_Clarke@mindlink.bc.ca>
562 - (djm) Make privsep work with PAM (still experimental)
563 - (djm) OpenBSD CVS Sync
564 - deraadt@cvs.openbsd.org 2002/04/20 09:02:03
566 No, afs requires explicit enabling
567 - markus@cvs.openbsd.org 2002/04/20 09:14:58
569 add buffer_{get,put}_short
570 - markus@cvs.openbsd.org 2002/04/20 09:17:19
572 rewrite using the buffer_* API, fixes overflow; ok deraadt@
573 - stevesk@cvs.openbsd.org 2002/04/21 16:19:27
575 document default AFSTokenPassing no; ok deraadt@
576 - stevesk@cvs.openbsd.org 2002/04/21 16:25:06
578 spelling in error message; ok markus@
579 - markus@cvs.openbsd.org 2002/04/22 06:15:47
581 fix check for overflow
582 - markus@cvs.openbsd.org 2002/04/22 16:16:53
583 [servconf.c sshd.8 sshd_config]
584 do not auto-enable KerberosAuthentication; ok djm@, provos@, deraadt@
585 - markus@cvs.openbsd.org 2002/04/22 21:04:52
586 [channels.c clientloop.c clientloop.h ssh.c]
587 request reply (success/failure) for -R style fwd in protocol v2,
588 depends on ordered replies.
589 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=215; ok provos@
592 - (tim) [entropy.c.] Portability fix for SCO Unix 3.2v4.x (SCO OSR 3.0).
593 entropy.c needs seteuid(getuid()) for the setuid(original_uid) to
594 succeed. Patch by gert@greenie.muc.de. This fixes one part of Bug 208
597 - (djm) Avoid SIGCHLD breakage when run from rsync. Fix from
598 Sturle Sunde <sturle.sunde@usit.uio.no>
601 - (djm) Tell users to configure /dev/random support into OpenSSL in
603 - (djm) Fix .Nm in mdoc2man.pl from pspencer@fields.utoronto.ca
604 - (tim) [configure.ac] Issue warning on --with-default-path=/some_path
605 if LOGIN_CAP is enabled. Report & testing by Tuc <tuc@ttsg.com>
608 - (djm) Unbreak "make install". Fix from Darren Tucker
610 - (stevesk) bsd-cygwin_util.[ch] BSD license from Corinna Vinschen
611 - (tim) [configure.ac] add tests for recvmsg and sendmsg.
612 [monitor_fdpass.c] add checks for HAVE_SENDMSG and HAVE_RECVMSG for
613 systems that HAVE_ACCRIGHTS_IN_MSGHDR but no recvmsg or sendmsg.
616 - (djm) ssh-rand-helper improvements
617 - Add commandline debugging options
618 - Don't write binary data if stdout is a tty (use hex instead)
620 - (djm) Random number collection doc fixes from Ben
623 - (djm) Add KrbV support patch from Simon Wilkinson <simon@sxw.org.uk>
626 - (stevesk) [auth-sia.[ch]] add BSD license from Chris Adams
627 - (tim) [configure.ac] add <sys/types.h> to msghdr tests. Change -L
628 to -h on testing for /bin being symbolic link
629 - (bal) Mistaken in Cygwin scripts for ssh starting. Patch by
630 Corinna Vinschen <vinschen@redhat.com>
631 - (bal) disable privsep if no MAP_ANON. We can re-enable it
632 after the release when we can do more testing.
635 - (stevesk) [auth-sia.c] cleanup
636 - (tim) [acconfig.h defines.h includes.h] put includes in includes.h and
637 defines in defines.h [rijndael.c openbsd-compat/fake-socket.h
638 openbsd-compat/inet_aton.c] include "includes.h" instead of "config.h"
642 - (stevesk) [configure.ac monitor.c] HAVE_SOCKETPAIR
643 - (stevesk) [auth-sia.c] compile fix Chris Adams <cmadams@hiwaay.net>
644 - (bal) OpenBSD CVS Sync
645 - markus@cvs.openbsd.org 2002/04/10 08:21:47
646 [auth1.c compat.c compat.h]
647 strip '@' from username only for KerbV and known broken clients,
649 - markus@cvs.openbsd.org 2002/04/10 08:56:01
652 - Added p1 to idenify Portable release version.
655 - (bal) Minor OpenSC updates. Fix up header locations and update
656 README.smartcard provided by Juha Yrjölä <jyrjola@cc.hut.fi>
659 - (stevesk) HAVE_CONTROL_IN_MSGHDR; not used right now.
660 Future: we may want to test if fd passing works correctly.
661 - (stevesk) [monitor_fdpass.c] fatal() for UsePrivilegeSeparation=yes
662 and no fd passing support.
663 - (stevesk) HAVE_MMAP and HAVE_SYS_MMAN_H and use them in
665 - (stevesk) remove configure support for poll.h; it was removed
666 from sshd.c a long time ago.
667 - (stevesk) --with-privsep-user; default sshd
668 - (stevesk) wrap munmap() with HAVE_MMAP also.
671 - (djm) Typo in Suse SPEC file. Fix from Carsten Grohmann
672 <carsten.grohmann@dr-baldeweg.de>
673 - (bal) Added MAP_FAILED to allow AIX and Trusted HP to compile.
674 - (bal) OpenBSD CVS Sync
675 - djm@cvs.openbsd.org 2002/04/06 00:30:08
677 Fix occasional corruption on upload due to bad reuse of request
678 id, spotted by chombier@mac.com; ok markus@
679 - mouring@cvs.openbsd.org 2002/04/06 18:24:09
681 Fixes potental double // within path.
682 http://bugzilla.mindrot.org/show_bug.cgi?id=76
683 - (bal) Slight update to OpenSC support. Better version checking. patch
684 by Juha Yrjölä <jyrjola@cc.hut.fi>
685 - (bal) Revered out of runtime IRIX detection of joblimits. Code is
687 - (bal) Quiet down configure.ac if /bin/test does not exist.
688 - (bal) We no longer use atexit()/xatexit()/on_exit()
691 - (bal) Patch for OpenSC SmartCard library; ok markus@; patch by
692 Juha Yrjölä <jyrjola@cc.hut.fi>
693 - (bal) Minor documentation update to reflect smartcard library
695 - (bal) Too many <sys/queue.h> issues. Remove all workarounds and
696 using internal version only.
697 - (bal) OpenBSD CVS Sync
698 - stevesk@cvs.openbsd.org 2002/04/05 20:56:21
700 clarify sshrc some and handle X11UseLocalhost=yes; ok markus@
703 - (stevesk) [auth-pam.c auth-pam.h auth-passwd.c auth-sia.c auth-sia.h
704 auth1.c auth2.c] PAM, OSF_SIA password auth cleanup; from djm.
705 - (bal) OpenBSD CVS Sync
706 - markus@cvs.openbsd.org 2002/04/03 09:26:11
707 [cipher.c myproposal.h]
708 re-add rijndael-cbc@lysator.liu.se for MacSSH; ash@lab.poc.net
711 - (bal) Hand Sync of scp.c (reverted to upstream code)
712 - deraadt@cvs.openbsd.org 2002/03/30 17:45:46
715 - (bal) CVS ID sync of uidswap.c
716 - (bal) OpenBSD CVS Sync (now for the real sync)
717 - markus@cvs.openbsd.org 2002/03/27 22:21:45
719 try to import keys with extra trailing === (seen with ssh.com <
721 - markus@cvs.openbsd.org 2002/03/28 15:34:51
723 do not call record_login twice (for use_privsep)
724 - markus@cvs.openbsd.org 2002/03/29 18:59:32
725 [session.c session.h]
726 retrieve last login time before the pty is allocated, store per
728 - stevesk@cvs.openbsd.org 2002/03/29 19:16:22
730 RSA key modulus size minimum 768; ok markus@
731 - stevesk@cvs.openbsd.org 2002/03/29 19:18:33
732 [auth-rsa.c ssh-rsa.c ssh.h]
733 make RSA modulus minimum #define; ok markus@
734 - markus@cvs.openbsd.org 2002/03/30 18:51:15
735 [monitor.c serverloop.c sftp-int.c sftp.c sshd.c]
736 check waitpid for EINTR; based on patch from peter@ifm.liu.se
737 - markus@cvs.openbsd.org 2002/04/01 22:02:16
739 20480 is an upper limit for older server
740 - markus@cvs.openbsd.org 2002/04/01 22:07:17
742 fallback to stat if server does not support lstat
743 - markus@cvs.openbsd.org 2002/04/02 11:49:39
745 check $SHELL for -k and -d, too;
746 http://bugzilla.mindrot.org/show_bug.cgi?id=199
747 - markus@cvs.openbsd.org 2002/04/02 17:37:48
749 always call log_init()
750 - markus@cvs.openbsd.org 2002/04/02 20:11:38
752 ignore SSH_BUG_SIGBLOB for ssh-rsa; #187
753 - (bal) mispelling in uidswap.c (portable only)
756 - (stevesk) [monitor.c] PAM should work again; will *not* work with
757 UsePrivilegeSeparation=yes.
758 - (stevesk) [auth1.c] fix password auth for protocol 1 when
759 !USE_PAM && !HAVE_OSF_SIA; merge issue.
762 - (tim) [configure.ac] use /bin/test -L to work around broken builtin on
764 - (tim) [sshconnect2.c] change uint32_t to u_int32_t
767 - (stevesk) [configure.ac] remove header check for sys/ttcompat.h
771 - (bal) 'pw' should be 'authctxt->pw' in auth1.c spotted by
773 - (bal) OpenBSD CVS Sync
774 - markus@cvs.openbsd.org 2002/03/26 11:34:49
776 update to recent drafts
777 - markus@cvs.openbsd.org 2002/03/26 11:37:05
780 - markus@cvs.openbsd.org 2002/03/26 15:23:40
782 do not talk about packets in bufaux
783 - rees@cvs.openbsd.org 2002/03/26 18:46:59
785 try_AUT0 in read_pubkey too, for those paranoid few who want to
787 - markus@cvs.openbsd.org 2002/03/26 22:50:39
789 CHANNEL_EFD_OUTPUT_ACTIVE is false for CHAN_CLOSE_RCVD, too
790 - markus@cvs.openbsd.org 2002/03/26 23:13:03
792 disallow RSA keys < 768 for protocol 1, too (rhosts-rsa and rsa auth)
793 - markus@cvs.openbsd.org 2002/03/26 23:14:51
795 generate a new cookie for each SSH2_MSG_KEXINIT message we send out
796 - mouring@cvs.openbsd.org 2002/03/27 11:45:42
798 monitor_allowed_key() returns int instead of pointer. ok markus@
801 - (stevesk) import OpenBSD <sys/tree.h> as "openbsd-compat/tree.h"
802 - (bal) OpenBSD CVS Sync
803 - stevesk@cvs.openbsd.org 2002/03/23 20:57:26
805 setproctitle() after preauth child; ok markus@
806 - markus@cvs.openbsd.org 2002/03/24 16:00:27
809 - markus@cvs.openbsd.org 2002/03/24 16:01:13
811 debug->debug3 for extra padding
812 - stevesk@cvs.openbsd.org 2002/03/24 17:27:03
815 - stevesk@cvs.openbsd.org 2002/03/24 17:53:16
817 minor cleanup and more error checking; ok markus@
818 - markus@cvs.openbsd.org 2002/03/24 18:05:29
820 we need to figure out AUT0 for sc_private_encrypt, too
821 - stevesk@cvs.openbsd.org 2002/03/24 23:20:00
823 remove "\n" from fatal()
824 - markus@cvs.openbsd.org 2002/03/25 09:21:13
826 return 0 (not NULL); tomh@po.crl.go.jp
827 - markus@cvs.openbsd.org 2002/03/25 09:25:06
830 - markus@cvs.openbsd.org 2002/03/25 17:34:27
831 [scard.c scard.h ssh-agent.c ssh-keygen.c ssh.c]
832 change sc_get_key to sc_get_keys and hide smartcard details in scard.c
833 - stevesk@cvs.openbsd.org 2002/03/25 20:12:10
834 [monitor_mm.c monitor_wrap.c]
835 ssize_t args use "%ld" and cast to (long)
836 size_t args use "%lu" and cast to (u_long)
837 ok markus@ and thanks millert@
838 - markus@cvs.openbsd.org 2002/03/25 21:04:02
840 simplify num_identity_files handling
841 - markus@cvs.openbsd.org 2002/03/25 21:13:51
842 [channels.c channels.h compat.c compat.h nchan.c]
843 don't send stderr data after EOF, accept this from older known
844 (broken) sshd servers only, fixes
845 http://bugzilla.mindrot.org/show_bug.cgi?id=179
846 - stevesk@cvs.openbsd.org 2002/03/26 03:24:01
847 [monitor.h monitor_fdpass.h monitor_mm.h monitor_wrap.h]
851 - (stevesk) [session.c] disable LOGIN_NEEDS_TERM until we are sure
852 it can be removed. only used on solaris. will no longer compile with
856 - (stevesk) HAVE_ACCRIGHTS_IN_MSGHDR configure support
857 - (stevesk) [monitor.c monitor_wrap.c] #ifdef HAVE_PW_CLASS_IN_PASSWD
858 - (stevesk) configure and cpp __FUNCTION__ gymnastics to handle nielsisms
859 - (stevesk) [monitor_fdpass.c] support for access rights style file
861 - (stevesk) [auth2.c] merge cleanup/sync
862 - (stevesk) [defines.h] hp-ux 11 has ancillary data style fd passing, but
863 is missing CMSG_LEN() and CMSG_SPACE() macros.
864 - (stevesk) [defines.h] #define MAP_ANON MAP_ANONYMOUS for HP-UX; other
865 platforms may need this--I'm not sure. mmap() issues will need to be
867 - (tim) [cipher.c] fix problem with OpenBSD sync
868 - (stevesk) [LICENCE] OpenBSD sync
871 - (bal) OpenBSD CVS Sync
872 - itojun@cvs.openbsd.org 2002/03/08 06:10:16
875 - itojun@cvs.openbsd.org 2002/03/11 03:18:49
877 correct type mismatches (u_int64_t != unsigned long long)
878 - itojun@cvs.openbsd.org 2002/03/11 03:19:53
881 - markus@cvs.openbsd.org 2002/03/14 15:24:27
883 don't trust size sent by (rogue) server; noted by
885 - markus@cvs.openbsd.org 2002/03/14 16:38:26
887 split out ssh1 session key decryption; ok provos@
888 - markus@cvs.openbsd.org 2002/03/14 16:56:33
889 [auth-rh-rsa.c auth-rsa.c auth.h]
890 split auth_rsa() for better readability and privsep; ok provos@
891 - itojun@cvs.openbsd.org 2002/03/15 11:00:38
893 fix file type checking (use S_ISREG). ok by markus
894 - markus@cvs.openbsd.org 2002/03/16 11:24:53
896 skip inflateEnd if inflate fails; ok provos@
897 - markus@cvs.openbsd.org 2002/03/16 17:22:09
898 [auth-rh-rsa.c auth.h]
899 split auth_rhosts_rsa(), ok provos@
900 - stevesk@cvs.openbsd.org 2002/03/16 17:41:25
902 BSD license. from Daniel Kouril via Dug Song. ok markus@
903 - provos@cvs.openbsd.org 2002/03/17 20:25:56
904 [auth.c auth.h auth1.c auth2.c]
905 getpwnamallow returns struct passwd * only if user valid;
907 - provos@cvs.openbsd.org 2002/03/18 01:12:14
908 [auth.h auth1.c auth2.c sshd.c]
909 have the authentication functions return the authentication context
910 and then do_authenticated; okay millert@
911 - dugsong@cvs.openbsd.org 2002/03/18 01:30:10
913 set client to NULL after xfree(), from Rolf Braun
914 <rbraun+ssh@andrew.cmu.edu>
915 - provos@cvs.openbsd.org 2002/03/18 03:41:08
917 move auth_approval into getpwnamallow with help from millert@
918 - markus@cvs.openbsd.org 2002/03/18 17:13:15
920 export/import cipher states; needed by ssh-privsep
921 - markus@cvs.openbsd.org 2002/03/18 17:16:38
923 export/import cipher state, iv and ssh2 seqnr; needed by ssh-privsep
924 - markus@cvs.openbsd.org 2002/03/18 17:23:31
926 add key_demote() for ssh-privsep
927 - provos@cvs.openbsd.org 2002/03/18 17:25:29
929 buffer_skip_string and extra sanity checking; needed by ssh-privsep
930 - provos@cvs.openbsd.org 2002/03/18 17:31:54
932 export compression streams for ssh-privsep
933 - provos@cvs.openbsd.org 2002/03/18 17:50:31
934 [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c]
935 [auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c]
936 [kexgex.c servconf.c]
937 [session.h servconf.h serverloop.c session.c sshd.c]
938 integrate privilege separated openssh; its turned off by default
939 for now. work done by me and markus@
940 - provos@cvs.openbsd.org 2002/03/18 17:53:08
943 - provos@cvs.openbsd.org 2002/03/18 17:59:09
945 document UsePrivilegeSeparation
946 - stevesk@cvs.openbsd.org 2002/03/18 23:52:51
948 UnprivUser/UnprivGroup usable now--specify numeric user/group; ok
950 - stevesk@cvs.openbsd.org 2002/03/19 03:03:43
951 [pathnames.h servconf.c servconf.h sshd.c]
952 _PATH_PRIVSEP_CHROOT_DIR; ok provos@
953 - stevesk@cvs.openbsd.org 2002/03/19 05:23:08
955 Banner has no default.
956 - mpech@cvs.openbsd.org 2002/03/19 06:32:56
958 use xfree() after xstrdup().
961 - markus@cvs.openbsd.org 2002/03/19 10:35:39
962 [auth-options.c auth.h session.c session.h sshd.c]
964 - markus@cvs.openbsd.org 2002/03/19 10:49:35
965 [auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h]
966 [packet.c session.c sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c]
967 [sshconnect2.c sshd.c ttymodes.c]
969 - markus@cvs.openbsd.org 2002/03/19 14:27:39
970 [auth.c auth1.c auth2.c]
971 make getpwnamallow() allways call pwcopy()
972 - markus@cvs.openbsd.org 2002/03/19 15:31:47
974 check for NULL; from provos@
975 - stevesk@cvs.openbsd.org 2002/03/20 19:12:25
976 [servconf.c servconf.h ssh.h sshd.c]
977 for unprivileged user, group do:
978 pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@
979 - stevesk@cvs.openbsd.org 2002/03/20 21:08:08
981 strerror() on chdir() fail; ok provos@
982 - markus@cvs.openbsd.org 2002/03/21 10:21:20
984 ignore errors for nonexisting default keys in ssh-add,
985 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158
986 - jakob@cvs.openbsd.org 2002/03/21 15:17:26
988 add built-in command line for adding new port forwardings on the fly.
989 based on a patch from brian wellington. ok markus@.
990 - markus@cvs.openbsd.org 2002/03/21 16:38:06
992 make compile w/ openssl 0.9.7
993 - markus@cvs.openbsd.org 2002/03/21 16:54:53
994 [scard.c scard.h ssh-keygen.c]
995 move key upload to scard.[ch]
996 - markus@cvs.openbsd.org 2002/03/21 16:57:15
999 - markus@cvs.openbsd.org 2002/03/21 16:58:13
1002 - rees@cvs.openbsd.org 2002/03/21 18:08:15
1004 In sc_put_key(), sc_reader_id should be id.
1005 - markus@cvs.openbsd.org 2002/03/21 20:51:12
1008 - markus@cvs.openbsd.org 2002/03/21 21:23:34
1010 add privsep_preauth() and remove 1 goto; ok provos@
1011 - rees@cvs.openbsd.org 2002/03/21 21:54:34
1012 [scard.c scard.h ssh-keygen.c]
1013 Add PIN-protection for secret key.
1014 - rees@cvs.openbsd.org 2002/03/21 22:44:05
1015 [authfd.c authfd.h ssh-add.c ssh-agent.c ssh.c]
1016 Add PIN-protection for secret key.
1017 - markus@cvs.openbsd.org 2002/03/21 23:07:37
1019 remove unused, sync w/ cmdline patch in my tree.
1022 - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is
1023 wanted, warn if directory does not exist. Put system directories in
1024 front of PATH for finding entorpy commands.
1025 - (tim) [contrib/aix/buildbff.sh contrib/aix/inventory.sh] AIX package
1026 build fixes. Patch by Darren Tucker <dtucker@zip.com.au>
1027 [contrib/solaris/buildpkg.sh] add missing dirs to SYSTEM_DIR. Have
1028 postinstall check for $piddir and add if necessary.
1031 - (tim) [contrib/solaris/buildpkg.sh, contrib/solaris/README] Updated to
1032 build on all platforms that support SVR4 style package tools. Now runs
1033 from build dir. Parts are based on patches from Antonio Navarro, and
1037 - (djm) Revert bits of Markus' OpenSSL compat patch which was
1038 accidentally committed.
1039 - (djm) Add Markus' patch for compat wih OpenSSL < 0.9.6.
1040 Known issue: Blowfish for SSH1 does not work
1041 - (stevesk) entropy.c: typo in debug message
1042 - (djm) ssh-keygen -i needs seeded RNG; report from markus@