2 - (djm) OpenBSD CVS Sync
3 - markus@cvs.openbsd.org 2003/06/12 07:57:38
4 [monitor.c sshlogin.c sshpty.c]
5 typos; dtucker at zip.com.au
6 - djm@cvs.openbsd.org 2003/06/12 12:22:47
8 mention more copyright holders; ok markus@
9 - nino@cvs.openbsd.org 2003/06/12 15:34:09
12 - markus@cvs.openbsd.org 2003/06/12 19:12:03
13 [scard.c scard.h ssh-agent.c ssh.c]
14 add sc_get_key_label; larsch at trustcenter.de; bugzilla#591
15 - markus@cvs.openbsd.org 2003/06/16 08:22:35
17 make sure the signature has at least the expected length (don't
18 insist on len == hlen + oidlen, since this breaks some smartcards)
19 bugzilla #592; ok djm@
20 - markus@cvs.openbsd.org 2003/06/16 10:22:45
22 print out key comment on each prompt; make ssh-askpass more useable; ok djm@
23 - markus@cvs.openbsd.org 2003/06/17 18:14:23
25 use license from /usr/share/misc/license.template for new code
28 - (djm) Update license on fake-rfc2553.[ch]; ok itojun@
31 - (djm) Mention portable copyright holders in LICENSE
32 - (djm) Put licenses on substantial header files
33 - (djm) Sync LICENSE against OpenBSD
34 - (djm) OpenBSD CVS Sync
35 - jmc@cvs.openbsd.org 2003/06/10 09:12:11
36 [scp.1 sftp-server.8 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5]
37 [sshd.8 sshd_config.5 ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
41 - kill whitespace at EOL
42 - new sentence, new line
44 - deraadt@cvs.openbsd.org 2003/06/10 22:20:52
45 [packet.c progressmeter.c]
46 mostly ansi cleanup; pval ok
47 - jakob@cvs.openbsd.org 2003/06/11 10:16:16
49 clean up check_host_key() and improve SSHFP feedback. ok markus@
50 - jakob@cvs.openbsd.org 2003/06/11 10:18:47
52 sync with check_host_key() change
53 - djm@cvs.openbsd.org 2003/06/11 11:18:38
54 [authfd.c authfd.h ssh-add.c ssh-agent.c]
55 make agent constraints (lifetime, confirm) work with smartcard keys;
60 - (djm) Sync README.smartcard with OpenBSD -current
61 - (djm) Re-merge OpenSC info into README.smartcard
64 - (dtucker) [uidswap.c] Fix setreuid and add missing args to fatal(). ok djm@
67 - (djm) Support AI_NUMERICHOST in fake-getaddrinfo.c. Needed for recent
69 - (djm) Implement paranoid priv dropping checks, based on:
70 "SetUID demystified" - Hao Chen, David Wagner and Drew Dean
71 Proceedings of USENIX Security Symposium 2002
72 - (djm) Don't use xmalloc() or pull in toplevel headers in fake-* code
73 - (djm) Merge all the openbsd/fake-* into fake-rfc2553.[ch]
74 - (djm) Bug #588 - Add scard-opensc.o back to Makefile.in
75 Patch from larsch@trustcenter.de
76 - (djm) Bug #589 - scard-opensc: load only keys with a private keys
77 Patch from larsch@trustcenter.de
78 - (dtucker) Add includes.h to fake-rfc2553.c so it will build.
79 - (dtucker) Define EAI_NONAME in fake-rfc2553.h (used by fake-rfc2553.c).
82 - (djm) Bug #573 - Remove unneeded Krb headers and compat goop. Patch from
83 simon@sxw.org.uk (Also matches a change in OpenBSD a while ago)
84 - (djm) Bug #577 - wrong flag in scard-opensc.c sc_private_decrypt.
85 Patch from larsch@trustcenter.de; ok markus@
86 - (djm) Bug #584: scard-opensc.c doesn't work without PIN. Patch from
87 larsch@trustcenter.de; ok markus@
88 - (djm) OpenBSD CVS Sync
89 - djm@cvs.openbsd.org 2003/06/04 08:25:18
91 disable challenge/response and keyboard-interactive auth methods
92 upon hostkey mismatch. based on patch from fcusack AT fcusack.com.
94 - djm@cvs.openbsd.org 2003/06/04 10:23:48
96 remove duplicated group-dropping code; ok markus@
97 - djm@cvs.openbsd.org 2003/06/04 12:03:59
99 remove bitrotten commet; ok markus@
100 - djm@cvs.openbsd.org 2003/06/04 12:18:49
103 - djm@cvs.openbsd.org 2003/06/04 12:40:39
105 kill ssh process upon receipt of signal, bz #241.
106 based on patch from esb AT hawaii.edu; ok markus@
107 - djm@cvs.openbsd.org 2003/06/04 12:41:22
109 kill ssh process on receipt of signal; ok markus@
110 - (djm) Update to fix of bug #584: lock card before return.
111 From larsch@trustcenter.de
112 - (djm) Always use mysignal() for SIGALRM
115 - (djm) Replace setproctitle replacement with code derived from
117 - (djm) OpenBSD CVS Sync
118 - markus@cvs.openbsd.org 2003/06/02 09:17:34
119 [auth2-hostbased.c auth.c auth-options.c auth-rhosts.c auth-rh-rsa.c]
120 [canohost.c monitor.c servconf.c servconf.h session.c sshd_config]
122 deprecate VerifyReverseMapping since it's dangerous if combined
123 with IP based access control as noted by Mike Harding; replace with
124 a UseDNS option, UseDNS is on by default and includes the
125 VerifyReverseMapping check; with itojun@, provos@, jakob@ and deraadt@
127 - millert@cvs.openbsd.org 2003/06/03 02:56:16
129 Remove the advertising clause in the UCB license which Berkeley
130 rescinded 22 July 1999. Proofed by myself and Theo.
131 - (djm) Fix portable-specific uses of verify_reverse_mapping too
132 - (djm) Sync openbsd-compat with OpenBSD CVS.
133 - No more 4-term BSD licenses in linked code
134 - (dtucker) [port-aix.c bsd-cray.c] Fix uses of verify_reverse_mapping.
137 - (djm) Fix segv from bad reordering in auth-pam.c
138 - (djm) Always use saved_argv in sshd.c as compat_init_setproctitle may
140 - (tim) openbsd-compat/xmmap.[ch] License clarifications. Add missing
142 - (djm) Remove "noip6" option from RedHat spec file. This may now be
143 set at runtime using AddressFamily option.
144 - (djm) Fix use of macro before #define in cipher-aes.c
145 - (djm) Sync license on openbsd-compat/bindresvport.c with OpenBSD CVS
146 - (djm) OpenBSD CVS Sync
147 - djm@cvs.openbsd.org 2003/05/26 12:54:40
149 fix format strings; ok markus@
150 - deraadt@cvs.openbsd.org 2003/05/29 16:58:45
152 seteuid and setegid; markus ok
153 - jakob@cvs.openbsd.org 2003/06/02 08:31:10
155 VerifyHostKeyDNS is v2 only. ok markus@
158 - (dtucker) Add missing semicolon in md5crypt.c, patch from openssh at
160 - (dtucker) Define SSHD_ACQUIRES_CTTY for NCR MP-RAS and Reliant Unix.
163 - (djm) Avoid auth2-chall.c warning when compiling without
164 PAM, BSD_AUTH and SKEY
167 - (djm) OpenBSD CVS Sync
168 - djm@cvs.openbsd.org 2003/05/24 09:02:22
170 pass logged data through strnvis; ok markus
171 - djm@cvs.openbsd.org 2003/05/24 09:30:40
172 [authfile.c monitor.c sftp-common.c sshpty.c]
173 cast some types for printing; ok markus@
176 - (dtucker) Correct --osfsia in INSTALL. Patch by skeleten at shillest.net
179 - (djm) Use VIS_SAFE on logged strings rather than default strnvis
180 encoding (which encodes many more characters)
182 - jmc@cvs.openbsd.org 2003/05/20 12:03:35
184 - new sentence, new line
188 - jmc@cvs.openbsd.org 2003/05/20 12:09:31
189 [ssh.1 ssh_config.5 sshd.8 sshd_config.5 ssh-keygen.1]
190 new sentence, new line
191 - djm@cvs.openbsd.org 2003/05/23 08:29:30
196 - (djm) OpenBSD CVS Sync
197 - deraadt@cvs.openbsd.org 2003/05/18 23:22:01
199 use syslog_r() in a signal handler called place; markus ok
200 - (djm) Configure logic to detect syslog_r and friends
203 - (djm) Sync auth-pam.h with what we actually implement
206 - (djm) Return of the dreaded PAM_TTY_KLUDGE, which went missing in
208 - (djm) OpenBSD CVS Sync
209 - djm@cvs.openbsd.org 2003/05/16 03:27:12
210 [readconf.c ssh_config ssh_config.5 ssh-keysign.c]
211 add AddressFamily option to ssh_config (like -4, -6 on commandline).
212 Portable bug #534; ok markus@
213 - itojun@cvs.openbsd.org 2003/05/17 03:25:58
215 just in case, put numbers to sscanf %s arg.
216 - markus@cvs.openbsd.org 2003/05/17 04:27:52
217 [cipher.c cipher-ctr.c myproposal.h]
218 experimental support for aes-ctr modes from
219 http://www.ietf.org/internet-drafts/draft-ietf-secsh-newmodes-00.txt
221 - (djm) Remove IPv4 by default hack now that we can specify AF in config
222 - (djm) Tidy and trim TODO
223 - (djm) Sync openbsd-compat/ with OpenBSD CVS head
224 - (djm) Big KNF on openbsd-compat/
225 - (djm) KNF on md5crypt.[ch]
226 - (djm) KNF on auth-sia.[ch]
229 - (bal) strcat -> strlcat on openbsd-compat/realpath.c (rev 1.8 OpenBSD)
232 - (djm) OpenBSD CVS Sync
233 - djm@cvs.openbsd.org 2003/05/15 13:52:10
235 Make "ssh -V" print the OpenSSL version in a human readable form. Patch
236 from Craig Leres (mindrot at ee.lbl.gov); ok markus@
237 - jakob@cvs.openbsd.org 2003/05/15 14:02:47
238 [readconf.c servconf.c]
239 warn for unsupported config option. ok markus@
240 - markus@cvs.openbsd.org 2003/05/15 14:09:21
242 fix 64bit issue; report itojun@
243 - djm@cvs.openbsd.org 2003/05/15 14:55:25
244 [readconf.c readconf.h ssh_config ssh_config.5 sshconnect.c]
245 add a ConnectTimeout option to ssh, based on patch from
246 Jean-Charles Longuet (jclonguet at free.fr); portable #207 ok markus@
247 - (djm) Add warning for UsePAM when built without PAM support
248 - (djm) A few type mismatch fixes from Bug #565
249 - (djm) Guard free_pam_environment against NULL argument. Works around
250 HP/UX PAM problems debugged by dtucker
253 - (djm) OpenBSD CVS Sync
254 - jmc@cvs.openbsd.org 2003/05/14 13:11:56
258 - jakob@cvs.openbsd.org 2003/05/14 18:16:20
259 [key.c key.h readconf.c readconf.h ssh_config.5 sshconnect.c]
260 [dns.c dns.h README.dns ssh-keygen.1 ssh-keygen.c]
261 add experimental support for verifying hos keys using DNS as described
262 in draft-ietf-secsh-dns-xx.txt. more information in README.dns.
263 ok markus@ and henning@
264 - markus@cvs.openbsd.org 2003/05/14 22:24:42
265 [clientloop.c session.c ssh.1]
266 allow to send a BREAK to the remote system; ok various
267 - markus@cvs.openbsd.org 2003/05/15 00:28:28
269 cleanup unregister of per-method packet handlers; ok djm@
270 - jakob@cvs.openbsd.org 2003/05/15 01:48:10
271 [readconf.c readconf.h servconf.c servconf.h]
272 always parse kerberos options. ok djm@ markus@
273 - jakob@cvs.openbsd.org 2003/05/15 02:27:15
275 add missing freerrset
276 - markus@cvs.openbsd.org 2003/05/15 03:08:29
277 [cipher.c cipher-bf1.c cipher-aes.c cipher-3des1.c]
278 split out custom EVP ciphers
279 - djm@cvs.openbsd.org 2003/05/15 03:10:52
281 avoid warning; ok jakob@
282 - mouring@cvs.openbsd.org 2003/05/15 03:39:07
284 Make put/get (globed and nonglobed) code more consistant. OK djm@
285 - mouring@cvs.openbsd.org 2003/05/15 03:43:59
287 Teach ls how to display multiple column display and allow users
288 to return to single column format via 'ls -1'. OK @djm
289 - jakob@cvs.openbsd.org 2003/05/15 04:08:44
290 [readconf.c servconf.c]
291 disable kerberos when not supported. ok markus@
292 - markus@cvs.openbsd.org 2003/05/15 04:08:41
295 - (djm) Always parse UsePAM
296 - (djm) Configure glue for DNS support (code doesn't work in portable yet)
297 - (djm) Import getrrsetbyname() function from OpenBSD libc (for DNS support)
298 - (djm) Tidy Makefile clean targets
299 - (djm) Adapt README.dns for portable
300 - (djm) Avoid uuencode.c warnings
301 - (djm) Enable UsePAM when built --with-pam
302 - (djm) Only build getrrsetbyname replacement when using --with-dns
303 - (djm) Bug #529: sshd doesn't work correctly after SIGHUP (copy argv
305 - (djm) Bug #444: Wrong paths after reconfigure
306 - (dtucker) HP-UX needs to include <sys/strtio.h> for TIOCSBRK
309 - (djm) Bug #117: Don't lie to PAM about username
310 - (djm) RCSID sync w/ OpenBSD
311 - (djm) OpenBSD CVS Sync
312 - djm@cvs.openbsd.org 2003/04/09 12:00:37
314 strip trailing whitespace from config lines before parsing.
315 Fixes bz 528; ok markus@
316 - markus@cvs.openbsd.org 2003/04/12 10:13:57
318 hide cipher details; ok djm@
319 - markus@cvs.openbsd.org 2003/04/12 10:15:36
322 - naddy@cvs.openbsd.org 2003/04/12 11:40:15
324 document -V switch, fix wording; ok markus@
325 - markus@cvs.openbsd.org 2003/04/14 14:17:50
326 [channels.c sshconnect.c sshd.c ssh-keyscan.c]
327 avoid hardcoded SOCK_xx; with itojun@; should allow ssh over SCTP
328 - mouring@cvs.openbsd.org 2003/04/14 21:31:27
330 Missing globfree(&g) in process_put() spotted by Vince Brimhall
331 <VBrimhall@novell.com>. ok@ Theo
332 - markus@cvs.openbsd.org 2003/04/16 14:35:27
334 document struct Authctxt; with solar
335 - deraadt@cvs.openbsd.org 2003/04/26 04:29:49
337 -t in usage(); rogier@quaak.org
338 - mouring@cvs.openbsd.org 2003/04/30 01:16:20
339 [sshd.8 sshd_config.5]
340 Escape ?, * and ! in .Ql for nroff compatibility. OpenSSH Portable
341 Bug #550 and * escaping suggested by jmc@.
342 - david@cvs.openbsd.org 2003/04/30 20:41:07
344 fix invalid .Pf macro usage introduced in previous commit
346 - markus@cvs.openbsd.org 2003/05/11 16:56:48
347 [authfile.c ssh-keygen.c]
348 change key_load_public to try to read a public from:
349 rsa1 private or rsa1 public and ssh2 keys.
350 this makes ssh-keygen -e fail for ssh1 keys more gracefully
351 for example; report from itojun (netbsd pr 20550).
352 - markus@cvs.openbsd.org 2003/05/11 20:30:25
353 [channels.c clientloop.c serverloop.c session.c ssh.c]
354 make channel_new() strdup the 'remote_name' (not the caller); ok theo
355 - markus@cvs.openbsd.org 2003/05/12 16:55:37
357 for pubkey authentication try the user keys in the following order:
358 1. agent keys that are found in the config file
360 3. keys that are only listed in the config file
361 this helps when an agent has many keys, where the server might
362 close the connection before the correct key is used. report & ok pb@
363 - markus@cvs.openbsd.org 2003/05/12 18:35:18
365 typo: DSA keys are of type ssh-dss; Brian Poole
366 - markus@cvs.openbsd.org 2003/05/14 00:52:59
368 ranges for per auth method messages
369 - djm@cvs.openbsd.org 2003/05/14 01:00:44
371 emphasise the batchmode functionality and make reference to pubkey auth,
372 both of which are FAQs; ok markus@
373 - markus@cvs.openbsd.org 2003/05/14 02:15:47
374 [auth2.c monitor.c sshconnect2.c auth2-krb5.c]
375 implement kerberos over ssh2 ("kerberos-2@ssh.com"); tested with jakob@
376 server interops with commercial client; ok jakob@ djm@
377 - jmc@cvs.openbsd.org 2003/05/14 08:25:39
379 - better formatting in SYNOPSIS
382 - markus@cvs.openbsd.org 2003/05/14 08:57:49
384 http://bugzilla.mindrot.org/show_bug.cgi?id=560
385 Privsep child continues to run after monitor killed.
386 Pass monitor signals through to child; Darren Tucker
387 - (djm) Make portable build with MIT krb5 (some issues remain)
388 - (djm) Add new UsePAM configuration directive to allow runtime control
389 over usage of PAM. This allows non-root use of sshd when built with
391 - (djm) Die screaming if start_pam() is called when UsePAM=no
392 - (djm) Avoid KrbV leak for MIT Kerberos
393 - (dtucker) Set ai_socktype and ai_protocol in fake-getaddrinfo.c. ok djm@
394 - (djm) Bug #258: sscanf("[0-9]") -> sscanf("[0123456789]") for portability
397 - (djm) Redhat spec: Don't install profile.d scripts when not
398 building with GNOME/GTK askpass (patch from bet@rahul.net)
401 - (dtucker) Bug #318: Create ssh_prng_cmds.out during "make" rather than
402 "make install". Patch by roth@feep.net.
403 - (dtucker) Bug #536: Test for and work around openpty/controlling tty
404 problem on Linux (fixes "could not set controlling tty" errors).
405 - (djm) Merge FreeBSD PAM code: replaces PAM password auth kludge with
406 proper challenge-response module
407 - (djm) 2-clause license on loginrec.c, with permission from
411 - (dtucker) Bug #497: Move #include of bsd-cygwin_util.h to openbsd-compat.h.
412 Patch from vinschen@redhat.com.
415 - (dtucker) Add missing "void" to record_failed_login in bsd-cray.c. Noted
419 - (dtucker) Bug #544: ignore invalid cmsg_type on Linux 2.0 kernels,
420 privsep should now work.
421 - (dtucker) Move handling of bad password authentications into a platform
422 specific record_failed_login() function (affects AIX & Unicos). ok mouring@
425 - (djm) Add back radix.o (used by AFS support), after it went missing from
426 Makefile many moons ago
427 - (djm) Apply "owl-always-auth" patch from Openwall/Solar Designer
428 - (djm) Fix blibpath specification for AIX/gcc
429 - (djm) Some systems have basename in -lgen. Fix from ayamura@ayamura.org
432 - (bal) [defines.h progressmeter.c scp.c] Some more culling of non 64bit
436 - (bal) Bug #541: return; was dropped by mistake. Reported by
438 - (bal) Since we don't support platforms lacking u_int_64. We may
439 as well clean out some of those evil #ifdefs
440 - (bal) auth1.c minor resync while looking at the code.
441 - (bal) auth2.c same changed as above.
444 - (djm) Bug #539: Specify creation mode with O_CREAT for lastlog. Report
445 from matth@eecs.berkeley.edu
446 - (djm) Make the spec work with Redhat 9.0 (which renames sharutils)
447 - (djm) OpenBSD CVS Sync
448 - markus@cvs.openbsd.org 2003/04/02 09:48:07
449 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
450 [readconf.h serverloop.c sshconnect2.c]
451 reapply rekeying chage, tested by henning@, ok djm@
452 - markus@cvs.openbsd.org 2003/04/02 14:36:26
454 potential segfault if KEY_UNSPEC; cjwatson@debian.org; bug #526
455 - itojun@cvs.openbsd.org 2003/04/03 07:25:27
458 - itojun@cvs.openbsd.org 2003/04/03 10:17:35
460 remove $OpenBSD$, as other *.c does not have it.
461 - markus@cvs.openbsd.org 2003/04/07 08:29:57
463 typo: get correct counters; introduced during rekeying change.
464 - millert@cvs.openbsd.org 2003/04/07 21:58:05
466 The UCB copyright here is incorrect. This code did not originate
467 at UCB, it was written by Luke Mewburn. Updated the copyright at
468 the author's request. markus@ OK
469 - itojun@cvs.openbsd.org 2003/04/08 20:21:29
471 rename log() into logit() to avoid name conflict. markus ok, from
473 - (djm) XXX - Performed locally using:
474 "perl -p -i -e 's/(\s|^)log\(/$1logit\(/g' *.c *.h"
475 - hin@cvs.openbsd.org 2003/04/09 08:23:52
477 Don't include <krb.h> when compiling with Kerberos 5 support
478 - (djm) Fix up missing include for packet.c
479 - (djm) Fix missed log => logit occurance (reference by function pointer)
482 - (bal) if IP_TOS is not found or broken don't try to compile in
483 packet_set_tos() function call. bug #527
486 - (djm) OpenBSD CVS Sync
487 - jmc@cvs.openbsd.org 2003/03/28 10:11:43
488 [scp.1 sftp.1 ssh.1 ssh-add.1 ssh-agent.1 ssh_config.5 sshd_config.5]
489 [ssh-keygen.1 ssh-keyscan.1 ssh-keysign.8]
491 - new sentence new line
494 - markus@cvs.openbsd.org 2003/04/01 10:10:23
495 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
496 [readconf.h serverloop.c sshconnect2.c]
497 rekeying bugfixes and automatic rekeying:
498 * both client and server rekey _automatically_
499 (a) after 2^31 packets, because after 2^32 packets
500 the sequence number for packets wraps
501 (b) after 2^(blocksize_in_bits/4) blocks
502 (see: draft-ietf-secsh-newmodes-00.txt)
503 (a) and (b) are _enabled_ by default, and only disabled for known
504 openssh versions, that don't support rekeying properly.
505 * client option 'RekeyLimit'
506 * do not reply to requests during rekeying
507 - markus@cvs.openbsd.org 2003/04/01 10:22:21
508 [clientloop.c monitor.c monitor_wrap.c packet.c packet.h readconf.c]
509 [readconf.h serverloop.c sshconnect2.c]
510 backout rekeying changes (for 3.6.1)
511 - markus@cvs.openbsd.org 2003/04/01 10:31:26
512 [compat.c compat.h kex.c]
513 bugfix causes stalled connections for ssh.com < 3.0; noticed by ho@;
514 tested by ho@ and myself
515 - markus@cvs.openbsd.org 2003/04/01 10:56:46
518 - (djm) Crank spec file versions
519 - (djm) Release 3.6.1p1
522 - (djm) OpenBSD CVS Sync
523 - deraadt@cvs.openbsd.org 2003/03/26 04:02:51
525 one last fix to the tree: race fix broke stuff; pr 3169;
526 srp@srparish.net, help from djm
529 - (djm) Fix getpeerid support for 64 bit BE systems. From
530 Arnd Bergmann <arndb@de.ibm.com>
533 - (djm) OpenBSD CVS Sync
534 - markus@cvs.openbsd.org 2003/03/23 19:02:00
536 unbreak rekeying for privsep; ok millert@
538 - Fix sshd BindAddress and -b options for systems using fake-getaddrinfo.
539 Report from murple@murple.net, diagnosis from dtucker@zip.com.au