+20020609
+ - (bal) OpenBSD CVS Sync
+ - markus@cvs.openbsd.org 2002/06/08 05:07:56
+ [ssh.c]
+ nuke ptrace comment
+
+20020607
+ - (bal) Removed --{enable/disable}-suid-ssh
+ - (bal) Missed __progname in ssh-keysign.c patch by dtucker@zip.com.au
+ - (bal) use 'LOGIN_PROGRAM' not '/usr/bin/login' in session.c patch by
+ Bertrand.Velle@apogee-com.fr
+
+20020606
+ - (bal) OpenBSD CVS Sync
+ - markus@cvs.openbsd.org 2002/05/15 21:56:38
+ [servconf.c sshd.8 sshd_config]
+ re-enable privsep and disable setuid for post-3.2.2
+ - markus@cvs.openbsd.org 2002/05/16 22:02:50
+ [cipher.c kex.h mac.c]
+ fix warnings (openssl 0.9.7 requires const)
+ - stevesk@cvs.openbsd.org 2002/05/16 22:09:59
+ [session.c ssh.c]
+ don't limit xauth pathlen on client side and longer print length on
+ server when debug; ok markus@
+ - deraadt@cvs.openbsd.org 2002/05/19 20:54:52
+ [log.h]
+ extra commas in enum not 100% portable
+ - deraadt@cvs.openbsd.org 2002/05/22 23:18:25
+ [ssh.c sshd.c]
+ spelling; abishoff@arc.nasa.gov
+ - markus@cvs.openbsd.org 2002/05/23 19:24:30
+ [authfile.c authfile.h pathnames.h ssh.c sshconnect.c sshconnect.h
+ sshconnect1.c sshconnect2.c ssh-keysign.8 ssh-keysign.c Makefile.in]
+ add /usr/libexec/ssh-keysign: a setuid helper program for hostbased
+ authentication in protocol v2 (needs to access the hostkeys).
+ - markus@cvs.openbsd.org 2002/05/23 19:39:34
+ [ssh.c]
+ add comment about ssh-keysign
+ - markus@cvs.openbsd.org 2002/05/24 08:45:14
+ [sshconnect2.c]
+ stat ssh-keysign first, print error if stat fails;
+ some debug->error; fix comment
+ - markus@cvs.openbsd.org 2002/05/25 08:50:39
+ [sshconnect2.c]
+ execlp->execl; from stevesk
+ - markus@cvs.openbsd.org 2002/05/25 18:51:07
+ [auth.h auth2.c auth2-hostbased.c auth2-kbdint.c auth2-none.c
+ auth2-passwd.c auth2-pubkey.c Makefile.in]
+ split auth2.c into one file per method; ok provos@/deraadt@
+ - stevesk@cvs.openbsd.org 2002/05/26 20:35:10
+ [ssh.1]
+ sort ChallengeResponseAuthentication; ok markus@
+ - stevesk@cvs.openbsd.org 2002/05/28 16:45:27
+ [monitor_mm.c]
+ print strerror(errno) on mmap/munmap error; ok markus@
+ - stevesk@cvs.openbsd.org 2002/05/28 17:28:02
+ [uidswap.c]
+ format spec change/casts and some KNF; ok markus@
+ - stevesk@cvs.openbsd.org 2002/05/28 21:24:00
+ [uidswap.c]
+ use correct function name in fatal()
+ - stevesk@cvs.openbsd.org 2002/05/29 03:06:30
+ [ssh.1 sshd.8]
+ spelling
+ - markus@cvs.openbsd.org 2002/05/29 11:21:57
+ [sshd.c]
+ don't start if privsep is enabled and SSH_PRIVSEP_USER or
+ _PATH_PRIVSEP_CHROOT_DIR are missing; ok deraadt@
+ - markus@cvs.openbsd.org 2002/05/30 08:07:31
+ [cipher.c]
+ use rijndael/aes from libcrypto (openssl >= 0.9.7) instead of
+ our own implementation. allow use of AES hardware via libcrypto,
+ ok deraadt@
+ - markus@cvs.openbsd.org 2002/05/31 10:30:33
+ [sshconnect2.c]
+ extent ssh-keysign protocol:
+ pass # of socket-fd to ssh-keysign, keysign verfies locally used
+ ip-address using this socket-fd, restricts fake local hostnames
+ to actual local hostnames; ok stevesk@
+ - markus@cvs.openbsd.org 2002/05/31 11:35:15
+ [auth.h auth2.c]
+ move Authmethod definitons to per-method file.
+ - markus@cvs.openbsd.org 2002/05/31 13:16:48
+ [key.c]
+ add comment:
+ key_verify returns 1 for a correct signature, 0 for an incorrect signature
+ and -1 on error.
+ - markus@cvs.openbsd.org 2002/05/31 13:20:50
+ [ssh-rsa.c]
+ pad received signature with leading zeros, because RSA_verify expects
+ a signature of RSA_size. the drafts says the signature is transmitted
+ unpadded (e.g. putty does not pad), reported by anakin@pobox.com
+ - deraadt@cvs.openbsd.org 2002/06/03 12:04:07
+ [ssh.h]
+ compatiblity -> compatibility
+ decriptor -> descriptor
+ authentciated -> authenticated
+ transmition -> transmission
+ - markus@cvs.openbsd.org 2002/06/04 19:42:35
+ [monitor.c]
+ only allow enabled authentication methods; ok provos@
+ - markus@cvs.openbsd.org 2002/06/04 19:53:40
+ [monitor.c]
+ save the session id (hash) for ssh2 (it will be passed with the
+ initial sign request) and verify that this value is used during
+ authentication; ok provos@
+ - markus@cvs.openbsd.org 2002/06/04 23:02:06
+ [packet.c]
+ remove __FUNCTION__
+ - markus@cvs.openbsd.org 2002/06/04 23:05:49
+ [cipher.c monitor.c monitor_fdpass.c monitor_mm.c monitor_wrap.c]
+ __FUNCTION__ -> __func__
+ - markus@cvs.openbsd.org 2002/06/05 16:08:07
+ [ssh-agent.1 ssh-agent.c]
+ '-a bind_address' binds the agent to user-specified unix-domain
+ socket instead of /tmp/ssh-XXXXXXXX/agent.<pid>; ok djm@ (some time ago).
+ - markus@cvs.openbsd.org 2002/06/05 16:08:07
+ [ssh-agent.1 ssh-agent.c]
+ '-a bind_address' binds the agent to user-specified unix-domain
+ socket instead of /tmp/ssh-XXXXXXXX/agent.<pid>; ok djm@ (some time ago).
+ - markus@cvs.openbsd.org 2002/06/05 16:48:54
+ [ssh-agent.c]
+ copy current request into an extra buffer and just flush this
+ request on errors, ok provos@
+ - markus@cvs.openbsd.org 2002/06/05 19:57:12
+ [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c]
+ ssh-add -x for lock and -X for unlocking the agent.
+ todo: encrypt private keys with locked...
+ - markus@cvs.openbsd.org 2002/06/05 20:56:39
+ [ssh-add.c]
+ add -x/-X to usage
+ - markus@cvs.openbsd.org 2002/06/05 21:55:44
+ [authfd.c authfd.h ssh-add.1 ssh-add.c ssh-agent.c]
+ ssh-add -t life, Set lifetime (in seconds) when adding identities;
+ ok provos@
+ - stevesk@cvs.openbsd.org 2002/06/06 01:09:41
+ [monitor.h]
+ no trailing comma in enum; china@thewrittenword.com
+ - markus@cvs.openbsd.org 2002/06/06 17:12:44
+ [sftp-server.c]
+ discard remaining bytes of current request; ok provos@
+ - markus@cvs.openbsd.org 2002/06/06 17:30:11
+ [sftp-server.c]
+ use get_int() macro (hide iqueue)
+ - (bal) Missed msg.[ch] in merge. Required for ssh-keysign.
+ - (bal) Forgot to add msg.c Makefile.in.
+ - (bal) monitor_mm.c typos.
+ - (bal) Refixed auth2.c. It was never fully commited while spliting out
+ authentication to different files.
+ - (bal) ssh-keysign should build and install correctly now. Phase two
+ would be to clean out any dead wood and disable ssh setuid on install.
+ - (bal) Reverse logic, use __func__ first since it's C99
+
+20020604
+ - (stevesk) [channels.c] bug #164 patch from YOSHIFUJI Hideaki (changed
+ setsockopt from debug to error for now).
+
+20020527
+ - (tim) [configure.ac.orig monitor_fdpass.c] Enahnce msghdr tests to address
+ build problem on Irix reported by Dave Love <d.love@dl.ac.uk>. Back out
+ last monitor_fdpass.c changes that are no longer needed with new tests.
+ Patch tested on Irix by Jan-Frode Myklebust <janfrode@parallab.uib.no>
+
+20020522
+ - (djm) Fix spelling mistakes, spotted by Solar Designer i
+ <solar@openwall.com>
+ - Sync scard/ (not sure when it drifted)
+ - (djm) OpenBSD CVS Sync:
+ [auth.c]
+ Fix typo/thinko. Pass in as to auth_approval(), not NULL.
+ Closes PR 2659.
+ - Crank version
+ - Crank RPM spec versions
+
+20020521
+ - (stevesk) [sshd.c] bug 245; disable setsid() for now
+ - (stevesk) [sshd.c] #ifndef HAVE_CYGWIN for setgroups()
+
+20020517
+ - (tim) [configure.ac] remove extra MD5_MSG="no" line.
+
+20020515
+ - (bal) CVS ID fix up on auth-passwd.c
+ - (bal) OpenBSD CVS Sync
+ - deraadt@cvs.openbsd.org 2002/05/07 19:54:36
+ [ssh.h]
+ use ssh uid
+ - deraadt@cvs.openbsd.org 2002/05/08 21:06:34
+ [ssh.h]
+ move to sshd.sshd instead
+ - stevesk@cvs.openbsd.org 2002/05/11 20:24:48
+ [ssh.h]
+ typo in comment
+ - itojun@cvs.openbsd.org 2002/05/13 02:37:39
+ [auth-skey.c auth2.c]
+ less warnings. skey_{respond,query} are public (in auth.h)
+ - markus@cvs.openbsd.org 2002/05/13 20:44:58
+ [auth-options.c auth.c auth.h]
+ move the packet_send_debug handling from auth-options.c to auth.c;
+ ok provos@
+ - millert@cvs.openbsd.org 2002/05/13 15:53:19
+ [sshd.c]
+ Call setsid() in the child after sshd accepts the connection and forks.
+ This is needed for privsep which calls setlogin() when it changes uids.
+ Without this, there is a race where the login name of an existing
+ connection, as returned by getlogin(), may be changed to the privsep
+ user (sshd). markus@ OK
+ - markus@cvs.openbsd.org 2002/05/13 21:26:49
+ [auth-rhosts.c]
+ handle debug messages during rhosts-rsa and hostbased authentication;
+ ok provos@
+ - mouring@cvs.openbsd.org 2002/05/15 15:47:49
+ [kex.c monitor.c monitor_wrap.c sshd.c]
+ 'monitor' variable clashes with at least one lame platform (NeXT). i
+ Renamed to 'pmonitor'. provos@
+ - deraadt@cvs.openbsd.org 2002/05/04 02:39:35
+ [servconf.c sshd.8 sshd_config]
+ enable privsep by default; provos ok
+ - millert@cvs.openbsd.org 2002/05/06 23:34:33
+ [ssh.1 sshd.8]
+ Kill/adjust r(login|exec)d? references now that those are no longer in
+ the tree.
+ - markus@cvs.openbsd.org 2002/05/15 21:02:53
+ [servconf.c sshd.8 sshd_config]
+ disable privsep and enable setuid for the 3.2.2 release
+ - (bal) Fixed up PAM case. I think.
+ - (bal) Clarified openbsd-compat/*-cray.* Licence provided by Wendy
+ - (bal) OpenBSD CVS Sync
+ - markus@cvs.openbsd.org 2002/05/15 21:05:29
+ [version.h]
+ enter OpenSSH_3.2.2
+ - (bal) Caldara, Suse, and Redhat openssh.specs updated.
+
+20020514
+ - (stevesk) [README.privsep] PAM+privsep works with Solaris 8.
+ - (tim) [sshpty.c] set tty modes when allocating old style bsd ptys to
+ match what newer style ptys have when allocated. Based on a patch by
+ Roger Cornelius <rac@tenzing.org>
+ - (tim) [README.privsep] UnixWare 7 and OpenUNIX 8 work.
+ - (tim) [README.privsep] remove reference to UnixWare 7 and OpenUNIX 8
+ from PAM-enabled pragraph. UnixWare has no PAM.
+ - (tim) [contrib/caldera/openssh.spec] update version.
+
+20020513
+ - (stevesk) add initial README.privsep
+ - (stevesk) [configure.ac] nicer message: --with-privsep-user=user
+ - (djm) Add --with-superuser-path=xxx configure option to specify
+ what $PATH the superuser receives.
+ - (djm) Bug #231: UsePrivilegeSeparation turns off Banner.
+ - (djm) Add --with-privsep-path configure option
+ - (djm) Update RPM spec file: different superuser path, use
+ /var/empty/sshd for privsep
+ - (djm) Bug #234: missing readpassphrase declaration and defines
+ - (djm) Add INSTALL warning about SSH protocol 1 blowfish w/
+ OpenSSL < 0.9.6
+
+20020511
+ - (tim) [configure.ac] applied a rework of djm's OpenSSL search cleanup patch.
+ Now only searches system and /usr/local/ssl (OpenSSL's default install path)
+ Others must use --with-ssl-dir=....
+ - (tim) [monitor_fdpass.c] fix for systems that have both
+ HAVE_ACCRIGHTS_IN_MSGHDR and HAVE_CONTROL_IN_MSGHDR. Ie. sys/socket.h
+ has #define msg_accrights msg_control
+
20020510
+ - (stevesk) [auth.c] Shadow account and expiration cleanup. Now
+ check for root forced expire. Still don't check for inactive.
- (djm) Rework RedHat RPM files. Based on spec from Nalin
Dahyabhai <nalin@redhat.com> and patches from
Pekka Savola <pekkas@netcore.fi>
- (djm) Try to drop supplemental groups at daemon startup. Patch from
RedHat
+ - (bal) Back all the way out of auth-passwd.c changes. Breaks too many
+ things that don't set pw->pw_passwd.
20020509
- (tim) [Makefile.in] Unbreak make -f Makefile.in distprep
20020426
- (djm) Bug #137, #209: fix make problems for scard/Ssh.bin, do uudecode
during distprep only
- - (djm) Disable PAM password expiry until a complete fix for bug #188 exists
+ - (djm) Disable PAM password expiry until a complete fix for bug #188
+ exists
- (djm) Bug #180: Set ToS bits on IPv4-in-IPv6 mapped addresses. Based on
patch from openssh@misc.tecq.org
20020421
- (tim) [entropy.c.] Portability fix for SCO Unix 3.2v4.x (SCO OSR 3.0).
- entropy.c needs seteuid(getuid()) for the setuid(original_uid) to succeed.
- Patch by gert@greenie.muc.de. This fixes one part of Bug 208
+ entropy.c needs seteuid(getuid()) for the setuid(original_uid) to
+ succeed. Patch by gert@greenie.muc.de. This fixes one part of Bug 208
20020418
- (djm) Avoid SIGCHLD breakage when run from rsync. Fix from
Sturle Sunde <sturle.sunde@usit.uio.no>
20020417
- - (djm) Tell users to configure /dev/random support into OpenSSL in INSTALL
+ - (djm) Tell users to configure /dev/random support into OpenSSL in
+ INSTALL
- (djm) Fix .Nm in mdoc2man.pl from pspencer@fields.utoronto.ca
- (tim) [configure.ac] Issue warning on --with-default-path=/some_path
if LOGIN_CAP is enabled. Report & testing by Tuc <tuc@ttsg.com>
20020415
- - (djm) Unbreak "make install". Fix from Darren Tucker <dtucker@zip.com.au>
+ - (djm) Unbreak "make install". Fix from Darren Tucker
+ <dtucker@zip.com.au>
- (stevesk) bsd-cygwin_util.[ch] BSD license from Corinna Vinschen
- (tim) [configure.ac] add tests for recvmsg and sendmsg.
[monitor_fdpass.c] add checks for HAVE_SENDMSG and HAVE_RECVMSG for
- (bal) OpenBSD CVS Sync
- markus@cvs.openbsd.org 2002/04/10 08:21:47
[auth1.c compat.c compat.h]
- strip '@' from username only for KerbV and known broken clients, bug #204
+ strip '@' from username only for KerbV and known broken clients,
+ bug #204
- markus@cvs.openbsd.org 2002/04/10 08:56:01
[version.h]
OpenSSH_3.2
- (bal) OpenBSD CVS Sync (now for the real sync)
- markus@cvs.openbsd.org 2002/03/27 22:21:45
[ssh-keygen.c]
- try to import keys with extra trailing === (seen with ssh.com < 2.0.12)
+ try to import keys with extra trailing === (seen with ssh.com <
+ 2.0.12)
- markus@cvs.openbsd.org 2002/03/28 15:34:51
[session.c]
do not call record_login twice (for use_privsep)
- markus@cvs.openbsd.org 2002/03/29 18:59:32
[session.c session.h]
- retrieve last login time before the pty is allocated, store per session
+ retrieve last login time before the pty is allocated, store per
+ session
- stevesk@cvs.openbsd.org 2002/03/29 19:16:22
[sshd.8]
RSA key modulus size minimum 768; ok markus@
do not talk about packets in bufaux
- rees@cvs.openbsd.org 2002/03/26 18:46:59
[scard.c]
- try_AUT0 in read_pubkey too, for those paranoid few who want to acl 'sh'
+ try_AUT0 in read_pubkey too, for those paranoid few who want to
+ acl 'sh'
- markus@cvs.openbsd.org 2002/03/26 22:50:39
[channels.h]
CHANNEL_EFD_OUTPUT_ACTIVE is false for CHAN_CLOSE_RCVD, too
simplify num_identity_files handling
- markus@cvs.openbsd.org 2002/03/25 21:13:51
[channels.c channels.h compat.c compat.h nchan.c]
- don't send stderr data after EOF, accept this from older known (broken)
- sshd servers only, fixes http://bugzilla.mindrot.org/show_bug.cgi?id=179
+ don't send stderr data after EOF, accept this from older known
+ (broken) sshd servers only, fixes
+ http://bugzilla.mindrot.org/show_bug.cgi?id=179
- stevesk@cvs.openbsd.org 2002/03/26 03:24:01
[monitor.h monitor_fdpass.h monitor_mm.h monitor_wrap.h]
$OpenBSD$
indent
- markus@cvs.openbsd.org 2002/03/14 15:24:27
[sshconnect1.c]
- don't trust size sent by (rogue) server; noted by s.esser@e-matters.de
+ don't trust size sent by (rogue) server; noted by
+ s.esser@e-matters.de
- markus@cvs.openbsd.org 2002/03/14 16:38:26
[sshd.c]
split out ssh1 session key decryption; ok provos@
BSD license. from Daniel Kouril via Dug Song. ok markus@
- provos@cvs.openbsd.org 2002/03/17 20:25:56
[auth.c auth.h auth1.c auth2.c]
- getpwnamallow returns struct passwd * only if user valid; okay markus@
+ getpwnamallow returns struct passwd * only if user valid;
+ okay markus@
- provos@cvs.openbsd.org 2002/03/18 01:12:14
[auth.h auth1.c auth2.c sshd.c]
have the authentication functions return the authentication context
[compress.c]
export compression streams for ssh-privsep
- provos@cvs.openbsd.org 2002/03/18 17:50:31
- [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c auth-skey.c auth.h
- auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c kexgex.c servconf.c
- session.h servconf.h serverloop.c session.c sshd.c]
- integrate privilege separated openssh; its turned off by default for now.
- work done by me and markus@
+ [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c]
+ [auth-skey.c auth.h auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c]
+ [kexgex.c servconf.c]
+ [session.h servconf.h serverloop.c session.c sshd.c]
+ integrate privilege separated openssh; its turned off by default
+ for now. work done by me and markus@
- provos@cvs.openbsd.org 2002/03/18 17:53:08
[sshd.8]
credits for privsep
[auth-options.c auth.h session.c session.h sshd.c]
clean up prototypes
- markus@cvs.openbsd.org 2002/03/19 10:49:35
- [auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h packet.c session.c
- sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c sshconnect2.c sshd.c
- ttymodes.c]
+ [auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h]
+ [packet.c session.c sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c]
+ [sshconnect2.c sshd.c ttymodes.c]
KNF whitespace
- markus@cvs.openbsd.org 2002/03/19 14:27:39
[auth.c auth1.c auth2.c]
remove unused, sync w/ cmdline patch in my tree.
20020317
- - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is wanted,
- warn if directory does not exist. Put system directories in front of
- PATH for finding entorpy commands.
+ - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is
+ wanted, warn if directory does not exist. Put system directories in
+ front of PATH for finding entorpy commands.
- (tim) [contrib/aix/buildbff.sh contrib/aix/inventory.sh] AIX package
build fixes. Patch by Darren Tucker <dtucker@zip.com.au>
[contrib/solaris/buildpkg.sh] add missing dirs to SYSTEM_DIR. Have