2 - (tim) [Makefile.in] use umask instead of chmod on $(PRIVSEP_PATH)
3 - (tim) [acconfig.h configure.ac sshd.c]
4 s/BROKEN_FD_PASSING/DISABLE_FD_PASSING/
5 - (tim) [contrib/cygwin/ssh-host-config] sshd account creation fixes
6 patch from vinschen@redhat.com
7 - (bal) [realpath.c] Updated with OpenBSD tree.
8 - (bal) OpenBSD CVS Sync
9 - deraadt@cvs.openbsd.org 2002/07/04 04:15:33
10 [key.c monitor_wrap.c sftp-glob.c ssh-dss.c ssh-rsa.c]
11 patch memory leaks; grendel@zeitbombe.org
12 - deraadt@cvs.openbsd.org 2002/07/04 08:12:15
14 blah blah minor nothing as i read and re-read and re-read...
15 - markus@cvs.openbsd.org 2002/07/04 10:41:47
16 [key.c monitor_wrap.c ssh-dss.c ssh-rsa.c]
17 don't allocate, copy, and discard if there is not interested in the data;
21 - (tim) [configure.ac] AIX 4.2.1 has authenticate() in libs.
22 Reported by Darren Tucker <dtucker@zip.com.au>
23 - (tim) [contrib/cygwin/ssh-host-config] double slash corrction
24 from vinschen@redhat.com
27 - (bal) Limit data to TTY for AIX only (Newer versions can't handle the
28 faster data rate) Bug #124
29 - (bal) glob.c defines TILDE and AIX also defines it. #undef it first.
31 - (bal) One too many nulls in ports-aix.c
34 - (bal) Updated contrib/cygwin/ patch by vinschen@redhat.com
35 - (bal) minor correction to utimes() replacement. Patch by
38 - markus@cvs.openbsd.org 2002/06/27 08:49:44
39 [dh.c ssh-keyscan.c sshconnect.c]
40 more checks for NULL pointers; from grendel@zeitbombe.org; ok deraadt@
41 - deraadt@cvs.openbsd.org 2002/06/27 09:08:00
43 improve mm_zalloc check; markus ok
44 - deraadt@cvs.openbsd.org 2002/06/27 10:35:47
45 [auth2-none.c monitor.c sftp-client.c]
47 - stevesk@cvs.openbsd.org 2002/06/27 19:49:08
49 use convtime(); ok markus@
50 - millert@cvs.openbsd.org 2002/06/28 01:49:31
52 tree(3) wants an int return value for its compare functions and
53 the difference between two pointers is not an int. Just do the
54 safest thing and store the result in a long and then return 0,
55 -1, or 1 based on that result.
56 - deraadt@cvs.openbsd.org 2002/06/28 01:50:37
59 - deraadt@cvs.openbsd.org 2002/06/28 10:08:25
61 range check -u option at invocation
62 - deraadt@cvs.openbsd.org 2002/06/28 23:05:06
64 gidset[2] -> gidset[1]; markus ok
65 - deraadt@cvs.openbsd.org 2002/06/30 21:54:16
66 [auth2.c session.c sshd.c]
67 lint asks that we use names that do not overlap
68 - deraadt@cvs.openbsd.org 2002/06/30 21:59:45
69 [auth-bsdauth.c auth-skey.c auth2-chall.c clientloop.c key.c
70 monitor_wrap.c monitor_wrap.h scard.h session.h sftp-glob.c ssh.c
73 - deraadt@cvs.openbsd.org 2002/07/01 16:15:25
76 - markus@cvs.openbsd.org 2002/07/01 19:48:46
78 for compression=yes, we fallback to no-compression if the server does
79 not support compression, vice versa for compression=no. ok mouring@
80 - markus@cvs.openbsd.org 2002/07/03 09:55:38
82 use RSA_blinding_on() for rsa hostkeys (suggested by Bill Sommerfeld)
83 in order to avoid a possible Kocher timing attack pointed out by Charles
85 - markus@cvs.openbsd.org 2002/07/03 14:21:05
86 [ssh-keysign.8 ssh-keysign.c ssh.c ssh_config]
87 re-enable ssh-keysign's sbit, but make ssh-keysign read
88 /etc/ssh/ssh_config and exit if HostbasedAuthentication is disabled
89 globally. based on discussions with deraadt, itojun and sommerfeld;
91 - (bal) Failed password attempts don't increment counter on AIX. Bug #145
92 - (bal) Missed Makefile.in change. keysign needs readconf.o
93 - (bal) Clean up aix_usrinfo(). Ignore TTY= period I guess.
96 - (djm) Use PAM_MSG_MEMBER for PAM_TEXT_INFO messages, use xmalloc &
97 friends consistently. Spotted by Solar Designer <solar@openwall.com>
100 - (bal) fix to auth2-pam.c to swap fatal() arguments, A bit of style
101 clean up while I'm near it.
104 - (stevesk) [sshd_config] PAMAuthenticationViaKbdInt no; commented
105 options should contain default value. from solar.
106 - (bal) Cygwin uid0 fix by vinschen@redhat.com
107 - (bal) s/config.h/includes.h/ in openbsd-compat/ for *.c. Otherwise wise
108 have issues of our fixes not propogating right (ie bcopy instead of
110 - (bal) FreeBSD needs <sys/types.h> to detect if mmap() is supported.
115 - deraadt@cvs.openbsd.org 2002/06/26 14:49:36
118 - deraadt@cvs.openbsd.org 2002/06/26 14:50:04
120 use ssize_t for recvmsg() and sendmsg() return
121 - markus@cvs.openbsd.org 2002/06/26 14:51:33
123 fix exit code for -X/-x
124 - deraadt@cvs.openbsd.org 2002/06/26 15:00:32
127 - markus@cvs.openbsd.org 2002/06/26 22:27:32
129 bug #304, xfree(data) called to early; openssh@sigint.cs.purdue.edu
132 - (stevesk) [monitor.c] remove duplicate proto15 dispatch entry for PAM
133 - (bal) OpenBSD CVS Sync
134 - markus@cvs.openbsd.org 2002/06/23 21:34:07
137 - markus@cvs.openbsd.org 2002/06/24 13:12:23
139 the socket name contains ssh-agent's ppid; via mpech@ from form@
140 - markus@cvs.openbsd.org 2002/06/24 14:33:27
141 [channels.c channels.h clientloop.c serverloop.c]
142 move channel counter to u_int
143 - markus@cvs.openbsd.org 2002/06/24 14:55:38
144 [authfile.c kex.c ssh-agent.c]
145 cat to (void) when output from buffer_get_X is ignored
146 - itojun@cvs.openbsd.org 2002/06/24 15:49:22
149 - deraadt@cvs.openbsd.org 2002/06/24 17:57:20
150 [sftp-server.c sshpty.c]
151 explicit (u_int) for uid and gid
152 - markus@cvs.openbsd.org 2002/06/25 16:22:42
155 - markus@cvs.openbsd.org 2002/06/25 18:51:04
157 lightweight do_setusercontext after chroot()
158 - (bal) Updated AIX package build. Patch by dtucker@zip.com.au
159 - (tim) [Makefile.in] fix test on installing ssh-rand-helper.8
160 - (bal) added back in error check for mmap(). I screwed up, Pointed
162 - (tim) [README.privsep] UnixWare tip no longer needed.
163 - (bal) fixed NeXTStep missing munmap() issue. It defines HAVE_MMAP,
164 but it all damned lies.
165 - (stevesk) [README.privsep] more for sshd pseudo-account.
166 - (tim) [contrib/caldera/openssh.spec] add support for privsep
167 - (djm) setlogin needs pgid==pid on BSD/OS; from itojun@
168 - (djm) OpenBSD CVS Sync
169 - markus@cvs.openbsd.org 2002/06/26 08:53:12
171 limit size of BNs to 8KB; ok provos/deraadt
172 - markus@cvs.openbsd.org 2002/06/26 08:54:18
174 limit append to 1MB and buffers to 10MB
175 - markus@cvs.openbsd.org 2002/06/26 08:55:02
177 limit # of channels to 10000
178 - markus@cvs.openbsd.org 2002/06/26 08:58:26
180 limit # of env vars to 1000; ok deraadt/djm
181 - deraadt@cvs.openbsd.org 2002/06/26 13:20:57
183 be careful in mm_zalloc
184 - deraadt@cvs.openbsd.org 2002/06/26 13:49:26
186 disclose less information from environment files; based on input
187 from djm, and dschultz@uclink.Berkeley.EDU
188 - markus@cvs.openbsd.org 2002/06/26 13:55:37
190 make sure # of response matches # of queries, fixes int overflow;
192 - markus@cvs.openbsd.org 2002/06/26 13:56:27
195 - (djm) Require krb5 devel for RPM build w/ KrbV
196 - (djm) Improve PAMAuthenticationViaKbdInt text from Nalin Dahyabhai
198 - (djm) Update spec files for release
199 - (djm) Fix int overflow in auth2-pam.c, similar to one discovered by ISS
200 - (djm) Release 3.4p1
201 - (tim) [contrib/caldera/openssh.spec] remove 2 configure options I put in
205 - (stevesk) [INSTALL acconfig.h configure.ac defines.h] remove --with-rsh
206 - (stevesk) [README.privsep] minor updates
207 - (djm) Create privsep directory and warn if privsep user is missing
209 - (bal) Started list of PrivSep issues in TODO
210 - (bal) if mmap() is substandard, don't allow compression on server side.
211 Post 'event' we will add more options.
212 - (tim) [contrib/caldera/openssh.spec] Sync with Caldera
213 - (bal) moved aix_usrinfo() and noted not setting real TTY. Patch by
215 - (tim) [acconfig.h configure.ac sshd.c] BROKEN_FD_PASSING fix from Markus
216 for Cygwin, Cray, & SCO
220 - deraadt@cvs.openbsd.org 2002/06/23 03:25:50
223 - deraadt@cvs.openbsd.org 2002/06/23 03:26:19
226 - deraadt@cvs.openbsd.org 2002/06/23 03:30:58
227 [scard.c ssh-dss.c ssh-rsa.c sshconnect.c sshconnect2.c sshd.c sshlogin.c
229 various KNF and %d for unsigned
230 - deraadt@cvs.openbsd.org 2002/06/23 09:30:14
231 [sftp-client.c sftp-client.h sftp-common.c sftp-int.c sftp-server.c
233 bunch of u_int vs int stuff
234 - deraadt@cvs.openbsd.org 2002/06/23 09:39:55
237 - deraadt@cvs.openbsd.org 2002/06/23 09:46:51
238 [bufaux.c servconf.c]
239 minor KNF. things the fingers do while you read
240 - deraadt@cvs.openbsd.org 2002/06/23 10:29:52
242 some minor KNF and %u
243 - deraadt@cvs.openbsd.org 2002/06/23 20:39:45
245 compression_level is u_int
246 - deraadt@cvs.openbsd.org 2002/06/23 21:06:13
249 - deraadt@cvs.openbsd.org 2002/06/23 21:06:41
250 [channels.c channels.h session.c session.h]
251 display, screen, row, col, xpixel, ypixel are u_int; markus ok
252 - deraadt@cvs.openbsd.org 2002/06/23 21:10:02
254 packet_get_int() returns unsigned for reason & seqnr
255 - (bal) Also fixed IPADDR_IN_DISPLAY case where display, screen, row, col,
260 - (stevesk) [configure.ac] bug #255 LOGIN_NEEDS_UTMPX for AIX.
261 - (bal) removed GNUism for getops in ssh-agent since glibc lacks optreset.
262 - (bal) add extern char *getopt. Based on report by dtucker@zip.com.au
264 - stevesk@cvs.openbsd.org 2002/06/22 02:00:29
267 - stevesk@cvs.openbsd.org 2002/06/22 02:40:23
269 section 5 not 4 for ssh_config
270 - naddy@cvs.openbsd.org 2002/06/22 11:51:39
273 - stevesk@cvs.openbsd.org 2002/06/22 16:32:54
275 add /var/empty in FILES section
276 - stevesk@cvs.openbsd.org 2002/06/22 16:40:19
278 check /var/empty owner mode; ok provos@
279 - stevesk@cvs.openbsd.org 2002/06/22 16:41:57
282 - stevesk@cvs.openbsd.org 2002/06/22 16:45:29
283 [ssh-agent.1 sshd.8 sshd_config.5]
284 use process ID vs. pid/PID/process identifier
285 - stevesk@cvs.openbsd.org 2002/06/22 20:05:27
287 don't call setsid() if debugging or run from inetd; no "Operation not
288 permitted" errors now; ok millert@ markus@
289 - stevesk@cvs.openbsd.org 2002/06/22 23:09:51
291 save auth method before monitor_reset_key_state(); bugzilla bug #284;
295 - (djm) Update README.privsep; spotted by fries@
296 - (djm) Release 3.3p1
297 - (bal) getopt now can be staticly compiled on those platforms missing
298 optreset. Patch by binder@arago.de
302 - djm@cvs.openbsd.org 2002/06/21 05:50:51
304 Don't initialise compression buffers when compression=no in sshd_config;
306 - ID sync for auth-passwd.c
307 - (djm) Warn and disable compression on platforms which can't handle both
308 useprivilegeseparation=yes and compression=yes
309 - (djm) contrib/redhat/openssh.spec hacking:
310 - Merge in spec changes from seba@iq.pl (Sebastian Pachuta)
311 - Add new {ssh,sshd}_config.5 manpages
312 - Add new ssh-keysign program and remove setuid from ssh client
315 - (bal) Fixed AIX environment handling, use setpcred() instead of existing
316 code. (Bugzilla Bug 261)
317 - (bal) OpenBSD CVS Sync
318 - todd@cvs.openbsd.org 2002/06/14 21:35:00
320 spelling; from Brian Poole <raj@cerias.purdue.edu>
321 - markus@cvs.openbsd.org 2002/06/15 00:01:36
322 [authfd.c authfd.h ssh-add.c ssh-agent.c]
323 break agent key lifetime protocol and allow other contraints for key
325 - markus@cvs.openbsd.org 2002/06/15 00:07:38
326 [authfd.c authfd.h ssh-add.c ssh-agent.c]
328 - markus@cvs.openbsd.org 2002/06/15 01:27:48
329 [authfd.c authfd.h ssh-add.c ssh-agent.c]
330 remove the CONSTRAIN_IDENTITY messages and introduce a new
331 ADD_ID message with contraints instead. contraints can be
332 only added together with the private key.
333 - itojun@cvs.openbsd.org 2002/06/16 21:30:58
335 use TAILQ_xx macro. from lukem@netbsd. markus ok
336 - deraadt@cvs.openbsd.org 2002/06/17 06:05:56
338 make usage like man page
339 - deraadt@cvs.openbsd.org 2002/06/19 00:27:55
340 [auth-bsdauth.c auth-skey.c auth1.c auth2-chall.c auth2-none.c authfd.c
341 authfd.h monitor_wrap.c msg.c nchan.c radix.c readconf.c scp.c sftp.1
342 ssh-add.1 ssh-add.c ssh-agent.1 ssh-agent.c ssh-keygen.1 ssh-keygen.c
343 ssh-keysign.c ssh.1 sshconnect.c sshconnect.h sshconnect2.c ttymodes.c
345 KNF done automatically while reading....
346 - markus@cvs.openbsd.org 2002/06/19 18:01:00
347 [cipher.c monitor.c monitor_wrap.c packet.c packet.h]
348 make the monitor sync the transfer ssh1 session key;
349 transfer keycontext only for RC4 (this is still depends on EVP
350 implementation details and is broken).
351 - stevesk@cvs.openbsd.org 2002/06/20 19:56:07
353 move configuration file options from ssh.1/sshd.8 to
354 ssh_config.5/sshd_config.5; ok deraadt@ millert@
355 - stevesk@cvs.openbsd.org 2002/06/20 20:00:05
358 - stevesk@cvs.openbsd.org 2002/06/20 20:03:34
359 [ssh_config sshd_config]
360 refer to config file man page
361 - markus@cvs.openbsd.org 2002/06/20 23:05:56
362 [servconf.c servconf.h session.c sshd.c]
363 allow Compression=yes/no in sshd_config
364 - markus@cvs.openbsd.org 2002/06/20 23:37:12
367 - stevesk@cvs.openbsd.org 2002/05/25 20:40:08
369 missed Per Allansson (auth2-chall.c)
370 - (bal) Cygwin special handling of empty passwords wrong. Patch by
372 - (bal) Missed integrating ssh_config.5 and sshd_config.5
373 - (bal) Still more Makefile.in updates for ssh{d}_config.5
376 - (bal) typo of setgroup for cygwin. Patch by vinschen@redhat.com
379 - (bal) OpenBSD CVS Sync
380 - markus@cvs.openbsd.org 2002/06/11 23:03:54
383 - markus@cvs.openbsd.org 2002/06/12 01:09:52
385 ssh_connect returns 0 on success
386 - (bal) Build noop setgroups() for cygwin to clean up code (For other
387 platforms without the setgroups() requirement, you MUST define
388 SETGROUPS_NOOP in the configure.ac) Based on patch by vinschen@redhat.com
389 - (bal) Some platforms don't have ONLCR (Notable Mint)
392 - (bal) ssh-agent.c RCSD fix (|unexpand already done)
393 - (bal) OpenBSD CVS Sync
394 - stevesk@cvs.openbsd.org 2002/06/09 22:15:15
396 update for no setuid root and ssh-keysign; ok deraadt@
397 - itojun@cvs.openbsd.org 2002/06/09 22:17:21
399 pass salen to sockaddr_ntop so that we are happy on linux/solaris
400 - stevesk@cvs.openbsd.org 2002/06/10 16:53:06
401 [auth-rsa.c ssh-rsa.c]
402 display minimum RSA modulus in error(); ok markus@
403 - stevesk@cvs.openbsd.org 2002/06/10 16:56:30
405 merge in stuff from my man page; ok markus@
406 - stevesk@cvs.openbsd.org 2002/06/10 17:36:23
407 [ssh-add.1 ssh-add.c]
408 use convtime() to parse and validate key lifetime. can now
409 use '-t 2h' etc. ok markus@ provos@
410 - stevesk@cvs.openbsd.org 2002/06/10 17:45:20
412 change RhostsRSAAuthentication and RhostsAuthentication default to no
413 since ssh is no longer setuid root by default; ok markus@
414 - stevesk@cvs.openbsd.org 2002/06/10 21:21:10
416 update defaults for RhostsRSAAuthentication and RhostsAuthentication
417 here too (all options commented out with default value).
418 - markus@cvs.openbsd.org 2002/06/10 22:28:41
419 [channels.c channels.h session.c]
420 move creation of agent socket to session.c; no need for uidswapping
422 - markus@cvs.openbsd.org 2002/06/11 04:14:26
423 [ssh.c sshconnect.c sshconnect.h]
424 no longer use uidswap.[ch] from the ssh client
425 run less code with euid==0 if ssh is installed setuid root
426 just switch the euid, don't switch the complete set of groups
427 (this is only needed by sshd). ok provos@
428 - mpech@cvs.openbsd.org 2002/06/11 05:46:20
429 [auth-krb4.c monitor.h serverloop.c session.c ssh-agent.c sshd.c]
430 pid_t cleanup. Markus need this now to keep hacking.
432 - itojun@cvs.openbsd.org 2002/06/11 08:11:45
434 use "ntop" only after initialized
435 - (bal) Cygwin fix up from swap uid clean up in ssh.c patch by
439 - (bal) OpenBSD CVS Sync
440 - markus@cvs.openbsd.org 2002/06/08 05:07:56
443 - markus@cvs.openbsd.org 2002/06/08 05:07:09
445 only accept 20 byte session ids
446 - markus@cvs.openbsd.org 2002/06/08 05:17:01
447 [readconf.c readconf.h ssh.1 ssh.c]
448 deprecate FallBackToRsh and UseRsh; patch from djm@
449 - markus@cvs.openbsd.org 2002/06/08 05:40:01
451 just warn about Deprecated options for now
452 - markus@cvs.openbsd.org 2002/06/08 05:41:18
454 remove FallBackToRsh/UseRsh
455 - markus@cvs.openbsd.org 2002/06/08 12:36:53
458 - markus@cvs.openbsd.org 2002/06/08 12:46:14
460 silently ignore deprecated options, since FallBackToRsh might be passed
461 by remote scp commands.
462 - itojun@cvs.openbsd.org 2002/06/08 21:15:27
464 always use getnameinfo. (diag message only)
465 - markus@cvs.openbsd.org 2002/06/09 04:33:27
468 - (bal) RCSID tag updates on channels.c, clientloop.c, nchan.c,
469 sftp-client.c, ssh-agenet.c, ssh-keygen.c and connect.h (we did unexpand
473 - (bal) Removed --{enable/disable}-suid-ssh
474 - (bal) Missed __progname in ssh-keysign.c patch by dtucker@zip.com.au
475 - (bal) use 'LOGIN_PROGRAM' not '/usr/bin/login' in session.c patch by
476 Bertrand.Velle@apogee-com.fr
479 - (bal) OpenBSD CVS Sync
480 - markus@cvs.openbsd.org 2002/05/15 21:56:38
481 [servconf.c sshd.8 sshd_config]
482 re-enable privsep and disable setuid for post-3.2.2
483 - markus@cvs.openbsd.org 2002/05/16 22:02:50
484 [cipher.c kex.h mac.c]
485 fix warnings (openssl 0.9.7 requires const)
486 - stevesk@cvs.openbsd.org 2002/05/16 22:09:59
488 don't limit xauth pathlen on client side and longer print length on
489 server when debug; ok markus@
490 - deraadt@cvs.openbsd.org 2002/05/19 20:54:52
492 extra commas in enum not 100% portable
493 - deraadt@cvs.openbsd.org 2002/05/22 23:18:25
495 spelling; abishoff@arc.nasa.gov
496 - markus@cvs.openbsd.org 2002/05/23 19:24:30
497 [authfile.c authfile.h pathnames.h ssh.c sshconnect.c sshconnect.h
498 sshconnect1.c sshconnect2.c ssh-keysign.8 ssh-keysign.c Makefile.in]
499 add /usr/libexec/ssh-keysign: a setuid helper program for hostbased
500 authentication in protocol v2 (needs to access the hostkeys).
501 - markus@cvs.openbsd.org 2002/05/23 19:39:34
503 add comment about ssh-keysign
504 - markus@cvs.openbsd.org 2002/05/24 08:45:14
506 stat ssh-keysign first, print error if stat fails;
507 some debug->error; fix comment
508 - markus@cvs.openbsd.org 2002/05/25 08:50:39
510 execlp->execl; from stevesk
511 - markus@cvs.openbsd.org 2002/05/25 18:51:07
512 [auth.h auth2.c auth2-hostbased.c auth2-kbdint.c auth2-none.c
513 auth2-passwd.c auth2-pubkey.c Makefile.in]
514 split auth2.c into one file per method; ok provos@/deraadt@
515 - stevesk@cvs.openbsd.org 2002/05/26 20:35:10
517 sort ChallengeResponseAuthentication; ok markus@
518 - stevesk@cvs.openbsd.org 2002/05/28 16:45:27
520 print strerror(errno) on mmap/munmap error; ok markus@
521 - stevesk@cvs.openbsd.org 2002/05/28 17:28:02
523 format spec change/casts and some KNF; ok markus@
524 - stevesk@cvs.openbsd.org 2002/05/28 21:24:00
526 use correct function name in fatal()
527 - stevesk@cvs.openbsd.org 2002/05/29 03:06:30
530 - markus@cvs.openbsd.org 2002/05/29 11:21:57
532 don't start if privsep is enabled and SSH_PRIVSEP_USER or
533 _PATH_PRIVSEP_CHROOT_DIR are missing; ok deraadt@
534 - markus@cvs.openbsd.org 2002/05/30 08:07:31
536 use rijndael/aes from libcrypto (openssl >= 0.9.7) instead of
537 our own implementation. allow use of AES hardware via libcrypto,
539 - markus@cvs.openbsd.org 2002/05/31 10:30:33
541 extent ssh-keysign protocol:
542 pass # of socket-fd to ssh-keysign, keysign verfies locally used
543 ip-address using this socket-fd, restricts fake local hostnames
544 to actual local hostnames; ok stevesk@
545 - markus@cvs.openbsd.org 2002/05/31 11:35:15
547 move Authmethod definitons to per-method file.
548 - markus@cvs.openbsd.org 2002/05/31 13:16:48
551 key_verify returns 1 for a correct signature, 0 for an incorrect signature
553 - markus@cvs.openbsd.org 2002/05/31 13:20:50
555 pad received signature with leading zeros, because RSA_verify expects
556 a signature of RSA_size. the drafts says the signature is transmitted
557 unpadded (e.g. putty does not pad), reported by anakin@pobox.com
558 - deraadt@cvs.openbsd.org 2002/06/03 12:04:07
560 compatiblity -> compatibility
561 decriptor -> descriptor
562 authentciated -> authenticated
563 transmition -> transmission
564 - markus@cvs.openbsd.org 2002/06/04 19:42:35
566 only allow enabled authentication methods; ok provos@
567 - markus@cvs.openbsd.org 2002/06/04 19:53:40
569 save the session id (hash) for ssh2 (it will be passed with the
570 initial sign request) and verify that this value is used during
571 authentication; ok provos@
572 - markus@cvs.openbsd.org 2002/06/04 23:02:06
575 - markus@cvs.openbsd.org 2002/06/04 23:05:49
576 [cipher.c monitor.c monitor_fdpass.c monitor_mm.c monitor_wrap.c]
577 __FUNCTION__ -> __func__
578 - markus@cvs.openbsd.org 2002/06/05 16:08:07
579 [ssh-agent.1 ssh-agent.c]
580 '-a bind_address' binds the agent to user-specified unix-domain
581 socket instead of /tmp/ssh-XXXXXXXX/agent.<pid>; ok djm@ (some time ago).
582 - markus@cvs.openbsd.org 2002/06/05 16:08:07
583 [ssh-agent.1 ssh-agent.c]
584 '-a bind_address' binds the agent to user-specified unix-domain
585 socket instead of /tmp/ssh-XXXXXXXX/agent.<pid>; ok djm@ (some time ago).
586 - markus@cvs.openbsd.org 2002/06/05 16:48:54
588 copy current request into an extra buffer and just flush this
589 request on errors, ok provos@
590 - markus@cvs.openbsd.org 2002/06/05 19:57:12
591 [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c]
592 ssh-add -x for lock and -X for unlocking the agent.
593 todo: encrypt private keys with locked...
594 - markus@cvs.openbsd.org 2002/06/05 20:56:39
597 - markus@cvs.openbsd.org 2002/06/05 21:55:44
598 [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c]
599 ssh-add -t life, Set lifetime (in seconds) when adding identities;
601 - stevesk@cvs.openbsd.org 2002/06/06 01:09:41
603 no trailing comma in enum; china@thewrittenword.com
604 - markus@cvs.openbsd.org 2002/06/06 17:12:44
606 discard remaining bytes of current request; ok provos@
607 - markus@cvs.openbsd.org 2002/06/06 17:30:11
609 use get_int() macro (hide iqueue)
610 - (bal) Missed msg.[ch] in merge. Required for ssh-keysign.
611 - (bal) Forgot to add msg.c Makefile.in.
612 - (bal) monitor_mm.c typos.
613 - (bal) Refixed auth2.c. It was never fully commited while spliting out
614 authentication to different files.
615 - (bal) ssh-keysign should build and install correctly now. Phase two
616 would be to clean out any dead wood and disable ssh setuid on install.
617 - (bal) Reverse logic, use __func__ first since it's C99
620 - (stevesk) [channels.c] bug #164 patch from YOSHIFUJI Hideaki (changed
621 setsockopt from debug to error for now).
624 - (tim) [configure.ac.orig monitor_fdpass.c] Enahnce msghdr tests to address
625 build problem on Irix reported by Dave Love <d.love@dl.ac.uk>. Back out
626 last monitor_fdpass.c changes that are no longer needed with new tests.
627 Patch tested on Irix by Jan-Frode Myklebust <janfrode@parallab.uib.no>
630 - (djm) Fix spelling mistakes, spotted by Solar Designer i
632 - Sync scard/ (not sure when it drifted)
633 - (djm) OpenBSD CVS Sync:
635 Fix typo/thinko. Pass in as to auth_approval(), not NULL.
638 - Crank RPM spec versions
641 - (stevesk) [sshd.c] bug 245; disable setsid() for now
642 - (stevesk) [sshd.c] #ifndef HAVE_CYGWIN for setgroups()
645 - (tim) [configure.ac] remove extra MD5_MSG="no" line.
648 - (bal) CVS ID fix up on auth-passwd.c
649 - (bal) OpenBSD CVS Sync
650 - deraadt@cvs.openbsd.org 2002/05/07 19:54:36
653 - deraadt@cvs.openbsd.org 2002/05/08 21:06:34
655 move to sshd.sshd instead
656 - stevesk@cvs.openbsd.org 2002/05/11 20:24:48
659 - itojun@cvs.openbsd.org 2002/05/13 02:37:39
660 [auth-skey.c auth2.c]
661 less warnings. skey_{respond,query} are public (in auth.h)
662 - markus@cvs.openbsd.org 2002/05/13 20:44:58
663 [auth-options.c auth.c auth.h]
664 move the packet_send_debug handling from auth-options.c to auth.c;
666 - millert@cvs.openbsd.org 2002/05/13 15:53:19
668 Call setsid() in the child after sshd accepts the connection and forks.
669 This is needed for privsep which calls setlogin() when it changes uids.
670 Without this, there is a race where the login name of an existing
671 connection, as returned by getlogin(), may be changed to the privsep
672 user (sshd). markus@ OK
673 - markus@cvs.openbsd.org 2002/05/13 21:26:49
675 handle debug messages during rhosts-rsa and hostbased authentication;
677 - mouring@cvs.openbsd.org 2002/05/15 15:47:49
678 [kex.c monitor.c monitor_wrap.c sshd.c]
679 'monitor' variable clashes with at least one lame platform (NeXT). i
680 Renamed to 'pmonitor'. provos@
681 - deraadt@cvs.openbsd.org 2002/05/04 02:39:35
682 [servconf.c sshd.8 sshd_config]
683 enable privsep by default; provos ok
684 - millert@cvs.openbsd.org 2002/05/06 23:34:33
686 Kill/adjust r(login|exec)d? references now that those are no longer in
688 - markus@cvs.openbsd.org 2002/05/15 21:02:53
689 [servconf.c sshd.8 sshd_config]
690 disable privsep and enable setuid for the 3.2.2 release
691 - (bal) Fixed up PAM case. I think.
692 - (bal) Clarified openbsd-compat/*-cray.* Licence provided by Wendy
693 - (bal) OpenBSD CVS Sync
694 - markus@cvs.openbsd.org 2002/05/15 21:05:29
697 - (bal) Caldara, Suse, and Redhat openssh.specs updated.
700 - (stevesk) [README.privsep] PAM+privsep works with Solaris 8.
701 - (tim) [sshpty.c] set tty modes when allocating old style bsd ptys to
702 match what newer style ptys have when allocated. Based on a patch by
703 Roger Cornelius <rac@tenzing.org>
704 - (tim) [README.privsep] UnixWare 7 and OpenUNIX 8 work.
705 - (tim) [README.privsep] remove reference to UnixWare 7 and OpenUNIX 8
706 from PAM-enabled pragraph. UnixWare has no PAM.
707 - (tim) [contrib/caldera/openssh.spec] update version.
710 - (stevesk) add initial README.privsep
711 - (stevesk) [configure.ac] nicer message: --with-privsep-user=user
712 - (djm) Add --with-superuser-path=xxx configure option to specify
713 what $PATH the superuser receives.
714 - (djm) Bug #231: UsePrivilegeSeparation turns off Banner.
715 - (djm) Add --with-privsep-path configure option
716 - (djm) Update RPM spec file: different superuser path, use
717 /var/empty/sshd for privsep
718 - (djm) Bug #234: missing readpassphrase declaration and defines
719 - (djm) Add INSTALL warning about SSH protocol 1 blowfish w/
723 - (tim) [configure.ac] applied a rework of djm's OpenSSL search cleanup patch.
724 Now only searches system and /usr/local/ssl (OpenSSL's default install path)
725 Others must use --with-ssl-dir=....
726 - (tim) [monitor_fdpass.c] fix for systems that have both
727 HAVE_ACCRIGHTS_IN_MSGHDR and HAVE_CONTROL_IN_MSGHDR. Ie. sys/socket.h
728 has #define msg_accrights msg_control
731 - (stevesk) [auth.c] Shadow account and expiration cleanup. Now
732 check for root forced expire. Still don't check for inactive.
733 - (djm) Rework RedHat RPM files. Based on spec from Nalin
734 Dahyabhai <nalin@redhat.com> and patches from
735 Pekka Savola <pekkas@netcore.fi>
736 - (djm) Try to drop supplemental groups at daemon startup. Patch from
738 - (bal) Back all the way out of auth-passwd.c changes. Breaks too many
739 things that don't set pw->pw_passwd.
742 - (tim) [Makefile.in] Unbreak make -f Makefile.in distprep
745 - (tim) [openbsd-compat/bsd-arc4random.c] fix logic on when seed_rng() is
746 called. Report by Chris Maxwell <maxwell@cs.dal.ca>
747 - (tim) [Makefile.in configure.ac] set SHELL variable in Makefile
748 - (djm) Disable PAM kbd-int auth if privsep is turned on (it doesn't work)
751 - (tim) [configure.ac openbsd-compat/bsd-misc.c openbsd-compat/bsd-misc.h]
752 Add truncate() emulation to address Bug 208
755 - (djm) Unbreak auth-passwd.c for PAM and SIA
756 - (djm) Unbreak PAM auth for protocol 1. Report from Pekka Savola
758 - (djm) Don't reinitialise PAM credentials before we have started PAM.
759 Report from Pekka Savola <pekkas@netcore.fi>
762 - (bal) Fixed auth-passwd.c to resolve PermitEmptyPassword issue
765 - (djm) Import OpenBSD regression tests. Requires BSD make to run
766 - (djm) Fix readpassphase compilation for systems which have it
769 - (tim) [contrib/caldera/openssh.spec] update fixUP to reflect changes in
771 - (tim) [contrib/cygwin/README] remove reference to regex.
772 patch from Corinna Vinschen <vinschen@redhat.com>
775 - (djm) Bug #137, #209: fix make problems for scard/Ssh.bin, do uudecode
777 - (djm) Disable PAM password expiry until a complete fix for bug #188
779 - (djm) Bug #180: Set ToS bits on IPv4-in-IPv6 mapped addresses. Based on
780 patch from openssh@misc.tecq.org
783 - (stevesk) [defines.h] remove USE_TIMEVAL; unused
784 - (stevesk) [acconfig.h auth-passwd.c configure.ac sshd.c] HP-UX 10.26
785 support. bug #184. most from dcole@keysoftsys.com.
788 - (djm) OpenBSD CVS Sync
789 - markus@cvs.openbsd.org 2002/04/23 12:54:10
792 - djm@cvs.openbsd.org 2002/04/23 22:16:29
794 Improve error message; ok markus@ stevesk@
797 - (stevesk) [acconfig.h configure.ac session.c] LOGIN_NO_ENDOPT for HP-UX
798 - (stevesk) [acconfig.h] NEED_IN_SYSTM_H unused
799 - (markus) OpenBSD CVS Sync
800 - markus@cvs.openbsd.org 2002/04/23 12:58:26
802 send complete ticket; semerad@ss1000.ms.mff.cuni.cz
803 - (djm) Trim ChangeLog to include only post-3.1 changes
804 - (djm) Update RPM spec file versions
805 - (djm) Redhat spec enables KrbV by default
806 - (djm) Applied OpenSC smartcard updates from Markus &
807 Antti Tapaninen <aet@cc.hut.fi>
808 - (djm) Define BROKEN_REALPATH for AIX, patch from
809 Antti Tapaninen <aet@cc.hut.fi>
810 - (djm) Bug #214: Fix utmp for Irix (don't strip "tty"). Patch from
811 Kevin Taylor <no@nowhere.org> (??) via Philipp Grau
812 <phgrau@zedat.fu-berlin.de>
813 - (djm) Bug #213: Simplify CMSG_ALIGN macros to avoid symbol clashes.
814 Reported by Doug Manton <dmanton@emea.att.com>
815 - (djm) Bug #222: Fix tests for getaddrinfo on OSF/1. Spotted by
816 Robert Urban <urban@spielwiese.de>
817 - (djm) Bug #206 - blibpath isn't always needed for AIX ld, avoid
818 sizeof(long long int) == 4 breakage. Patch from Matthew Clarke
819 <Matthew_Clarke@mindlink.bc.ca>
820 - (djm) Make privsep work with PAM (still experimental)
821 - (djm) OpenBSD CVS Sync
822 - deraadt@cvs.openbsd.org 2002/04/20 09:02:03
824 No, afs requires explicit enabling
825 - markus@cvs.openbsd.org 2002/04/20 09:14:58
827 add buffer_{get,put}_short
828 - markus@cvs.openbsd.org 2002/04/20 09:17:19
830 rewrite using the buffer_* API, fixes overflow; ok deraadt@
831 - stevesk@cvs.openbsd.org 2002/04/21 16:19:27
833 document default AFSTokenPassing no; ok deraadt@
834 - stevesk@cvs.openbsd.org 2002/04/21 16:25:06
836 spelling in error message; ok markus@
837 - markus@cvs.openbsd.org 2002/04/22 06:15:47
839 fix check for overflow
840 - markus@cvs.openbsd.org 2002/04/22 16:16:53
841 [servconf.c sshd.8 sshd_config]
842 do not auto-enable KerberosAuthentication; ok djm@, provos@, deraadt@
843 - markus@cvs.openbsd.org 2002/04/22 21:04:52
844 [channels.c clientloop.c clientloop.h ssh.c]
845 request reply (success/failure) for -R style fwd in protocol v2,
846 depends on ordered replies.
847 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=215; ok provos@
850 - (tim) [entropy.c.] Portability fix for SCO Unix 3.2v4.x (SCO OSR 3.0).
851 entropy.c needs seteuid(getuid()) for the setuid(original_uid) to
852 succeed. Patch by gert@greenie.muc.de. This fixes one part of Bug 208
855 - (djm) Avoid SIGCHLD breakage when run from rsync. Fix from
856 Sturle Sunde <sturle.sunde@usit.uio.no>
859 - (djm) Tell users to configure /dev/random support into OpenSSL in
861 - (djm) Fix .Nm in mdoc2man.pl from pspencer@fields.utoronto.ca
862 - (tim) [configure.ac] Issue warning on --with-default-path=/some_path
863 if LOGIN_CAP is enabled. Report & testing by Tuc <tuc@ttsg.com>
866 - (djm) Unbreak "make install". Fix from Darren Tucker
868 - (stevesk) bsd-cygwin_util.[ch] BSD license from Corinna Vinschen
869 - (tim) [configure.ac] add tests for recvmsg and sendmsg.
870 [monitor_fdpass.c] add checks for HAVE_SENDMSG and HAVE_RECVMSG for
871 systems that HAVE_ACCRIGHTS_IN_MSGHDR but no recvmsg or sendmsg.
874 - (djm) ssh-rand-helper improvements
875 - Add commandline debugging options
876 - Don't write binary data if stdout is a tty (use hex instead)
878 - (djm) Random number collection doc fixes from Ben
881 - (djm) Add KrbV support patch from Simon Wilkinson <simon@sxw.org.uk>
884 - (stevesk) [auth-sia.[ch]] add BSD license from Chris Adams
885 - (tim) [configure.ac] add <sys/types.h> to msghdr tests. Change -L
886 to -h on testing for /bin being symbolic link
887 - (bal) Mistaken in Cygwin scripts for ssh starting. Patch by
888 Corinna Vinschen <vinschen@redhat.com>
889 - (bal) disable privsep if no MAP_ANON. We can re-enable it
890 after the release when we can do more testing.
893 - (stevesk) [auth-sia.c] cleanup
894 - (tim) [acconfig.h defines.h includes.h] put includes in includes.h and
895 defines in defines.h [rijndael.c openbsd-compat/fake-socket.h
896 openbsd-compat/inet_aton.c] include "includes.h" instead of "config.h"
900 - (stevesk) [configure.ac monitor.c] HAVE_SOCKETPAIR
901 - (stevesk) [auth-sia.c] compile fix Chris Adams <cmadams@hiwaay.net>
902 - (bal) OpenBSD CVS Sync
903 - markus@cvs.openbsd.org 2002/04/10 08:21:47
904 [auth1.c compat.c compat.h]
905 strip '@' from username only for KerbV and known broken clients,
907 - markus@cvs.openbsd.org 2002/04/10 08:56:01
910 - Added p1 to idenify Portable release version.
913 - (bal) Minor OpenSC updates. Fix up header locations and update
914 README.smartcard provided by Juha Yrjölä <jyrjola@cc.hut.fi>
917 - (stevesk) HAVE_CONTROL_IN_MSGHDR; not used right now.
918 Future: we may want to test if fd passing works correctly.
919 - (stevesk) [monitor_fdpass.c] fatal() for UsePrivilegeSeparation=yes
920 and no fd passing support.
921 - (stevesk) HAVE_MMAP and HAVE_SYS_MMAN_H and use them in
923 - (stevesk) remove configure support for poll.h; it was removed
924 from sshd.c a long time ago.
925 - (stevesk) --with-privsep-user; default sshd
926 - (stevesk) wrap munmap() with HAVE_MMAP also.
929 - (djm) Typo in Suse SPEC file. Fix from Carsten Grohmann
930 <carsten.grohmann@dr-baldeweg.de>
931 - (bal) Added MAP_FAILED to allow AIX and Trusted HP to compile.
932 - (bal) OpenBSD CVS Sync
933 - djm@cvs.openbsd.org 2002/04/06 00:30:08
935 Fix occasional corruption on upload due to bad reuse of request
936 id, spotted by chombier@mac.com; ok markus@
937 - mouring@cvs.openbsd.org 2002/04/06 18:24:09
939 Fixes potental double // within path.
940 http://bugzilla.mindrot.org/show_bug.cgi?id=76
941 - (bal) Slight update to OpenSC support. Better version checking. patch
942 by Juha Yrjölä <jyrjola@cc.hut.fi>
943 - (bal) Revered out of runtime IRIX detection of joblimits. Code is
945 - (bal) Quiet down configure.ac if /bin/test does not exist.
946 - (bal) We no longer use atexit()/xatexit()/on_exit()
949 - (bal) Patch for OpenSC SmartCard library; ok markus@; patch by
950 Juha Yrjölä <jyrjola@cc.hut.fi>
951 - (bal) Minor documentation update to reflect smartcard library
953 - (bal) Too many <sys/queue.h> issues. Remove all workarounds and
954 using internal version only.
955 - (bal) OpenBSD CVS Sync
956 - stevesk@cvs.openbsd.org 2002/04/05 20:56:21
958 clarify sshrc some and handle X11UseLocalhost=yes; ok markus@
961 - (stevesk) [auth-pam.c auth-pam.h auth-passwd.c auth-sia.c auth-sia.h
962 auth1.c auth2.c] PAM, OSF_SIA password auth cleanup; from djm.
963 - (bal) OpenBSD CVS Sync
964 - markus@cvs.openbsd.org 2002/04/03 09:26:11
965 [cipher.c myproposal.h]
966 re-add rijndael-cbc@lysator.liu.se for MacSSH; ash@lab.poc.net
969 - (bal) Hand Sync of scp.c (reverted to upstream code)
970 - deraadt@cvs.openbsd.org 2002/03/30 17:45:46
973 - (bal) CVS ID sync of uidswap.c
974 - (bal) OpenBSD CVS Sync (now for the real sync)
975 - markus@cvs.openbsd.org 2002/03/27 22:21:45
977 try to import keys with extra trailing === (seen with ssh.com <
979 - markus@cvs.openbsd.org 2002/03/28 15:34:51
981 do not call record_login twice (for use_privsep)
982 - markus@cvs.openbsd.org 2002/03/29 18:59:32
983 [session.c session.h]
984 retrieve last login time before the pty is allocated, store per
986 - stevesk@cvs.openbsd.org 2002/03/29 19:16:22
988 RSA key modulus size minimum 768; ok markus@
989 - stevesk@cvs.openbsd.org 2002/03/29 19:18:33
990 [auth-rsa.c ssh-rsa.c ssh.h]
991 make RSA modulus minimum #define; ok markus@
992 - markus@cvs.openbsd.org 2002/03/30 18:51:15
993 [monitor.c serverloop.c sftp-int.c sftp.c sshd.c]
994 check waitpid for EINTR; based on patch from peter@ifm.liu.se
995 - markus@cvs.openbsd.org 2002/04/01 22:02:16
997 20480 is an upper limit for older server
998 - markus@cvs.openbsd.org 2002/04/01 22:07:17
1000 fallback to stat if server does not support lstat
1001 - markus@cvs.openbsd.org 2002/04/02 11:49:39
1003 check $SHELL for -k and -d, too;
1004 http://bugzilla.mindrot.org/show_bug.cgi?id=199
1005 - markus@cvs.openbsd.org 2002/04/02 17:37:48
1007 always call log_init()
1008 - markus@cvs.openbsd.org 2002/04/02 20:11:38
1010 ignore SSH_BUG_SIGBLOB for ssh-rsa; #187
1011 - (bal) mispelling in uidswap.c (portable only)
1014 - (stevesk) [monitor.c] PAM should work again; will *not* work with
1015 UsePrivilegeSeparation=yes.
1016 - (stevesk) [auth1.c] fix password auth for protocol 1 when
1017 !USE_PAM && !HAVE_OSF_SIA; merge issue.
1020 - (tim) [configure.ac] use /bin/test -L to work around broken builtin on
1022 - (tim) [sshconnect2.c] change uint32_t to u_int32_t
1025 - (stevesk) [configure.ac] remove header check for sys/ttcompat.h
1029 - (bal) 'pw' should be 'authctxt->pw' in auth1.c spotted by
1031 - (bal) OpenBSD CVS Sync
1032 - markus@cvs.openbsd.org 2002/03/26 11:34:49
1034 update to recent drafts
1035 - markus@cvs.openbsd.org 2002/03/26 11:37:05
1038 - markus@cvs.openbsd.org 2002/03/26 15:23:40
1040 do not talk about packets in bufaux
1041 - rees@cvs.openbsd.org 2002/03/26 18:46:59
1043 try_AUT0 in read_pubkey too, for those paranoid few who want to
1045 - markus@cvs.openbsd.org 2002/03/26 22:50:39
1047 CHANNEL_EFD_OUTPUT_ACTIVE is false for CHAN_CLOSE_RCVD, too
1048 - markus@cvs.openbsd.org 2002/03/26 23:13:03
1050 disallow RSA keys < 768 for protocol 1, too (rhosts-rsa and rsa auth)
1051 - markus@cvs.openbsd.org 2002/03/26 23:14:51
1053 generate a new cookie for each SSH2_MSG_KEXINIT message we send out
1054 - mouring@cvs.openbsd.org 2002/03/27 11:45:42
1056 monitor_allowed_key() returns int instead of pointer. ok markus@
1059 - (stevesk) import OpenBSD <sys/tree.h> as "openbsd-compat/tree.h"
1060 - (bal) OpenBSD CVS Sync
1061 - stevesk@cvs.openbsd.org 2002/03/23 20:57:26
1063 setproctitle() after preauth child; ok markus@
1064 - markus@cvs.openbsd.org 2002/03/24 16:00:27
1067 - markus@cvs.openbsd.org 2002/03/24 16:01:13
1069 debug->debug3 for extra padding
1070 - stevesk@cvs.openbsd.org 2002/03/24 17:27:03
1073 - stevesk@cvs.openbsd.org 2002/03/24 17:53:16
1075 minor cleanup and more error checking; ok markus@
1076 - markus@cvs.openbsd.org 2002/03/24 18:05:29
1078 we need to figure out AUT0 for sc_private_encrypt, too
1079 - stevesk@cvs.openbsd.org 2002/03/24 23:20:00
1081 remove "\n" from fatal()
1082 - markus@cvs.openbsd.org 2002/03/25 09:21:13
1084 return 0 (not NULL); tomh@po.crl.go.jp
1085 - markus@cvs.openbsd.org 2002/03/25 09:25:06
1088 - markus@cvs.openbsd.org 2002/03/25 17:34:27
1089 [scard.c scard.h ssh-agent.c ssh-keygen.c ssh.c]
1090 change sc_get_key to sc_get_keys and hide smartcard details in scard.c
1091 - stevesk@cvs.openbsd.org 2002/03/25 20:12:10
1092 [monitor_mm.c monitor_wrap.c]
1093 ssize_t args use "%ld" and cast to (long)
1094 size_t args use "%lu" and cast to (u_long)
1095 ok markus@ and thanks millert@
1096 - markus@cvs.openbsd.org 2002/03/25 21:04:02
1098 simplify num_identity_files handling
1099 - markus@cvs.openbsd.org 2002/03/25 21:13:51
1100 [channels.c channels.h compat.c compat.h nchan.c]
1101 don't send stderr data after EOF, accept this from older known
1102 (broken) sshd servers only, fixes
1103 http://bugzilla.mindrot.org/show_bug.cgi?id=179
1104 - stevesk@cvs.openbsd.org 2002/03/26 03:24:01
1105 [monitor.h monitor_fdpass.h monitor_mm.h monitor_wrap.h]
1109 - (stevesk) [session.c] disable LOGIN_NEEDS_TERM until we are sure
1110 it can be removed. only used on solaris. will no longer compile with
1114 - (stevesk) HAVE_ACCRIGHTS_IN_MSGHDR configure support
1115 - (stevesk) [monitor.c monitor_wrap.c] #ifdef HAVE_PW_CLASS_IN_PASSWD
1116 - (stevesk) configure and cpp __FUNCTION__ gymnastics to handle nielsisms
1117 - (stevesk) [monitor_fdpass.c] support for access rights style file
1119 - (stevesk) [auth2.c] merge cleanup/sync
1120 - (stevesk) [defines.h] hp-ux 11 has ancillary data style fd passing, but
1121 is missing CMSG_LEN() and CMSG_SPACE() macros.
1122 - (stevesk) [defines.h] #define MAP_ANON MAP_ANONYMOUS for HP-UX; other
1123 platforms may need this--I'm not sure. mmap() issues will need to be
1125 - (tim) [cipher.c] fix problem with OpenBSD sync
1126 - (stevesk) [LICENCE] OpenBSD sync
1129 - (bal) OpenBSD CVS Sync
1130 - itojun@cvs.openbsd.org 2002/03/08 06:10:16
1132 printf type mismatch
1133 - itojun@cvs.openbsd.org 2002/03/11 03:18:49
1135 correct type mismatches (u_int64_t != unsigned long long)
1136 - itojun@cvs.openbsd.org 2002/03/11 03:19:53
1139 - markus@cvs.openbsd.org 2002/03/14 15:24:27
1141 don't trust size sent by (rogue) server; noted by
1142 s.esser@e-matters.de
1143 - markus@cvs.openbsd.org 2002/03/14 16:38:26
1145 split out ssh1 session key decryption; ok provos@
1146 - markus@cvs.openbsd.org 2002/03/14 16:56:33
1147 [auth-rh-rsa.c auth-rsa.c auth.h]
1148 split auth_rsa() for better readability and privsep; ok provos@
1149 - itojun@cvs.openbsd.org 2002/03/15 11:00:38
1151 fix file type checking (use S_ISREG). ok by markus
1152 - markus@cvs.openbsd.org 2002/03/16 11:24:53
1154 skip inflateEnd if inflate fails; ok provos@
1155 - markus@cvs.openbsd.org 2002/03/16 17:22:09
1156 [auth-rh-rsa.c auth.h]
1157 split auth_rhosts_rsa(), ok provos@
1158 - stevesk@cvs.openbsd.org 2002/03/16 17:41:25
1160 BSD license. from Daniel Kouril via Dug Song. ok markus@
1161 - provos@cvs.openbsd.org 2002/03/17 20:25:56
1162 [auth.c auth.h auth1.c auth2.c]
1163 getpwnamallow returns struct passwd * only if user valid;
1165 - provos@cvs.openbsd.org 2002/03/18 01:12:14
1166 [auth.h auth1.c auth2.c sshd.c]
1167 have the authentication functions return the authentication context
1168 and then do_authenticated; okay millert@
1169 - dugsong@cvs.openbsd.org 2002/03/18 01:30:10
1171 set client to NULL after xfree(), from Rolf Braun
1172 <rbraun+ssh@andrew.cmu.edu>
1173 - provos@cvs.openbsd.org 2002/03/18 03:41:08
1175 move auth_approval into getpwnamallow with help from millert@
1176 - markus@cvs.openbsd.org 2002/03/18 17:13:15
1178 export/import cipher states; needed by ssh-privsep
1179 - markus@cvs.openbsd.org 2002/03/18 17:16:38
1181 export/import cipher state, iv and ssh2 seqnr; needed by ssh-privsep
1182 - markus@cvs.openbsd.org 2002/03/18 17:23:31
1184 add key_demote() for ssh-privsep
1185 - provos@cvs.openbsd.org 2002/03/18 17:25:29
1187 buffer_skip_string and extra sanity checking; needed by ssh-privsep
1188 - provos@cvs.openbsd.org 2002/03/18 17:31:54
1190 export compression streams for ssh-privsep
1191 - provos@cvs.openbsd.org 2002/03/18 17:50:31
1192 [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c]
1193 [auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c]
1194 [kexgex.c servconf.c]
1195 [session.h servconf.h serverloop.c session.c sshd.c]
1196 integrate privilege separated openssh; its turned off by default
1197 for now. work done by me and markus@
1198 - provos@cvs.openbsd.org 2002/03/18 17:53:08
1201 - provos@cvs.openbsd.org 2002/03/18 17:59:09
1203 document UsePrivilegeSeparation
1204 - stevesk@cvs.openbsd.org 2002/03/18 23:52:51
1206 UnprivUser/UnprivGroup usable now--specify numeric user/group; ok
1208 - stevesk@cvs.openbsd.org 2002/03/19 03:03:43
1209 [pathnames.h servconf.c servconf.h sshd.c]
1210 _PATH_PRIVSEP_CHROOT_DIR; ok provos@
1211 - stevesk@cvs.openbsd.org 2002/03/19 05:23:08
1213 Banner has no default.
1214 - mpech@cvs.openbsd.org 2002/03/19 06:32:56
1216 use xfree() after xstrdup().
1219 - markus@cvs.openbsd.org 2002/03/19 10:35:39
1220 [auth-options.c auth.h session.c session.h sshd.c]
1222 - markus@cvs.openbsd.org 2002/03/19 10:49:35
1223 [auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h]
1224 [packet.c session.c sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c]
1225 [sshconnect2.c sshd.c ttymodes.c]
1227 - markus@cvs.openbsd.org 2002/03/19 14:27:39
1228 [auth.c auth1.c auth2.c]
1229 make getpwnamallow() allways call pwcopy()
1230 - markus@cvs.openbsd.org 2002/03/19 15:31:47
1232 check for NULL; from provos@
1233 - stevesk@cvs.openbsd.org 2002/03/20 19:12:25
1234 [servconf.c servconf.h ssh.h sshd.c]
1235 for unprivileged user, group do:
1236 pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@
1237 - stevesk@cvs.openbsd.org 2002/03/20 21:08:08
1239 strerror() on chdir() fail; ok provos@
1240 - markus@cvs.openbsd.org 2002/03/21 10:21:20
1242 ignore errors for nonexisting default keys in ssh-add,
1243 fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158
1244 - jakob@cvs.openbsd.org 2002/03/21 15:17:26
1245 [clientloop.c ssh.1]
1246 add built-in command line for adding new port forwardings on the fly.
1247 based on a patch from brian wellington. ok markus@.
1248 - markus@cvs.openbsd.org 2002/03/21 16:38:06
1250 make compile w/ openssl 0.9.7
1251 - markus@cvs.openbsd.org 2002/03/21 16:54:53
1252 [scard.c scard.h ssh-keygen.c]
1253 move key upload to scard.[ch]
1254 - markus@cvs.openbsd.org 2002/03/21 16:57:15
1257 - markus@cvs.openbsd.org 2002/03/21 16:58:13
1260 - rees@cvs.openbsd.org 2002/03/21 18:08:15
1262 In sc_put_key(), sc_reader_id should be id.
1263 - markus@cvs.openbsd.org 2002/03/21 20:51:12
1266 - markus@cvs.openbsd.org 2002/03/21 21:23:34
1268 add privsep_preauth() and remove 1 goto; ok provos@
1269 - rees@cvs.openbsd.org 2002/03/21 21:54:34
1270 [scard.c scard.h ssh-keygen.c]
1271 Add PIN-protection for secret key.
1272 - rees@cvs.openbsd.org 2002/03/21 22:44:05
1273 [authfd.c authfd.h ssh-add.c ssh-agent.c ssh.c]
1274 Add PIN-protection for secret key.
1275 - markus@cvs.openbsd.org 2002/03/21 23:07:37
1277 remove unused, sync w/ cmdline patch in my tree.
1280 - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is
1281 wanted, warn if directory does not exist. Put system directories in
1282 front of PATH for finding entorpy commands.
1283 - (tim) [contrib/aix/buildbff.sh contrib/aix/inventory.sh] AIX package
1284 build fixes. Patch by Darren Tucker <dtucker@zip.com.au>
1285 [contrib/solaris/buildpkg.sh] add missing dirs to SYSTEM_DIR. Have
1286 postinstall check for $piddir and add if necessary.
1289 - (tim) [contrib/solaris/buildpkg.sh, contrib/solaris/README] Updated to
1290 build on all platforms that support SVR4 style package tools. Now runs
1291 from build dir. Parts are based on patches from Antonio Navarro, and
1295 - (djm) Revert bits of Markus' OpenSSL compat patch which was
1296 accidentally committed.
1297 - (djm) Add Markus' patch for compat wih OpenSSL < 0.9.6.
1298 Known issue: Blowfish for SSH1 does not work
1299 - (stevesk) entropy.c: typo in debug message
1300 - (djm) ssh-keygen -i needs seeded RNG; report from markus@