+20010314
+ - OpenBSD CVS Sync
+ - markus@cvs.openbsd.org 2001/03/13 17:34:42
+ [auth-options.c]
+ missing xfree, deny key on parse error; ok stevesk@
+ - djm@cvs.openbsd.org 2001/03/13 22:42:54
+ [sftp-client.c sftp-client.h sftp-glob.c sftp-glob.h sftp-int.c]
+ sftp client filename globbing for get, put, ch{mod,grp,own}. ok markus@
+
+20010313
+ - OpenBSD CVS Sync
+ - markus@cvs.openbsd.org 2001/03/12 22:02:02
+ [key.c key.h ssh-add.c ssh-keygen.c sshconnect.c sshconnect2.c]
+ remove old key_fingerprint interface, s/_ex//
+
+20010312
+ - OpenBSD CVS Sync
+ - markus@cvs.openbsd.org 2001/03/11 13:25:36
+ [auth2.c key.c]
+ debug
+ - jakob@cvs.openbsd.org 2001/03/11 15:03:16
+ [key.c key.h]
+ add improved fingerprint functions. based on work by Carsten
+ Raskgaard <cara@int.tele.dk> and modified by me. ok markus@.
+ - jakob@cvs.openbsd.org 2001/03/11 15:04:16
+ [ssh-keygen.1 ssh-keygen.c]
+ print both md5, sha1 and bubblebabble fingerprints when using
+ ssh-keygen -l -v. ok markus@.
+ - jakob@cvs.openbsd.org 2001/03/11 15:13:09
+ [key.c]
+ cleanup & shorten some var names key_fingerprint_bubblebabble.
+ - deraadt@cvs.openbsd.org 2001/03/11 16:39:03
+ [ssh-keygen.c]
+ KNF, and SHA1 binary output is just creeping featurism
+ - tim@mindrot.org 2001/03/11 17:29:32 [configure.in]
+ test if snprintf() supports %ll
+ add /dev to search path for PRNGD/EGD socket
+ fix my mistake in USER_PATH test program
+ - OpenBSD CVS Sync
+ - markus@cvs.openbsd.org 2001/03/11 18:29:51
+ [key.c]
+ style+cleanup
+ - markus@cvs.openbsd.org 2001/03/11 22:33:24
+ [ssh-keygen.1 ssh-keygen.c]
+ remove -v again. use -B instead for bubblebabble. make -B consistent
+ with -l and make -B work with /path/to/known_hosts. ok deraadt@
+ - (djm) Bump portable version number for generating test RPMs
+ - (djm) Add "static_openssl" RPM build option, remove rsh build dependency
+ - (bal) Reorder includes in Makefile.
+
+20010311
+ - OpenBSD CVS Sync
+ - markus@cvs.openbsd.org 2001/03/10 12:48:27
+ [sshconnect2.c]
+ ignore nonexisting private keys; report rjmooney@mediaone.net
+ - deraadt@cvs.openbsd.org 2001/03/10 12:53:51
+ [readconf.c ssh_config]
+ default to SSH2, now that m68k runs fast
+ - stevesk@cvs.openbsd.org 2001/03/10 15:02:05
+ [ttymodes.c ttymodes.h]
+ remove unused sgtty macros; ok markus@
+ - deraadt@cvs.openbsd.org 2001/03/10 15:31:00
+ [compat.c compat.h sshconnect.c]
+ all known netscreen ssh versions, and older versions of OSU ssh cannot
+ handle password padding (newer OSU is fixed)
+ - tim@mindrot.org 2001/03/10 16:33:42 [configure.in Makefile.in sshd_config]
+ make sure $bindir is in USER_PATH so scp will work
+ - OpenBSD CVS Sync
+ - markus@cvs.openbsd.org 2001/03/10 17:51:04
+ [kex.c match.c match.h readconf.c readconf.h sshconnect2.c]
+ add PreferredAuthentications
+
+20010310
+ - OpenBSD CVS Sync
+ - deraadt@cvs.openbsd.org 2001/03/09 03:14:39
+ [ssh-keygen.c]
+ create *.pub files with umask 0644, so that you can mv them to
+ authorized_keys
+ - deraadt@cvs.openbsd.org 2001/03/09 12:30:29
+ [sshd.c]
+ typo; slade@shore.net
+ - Removed log.o from sftp client. Not needed.
+
+20010309
+ - OpenBSD CVS Sync
+ - stevesk@cvs.openbsd.org 2001/03/08 18:47:12
+ [auth1.c]
+ unused; ok markus@
+ - stevesk@cvs.openbsd.org 2001/03/08 20:44:48
+ [sftp.1]
+ spelling, cleanup; ok deraadt@
+ - markus@cvs.openbsd.org 2001/03/08 21:42:33
+ [compat.c compat.h readconf.h ssh.c sshconnect1.c sshconnect2.c]
+ implement client side of SSH2_MSG_USERAUTH_PK_OK (test public key ->
+ no need to do enter passphrase or do expensive sign operations if the
+ server does not accept key).
+
+20010308
+ - OpenBSD CVS Sync
+ - djm@cvs.openbsd.org 2001/03/07 10:11:23
+ [sftp-client.c sftp-client.h sftp-int.c sftp-server.c sftp.1 sftp.c sftp.h]
+ Support for new draft (draft-ietf-secsh-filexfer-01). New symlink handling
+ functions and small protocol change.
+ - markus@cvs.openbsd.org 2001/03/08 00:15:48
+ [readconf.c ssh.1]
+ turn off useprivilegedports by default. only rhost-auth needs
+ this. older sshd's may need this, too.
+ - (stevesk) Reliant Unix (SNI) needs HAVE_BOGUS_SYS_QUEUE_H;
+ Dirk Markwardt <D.Markwardt@tu-bs.de>
+
+20010307
+ - (bal) OpenBSD CVS Sync
+ - deraadt@cvs.openbsd.org 2001/03/06 06:11:18
+ [ssh-keyscan.c]
+ appease gcc
+ - deraadt@cvs.openbsd.org 2001/03/06 06:11:44
+ [sftp-int.c sftp.1 sftp.c]
+ sftp -b batchfile; mouring@etoh.eviladmin.org
+ - deraadt@cvs.openbsd.org 2001/03/06 15:10:42
+ [sftp.1]
+ order things
+ - deraadt@cvs.openbsd.org 2001/03/07 01:19:06
+ [ssh.1 sshd.8]
+ the name "secure shell" is boring, noone ever uses it
+ - deraadt@cvs.openbsd.org 2001/03/07 04:05:58
+ [ssh.1]
+ removed dated comment
+ - Cygwin contrib improvements from Corinna Vinschen <vinschen@redhat.com>
+
+20010306
+ - (bal) OpenBSD CVS Sync
+ - deraadt@cvs.openbsd.org 2001/03/05 14:28:47
+ [sshd.8]
+ alpha order; jcs@rt.fm
+ - stevesk@cvs.openbsd.org 2001/03/05 15:44:51
+ [servconf.c]
+ sync error message; ok markus@
+ - deraadt@cvs.openbsd.org 2001/03/05 15:56:16
+ [myproposal.h ssh.1]
+ switch to aes128-cbc/hmac-md5 by default in SSH2 -- faster;
+ provos & markus ok
+ - deraadt@cvs.openbsd.org 2001/03/05 16:07:15
+ [sshd.8]
+ detail default hmac setup too
+ - markus@cvs.openbsd.org 2001/03/05 17:17:21
+ [kex.c kex.h sshconnect2.c sshd.c]
+ generate a 2*need size (~300 instead of 1024/2048) random private
+ exponent during the DH key agreement. according to Niels (the great
+ german advisor) this is safe since /etc/primes contains strong
+ primes only.
+
+ References:
+ P. C. van Oorschot and M. J. Wiener, On Diffie-Hellman key
+ agreement with short exponents, In Advances in Cryptology
+ - EUROCRYPT'96, LNCS 1070, Springer-Verlag, 1996, pp.332-343.
+ - stevesk@cvs.openbsd.org 2001/03/05 17:40:48
+ [ssh.1]
+ more ssh_known_hosts2 documentation; ok markus@
+ - stevesk@cvs.openbsd.org 2001/03/05 17:58:22
+ [dh.c]
+ spelling
+ - deraadt@cvs.openbsd.org 2001/03/06 00:33:04
+ [authfd.c cli.c ssh-agent.c]
+ EINTR/EAGAIN handling is required in more cases
+ - millert@cvs.openbsd.org 2001/03/06 01:06:03
+ [ssh-keyscan.c]
+ Don't assume we wil get the version string all in one read().
+ deraadt@ OK'd
+ - millert@cvs.openbsd.org 2001/03/06 01:08:27
+ [clientloop.c]
+ If read() fails with EINTR deal with it the same way we treat EAGAIN
+
20010305
- (bal) CVS ID touch up on sshpty.[ch] and sshlogin.[ch]
+ - (bal) CVS ID touch up on sftp-int.c
+ - (bal) CVS ID touch up on uuencode.c
+ - (bal) CVS ID touch up on auth2.c, serverloop.c, session.c & sshd.c
- (bal) OpenBSD CVS Sync
- deraadt@cvs.openbsd.org 2001/02/17 23:48:48
[sshd.8]
- deraadt@cvs.openbsd.org 2001/02/21 09:05:54
[authfile.c]
improve fd handling
+ - deraadt@cvs.openbsd.org 2001/02/21 09:12:56
+ [sftp-server.c]
+ careful with & and &&; markus ok
+ - stevesk@cvs.openbsd.org 2001/02/21 21:14:04
+ [ssh.c]
+ -i supports DSA identities now; ok markus@
+ - deraadt@cvs.openbsd.org 2001/02/22 04:29:37
+ [servconf.c]
+ grammar; slade@shore.net
+ - deraadt@cvs.openbsd.org 2001/02/22 06:43:55
+ [ssh-keygen.1 ssh-keygen.c]
+ document -d, and -t defaults to rsa1
+ - deraadt@cvs.openbsd.org 2001/02/22 08:03:51
+ [ssh-keygen.1 ssh-keygen.c]
+ bye bye -d
+ - deraadt@cvs.openbsd.org 2001/02/22 18:09:06
+ [sshd_config]
+ activate RSA 2 key
+ - markus@cvs.openbsd.org 2001/02/22 21:57:27
+ [ssh.1 sshd.8]
+ typos/grammar from matt@anzen.com
+ - markus@cvs.openbsd.org 2001/02/22 21:59:44
+ [auth.c auth.h auth1.c auth2.c misc.c misc.h ssh.c]
+ use pwcopy in ssh.c, too
+ - markus@cvs.openbsd.org 2001/02/23 15:34:53
+ [serverloop.c]
+ debug2->3
+ - markus@cvs.openbsd.org 2001/02/23 18:15:13
+ [sshd.c]
+ the random session key depends now on the session_key_int
+ sent by the 'attacker'
+ dig1 = md5(cookie|session_key_int);
+ dig2 = md5(dig1|cookie|session_key_int);
+ fake_session_key = dig1|dig2;
+ this change is caused by a mail from anakin@pobox.com
+ patch based on discussions with my german advisor niels@openbsd.org
+ - deraadt@cvs.openbsd.org 2001/02/24 10:37:55
+ [readconf.c]
+ look for id_rsa by default, before id_dsa
+ - deraadt@cvs.openbsd.org 2001/02/24 10:37:26
+ [sshd_config]
+ ssh2 rsa key before dsa key
+ - markus@cvs.openbsd.org 2001/02/27 10:35:27
+ [packet.c]
+ fix random padding
+ - markus@cvs.openbsd.org 2001/02/27 11:00:11
+ [compat.c]
+ support SSH-2.0-2.1 ; from Christophe_Moret@hp.com
+ - deraadt@cvs.openbsd.org 2001/02/28 05:34:28
+ [misc.c]
+ pull in protos
+ - deraadt@cvs.openbsd.org 2001/02/28 05:36:28
+ [sftp.c]
+ do not kill the subprocess on termination (we will see if this helps
+ things or hurts things)
+ - markus@cvs.openbsd.org 2001/02/28 08:45:39
+ [clientloop.c]
+ fix byte counts for ssh protocol v1
+ - markus@cvs.openbsd.org 2001/02/28 08:54:55
+ [channels.c nchan.c nchan.h]
+ make sure remote stderr does not get truncated.
+ remove closed fd's from the select mask.
+ - markus@cvs.openbsd.org 2001/02/28 09:57:07
+ [packet.c packet.h sshconnect2.c]
+ in ssh protocol v2 use ignore messages for padding (instead of
+ trailing \0).
+ - markus@cvs.openbsd.org 2001/02/28 12:55:07
+ [channels.c]
+ unify debug messages
+ - deraadt@cvs.openbsd.org 2001/02/28 17:52:54
+ [misc.c]
+ for completeness, copy pw_gecos too
+ - markus@cvs.openbsd.org 2001/02/28 21:21:41
+ [sshd.c]
+ generate a fake session id, too
+ - markus@cvs.openbsd.org 2001/02/28 21:27:48
+ [channels.c packet.c packet.h serverloop.c]
+ use ignore message to simulate a SSH2_MSG_CHANNEL_DATA message
+ use random content in ignore messages.
+ - markus@cvs.openbsd.org 2001/02/28 21:31:32
+ [channels.c]
+ typo
+ - deraadt@cvs.openbsd.org 2001/03/01 02:11:25
+ [authfd.c]
+ split line so that p will have an easier time next time around
+ - deraadt@cvs.openbsd.org 2001/03/01 02:29:04
+ [ssh.c]
+ shorten usage by a line
+ - deraadt@cvs.openbsd.org 2001/03/01 02:45:10
+ [auth-rsa.c auth2.c deattack.c packet.c]
+ KNF
+ - deraadt@cvs.openbsd.org 2001/03/01 03:38:33
+ [cli.c cli.h rijndael.h ssh-keyscan.1]
+ copyright notices on all source files
+ - markus@cvs.openbsd.org 2001/03/01 22:46:37
+ [ssh.c]
+ don't truncate remote ssh-2 commands; from mkubita@securities.cz
+ use min, not max for logging, fixes overflow.
+ - deraadt@cvs.openbsd.org 2001/03/02 06:21:01
+ [sshd.8]
+ explain SIGHUP better
+ - deraadt@cvs.openbsd.org 2001/03/02 09:42:49
+ [sshd.8]
+ doc the dsa/rsa key pair files
+ - deraadt@cvs.openbsd.org 2001/03/02 18:54:31
+ [atomicio.c atomicio.h auth-chall.c auth.c auth2-chall.c crc32.h
+ scp.c serverloop.c session.c sftp-server.8 sftp.1 ssh-add.1 ssh-add.c
+ ssh-agent.1 ssh-agent.c ssh-keygen.1 ssh.1 sshd.8]
+ make copyright lines the same format
+ - deraadt@cvs.openbsd.org 2001/03/03 06:53:12
+ [ssh-keyscan.c]
+ standard theo sweep
+ - millert@cvs.openbsd.org 2001/03/03 21:19:41
+ [ssh-keyscan.c]
+ Dynamically allocate read_wait and its copies. Since maxfd is
+ based on resource limits it is often (usually?) larger than FD_SETSIZE.
+ - millert@cvs.openbsd.org 2001/03/03 21:40:30
+ [sftp-server.c]
+ Dynamically allocate fd_set; deraadt@ OK
+ - millert@cvs.openbsd.org 2001/03/03 21:41:07
+ [packet.c]
+ Dynamically allocate fd_set; deraadt@ OK
+ - deraadt@cvs.openbsd.org 2001/03/03 22:07:50
+ [sftp-server.c]
+ KNF
+ - markus@cvs.openbsd.org 2001/03/03 23:52:22
+ [sftp.c]
+ clean up arg processing. based on work by Christophe_Moret@hp.com
+ - markus@cvs.openbsd.org 2001/03/03 23:59:34
+ [log.c ssh.c]
+ log*.c -> log.c
+ - markus@cvs.openbsd.org 2001/03/04 00:03:59
+ [channels.c]
+ debug1->2
+ - stevesk@cvs.openbsd.org 2001/03/04 10:57:53
+ [ssh.c]
+ add -m to usage; ok markus@
+ - stevesk@cvs.openbsd.org 2001/03/04 11:04:41
+ [sshd.8]
+ small cleanup and clarify for PermitRootLogin; ok markus@
+ - stevesk@cvs.openbsd.org 2001/03/04 11:16:06
+ [servconf.c sshd.8]
+ kill obsolete RandomSeed; ok markus@ deraadt@
+ - stevesk@cvs.openbsd.org 2001/03/04 12:54:04
+ [sshd.8]
+ spelling
+ - millert@cvs.openbsd.org 2001/03/04 17:42:28
+ [authfd.c channels.c dh.c log.c readconf.c servconf.c sftp-int.c
+ ssh.c sshconnect.c sshd.c]
+ log functions should not be passed strings that end in newline as they
+ get passed on to syslog() and when logging to stderr, do_log() appends
+ its own newline.
+ - deraadt@cvs.openbsd.org 2001/03/04 18:21:28
+ [sshd.8]
+ list SSH2 ciphers
+ - (bal) Put HAVE_PW_CLASS_IN_PASSWD back into pwcopy()
+ - (bal) Fix up logging since it changed. removed log-*.c
+ - (djm) Fix up LOG_AUTHPRIV for systems that have it
+ - (stevesk) OpenBSD sync:
+ - deraadt@cvs.openbsd.org 2001/03/05 08:37:27
+ [ssh-keyscan.c]
+ skip inlining, why bother
+ - (stevesk) sftp.c: handle __progname
20010304
- (bal) Remove make-ssh-known-hosts.1 since it's no longer valid.