+20010410
+ - OpenBSD CVS Sync
+ - deraadt@cvs.openbsd.org 2001/04/08 20:52:55
+ [sftp.c]
+ do not modify an actual argv[] entry
+ - stevesk@cvs.openbsd.org 2001/04/08 23:28:27
+ [sshd.8]
+ spelling
+ - stevesk@cvs.openbsd.org 2001/04/09 00:42:05
+ [sftp.1]
+ spelling
+
20010409
+ - (stevesk) use setresgid() for setegid() if needed
+ - (stevesk) configure.in: typo
- OpenBSD CVS Sync
- stevesk@cvs.openbsd.org 2001/04/08 16:01:36
[sshd.8]
- markus@cvs.openbsd.org 2001/04/08 13:03:00
[ssh-add.c]
init pointers with NULL, thanks to danimal@danimal.org
+ - markus@cvs.openbsd.org 2001/04/08 11:27:33
+ [clientloop.c]
+ leave_raw_mode if ssh2 "session" is closed
+ - markus@cvs.openbsd.org 2001/04/06 21:00:17
+ [auth-rh-rsa.c auth-rhosts.c auth-rsa.c auth2.c channels.c session.c
+ ssh.c sshconnect.c sshconnect.h uidswap.c uidswap.h]
+ do gid/groups-swap in addition to uid-swap, should help if /home/group
+ is chmod 750 + chgrp grp /home/group/, work be deraadt and me, thanks
+ to olar@openwall.com is comments. we had many requests for this.
+ - markus@cvs.openbsd.org 2001/04/07 08:55:18
+ [buffer.c channels.c channels.h readconf.c ssh.c]
+ allow the ssh client act as a SOCKS4 proxy (dynamic local
+ portforwarding). work by Dan Kaminsky <dankamin@cisco.com> and me.
+ thanks to Dan for this great patch: use 'ssh -D 1080 host' and make
+ netscape use localhost:1080 as a socks proxy.
+ - markus@cvs.openbsd.org 2001/04/08 11:24:33
+ [uidswap.c]
+ KNF
20010408
- OpenBSD CVS Sync