+20100113
+ - (dtucker) [monitor_fdpass.c] Wrap poll.h include in ifdefs.
+
+20100112
+ - (dtucker) OpenBSD CVS Sync
+ - dtucker@cvs.openbsd.org 2010/01/11 01:39:46
+ [ssh_config channels.c ssh.1 channels.h ssh.c]
+ Add a 'netcat mode' (ssh -W). This connects stdio on the client to a
+ single port forward on the server. This allows, for example, using ssh as
+ a ProxyCommand to route connections via intermediate servers.
+ bz #1618, man page help from jmc@, ok markus@
+ - dtucker@cvs.openbsd.org 2010/01/11 04:46:45
+ [authfile.c sshconnect2.c]
+ Do not prompt for a passphrase if we fail to open a keyfile, and log the
+ reason the open failed to debug.
+ bz #1693, found by tj AT castaglia org, ok djm@
+ - djm@cvs.openbsd.org 2010/01/11 10:51:07
+ [ssh-keygen.c]
+ when converting keys, truncate key comments at 72 chars as per RFC4716;
+ bz#1630 reported by tj AT castaglia.org; ok markus@
+ - dtucker@cvs.openbsd.org 2010/01/12 00:16:47
+ [authfile.c]
+ Fix bug introduced in r1.78 (incorrect brace location) that broke key auth.
+ Patch from joachim joachimschipper nl.
+ - djm@cvs.openbsd.org 2010/01/12 00:58:25
+ [monitor_fdpass.c]
+ avoid spinning when fd passing on nonblocking sockets by calling poll()
+ in the EINTR/EAGAIN path, much like we do in atomicio; ok dtucker@
+ - djm@cvs.openbsd.org 2010/01/12 00:59:29
+ [roaming_common.c]
+ delete with extreme prejudice a debug() that fired with every keypress;
+ ok dtucker deraadt
+ - dtucker@cvs.openbsd.org 2010/01/12 01:31:05
+ [session.c]
+ Do not allow logins if /etc/nologin exists but is not readable by the user
+ logging in. Noted by Jan.Pechanec at Sun, ok djm@ deraadt@
+ - djm@cvs.openbsd.org 2010/01/12 01:36:08
+ [buffer.h bufaux.c]
+ add a buffer_get_string_ptr_ret() that does the same as
+ buffer_get_string_ptr() but does not fatal() on error; ok dtucker@
+ - dtucker@cvs.openbsd.org 2010/01/12 08:33:17
+ [session.c]
+ Add explicit stat so we reliably detect nologin with bad perms.
+ ok djm markus
+
+20100110
+ - (dtucker) [configure.ac misc.c readconf.c servconf.c ssh-keyscan.c]
+ Remove hacks add for RoutingDomain in preparation for its removal.
+ - (dtucker) OpenBSD CVS Sync
+ - dtucker@cvs.openbsd.org 2010/01/09 23:04:13
+ [channels.c ssh.1 servconf.c sshd_config.5 sshd.c channels.h servconf.h
+ ssh-keyscan.1 ssh-keyscan.c readconf.c sshconnect.c misc.c ssh.c
+ readconf.h scp.1 sftp.1 ssh_config.5 misc.h]
+ Remove RoutingDomain from ssh since it's now not needed. It can be
+ replaced with "route exec" or "nc -V" as a proxycommand. "route exec"
+ also ensures that trafic such as DNS lookups stays withing the specified
+ routingdomain. For example (from reyk):
+ # route -T 2 exec /usr/sbin/sshd
+ or inherited from the parent process
+ $ route -T 2 exec sh
+ $ ssh 10.1.2.3
+ ok deraadt@ markus@ stevesk@ reyk@
+ - dtucker@cvs.openbsd.org 2010/01/10 03:51:17
+ [servconf.c]
+ Add ChrootDirectory to sshd.c test-mode output
+ - dtucker@cvs.openbsd.org 2010/01/10 07:15:56
+ [auth.c]
+ Output a debug if we can't open an existing keyfile. bz#1694, ok djm@
+
+20100109
+ - (dtucker) Wrap use of IPPROTO_IPV6 in an ifdef for platforms that don't
+ have it.
+ - (dtucker) [defines.h] define PRIu64 for platforms that don't have it.
+ - (dtucker) [roaming_client.c] Wrap inttypes.h in an ifdef.
+ - (dtucker) [loginrec.c] Use the SUSv3 specified name for the user name
+ when using utmpx. Patch from Ed Schouten.
+ - (dtucker) OpenBSD CVS Sync
+ - djm@cvs.openbsd.org 2010/01/09 00:20:26
+ [sftp-server.c sftp-server.8]
+ add a 'read-only' mode to sftp-server(8) that disables open in write mode
+ and all other fs-modifying protocol methods. bz#430 ok dtucker@
+ - djm@cvs.openbsd.org 2010/01/09 00:57:10
+ [PROTOCOL]
+ tweak language
+ - jmc@cvs.openbsd.org 2010/01/09 03:36:00
+ [sftp-server.8]
+ bad place to forget a comma...
+ - djm@cvs.openbsd.org 2010/01/09 05:04:24
+ [mux.c sshpty.h clientloop.c sshtty.c]
+ quell tc[gs]etattr warnings when forcing a tty (ssh -tt), since we
+ usually don't actually have a tty to read/set; bz#1686 ok dtucker@
+ - dtucker@cvs.openbsd.org 2010/01/09 05:17:00
+ [roaming_client.c]
+ Remove a PRIu64 format string that snuck in with roaming. ok djm@
+ - dtucker@cvs.openbsd.org 2010/01/09 11:13:02
+ [sftp.c]
+ Prevent sftp from derefing a null pointer when given a "-" without a
+ command. Also, allow whitespace to follow a "-". bz#1691, path from
+ Colin Watson via Debian. ok djm@ deraadt@
+ - dtucker@cvs.openbsd.org 2010/01/09 11:17:56
+ [sshd.c]
+ Afer sshd receives a SIGHUP, ignore subsequent HUPs while sshd re-execs
+ itself. Prevents two HUPs in quick succession from resulting in sshd
+ dying. bz#1692, patch from Colin Watson via Ubuntu.
+ - (dtucker) [defines.h] Remove now-undeeded PRIu64 define.
+
+20100108
+ - (dtucker) OpenBSD CVS Sync
+ - andreas@cvs.openbsd.org 2009/10/24 11:11:58
+ [roaming.h]
+ Declarations needed for upcoming changes.
+ ok markus@
+ - andreas@cvs.openbsd.org 2009/10/24 11:13:54
+ [sshconnect2.c kex.h kex.c]
+ Let the client detect if the server supports roaming by looking
+ for the resume@appgate.com kex algorithm.
+ ok markus@
+ - andreas@cvs.openbsd.org 2009/10/24 11:15:29
+ [clientloop.c]
+ client_loop() must detect if the session has been suspended and resumed,
+ and take appropriate action in that case.
+ From Martin Forssen, maf at appgate dot com
+ - andreas@cvs.openbsd.org 2009/10/24 11:19:17
+ [ssh2.h]
+ Define the KEX messages used when resuming a suspended connection.
+ ok markus@
+ - andreas@cvs.openbsd.org 2009/10/24 11:22:37
+ [roaming_common.c]
+ Do the actual suspend/resume in the client. This won't be useful until
+ the server side supports roaming.
+ Most code from Martin Forssen, maf at appgate dot com. Some changes by
+ me and markus@
+ ok markus@
+ - andreas@cvs.openbsd.org 2009/10/24 11:23:42
+ [ssh.c]
+ Request roaming to be enabled if UseRoaming is true and the server
+ supports it.
+ ok markus@
+ - reyk@cvs.openbsd.org 2009/10/28 16:38:18
+ [ssh_config.5 sshd.c misc.h ssh-keyscan.1 readconf.h sshconnect.c
+ channels.c channels.h servconf.h servconf.c ssh.1 ssh-keyscan.c scp.1
+ sftp.1 sshd_config.5 readconf.c ssh.c misc.c]
+ Allow to set the rdomain in ssh/sftp/scp/sshd and ssh-keyscan.
+ ok markus@
+ - jmc@cvs.openbsd.org 2009/10/28 21:45:08
+ [sshd_config.5 sftp.1]
+ tweak previous;
+ - djm@cvs.openbsd.org 2009/11/10 02:56:22
+ [ssh_config.5]
+ explain the constraints on LocalCommand some more so people don't
+ try to abuse it.
+ - djm@cvs.openbsd.org 2009/11/10 02:58:56
+ [sshd_config.5]
+ clarify that StrictModes does not apply to ChrootDirectory. Permissions
+ and ownership are always checked when chrooting. bz#1532
+ - dtucker@cvs.openbsd.org 2009/11/10 04:30:45
+ [sshconnect2.c channels.c sshconnect.c]
+ Set close-on-exec on various descriptors so they don't get leaked to
+ child processes. bz #1643, patch from jchadima at redhat, ok deraadt.
+ - markus@cvs.openbsd.org 2009/11/11 21:37:03
+ [channels.c channels.h]
+ fix race condition in x11/agent channel allocation: don't read after
+ the end of the select read/write fdset and make sure a reused FD
+ is not touched before the pre-handlers are called.
+ with and ok djm@
+ - djm@cvs.openbsd.org 2009/11/17 05:31:44
+ [clientloop.c]
+ fix incorrect exit status when multiplexing and channel ID 0 is recycled
+ bz#1570 reported by peter.oliver AT eon-is.co.uk; ok dtucker
+ - djm@cvs.openbsd.org 2009/11/19 23:39:50
+ [session.c]
+ bz#1606: error when an attempt is made to connect to a server
+ with ForceCommand=internal-sftp with a shell session (i.e. not a
+ subsystem session). Avoids stuck client when attempting to ssh to such a
+ service. ok dtucker@
+ - dtucker@cvs.openbsd.org 2009/11/20 00:15:41
+ [session.c]
+ Warn but do not fail if stat()ing the subsystem binary fails. This helps
+ with chrootdirectory+forcecommand=sftp-server and restricted shells.
+ bz #1599, ok djm.
+ - djm@cvs.openbsd.org 2009/11/20 00:54:01
+ [sftp.c]
+ bz#1588 change "Connecting to host..." message to "Connected to host."
+ and delay it until after the sftp protocol connection has been established.
+ Avoids confusing sequence of messages when the underlying ssh connection
+ experiences problems. ok dtucker@
+ - dtucker@cvs.openbsd.org 2009/11/20 00:59:36
+ [sshconnect2.c]
+ Use the HostKeyAlias when prompting for passwords. bz#1039, ok djm@
+ - djm@cvs.openbsd.org 2009/11/20 03:24:07
+ [misc.c]
+ correct off-by-one in percent_expand(): we would fatal() when trying
+ to expand EXPAND_MAX_KEYS, allowing only EXPAND_MAX_KEYS-1 to actually
+ work. Note that nothing in OpenSSH actually uses close to this limit at
+ present. bz#1607 from Jan.Pechanec AT Sun.COM
+ - halex@cvs.openbsd.org 2009/11/22 13:18:00
+ [sftp.c]
+ make passing of zero-length arguments to ssh safe by
+ passing "-<switch>" "<value>" rather than "-<switch><value>"
+ ok dtucker@, guenther@, djm@
+ - dtucker@cvs.openbsd.org 2009/12/06 23:41:15
+ [sshconnect2.c]
+ zap unused variable and strlen; from Steve McClellan, ok djm
+ - djm@cvs.openbsd.org 2009/12/06 23:53:45
+ [roaming_common.c]
+ use socklen_t for getsockopt optlen parameter; reported by
+ Steve.McClellan AT radisys.com, ok dtucker@
+ - dtucker@cvs.openbsd.org 2009/12/06 23:53:54
+ [sftp.c]
+ fix potential divide-by-zero in sftp's "df" output when talking to a server
+ that reports zero files on the filesystem (Unix filesystems always have at
+ least the root inode). From Steve McClellan at radisys, ok djm@
+ - markus@cvs.openbsd.org 2009/12/11 18:16:33
+ [key.c]
+ switch from 35 to the more common value of RSA_F4 == (2**16)+1 == 65537
+ for the RSA public exponent; discussed with provos; ok djm@
+ - guenther@cvs.openbsd.org 2009/12/20 07:28:36
+ [ssh.c sftp.c scp.c]
+ When passing user-controlled options with arguments to other programs,
+ pass the option and option argument as separate argv entries and
+ not smashed into one (e.g., as -l foo and not -lfoo). Also, always
+ pass a "--" argument to stop option parsing, so that a positional
+ argument that starts with a '-' isn't treated as an option. This
+ fixes some error cases as well as the handling of hostnames and
+ filenames that start with a '-'.
+ Based on a diff by halex@
+ ok halex@ djm@ deraadt@
+ - djm@cvs.openbsd.org 2009/12/20 23:20:40
+ [PROTOCOL]
+ fix an incorrect magic number and typo in PROTOCOL; bz#1688
+ report and fix from ueno AT unixuser.org
+ - stevesk@cvs.openbsd.org 2009/12/25 19:40:21
+ [readconf.c servconf.c misc.h ssh-keyscan.c misc.c]
+ validate routing domain is in range 0-RT_TABLEID_MAX.
+ 'Looks right' deraadt@
+ - stevesk@cvs.openbsd.org 2009/12/29 16:38:41
+ [sshd_config.5 readconf.c ssh_config.5 scp.1 servconf.c sftp.1 ssh.1]
+ Rename RDomain config option to RoutingDomain to be more clear and
+ consistent with other options.
+ NOTE: if you currently use RDomain in the ssh client or server config,
+ or ssh/sshd -o, you must update to use RoutingDomain.
+ ok markus@ djm@
+ - jmc@cvs.openbsd.org 2009/12/29 18:03:32
+ [sshd_config.5 ssh_config.5]
+ sort previous;
+ - dtucker@cvs.openbsd.org 2010/01/04 01:45:30
+ [sshconnect2.c]
+ Don't escape backslashes in the SSH2 banner. bz#1533, patch from
+ Michal Gorny via Gentoo.
+ - djm@cvs.openbsd.org 2010/01/04 02:03:57
+ [sftp.c]
+ Implement tab-completion of commands, local and remote filenames for sftp.
+ Hacked on and off for some time by myself, mouring, Carlos Silva (via 2009
+ Google Summer of Code) and polished to a fine sheen by myself again.
+ It should deal more-or-less correctly with the ikky corner-cases presented
+ by quoted filenames, but the UI could still be slightly improved.
+ In particular, it is quite slow for remote completion on large directories.
+ bz#200; ok markus@
+ - djm@cvs.openbsd.org 2010/01/04 02:25:15
+ [sftp-server.c]
+ bz#1566 don't unnecessarily dup() in and out fds for sftp-server;
+ ok markus@
+ - dtucker@cvs.openbsd.org 2010/01/08 21:50:49
+ [sftp.c]
+ Fix two warnings: possibly used unitialized and use a nul byte instead of
+ NULL pointer. ok djm@
+ - (dtucker) [Makefile.in added roaming_client.c roaming_serv.c] Import new
+ files for roaming and add to Makefile.
+ - (dtucker) [Makefile.in] .c files do not belong in the OBJ lines.
+ - (dtucker) [sftp.c] ifdef out the sftp completion bits for platforms that
+ don't have libedit.
+ - (dtucker) [configure.ac misc.c readconf.c servconf.c ssh-keyscan.c] Make
+ RoutingDomain an unsupported option on platforms that don't have it.
+ - (dtucker) [sftp.c] Expand ifdef for libedit to cover complete_is_remote
+ too.
+ - (dtucker) [misc.c] Move the routingdomain ifdef to allow the socket to
+ be created.
+ - (dtucker] [misc.c] Shrink the area covered by USE_ROUTINGDOMAIN more
+ to eliminate an unused variable warning.
+ - (dtucker) [roaming_serv.c] Include includes.h for u_intXX_t types.
+
+20091226
+ - (tim) [contrib/cygwin/Makefile] Install ssh-copy-id and ssh-copy-id.1
+ Gzip all man pages. Patch from Corinna Vinschen.
+
+20091221
+ - (dtucker) [auth-krb5.c platform.{c,h} openbsd-compat/port-aix.{c,h}]
+ Bug #1583: Use system's kerberos principal name on AIX if it's available.
+ Based on a patch from and tested by Miguel Sanders
+
+20091208
+ - (dtucker) Bug #1470: Disable OOM-killing of the listening sshd on Linux,
+ based on a patch from Vaclav Ovsik and Colin Watson. ok djm.
+
+20091207
+ - (dtucker) Bug #1160: use pkg-config for opensc config if it's available.
+ Tested by Martin Paljak.
+ - (dtucker) Bug #1677: add conditionals around the source for ssh-askpass.
+
20091121
- (tim) [opensshd.init.in] If PidFile is set in sshd_config, use it.
Bug 1628. OK dtucker@