+20020321
+ - (bal) OpenBSD CVS Sync
+ - itojun@cvs.openbsd.org 2002/03/08 06:10:16
+ [sftp-client.c]
+ printf type mismatch
+ - itojun@cvs.openbsd.org 2002/03/11 03:18:49
+ [sftp-client.c]
+ correct type mismatches (u_int64_t != unsigned long long)
+ - itojun@cvs.openbsd.org 2002/03/11 03:19:53
+ [sftp-client.c]
+ indent
+ - markus@cvs.openbsd.org 2002/03/14 15:24:27
+ [sshconnect1.c]
+ don't trust size sent by (rogue) server; noted by s.esser@e-matters.de
+ - markus@cvs.openbsd.org 2002/03/14 16:38:26
+ [sshd.c]
+ split out ssh1 session key decryption; ok provos@
+ - markus@cvs.openbsd.org 2002/03/14 16:56:33
+ [auth-rh-rsa.c auth-rsa.c auth.h]
+ split auth_rsa() for better readability and privsep; ok provos@
+ - itojun@cvs.openbsd.org 2002/03/15 11:00:38
+ [auth.c]
+ fix file type checking (use S_ISREG). ok by markus
+ - markus@cvs.openbsd.org 2002/03/16 11:24:53
+ [compress.c]
+ skip inflateEnd if inflate fails; ok provos@
+ - markus@cvs.openbsd.org 2002/03/16 17:22:09
+ [auth-rh-rsa.c auth.h]
+ split auth_rhosts_rsa(), ok provos@
+ - stevesk@cvs.openbsd.org 2002/03/16 17:41:25
+ [auth-krb5.c]
+ BSD license. from Daniel Kouril via Dug Song. ok markus@
+ - provos@cvs.openbsd.org 2002/03/17 20:25:56
+ [auth.c auth.h auth1.c auth2.c]
+ getpwnamallow returns struct passwd * only if user valid; okay markus@
+ - provos@cvs.openbsd.org 2002/03/18 01:12:14
+ [auth.h auth1.c auth2.c sshd.c]
+ have the authentication functions return the authentication context
+ and then do_authenticated; okay millert@
+ - dugsong@cvs.openbsd.org 2002/03/18 01:30:10
+ [auth-krb4.c]
+ set client to NULL after xfree(), from Rolf Braun
+ <rbraun+ssh@andrew.cmu.edu>
+ - provos@cvs.openbsd.org 2002/03/18 03:41:08
+ [auth.c session.c]
+ move auth_approval into getpwnamallow with help from millert@
+ - markus@cvs.openbsd.org 2002/03/18 17:13:15
+ [cipher.c cipher.h]
+ export/import cipher states; needed by ssh-privsep
+ - markus@cvs.openbsd.org 2002/03/18 17:16:38
+ [packet.c packet.h]
+ export/import cipher state, iv and ssh2 seqnr; needed by ssh-privsep
+ - markus@cvs.openbsd.org 2002/03/18 17:23:31
+ [key.c key.h]
+ add key_demote() for ssh-privsep
+ - provos@cvs.openbsd.org 2002/03/18 17:25:29
+ [bufaux.c bufaux.h]
+ buffer_skip_string and extra sanity checking; needed by ssh-privsep
+ - provos@cvs.openbsd.org 2002/03/18 17:31:54
+ [compress.c]
+ export compression streams for ssh-privsep
+ - provos@cvs.openbsd.org 2002/03/18 17:50:31
+ [auth-bsdauth.c auth-options.c auth-rh-rsa.c auth-rsa.c auth-skey.c auth.h
+ auth1.c auth2-chall.c auth2.c kex.c kex.h kexdh.c kexgex.c servconf.c
+ session.h servconf.h serverloop.c session.c sshd.c]
+ integrate privilege separated openssh; its turned off by default for now.
+ work done by me and markus@
+ - provos@cvs.openbsd.org 2002/03/18 17:53:08
+ [sshd.8]
+ credits for privsep
+ - provos@cvs.openbsd.org 2002/03/18 17:59:09
+ [sshd.8]
+ document UsePrivilegeSeparation
+ - stevesk@cvs.openbsd.org 2002/03/18 23:52:51
+ [servconf.c]
+ UnprivUser/UnprivGroup usable now--specify numeric user/group; ok
+ provos@
+ - stevesk@cvs.openbsd.org 2002/03/19 03:03:43
+ [pathnames.h servconf.c servconf.h sshd.c]
+ _PATH_PRIVSEP_CHROOT_DIR; ok provos@
+ - stevesk@cvs.openbsd.org 2002/03/19 05:23:08
+ [sshd.8]
+ Banner has no default.
+ - mpech@cvs.openbsd.org 2002/03/19 06:32:56
+ [sftp-int.c]
+ use xfree() after xstrdup().
+
+ markus@ ok
+ - markus@cvs.openbsd.org 2002/03/19 10:35:39
+ [auth-options.c auth.h session.c session.h sshd.c]
+ clean up prototypes
+ - markus@cvs.openbsd.org 2002/03/19 10:49:35
+ [auth-krb5.c auth-rh-rsa.c auth.c cipher.c key.c misc.h packet.c session.c
+ sftp-client.c sftp-glob.h sftp.c ssh-add.c ssh.c sshconnect2.c sshd.c
+ ttymodes.c]
+ KNF whitespace
+ - markus@cvs.openbsd.org 2002/03/19 14:27:39
+ [auth.c auth1.c auth2.c]
+ make getpwnamallow() allways call pwcopy()
+ - markus@cvs.openbsd.org 2002/03/19 15:31:47
+ [auth.c]
+ check for NULL; from provos@
+ - stevesk@cvs.openbsd.org 2002/03/20 19:12:25
+ [servconf.c servconf.h ssh.h sshd.c]
+ for unprivileged user, group do:
+ pw=getpwnam(SSH_PRIVSEP_USER); do_setusercontext(pw). ok provos@
+ - stevesk@cvs.openbsd.org 2002/03/20 21:08:08
+ [sshd.c]
+ strerror() on chdir() fail; ok provos@
+ - markus@cvs.openbsd.org 2002/03/21 10:21:20
+ [ssh-add.c]
+ ignore errors for nonexisting default keys in ssh-add,
+ fixes http://bugzilla.mindrot.org/show_bug.cgi?id=158
+ - jakob@cvs.openbsd.org 2002/03/21 15:17:26
+ [clientloop.c ssh.1]
+ add built-in command line for adding new port forwardings on the fly.
+ based on a patch from brian wellington. ok markus@.
+ - markus@cvs.openbsd.org 2002/03/21 16:38:06
+ [scard.c]
+ make compile w/ openssl 0.9.7
+
+20020317
+ - (tim) [configure.ac] Assume path given with --with-pid-dir=PATH is wanted,
+ warn if directory does not exist. Put system directories in front of
+ PATH for finding entorpy commands.
+ - (tim) [contrib/aix/buildbff.sh contrib/aix/inventory.sh] AIX package
+ build fixes. Patch by Darren Tucker <dtucker@zip.com.au>
+ [contrib/solaris/buildpkg.sh] add missing dirs to SYSTEM_DIR. Have
+ postinstall check for $piddir and add if necessary.
+
+20020311
+ - (tim) [contrib/solaris/buildpkg.sh, contrib/solaris/README] Updated to
+ build on all platforms that support SVR4 style package tools. Now runs
+ from build dir. Parts are based on patches from Antonio Navarro, and
+ Darren Tucker.
+
+20020308
+ - (djm) Revert bits of Markus' OpenSSL compat patch which was
+ accidentally committed.
+ - (djm) Add Markus' patch for compat wih OpenSSL < 0.9.6.
+ Known issue: Blowfish for SSH1 does not work
+ - (stevesk) entropy.c: typo in debug message
+ - (djm) ssh-keygen -i needs seeded RNG; report from markus@
+
20020307
- (djm) OpenBSD CVS Sync
- markus@cvs.openbsd.org 2002/03/06 00:20:54
- markus@cvs.openbsd.org 2002/03/06 00:25:55
[version.h]
OpenSSH_3.1
-
+ - (djm) Update RPM spec files with new version number
+ - (bal) Updated INSTALL to reflect 0.9.6 OpenSSL requirement
+ - (bal) Add in check for rpc/types.h since it is needed on
+ some platforms for INADDR_LOOPBACK. We should retest
+ SCO 3 to see if this fixes their problem also.
+ - (bal) Test for IRIX JOBS support at runtime. Patch provided
+ by David Kaelbling <drk@sgi.com>
+
20020305
- stevesk@cvs.openbsd.org 2002/03/02 09:34:42
[LICENCE]